Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.488322] ================================================================== [ 19.488656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 19.488740] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261 [ 19.488793] [ 19.488833] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.488934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.488964] Hardware name: linux,dummy-virt (DT) [ 19.488998] Call trace: [ 19.489024] show_stack+0x20/0x38 (C) [ 19.489077] dump_stack_lvl+0x8c/0xd0 [ 19.489155] print_report+0x118/0x5d0 [ 19.489206] kasan_report+0xdc/0x128 [ 19.489258] kasan_check_range+0x100/0x1a8 [ 19.489309] __kasan_check_write+0x20/0x30 [ 19.489356] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 19.489413] kasan_bitops_generic+0x11c/0x1c8 [ 19.489461] kunit_try_run_case+0x170/0x3f0 [ 19.489518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.489571] kthread+0x328/0x630 [ 19.489617] ret_from_fork+0x10/0x20 [ 19.489667] [ 19.489688] Allocated by task 261: [ 19.489719] kasan_save_stack+0x3c/0x68 [ 19.489762] kasan_save_track+0x20/0x40 [ 19.489802] kasan_save_alloc_info+0x40/0x58 [ 19.490210] __kasan_kmalloc+0xd4/0xd8 [ 19.490264] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.490307] kasan_bitops_generic+0xa0/0x1c8 [ 19.490349] kunit_try_run_case+0x170/0x3f0 [ 19.490776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.490859] kthread+0x328/0x630 [ 19.491162] ret_from_fork+0x10/0x20 [ 19.491331] [ 19.491481] The buggy address belongs to the object at fff00000c3eb9280 [ 19.491481] which belongs to the cache kmalloc-16 of size 16 [ 19.491865] The buggy address is located 8 bytes inside of [ 19.491865] allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289) [ 19.492081] [ 19.493174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.493288] page_type: f5(slab) [ 19.493383] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.493753] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.494817] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.497712] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 19.498297] Call trace: [ 19.500825] kthread+0x328/0x630 [ 19.503801] [ 19.504923] page_type: f5(slab) [ 19.505226] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.506146] fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.506662] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.506873] ==================================================================
[ 14.318874] ================================================================== [ 14.319108] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.319832] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.320388] [ 14.320540] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.320596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.320607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.320627] Call Trace: [ 14.320640] <TASK> [ 14.320654] dump_stack_lvl+0x73/0xb0 [ 14.320683] print_report+0xd1/0x610 [ 14.320704] ? __virt_addr_valid+0x1db/0x2d0 [ 14.320726] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.320754] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.320777] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.320805] kasan_report+0x141/0x180 [ 14.320848] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.320892] kasan_check_range+0x10c/0x1c0 [ 14.320916] __kasan_check_write+0x18/0x20 [ 14.320947] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.320977] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.321033] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.321058] ? trace_hardirqs_on+0x37/0xe0 [ 14.321080] ? kasan_bitops_generic+0x92/0x1c0 [ 14.321119] kasan_bitops_generic+0x121/0x1c0 [ 14.321146] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.321172] ? __pfx_read_tsc+0x10/0x10 [ 14.321218] ? ktime_get_ts64+0x86/0x230 [ 14.321242] kunit_try_run_case+0x1a5/0x480 [ 14.321266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.321299] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.321323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.321347] ? __kthread_parkme+0x82/0x180 [ 14.321390] ? preempt_count_sub+0x50/0x80 [ 14.321415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.321453] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.321478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.321502] kthread+0x337/0x6f0 [ 14.321521] ? trace_preempt_on+0x20/0xc0 [ 14.321551] ? __pfx_kthread+0x10/0x10 [ 14.321599] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.321620] ? calculate_sigpending+0x7b/0xa0 [ 14.321645] ? __pfx_kthread+0x10/0x10 [ 14.321677] ret_from_fork+0x116/0x1d0 [ 14.321695] ? __pfx_kthread+0x10/0x10 [ 14.321715] ret_from_fork_asm+0x1a/0x30 [ 14.321775] </TASK> [ 14.321785] [ 14.331482] Allocated by task 279: [ 14.331822] kasan_save_stack+0x45/0x70 [ 14.332175] kasan_save_track+0x18/0x40 [ 14.332538] kasan_save_alloc_info+0x3b/0x50 [ 14.332906] __kasan_kmalloc+0xb7/0xc0 [ 14.333258] __kmalloc_cache_noprof+0x189/0x420 [ 14.333858] kasan_bitops_generic+0x92/0x1c0 [ 14.334263] kunit_try_run_case+0x1a5/0x480 [ 14.334669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.335058] kthread+0x337/0x6f0 [ 14.335182] ret_from_fork+0x116/0x1d0 [ 14.335315] ret_from_fork_asm+0x1a/0x30 [ 14.335462] [ 14.335566] The buggy address belongs to the object at ffff888101684300 [ 14.335566] which belongs to the cache kmalloc-16 of size 16 [ 14.336771] The buggy address is located 8 bytes inside of [ 14.336771] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.337873] [ 14.338044] The buggy address belongs to the physical page: [ 14.338565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.338990] flags: 0x200000000000000(node=0|zone=2) [ 14.339158] page_type: f5(slab) [ 14.339285] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.339710] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.340364] page dumped because: kasan: bad access detected [ 14.340884] [ 14.341056] Memory state around the buggy address: [ 14.341495] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.342130] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.342766] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.343163] ^ [ 14.343287] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.343512] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.344139] ================================================================== [ 14.278467] ================================================================== [ 14.279059] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.279483] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.279825] [ 14.279954] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.280004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.280028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.280047] Call Trace: [ 14.280060] <TASK> [ 14.280074] dump_stack_lvl+0x73/0xb0 [ 14.280101] print_report+0xd1/0x610 [ 14.280122] ? __virt_addr_valid+0x1db/0x2d0 [ 14.280144] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.280172] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.280194] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.280223] kasan_report+0x141/0x180 [ 14.280246] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.280280] kasan_check_range+0x10c/0x1c0 [ 14.280303] __kasan_check_write+0x18/0x20 [ 14.280322] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.280351] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.280380] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.280404] ? trace_hardirqs_on+0x37/0xe0 [ 14.280426] ? kasan_bitops_generic+0x92/0x1c0 [ 14.280464] kasan_bitops_generic+0x121/0x1c0 [ 14.280489] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.280514] ? __pfx_read_tsc+0x10/0x10 [ 14.280534] ? ktime_get_ts64+0x86/0x230 [ 14.280558] kunit_try_run_case+0x1a5/0x480 [ 14.280581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.280604] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.280642] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.280666] ? __kthread_parkme+0x82/0x180 [ 14.280687] ? preempt_count_sub+0x50/0x80 [ 14.280710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.280734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.280758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.280800] kthread+0x337/0x6f0 [ 14.280819] ? trace_preempt_on+0x20/0xc0 [ 14.280841] ? __pfx_kthread+0x10/0x10 [ 14.280862] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.280883] ? calculate_sigpending+0x7b/0xa0 [ 14.280907] ? __pfx_kthread+0x10/0x10 [ 14.280928] ret_from_fork+0x116/0x1d0 [ 14.280946] ? __pfx_kthread+0x10/0x10 [ 14.280966] ret_from_fork_asm+0x1a/0x30 [ 14.280999] </TASK> [ 14.281008] [ 14.289542] Allocated by task 279: [ 14.289763] kasan_save_stack+0x45/0x70 [ 14.289968] kasan_save_track+0x18/0x40 [ 14.290148] kasan_save_alloc_info+0x3b/0x50 [ 14.290371] __kasan_kmalloc+0xb7/0xc0 [ 14.290542] __kmalloc_cache_noprof+0x189/0x420 [ 14.290865] kasan_bitops_generic+0x92/0x1c0 [ 14.291110] kunit_try_run_case+0x1a5/0x480 [ 14.291380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.291637] kthread+0x337/0x6f0 [ 14.291800] ret_from_fork+0x116/0x1d0 [ 14.291982] ret_from_fork_asm+0x1a/0x30 [ 14.292172] [ 14.292263] The buggy address belongs to the object at ffff888101684300 [ 14.292263] which belongs to the cache kmalloc-16 of size 16 [ 14.292787] The buggy address is located 8 bytes inside of [ 14.292787] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.293300] [ 14.293392] The buggy address belongs to the physical page: [ 14.293589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.293818] flags: 0x200000000000000(node=0|zone=2) [ 14.293975] page_type: f5(slab) [ 14.294090] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.294314] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.294798] page dumped because: kasan: bad access detected [ 14.295048] [ 14.295142] Memory state around the buggy address: [ 14.295415] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.296118] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.296459] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.297114] ^ [ 14.297327] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.297803] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.298012] ================================================================== [ 14.389029] ================================================================== [ 14.389921] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.390296] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.390651] [ 14.390734] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.390775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.390786] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.390806] Call Trace: [ 14.390818] <TASK> [ 14.390831] dump_stack_lvl+0x73/0xb0 [ 14.390857] print_report+0xd1/0x610 [ 14.390878] ? __virt_addr_valid+0x1db/0x2d0 [ 14.390901] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.390929] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.390964] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.390994] kasan_report+0x141/0x180 [ 14.391019] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.391054] kasan_check_range+0x10c/0x1c0 [ 14.391078] __kasan_check_write+0x18/0x20 [ 14.391099] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.391138] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.391168] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.391192] ? trace_hardirqs_on+0x37/0xe0 [ 14.391225] ? kasan_bitops_generic+0x92/0x1c0 [ 14.391253] kasan_bitops_generic+0x121/0x1c0 [ 14.391276] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.391301] ? __pfx_read_tsc+0x10/0x10 [ 14.391321] ? ktime_get_ts64+0x86/0x230 [ 14.391345] kunit_try_run_case+0x1a5/0x480 [ 14.391368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.391390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.391414] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.391447] ? __kthread_parkme+0x82/0x180 [ 14.391467] ? preempt_count_sub+0x50/0x80 [ 14.391490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.391515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.391548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.391582] kthread+0x337/0x6f0 [ 14.391601] ? trace_preempt_on+0x20/0xc0 [ 14.391624] ? __pfx_kthread+0x10/0x10 [ 14.391654] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.391675] ? calculate_sigpending+0x7b/0xa0 [ 14.391699] ? __pfx_kthread+0x10/0x10 [ 14.391721] ret_from_fork+0x116/0x1d0 [ 14.391739] ? __pfx_kthread+0x10/0x10 [ 14.391759] ret_from_fork_asm+0x1a/0x30 [ 14.391791] </TASK> [ 14.391800] [ 14.403263] Allocated by task 279: [ 14.403472] kasan_save_stack+0x45/0x70 [ 14.403706] kasan_save_track+0x18/0x40 [ 14.403905] kasan_save_alloc_info+0x3b/0x50 [ 14.404126] __kasan_kmalloc+0xb7/0xc0 [ 14.404276] __kmalloc_cache_noprof+0x189/0x420 [ 14.404444] kasan_bitops_generic+0x92/0x1c0 [ 14.404590] kunit_try_run_case+0x1a5/0x480 [ 14.404792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.405039] kthread+0x337/0x6f0 [ 14.405249] ret_from_fork+0x116/0x1d0 [ 14.405445] ret_from_fork_asm+0x1a/0x30 [ 14.405649] [ 14.405719] The buggy address belongs to the object at ffff888101684300 [ 14.405719] which belongs to the cache kmalloc-16 of size 16 [ 14.406177] The buggy address is located 8 bytes inside of [ 14.406177] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.406737] [ 14.406847] The buggy address belongs to the physical