Date
July 23, 2025, 2:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.886736] ================================================================== [ 17.887049] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 17.887346] Call trace: [ 17.887582] __asan_report_load8_noabort+0x20/0x30 [ 17.887709] kasan_bitops_generic+0x11c/0x1c8 [ 17.889135] __kasan_kmalloc+0xd4/0xd8 [ 17.891839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.893886] fff00000c5961200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.894696] fff00000c5961380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.896165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 17.896837] Hardware name: linux,dummy-virt (DT) [ 17.897463] kasan_report+0xdc/0x128 [ 17.899015] ret_from_fork+0x10/0x20 [ 17.899668] kasan_save_alloc_info+0x40/0x58 [ 17.900949] ret_from_fork+0x10/0x20 [ 17.901371] [ 17.901979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105961 [ 17.903403] fff00000c5961200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.903784] fff00000c5961380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.905673] Read of size 8 at addr fff00000c59612a8 by task kunit_try_catch/261 [ 17.906127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.906678] print_report+0x118/0x5d0 [ 17.907270] kasan_bitops_generic+0x11c/0x1c8 [ 17.908984] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.910307] The buggy address is located 8 bytes inside of [ 17.910307] allocated 9-byte region [fff00000c59612a0, fff00000c59612a9) [ 17.911393] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.912065] fff00000c5961200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.912608] ==================================================================
[ 14.840566] ================================================================== [ 14.841138] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.841505] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.842006] [ 14.842116] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.842161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.842173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.842194] Call Trace: [ 14.842208] <TASK> [ 14.842223] dump_stack_lvl+0x73/0xb0 [ 14.842251] print_report+0xd1/0x610 [ 14.842273] ? __virt_addr_valid+0x1db/0x2d0 [ 14.842317] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.842344] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.842366] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.842394] kasan_report+0x141/0x180 [ 14.842416] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.842448] kasan_check_range+0x10c/0x1c0 [ 14.842470] __kasan_check_write+0x18/0x20 [ 14.842490] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.842517] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.842546] ? ret_from_fork_asm+0x1a/0x30 [ 14.842567] ? kthread+0x337/0x6f0 [ 14.842591] kasan_bitops_generic+0x121/0x1c0 [ 14.842613] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.842637] ? __pfx_read_tsc+0x10/0x10 [ 14.842659] ? ktime_get_ts64+0x86/0x230 [ 14.842681] kunit_try_run_case+0x1a5/0x480 [ 14.842705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.842746] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.842771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.842794] ? __kthread_parkme+0x82/0x180 [ 14.842823] ? preempt_count_sub+0x50/0x80 [ 14.842847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.842870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.842893] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.842917] kthread+0x337/0x6f0 [ 14.842937] ? trace_preempt_on+0x20/0xc0 [ 14.842960] ? __pfx_kthread+0x10/0x10 [ 14.842980] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.843001] ? calculate_sigpending+0x7b/0xa0 [ 14.843024] ? __pfx_kthread+0x10/0x10 [ 14.843045] ret_from_fork+0x116/0x1d0 [ 14.843063] ? __pfx_kthread+0x10/0x10 [ 14.843083] ret_from_fork_asm+0x1a/0x30 [ 14.843126] </TASK> [ 14.843137] [ 14.851266] Allocated by task 278: [ 14.851448] kasan_save_stack+0x45/0x70 [ 14.851613] kasan_save_track+0x18/0x40 [ 14.851830] kasan_save_alloc_info+0x3b/0x50 [ 14.852019] __kasan_kmalloc+0xb7/0xc0 [ 14.852221] __kmalloc_cache_noprof+0x189/0x420 [ 14.852453] kasan_bitops_generic+0x92/0x1c0 [ 14.852662] kunit_try_run_case+0x1a5/0x480 [ 14.852888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.853229] kthread+0x337/0x6f0 [ 14.853381] ret_from_fork+0x116/0x1d0 [ 14.853571] ret_from_fork_asm+0x1a/0x30 [ 14.853764] [ 14.853854] The buggy address belongs to the object at ffff8881025ca080 [ 