Date
July 9, 2025, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.664229] ================================================================== [ 19.664284] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 19.664340] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.664701] [ 19.665013] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.665235] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.665278] Hardware name: linux,dummy-virt (DT) [ 19.665422] Call trace: [ 19.665470] show_stack+0x20/0x38 (C) [ 19.665665] dump_stack_lvl+0x8c/0xd0 [ 19.665734] print_report+0x118/0x608 [ 19.665786] kasan_report+0xdc/0x128 [ 19.665969] kasan_check_range+0x100/0x1a8 [ 19.666173] __kasan_check_write+0x20/0x30 [ 19.666370] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 19.666489] kasan_bitops_generic+0x11c/0x1c8 [ 19.666657] kunit_try_run_case+0x170/0x3f0 [ 19.666714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.667147] kthread+0x328/0x630 [ 19.667268] ret_from_fork+0x10/0x20 [ 19.667513] [ 19.667603] Allocated by task 261: [ 19.667960] kasan_save_stack+0x3c/0x68 [ 19.668063] kasan_save_track+0x20/0x40 [ 19.668737] kasan_save_alloc_info+0x40/0x58 [ 19.668820] __kasan_kmalloc+0xd4/0xd8 [ 19.668896] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.668958] kasan_bitops_generic+0xa0/0x1c8 [ 19.669347] kunit_try_run_case+0x170/0x3f0 [ 19.669615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.669890] kthread+0x328/0x630 [ 19.670111] ret_from_fork+0x10/0x20 [ 19.670250] [ 19.670319] The buggy address belongs to the object at fff00000c58cac60 [ 19.670319] which belongs to the cache kmalloc-16 of size 16 [ 19.670441] The buggy address is located 8 bytes inside of [ 19.670441] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.670505] [ 19.670527] The buggy address belongs to the physical page: [ 19.671022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.671218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.671399] page_type: f5(slab) [ 19.671477] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.671577] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.671695] page dumped because: kasan: bad access detected [ 19.671836] [ 19.671926] Memory state around the buggy address: [ 19.672040] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.672312] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.672420] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.672488] ^ [ 19.672538] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.672595] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.672652] ================================================================== [ 19.655322] ================================================================== [ 19.655377] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 19.655470] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.655526] [ 19.655562] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.655651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.655684] Hardware name: linux,dummy-virt (DT) [ 19.655717] Call trace: [ 19.655744] show_stack+0x20/0x38 (C) [ 19.655807] dump_stack_lvl+0x8c/0xd0 [ 19.655874] print_report+0x118/0x608 [ 19.655930] kasan_report+0xdc/0x128 [ 19.655980] __asan_report_load8_noabort+0x20/0x30 [ 19.656039] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 19.656904] kasan_bitops_generic+0x11c/0x1c8 [ 19.657061] kunit_try_run_case+0x170/0x3f0 [ 19.657145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.657568] kthread+0x328/0x630 [ 19.657622] ret_from_fork+0x10/0x20 [ 19.658060] [ 19.658197] Allocated by task 261: [ 19.658284] kasan_save_stack+0x3c/0x68 [ 19.658444] kasan_save_track+0x20/0x40 [ 19.658534] kasan_save_alloc_info+0x40/0x58 [ 19.658682] __kasan_kmalloc+0xd4/0xd8 [ 19.658725] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.659061] kasan_bitops_generic+0xa0/0x1c8 [ 19.659151] kunit_try_run_case+0x170/0x3f0 [ 19.659304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.659462] kthread+0x328/0x630 [ 19.659551] ret_from_fork+0x10/0x20 [ 19.659659] [ 19.659683] The buggy address belongs to the object at fff00000c58cac60 [ 19.659683] which belongs to the cache kmalloc-16 of size 16 [ 19.660027] The buggy address is located 8 bytes inside of [ 19.660027] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.660189] [ 19.660258] The buggy address belongs to the physical page: [ 19.660644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.660731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.661103] page_type: f5(slab) [ 19.661303] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.661378] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.661602] page dumped because: kasan: bad access detected [ 19.661824] [ 19.661924] Memory state around the buggy address: [ 19.662058] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.662220] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.662295] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.662340] ^ [ 19.662384] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.662859] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.662952] ================================================================== [ 19.675463] ================================================================== [ 19.675799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 19.675989] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.676064] [ 19.676109] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.676199] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.676233] Hardware name: linux,dummy-virt (DT) [ 19.676268] Call trace: [ 19.676309] show_stack+0x20/0x38 (C) [ 19.676367] dump_stack_lvl+0x8c/0xd0 [ 19.676419] print_report+0x118/0x608 [ 19.676470] kasan_report+0xdc/0x128 [ 19.676520] __asan_report_load8_noabort+0x20/0x30 [ 19.676575] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 19.676634] kasan_bitops_generic+0x11c/0x1c8 [ 19.676686] kunit_try_run_case+0x170/0x3f0 [ 19.676738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.676795] kthread+0x328/0x630 [ 19.676851] ret_from_fork+0x10/0x20 [ 19.676912] [ 19.676942] Allocated by task 261: [ 19.676979] kasan_save_stack+0x3c/0x68 [ 19.677024] kasan_save_track+0x20/0x40 [ 19.677073] kasan_save_alloc_info+0x40/0x58 [ 19.677136] __kasan_kmalloc+0xd4/0xd8 [ 19.677177] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.677219] kasan_bitops_generic+0xa0/0x1c8 [ 19.677259] kunit_try_run_case+0x170/0x3f0 [ 19.677300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.677347] kthread+0x328/0x630 [ 19.677382] ret_from_fork+0x10/0x20 [ 19.677421] [ 19.677452] The buggy address belongs to the object at fff00000c58cac60 [ 19.677452] which belongs to the cache kmalloc-16 of size 16 [ 19.677512] The buggy address is located 8 bytes inside of [ 19.677512] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.677577] [ 19.678421] The buggy address belongs to the physical page: [ 19.678517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.679034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.679108] page_type: f5(slab) [ 19.679465] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.679597] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.679799] page dumped because: kasan: bad access detected [ 19.679942] [ 19.680129] Memory state around the buggy address: [ 