page: [ 14.407077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.407386] flags: 0x200000000000000(node=0|zone=2) [ 14.407687] page_type: f5(slab) [ 14.407840] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.408165] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.408423] page dumped because: kasan: bad access detected [ 14.408601] [ 14.408670] Memory state around the buggy address: [ 14.408825] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.409166] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.409488] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.409804] ^ [ 14.410042] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.410260] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.410938] ================================================================== [ 14.430780] ================================================================== [ 14.431142] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.431791] Read of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.432125] [ 14.432211] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.432252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.432263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.432284] Call Trace: [ 14.432298] <TASK> [ 14.432313] dump_stack_lvl+0x73/0xb0 [ 14.432339] print_report+0xd1/0x610 [ 14.432359] ? __virt_addr_valid+0x1db/0x2d0 [ 14.432381] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.432408] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.432432] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.432470] kasan_report+0x141/0x180 [ 14.432491] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.432526] __asan_report_load8_noabort+0x18/0x20 [ 14.432560] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.432588] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.432617] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.432640] ? trace_hardirqs_on+0x37/0xe0 [ 14.432662] ? kasan_bitops_generic+0x92/0x1c0 [ 14.432690] kasan_bitops_generic+0x121/0x1c0 [ 14.432713] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.432738] ? __pfx_read_tsc+0x10/0x10 [ 14.432759] ? ktime_get_ts64+0x86/0x230 [ 14.432783] kunit_try_run_case+0x1a5/0x480 [ 14.432806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.432828] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.432851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.432885] ? __kthread_parkme+0x82/0x180 [ 14.432905] ? preempt_count_sub+0x50/0x80 [ 14.432929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.432964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.432987] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.433011] kthread+0x337/0x6f0 [ 14.433029] ? trace_preempt_on+0x20/0xc0 [ 14.433051] ? __pfx_kthread+0x10/0x10 [ 14.433071] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.433101] ? calculate_sigpending+0x7b/0xa0 [ 14.433125] ? __pfx_kthread+0x10/0x10 [ 14.433151] ret_from_fork+0x116/0x1d0 [ 14.433180] ? __pfx_kthread+0x10/0x10 [ 14.433201] ret_from_fork_asm+0x1a/0x30 [ 14.433233] </TASK> [ 14.433241] [ 14.441387] Allocated by task 279: [ 14.441585] kasan_save_stack+0x45/0x70 [ 14.441739] kasan_save_track+0x18/0x40 [ 14.441946] kasan_save_alloc_info+0x3b/0x50 [ 14.442139] __kasan_kmalloc+0xb7/0xc0 [ 14.442322] __kmalloc_cache_noprof+0x189/0x420 [ 14.442556] kasan_bitops_generic+0x92/0x1c0 [ 14.442766] kunit_try_run_case+0x1a5/0x480 [ 14.442988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.443168] kthread+0x337/0x6f0 [ 14.443288] ret_from_fork+0x116/0x1d0 [ 14.443420] ret_from_fork_asm+0x1a/0x30 [ 14.443568] [ 14.443638] The buggy address belongs to the object at ffff888101684300 [ 14.443638] which belongs to the cache kmalloc-16 of size 16 [ 14.443991] The buggy address is located 8 bytes inside of [ 14.443991] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.444353] [ 14.444546] The buggy address belongs to the physical page: [ 14.444813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.445168] flags: 0x200000000000000(node=0|zone=2) [ 14.445401] page_type: f5(slab) [ 14.445615] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.445953] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.446286] page dumped because: kasan: bad access detected [ 14.446545] [ 14.446637] Memory state around the buggy address: [ 14.446858] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.447171] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.447498] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.447871] ^ [ 14.448065] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.448365] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.448722] ================================================================== [ 14.345556] ================================================================== [ 14.346503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.347296] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.347787] [ 14.347872] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.347913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.347924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.347945] Call Trace: [ 14.347959] <TASK> [ 14.347973] dump_stack_lvl+0x73/0xb0 [ 14.347999] print_report+0xd1/0x610 [ 14.348021] ? __virt_addr_valid+0x1db/0x2d0 [ 14.348042] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.348070] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.348093] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.348122] kasan_report+0x141/0x180 [ 14.348144] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.348178] kasan_check_range+0x10c/0x1c0 [ 14.348202] __kasan_check_write+0x18/0x20 [ 14.348221] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.348250] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.348279] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.348303] ? trace_hardirqs_on+0x37/0xe0 [ 14.348324] ? kasan_bitops_generic+0x92/0x1c0 [ 14.348352] kasan_bitops_generic+0x121/0x1c0 [ 14.348376] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.348401] ? __pfx_read_tsc+0x10/0x10 [ 14.348422] ? ktime_get_ts64+0x86/0x230 [ 14.348464] kunit_try_run_case+0x1a5/0x480 [ 14.348489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.348511] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.348565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.348591] ? __kthread_parkme+0x82/0x180 [ 14.348610] ? preempt_count_sub+0x50/0x80 [ 14.348653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.348678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.348702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.348737] kthread+0x337/0x6f0 [ 14.348756] ? trace_preempt_on+0x20/0xc0 [ 14.348777] ? __pfx_kthread+0x10/0x10 [ 14.348798] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.348819] ? calculate_sigpending+0x7b/0xa0 [ 14.348844] ? __pfx_kthread+0x10/0x10 [ 14.348864] ret_from_fork+0x116/0x1d0 [ 14.348883] ? __pfx_kthread+0x10/0x10 [ 14.348903] ret_from_fork_asm+0x1a/0x30 [ 14.348935] </TASK> [ 14.348944] [ 14.361459] Allocated by task 279: [ 14.361683] kasan_save_stack+0x45/0x70 [ 14.361890] kasan_save_track+0x18/0x40 [ 14.362073] kasan_save_alloc_info+0x3b/0x50 [ 14.362252] __kasan_kmalloc+0xb7/0xc0 [ 14.362384] __kmalloc_cache_noprof+0x189/0x420 [ 14.362551] kasan_bitops_generic+0x92/0x1c0 [ 14.362760] kunit_try_run_case+0x1a5/0x480 [ 14.363044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.363264] kthread+0x337/0x6f0 [ 14.363384] ret_from_fork+0x116/0x1d0 [ 14.363571] ret_from_fork_asm+0x1a/0x30 [ 14.363770] [ 14.363880] The buggy address belongs to the object at ffff888101684300 [ 14.363880] which belongs to the cache kmalloc-16 of size 16 [ 14.364396] The buggy address is located 8 bytes inside of [ 14.364396] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.364893] [ 14.364965] The buggy address belongs to the physical page: [ 14.365184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.365563] flags: 0x200000000000000(node=0|zone=2) [ 14.365866] page_type: f5(slab) [ 14.366035] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.366318] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.366798] page dumped because: kasan: bad access detected [ 14.367029] [ 14.367136] Memory state around the buggy address: [ 14.367334] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.367656] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.367959] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.368262] ^ [ 14.368446] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.368736] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.368951] ================================================================== [ 14.411563] ================================================================== [ 14.411864] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.412261] Read of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.412903] [ 14.413020] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.413061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.413083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.413104] Call Trace: [ 14.413119] <TASK> [ 14.413138] dump_stack_lvl+0x73/0xb0 [ 14.413179] print_report+0xd1/0x610 [ 14.413200] ? __virt_addr_valid+0x1db/0x2d0 [ 14.413223] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.413250] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.413283] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.413311] kasan_report+0x141/0x180 [ 14.413333] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.413377] kasan_check_range+0x10c/0x1c0 [ 14.413401] __kasan_check_read+0x15/0x20 [ 14.413419] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.413458] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.413495] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.413519] ? trace_hardirqs_on+0x37/0xe0 [ 14.413541] ? kasan_bitops_generic+0x92/0x1c0 [ 14.413593] kasan_bitops_generic+0x121/0x1c0 [ 14.413617] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.413642] ? __pfx_read_tsc+0x10/0x10 [ 14.413662] ? ktime_get_ts64+0x86/0x230 [ 14.413687] kunit_try_run_case+0x1a5/0x480 [ 14.413711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.413733] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.413758] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.413782] ? __kthread_parkme+0x82/0x180 [ 14.413801] ? preempt_count_sub+0x50/0x80 [ 14.413825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.413849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.413882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.413906] kthread+0x337/0x6f0 [ 14.413925] ? trace_preempt_on+0x20/0xc0 [ 14.413956] ? __pfx_kthread+0x10/0x10 [ 14.413977] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.413998] ? calculate_sigpending+0x7b/0xa0 [ 14.414022] ? __pfx_kthread+0x10/0x10 [ 14.414042] ret_from_fork+0x116/0x1d0 [ 14.414060] ? __pfx_kthread+0x10/0x10 [ 14.414079] ret_from_fork_asm+0x1a/0x30 [ 14.414111] </TASK> [ 14.414121] [ 14.422408] Allocated by task 279: [ 14.422669] kasan_save_stack+0x45/0x70 [ 14.422855] kasan_save_track+0x18/0x40 [ 14.423026] kasan_save_alloc_info+0x3b/0x50 [ 14.423259] __kasan_kmalloc+0xb7/0xc0 [ 14.423394] __kmalloc_cache_noprof+0x189/0x420 [ 14.423575] kasan_bitops_generic+0x92/0x1c0 [ 14.423850] kunit_try_run_case+0x1a5/0x480 [ 14.424057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.424304] kthread+0x337/0x6f0 [ 14.424448] ret_from_fork+0x116/0x1d0 [ 14.424720] ret_from_fork_asm+0x1a/0x30 [ 14.424920] [ 14.424995] The buggy address belongs to the object at ffff888101684300 [ 14.424995] which belongs to the cache kmalloc-16 of size 16 [ 14.425511] The buggy address is located 8 bytes inside of [ 14.425511] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.425975] [ 14.426073] The buggy address belongs to the physical page: [ 14.426313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.426703] flags: 0x200000000000000(node=0|zone=2) [ 14.426911] page_type: f5(slab) [ 14.427092] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.427421] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.427659] page dumped because: kasan: bad access detected [ 14.427829] [ 14.427897] Memory state around the buggy address: [ 14.428050] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.428268] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.428525] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.429020] ^ [ 14.429215] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.429560] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.429873] ================================================================== [ 14.257381] ================================================================== [ 14.257902] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.258277] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.258508] [ 14.258588] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.258628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.258639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.258659] Call Trace: [ 14.258673] <TASK> [ 14.258687] dump_stack_lvl+0x73/0xb0 [ 14.258712] print_report+0xd1/0x610 [ 14.258733] ? __virt_addr_valid+0x1db/0x2d0 [ 14.258755] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.258783] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.258806] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.258834] kasan_report+0x141/0x180 [ 14.258858] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.258892] kasan_check_range+0x10c/0x1c0 [ 14.258916] __kasan_check_write+0x18/0x20 [ 14.258935] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.258964] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.259005] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.259029] ? trace_hardirqs_on+0x37/0xe0 [ 14.259050] ? kasan_bitops_generic+0x92/0x1c0 [ 14.259108] kasan_bitops_generic+0x121/0x1c0 [ 14.259154] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.259181] ? __pfx_read_tsc+0x10/0x10 [ 14.259201] ? ktime_get_ts64+0x86/0x230 [ 14.259237] kunit_try_run_case+0x1a5/0x480 [ 14.259260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.259283] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.259306] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.259330] ? __kthread_parkme+0x82/0x180 [ 14.259350] ? preempt_count_sub+0x50/0x80 [ 14.259373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.259397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.259421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.259482] kthread+0x337/0x6f0 [ 14.259501] ? trace_preempt_on+0x20/0xc0 [ 14.259523] ? __pfx_kthread+0x10/0x10 [ 14.259562] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.259583] ? calculate_sigpending+0x7b/0xa0 [ 14.259625] ? __pfx_kthread+0x10/0x10 [ 14.259647] ret_from_fork+0x116/0x1d0 [ 14.259665] ? __pfx_kthread+0x10/0x10 [ 14.259685] ret_from_fork_asm+0x1a/0x30 [ 14.259717] </TASK> [ 14.259726] [ 14.269141] Allocated by task 279: [ 14.269333] kasan_save_stack+0x45/0x70 [ 14.269536] kasan_save_track+0x18/0x40 [ 14.269723] kasan_save_alloc_info+0x3b/0x50 [ 14.269995] __kasan_kmalloc+0xb7/0xc0 [ 14.270251] __kmalloc_cache_noprof+0x189/0x420 [ 14.270431] kasan_bitops_generic+0x92/0x1c0 [ 14.270865] kunit_try_run_case+0x1a5/0x480 [ 14.271063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.271325] kthread+0x337/0x6f0 [ 14.271506] ret_from_fork+0x116/0x1d0 [ 14.271726] ret_from_fork_asm+0x1a/0x30 [ 14.271905] [ 14.272020] The buggy address belongs to the object at ffff888101684300 [ 14.272020] which belongs to the cache kmalloc-16 of size 16 [ 14.272600] The buggy address is located 8 bytes inside of [ 14.272600] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.273138] [ 14.273253] The buggy address belongs to the physical page: [ 14.273513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.273950] flags: 0x200000000000000(node=0|zone=2) [ 14.274214] page_type: f5(slab) [ 14.274389] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.274753] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.275154] page dumped because: kasan: bad access detected [ 14.275398] [ 14.275501] Memory state around the buggy address: [ 14.275834] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.276170] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.276465] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.276805] ^ [ 14.276995] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.277329] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.277691] ================================================================== [ 14.298929] ================================================================== [ 14.299376] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.299983] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.300442] [ 14.300551] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.300593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.300605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.300625] Call Trace: [ 14.300640] <TASK> [ 14.300655] dump_stack_lvl+0x73/0xb0 [ 14.300680] print_report+0xd1/0x610 [ 14.300701] ? __virt_addr_valid+0x1db/0x2d0 [ 14.300723] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.300751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.300774] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.300803] kasan_report+0x141/0x180 [ 14.300826] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.300860] kasan_check_range+0x10c/0x1c0 [ 14.300884] __kasan_check_write+0x18/0x20 [ 14.300903] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.300932] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.300962] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.300985] ? trace_hardirqs_on+0x37/0xe0 [ 14.301007] ? kasan_bitops_generic+0x92/0x1c0 [ 14.301035] kasan_bitops_generic+0x121/0x1c0 [ 14.301058] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.301084] ? __pfx_read_tsc+0x10/0x10 [ 14.301104] ? ktime_get_ts64+0x86/0x230 [ 14.301133] kunit_try_run_case+0x1a5/0x480 [ 14.301157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.301179] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.301202] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.301227] ? __kthread_parkme+0x82/0x180 [ 14.301246] ? preempt_count_sub+0x50/0x80 [ 14.301270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.301294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.301318] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.301342] kthread+0x337/0x6f0 [ 14.301360] ? trace_preempt_on+0x20/0xc0 [ 14.301381] ? __pfx_kthread+0x10/0x10 [ 14.301401] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.301423] ? calculate_sigpending+0x7b/0xa0 [ 14.301493] ? __pfx_kthread+0x10/0x10 [ 14.301515] ret_from_fork+0x116/0x1d0 [ 14.301533] ? __pfx_kthread+0x10/0x10 [ 14.301576] ret_from_fork_asm+0x1a/0x30 [ 14.301608] </TASK> [ 14.301617] [ 14.310254] Allocated by task 279: [ 14.310446] kasan_save_stack+0x45/0x70 [ 14.310694] kasan_save_track+0x18/0x40 [ 14.310926] kasan_save_alloc_info+0x3b/0x50 [ 14.311133] __kasan_kmalloc+0xb7/0xc0 [ 14.311328] __kmalloc_cache_noprof+0x189/0x420 [ 14.311596] kasan_bitops_generic+0x92/0x1c0 [ 14.311820] kunit_try_run_case+0x1a5/0x480 [ 14.312011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.312283] kthread+0x337/0x6f0 [ 14.312481] ret_from_fork+0x116/0x1d0 [ 14.312754] ret_from_fork_asm+0x1a/0x30 [ 14.312947] [ 14.313053] The buggy address belongs to the object at ffff888101684300 [ 14.313053] which belongs to the cache kmalloc-16 of size 16 [ 14.313659] The buggy address is located 8 bytes inside of [ 14.313659] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.314172] [ 14.314310] The buggy address belongs to the physical page: [ 14.314571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.314928] flags: 0x200000000000000(node=0|zone=2) [ 14.315185] page_type: f5(slab) [ 14.315302] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.315620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.315974] page dumped because: kasan: bad access detected [ 14.316218] [ 14.316308] Memory state around the buggy address: [ 14.316535] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.316854] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.317165] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.317482] ^ [ 14.317656] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.317899] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.318235] ================================================================== [ 14.370107] ================================================================== [ 14.370501] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.370916] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.371238] [ 14.371322] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.371373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.371384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.371405] Call Trace: [ 14.371416] <TASK> [ 14.371450] dump_stack_lvl+0x73/0xb0 [ 14.371476] print_report+0xd1/0x610 [ 14.371498] ? __virt_addr_valid+0x1db/0x2d0 [ 14.371520] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.371569] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.371592] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.371621] kasan_report+0x141/0x180 [ 14.371653] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.371688] kasan_check_range+0x10c/0x1c0 [ 14.371712] __kasan_check_write+0x18/0x20 [ 14.371731] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.371770] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.371802] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.371838] ? trace_hardirqs_on+0x37/0xe0 [ 14.371861] ? kasan_bitops_generic+0x92/0x1c0 [ 14.371891] kasan_bitops_generic+0x121/0x1c0 [ 14.371915] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.371941] ? __pfx_read_tsc+0x10/0x10 [ 14.371960] ? ktime_get_ts64+0x86/0x230 [ 14.371984] kunit_try_run_case+0x1a5/0x480 [ 14.372008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.372031] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.372056] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.372080] ? __kthread_parkme+0x82/0x180 [ 14.372099] ? preempt_count_sub+0x50/0x80 [ 14.372124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.372148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.372172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.372196] kthread+0x337/0x6f0 [ 14.372215] ? trace_preempt_on+0x20/0xc0 [ 14.372237] ? __pfx_kthread+0x10/0x10 [ 14.372258] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.372280] ? calculate_sigpending+0x7b/0xa0 [ 14.372304] ? __pfx_kthread+0x10/0x10 [ 14.372325] ret_from_fork+0x116/0x1d0 [ 14.372353] ? __pfx_kthread+0x10/0x10 [ 14.372373] ret_from_fork_asm+0x1a/0x30 [ 14.372405] </TASK> [ 14.372415] [ 14.380965] Allocated by task 279: [ 14.381151] kasan_save_stack+0x45/0x70 [ 14.381342] kasan_save_track+0x18/0x40 [ 14.381574] kasan_save_alloc_info+0x3b/0x50 [ 14.381732] __kasan_kmalloc+0xb7/0xc0 [ 14.381859] __kmalloc_cache_noprof+0x189/0x420 [ 14.382009] kasan_bitops_generic+0x92/0x1c0 [ 14.382190] kunit_try_run_case+0x1a5/0x480 [ 14.382416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.382669] kthread+0x337/0x6f0 [ 14.382833] ret_from_fork+0x116/0x1d0 [ 14.382991] ret_from_fork_asm+0x1a/0x30 [ 14.383126] [ 14.383195] The buggy address belongs to the object at ffff888101684300 [ 14.383195] which belongs to the cache kmalloc-16 of size 16 [ 14.383867] The buggy address is located 8 bytes inside of [ 14.383867] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.384214] [ 14.384283] The buggy address belongs to the physical page: [ 14.384456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.384683] flags: 0x200000000000000(node=0|zone=2) [ 14.384944] page_type: f5(slab) [ 14.385107] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.385449] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.386115] page dumped because: kasan: bad access detected [ 14.386367] [ 14.386466] Memory state around the buggy address: [ 14.386814] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.387096] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.387314] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.387536] ^ [ 14.387656] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.387976] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.388324] ==================================================================
[ 14.714360] ================================================================== [ 14.715571] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.715966] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.717341] [ 14.717572] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.717625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.717638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.717660] Call Trace: [ 14.717680] <TASK> [ 14.717701] dump_stack_lvl+0x73/0xb0 [ 14.717737] print_report+0xd1/0x610 [ 14.717761] ? __virt_addr_valid+0x1db/0x2d0 [ 14.717785] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.717814] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.717837] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.717866] kasan_report+0x141/0x180 [ 14.717888] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.717920] kasan_check_range+0x10c/0x1c0 [ 14.717943] __kasan_check_write+0x18/0x20 [ 14.717966] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.717994] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.718037] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.718062] ? kasan_bitops_generic+0x92/0x1c0 [ 14.718089] kasan_bitops_generic+0x121/0x1c0 [ 14.718112] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.718135] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.718257] kunit_try_run_case+0x1a5/0x480 [ 14.718288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.718310] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.718335] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.718358] ? __kthread_parkme+0x82/0x180 [ 14.718380] ? preempt_count_sub+0x50/0x80 [ 14.718404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.718428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.718452] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.718475] kthread+0x337/0x6f0 [ 14.718494] ? trace_preempt_on+0x20/0xc0 [ 14.718517] ? __pfx_kthread+0x10/0x10 [ 14.718536] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.718557] ? calculate_sigpending+0x7b/0xa0 [ 14.718581] ? __pfx_kthread+0x10/0x10 [ 14.718602] ret_from_fork+0x116/0x1d0 [ 14.718621] ? __pfx_kthread+0x10/0x10 [ 14.718640] ret_from_fork_asm+0x1a/0x30 [ 14.718671] </TASK> [ 14.718680] [ 14.728939] Allocated by task 278: [ 14.729238] kasan_save_stack+0x45/0x70 [ 14.729515] kasan_save_track+0x18/0x40 [ 14.729727] kasan_save_alloc_info+0x3b/0x50 [ 14.729926] __kasan_kmalloc+0xb7/0xc0 [ 14.730218] __kmalloc_cache_noprof+0x189/0x420 [ 14.730395] kasan_bitops_generic+0x92/0x1c0 [ 14.730638] kunit_try_run_case+0x1a5/0x480 [ 