Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 43.754770] ================================================================== [ 43.761826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.769984] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 43.777276] [ 43.778756] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 43.778806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.778822] Hardware name: WinLink E850-96 board (DT) [ 43.778843] Call trace: [ 43.778856] show_stack+0x20/0x38 (C) [ 43.778889] dump_stack_lvl+0x8c/0xd0 [ 43.778924] print_report+0x118/0x608 [ 43.778959] kasan_report+0xdc/0x128 [ 43.778993] __asan_report_load8_noabort+0x20/0x30 [ 43.779033] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.779069] kasan_bitops_generic+0x110/0x1c8 [ 43.779102] kunit_try_run_case+0x170/0x3f0 [ 43.779137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.779174] kthread+0x328/0x630 [ 43.779201] ret_from_fork+0x10/0x20 [ 43.779234] [ 43.847066] Allocated by task 308: [ 43.850452] kasan_save_stack+0x3c/0x68 [ 43.854271] kasan_save_track+0x20/0x40 [ 43.858090] kasan_save_alloc_info+0x40/0x58 [ 43.862344] __kasan_kmalloc+0xd4/0xd8 [ 43.866076] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.870590] kasan_bitops_generic+0xa0/0x1c8 [ 43.874843] kunit_try_run_case+0x170/0x3f0 [ 43.879010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.884479] kthread+0x328/0x630 [ 43.887690] ret_from_fork+0x10/0x20 [ 43.891249] [ 43.892725] The buggy address belongs to the object at ffff000800d63060 [ 43.892725] which belongs to the cache kmalloc-16 of size 16 [ 43.905052] The buggy address is located 8 bytes inside of [ 43.905052] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 43.917291] [ 43.918767] The buggy address belongs to the physical page: [ 43.924326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.932309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.938818] page_type: f5(slab) [ 43.941952] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.949676] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.957394] page dumped because: kasan: bad access detected [ 43.962950] [ 43.964425] Memory state around the buggy address: [ 43.969204] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.976408] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.983613] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 43.990814] ^ [ 43.997415] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.004620] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.011821] ================================================================== [ 41.622131] ================================================================== [ 41.629221] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.637377] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 41.644669] [ 41.646153] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 41.646206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.646225] Hardware name: WinLink E850-96 board (DT) [ 41.646247] Call trace: [ 41.646264] show_stack+0x20/0x38 (C) [ 41.646298] dump_stack_lvl+0x8c/0xd0 [ 41.646335] print_report+0x118/0x608 [ 41.646370] kasan_report+0xdc/0x128 [ 41.646405] __asan_report_load8_noabort+0x20/0x30 [ 41.646444] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.646478] kasan_bitops_generic+0x110/0x1c8 [ 41.646510] kunit_try_run_case+0x170/0x3f0 [ 41.646546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.646586] kthread+0x328/0x630 [ 41.646615] ret_from_fork+0x10/0x20 [ 41.646649] [ 41.714459] Allocated by task 308: [ 41.717848] kasan_save_stack+0x3c/0x68 [ 41.721664] kasan_save_track+0x20/0x40 [ 41.725483] kasan_save_alloc_info+0x40/0x58 [ 41.729737] __kasan_kmalloc+0xd4/0xd8 [ 41.733470] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.737983] kasan_bitops_generic+0xa0/0x1c8 [ 41.742237] kunit_try_run_case+0x170/0x3f0 [ 41.746403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.751872] kthread+0x328/0x630 [ 41.755084] ret_from_fork+0x10/0x20 [ 41.758642] [ 41.760120] The buggy address belongs to the object at ffff000800d63060 [ 41.760120] which belongs to the cache kmalloc-16 of size 16 [ 41.772445] The buggy address is located 8 bytes inside of [ 41.772445] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 41.784684] [ 41.786161] The buggy address belongs to the physical page: [ 41.791719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 41.799703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.806213] page_type: f5(slab) [ 41.809348] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.817069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.824788] page dumped because: kasan: bad access detected [ 41.830343] [ 41.831819] Memory state around the buggy address: [ 41.836600] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.843802] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.851006] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 41.858207] ^ [ 41.864808] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.872013] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.879214] ================================================================== [ 42.954736] ================================================================== [ 42.961666] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 42.969823] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 42.977114] [ 42.978597] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 42.978650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.978668] Hardware name: WinLink E850-96 board (DT) [ 42.978690] Call trace: [ 42.978706] show_stack+0x20/0x38 (C) [ 42.978740] dump_stack_lvl+0x8c/0xd0 [ 42.978778] print_report+0x118/0x608 [ 42.978812] kasan_report+0xdc/0x128 [ 