19.680403] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.680612] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.680676] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.680727] ^ [ 19.681066] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.681217] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.681329] ================================================================== [ 19.607182] ================================================================== [ 19.607238] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 19.607298] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.607351] [ 19.607384] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.607474] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.607505] Hardware name: linux,dummy-virt (DT) [ 19.607549] Call trace: [ 19.607602] show_stack+0x20/0x38 (C) [ 19.607664] dump_stack_lvl+0x8c/0xd0 [ 19.607717] print_report+0x118/0x608 [ 19.607766] kasan_report+0xdc/0x128 [ 19.607821] kasan_check_range+0x100/0x1a8 [ 19.607873] __kasan_check_write+0x20/0x30 [ 19.607921] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 19.607987] kasan_bitops_generic+0x11c/0x1c8 [ 19.608047] kunit_try_run_case+0x170/0x3f0 [ 19.608915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.608987] kthread+0x328/0x630 [ 19.609436] ret_from_fork+0x10/0x20 [ 19.609513] [ 19.609605] Allocated by task 261: [ 19.609693] kasan_save_stack+0x3c/0x68 [ 19.609850] kasan_save_track+0x20/0x40 [ 19.609929] kasan_save_alloc_info+0x40/0x58 [ 19.609981] __kasan_kmalloc+0xd4/0xd8 [ 19.610022] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.610066] kasan_bitops_generic+0xa0/0x1c8 [ 19.610297] kunit_try_run_case+0x170/0x3f0 [ 19.610718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.610911] kthread+0x328/0x630 [ 19.611152] ret_from_fork+0x10/0x20 [ 19.611315] [ 19.611422] The buggy address belongs to the object at fff00000c58cac60 [ 19.611422] which belongs to the cache kmalloc-16 of size 16 [ 19.611613] The buggy address is located 8 bytes inside of [ 19.611613] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.611772] [ 19.611830] The buggy address belongs to the physical page: [ 19.611943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.612361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.612503] page_type: f5(slab) [ 19.612707] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.612834] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.612889] page dumped because: kasan: bad access detected [ 19.613243] [ 19.613288] Memory state around the buggy address: [ 19.613336] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.613540] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.613724] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.613850] ^ [ 19.614041] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.614195] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.614311] ================================================================== [ 19.624580] ================================================================== [ 19.624695] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 19.624885] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.624989] [ 19.625024] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.625294] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.625329] Hardware name: linux,dummy-virt (DT) [ 19.625374] Call trace: [ 19.625440] show_stack+0x20/0x38 (C) [ 19.625675] dump_stack_lvl+0x8c/0xd0 [ 19.625795] print_report+0x118/0x608 [ 19.625894] kasan_report+0xdc/0x128 [ 19.626400] kasan_check_range+0x100/0x1a8 [ 19.626515] __kasan_check_write+0x20/0x30 [ 19.626709] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 19.626932] kasan_bitops_generic+0x11c/0x1c8 [ 19.627012] kunit_try_run_case+0x170/0x3f0 [ 19.627098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.627489] kthread+0x328/0x630 [ 19.627619] ret_from_fork+0x10/0x20 [ 19.627810] [ 19.627889] Allocated by task 261: [ 19.628077] kasan_save_stack+0x3c/0x68 [ 19.628206] kasan_save_track+0x20/0x40 [ 19.628526] kasan_save_alloc_info+0x40/0x58 [ 19.628638] __kasan_kmalloc+0xd4/0xd8 [ 19.628792] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.628948] kasan_bitops_generic+0xa0/0x1c8 [ 19.629044] kunit_try_run_case+0x170/0x3f0 [ 19.629229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.629294] kthread+0x328/0x630 [ 19.629599] ret_from_fork+0x10/0x20 [ 19.629754] [ 19.629966] The buggy address belongs to the object at fff00000c58cac60 [ 19.629966] which belongs to the cache kmalloc-16 of size 16 [ 19.630110] The buggy address is located 8 bytes inside of [ 19.630110] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.630559] [ 19.630607] The buggy address belongs to the physical page: [ 19.630660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.630850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.631310] page_type: f5(slab) [ 19.631561] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.631657] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.631705] page dumped because: kasan: bad access detected [ 19.631738] [ 19.631759] Memory state around the buggy address: [ 19.631797] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.631843] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.631890] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.631932] ^ [ 19.631974] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.632019] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.632115] ================================================================== [ 19.644208] ================================================================== [ 19.644312] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 19.644686] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.644848] [ 19.644893] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.645231] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.645282] Hardware name: linux,dummy-virt (DT) [ 19.645318] Call trace: [ 19.645429] show_stack+0x20/0x38 (C) [ 19.645490] dump_stack_lvl+0x8c/0xd0 [ 19.645544] print_report+0x118/0x608 [ 19.645820] kasan_report+0xdc/0x128 [ 19.645992] kasan_check_range+0x100/0x1a8 [ 19.646053] __kasan_check_write+0x20/0x30 [ 19.646233] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 19.646466] kasan_bitops_generic+0x11c/0x1c8 [ 19.646639] kunit_try_run_case+0x170/0x3f0 [ 19.647051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.647146] kthread+0x328/0x630 [ 19.647194] ret_from_fork+0x10/0x20 [ 19.647764] [ 19.647933] Allocated by task 261: [ 19.648182] kasan_save_stack+0x3c/0x68 [ 19.648332] kasan_save_track+0x20/0x40 [ 19.648401] kasan_save_alloc_info+0x40/0x58 [ 19.648584] __kasan_kmalloc+0xd4/0xd8 [ 19.648836] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.649099] kasan_bitops_generic+0xa0/0x1c8 [ 19.649315] kunit_try_run_case+0x170/0x3f0 [ 19.649471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.649523] kthread+0x328/0x630 [ 19.649883] ret_from_fork+0x10/0x20 [ 19.650110] [ 19.650138] The buggy address belongs to the object at fff00000c58cac60 [ 19.650138] which belongs to the cache kmalloc-16 of size 16 [ 19.650301] The buggy address is located 8 bytes inside of [ 19.650301] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.650468] [ 19.650530] The buggy address belongs to the physical page: [ 