14.730824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.731101] kthread+0x337/0x6f0 [ 14.731254] ret_from_fork+0x116/0x1d0 [ 14.731782] ret_from_fork_asm+0x1a/0x30 [ 14.732007] [ 14.732116] The buggy address belongs to the object at ffff888102712180 [ 14.732116] which belongs to the cache kmalloc-16 of size 16 [ 14.732827] The buggy address is located 8 bytes inside of [ 14.732827] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.733385] [ 14.733564] The buggy address belongs to the physical page: [ 14.733828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.734203] flags: 0x200000000000000(node=0|zone=2) [ 14.734677] page_type: f5(slab) [ 14.734850] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.735567] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.735877] page dumped because: kasan: bad access detected [ 14.736223] [ 14.736303] Memory state around the buggy address: [ 14.736469] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.736866] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.737307] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.737739] ^ [ 14.737920] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.738368] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.738704] ================================================================== [ 14.763189] ================================================================== [ 14.763845] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.764377] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.764769] [ 14.764876] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.764948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.764961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.764983] Call Trace: [ 14.765004] <TASK> [ 14.765148] dump_stack_lvl+0x73/0xb0 [ 14.765191] print_report+0xd1/0x610 [ 14.765215] ? __virt_addr_valid+0x1db/0x2d0 [ 14.765240] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.765268] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.765294] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.765322] kasan_report+0x141/0x180 [ 14.765344] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.765377] kasan_check_range+0x10c/0x1c0 [ 14.765400] __kasan_check_write+0x18/0x20 [ 14.765419] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.765463] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.765510] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.765537] ? kasan_bitops_generic+0x92/0x1c0 [ 14.765564] kasan_bitops_generic+0x121/0x1c0 [ 14.765604] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.765629] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.765657] kunit_try_run_case+0x1a5/0x480 [ 14.765682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.765705] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.765729] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.765753] ? __kthread_parkme+0x82/0x180 [ 14.765774] ? preempt_count_sub+0x50/0x80 [ 14.765817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.765843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.765868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.765894] kthread+0x337/0x6f0 [ 14.765916] ? trace_preempt_on+0x20/0xc0 [ 14.765939] ? __pfx_kthread+0x10/0x10 [ 14.765958] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.765979] ? calculate_sigpending+0x7b/0xa0 [ 14.766004] ? __pfx_kthread+0x10/0x10 [ 14.766129] ret_from_fork+0x116/0x1d0 [ 14.766150] ? __pfx_kthread+0x10/0x10 [ 14.766170] ret_from_fork_asm+0x1a/0x30 [ 14.766201] </TASK> [ 14.766211] [ 14.780069] Allocated by task 278: [ 14.780698] kasan_save_stack+0x45/0x70 [ 14.780941] kasan_save_track+0x18/0x40 [ 14.781428] kasan_save_alloc_info+0x3b/0x50 [ 14.781633] __kasan_kmalloc+0xb7/0xc0 [ 14.781866] __kmalloc_cache_noprof+0x189/0x420 [ 14.782252] kasan_bitops_generic+0x92/0x1c0 [ 14.782666] kunit_try_run_case+0x1a5/0x480 [ 14.782878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.783399] kthread+0x337/0x6f0 [ 14.783710] ret_from_fork+0x116/0x1d0 [ 14.783983] ret_from_fork_asm+0x1a/0x30 [ 14.784505] [ 14.784635] The buggy address belongs to the object at ffff888102712180 [ 14.784635] which belongs to the cache kmalloc-16 of size 16 [ 14.785385] The buggy address is located 8 bytes inside of [ 14.785385] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.786290] [ 14.786432] The buggy address belongs to the physical page: [ 14.786883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.787503] flags: 0x200000000000000(node=0|zone=2) [ 14.787855] page_type: f5(slab) [ 14.788065] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.788865] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.789179] page dumped because: kasan: bad access detected [ 14.789704] [ 14.789820] Memory state around the buggy address: [ 14.790304] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.790722] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.791063] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.791623] ^ [ 14.791917] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.792613] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.792937] ================================================================== [ 14.826102] ================================================================== [ 14.826380] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.826902] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.828253] [ 14.828377] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.828430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.828442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.828465] Call Trace: [ 14.828485] <TASK> [ 14.828731] dump_stack_lvl+0x73/0xb0 [ 14.828777] print_report+0xd1/0x610 [ 14.828802] ? __virt_addr_valid+0x1db/0x2d0 [ 14.828826] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.828860] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.828883] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.828911] kasan_report+0x141/0x180 [ 14.828932] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.828965] kasan_check_range+0x10c/0x1c0 [ 14.828989] __kasan_check_write+0x18/0x20 [ 14.829019] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.829048] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.829078] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.829103] ? kasan_bitops_generic+0x92/0x1c0 [ 14.829130] kasan_bitops_generic+0x121/0x1c0 [ 14.829154] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.829178] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.829206] kunit_try_run_case+0x1a5/0x480 [ 14.829232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829254] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.829279] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.829302] ? __kthread_parkme+0x82/0x180 [ 14.829323] ? preempt_count_sub+0x50/0x80 [ 14.829347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.829395] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.829419] kthread+0x337/0x6f0 [ 14.829447] ? trace_preempt_on+0x20/0xc0 [ 14.829470] ? __pfx_kthread+0x10/0x10 [ 14.829489] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.829510] ? calculate_sigpending+0x7b/0xa0 [ 14.829534] ? __pfx_kthread+0x10/0x10 [ 14.829554] ret_from_fork+0x116/0x1d0 [ 14.829574] ? __pfx_kthread+0x10/0x10 [ 14.829594] ret_from_fork_asm+0x1a/0x30 [ 14.829625] </TASK> [ 14.829636] [ 14.840581] Allocated by task 278: [ 14.840779] kasan_save_stack+0x45/0x70 [ 14.840993] kasan_save_track+0x18/0x40 [ 14.841166] kasan_save_alloc_info+0x3b/0x50 [ 14.841379] __kasan_kmalloc+0xb7/0xc0 [ 14.841883] __kmalloc_cache_noprof+0x189/0x420 [ 14.842231] kasan_bitops_generic+0x92/0x1c0 [ 14.842564] kunit_try_run_case+0x1a5/0x480 [ 14.842847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.843133] kthread+0x337/0x6f0 [ 14.843406] ret_from_fork+0x116/0x1d0 [ 14.843614] ret_from_fork_asm+0x1a/0x30 [ 14.843825] [ 14.844166] The buggy address belongs to the object at ffff888102712180 [ 14.844166] which belongs to the cache kmalloc-16 of size 16 [ 14.844736] The buggy address is located 8 bytes inside of [ 14.844736] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.845397] [ 14.845517] The buggy address belongs to the physical page: [ 14.845979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.846350] flags: 0x200000000000000(node=0|zone=2) [ 14.846803] page_type: f5(slab) [ 14.846992] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.847489] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.847832] page dumped because: kasan: bad access detected [ 14.848267] [ 14.848448] Memory state around the buggy address: [ 14.848631] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.849071] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.849408] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.850088] ^ [ 14.850264] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.850909] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.851225] ================================================================== [ 14.795085] ================================================================== [ 14.795403] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.795837] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.796852] [ 14.797024] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.797092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.797104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.797126] Call Trace: [ 14.797150] <TASK> [ 14.797170] dump_stack_lvl+0x73/0xb0 [ 14.797207] print_report+0xd1/0x610 [ 14.797231] ? __virt_addr_valid+0x1db/0x2d0 [ 14.797254] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.797282] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.797305] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.797333] kasan_report+0x141/0x180 [ 14.797355] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.797387] kasan_check_range+0x10c/0x1c0 [ 14.797411] __kasan_check_write+0x18/0x20 [ 14.797796] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.797833] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.797863] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.797889] ? kasan_bitops_generic+0x92/0x1c0 [ 14.797917] kasan_bitops_generic+0x121/0x1c0 [ 14.797940] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.797964] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.797992] kunit_try_run_case+0x1a5/0x480 [ 14.798032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.798055] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.798081] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.798105] ? __kthread_parkme+0x82/0x180 [ 14.798126] ? preempt_count_sub+0x50/0x80 [ 14.798150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.798174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.798199] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.798223] kthread+0x337/0x6f0 [ 14.798242] ? trace_preempt_on+0x20/0xc0 [ 14.798265] ? __pfx_kthread+0x10/0x10 [ 14.798284] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.798305] ? calculate_sigpending+0x7b/0xa0 [ 14.798330] ? __pfx_kthread+0x10/0x10 [ 14.798351] ret_from_fork+0x116/0x1d0 [ 14.798370] ? __pfx_kthread+0x10/0x10 [ 14.798389] ret_from_fork_asm+0x1a/0x30 [ 14.798419] </TASK> [ 14.798430] [ 14.812141] Allocated by task 278: [ 14.812345] kasan_save_stack+0x45/0x70 [ 14.812684] kasan_save_track+0x18/0x40 [ 14.812876] kasan_save_alloc_info+0x3b/0x50 [ 14.813440] __kasan_kmalloc+0xb7/0xc0 [ 14.813857] __kmalloc_cache_noprof+0x189/0x420 [ 14.814246] kasan_bitops_generic+0x92/0x1c0 [ 14.814523] kunit_try_run_case+0x1a5/0x480 [ 14.814712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.815406] kthread+0x337/0x6f0 [ 14.815552] ret_from_fork+0x116/0x1d0 [ 14.816206] ret_from_fork_asm+0x1a/0x30 [ 14.816408] [ 14.816500] The buggy address belongs to the object at ffff888102712180 [ 14.816500] which belongs to the cache kmalloc-16 of size 16 [ 14.817339] The buggy address is located 8 bytes inside of [ 14.817339] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.818405] [ 14.818607] The buggy address belongs to the physical page: [ 14.818843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.819750] flags: 0x200000000000000(node=0|zone=2) [ 14.820304] page_type: f5(slab) [ 14.820487] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.820877] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.821566] page dumped because: kasan: bad access detected [ 14.821908] [ 14.822018] Memory state around the buggy address: [ 14.822345] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.822867] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.823670] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.824216] ^ [ 14.824374] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.824989] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.825487] ================================================================== [ 14.739620] ================================================================== [ 14.739913] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.740543] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.741374] [ 14.741527] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.741594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.741620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.741642] Call Trace: [ 14.741663] <TASK> [ 14.741683] dump_stack_lvl+0x73/0xb0 [ 14.741716] print_report+0xd1/0x610 [ 14.741740] ? __virt_addr_valid+0x1db/0x2d0 [ 