Date
July 9, 2025, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.530913] ================================================================== [ 19.531382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.531560] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.531780] [ 19.531815] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.531908] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.532010] Hardware name: linux,dummy-virt (DT) [ 19.532053] Call trace: [ 19.532076] show_stack+0x20/0x38 (C) [ 19.532467] dump_stack_lvl+0x8c/0xd0 [ 19.532551] print_report+0x118/0x608 [ 19.532605] kasan_report+0xdc/0x128 [ 19.532743] __asan_report_load8_noabort+0x20/0x30 [ 19.532817] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.532934] kasan_bitops_generic+0x110/0x1c8 [ 19.532986] kunit_try_run_case+0x170/0x3f0 [ 19.533056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.533291] kthread+0x328/0x630 [ 19.533354] ret_from_fork+0x10/0x20 [ 19.533563] [ 19.533611] Allocated by task 261: [ 19.533696] kasan_save_stack+0x3c/0x68 [ 19.533834] kasan_save_track+0x20/0x40 [ 19.533876] kasan_save_alloc_info+0x40/0x58 [ 19.533918] __kasan_kmalloc+0xd4/0xd8 [ 19.533965] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.534161] kasan_bitops_generic+0xa0/0x1c8 [ 19.534378] kunit_try_run_case+0x170/0x3f0 [ 19.534427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.534730] kthread+0x328/0x630 [ 19.534818] ret_from_fork+0x10/0x20 [ 19.534930] [ 19.535020] The buggy address belongs to the object at fff00000c58cac60 [ 19.535020] which belongs to the cache kmalloc-16 of size 16 [ 19.535239] The buggy address is located 8 bytes inside of [ 19.535239] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.535358] [ 19.535382] The buggy address belongs to the physical page: [ 19.535586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.535780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.535907] page_type: f5(slab) [ 19.536329] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.536518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.536725] page dumped because: kasan: bad access detected [ 19.537000] [ 19.537126] Memory state around the buggy address: [ 19.537215] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.537565] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.537641] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.537917] ^ [ 19.538053] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.538192] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.538323] ================================================================== [ 19.539288] ================================================================== [ 19.539469] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.539542] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.539846] [ 19.539899] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.540053] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.540127] Hardware name: linux,dummy-virt (DT) [ 19.540163] Call trace: [ 19.540466] show_stack+0x20/0x38 (C) [ 19.540537] dump_stack_lvl+0x8c/0xd0 [ 19.540781] print_report+0x118/0x608 [ 19.540972] kasan_report+0xdc/0x128 [ 19.541036] kasan_check_range+0x100/0x1a8 [ 19.541104] __kasan_check_write+0x20/0x30 [ 19.541307] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.541498] kasan_bitops_generic+0x110/0x1c8 [ 19.541904] kunit_try_run_case+0x170/0x3f0 [ 19.542104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.542179] kthread+0x328/0x630 [ 19.542522] ret_from_fork+0x10/0x20 [ 19.542656] [ 19.542718] Allocated by task 261: [ 19.542748] kasan_save_stack+0x3c/0x68 [ 19.543164] kasan_save_track+0x20/0x40 [ 19.543293] kasan_save_alloc_info+0x40/0x58 [ 19.543381] __kasan_kmalloc+0xd4/0xd8 [ 19.543441] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.543606] kasan_bitops_generic+0xa0/0x1c8 [ 19.543818] kunit_try_run_case+0x170/0x3f0 [ 19.543951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.544004] kthread+0x328/0x630 [ 19.544295] ret_from_fork+0x10/0x20 [ 19.544431] [ 19.544488] The buggy address belongs to the object at fff00000c58cac60 [ 19.544488] which belongs to the cache kmalloc-16 of size 16 [ 19.544883] The buggy address is located 8 bytes inside of [ 19.544883] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.545103] [ 19.545154] The buggy address belongs to the physical page: [ 19.545247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.545308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.545370] page_type: f5(slab) [ 19.545427] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.545791] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.546152] page dumped because: kasan: bad access detected [ 19.546290] [ 19.546327] Memory state around the buggy address: [ 19.546365] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.546423] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.546477] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.546519] ^ [ 19.546560] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.546606] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.546649] ================================================================== [ 19.555498] ================================================================== [ 19.555559] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 19.555760] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.555874] [ 19.555994] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.556261] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.556308] Hardware name: linux,dummy-virt (DT) [ 19.556343] Call trace: [ 19.556501] show_stack+0x20/0x38 (C) [ 19.556617] dump_stack_lvl+0x8c/0xd0 [ 19.556702] print_report+0x118/0x608 [ 19.556891] kasan_report+0xdc/0x128 [ 19.557041] kasan_check_range+0x100/0x1a8 [ 19.557135] __kasan_check_write+0x20/0x30 [ 19.557202] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 19.557564] kasan_bitops_generic+0x110/0x1c8 [ 19.557654] kunit_try_run_case+0x170/0x3f0 [ 19.557818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.558183] kthread+0x328/0x630 [ 19.558289] ret_from_fork+0x10/0x20 [ 19.558533] [ 19.558778] Allocated by task 261: [ 19.558909] kasan_save_stack+0x3c/0x68 [ 19.558984] kasan_save_track+0x20/0x40 [ 19.559202] kasan_save_alloc_info+0x40/0x58 [ 19.559419] __kasan_kmalloc+0xd4/0xd8 [ 19.559503] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.559647] kasan_bitops_generic+0xa0/0x1c8 [ 19.559815] kunit_try_run_case+0x170/0x3f0 [ 19.559894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.560132] kthread+0x328/0x630 [ 19.560353] ret_from_fork+0x10/0x20 [ 19.560428] [ 19.560472] The buggy address belongs to the object at fff00000c58cac60 [ 19.560472] which belongs to the cache kmalloc-16 of size 16 [ 19.560674] The buggy address is located 8 bytes inside of [ 19.560674] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.561043] [ 19.561101] The buggy address belongs to the physical page: [ 19.561833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.561912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.561992] page_type: f5(slab) [ 