19.650883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.650984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.651167] page_type: f5(slab) [ 19.651217] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.651280] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.651618] page dumped because: kasan: bad access detected [ 19.651775] [ 19.651982] Memory state around the buggy address: [ 19.652047] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.652166] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.652520] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.652653] ^ [ 19.652728] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.652793] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.653061] ================================================================== [ 19.682584] ================================================================== [ 19.682637] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 19.682691] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.682745] [ 19.683045] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.683226] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.683262] Hardware name: linux,dummy-virt (DT) [ 19.683577] Call trace: [ 19.683645] show_stack+0x20/0x38 (C) [ 19.684063] dump_stack_lvl+0x8c/0xd0 [ 19.684278] print_report+0x118/0x608 [ 19.684471] kasan_report+0xdc/0x128 [ 19.684660] __asan_report_load8_noabort+0x20/0x30 [ 19.684730] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 19.685053] kasan_bitops_generic+0x11c/0x1c8 [ 19.685228] kunit_try_run_case+0x170/0x3f0 [ 19.685291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.685350] kthread+0x328/0x630 [ 19.685396] ret_from_fork+0x10/0x20 [ 19.685671] [ 19.685836] Allocated by task 261: [ 19.685908] kasan_save_stack+0x3c/0x68 [ 19.686211] kasan_save_track+0x20/0x40 [ 19.686353] kasan_save_alloc_info+0x40/0x58 [ 19.686450] __kasan_kmalloc+0xd4/0xd8 [ 19.686705] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.686962] kasan_bitops_generic+0xa0/0x1c8 [ 19.687127] kunit_try_run_case+0x170/0x3f0 [ 19.687244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.687453] kthread+0x328/0x630 [ 19.687653] ret_from_fork+0x10/0x20 [ 19.687730] [ 19.687903] The buggy address belongs to the object at fff00000c58cac60 [ 19.687903] which belongs to the cache kmalloc-16 of size 16 [ 19.688133] The buggy address is located 8 bytes inside of [ 19.688133] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.688495] [ 19.688569] The buggy address belongs to the physical page: [ 19.688682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.688752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.688856] page_type: f5(slab) [ 19.689219] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.689411] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.689488] page dumped because: kasan: bad access detected [ 19.689652] [ 19.689811] Memory state around the buggy address: [ 19.690029] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.690214] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.690352] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.690485] ^ [ 19.690556] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.690657] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.690914] ================================================================== [ 19.615490] ================================================================== [ 19.615737] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 19.615801] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.615855] [ 19.615889] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.616355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.616727] Hardware name: linux,dummy-virt (DT) [ 19.616779] Call trace: [ 19.616842] show_stack+0x20/0x38 (C) [ 19.616980] dump_stack_lvl+0x8c/0xd0 [ 19.617134] print_report+0x118/0x608 [ 19.617403] kasan_report+0xdc/0x128 [ 19.617660] __asan_report_load8_noabort+0x20/0x30 [ 19.618213] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 19.618777] kasan_bitops_generic+0x11c/0x1c8 [ 19.619038] kunit_try_run_case+0x170/0x3f0 [ 19.619258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.619320] kthread+0x328/0x630 [ 19.619563] ret_from_fork+0x10/0x20 [ 19.619826] [ 19.619927] Allocated by task 261: [ 19.620081] kasan_save_stack+0x3c/0x68 [ 19.620483] kasan_save_track+0x20/0x40 [ 19.620610] kasan_save_alloc_info+0x40/0x58 [ 19.620706] __kasan_kmalloc+0xd4/0xd8 [ 19.620975] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.621255] kasan_bitops_generic+0xa0/0x1c8 [ 19.621455] kunit_try_run_case+0x170/0x3f0 [ 19.621615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.621733] kthread+0x328/0x630 [ 19.621818] ret_from_fork+0x10/0x20 [ 19.621911] [ 19.621935] The buggy address belongs to the object at fff00000c58cac60 [ 19.621935] which belongs to the cache kmalloc-16 of size 16 [ 19.621999] The buggy address is located 8 bytes inside of [ 19.621999] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.622067] [ 19.622098] The buggy address belongs to the physical page: [ 19.622155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.622212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.622281] page_type: f5(slab) [ 19.622330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.622384] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.622438] page dumped because: kasan: bad access detected [ 19.622481] [ 19.622501] Memory state around the buggy address: [ 19.622535] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.622597] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.622643] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.622684] ^ [ 19.622726] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.622770] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.622819] ================================================================== [ 19.633620] ================================================================== [ 19.633824] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 19.634143] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261 [ 19.634304] [ 19.634389] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 19.634743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.634782] Hardware name: linux,dummy-virt (DT) [ 19.634968] Call trace: [ 19.635110] show_stack+0x20/0x38 (C) [ 19.635259] dump_stack_lvl+0x8c/0xd0 [ 19.635371] print_report+0x118/0x608 [ 19.635726] kasan_report+0xdc/0x128 [ 19.635876] __asan_report_load8_noabort+0x20/0x30 [ 19.636550] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 19.636649] kasan_bitops_generic+0x11c/0x1c8 [ 19.636796] kunit_try_run_case+0x170/0x3f0 [ 19.637038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.637310] kthread+0x328/0x630 [ 19.637423] ret_from_fork+0x10/0x20 [ 19.637745] [ 19.637996] Allocated by task 261: [ 19.638045] kasan_save_stack+0x3c/0x68 [ 19.638111] kasan_save_track+0x20/0x40 [ 19.638492] kasan_save_alloc_info+0x40/0x58 [ 19.638629] __kasan_kmalloc+0xd4/0xd8 [ 19.638684] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.638877] kasan_bitops_generic+0xa0/0x1c8 [ 19.639122] kunit_try_run_case+0x170/0x3f0 [ 19.639181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.639514] kthread+0x328/0x630 [ 19.639620] ret_from_fork+0x10/0x20 [ 19.639818] [ 19.639858] The buggy address belongs to the object at fff00000c58cac60 [ 19.639858] which belongs to the cache kmalloc-16 of size 16 [ 19.640155] The buggy address is located 8 bytes inside of [ 19.640155] allocated 9-byte region [fff00000c58cac60, fff00000c58cac69) [ 19.640238] [ 19.640589] The buggy address belongs to the physical page: [ 19.640637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca [ 19.640699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.640914] page_type: f5(slab) [ 19.641305] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.641742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.641903] page dumped because: kasan: bad access detected [ 19.641941] [ 19.641961] Memory state around the buggy address: [ 19.642126] fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 19.642339] fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.642388] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 19.642466] ^ [ 19.642520] fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.642566] fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.642606] ==================================================================