14.741764] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.741793] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.741817] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.741846] kasan_report+0x141/0x180 [ 14.741868] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.741902] kasan_check_range+0x10c/0x1c0 [ 14.741926] __kasan_check_write+0x18/0x20 [ 14.741945] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.741973] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.742002] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.742110] ? kasan_bitops_generic+0x92/0x1c0 [ 14.742161] kasan_bitops_generic+0x121/0x1c0 [ 14.742186] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.742210] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.742254] kunit_try_run_case+0x1a5/0x480 [ 14.742280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.742303] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.742327] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.742351] ? __kthread_parkme+0x82/0x180 [ 14.742372] ? preempt_count_sub+0x50/0x80 [ 14.742396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.742420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.742444] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.742467] kthread+0x337/0x6f0 [ 14.742486] ? trace_preempt_on+0x20/0xc0 [ 14.742509] ? __pfx_kthread+0x10/0x10 [ 14.742528] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.742550] ? calculate_sigpending+0x7b/0xa0 [ 14.742575] ? __pfx_kthread+0x10/0x10 [ 14.742595] ret_from_fork+0x116/0x1d0 [ 14.742614] ? __pfx_kthread+0x10/0x10 [ 14.742634] ret_from_fork_asm+0x1a/0x30 [ 14.742665] </TASK> [ 14.742677] [ 14.752557] Allocated by task 278: [ 14.752805] kasan_save_stack+0x45/0x70 [ 14.753133] kasan_save_track+0x18/0x40 [ 14.753319] kasan_save_alloc_info+0x3b/0x50 [ 14.753592] __kasan_kmalloc+0xb7/0xc0 [ 14.753773] __kmalloc_cache_noprof+0x189/0x420 [ 14.753955] kasan_bitops_generic+0x92/0x1c0 [ 14.754112] kunit_try_run_case+0x1a5/0x480 [ 14.754534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.755067] kthread+0x337/0x6f0 [ 14.755292] ret_from_fork+0x116/0x1d0 [ 14.755485] ret_from_fork_asm+0x1a/0x30 [ 14.755621] [ 14.755691] The buggy address belongs to the object at ffff888102712180 [ 14.755691] which belongs to the cache kmalloc-16 of size 16 [ 14.756948] The buggy address is located 8 bytes inside of [ 14.756948] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.757401] [ 14.757476] The buggy address belongs to the physical page: [ 14.757790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.758363] flags: 0x200000000000000(node=0|zone=2) [ 14.758595] page_type: f5(slab) [ 14.758878] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.759563] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.759834] page dumped because: kasan: bad access detected [ 14.760277] [ 14.760376] Memory state around the buggy address: [ 14.760656] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.760898] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.761346] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.761666] ^ [ 14.761875] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.762224] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.762541] ================================================================== [ 14.879349] ================================================================== [ 14.879616] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.879916] Read of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.880924] [ 14.881033] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.881084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.881095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.881117] Call Trace: [ 14.881138] <TASK> [ 14.881157] dump_stack_lvl+0x73/0xb0 [ 14.881187] print_report+0xd1/0x610 [ 14.881211] ? __virt_addr_valid+0x1db/0x2d0 [ 14.881234] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.881262] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.881297] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.881325] kasan_report+0x141/0x180 [ 14.881346] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.881493] __asan_report_load8_noabort+0x18/0x20 [ 14.881578] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.881639] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.881669] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.881771] ? kasan_bitops_generic+0x92/0x1c0 [ 14.881800] kasan_bitops_generic+0x121/0x1c0 [ 14.881824] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.881848] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.881877] kunit_try_run_case+0x1a5/0x480 [ 14.881903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.881927] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.881951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.881973] ? __kthread_parkme+0x82/0x180 [ 14.881994] ? preempt_count_sub+0x50/0x80 [ 14.882029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.882053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.882077] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.882100] kthread+0x337/0x6f0 [ 14.882119] ? trace_preempt_on+0x20/0xc0 [ 14.882142] ? __pfx_kthread+0x10/0x10 [ 14.882162] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.882183] ? calculate_sigpending+0x7b/0xa0 [ 14.882207] ? __pfx_kthread+0x10/0x10 [ 14.882227] ret_from_fork+0x116/0x1d0 [ 14.882247] ? __pfx_kthread+0x10/0x10 [ 14.882266] ret_from_fork_asm+0x1a/0x30 [ 14.882297] </TASK> [ 14.882308] [ 14.896450] Allocated by task 278: [ 14.896935] kasan_save_stack+0x45/0x70 [ 14.897326] kasan_save_track+0x18/0x40 [ 14.897705] kasan_save_alloc_info+0x3b/0x50 [ 14.898107] __kasan_kmalloc+0xb7/0xc0 [ 14.898479] __kmalloc_cache_noprof+0x189/0x420 [ 14.898891] kasan_bitops_generic+0x92/0x1c0 [ 14.899289] kunit_try_run_case+0x1a5/0x480 [ 14.899694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.900174] kthread+0x337/0x6f0 [ 14.900505] ret_from_fork+0x116/0x1d0 [ 14.900861] ret_from_fork_asm+0x1a/0x30 [ 14.901238] [ 14.901431] The buggy address belongs to the object at ffff888102712180 [ 14.901431] which belongs to the cache kmalloc-16 of size 16 [ 14.901894] The buggy address is located 8 bytes inside of [ 14.901894] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.902259] [ 14.902337] The buggy address belongs to the physical page: [ 14.902794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.903503] flags: 0x200000000000000(node=0|zone=2) [ 14.904284] page_type: f5(slab) [ 14.904838] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.905238] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.905704] page dumped because: kasan: bad access detected [ 14.906473] [ 14.906795] Memory state around the buggy address: [ 14.907414] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.907694] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.907911] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.908139] ^ [ 14.908371] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.909088] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.909756] ================================================================== [ 14.667260] ================================================================== [ 14.667641] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.667985] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.668644] [ 14.668767] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.668816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.668827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.668854] Call Trace: [ 14.668874] <TASK> [ 14.668893] dump_stack_lvl+0x73/0xb0 [ 14.668925] print_report+0xd1/0x610 [ 14.668948] ? __virt_addr_valid+0x1db/0x2d0 [ 14.668970] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.669138] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.669168] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.669198] kasan_report+0x141/0x180 [ 14.669221] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.669254] kasan_check_range+0x10c/0x1c0 [ 14.669277] __kasan_check_write+0x18/0x20 [ 14.669297] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.669326] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.669355] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.669380] ? kasan_bitops_generic+0x92/0x1c0 [ 14.669407] kasan_bitops_generic+0x121/0x1c0 [ 14.669452] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.669476] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.669504] kunit_try_run_case+0x1a5/0x480 [ 14.669529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.669551] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.669575] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.669598] ? __kthread_parkme+0x82/0x180 [ 14.669621] ? preempt_count_sub+0x50/0x80 [ 14.669645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.669669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.669692] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.669716] kthread+0x337/0x6f0 [ 14.669734] ? trace_preempt_on+0x20/0xc0 [ 14.669757] ? __pfx_kthread+0x10/0x10 [ 14.669778] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.669798] ? calculate_sigpending+0x7b/0xa0 [ 14.669822] ? __pfx_kthread+0x10/0x10 [ 14.669843] ret_from_fork+0x116/0x1d0 [ 14.669862] ? __pfx_kthread+0x10/0x10 [ 14.669882] ret_from_fork_asm+0x1a/0x30 [ 14.669912] </TASK> [ 14.669921] [ 14.678642] Allocated by task 278: [ 14.678835] kasan_save_stack+0x45/0x70 [ 14.679034] kasan_save_track+0x18/0x40 [ 14.679215] kasan_save_alloc_info+0x3b/0x50 [ 14.679380] __kasan_kmalloc+0xb7/0xc0 [ 14.679511] __kmalloc_cache_noprof+0x189/0x420 [ 14.679737] kasan_bitops_generic+0x92/0x1c0 [ 14.679944] kunit_try_run_case+0x1a5/0x480 [ 14.680524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.680769] kthread+0x337/0x6f0 [ 14.680941] ret_from_fork+0x116/0x1d0 [ 14.681190] ret_from_fork_asm+0x1a/0x30 [ 14.681336] [ 14.681408] The buggy address belongs to the object at ffff888102712180 [ 14.681408] which belongs to the cache kmalloc-16 of size 16 [ 14.681851] The buggy address is located 8 bytes inside of [ 14.681851] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.682521] [ 14.682623] The buggy address belongs to the physical page: [ 14.682808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.683175] flags: 0x200000000000000(node=0|zone=2) [ 14.683434] page_type: f5(slab) [ 14.683635] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.683983] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.684549] page dumped because: kasan: bad access detected [ 14.684758] [ 14.684857] Memory state around the buggy address: [ 14.685196] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.685550] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.685873] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.686318] ^ [ 14.686475] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.686729] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.687144] ================================================================== [ 14.687694] ================================================================== [ 14.687979] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.688360] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.688693] [ 14.688810] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.688862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.688873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.688896] Call Trace: [ 14.688916] <TASK> [ 14.688936] dump_stack_lvl+0x73/0xb0 [ 14.688964] print_report+0xd1/0x610 [ 14.688986] ? __virt_addr_valid+0x1db/0x2d0 [ 14.689018] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.689044] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.689066] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.689096] kasan_report+0x141/0x180 [ 14.689117] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.689148] kasan_check_range+0x10c/0x1c0 [ 14.689170] __kasan_check_write+0x18/0x20 [ 14.689188] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.689214] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.689241] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.689265] ? kasan_bitops_generic+0x92/0x1c0 [ 14.689290] kasan_bitops_generic+0x121/0x1c0 [ 14.689313] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.689338] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.689366] kunit_try_run_case+0x1a5/0x480 [ 14.689390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.689412] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.689435] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.689457] ? __kthread_parkme+0x82/0x180 [ 14.689477] ? preempt_count_sub+0x50/0x80 [ 14.689500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.689522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.689544] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.689567] kthread+0x337/0x6f0 [ 14.689585] ? trace_preempt_on+0x20/0xc0 [ 14.689607] ? __pfx_kthread+0x10/0x10 [ 14.689626] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.689646] ? calculate_sigpending+0x7b/0xa0 [ 14.689669] ? __pfx_kthread+0x10/0x10 [ 14.689688] ret_from_fork+0x116/0x1d0 [ 14.689708] ? __pfx_kthread+0x10/0x10 [ 14.689726] ret_from_fork_asm+0x1a/0x30 [ 14.689756] </TASK> [ 14.689766] [ 14.699098] Allocated by task 278: [ 14.699255] kasan_save_stack+0x45/0x70 [ 14.699507] kasan_save_track+0x18/0x40 [ 14.699700] kasan_save_alloc_info+0x3b/0x50 [ 14.699905] __kasan_kmalloc+0xb7/0xc0 [ 14.700238] __kmalloc_cache_noprof+0x189/0x420 [ 14.700702] kasan_bitops_generic+0x92/0x1c0 [ 14.700922] kunit_try_run_case+0x1a5/0x480 [ 14.701129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.701374] kthread+0x337/0x6f0 [ 14.701534] ret_from_fork+0x116/0x1d0 [ 14.701710] ret_from_fork_asm+0x1a/0x30 [ 14.701895] [ 14.701985] The buggy address belongs to the object at ffff888102712180 [ 14.701985] which belongs to the cache kmalloc-16 of size 16 [ 14.704306] The buggy address is located 8 bytes inside of [ 14.704306] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.704989] [ 14.705293] The buggy address belongs to the physical page: [ 14.705649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.706290] flags: 0x200000000000000(node=0|zone=2) [ 14.706686] page_type: f5(slab) [ 14.706861] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.707920] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.708808] page dumped because: kasan: bad access detected [ 14.709341] [ 14.709519] Memory state around the buggy address: [ 14.709744] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.710399] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.710836] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.711891] ^ [ 14.712271] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.713003] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.713320] ================================================================== [ 14.852634] ================================================================== [ 14.852950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.853591] Read of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.853992] [ 14.854328] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.854383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.854395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.854417] Call Trace: [ 14.854437] <TASK> [ 14.854458] dump_stack_lvl+0x73/0xb0 [ 14.854493] print_report+0xd1/0x610 [ 14.854516] ? __virt_addr_valid+0x1db/0x2d0 [ 14.854542] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.854571] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.854594] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.854622] kasan_report+0x141/0x180 [ 14.854643] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.854676] kasan_check_range+0x10c/0x1c0 [ 14.854699] __kasan_check_read+0x15/0x20 [ 14.854718] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.854746] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.854775] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.854802] ? kasan_bitops_generic+0x92/0x1c0 [ 14.854828] kasan_bitops_generic+0x121/0x1c0 [ 14.854851] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.854875] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.854903] kunit_try_run_case+0x1a5/0x480 [ 14.854928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.854950] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.854974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.854998] ? __kthread_parkme+0x82/0x180 [ 14.855030] ? preempt_count_sub+0x50/0x80 [ 14.855054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.855077] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.855100] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.855124] kthread+0x337/0x6f0 [ 14.855142] ? trace_preempt_on+0x20/0xc0 [ 14.855164] ? __pfx_kthread+0x10/0x10 [ 14.855185] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.855205] ? calculate_sigpending+0x7b/0xa0 [ 14.855229] ? __pfx_kthread+0x10/0x10 [ 14.855250] ret_from_fork+0x116/0x1d0 [ 14.855269] ? __pfx_kthread+0x10/0x10 [ 14.855289] ret_from_fork_asm+0x1a/0x30 [ 14.855320] </TASK> [ 14.855330] [ 14.866320] Allocated by task 278: [ 14.866706] kasan_save_stack+0x45/0x70 [ 14.867062] kasan_save_track+0x18/0x40 [ 14.867250] kasan_save_alloc_info+0x3b/0x50 [ 14.867699] __kasan_kmalloc+0xb7/0xc0 [ 14.867946] __kmalloc_cache_noprof+0x189/0x420 [ 14.868181] kasan_bitops_generic+0x92/0x1c0 [ 14.868375] kunit_try_run_case+0x1a5/0x480 [ 14.869026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.869302] kthread+0x337/0x6f0 [ 14.869639] ret_from_fork+0x116/0x1d0 [ 14.869985] ret_from_fork_asm+0x1a/0x30 [ 14.870194] [ 14.870301] The buggy address belongs to the object at ffff888102712180 [ 14.870301] which belongs to the cache kmalloc-16 of size 16 [ 14.871567] The buggy address is located 8 bytes inside of [ 14.871567] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.872390] [ 14.872552] The buggy address belongs to the physical page: [ 14.872942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.873276] flags: 0x200000000000000(node=0|zone=2) [ 14.873774] page_type: f5(slab) [ 14.873949] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.874286] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.875050] page dumped because: kasan: bad access detected [ 14.875525] [ 14.875624] Memory state around the buggy address: [ 14.875826] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.876132] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.876695] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.877069] ^ [ 14.877229] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.877860] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.878215] ==================================================================
[ 14.534042] ================================================================== [ 14.534508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.535409] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.535924] [ 14.536124] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.536169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.536180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.536201] Call Trace: [ 14.536216] <TASK> [ 14.536232] dump_stack_lvl+0x73/0xb0 [ 14.536260] print_report+0xd1/0x610 [ 14.536282] ? __virt_addr_valid+0x1db/0x2d0 [ 14.536305] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.536332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.536355] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.536384] kasan_report+0x141/0x180 [ 14.536406] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.536439] kasan_check_range+0x10c/0x1c0 [ 14.536463] __kasan_check_write+0x18/0x20 [ 14.536481] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.536510] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.536539] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.536564] ? trace_hardirqs_on+0x37/0xe0 [ 14.536586] ? kasan_bitops_generic+0x92/0x1c0 [ 14.536614] kasan_bitops_generic+0x121/0x1c0 [ 14.536637] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.536662] ? __pfx_read_tsc+0x10/0x10 [ 14.536682] ? ktime_get_ts64+0x86/0x230 [ 14.536739] kunit_try_run_case+0x1a5/0x480 [ 14.536763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.536796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.536820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.536844] ? __kthread_parkme+0x82/0x180 [ 14.536864] ? preempt_count_sub+0x50/0x80 [ 14.536889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.536922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.536946] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.536972] kthread+0x337/0x6f0 [ 14.536990] ? trace_preempt_on+0x20/0xc0 [ 14.537013] ? __pfx_kthread+0x10/0x10 [ 14.537032] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.537054] ? calculate_sigpending+0x7b/0xa0 [ 14.537079] ? __pfx_kthread+0x10/0x10 [ 14.537100] ret_from_fork+0x116/0x1d0 [ 14.537118] ? __pfx_kthread+0x10/0x10 [ 14.537138] ret_from_fork_asm+0x1a/0x30 [ 14.537171] </TASK> [ 14.537182] [ 14.552193] Allocated by task 278: [ 14.552551] kasan_save_stack+0x45/0x70 [ 14.552816] kasan_save_track+0x18/0x40 [ 14.553219] kasan_save_alloc_info+0x3b/0x50 [ 14.553425] __kasan_kmalloc+0xb7/0xc0 [ 14.553856] __kmalloc_cache_noprof+0x189/0x420 [ 14.554261] kasan_bitops_generic+0x92/0x1c0 [ 14.554613] kunit_try_run_case+0x1a5/0x480 [ 14.554959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.555444] kthread+0x337/0x6f0 [ 14.555737] ret_from_fork+0x116/0x1d0 [ 14.555927] ret_from_fork_asm+0x1a/0x30 [ 14.556333] [ 14.556511] The buggy address belongs to the object at ffff888102837220 [ 14.556511] which belongs to the cache kmalloc-16 of size 16 [ 14.557370] The buggy address is located 8 bytes inside of [ 14.557370] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.558242] [ 14.558425] The buggy address belongs to the physical page: [ 14.559018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.559905] flags: 0x200000000000000(node=0|zone=2) [ 14.560407] page_type: f5(slab) [ 14.560702] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.561448] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.561683] page dumped because: kasan: bad access detected [ 14.561878] [ 14.562028] Memory state around the buggy address: [ 14.562486] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.563227] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.563952] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.564610] ^ [ 14.565095] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.565619] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.566060] ================================================================== [ 14.384309] ================================================================== [ 14.384657] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.385023] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.385356] [ 14.385449] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.385490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.385502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.385521] Call Trace: [ 14.385536] <TASK> [ 14.385551] dump_stack_lvl+0x73/0xb0 [ 14.385577] print_report+0xd1/0x610 [ 14.385598] ? __virt_addr_valid+0x1db/0x2d0 [ 14.385621] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.385647] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.385669] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.385696] kasan_report+0x141/0x180 [ 14.385717] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.385749] kasan_check_range+0x10c/0x1c0 [ 14.385772] __kasan_check_write+0x18/0x20 [ 14.385791] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.385817] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.385845] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.385868] ? trace_hardirqs_on+0x37/0xe0 [ 14.385935] ? kasan_bitops_generic+0x92/0x1c0 [ 14.386037] kasan_bitops_generic+0x121/0x1c0 [ 14.386062] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.386086] ? __pfx_read_tsc+0x10/0x10 [ 14.386110] ? ktime_get_ts64+0x86/0x230 [ 14.386138] kunit_try_run_case+0x1a5/0x480 [ 14.386163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.386186] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.386212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.386235] ? __kthread_parkme+0x82/0x180 [ 14.386257] ? preempt_count_sub+0x50/0x80 [ 14.386282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.386307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.386332] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.386357] kthread+0x337/0x6f0 [ 14.386376] ? trace_preempt_on+0x20/0xc0 [ 14.386398] ? __pfx_kthread+0x10/0x10 [ 14.386418] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.386442] ? calculate_sigpending+0x7b/0xa0 [ 14.386467] ? __pfx_kthread+0x10/0x10 [ 14.386488] ret_from_fork+0x116/0x1d0 [ 14.386507] ? __pfx_kthread+0x10/0x10 [ 14.386528] ret_from_fork_asm+0x1a/0x30 [ 14.386560] </TASK> [ 14.386571] [ 14.396139] Allocated by task 278: [ 14.396274] kasan_save_stack+0x45/0x70 [ 14.396424] kasan_save_track+0x18/0x40 [ 14.396626] kasan_save_alloc_info+0x3b/0x50 [ 14.396845] __kasan_kmalloc+0xb7/0xc0 [ 14.397262] __kmalloc_cache_noprof+0x189/0x420 [ 14.397447] kasan_bitops_generic+0x92/0x1c0 [ 14.397732] kunit_try_run_case+0x1a5/0x480 [ 14.398024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.398229] kthread+0x337/0x6f0 [ 14.398397] ret_from_fork+0x116/0x1d0 [ 14.398695] ret_from_fork_asm+0x1a/0x30 [ 14.398921] [ 14.399021] The buggy address belongs to the object at ffff888102837220 [ 14.399021] which belongs to the cache kmalloc-16 of size 16 [ 14.399513] The buggy address is located 8 bytes inside of [ 14.399513] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.400176] [ 14.400278] The buggy address belongs to the physical page: [ 14.400504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.401086] flags: 0x200000000000000(node=0|zone=2) [ 14.401329] page_type: f5(slab) [ 14.401486] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.401988] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.402354] page dumped because: kasan: bad access detected [ 14.402617] [ 14.402709] Memory state around the buggy address: [ 14.402955] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.403251] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.403529] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.403823] ^ [ 14.403983] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.404306] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.404617] ================================================================== [ 14.473740] ================================================================== [ 14.474262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.474750] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.475120] [ 14.475229] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.475271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.475281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.475301] Call Trace: [ 14.475316] <TASK> [ 14.475332] dump_stack_lvl+0x73/0xb0 [ 14.475360] print_report+0xd1/0x610 [ 14.475381] ? __virt_addr_valid+0x1db/0x2d0 [ 14.475405] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.475434] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.475457] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.475485] kasan_report+0x141/0x180 [ 14.475508] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.475561] kasan_check_range+0x10c/0x1c0 [ 14.475585] __kasan_check_write+0x18/0x20 [ 14.475604] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.475632] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.475661] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.475685] ? trace_hardirqs_on+0x37/0xe0 [ 14.475753] ? kasan_bitops_generic+0x92/0x1c0 [ 14.475817] kasan_bitops_generic+0x121/0x1c0 [ 14.475919] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.475945] ? __pfx_read_tsc+0x10/0x10 [ 14.476010] ? ktime_get_ts64+0x86/0x230 [ 14.476036] kunit_try_run_case+0x1a5/0x480 [ 14.476061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.476082] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.476107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.476130] ? __kthread_parkme+0x82/0x180 [ 14.476150] ? preempt_count_sub+0x50/0x80 [ 14.476174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.476198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.476221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.476245] kthread+0x337/0x6f0 [ 14.476264] ? trace_preempt_on+0x20/0xc0 [ 14.476286] ? __pfx_kthread+0x10/0x10 [ 14.476306] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.476328] ? calculate_sigpending+0x7b/0xa0 [ 14.476395] ? __pfx_kthread+0x10/0x10 [ 14.476417] ret_from_fork+0x116/0x1d0 [ 14.476435] ? __pfx_kthread+0x10/0x10 [ 14.476503] ret_from_fork_asm+0x1a/0x30 [ 14.476572] </TASK> [ 14.476583] [ 14.486336] Allocated by task 278: [ 14.486667] kasan_save_stack+0x45/0x70 [ 14.487077] kasan_save_track+0x18/0x40 [ 14.487236] kasan_save_alloc_info+0x3b/0x50 [ 14.487479] __kasan_kmalloc+0xb7/0xc0 [ 14.487879] __kmalloc_cache_noprof+0x189/0x420 [ 14.488120] kasan_bitops_generic+0x92/0x1c0 [ 14.488497] kunit_try_run_case+0x1a5/0x480 [ 14.488641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.488811] kthread+0x337/0x6f0 [ 14.488954] ret_from_fork+0x116/0x1d0 [ 14.489103] ret_from_fork_asm+0x1a/0x30 [ 14.489240] [ 14.489348] The buggy address belongs to the object at ffff888102837220 [ 14.489348] which belongs to the cache kmalloc-16 of size 16 [ 14.490229] The buggy address is located 8 bytes inside of [ 14.490229] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.491271] [ 14.491396] The buggy address belongs to the physical page: [ 14.491675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.492318] flags: 0x200000000000000(node=0|zone=2) [ 14.492569] page_type: f5(slab) [ 14.492709] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.493360] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.493596] page dumped because: kasan: bad access detected [ 14.493769] [ 14.493838] Memory state around the buggy address: [ 14.494030] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.494445] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.494799] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.495245] ^ [ 14.495602] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.496231] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.496772] ================================================================== [ 14.427139] ================================================================== [ 14.427477] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.427837] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.428134] [ 14.428260] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.428301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.428312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.428332] Call Trace: [ 14.428345] <TASK> [ 14.428386] dump_stack_lvl+0x73/0xb0 [ 14.428415] print_report+0xd1/0x610 [ 14.428437] ? __virt_addr_valid+0x1db/0x2d0 [ 14.428477] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.428505] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.428732] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.428774] kasan_report+0x141/0x180 [ 14.428797] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.428831] kasan_check_range+0x10c/0x1c0 [ 14.428855] __kasan_check_write+0x18/0x20 [ 14.428874] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.428935] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.428964] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.428988] ? trace_hardirqs_on+0x37/0xe0 [ 14.429010] ? kasan_bitops_generic+0x92/0x1c0 [ 14.429038] kasan_bitops_generic+0x121/0x1c0 [ 14.429080] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.429105] ? __pfx_read_tsc+0x10/0x10 [ 14.429126] ? ktime_get_ts64+0x86/0x230 [ 14.429150] kunit_try_run_case+0x1a5/0x480 [ 14.429174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.429220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.429262] ? __kthread_parkme+0x82/0x180 [ 14.429281] ? preempt_count_sub+0x50/0x80 [ 14.429306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.429355] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.429380] kthread+0x337/0x6f0 [ 14.429416] ? trace_preempt_on+0x20/0xc0 [ 14.429437] ? __pfx_kthread+0x10/0x10 [ 14.429458] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.429481] ? calculate_sigpending+0x7b/0xa0 [ 14.429505] ? __pfx_kthread+0x10/0x10 [ 14.429526] ret_from_fork+0x116/0x1d0 [ 14.429593] ? __pfx_kthread+0x10/0x10 [ 14.429614] ret_from_fork_asm+0x1a/0x30 [ 14.429646] </TASK> [ 14.429656] [ 14.439339] Allocated by task 278: [ 14.439524] kasan_save_stack+0x45/0x70 [ 14.439793] kasan_save_track+0x18/0x40 [ 14.440013] kasan_save_alloc_info+0x3b/0x50 [ 14.440164] __kasan_kmalloc+0xb7/0xc0 [ 14.440293] __kmalloc_cache_noprof+0x189/0x420 [ 14.440444] kasan_bitops_generic+0x92/0x1c0 [ 14.440589] kunit_try_run_case+0x1a5/0x480 [ 14.440749] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.441029] kthread+0x337/0x6f0 [ 14.441194] ret_from_fork+0x116/0x1d0 [ 14.441379] ret_from_fork_asm+0x1a/0x30 [ 14.441572] [ 14.441663] The buggy address belongs to the object at ffff888102837220 [ 14.441663] which belongs to the cache kmalloc-16 of size 16 [ 14.442685] The buggy address is located 8 bytes inside of [ 14.442685] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.443333] [ 14.443408] The buggy address belongs to the physical page: [ 14.443730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.444222] flags: 0x200000000000000(node=0|zone=2) [ 14.444449] page_type: f5(slab) [ 14.444809] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.445116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.445339] page dumped because: kasan: bad access detected [ 14.445514] [ 14.445701] Memory state around the buggy address: [ 14.445957] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.446444] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.447048] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.447361] ^ [ 14.447574] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.447972] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.448204] ================================================================== [ 14.566709] ================================================================== [ 14.567415] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.568352] Read of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.568574] [ 14.568662] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.568742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.568754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.568775] Call Trace: [ 14.568800] <TASK> [ 14.568817] dump_stack_lvl+0x73/0xb0 [ 14.568858] print_report+0xd1/0x610 [ 14.568880] ? __virt_addr_valid+0x1db/0x2d0 [ 14.568931] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.568959] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.568981] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.569019] kasan_report+0x141/0x180 [ 14.569041] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.569103] kasan_check_range+0x10c/0x1c0 [ 14.569127] __kasan_check_read+0x15/0x20 [ 14.569146] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.569173] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.569203] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.569226] ? trace_hardirqs_on+0x37/0xe0 [ 14.569249] ? kasan_bitops_generic+0x92/0x1c0 [ 14.569314] kasan_bitops_generic+0x121/0x1c0 [ 14.569337] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.569389] ? __pfx_read_tsc+0x10/0x10 [ 14.569410] ? ktime_get_ts64+0x86/0x230 [ 14.569435] kunit_try_run_case+0x1a5/0x480 [ 14.569485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.569508] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.569562] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.569587] ? __kthread_parkme+0x82/0x180 [ 14.569609] ? preempt_count_sub+0x50/0x80 [ 14.569636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.569660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.569684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.569708] kthread+0x337/0x6f0 [ 14.569727] ? trace_preempt_on+0x20/0xc0 [ 14.569749] ? __pfx_kthread+0x10/0x10 [ 14.569769] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.569790] ? calculate_sigpending+0x7b/0xa0 [ 14.569815] ? __pfx_kthread+0x10/0x10 [ 14.569836] ret_from_fork+0x116/0x1d0 [ 14.569855] ? __pfx_kthread+0x10/0x10 [ 14.569875] ret_from_fork_asm+0x1a/0x30 [ 14.569917] </TASK> [ 14.569927] [ 14.586235] Allocated by task 278: [ 14.586568] kasan_save_stack+0x45/0x70 [ 14.586883] kasan_save_track+0x18/0x40 [ 14.587240] kasan_save_alloc_info+0x3b/0x50 [ 14.587562] __kasan_kmalloc+0xb7/0xc0 [ 14.587705] __kmalloc_cache_noprof+0x189/0x420 [ 14.587865] kasan_bitops_generic+0x92/0x1c0 [ 14.588126] kunit_try_run_case+0x1a5/0x480 [ 14.588276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.588527] kthread+0x337/0x6f0 [ 14.588757] ret_from_fork+0x116/0x1d0 [ 14.588940] ret_from_fork_asm+0x1a/0x30 [ 14.589197] [ 14.589377] The buggy address belongs to the object at ffff888102837220 [ 14.589377] which belongs to the cache kmalloc-16 of size 16 [ 14.589803] The buggy address is located 8 bytes inside of [ 14.589803] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.590651] [ 14.590828] The buggy address belongs to the physical page: [ 14.591181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.591524] flags: 0x200000000000000(node=0|zone=2) [ 14.591783] page_type: f5(slab) [ 14.591960] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.592346] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.592615] page dumped because: kasan: bad access detected [ 14.592886] [ 14.592995] Memory state around the buggy address: [ 14.593288] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.593795] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.594247] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.594697] ^ [ 14.594900] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.595237] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.595599] ================================================================== [ 14.448763] ================================================================== [ 14.449191] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.449621] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.450035] [ 14.450167] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.450208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.450219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.450240] Call Trace: [ 14.450273] <TASK> [ 14.450288] dump_stack_lvl+0x73/0xb0 [ 14.450317] print_report+0xd1/0x610 [ 14.450339] ? __virt_addr_valid+0x1db/0x2d0 [ 14.450361] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.450389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.450412] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.450441] kasan_report+0x141/0x180 [ 14.450462] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.450496] kasan_check_range+0x10c/0x1c0 [ 14.450520] __kasan_check_write+0x18/0x20 [ 14.450538] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.450584] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.450614] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.450834] ? trace_hardirqs_on+0x37/0xe0 [ 14.450857] ? kasan_bitops_generic+0x92/0x1c0 [ 14.451028] kasan_bitops_generic+0x121/0x1c0 [ 14.451060] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.451085] ? __pfx_read_tsc+0x10/0x10 [ 14.451105] ? ktime_get_ts64+0x86/0x230 [ 14.451130] kunit_try_run_case+0x1a5/0x480 [ 14.451180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.451202] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.451227] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.451250] ? __kthread_parkme+0x82/0x180 [ 14.451270] ? preempt_count_sub+0x50/0x80 [ 14.451294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.451336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.451361] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.451384] kthread+0x337/0x6f0 [ 14.451403] ? trace_preempt_on+0x20/0xc0 [ 14.451425] ? __pfx_kthread+0x10/0x10 [ 14.451445] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.451467] ? calculate_sigpending+0x7b/0xa0 [ 14.451507] ? __pfx_kthread+0x10/0x10 [ 14.451528] ret_from_fork+0x116/0x1d0 [ 14.451547] ? __pfx_kthread+0x10/0x10 [ 