19.562135] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.562249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.562295] page dumped because: kasan: bad access detected [ 19.562330] [ 19.562548] Memory state around the buggy address: [ 19.562705] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.563182] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.563368] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.563815] ^ [ 19.563918] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.564053] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.564234] ================================================================== [ 19.548964] ================================================================== [ 19.549293] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.549367] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.549694] [ 19.550035] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.550293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.550470] Hardware name: linux,dummy-virt (DT) [ 19.550513] Call trace: [ 19.550697] show_stack+0x20/0x38 (C) [ 19.550853] dump_stack_lvl+0x8c/0xd0 [ 19.550994] print_report+0x118/0x608 [ 19.551122] kasan_report+0xdc/0x128 [ 19.551256] __asan_report_load8_noabort+0x20/0x30 [ 19.551355] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.551417] kasan_bitops_generic+0x110/0x1c8 [ 19.551500] kunit_try_run_case+0x170/0x3f0 [ 19.551562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.551630] kthread+0x328/0x630 [ 19.551676] ret_from_fork+0x10/0x20 [ 19.551738] [ 19.551767] Allocated by task 261: [ 19.551798] kasan_save_stack+0x3c/0x68 [ 19.551841] kasan_save_track+0x20/0x40 [ 19.551896] kasan_save_alloc_info+0x40/0x58 [ 19.551940] __kasan_kmalloc+0xd4/0xd8 [ 19.551989] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.552034] kasan_bitops_generic+0xa0/0x1c8 [ 19.552075] kunit_try_run_case+0x170/0x3f0 [ 19.552127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.552173] kthread+0x328/0x630 [ 19.552219] ret_from_fork+0x10/0x20 [ 19.552268] [ 19.552298] The buggy address belongs to the object at fff00000c58cac60 [ 19.552298] which belongs to the cache kmalloc-16 of size 16 [ 19.552359] The buggy address is located 8 bytes inside of [ 19.552359] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.552434] [ 19.552470] The buggy address belongs to the physical page: [ 19.552518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.552574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.552626] page_type: f5(slab) [ 19.552673] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.552737] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.552790] page dumped because: kasan: bad access detected [ 19.552824] [ 19.552848] Memory state around the buggy address: [ 19.552903] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.552950] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.552996] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.553037] ^ [ 19.553079] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.553805] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.553876] ================================================================== [ 19.585432] ================================================================== [ 19.585484] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 19.585538] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.585591] [ 19.585889] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.587022] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.587079] Hardware name: linux,dummy-virt (DT) [ 19.587178] Call trace: [ 19.587275] show_stack+0x20/0x38 (C) [ 19.587382] dump_stack_lvl+0x8c/0xd0 [ 19.587473] print_report+0x118/0x608 [ 19.587657] kasan_report+0xdc/0x128 [ 19.587930] kasan_check_range+0x100/0x1a8 [ 19.588053] __kasan_check_write+0x20/0x30 [ 19.588231] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 19.588455] kasan_bitops_generic+0x110/0x1c8 [ 19.588620] kunit_try_run_case+0x170/0x3f0 [ 19.588869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.588988] kthread+0x328/0x630 [ 19.589155] ret_from_fork+0x10/0x20 [ 19.589593] [ 19.589646] Allocated by task 261: [ 19.589787] kasan_save_stack+0x3c/0x68 [ 19.589917] kasan_save_track+0x20/0x40 [ 19.590057] kasan_save_alloc_info+0x40/0x58 [ 19.590117] __kasan_kmalloc+0xd4/0xd8 [ 19.590455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.590620] kasan_bitops_generic+0xa0/0x1c8 [ 19.591076] kunit_try_run_case+0x170/0x3f0 [ 19.591161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.591370] kthread+0x328/0x630 [ 19.591539] ret_from_fork+0x10/0x20 [ 19.591952] [ 19.592100] The buggy address belongs to the object at fff00000c58cac60 [ 19.592100] which belongs to the cache kmalloc-16 of size 16 [ 19.592692] The buggy address is located 8 bytes inside of [ 19.592692] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.592794] [ 19.592881] The buggy address belongs to the physical page: [ 19.592943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.593130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.593347] page_type: f5(slab) [ 19.593497] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.593554] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.593796] page dumped because: kasan: bad access detected [ 19.593979] [ 19.594143] Memory state around the buggy address: [ 19.594221] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.594270] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.594317] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.594632] ^ [ 19.594847] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.594924] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.595075] ================================================================== [ 19.524595] ================================================================== [ 19.524680] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.524981] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.525053] [ 19.525273] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.525380] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.525416] Hardware name: linux,dummy-virt (DT) [ 19.525639] Call trace: [ 19.525764] show_stack+0x20/0x38 (C) [ 19.525963] dump_stack_lvl+0x8c/0xd0 [ 19.526185] print_report+0x118/0x608 [ 19.526349] kasan_report+0xdc/0x128 [ 19.526479] kasan_check_range+0x100/0x1a8 [ 19.526535] __kasan_check_write+0x20/0x30 [ 19.526724] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.526991] kasan_bitops_generic+0x110/0x1c8 [ 19.527145] kunit_try_run_case+0x170/0x3f0 [ 19.527254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.527315] kthread+0x328/0x630 [ 19.527362] ret_from_fork+0x10/0x20 [ 19.527416] [ 19.527436] Allocated by task 261: [ 19.527480] kasan_save_stack+0x3c/0x68 [ 19.527544] kasan_save_track+0x20/0x40 [ 19.527585] kasan_save_alloc_info+0x40/0x58 [ 19.527638] __kasan_kmalloc+0xd4/0xd8 [ 19.527686] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.527740] kasan_bitops_generic+0xa0/0x1c8 [ 19.527782] kunit_try_run_case+0x170/0x3f0 [ 19.527830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.527876] kthread+0x328/0x630 [ 19.527911] ret_from_fork+0x10/0x20 [ 19.527951] [ 19.527974] The buggy