[ 14.982383] ================================================================== [ 14.982709] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.983487] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 14.984124] [ 14.984375] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.984425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.984438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.984459] Call Trace: [ 14.984473] <TASK> [ 14.984526] dump_stack_lvl+0x73/0xb0 [ 14.984559] print_report+0xd1/0x650 [ 14.984581] ? __virt_addr_valid+0x1db/0x2d0 [ 14.984616] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.984644] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.984667] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.984696] kasan_report+0x141/0x180 [ 14.984719] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.984752] kasan_check_range+0x10c/0x1c0 [ 14.984785] __kasan_check_write+0x18/0x20 [ 14.984805] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.984833] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.984863] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.984887] ? trace_hardirqs_on+0x37/0xe0 [ 14.984910] ? kasan_bitops_generic+0x92/0x1c0 [ 14.984937] kasan_bitops_generic+0x121/0x1c0 [ 14.984962] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.984987] ? __pfx_read_tsc+0x10/0x10 [ 14.985007] ? ktime_get_ts64+0x86/0x230 [ 14.985032] kunit_try_run_case+0x1a5/0x480 [ 14.985055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.985078] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.985101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.985125] ? __kthread_parkme+0x82/0x180 [ 14.985145] ? preempt_count_sub+0x50/0x80 [ 14.985169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.985193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.985217] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.985241] kthread+0x337/0x6f0 [ 14.985261] ? trace_preempt_on+0x20/0xc0 [ 14.985283] ? __pfx_kthread+0x10/0x10 [ 14.985302] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.985324] ? calculate_sigpending+0x7b/0xa0 [ 14.985348] ? __pfx_kthread+0x10/0x10 [ 14.985369] ret_from_fork+0x116/0x1d0 [ 14.985387] ? __pfx_kthread+0x10/0x10 [ 14.985406] ret_from_fork_asm+0x1a/0x30 [ 14.985437] </TASK> [ 14.985446] [ 14.996760] Allocated by task 278: [ 14.996915] kasan_save_stack+0x45/0x70 [ 14.997137] kasan_save_track+0x18/0x40 [ 14.997342] kasan_save_alloc_info+0x3b/0x50 [ 14.997559] __kasan_kmalloc+0xb7/0xc0 [ 14.997733] __kmalloc_cache_noprof+0x189/0x420 [ 14.998024] kasan_bitops_generic+0x92/0x1c0 [ 14.998174] kunit_try_run_case+0x1a5/0x480 [ 14.998372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.998643] kthread+0x337/0x6f0 [ 14.999249] ret_from_fork+0x116/0x1d0 [ 14.999398] ret_from_fork_asm+0x1a/0x30 [ 14.999540] [ 14.999624] The buggy address belongs to the object at ffff888102434620 [ 14.999624] which belongs to the cache kmalloc-16 of size 16 [ 15.000072] The buggy address is located 8 bytes inside of [ 15.000072] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 15.002068] [ 15.002154] The buggy address belongs to the physical page: [ 15.002333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 15.002580] flags: 0x200000000000000(node=0|zone=2) [ 15.003933] page_type: f5(slab) [ 15.004523] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.005188] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.006149] page dumped because: kasan: bad access detected [ 15.006372] [ 15.006445] Memory state around the buggy address: [ 15.006614] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 15.006844] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.007062] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.007274] ^ [ 15.007422] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.008335] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.009087] ================================================================== [ 14.929035] ================================================================== [ 14.929380] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.929949] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 14.930229] [ 14.930312] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.930354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.930366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.930386] Call Trace: [ 14.930403] <TASK> [ 14.930418] dump_stack_lvl+0x73/0xb0 [ 14.930444] print_report+0xd1/0x650 [ 14.930465] ? __virt_addr_valid+0x1db/0x2d0 [ 14.930486] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.930537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.930561] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.930590] kasan_report+0x141/0x180 [ 14.930620] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.930657] kasan_check_range+0x10c/0x1c0 [ 14.930679] __kasan_check_write+0x18/0x20 [ 14.930699] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.930728] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.930757] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.930814] ? trace_hardirqs_on+0x37/0xe0 [ 14.930843] ? kasan_bitops_generic+0x92/0x1c0 [ 14.930870] kasan_bitops_generic+0x121/0x1c0 [ 14.930894] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.930919] ? __pfx_read_tsc+0x10/0x10 [ 14.930941] ? ktime_get_ts64+0x86/0x230 [ 14.930965] kunit_try_run_case+0x1a5/0x480 [ 14.930989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.931011] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.931035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.931059] ? __kthread_parkme+0x82/0x180 [ 14.931078] ? preempt_count_sub+0x50/0x80 [ 14.931104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.931130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.931163] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.931189] kthread+0x337/0x6f0 [ 14.931208] ? trace_preempt_on+0x20/0xc0 [ 14.931229] ? __pfx_kthread+0x10/0x10 [ 14.931249] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.931270] ? calculate_sigpending+0x7b/0xa0 [ 14.931295] ? __pfx_kthread+0x10/0x10 [ 14.931316] ret_from_fork+0x116/0x1d0 [ 14.931333] ? __pfx_kthread+0x10/0x10 [ 14.931354] ret_from_fork_asm+0x1a/0x30 [ 14.931384] </TASK> [ 14.931394] [ 