14.853854] which belongs to the cache kmalloc-16 of size 16 [ 14.854355] The buggy address is located 8 bytes inside of [ 14.854355] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.854710] [ 14.854785] The buggy address belongs to the physical page: [ 14.854969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.855341] flags: 0x200000000000000(node=0|zone=2) [ 14.855761] page_type: f5(slab) [ 14.855942] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.856472] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.856804] page dumped because: kasan: bad access detected [ 14.857040] [ 14.857150] Memory state around the buggy address: [ 14.857368] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.857672] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.857902] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.858118] ^ [ 14.858242] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.858558] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.858902] ================================================================== [ 14.788686] ================================================================== [ 14.789063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.789477] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.790606] [ 14.790729] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.790786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.790799] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.790831] Call Trace: [ 14.790846] <TASK> [ 14.790860] dump_stack_lvl+0x73/0xb0 [ 14.790889] print_report+0xd1/0x610 [ 14.790910] ? __virt_addr_valid+0x1db/0x2d0 [ 14.790932] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.790959] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.790981] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.791008] kasan_report+0x141/0x180 [ 14.791029] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.791061] kasan_check_range+0x10c/0x1c0 [ 14.791085] __kasan_check_write+0x18/0x20 [ 14.791104] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.791131] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.791160] ? ret_from_fork_asm+0x1a/0x30 [ 14.791182] ? kthread+0x337/0x6f0 [ 14.791205] kasan_bitops_generic+0x121/0x1c0 [ 14.791228] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.791252] ? __pfx_read_tsc+0x10/0x10 [ 14.791272] ? ktime_get_ts64+0x86/0x230 [ 14.791295] kunit_try_run_case+0x1a5/0x480 [ 14.791321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.791344] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.791366] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.791389] ? __kthread_parkme+0x82/0x180 [ 14.791409] ? preempt_count_sub+0x50/0x80 [ 14.791431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.791455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.791478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.791501] kthread+0x337/0x6f0 [ 14.791520] ? trace_preempt_on+0x20/0xc0 [ 14.791542] ? __pfx_kthread+0x10/0x10 [ 14.791563] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.791583] ? calculate_sigpending+0x7b/0xa0 [ 14.791606] ? __pfx_kthread+0x10/0x10 [ 14.791627] ret_from_fork+0x116/0x1d0 [ 14.791645] ? __pfx_kthread+0x10/0x10 [ 14.791665] ret_from_fork_asm+0x1a/0x30 [ 14.791694] </TASK> [ 14.791704] [ 14.807591] Allocated by task 278: [ 14.807740] kasan_save_stack+0x45/0x70 [ 14.807904] kasan_save_track+0x18/0x40 [ 14.808043] kasan_save_alloc_info+0x3b/0x50 [ 14.808194] __kasan_kmalloc+0xb7/0xc0 [ 14.808361] __kmalloc_cache_noprof+0x189/0x420 [ 14.808547] kasan_bitops_generic+0x92/0x1c0 [ 14.808698] kunit_try_run_case+0x1a5/0x480 [ 14.808910] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.809249] kthread+0x337/0x6f0 [ 14.809403] ret_from_fork+0x116/0x1d0 [ 14.809569] ret_from_fork_asm+0x1a/0x30 [ 14.809744] [ 14.809828] The buggy address belongs to the object at ffff8881025ca080 [ 14.809828] which belongs to the cache kmalloc-16 of size 16 [ 14.810451] The buggy address is located 8 bytes inside of [ 14.810451] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.810945] [ 14.811025] The buggy address belongs to the physical page: [ 14.811380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.811739] flags: 0x200000000000000(node=0|zone=2) [ 14.811959] page_type: f5(slab) [ 14.812141] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.812380] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.812705] page dumped because: kasan: bad access detected [ 14.812940] [ 14.813012] Memory state around the buggy address: [ 