address belongs to the object at fff00000c58cac60 [ 19.527974] which belongs to the cache kmalloc-16 of size 16 [ 19.528049] The buggy address is located 8 bytes inside of [ 19.528049] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.528135] [ 19.528176] The buggy address belongs to the physical page: [ 19.528214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.528273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.528328] page_type: f5(slab) [ 19.528379] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.528432] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.528490] page dumped because: kasan: bad access detected [ 19.528534] [ 19.528554] Memory state around the buggy address: [ 19.528589] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.528644] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.528690] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.528731] ^ [ 19.528772] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.528826] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.528869] ================================================================== [ 19.565599] ================================================================== [ 19.565755] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 19.565817] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.565882] [ 19.565916] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.566362] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.566492] Hardware name: linux,dummy-virt (DT) [ 19.566546] Call trace: [ 19.566571] show_stack+0x20/0x38 (C) [ 19.566660] dump_stack_lvl+0x8c/0xd0 [ 19.567123] print_report+0x118/0x608 [ 19.567189] kasan_report+0xdc/0x128 [ 19.567557] kasan_check_range+0x100/0x1a8 [ 19.567682] __kasan_check_write+0x20/0x30 [ 19.567845] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 19.568046] kasan_bitops_generic+0x110/0x1c8 [ 19.568414] kunit_try_run_case+0x170/0x3f0 [ 19.568538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.568644] kthread+0x328/0x630 [ 19.568975] ret_from_fork+0x10/0x20 [ 19.569445] [ 19.569552] Allocated by task 261: [ 19.569588] kasan_save_stack+0x3c/0x68 [ 19.569645] kasan_save_track+0x20/0x40 [ 19.569961] kasan_save_alloc_info+0x40/0x58 [ 19.570046] __kasan_kmalloc+0xd4/0xd8 [ 19.570221] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.570265] kasan_bitops_generic+0xa0/0x1c8 [ 19.570307] kunit_try_run_case+0x170/0x3f0 [ 19.570629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.570710] kthread+0x328/0x630 [ 19.570865] ret_from_fork+0x10/0x20 [ 19.571203] [ 19.571250] The buggy address belongs to the object at fff00000c58cac60 [ 19.571250] which belongs to the cache kmalloc-16 of size 16 [ 19.571382] The buggy address is located 8 bytes inside of [ 19.571382] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.571450] [ 19.571472] The buggy address belongs to the physical page: [ 19.571536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.571594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.571672] page_type: f5(slab) [ 19.571726] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.571804] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.571850] page dumped because: kasan: bad access detected [ 19.571884] [ 19.571906] Memory state around the buggy address: [ 19.571949] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.571997] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.572050] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.572130] ^ [ 19.572190] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.572238] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.572278] ================================================================== [ 19.596985] ================================================================== [ 19.597047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 19.597253] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.597316] [ 19.597349] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.597715] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.597817] Hardware name: linux,dummy-virt (DT) [ 19.597897] Call trace: [ 19.597959] show_stack+0x20/0x38 (C) [ 19.598024] dump_stack_lvl+0x8c/0xd0 [ 19.598207] print_report+0x118/0x608 [ 19.598425] kasan_report+0xdc/0x128 [ 19.598490] __asan_report_load8_noabort+0x20/0x30 [ 19.598671] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 19.598936] kasan_bitops_generic+0x110/0x1c8 [ 19.599001] kunit_try_run_case+0x170/0x3f0 [ 19.599281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.599468] kthread+0x328/0x630 [ 19.599540] ret_from_fork+0x10/0x20 [ 19.599790] [ 19.600060] Allocated by task 261: [ 19.600208] kasan_save_stack+0x3c/0x68 [ 19.600420] kasan_save_track+0x20/0x40 [ 19.600645] kasan_save_alloc_info+0x40/0x58 [ 19.600765] __kasan_kmalloc+0xd4/0xd8 [ 19.600852] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.601129] kasan_bitops_generic+0xa0/0x1c8 [ 19.601542] kunit_try_run_case+0x170/0x3f0 [ 19.601663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.601972] kthread+0x328/0x630 [ 19.602158] ret_from_fork+0x10/0x20 [ 19.602241] [ 19.602419] The buggy address belongs to the object at fff00000c58cac60 [ 19.602419] which belongs to the cache kmalloc-16 of size 16 [ 19.602678] The buggy address is located 8 bytes inside of [ 19.602678] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.602899] [ 19.603066] The buggy address belongs to the physical page: [ 19.603130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.603417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.603606] page_type: f5(slab) [ 19.603769] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.603857] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.604115] page dumped because: kasan: bad access detected [ 19.604262] [ 19.604368] Memory state around the buggy address: [ 19.604409] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.604782] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.604900] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.605151] ^ [ 19.605344] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.605493] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.605538] ================================================================== [ 19.581845] ================================================================== [ 19.581901] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 19.581956] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.582010] [ 19.582044] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.582466] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.582521] Hardware name: linux,dummy-virt (DT) [ 19.582556] Call trace: [ 19.582624] show_stack+0x20/0x38 (C) [ 19.582725] dump_stack_lvl+0x8c/0xd0 [ 19.582782] print_report+0x118/0x608 [ 19.582849] kasan_report+0xdc/0x128 [ 19.583056] kasan_check_range+0x100/0x1a8 [ 19.583139] __kasan_check_write+0x20/0x30 [ 19.583290] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 19.583356] kasan_bitops_generic+0x110/0x1c8 [ 19.583408] kunit_try_run_case+0x170/0x3f0 [ 19.583458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.583514] kthread+0x328/0x630 [ 19.583559] ret_from_fork+0x10/0x20 [ 19.583609] [ 19.583643] Allocated by task 261: [ 19.583676] kasan_save_stack+0x3c/0x68 [ 19.583722] kasan_save_track+0x20/0x40 [ 19.583762] kasan_save_alloc_info+0x40/0x58 [ 19.583817] __kasan_kmalloc+0xd4/0xd8 [ 19.583864] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.583905] kasan_bitops_generic+0xa0/0x1c8 [ 19.583951] kunit_try_run_case+0x170/0x3f0 [ 19.583991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.584048] kthread+0x328/0x630 [ 19.584097] ret_from_fork+0x10/0x20 [ 19.584135] [ 19.584167] The buggy address belongs to the object at fff00000c58cac60 [ 19.584167] which belongs to the cache kmalloc-16 of size 16 [ 19.584226] The buggy address is located 8 bytes inside of [ 19.584226] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.584290] [ 19.584312] The buggy address belongs to the physical page: [ 19.584344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.584397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.584448] page_type: f5(slab) [ 19.584490] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.584543] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.584586] page dumped because: kasan: bad access detected [ 19.584622] [ 19.584651] Memory state around the buggy address: [ 19.584694] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.584740] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.584790] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.584831] ^ [ 19.584874] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.584919] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.584960] ================================================================== [ 19.572733] ================================================================== [ 19.572789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 19.572870] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.572925] [ 19.572968] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.573059] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.573460] Hardware name: linux,dummy-virt (DT) [ 19.573548] Call trace: [ 19.573575] show_stack+0x20/0x38 (C) [ 19.574040] dump_stack_lvl+0x8c/0xd0 [ 19.574123] print_report+0x118/0x608 [ 19.574219] kasan_report+0xdc/0x128 [ 19.574291] __asan_report_load8_noabort+0x20/0x30 [ 19.574766] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 19.575025] kasan_bitops_generic+0x110/0x1c8 [ 19.575265] kunit_try_run_case+0x170/0x3f0 [ 19.575602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.575697] kthread+0x328/0x630 [ 19.575887] ret_from_fork+0x10/0x20 [ 19.576119] [ 19.576175] Allocated by task 261: [ 19.576428] kasan_save_stack+0x3c/0x68 [ 19.576564] kasan_save_track+0x20/0x40 [ 19.576672] kasan_save_alloc_info+0x40/0x58 [ 19.576788] __kasan_kmalloc+0xd4/0xd8 [ 19.576877] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.577000] kasan_bitops_generic+0xa0/0x1c8 [ 19.577064] kunit_try_run_case+0x170/0x3f0 [ 19.577117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.577287] kthread+0x328/0x630 [ 19.577502] ret_from_fork+0x10/0x20 [ 19.577703] [ 19.577884] The buggy address belongs to the object at fff00000c58cac60 [ 19.577884] which belongs to the cache kmalloc-16 of size 16 [ 19.577987] The buggy address is located 8 bytes inside of [ 19.577987] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.578188] [ 19.578381] The buggy address belongs to the physical page: [ 19.578429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.578572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.578639] page_type: f5(slab) [ 19.578799] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.578886] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.579041] page dumped because: kasan: bad access detected [ 19.579108] [ 19.579260] Memory state around the buggy address: [ 19.579470] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.579548] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.579637] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.579774] ^ [ 19.579851] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.579993] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.580043] ==================================================================
[ 14.842269] ================================================================== [ 14.842511] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.842953] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 14.843179] [ 14.843354] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.843397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.843407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.843427] Call Trace: [ 14.843444] <TASK> [ 14.843460] dump_stack_lvl+0x73/0xb0 [ 14.843487] print_report+0xd1/0x650 [ 14.843509] ? __virt_addr_valid+0x1db/0x2d0 [ 14.843533] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.843559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.843582] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.843621] kasan_report+0x141/0x180 [ 14.843642] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.843673] kasan_check_range+0x10c/0x1c0 [ 14.843697] __kasan_check_write+0x18/0x20 [ 14.843717] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.843743] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.843790] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.843832] ? trace_hardirqs_on+0x37/0xe0 [ 14.843854] ? kasan_bitops_generic+0x92/0x1c0 [ 14.843881] kasan_bitops_generic+0x116/0x1c0 [ 14.843905] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.843930] ? __pfx_read_tsc+0x10/0x10 [ 14.843951] ? ktime_get_ts64+0x86/0x230 [ 14.843976] kunit_try_run_case+0x1a5/0x480 [ 14.844000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844023] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.844047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.844070] ? __kthread_parkme+0x82/0x180 [ 14.844091] ? preempt_count_sub+0x50/0x80 [ 14.844127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.844176] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.844203] kthread+0x337/0x6f0 [ 14.844221] ? trace_preempt_on+0x20/0xc0 [ 14.844243] ? __pfx_kthread+0x10/0x10 [ 14.844263] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.844285] ? calculate_sigpending+0x7b/0xa0 [ 14.844308] ? __pfx_kthread+0x10/0x10 [ 14.844329] ret_from_fork+0x116/0x1d0 [ 14.844348] ? __pfx_kthread+0x10/0x10 [ 14.844367] ret_from_fork_asm+0x1a/0x30 [ 14.844397] </TASK> [ 14.844408] [ 14.852264] Allocated by task 278: [ 14.852409] kasan_save_stack+0x45/0x70 [ 14.852559] kasan_save_track+0x18/0x40 [ 14.852879] kasan_save_alloc_info+0x3b/0x50 [ 14.853344] __kasan_kmalloc+0xb7/0xc0 [ 14.853539] __kmalloc_cache_noprof+0x189/0x420 [ 14.853828] kasan_bitops_generic+0x92/0x1c0 [ 14.854250] kunit_try_run_case+0x1a5/0x480 [ 14.854462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.854729] kthread+0x337/0x6f0 [ 14.854949] ret_from_fork+0x116/0x1d0 [ 14.855231] ret_from_fork_asm+0x1a/0x30 [ 14.855406] [ 14.855501] The buggy address belongs to the object at ffff888102434620 [ 14.855501] which belongs to the cache kmalloc-16 of size 16 [ 14.855914] The buggy address is located 8 bytes inside of [ 