14.943539] Allocated by task 278: [ 14.944310] kasan_save_stack+0x45/0x70 [ 14.944644] kasan_save_track+0x18/0x40 [ 14.945106] kasan_save_alloc_info+0x3b/0x50 [ 14.945480] __kasan_kmalloc+0xb7/0xc0 [ 14.945680] __kmalloc_cache_noprof+0x189/0x420 [ 14.946322] kasan_bitops_generic+0x92/0x1c0 [ 14.946727] kunit_try_run_case+0x1a5/0x480 [ 14.947190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.947674] kthread+0x337/0x6f0 [ 14.948113] ret_from_fork+0x116/0x1d0 [ 14.948359] ret_from_fork_asm+0x1a/0x30 [ 14.948673] [ 14.948911] The buggy address belongs to the object at ffff888102434620 [ 14.948911] which belongs to the cache kmalloc-16 of size 16 [ 14.949590] The buggy address is located 8 bytes inside of [ 14.949590] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 14.950629] [ 14.950734] The buggy address belongs to the physical page: [ 14.951272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 14.951754] flags: 0x200000000000000(node=0|zone=2) [ 14.952190] page_type: f5(slab) [ 14.952364] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.952684] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.953300] page dumped because: kasan: bad access detected [ 14.953790] [ 14.953873] Memory state around the buggy address: [ 14.954266] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 14.954565] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.954841] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.955124] ^ [ 14.955333] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.955682] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.955979] ================================================================== [ 15.115095] ================================================================== [ 15.115388] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.115792] Read of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 15.116176] [ 15.116293] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.116337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.116348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.116369] Call Trace: [ 15.116387] <TASK> [ 15.116405] dump_stack_lvl+0x73/0xb0 [ 15.116432] print_report+0xd1/0x650 [ 15.116453] ? __virt_addr_valid+0x1db/0x2d0 [ 15.116476] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.116505] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.116528] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.116557] kasan_report+0x141/0x180 [ 15.116578] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.116625] __asan_report_load8_noabort+0x18/0x20 [ 15.116671] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.116715] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.116745] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.116770] ? trace_hardirqs_on+0x37/0xe0 [ 15.116819] ? kasan_bitops_generic+0x92/0x1c0 [ 15.116860] kasan_bitops_generic+0x121/0x1c0 [ 15.116896] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.116935] ? __pfx_read_tsc+0x10/0x10 [ 15.116970] ? ktime_get_ts64+0x86/0x230 [ 15.117008] kunit_try_run_case+0x1a5/0x480 [ 15.117044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.117080] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.117131] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.117168] ? __kthread_parkme+0x82/0x180 [ 15.117202] ? preempt_count_sub+0x50/0x80 [ 15.117253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.117290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.117341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.117379] kthread+0x337/0x6f0 [ 15.117411] ? trace_preempt_on+0x20/0xc0 [ 15.117459] ? __pfx_kthread+0x10/0x10 [ 15.117492] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.117514] ? calculate_sigpending+0x7b/0xa0 [ 15.117552] ? __pfx_kthread+0x10/0x10 [ 15.117587] ret_from_fork+0x116/0x1d0 [ 15.117615] ? __pfx_kthread+0x10/0x10 [ 15.117636] ret_from_fork_asm+0x1a/0x30 [ 15.117667] </TASK> [ 15.117678] [ 15.126324] Allocated by task 278: [ 15.126519] kasan_save_stack+0x45/0x70 [ 15.126754] kasan_save_track+0x18/0x40 [ 15.126960] kasan_save_alloc_info+0x3b/0x50 [ 15.127174] __kasan_kmalloc+0xb7/0xc0 [ 15.127372] __kmalloc_cache_noprof+0x189/0x420 [ 15.127572] kasan_bitops_generic+0x92/0x1c0 [ 15.127732] kunit_try_run_case+0x1a5/0x480 [ 15.127988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.128425] kthread+0x337/0x6f0 [ 15.128584] ret_from_fork+0x116/0x1d0 [ 15.128745] ret_from_fork_asm+0x1a/0x30 [ 15.128894] [ 15.128994] The buggy address belongs to the object at ffff888102434620 [ 15.128994] which belongs to the cache kmalloc-16 of size 16 [ 15.129558] The buggy address is located 8 bytes inside of [ 15.129558] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 15.130141] [ 15.130238] The buggy address belongs to the physical page: [ 15.130482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 15.130734] flags: 0x200000000000000(node=0|zone=2) [ 15.130901] page_type: f5(slab) [ 15.131083] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.131473] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.131850] page dumped because: kasan: bad access detected [ 15.132156] [ 15.132247] Memory state around the buggy address: [ 15.132401] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 15.132721] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.133080] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.133379] ^ [ 15.133582] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.133846] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.134184] ================================================================== [ 15.010300] ================================================================== [ 15.010751] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.011170] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 15.011919] [ 15.012101] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.012147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.012159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.012180] Call Trace: [ 15.012199] <TASK> [ 15.012217] dump_stack_lvl+0x73/0xb0 [ 15.012247] print_report+0xd1/0x650 [ 15.012270] ? __virt_addr_valid+0x1db/0x2d0 [ 15.012295] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.012323] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.012346] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.012387] kasan_report+0x141/0x180 [ 15.012407] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.012441] kasan_check_range+0x10c/0x1c0 [ 15.012464] __kasan_check_write+0x18/0x20 [ 15.012483] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.012512] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.012543] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.012569] ? trace_hardirqs_on+0x37/0xe0 [ 15.012604] ? kasan_bitops_generic+0x92/0x1c0 [ 15.012639] kasan_bitops_generic+0x121/0x1c0 [ 15.012662] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.012688] ? __pfx_read_tsc+0x10/0x10 [ 15.012709] ? ktime_get_ts64+0x86/0x230 [ 15.012734] kunit_try_run_case+0x1a5/0x480 [ 15.012757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.012791] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.012815] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.012838] ? __kthread_parkme+0x82/0x180 [ 15.012859] ? preempt_count_sub+0x50/0x80 [ 