42.978844] __asan_report_load8_noabort+0x20/0x30 [ 42.978883] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 42.978920] kasan_bitops_generic+0x110/0x1c8 [ 42.978952] kunit_try_run_case+0x170/0x3f0 [ 42.978990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.979030] kthread+0x328/0x630 [ 42.979057] ret_from_fork+0x10/0x20 [ 42.979090] [ 43.046904] Allocated by task 308: [ 43.050291] kasan_save_stack+0x3c/0x68 [ 43.054109] kasan_save_track+0x20/0x40 [ 43.057929] kasan_save_alloc_info+0x40/0x58 [ 43.062182] __kasan_kmalloc+0xd4/0xd8 [ 43.065915] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.070428] kasan_bitops_generic+0xa0/0x1c8 [ 43.074682] kunit_try_run_case+0x170/0x3f0 [ 43.078848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.084317] kthread+0x328/0x630 [ 43.087529] ret_from_fork+0x10/0x20 [ 43.091088] [ 43.092563] The buggy address belongs to the object at ffff000800d63060 [ 43.092563] which belongs to the cache kmalloc-16 of size 16 [ 43.104890] The buggy address is located 8 bytes inside of [ 43.104890] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 43.117129] [ 43.118605] The buggy address belongs to the physical page: [ 43.124162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.132149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.138658] page_type: f5(slab) [ 43.141791] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.149514] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.157233] page dumped because: kasan: bad access detected [ 43.162788] [ 43.164264] Memory state around the buggy address: [ 43.169043] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.176247] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.183451] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 43.190652] ^ [ 43.197253] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.204458] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.211659] ================================================================== [ 42.419014] ================================================================== [ 42.425910] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.434067] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 42.441445] [ 42.442929] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 42.442980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.442998] Hardware name: WinLink E850-96 board (DT) [ 42.443018] Call trace: [ 42.443033] show_stack+0x20/0x38 (C) [ 42.443068] dump_stack_lvl+0x8c/0xd0 [ 42.443109] print_report+0x118/0x608 [ 42.443142] kasan_report+0xdc/0x128 [ 42.443174] kasan_check_range+0x100/0x1a8 [ 42.443211] __kasan_check_write+0x20/0x30 [ 42.443242] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.443276] kasan_bitops_generic+0x110/0x1c8 [ 42.443310] kunit_try_run_case+0x170/0x3f0 [ 42.443344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.443382] kthread+0x328/0x630 [ 42.443410] ret_from_fork+0x10/0x20 [ 42.443443] [ 42.514622] Allocated by task 308: [ 42.518006] kasan_save_stack+0x3c/0x68 [ 42.521825] kasan_save_track+0x20/0x40 [ 42.525645] kasan_save_alloc_info+0x40/0x58 [ 42.529898] __kasan_kmalloc+0xd4/0xd8 [ 42.533631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.538145] kasan_bitops_generic+0xa0/0x1c8 [ 42.542398] kunit_try_run_case+0x170/0x3f0 [ 42.546565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.552033] kthread+0x328/0x630 [ 42.555245] ret_from_fork+0x10/0x20 [ 42.558804] [ 42.560280] The buggy address belongs to the object at ffff000800d63060 [ 42.560280] which belongs to the cache kmalloc-16 of size 16 [ 42.572607] The buggy address is located 8 bytes inside of [ 42.572607] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 42.584845] [ 42.586322] The buggy address belongs to the physical page: [ 42.591881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.599863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.606375] page_type: f5(slab) [ 42.609508] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.617231] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.624949] page dumped because: kasan: bad access detected [ 42.630505] [ 42.631980] Memory state around the buggy address: [ 42.636761] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.643963] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.651168] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 42.658369] ^ [ 42.664970] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.672175] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.679376] ================================================================== [ 42.686685] ================================================================== [ 42.693788] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.701945] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 42.709323] [ 42.710805] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 42.710853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.710871] Hardware name: WinLink E850-96 board (DT) [ 42.710892] Call trace: [ 42.710906] show_stack+0x20/0x38 (C) [ 42.710942] dump_stack_lvl+0x8c/0xd0 [ 42.710977] print_report+0x118/0x608 [ 42.711012] kasan_report+0xdc/0x128 [ 42.711046] kasan_check_range+0x100/0x1a8 [ 42.711080] __kasan_check_write+0x20/0x30 [ 42.711110] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.711146] kasan_bitops_generic+0x110/0x1c8 [ 42.711178] kunit_try_run_case+0x170/0x3f0 [ 42.711210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.711248] kthread+0x328/0x630 [ 42.711274] ret_from_fork+0x10/0x20 [ 42.711306] [ 42.782499] Allocated by task 308: [ 42.785886] kasan_save_stack+0x3c/0x68 [ 42.789704] kasan_save_track+0x20/0x40 [ 42.793523] kasan_save_alloc_info+0x40/0x58 [ 42.797776] __kasan_kmalloc+0xd4/0xd8 [ 