14.451567] ret_from_fork_asm+0x1a/0x30 [ 14.451599] </TASK> [ 14.451609] [ 14.460460] Allocated by task 278: [ 14.460593] kasan_save_stack+0x45/0x70 [ 14.460922] kasan_save_track+0x18/0x40 [ 14.461300] kasan_save_alloc_info+0x3b/0x50 [ 14.461614] __kasan_kmalloc+0xb7/0xc0 [ 14.461834] __kmalloc_cache_noprof+0x189/0x420 [ 14.462201] kasan_bitops_generic+0x92/0x1c0 [ 14.462416] kunit_try_run_case+0x1a5/0x480 [ 14.462809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.463398] kthread+0x337/0x6f0 [ 14.463721] ret_from_fork+0x116/0x1d0 [ 14.463904] ret_from_fork_asm+0x1a/0x30 [ 14.464090] [ 14.464162] The buggy address belongs to the object at ffff888102837220 [ 14.464162] which belongs to the cache kmalloc-16 of size 16 [ 14.464825] The buggy address is located 8 bytes inside of [ 14.464825] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.465337] [ 14.465408] The buggy address belongs to the physical page: [ 14.465842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.466210] flags: 0x200000000000000(node=0|zone=2) [ 14.466452] page_type: f5(slab) [ 14.466827] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.468454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.468692] page dumped because: kasan: bad access detected [ 14.468861] [ 14.468946] Memory state around the buggy address: [ 14.469876] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.471571] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.472384] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.472619] ^ [ 14.472773] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.473007] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.473240] ================================================================== [ 14.596220] ================================================================== [ 14.596632] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.596924] Read of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.597284] [ 14.597427] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.597482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.597492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.597513] Call Trace: [ 14.597527] <TASK> [ 14.597543] dump_stack_lvl+0x73/0xb0 [ 14.597585] print_report+0xd1/0x610 [ 14.597606] ? __virt_addr_valid+0x1db/0x2d0 [ 14.597630] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.597658] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.597681] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.597710] kasan_report+0x141/0x180 [ 14.597732] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.597766] __asan_report_load8_noabort+0x18/0x20 [ 14.597791] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.597820] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.597849] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.597873] ? trace_hardirqs_on+0x37/0xe0 [ 14.597904] ? kasan_bitops_generic+0x92/0x1c0 [ 14.597933] kasan_bitops_generic+0x121/0x1c0 [ 14.597956] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.597981] ? __pfx_read_tsc+0x10/0x10 [ 14.598002] ? ktime_get_ts64+0x86/0x230 [ 14.598027] kunit_try_run_case+0x1a5/0x480 [ 14.598051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.598074] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.598098] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.598122] ? __kthread_parkme+0x82/0x180 [ 14.598165] ? preempt_count_sub+0x50/0x80 [ 14.598199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.598223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.598259] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.598284] kthread+0x337/0x6f0 [ 14.598302] ? trace_preempt_on+0x20/0xc0 [ 14.598342] ? __pfx_kthread+0x10/0x10 [ 14.598371] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.598393] ? calculate_sigpending+0x7b/0xa0 [ 14.598417] ? __pfx_kthread+0x10/0x10 [ 14.598449] ret_from_fork+0x116/0x1d0 [ 14.598468] ? __pfx_kthread+0x10/0x10 [ 14.598487] ret_from_fork_asm+0x1a/0x30 [ 14.598567] </TASK> [ 14.598578] [ 14.609773] Allocated by task 278: [ 14.610072] kasan_save_stack+0x45/0x70 [ 14.610291] kasan_save_track+0x18/0x40 [ 14.610489] kasan_save_alloc_info+0x3b/0x50 [ 14.611257] __kasan_kmalloc+0xb7/0xc0 [ 14.611627] __kmalloc_cache_noprof+0x189/0x420 [ 14.611864] kasan_bitops_generic+0x92/0x1c0 [ 14.612195] kunit_try_run_case+0x1a5/0x480 [ 14.612505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.612927] kthread+0x337/0x6f0 [ 14.613248] ret_from_fork+0x116/0x1d0 [ 14.613692] ret_from_fork_asm+0x1a/0x30 [ 14.613888] [ 14.614182] The buggy address belongs to the object at ffff888102837220 [ 14.614182] which belongs to the cache kmalloc-16 of size 16 [ 14.614815] The buggy address is located 8 bytes inside of [ 14.614815] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.615407] [ 14.615504] The buggy address belongs to the physical page: [ 14.616220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.616795] flags: 0x200000000000000(node=0|zone=2) [ 14.617070] page_type: f5(slab) [ 14.617502] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.618031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.618442] page dumped because: kasan: bad access detected [ 14.618912] [ 14.619012] Memory state around the buggy address: [ 14.619241] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.619492] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.620138] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.620404] ^ [ 14.620850] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.621322] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.621876] ================================================================== [ 14.497474] ================================================================== [ 14.498069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.498385] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.498636] [ 14.498906] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.499011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.499069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.499090] Call Trace: [ 14.499106] <TASK> [ 14.499122] dump_stack_lvl+0x73/0xb0 [ 14.499215] print_report+0xd1/0x610 [ 14.499264] ? __virt_addr_valid+0x1db/0x2d0 [ 14.499287] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.499315] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.499338] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.499367] kasan_report+0x141/0x180 [ 14.499388] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.499422] kasan_check_range+0x10c/0x1c0 [ 14.499446] __kasan_check_write+0x18/0x20 [ 14.499464] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.499493] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.499559] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.499583] ? trace_hardirqs_on+0x37/0xe0 [ 14.499606] ? kasan_bitops_generic+0x92/0x1c0 [ 14.499633] kasan_bitops_generic+0x121/0x1c0 [ 14.499657] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.499682] ? __pfx_read_tsc+0x10/0x10 [ 14.499703] ? ktime_get_ts64+0x86/0x230 [ 14.499728] kunit_try_run_case+0x1a5/0x480 [ 14.499752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.499774] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.499798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.499822] ? __kthread_parkme+0x82/0x180 [ 14.499841] ? preempt_count_sub+0x50/0x80 [ 14.499866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.499890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.499924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.500046] kthread+0x337/0x6f0 [ 14.500066] ? trace_preempt_on+0x20/0xc0 [ 14.500089] ? __pfx_kthread+0x10/0x10 [ 14.500109] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.500130] ? calculate_sigpending+0x7b/0xa0 [ 14.500154] ? __pfx_kthread+0x10/0x10 [ 14.500176] ret_from_fork+0x116/0x1d0 [ 14.500195] ? __pfx_kthread+0x10/0x10 [ 14.500216] ret_from_fork_asm+0x1a/0x30 [ 14.500248] </TASK> [ 14.500258] [ 14.516668] Allocated by task 278: [ 14.517000] kasan_save_stack+0x45/0x70 [ 14.517678] kasan_save_track+0x18/0x40 [ 14.518108] kasan_save_alloc_info+0x3b/0x50 [ 14.518681] __kasan_kmalloc+0xb7/0xc0 [ 14.519166] __kmalloc_cache_noprof+0x189/0x420 [ 14.519733] kasan_bitops_generic+0x92/0x1c0 [ 14.520287] kunit_try_run_case+0x1a5/0x480 [ 14.520813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.521199] kthread+0x337/0x6f0 [ 14.521661] ret_from_fork+0x116/0x1d0 [ 14.521979] ret_from_fork_asm+0x1a/0x30 [ 14.522144] [ 14.522465] The buggy address belongs to the object at ffff888102837220 [ 14.522465] which belongs to the cache kmalloc-16 of size 16 [ 14.523784] The buggy address is located 8 bytes inside of [ 14.523784] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.524724] [ 14.524979] The buggy address belongs to the physical page: [ 14.525466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.526126] flags: 0x200000000000000(node=0|zone=2) [ 14.526698] page_type: f5(slab) [ 14.527132] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.527765] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.528374] page dumped because: kasan: bad access detected [ 14.528855] [ 14.528944] Memory state around the buggy address: [ 14.529486] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.530221] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.530455] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.531377] ^ [ 14.532006] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.532263] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.533103] ================================================================== [ 14.405261] ================================================================== [ 14.405588] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.406086] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.406444] [ 14.406529] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.406571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.406581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.406602] Call Trace: [ 14.406616] <TASK> [ 14.406629] dump_stack_lvl+0x73/0xb0 [ 14.406657] print_report+0xd1/0x610 [ 14.406679] ? __virt_addr_valid+0x1db/0x2d0 [ 14.406703] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.406730] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.406754] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.406788] kasan_report+0x141/0x180 [ 14.406809] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.406844] kasan_check_range+0x10c/0x1c0 [ 14.406867] __kasan_check_write+0x18/0x20 [ 14.406886] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.406926] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.406956] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.406981] ? trace_hardirqs_on+0x37/0xe0 [ 14.407004] ? kasan_bitops_generic+0x92/0x1c0 [ 14.407033] kasan_bitops_generic+0x121/0x1c0 [ 14.407057] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.407083] ? __pfx_read_tsc+0x10/0x10 [ 14.407104] ? ktime_get_ts64+0x86/0x230 [ 14.407128] kunit_try_run_case+0x1a5/0x480 [ 14.407153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.407176] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.407200] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.407224] ? __kthread_parkme+0x82/0x180 [ 14.407245] ? preempt_count_sub+0x50/0x80 [ 14.407270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.407294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.407319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.407343] kthread+0x337/0x6f0 [ 14.407446] ? trace_preempt_on+0x20/0xc0 [ 14.407489] ? __pfx_kthread+0x10/0x10 [ 14.407510] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.407546] ? calculate_sigpending+0x7b/0xa0 [ 14.407584] ? __pfx_kthread+0x10/0x10 [ 14.407618] ret_from_fork+0x116/0x1d0 [ 14.407637] ? __pfx_kthread+0x10/0x10 [ 14.407670] ret_from_fork_asm+0x1a/0x30 [ 14.407716] </TASK> [ 14.407739] [ 14.417788] Allocated by task 278: [ 14.418077] kasan_save_stack+0x45/0x70 [ 14.418307] kasan_save_track+0x18/0x40 [ 14.418501] kasan_save_alloc_info+0x3b/0x50 [ 14.418743] __kasan_kmalloc+0xb7/0xc0 [ 14.418938] __kmalloc_cache_noprof+0x189/0x420 [ 14.419240] kasan_bitops_generic+0x92/0x1c0 [ 14.419405] kunit_try_run_case+0x1a5/0x480 [ 14.419727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.420037] kthread+0x337/0x6f0 [ 14.420179] ret_from_fork+0x116/0x1d0 [ 14.420387] ret_from_fork_asm+0x1a/0x30 [ 14.420782] [ 14.420924] The buggy address belongs to the object at ffff888102837220 [ 14.420924] which belongs to the cache kmalloc-16 of size 16 [ 14.421430] The buggy address is located 8 bytes inside of [ 14.421430] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.422003] [ 14.422125] The buggy address belongs to the physical page: [ 14.422348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.422735] flags: 0x200000000000000(node=0|zone=2) [ 14.423016] page_type: f5(slab) [ 14.423186] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.423467] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.423943] page dumped because: kasan: bad access detected [ 14.424197] [ 14.424291] Memory state around the buggy address: [ 14.424523] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.425029] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.425362] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.425739] ^ [ 14.426013] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.426314] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.426648] ==================================================================