15.012884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.012908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.012933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.012958] kthread+0x337/0x6f0 [ 15.012976] ? trace_preempt_on+0x20/0xc0 [ 15.012998] ? __pfx_kthread+0x10/0x10 [ 15.013018] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.013039] ? calculate_sigpending+0x7b/0xa0 [ 15.013064] ? __pfx_kthread+0x10/0x10 [ 15.013085] ret_from_fork+0x116/0x1d0 [ 15.013103] ? __pfx_kthread+0x10/0x10 [ 15.013123] ret_from_fork_asm+0x1a/0x30 [ 15.013154] </TASK> [ 15.013164] [ 15.027436] Allocated by task 278: [ 15.027764] kasan_save_stack+0x45/0x70 [ 15.028176] kasan_save_track+0x18/0x40 [ 15.028533] kasan_save_alloc_info+0x3b/0x50 [ 15.028957] __kasan_kmalloc+0xb7/0xc0 [ 15.029356] __kmalloc_cache_noprof+0x189/0x420 [ 15.029765] kasan_bitops_generic+0x92/0x1c0 [ 15.030148] kunit_try_run_case+0x1a5/0x480 [ 15.030522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.031038] kthread+0x337/0x6f0 [ 15.031352] ret_from_fork+0x116/0x1d0 [ 15.031530] ret_from_fork_asm+0x1a/0x30 [ 15.031686] [ 15.031759] The buggy address belongs to the object at ffff888102434620 [ 15.031759] which belongs to the cache kmalloc-16 of size 16 [ 15.032119] The buggy address is located 8 bytes inside of [ 15.032119] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 15.032472] [ 15.032543] The buggy address belongs to the physical page: [ 15.032744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 15.033126] flags: 0x200000000000000(node=0|zone=2) [ 15.033292] page_type: f5(slab) [ 15.033411] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.033789] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.034079] page dumped because: kasan: bad access detected [ 15.034285] [ 15.034379] Memory state around the buggy address: [ 15.034618] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 15.035141] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.035419] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.035679] ^ [ 15.036033] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.036312] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.036566] ================================================================== [ 15.037181] ================================================================== [ 15.037869] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.038240] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 15.038524] [ 15.038621] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.038664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.038676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.038697] Call Trace: [ 15.038712] <TASK> [ 15.038730] dump_stack_lvl+0x73/0xb0 [ 15.038757] print_report+0xd1/0x650 [ 15.038778] ? __virt_addr_valid+0x1db/0x2d0 [ 15.038811] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.038843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.038866] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.038894] kasan_report+0x141/0x180 [ 15.038916] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.038949] kasan_check_range+0x10c/0x1c0 [ 15.038973] __kasan_check_write+0x18/0x20 [ 15.038993] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.039022] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.039051] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.039075] ? trace_hardirqs_on+0x37/0xe0 [ 15.039097] ? kasan_bitops_generic+0x92/0x1c0 [ 15.039124] kasan_bitops_generic+0x121/0x1c0 [ 15.039148] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.039174] ? __pfx_read_tsc+0x10/0x10 [ 15.039194] ? ktime_get_ts64+0x86/0x230 [ 15.039218] kunit_try_run_case+0x1a5/0x480 [ 15.039241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.039264] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.039288] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.039312] ? __kthread_parkme+0x82/0x180 [ 15.039332] ? preempt_count_sub+0x50/0x80 [ 15.039356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.039380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.039404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.039429] kthread+0x337/0x6f0 [ 15.039447] ? trace_preempt_on+0x20/0xc0 [ 15.039469] ? __pfx_kthread+0x10/0x10 [ 15.039489] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.039510] ? calculate_sigpending+0x7b/0xa0 [ 15.039534] ? __pfx_kthread+0x10/0x10 [ 15.039556] ret_from_fork+0x116/0x1d0 [ 15.039574] ? __pfx_kthread+0x10/0x10 [ 15.039604] ret_from_fork_asm+0x1a/0x30 [ 15.039634] </TASK> [ 15.039643] [ 15.047547] Allocated by task 278: [ 15.047689] kasan_save_stack+0x45/0x70 [ 15.047972] kasan_save_track+0x18/0x40 [ 15.048170] kasan_save_alloc_info+0x3b/0x50 [ 15.048388] __kasan_kmalloc+0xb7/0xc0 [ 15.048576] __kmalloc_cache_noprof+0x189/0x420 [ 15.048834] kasan_bitops_generic+0x92/0x1c0 [ 15.049021] kunit_try_run_case+0x1a5/0x480 [ 15.049191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.049367] kthread+0x337/0x6f0 [ 15.049487] ret_from_fork+0x116/0x1d0 [ 15.049629] ret_from_fork_asm+0x1a/0x30 [ 15.049822] [ 15.049913] The buggy address belongs to the object at ffff888102434620 [ 15.049913] which belongs to the cache kmalloc-16 of size 16 [ 15.050440] The buggy address is located 8 bytes inside of [ 15.050440] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 15.051091] [ 15.051163] The buggy address belongs to the physical page: [ 15.051334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 15.051572] flags: 0x200000000000000(node=0|zone=2) [ 15.051852] page_type: f5(slab) [ 15.052024] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.052365] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.052716] page dumped because: kasan: bad access detected [ 15.053138] [ 15.053209] Memory state around the buggy address: [ 15.053409] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 15.053679] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.054107] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.054320] ^ [ 15.054519] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.054873] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.055214] ================================================================== [ 15.074609] ================================================================== [ 15.075017] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.075423] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 15.075751] [ 15.075929] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.075994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.076019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.076052] Call Trace: [ 15.076068] <TASK> [ 15.076098] dump_stack_lvl+0x73/0xb0 [ 15.076151] print_report+0xd1/0x650 [ 15.076186] ? __virt_addr_valid+0x1db/0x2d0 [ 15.076223] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.076252] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.076302] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.076344] kasan_report+0x141/0x180 [ 15.076366] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.076399] kasan_check_range+0x10c/0x1c0 [ 15.076424] __kasan_check_write+0x18/0x20 [ 15.076443] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.076472] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.076503] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.076527] ? trace_hardirqs_on+0x37/0xe0 [ 