14.855914] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 14.856400] [ 14.856496] The buggy address belongs to the physical page: [ 14.856759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 14.857395] flags: 0x200000000000000(node=0|zone=2) [ 14.857573] page_type: f5(slab) [ 14.857759] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.858567] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.858905] page dumped because: kasan: bad access detected [ 14.859083] [ 14.859155] Memory state around the buggy address: [ 14.859311] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 14.859526] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.860360] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.860701] ^ [ 14.860923] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.861239] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.861551] ================================================================== [ 14.863345] ================================================================== [ 14.864078] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.864464] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 14.865173] [ 14.865396] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.865536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.865550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.865572] Call Trace: [ 14.865631] <TASK> [ 14.865650] dump_stack_lvl+0x73/0xb0 [ 14.865682] print_report+0xd1/0x650 [ 14.865704] ? __virt_addr_valid+0x1db/0x2d0 [ 14.865727] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.865754] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.865816] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.865843] kasan_report+0x141/0x180 [ 14.865864] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.865895] kasan_check_range+0x10c/0x1c0 [ 14.865919] __kasan_check_write+0x18/0x20 [ 14.865938] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.865965] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.865992] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.866017] ? trace_hardirqs_on+0x37/0xe0 [ 14.866039] ? kasan_bitops_generic+0x92/0x1c0 [ 14.866066] kasan_bitops_generic+0x116/0x1c0 [ 14.866090] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.866115] ? __pfx_read_tsc+0x10/0x10 [ 14.866138] ? ktime_get_ts64+0x86/0x230 [ 14.866162] kunit_try_run_case+0x1a5/0x480 [ 14.866185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.866208] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.866232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.866257] ? __kthread_parkme+0x82/0x180 [ 14.866278] ? preempt_count_sub+0x50/0x80 [ 14.866302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.866327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.866352] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.866377] kthread+0x337/0x6f0 [ 14.866396] ? trace_preempt_on+0x20/0xc0 [ 14.866418] ? __pfx_kthread+0x10/0x10 [ 14.866438] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.866460] ? calculate_sigpending+0x7b/0xa0 [ 14.866485] ? __pfx_kthread+0x10/0x10 [ 14.866505] ret_from_fork+0x116/0x1d0 [ 14.866522] ? __pfx_kthread+0x10/0x10 [ 14.866542] ret_from_fork_asm+0x1a/0x30 [ 14.866573] </TASK> [ 14.866583] [ 14.879252] Allocated by task 278: [ 14.879414] kasan_save_stack+0x45/0x70 [ 14.879580] kasan_save_track+0x18/0x40 [ 14.879764] kasan_save_alloc_info+0x3b/0x50 [ 14.880057] __kasan_kmalloc+0xb7/0xc0 [ 14.880212] __kmalloc_cache_noprof+0x189/0x420 [ 14.880446] kasan_bitops_generic+0x92/0x1c0 [ 14.880634] kunit_try_run_case+0x1a5/0x480 [ 14.880782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.881172] kthread+0x337/0x6f0 [ 14.881340] ret_from_fork+0x116/0x1d0 [ 14.881583] ret_from_fork_asm+0x1a/0x30 [ 14.881750] [ 14.881936] The buggy address belongs to the object at ffff888102434620 [ 14.881936] which belongs to the cache kmalloc-16 of size 16 [ 14.882392] The buggy address is located 8 bytes inside of [ 14.882392] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 14.882802] [ 14.882901] The buggy address belongs to the physical page: [ 14.883154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 14.883553] flags: 0x200000000000000(node=0|zone=2) [ 14.883725] page_type: f5(slab) [ 14.883845] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.884579] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.884926] page dumped because: kasan: bad access detected [ 14.885140] [ 14.885227] Memory state around the buggy address: [ 14.885428] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 14.885726] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.886024] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.886327] ^ [ 14.886519] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.886759] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.887232] ================================================================== [ 14.823302] ================================================================== [ 14.823658] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.824083] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 14.824419] [ 14.824522] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.824565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.824577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.824607] Call Trace: [ 14.824623] <TASK> [ 14.824640] dump_stack_lvl+0x73/0xb0 [ 14.824666] print_report+0xd1/0x650 [ 14.824688] ? __virt_addr_valid+0x1db/0x2d0 [ 14.824710] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.824736] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.824759] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.824820] kasan_report+0x141/0x180 [ 14.824842] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.824873] kasan_check_range+0x10c/0x1c0 [ 14.824896] __kasan_check_write+0x18/0x20 [ 14.824915] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.824941] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.824969] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.824992] ? trace_hardirqs_on+0x37/0xe0 [ 14.825015] ? kasan_bitops_generic+0x92/0x1c0 [ 14.825043] kasan_bitops_generic+0x116/0x1c0 [ 14.825067] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.825092] ? __pfx_read_tsc+0x10/0x10 [ 14.825114] ? ktime_get_ts64+0x86/0x230 [ 14.825138] kunit_try_run_case+0x1a5/0x480 [ 14.825162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.825186] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.825209] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.825233] ? __kthread_parkme+0x82/0x180 [ 14.825254] ? preempt_count_sub+0x50/0x80 [ 14.825278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.825303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.825327] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.825352] kthread+0x337/0x6f0 [ 14.825371] ? trace_preempt_on+0x20/0xc0 [ 14.825394] ? __pfx_kthread+0x10/0x10 [ 14.825413] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.825435] ? calculate_sigpending+0x7b/0xa0 [ 14.825459] ? __pfx_kthread+0x10/0x10 [ 14.825481] ret_from_fork+0x116/0x1d0 [ 14.825500] ? __pfx_kthread+0x10/0x10 [ 14.825521] ret_from_fork_asm+0x1a/0x30 [ 