14.813168] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.813551] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.813875] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.814221] ^ [ 14.814345] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.814561] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.814883] ================================================================== [ 14.859469] ================================================================== [ 14.860219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.860563] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.860911] [ 14.860997] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.861063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.861075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.861096] Call Trace: [ 14.861108] <TASK> [ 14.861123] dump_stack_lvl+0x73/0xb0 [ 14.861149] print_report+0xd1/0x610 [ 14.861170] ? __virt_addr_valid+0x1db/0x2d0 [ 14.861191] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.861218] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.861240] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.861268] kasan_report+0x141/0x180 [ 14.861291] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.861322] kasan_check_range+0x10c/0x1c0 [ 14.861346] __kasan_check_write+0x18/0x20 [ 14.861365] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.861392] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.861421] ? ret_from_fork_asm+0x1a/0x30 [ 14.861442] ? kthread+0x337/0x6f0 [ 14.861488] kasan_bitops_generic+0x121/0x1c0 [ 14.861512] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.861537] ? __pfx_read_tsc+0x10/0x10 [ 14.861556] ? ktime_get_ts64+0x86/0x230 [ 14.861579] kunit_try_run_case+0x1a5/0x480 [ 14.861603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.861625] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.861665] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.861689] ? __kthread_parkme+0x82/0x180 [ 14.861708] ? preempt_count_sub+0x50/0x80 [ 14.861731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.861754] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.861778] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.861800] kthread+0x337/0x6f0 [ 14.861829] ? trace_preempt_on+0x20/0xc0 [ 14.861851] ? __pfx_kthread+0x10/0x10 [ 14.861871] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.861892] ? calculate_sigpending+0x7b/0xa0 [ 14.861915] ? __pfx_kthread+0x10/0x10 [ 14.861936] ret_from_fork+0x116/0x1d0 [ 14.861954] ? __pfx_kthread+0x10/0x10 [ 14.861975] ret_from_fork_asm+0x1a/0x30 [ 14.862005] </TASK> [ 14.862015] [ 14.870027] Allocated by task 278: [ 14.870203] kasan_save_stack+0x45/0x70 [ 14.870464] kasan_save_track+0x18/0x40 [ 14.870602] kasan_save_alloc_info+0x3b/0x50 [ 14.870755] __kasan_kmalloc+0xb7/0xc0 [ 14.870898] __kmalloc_cache_noprof+0x189/0x420 [ 14.871053] kasan_bitops_generic+0x92/0x1c0 [ 14.871515] kunit_try_run_case+0x1a5/0x480 [ 14.871727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.872014] kthread+0x337/0x6f0 [ 14.872299] ret_from_fork+0x116/0x1d0 [ 14.872487] ret_from_fork_asm+0x1a/0x30 [ 14.872676] [ 14.872774] The buggy address belongs to the object at ffff8881025ca080 [ 14.872774] which belongs to the cache kmalloc-16 of size 16 [ 14.873353] The buggy address is located 8 bytes inside of [ 14.873353] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.873761] [ 14.873844] The buggy address belongs to the physical page: [ 14.874017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.874582] flags: 0x200000000000000(node=0|zone=2) [ 14.874830] page_type: f5(slab) [ 14.874996] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.875329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.875657] page dumped because: kasan: bad access detected [ 14.875848] [ 14.875918] Memory state around the buggy address: [ 14.876241] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.876512] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.876729] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.877054] ^ [ 14.877225] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.877535] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.877880] ================================================================== [ 14.915692] ================================================================== [ 14.915959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.916232] Read of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.916647] [ 14.916795] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.916852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.916864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.916884] Call