15.076551] ? kasan_bitops_generic+0x92/0x1c0 [ 15.076577] kasan_bitops_generic+0x121/0x1c0 [ 15.076611] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.076637] ? __pfx_read_tsc+0x10/0x10 [ 15.076657] ? ktime_get_ts64+0x86/0x230 [ 15.076681] kunit_try_run_case+0x1a5/0x480 [ 15.076704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.076727] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.076751] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.076774] ? __kthread_parkme+0x82/0x180 [ 15.076794] ? preempt_count_sub+0x50/0x80 [ 15.076819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.076843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.076866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.076891] kthread+0x337/0x6f0 [ 15.076910] ? trace_preempt_on+0x20/0xc0 [ 15.076932] ? __pfx_kthread+0x10/0x10 [ 15.076951] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.076973] ? calculate_sigpending+0x7b/0xa0 [ 15.076997] ? __pfx_kthread+0x10/0x10 [ 15.077018] ret_from_fork+0x116/0x1d0 [ 15.077035] ? __pfx_kthread+0x10/0x10 [ 15.077056] ret_from_fork_asm+0x1a/0x30 [ 15.077087] </TASK> [ 15.077097] [ 15.086352] Allocated by task 278: [ 15.086551] kasan_save_stack+0x45/0x70 [ 15.086754] kasan_save_track+0x18/0x40 [ 15.086954] kasan_save_alloc_info+0x3b/0x50 [ 15.087192] __kasan_kmalloc+0xb7/0xc0 [ 15.087377] __kmalloc_cache_noprof+0x189/0x420 [ 15.087575] kasan_bitops_generic+0x92/0x1c0 [ 15.087738] kunit_try_run_case+0x1a5/0x480 [ 15.088170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.088434] kthread+0x337/0x6f0 [ 15.088630] ret_from_fork+0x116/0x1d0 [ 15.088827] ret_from_fork_asm+0x1a/0x30 [ 15.088998] [ 15.089080] The buggy address belongs to the object at ffff888102434620 [ 15.089080] which belongs to the cache kmalloc-16 of size 16 [ 15.089620] The buggy address is located 8 bytes inside of [ 15.089620] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 15.090178] [ 15.090302] The buggy address belongs to the physical page: [ 15.090586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 15.090949] flags: 0x200000000000000(node=0|zone=2) [ 15.091188] page_type: f5(slab) [ 15.091486] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.091838] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.092185] page dumped because: kasan: bad access detected [ 15.092364] [ 15.092433] Memory state around the buggy address: [ 15.092588] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 15.092948] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.093290] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.093621] ^ [ 15.093920] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.094268] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.094546] ================================================================== [ 14.956522] ================================================================== [ 14.956874] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.957275] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 14.957584] [ 14.957683] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.957727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.957738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.957758] Call Trace: [ 14.957775] <TASK> [ 14.957793] dump_stack_lvl+0x73/0xb0 [ 14.957821] print_report+0xd1/0x650 [ 14.957844] ? __virt_addr_valid+0x1db/0x2d0 [ 14.957867] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.957895] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.957919] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.957948] kasan_report+0x141/0x180 [ 14.957969] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.958002] kasan_check_range+0x10c/0x1c0 [ 14.958025] __kasan_check_write+0x18/0x20 [ 14.958044] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.958072] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.958102] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.958127] ? trace_hardirqs_on+0x37/0xe0 [ 14.958150] ? kasan_bitops_generic+0x92/0x1c0 [ 14.958177] kasan_bitops_generic+0x121/0x1c0 [ 14.958201] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.958226] ? __pfx_read_tsc+0x10/0x10 [ 14.958247] ? ktime_get_ts64+0x86/0x230 [ 14.958271] kunit_try_run_case+0x1a5/0x480 [ 14.958295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.958317] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.958341] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.958364] ? __kthread_parkme+0x82/0x180 [ 14.958385] ? preempt_count_sub+0x50/0x80 [ 14.958409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.958433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.958458] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.958484] kthread+0x337/0x6f0 [ 14.958503] ? trace_preempt_on+0x20/0xc0 [ 14.958524] ? __pfx_kthread+0x10/0x10 [ 14.958545] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.958567] ? calculate_sigpending+0x7b/0xa0 [ 14.958591] ? __pfx_kthread+0x10/0x10 [ 14.958623] ret_from_fork+0x116/0x1d0 [ 14.958642] ? __pfx_kthread+0x10/0x10 [ 14.958662] ret_from_fork_asm+0x1a/0x30 [ 14.958693] </TASK> [ 14.958703] [ 14.969028] Allocated by task 278: [ 14.969166] kasan_save_stack+0x45/0x70 [ 14.969657] kasan_save_track+0x18/0x40 [ 14.970064] kasan_save_alloc_info+0x3b/0x50 [ 14.970413] __kasan_kmalloc+0xb7/0xc0 [ 14.970757] __kmalloc_cache_noprof+0x189/0x420 [ 14.971048] kasan_bitops_generic+0x92/0x1c0 [ 14.971541] kunit_try_run_case+0x1a5/0x480 [ 14.971881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.972317] kthread+0x337/0x6f0 [ 14.972717] ret_from_fork+0x116/0x1d0 [ 14.972995] ret_from_fork_asm+0x1a/0x30 [ 14.973181] [ 14.973270] The buggy address belongs to the object at ffff888102434620 [ 14.973270] which belongs to the cache kmalloc-16 of size 16 [ 14.973762] The buggy address is located 8 bytes inside of [ 14.973762] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 14.974646] [ 14.974878] The buggy address belongs to the physical page: [ 14.975328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 14.976319] flags: 0x200000000000000(node=0|zone=2) [ 14.976557] page_type: f5(slab) [ 14.976725] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.977287] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.977741] page dumped because: kasan: bad access detected [ 14.978164] [ 14.978266] Memory state around the buggy address: [ 14.978471] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 14.979018] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.979459] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.980036] ^ [ 14.980234] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.980529] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.981145] ================================================================== [ 15.055648] ================================================================== [ 15.056202] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.056673] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 15.056898] [ 15.056977] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.057018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.057030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.057051] Call Trace: [ 15.057064] <TASK> [ 15.057078] dump_stack_lvl+0x73/0xb0 [ 15.057104] print_report+0xd1/0x650 [ 15.057125] ? __virt_addr_valid+0x1db/0x2d0 [ 