14.825551] </TASK> [ 14.825561] [ 14.834165] Allocated by task 278: [ 14.834347] kasan_save_stack+0x45/0x70 [ 14.834549] kasan_save_track+0x18/0x40 [ 14.834748] kasan_save_alloc_info+0x3b/0x50 [ 14.835019] __kasan_kmalloc+0xb7/0xc0 [ 14.835191] __kmalloc_cache_noprof+0x189/0x420 [ 14.835346] kasan_bitops_generic+0x92/0x1c0 [ 14.835493] kunit_try_run_case+0x1a5/0x480 [ 14.835650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.835866] kthread+0x337/0x6f0 [ 14.835985] ret_from_fork+0x116/0x1d0 [ 14.836118] ret_from_fork_asm+0x1a/0x30 [ 14.836289] [ 14.836383] The buggy address belongs to the object at ffff888102434620 [ 14.836383] which belongs to the cache kmalloc-16 of size 16 [ 14.836963] The buggy address is located 8 bytes inside of [ 14.836963] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 14.837507] [ 14.837615] The buggy address belongs to the physical page: [ 14.837902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 14.838140] flags: 0x200000000000000(node=0|zone=2) [ 14.838301] page_type: f5(slab) [ 14.838418] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.838920] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.839257] page dumped because: kasan: bad access detected [ 14.839511] [ 14.839610] Memory state around the buggy address: [ 14.839936] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 14.840258] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.840536] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.840882] ^ [ 14.841102] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.841377] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.841671] ================================================================== [ 14.780870] ================================================================== [ 14.781524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.782273] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 14.782997] [ 14.783201] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.783246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.783257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.783277] Call Trace: [ 14.783290] <TASK> [ 14.783308] dump_stack_lvl+0x73/0xb0 [ 14.783338] print_report+0xd1/0x650 [ 14.783359] ? __virt_addr_valid+0x1db/0x2d0 [ 14.783384] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.783410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.783434] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.783460] kasan_report+0x141/0x180 [ 14.783481] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.783512] kasan_check_range+0x10c/0x1c0 [ 14.783535] __kasan_check_write+0x18/0x20 [ 14.783555] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.783581] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.783621] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.783646] ? trace_hardirqs_on+0x37/0xe0 [ 14.783669] ? kasan_bitops_generic+0x92/0x1c0 [ 14.783697] kasan_bitops_generic+0x116/0x1c0 [ 14.783720] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.783745] ? __pfx_read_tsc+0x10/0x10 [ 14.783787] ? ktime_get_ts64+0x86/0x230 [ 14.783812] kunit_try_run_case+0x1a5/0x480 [ 14.783837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.783860] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.783884] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.783908] ? __kthread_parkme+0x82/0x180 [ 14.783946] ? preempt_count_sub+0x50/0x80 [ 14.783971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.783995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.784022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.784049] kthread+0x337/0x6f0 [ 14.784068] ? trace_preempt_on+0x20/0xc0 [ 14.784090] ? __pfx_kthread+0x10/0x10 [ 14.784112] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.784133] ? calculate_sigpending+0x7b/0xa0 [ 14.784158] ? __pfx_kthread+0x10/0x10 [ 14.784179] ret_from_fork+0x116/0x1d0 [ 14.784198] ? __pfx_kthread+0x10/0x10 [ 14.784219] ret_from_fork_asm+0x1a/0x30 [ 14.784251] </TASK> [ 14.784261] [ 14.795495] Allocated by task 278: [ 14.795703] kasan_save_stack+0x45/0x70 [ 14.795966] kasan_save_track+0x18/0x40 [ 14.796150] kasan_save_alloc_info+0x3b/0x50 [ 14.796301] __kasan_kmalloc+0xb7/0xc0 [ 14.796432] __kmalloc_cache_noprof+0x189/0x420 [ 14.796629] kasan_bitops_generic+0x92/0x1c0 [ 14.796905] kunit_try_run_case+0x1a5/0x480 [ 14.797114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.797562] kthread+0x337/0x6f0 [ 14.797695] ret_from_fork+0x116/0x1d0 [ 14.798034] ret_from_fork_asm+0x1a/0x30 [ 14.798238] [ 14.798331] The buggy address belongs to the object at ffff888102434620 [ 14.798331] which belongs to the cache kmalloc-16 of size 16 [ 14.798787] The buggy address is located 8 bytes inside of [ 14.798787] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 14.799161] [ 14.799257] The buggy address belongs to the physical page: [ 14.799666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 14.800077] flags: 0x200000000000000(node=0|zone=2) [ 14.800321] page_type: f5(slab) [ 14.800496] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.800745] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.801121] page dumped because: kasan: bad access detected [ 14.801298] [ 14.801388] Memory state around the buggy address: [ 14.801617] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 14.801883] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.802186] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.802516] ^ [ 14.802742] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.803029] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.803244] ================================================================== [ 14.803720] ================================================================== [ 14.804494] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.805075] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 14.805303] [ 14.805391] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.805435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.805447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.805467] Call Trace: [ 14.805486] <TASK> [ 14.805504] dump_stack_lvl+0x73/0xb0 [ 14.805534] print_report+0xd1/0x650 [ 14.805556] ? __virt_addr_valid+0x1db/0x2d0 [ 14.805580] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.805619] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.805642] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.805669] kasan_report+0x141/0x180 [ 14.805690] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.805721] kasan_check_range+0x10c/0x1c0 [ 14.805745] __kasan_check_write+0x18/0x20 [ 14.805783] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.805810] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.805856] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.805883] ? trace_hardirqs_on+0x37/0xe0 [ 14.805908] ? kasan_bitops_generic+0x92/0x1c0 [ 14.805935] kasan_bitops_generic+0x116/0x1c0 [ 14.805959] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.805985] ? __pfx_read_tsc+0x10/0x10 [ 14.806006] ? ktime_get_ts64+0x86/0x230 [ 14.806031] kunit_try_run_case+0x1a5/0x480 [ 