Trace: [ 14.916897] <TASK> [ 14.916910] dump_stack_lvl+0x73/0xb0 [ 14.916937] print_report+0xd1/0x610 [ 14.916958] ? __virt_addr_valid+0x1db/0x2d0 [ 14.916981] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.917008] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.917030] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.917057] kasan_report+0x141/0x180 [ 14.917078] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.917119] __asan_report_load8_noabort+0x18/0x20 [ 14.917144] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.917172] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.917199] ? ret_from_fork_asm+0x1a/0x30 [ 14.917221] ? kthread+0x337/0x6f0 [ 14.917245] kasan_bitops_generic+0x121/0x1c0 [ 14.917268] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.917292] ? __pfx_read_tsc+0x10/0x10 [ 14.917312] ? ktime_get_ts64+0x86/0x230 [ 14.917335] kunit_try_run_case+0x1a5/0x480 [ 14.917359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.917381] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.917405] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.917427] ? __kthread_parkme+0x82/0x180 [ 14.917447] ? preempt_count_sub+0x50/0x80 [ 14.917470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.917493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.917515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.917538] kthread+0x337/0x6f0 [ 14.917557] ? trace_preempt_on+0x20/0xc0 [ 14.917579] ? __pfx_kthread+0x10/0x10 [ 14.917599] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.917621] ? calculate_sigpending+0x7b/0xa0 [ 14.917644] ? __pfx_kthread+0x10/0x10 [ 14.917665] ret_from_fork+0x116/0x1d0 [ 14.917683] ? __pfx_kthread+0x10/0x10 [ 14.917703] ret_from_fork_asm+0x1a/0x30 [ 14.917756] </TASK> [ 14.917765] [ 14.925404] Allocated by task 278: [ 14.925535] kasan_save_stack+0x45/0x70 [ 14.925678] kasan_save_track+0x18/0x40 [ 14.925825] kasan_save_alloc_info+0x3b/0x50 [ 14.926037] __kasan_kmalloc+0xb7/0xc0 [ 14.926378] __kmalloc_cache_noprof+0x189/0x420 [ 14.926624] kasan_bitops_generic+0x92/0x1c0 [ 14.926869] kunit_try_run_case+0x1a5/0x480 [ 14.927101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.927375] kthread+0x337/0x6f0 [ 14.927563] ret_from_fork+0x116/0x1d0 [ 14.927717] ret_from_fork_asm+0x1a/0x30 [ 14.927869] [ 14.927970] The buggy address belongs to the object at ffff8881025ca080 [ 14.927970] which belongs to the cache kmalloc-16 of size 16 [ 14.928735] The buggy address is located 8 bytes inside of [ 14.928735] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.929176] [ 14.929252] The buggy address belongs to the physical page: [ 14.929426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.930121] flags: 0x200000000000000(node=0|zone=2) [ 14.930376] page_type: f5(slab) [ 14.930543] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.930790] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.931062] page dumped because: kasan: bad access detected [ 14.931326] [ 14.931421] Memory state around the buggy address: [ 14.931658] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.931929] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.932244] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.932555] ^ [ 14.932677] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.933026] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.933443] ================================================================== [ 14.750871] ================================================================== [ 14.751416] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.751799] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.752125] [ 14.752222] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.752265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.752278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.752298] Call Trace: [ 14.752310] <TASK> [ 14.752323] dump_stack_lvl+0x73/0xb0 [ 14.752350] print_report+0xd1/0x610 [ 14.752371] ? __virt_addr_valid+0x1db/0x2d0 [ 14.752394] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.752420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.752442] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.752469] kasan_report+0x141/0x180 [ 14.752491] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.752522] kasan_check_range+0x10c/0x1c0 [ 14.752544] __kasan_check_write+0x18/0x20 [ 14.752564] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.752591] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.752620] ? ret_from_fork_asm+0x1a/0x30 [ 14.752642] ? kthread+0x337/0x6f0 [ 14.752666] kasan_bitops_generic+0x121/0x1c0 [ 14.752689] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.752713] ? __pfx_read_tsc+0x10/0x10 [ 14.752734] ? ktime_get_ts64+0x86/0x230 [ 14.752757] kunit_try_run_case+0x1a5/0x480 [ 14.752781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.752803] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.752837] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.752866] ? __kthread_parkme+0x82/0x180 [ 14.752886] ? preempt_count_sub+0x50/0x80 [ 14.752909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.752933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.752956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.752979] kthread+0x337/0x6f0 [ 14.752998] ? trace_preempt_on+0x20/0xc0 [ 14.753021] ? __pfx_kthread+0x10/0x10 [ 14.753042] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.753062] ? calculate_sigpending+0x7b/0xa0 [ 14.753086] ? __pfx_kthread+0x10/0x10 [ 14.753118] ret_from_fork+0x116/0x1d0 [ 14.753136] ? __pfx_kthread+0x10/0x10 [ 14.753157] ret_from_fork_asm+0x1a/0x30 [ 14.753187] </TASK> [ 14.753197] [ 14.760754] Allocated by task 278: [ 14.760895] kasan_save_stack+0x45/0x70 [ 14.761038] kasan_save_track+0x18/0x40 [ 14.761175] kasan_save_alloc_info+0x3b/0x50 [ 14.761324] __kasan_kmalloc+0xb7/0xc0 [ 14.761458] __kmalloc_cache_noprof+0x189/0x420 [ 14.761682] kasan_bitops_generic+0x92/0x1c0 [ 14.761903] kunit_try_run_case+0x1a5/0x480 [ 14.762111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.762505] kthread+0x337/0x6f0 [ 14.762678] ret_from_fork+0x116/0x1d0 [ 14.762874] ret_from_fork_asm+0x1a/0x30 [ 14.763067] [ 14.763160] The buggy address belongs to the object at ffff8881025ca080 [ 14.763160] which belongs to the cache kmalloc-16 of size 16 [ 14.763650] The buggy address is located 8 bytes inside of [ 14.763650] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.764012] [ 14.764084] The buggy address belongs to the physical page: [ 14.764257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.764498] flags: 0x200000000000000(node=0|zone=2) [ 14.764745] page_type: f5(slab) [ 14.764927] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.765491] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.765842] page dumped because: kasan: bad access detected [ 14.766102] [ 14.766199] Memory state around the buggy address: [ 14.766431] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.766715] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.766982] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.767488] ^ [ 14.767618] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.767850] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.768284] ================================================================== [ 14.878439] ================================================================== [ 14.878805] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.879249] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.879542] [ 14.879652] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.879715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.879727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.879749] Call Trace: [ 14.879762] <TASK> [ 14.879776] dump_stack_lvl+0x73/0xb0 [ 14.879802] print_report+0xd1/0x610 [ 14.879834] ? __virt_addr_valid+0x1db/0x2d0 [ 14.879856] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.879902] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.879924] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.879951] kasan_report+0x141/0x180 [ 14.879973] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.880004] kasan_check_range+0x10c/0x1c0 [ 14.880028] __kasan_check_write+0x18/0x20 [ 14.880047] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.880074] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.880103] ? ret_from_fork_asm+0x1a/0x30 [ 14.880124] ? kthread+0x337/0x6f0 [ 14.880148] kasan_bitops_generic+0x121/0x1c0 [ 14.880170] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.880194] ? __pfx_read_tsc+0x10/0x10 [ 14.880215] ? ktime_get_ts64+0x86/0x230 [ 14.880237] kunit_try_run_case+0x1a5/0x480 [ 14.880262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.880284] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.880307] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.880331] ? __kthread_parkme+0x82/0x180 [ 14.880350] ? preempt_count_sub+0x50/0x80 [ 14.880372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.880396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.880419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.880443] kthread+0x337/0x6f0 [ 14.880462] ? trace_preempt_on+0x20/0xc0 [ 14.880484] ? __pfx_kthread+0x10/0x10 [ 14.880504] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.880525] ? calculate_sigpending+0x7b/0xa0 [ 14.880548] ? __pfx_kthread+0x10/0x10 [ 14.880569] ret_from_fork+0x116/0x1d0 [ 14.880586] ? __pfx_kthread+0x10/0x10 [ 14.880606] ret_from_fork_asm+0x1a/0x30 [ 14.880635] </TASK> [ 14.880644] [ 14.888566] Allocated by task 278: [ 14.888743] kasan_save_stack+0x45/0x70 [ 14.888957] kasan_save_track+0x18/0x40 [ 14.889184] kasan_save_alloc_info+0x3b/0x50 [ 14.889387] __kasan_kmalloc+0xb7/0xc0 [ 14.889568] __kmalloc_cache_noprof+0x189/0x420 [ 14.889721] kasan_bitops_generic+0x92/0x1c0 [ 14.889876] kunit_try_run_case+0x1a5/0x480 [ 14.890019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.890504] kthread+0x337/0x6f0 [ 14.890674] ret_from_fork+0x116/0x1d0 [ 14.890848] ret_from_fork_asm+0x1a/0x30 [ 14.890998] [ 14.891075] The buggy address belongs to the object at ffff8881025ca080 [ 14.891075] which belongs to the cache kmalloc-16 of size 16 [ 14.891540] The buggy address is located 8 bytes inside of [ 14.891540] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.892030] [ 14.892104] The buggy address belongs to the physical page: [ 14.892273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.892504] flags: 0x200000000000000(node=0|zone=2) [ 14.892663] page_type: f5(slab) [ 14.892781] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.893555] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.893899] page dumped because: kasan: bad access detected [ 14.894224] [ 14.894304] Memory state around the buggy address: [ 14.894458] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.894682] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.894916] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.895392] ^ [ 14.895566] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.895891] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.896225] ================================================================== [ 14.897161] ================================================================== [ 14.897479] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.897806] Read of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.898210] [ 14.898322] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.898365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.898377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.898399] Call Trace: [ 14.898417] <TASK> [ 14.898433] dump_stack_lvl+0x73/0xb0 [ 14.898461] print_report+0xd1/0x610 [ 14.898482] ? __virt_addr_valid+0x1db/0x2d0 [ 14.898504] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.898530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.898553] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.898579] kasan_report+0x141/0x180 [ 14.898601] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.898633] kasan_check_range+0x10c/0x1c0 [ 14.898655] __kasan_check_read+0x15/0x20 [ 14.898673] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.898700] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.898728] ? ret_from_fork_asm+0x1a/0x30 [ 14.898751] ? kthread+0x337/0x6f0 [ 14.898774] kasan_bitops_generic+0x121/0x1c0 [ 14.898797] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.898834] ? __pfx_read_tsc+0x10/0x10 [ 14.898854] ? ktime_get_ts64+0x86/0x230 [ 14.898877] kunit_try_run_case+0x1a5/0x480 [ 14.898901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.898923] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.898946] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.898969] ? __kthread_parkme+0x82/0x180 [ 14.898988] ? preempt_count_sub+0x50/0x80 [ 14.899011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.899034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.899057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.899080] kthread+0x337/0x6f0 [ 14.899109] ? trace_preempt_on+0x20/0xc0 [ 14.899155] ? __pfx_kthread+0x10/0x10 [ 14.899175] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.899196] ? calculate_sigpending+0x7b/0xa0 [ 14.899219] ? __pfx_kthread+0x10/0x10 [ 14.899240] ret_from_fork+0x116/0x1d0 [ 14.899258] ? __pfx_kthread+0x10/0x10 [ 14.899278] ret_from_fork_asm+0x1a/0x30 [ 14.899308] </TASK> [ 14.899318] [ 14.907087] Allocated by task 278: [ 14.907446] kasan_save_stack+0x45/0x70 [ 14.907642] kasan_save_track+0x18/0x40 [ 14.907842] kasan_save_alloc_info+0x3b/0x50 [ 14.908050] __kasan_kmalloc+0xb7/0xc0 [ 14.908439] __kmalloc_cache_noprof+0x189/0x420 [ 