15.057147] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.057176] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.057201] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.057229] kasan_report+0x141/0x180 [ 15.057250] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.057283] kasan_check_range+0x10c/0x1c0 [ 15.057306] __kasan_check_write+0x18/0x20 [ 15.057326] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.057355] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.057385] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.057409] ? trace_hardirqs_on+0x37/0xe0 [ 15.057432] ? kasan_bitops_generic+0x92/0x1c0 [ 15.057459] kasan_bitops_generic+0x121/0x1c0 [ 15.057483] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.057508] ? __pfx_read_tsc+0x10/0x10 [ 15.057543] ? ktime_get_ts64+0x86/0x230 [ 15.057569] kunit_try_run_case+0x1a5/0x480 [ 15.057603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.057625] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.057649] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.057673] ? __kthread_parkme+0x82/0x180 [ 15.057692] ? preempt_count_sub+0x50/0x80 [ 15.057716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.057740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.057764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.057789] kthread+0x337/0x6f0 [ 15.057809] ? trace_preempt_on+0x20/0xc0 [ 15.057830] ? __pfx_kthread+0x10/0x10 [ 15.057850] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.057871] ? calculate_sigpending+0x7b/0xa0 [ 15.057896] ? __pfx_kthread+0x10/0x10 [ 15.057916] ret_from_fork+0x116/0x1d0 [ 15.057934] ? __pfx_kthread+0x10/0x10 [ 15.057954] ret_from_fork_asm+0x1a/0x30 [ 15.057984] </TASK> [ 15.057996] [ 15.065980] Allocated by task 278: [ 15.066164] kasan_save_stack+0x45/0x70 [ 15.066343] kasan_save_track+0x18/0x40 [ 15.066475] kasan_save_alloc_info+0x3b/0x50 [ 15.066629] __kasan_kmalloc+0xb7/0xc0 [ 15.066759] __kmalloc_cache_noprof+0x189/0x420 [ 15.066918] kasan_bitops_generic+0x92/0x1c0 [ 15.067062] kunit_try_run_case+0x1a5/0x480 [ 15.067252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.067521] kthread+0x337/0x6f0 [ 15.067710] ret_from_fork+0x116/0x1d0 [ 15.067925] ret_from_fork_asm+0x1a/0x30 [ 15.068134] [ 15.068244] The buggy address belongs to the object at ffff888102434620 [ 15.068244] which belongs to the cache kmalloc-16 of size 16 [ 15.069031] The buggy address is located 8 bytes inside of [ 15.069031] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 15.069658] [ 15.069758] The buggy address belongs to the physical page: [ 15.070019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 15.070370] flags: 0x200000000000000(node=0|zone=2) [ 15.070617] page_type: f5(slab) [ 15.070797] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.071103] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.071332] page dumped because: kasan: bad access detected [ 15.071503] [ 15.071571] Memory state around the buggy address: [ 15.071736] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 15.072007] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.072350] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.072835] ^ [ 15.073072] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.073419] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.073896] ================================================================== [ 15.095117] ================================================================== [ 15.095457] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.095882] Read of size 8 at addr ffff888102434628 by task kunit_try_catch/278 [ 15.096202] [ 15.096307] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.096366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.096377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.096396] Call Trace: [ 15.096411] <TASK> [ 15.096426] dump_stack_lvl+0x73/0xb0 [ 15.096453] print_report+0xd1/0x650 [ 15.096474] ? __virt_addr_valid+0x1db/0x2d0 [ 15.096515] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.096544] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.096567] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.096607] kasan_report+0x141/0x180 [ 15.096628] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.096661] kasan_check_range+0x10c/0x1c0 [ 15.096684] __kasan_check_read+0x15/0x20 [ 15.096703] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.096732] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.096762] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.096794] ? trace_hardirqs_on+0x37/0xe0 [ 15.096816] ? kasan_bitops_generic+0x92/0x1c0 [ 15.096861] kasan_bitops_generic+0x121/0x1c0 [ 15.096885] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.096910] ? __pfx_read_tsc+0x10/0x10 [ 15.096932] ? ktime_get_ts64+0x86/0x230 [ 15.096956] kunit_try_run_case+0x1a5/0x480 [ 15.096980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.097003] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.097043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.097068] ? __kthread_parkme+0x82/0x180 [ 15.097087] ? preempt_count_sub+0x50/0x80 [ 15.097110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.097134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.097159] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.097184] kthread+0x337/0x6f0 [ 15.097203] ? trace_preempt_on+0x20/0xc0 [ 15.097241] ? __pfx_kthread+0x10/0x10 [ 15.097262] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.097283] ? calculate_sigpending+0x7b/0xa0 [ 15.097324] ? __pfx_kthread+0x10/0x10 [ 15.097345] ret_from_fork+0x116/0x1d0 [ 15.097363] ? __pfx_kthread+0x10/0x10 [ 15.097384] ret_from_fork_asm+0x1a/0x30 [ 15.097414] </TASK> [ 15.097424] [ 15.106153] Allocated by task 278: [ 15.106327] kasan_save_stack+0x45/0x70 [ 15.106526] kasan_save_track+0x18/0x40 [ 15.106732] kasan_save_alloc_info+0x3b/0x50 [ 15.107007] __kasan_kmalloc+0xb7/0xc0 [ 15.107160] __kmalloc_cache_noprof+0x189/0x420 [ 15.107381] kasan_bitops_generic+0x92/0x1c0 [ 15.107604] kunit_try_run_case+0x1a5/0x480 [ 15.107826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.108142] kthread+0x337/0x6f0 [ 15.108358] ret_from_fork+0x116/0x1d0 [ 15.108574] ret_from_fork_asm+0x1a/0x30 [ 15.108762] [ 15.108854] The buggy address belongs to the object at ffff888102434620 [ 15.108854] which belongs to the cache kmalloc-16 of size 16 [ 15.109395] The buggy address is located 8 bytes inside of [ 15.109395] allocated 9-byte region [ffff888102434620, ffff888102434629) [ 15.109874] [ 15.109970] The buggy address belongs to the physical page: [ 15.110188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434 [ 15.110433] flags: 0x200000000000000(node=0|zone=2) [ 15.110608] page_type: f5(slab) [ 15.110728] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.111400] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.111783] page dumped because: kasan: bad access detected [ 15.112059] [ 15.112174] Memory state around the buggy address: [ 15.112423] ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 15.112718] ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.113216] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.113538] ^ [ 15.113707] ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.113932] ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.114274] ==================================================================