14.806055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.806078] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.806102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.806127] ? __kthread_parkme+0x82/0x180 [ 14.806148] ? preempt_count_sub+0x50/0x80 [ 14.806172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.806196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.806221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.806247] kthread+0x337/0x6f0 [ 14.806265] ? trace_preempt_on+0x20/0xc0 [ 14.806286] ? __pfx_kthread+0x10/0x10 [ 14.806307] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.806328] ? calculate_sigpending+0x7b/0xa0 [ 14.806352] ? __pfx_kthread+0x10/0x10 [ 14.806374] ret_from_fork+0x116/0x1d0 [ 14.806393] ? __pfx_kthread+0x10/0x10 [ 14.806413] ret_from_fork_asm+0x1a/0x30 [ 14.806444] </TASK> [ 14.806454] [ 14.815004] Allocated by task 278: [ 14.815189] kasan_save_stack+0x45/0x70 [ 14.815368] kasan_save_track+0x18/0x40 [ 14.815534] kasan_save_alloc_info+0x3b/0x50 [ 14.815692] __kasan_kmalloc+0xb7/0xc0 [ 14.815851] __kmalloc_cache_noprof+0x189/0x420 [ 14.816246] kasan_bitops_generic+0x92/0x1c0 [ 14.816461] kunit_try_run_case+0x1a5/0x480 [ 14.816681] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.816996] kthread+0x337/0x6f0 [ 14.817232] ret_from_fork+0x116/0x1d0 [ 14.817365] ret_from_fork_asm+0x1a/0x30 [ 14.817561] [ 14.817669] The buggy address belongs to the object at ffff888102434620 [ 14.817669] which belongs to the cache kmalloc-16 of size 16 [ 14.818251] The buggy address is located 8 bytes inside of [ 14.818251] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 14.818705] [ 14.818802] The buggy address belongs to the physical page: [ 14.818979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 14.819238] flags: 0x200000000000000(node=0|zone=2) [ 14.819418] page_type: f5(slab) [ 14.819584] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.819961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.820478] page dumped because: kasan: bad access detected [ 14.820801] [ 14.820891] Memory state around the buggy address: [ 14.821112] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 14.821339] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.821550] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.821768] ^ [ 14.821911] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.822122] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.822822] ================================================================== [ 14.909746] ================================================================== [ 14.910420] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.910905] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 14.911283] [ 14.911378] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.911422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.911433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.911453] Call Trace: [ 14.911470] <TASK> [ 14.911487] dump_stack_lvl+0x73/0xb0 [ 14.911516] print_report+0xd1/0x650 [ 14.911538] ? __virt_addr_valid+0x1db/0x2d0 [ 14.911561] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.911587] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.911624] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.911652] kasan_report+0x141/0x180 [ 14.911673] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.911704] kasan_check_range+0x10c/0x1c0 [ 14.911728] __kasan_check_write+0x18/0x20 [ 14.911748] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.911810] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.911839] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.911865] ? trace_hardirqs_on+0x37/0xe0 [ 14.911888] ? kasan_bitops_generic+0x92/0x1c0 [ 14.911915] kasan_bitops_generic+0x116/0x1c0 [ 14.911938] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.911984] ? __pfx_read_tsc+0x10/0x10 [ 14.912005] ? ktime_get_ts64+0x86/0x230 [ 14.912029] kunit_try_run_case+0x1a5/0x480 [ 14.912052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.912075] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.912099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.912122] ? __kthread_parkme+0x82/0x180 [ 14.912143] ? preempt_count_sub+0x50/0x80 [ 14.912167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.912191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.912216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.912241] kthread+0x337/0x6f0 [ 14.912259] ? trace_preempt_on+0x20/0xc0 [ 14.912280] ? __pfx_kthread+0x10/0x10 [ 14.912300] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.912321] ? calculate_sigpending+0x7b/0xa0 [ 14.912345] ? __pfx_kthread+0x10/0x10 [ 14.912366] ret_from_fork+0x116/0x1d0 [ 14.912385] ? __pfx_kthread+0x10/0x10 [ 14.912404] ret_from_fork_asm+0x1a/0x30 [ 14.912434] </TASK> [ 14.912444] [ 14.920690] Allocated by task 278: [ 14.920878] kasan_save_stack+0x45/0x70 [ 14.921078] kasan_save_track+0x18/0x40 [ 14.921268] kasan_save_alloc_info+0x3b/0x50 [ 14.921461] __kasan_kmalloc+0xb7/0xc0 [ 14.921633] __kmalloc_cache_noprof+0x189/0x420 [ 14.922088] kasan_bitops_generic+0x92/0x1c0 [ 14.922256] kunit_try_run_case+0x1a5/0x480 [ 14.922450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.922720] kthread+0x337/0x6f0 [ 14.922904] ret_from_fork+0x116/0x1d0 [ 14.923037] ret_from_fork_asm+0x1a/0x30 [ 14.923177] [ 14.923247] The buggy address belongs to the object at ffff888102434620 [ 14.923247] which belongs to the cache kmalloc-16 of size 16 [ 14.923818] The buggy address is located 8 bytes inside of [ 14.923818] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 14.924332] [ 14.924411] The buggy address belongs to the physical page: [ 14.924587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 14.925006] flags: 0x200000000000000(node=0|zone=2) [ 14.925243] page_type: f5(slab) [ 14.925414] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.925892] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.926272] page dumped because: kasan: bad access detected [ 14.926539] [ 14.926641] Memory state around the buggy address: [ 14.926881] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 14.927168] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.927381] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.927690] ^ [ 14.927908] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.928184] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.928466] ================================================================== [ 14.887735] ================================================================== [ 14.888279] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.888766] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 14.889106] [ 14.889194] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.889237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.889247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.889268] Call Trace: [ 14.889280] <TASK> [ 14.889295] dump_stack_lvl+0x73/0xb0 [ 14.889323] print_report+0xd1/0x650 [ 14.889344] ? __virt_addr_valid+0x1db/0x2d0 [ 14.889367] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.889393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.889416] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.889443] kasan_report+0x141/0x180 [ 14.889464] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.889495] kasan_check_range+0x10c/0x1c0 [ 14.889518] __kasan_check_write+0x18/0x20 [ 14.889538] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.889564] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.889592] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.889628] ? trace_hardirqs_on+0x37/0xe0 [ 14.889651] ? kasan_bitops_generic+0x92/0x1c0 [ 14.889678] kasan_bitops_generic+0x116/0x1c0 [ 14.889702] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.889751] ? __pfx_read_tsc+0x10/0x10 [ 14.889774] ? ktime_get_ts64+0x86/0x230 [ 14.889801] kunit_try_run_case+0x1a5/0x480 [ 14.889825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.889847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.889871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.889895] ? __kthread_parkme+0x82/0x180 [ 14.889916] ? preempt_count_sub+0x50/0x80 [ 14.889940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.889965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.889988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.890013] kthread+0x337/0x6f0 [ 14.890032] ? trace_preempt_on+0x20/0xc0 [ 14.890053] ? __pfx_kthread+0x10/0x10 [ 14.890074] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.890094] ? calculate_sigpending+0x7b/0xa0 [ 14.890119] ? __pfx_kthread+0x10/0x10 [ 14.890139] ret_from_fork+0x116/0x1d0 [ 14.890157] ? __pfx_kthread+0x10/0x10 [ 14.890177] ret_from_fork_asm+0x1a/0x30 [ 14.890220] </TASK> [ 14.890230] [ 14.898628] Allocated by task 278: [ 14.898761] kasan_save_stack+0x45/0x70 [ 14.898913] kasan_save_track+0x18/0x40 [ 14.899172] kasan_save_alloc_info+0x3b/0x50 [ 14.899506] __kasan_kmalloc+0xb7/0xc0 [ 14.899706] __kmalloc_cache_noprof+0x189/0x420 [ 14.899949] kasan_bitops_generic+0x92/0x1c0 [ 14.900146] kunit_try_run_case+0x1a5/0x480 [ 14.900292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.900467] kthread+0x337/0x6f0 [ 14.900590] ret_from_fork+0x116/0x1d0 [ 14.900899] ret_from_fork_asm+0x1a/0x30 [ 14.901116] [ 14.901206] The buggy address belongs to the object at ffff888102434620 [ 14.901206] which belongs to the cache kmalloc-16 of size 16 [ 14.901587] The buggy address is located 8 bytes inside of [ 14.901587] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 14.901944] [ 14.902015] The buggy address belongs to the physical page: [ 14.902359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 14.903636] flags: 0x200000000000000(node=0|zone=2) [ 14.904813] page_type: f5(slab) [ 14.904981] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.905301] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.905635] page dumped because: kasan: bad access detected [ 14.905869] [ 14.905946] Memory state around the buggy address: [ 14.906166] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 14.906453] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.907612] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.907971] ^ [ 14.908159] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.908648] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.909157] ================================================================== [ 14.750361] ================================================================== [ 14.750890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.751247] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 14.751548] [ 14.751696] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.751758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.751772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.751793] Call Trace: [ 14.751818] <TASK> [ 14.751836] dump_stack_lvl+0x73/0xb0 [ 14.751867] print_report+0xd1/0x650 [ 14.751890] ? __virt_addr_valid+0x1db/0x2d0 [ 14.751915] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.751941] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.751976] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.752003] kasan_report+0x141/0x180 [ 14.752025] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.752067] kasan_check_range+0x10c/0x1c0 [ 14.752091] __kasan_check_write+0x18/0x20 [ 14.752110] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.752137] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.752165] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.752200] ? trace_hardirqs_on+0x37/0xe0 [ 14.752223] ? kasan_bitops_generic+0x92/0x1c0 [ 14.752250] kasan_bitops_generic+0x116/0x1c0 [ 14.752285] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.752310] ? __pfx_read_tsc+0x10/0x10 [ 14.752331] ? ktime_get_ts64+0x86/0x230 [ 14.752365] kunit_try_run_case+0x1a5/0x480 [ 14.752391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.752414] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.752450] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.752474] ? __kthread_parkme+0x82/0x180 [ 14.752496] ? preempt_count_sub+0x50/0x80 [ 14.752522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.752553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.752579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.752630] kthread+0x337/0x6f0 [ 14.752651] ? trace_preempt_on+0x20/0xc0 [ 14.752673] ? __pfx_kthread+0x10/0x10 [ 14.752694] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.752716] ? calculate_sigpending+0x7b/0xa0 [ 14.752741] ? __pfx_kthread+0x10/0x10 [ 14.752763] ret_from_fork+0x116/0x1d0 [ 14.752800] ? __pfx_kthread+0x10/0x10 [ 14.752822] ret_from_fork_asm+0x1a/0x30 [ 14.752855] </TASK> [ 14.752865] [ 14.766251] Allocated by task 278: [ 14.766401] kasan_save_stack+0x45/0x70 [ 14.767375] kasan_save_track+0x18/0x40 [ 14.767851] kasan_save_alloc_info+0x3b/0x50 [ 14.768172] __kasan_kmalloc+0xb7/0xc0 [ 14.768309] __kmalloc_cache_noprof+0x189/0x420 [ 14.768468] kasan_bitops_generic+0x92/0x1c0 [ 14.768627] kunit_try_run_case+0x1a5/0x480 [ 14.768829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.769395] kthread+0x337/0x6f0 [ 14.769792] ret_from_fork+0x116/0x1d0 [ 14.770148] ret_from_fork_asm+0x1a/0x30 [ 14.770519] [ 14.770690] The buggy address belongs to the object at ffff888102434620 [ 14.770690] which belongs to the cache kmalloc-16 of size 16 [ 14.772007] The buggy address is located 8 bytes inside of [ 14.772007] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 14.773108] [ 14.773272] The buggy address belongs to the physical page: [ 14.773669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 14.774454] flags: 0x200000000000000(node=0|zone=2) [ 14.774641] page_type: f5(slab) [ 14.774786] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.775540] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.776393] page dumped because: kasan: bad access detected [ 14.776900] [ 14.777067] Memory state around the buggy address: [ 14.777523] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 14.777757] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.778485] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.779231] ^ [ 14.779790] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.780049] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.780272] ==================================================================