14.908605] kasan_bitops_generic+0x92/0x1c0 [ 14.908755] kunit_try_run_case+0x1a5/0x480 [ 14.908918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.909244] kthread+0x337/0x6f0 [ 14.909415] ret_from_fork+0x116/0x1d0 [ 14.909628] ret_from_fork_asm+0x1a/0x30 [ 14.909862] [ 14.909960] The buggy address belongs to the object at ffff8881025ca080 [ 14.909960] which belongs to the cache kmalloc-16 of size 16 [ 14.910466] The buggy address is located 8 bytes inside of [ 14.910466] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.910831] [ 14.910926] The buggy address belongs to the physical page: [ 14.911196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.911549] flags: 0x200000000000000(node=0|zone=2) [ 14.911783] page_type: f5(slab) [ 14.911966] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.912506] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.912910] page dumped because: kasan: bad access detected [ 14.913127] [ 14.913223] Memory state around the buggy address: [ 14.913449] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.913729] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.914037] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.914342] ^ [ 14.914467] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.914808] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.915121] ================================================================== [ 14.815874] ================================================================== [ 14.816244] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.816606] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.816890] [ 14.816979] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.817023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.817035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.817057] Call Trace: [ 14.817073] <TASK> [ 14.817090] dump_stack_lvl+0x73/0xb0 [ 14.817127] print_report+0xd1/0x610 [ 14.817149] ? __virt_addr_valid+0x1db/0x2d0 [ 14.817170] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.817197] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.817220] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.817248] kasan_report+0x141/0x180 [ 14.817269] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.817301] kasan_check_range+0x10c/0x1c0 [ 14.817324] __kasan_check_write+0x18/0x20 [ 14.817343] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.817370] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.817409] ? ret_from_fork_asm+0x1a/0x30 [ 14.817430] ? kthread+0x337/0x6f0 [ 14.817454] kasan_bitops_generic+0x121/0x1c0 [ 14.817477] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.817501] ? __pfx_read_tsc+0x10/0x10 [ 14.817521] ? ktime_get_ts64+0x86/0x230 [ 14.817544] kunit_try_run_case+0x1a5/0x480 [ 14.817568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.817590] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.817614] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.817636] ? __kthread_parkme+0x82/0x180 [ 14.817656] ? preempt_count_sub+0x50/0x80 [ 14.817678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.817701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.817724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.817747] kthread+0x337/0x6f0 [ 14.817766] ? trace_preempt_on+0x20/0xc0 [ 14.817787] ? __pfx_kthread+0x10/0x10 [ 14.817807] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.817840] ? calculate_sigpending+0x7b/0xa0 [ 14.817863] ? __pfx_kthread+0x10/0x10 [ 14.817885] ret_from_fork+0x116/0x1d0 [ 14.817903] ? __pfx_kthread+0x10/0x10 [ 14.817924] ret_from_fork_asm+0x1a/0x30 [ 14.817953] </TASK> [ 14.817963] [ 14.828070] Allocated by task 278: [ 14.828568] kasan_save_stack+0x45/0x70 [ 14.828759] kasan_save_track+0x18/0x40 [ 14.828956] kasan_save_alloc_info+0x3b/0x50 [ 14.829494] __kasan_kmalloc+0xb7/0xc0 [ 14.829760] __kmalloc_cache_noprof+0x189/0x420 [ 14.830188] kasan_bitops_generic+0x92/0x1c0 [ 14.830398] kunit_try_run_case+0x1a5/0x480 [ 14.830590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.830837] kthread+0x337/0x6f0 [ 14.830994] ret_from_fork+0x116/0x1d0 [ 14.831252] ret_from_fork_asm+0x1a/0x30 [ 14.831434] [ 14.831525] The buggy address belongs to the object at ffff8881025ca080 [ 14.831525] which belongs to the cache kmalloc-16 of size 16 [ 14.832482] The buggy address is located 8 bytes inside of [ 14.832482] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.833486] [ 14.833751] The buggy address belongs to the physical page: [ 14.834210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.834552] flags: 0x200000000000000(node=0|zone=2) [ 14.834771] page_type: f5(slab) [ 14.834936] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.835680] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.836014] page dumped because: kasan: bad access detected [ 14.836656] [ 14.836758] Memory state around the buggy address: [ 14.836989] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.837736] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.838172] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.838633] ^ [ 14.838799] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.839036] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.839389] ================================================================== [ 14.769187] ================================================================== [ 14.769557] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.769886] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.770540] [ 14.770659] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.770702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.770714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.770734] Call Trace: [ 14.770748] <TASK> [ 14.770762] dump_stack_lvl+0x73/0xb0 [ 14.770790] print_report+0xd1/0x610 [ 14.770823] ? __virt_addr_valid+0x1db/0x2d0 [ 14.770844] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.770871] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.770894] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.770923] kasan_report+0x141/0x180 [ 14.770944] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.770976] kasan_check_range+0x10c/0x1c0 [ 14.771000] __kasan_check_write+0x18/0x20 [ 14.771019] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.771046] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.771074] ? ret_from_fork_asm+0x1a/0x30 [ 14.771096] ? kthread+0x337/0x6f0 [ 14.771119] kasan_bitops_generic+0x121/0x1c0 [ 14.771142] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.771167] ? __pfx_read_tsc+0x10/0x10 [ 14.771187] ? ktime_get_ts64+0x86/0x230 [ 14.771210] kunit_try_run_case+0x1a5/0x480 [ 14.771233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.771256] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.771278] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.771301] ? __kthread_parkme+0x82/0x180 [ 14.771320] ? preempt_count_sub+0x50/0x80 [ 14.771342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.771366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.771389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.771412] kthread+0x337/0x6f0 [ 14.771431] ? trace_preempt_on+0x20/0xc0 [ 14.771453] ? __pfx_kthread+0x10/0x10 [ 14.771473] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.771494] ? calculate_sigpending+0x7b/0xa0 [ 14.771517] ? __pfx_kthread+0x10/0x10 [ 14.771538] ret_from_fork+0x116/0x1d0 [ 14.771556] ? __pfx_kthread+0x10/0x10 [ 14.771577] ret_from_fork_asm+0x1a/0x30 [ 14.771606] </TASK> [ 14.771616] [ 14.779629] Allocated by task 278: [ 14.779805] kasan_save_stack+0x45/0x70 [ 14.780019] kasan_save_track+0x18/0x40 [ 14.780347] kasan_save_alloc_info+0x3b/0x50 [ 14.780509] __kasan_kmalloc+0xb7/0xc0 [ 14.780698] __kmalloc_cache_noprof+0x189/0x420 [ 14.780895] kasan_bitops_generic+0x92/0x1c0 [ 14.781124] kunit_try_run_case+0x1a5/0x480 [ 14.781302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.781541] kthread+0x337/0x6f0 [ 14.781711] ret_from_fork+0x116/0x1d0 [ 14.781905] ret_from_fork_asm+0x1a/0x30 [ 14.782073] [ 14.782180] The buggy address belongs to the object at ffff8881025ca080 [ 14.782180] which belongs to the cache kmalloc-16 of size 16 [ 14.782632] The buggy address is located 8 bytes inside of [ 14.782632] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.783050] [ 14.783185] The buggy address belongs to the physical page: [ 14.783440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.783780] flags: 0x200000000000000(node=0|zone=2) [ 14.783974] page_type: f5(slab) [ 14.784147] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.784481] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.784776] page dumped because: kasan: bad access detected [ 14.785024] [ 14.785134] Memory state around the buggy address: [ 14.785325] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.785614] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.785866] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.786083] ^ [ 14.786216] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.786644] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.787272] ==================================================================