42.801509] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.806023] kasan_bitops_generic+0xa0/0x1c8 [ 42.810276] kunit_try_run_case+0x170/0x3f0 [ 42.814443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.819912] kthread+0x328/0x630 [ 42.823123] ret_from_fork+0x10/0x20 [ 42.826682] [ 42.828158] The buggy address belongs to the object at ffff000800d63060 [ 42.828158] which belongs to the cache kmalloc-16 of size 16 [ 42.840485] The buggy address is located 8 bytes inside of [ 42.840485] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 42.852723] [ 42.854199] The buggy address belongs to the physical page: [ 42.859757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.867743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.874252] page_type: f5(slab) [ 42.877384] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.885109] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.892827] page dumped because: kasan: bad access detected [ 42.898382] [ 42.899858] Memory state around the buggy address: [ 42.904639] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.911841] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.919046] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 42.926247] ^ [ 42.932848] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.940053] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.947253] ================================================================== [ 42.154405] ================================================================== [ 42.161503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.169661] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 42.176952] [ 42.178436] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 42.178487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.178504] Hardware name: WinLink E850-96 board (DT) [ 42.178525] Call trace: [ 42.178541] show_stack+0x20/0x38 (C) [ 42.178576] dump_stack_lvl+0x8c/0xd0 [ 42.178611] print_report+0x118/0x608 [ 42.178644] kasan_report+0xdc/0x128 [ 42.178678] __asan_report_load8_noabort+0x20/0x30 [ 42.178717] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.178755] kasan_bitops_generic+0x110/0x1c8 [ 42.178786] kunit_try_run_case+0x170/0x3f0 [ 42.178822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.178861] kthread+0x328/0x630 [ 42.178888] ret_from_fork+0x10/0x20 [ 42.178922] [ 42.246743] Allocated by task 308: [ 42.250128] kasan_save_stack+0x3c/0x68 [ 42.253948] kasan_save_track+0x20/0x40 [ 42.257767] kasan_save_alloc_info+0x40/0x58 [ 42.262020] __kasan_kmalloc+0xd4/0xd8 [ 42.265753] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.270267] kasan_bitops_generic+0xa0/0x1c8 [ 42.274520] kunit_try_run_case+0x170/0x3f0 [ 42.278687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.284155] kthread+0x328/0x630 [ 42.287367] ret_from_fork+0x10/0x20 [ 42.290926] [ 42.292402] The buggy address belongs to the object at ffff000800d63060 [ 42.292402] which belongs to the cache kmalloc-16 of size 16 [ 42.304729] The buggy address is located 8 bytes inside of [ 42.304729] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 42.316968] [ 42.318445] The buggy address belongs to the physical page: [ 42.323999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.331985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.338496] page_type: f5(slab) [ 42.341628] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.349353] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.357071] page dumped because: kasan: bad access detected [ 42.362626] [ 42.364102] Memory state around the buggy address: [ 42.368882] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.376085] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.383292] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 42.390491] ^ [ 42.397092] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.404297] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.411497] ================================================================== [ 43.219061] ================================================================== [ 43.226070] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.234228] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 43.241607] [ 43.243090] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 43.243140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.243159] Hardware name: WinLink E850-96 board (DT) [ 43.243180] Call trace: [ 43.243194] show_stack+0x20/0x38 (C) [ 43.243228] dump_stack_lvl+0x8c/0xd0 [ 43.243263] print_report+0x118/0x608 [ 43.243297] kasan_report+0xdc/0x128 [ 43.243330] kasan_check_range+0x100/0x1a8 [ 43.243365] __kasan_check_write+0x20/0x30 [ 43.243394] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.243429] kasan_bitops_generic+0x110/0x1c8 [ 43.243462] kunit_try_run_case+0x170/0x3f0 [ 43.243497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.243535] kthread+0x328/0x630 [ 43.243563] ret_from_fork+0x10/0x20 [ 43.243596] [ 43.314782] Allocated by task 308: [ 43.318168] kasan_save_stack+0x3c/0x68 [ 43.321987] kasan_save_track+0x20/0x40 [ 43.325807] kasan_save_alloc_info+0x40/0x58 [ 43.330060] __kasan_kmalloc+0xd4/0xd8 [ 43.333793] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.338307] kasan_bitops_generic+0xa0/0x1c8 [ 43.342560] kunit_try_run_case+0x170/0x3f0 [ 43.346727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.352195] kthread+0x328/0x630 [ 43.355407] ret_from_fork+0x10/0x20 [ 43.358966] [ 43.360442] The buggy address belongs to the object at ffff000800d63060 [ 43.360442] which belongs to the cache kmalloc-16 of size 16 [ 43.372768] The buggy address is located 8 bytes inside of [ 43.372768] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 43.385007] [ 43.386483] The buggy address belongs to the physical page: [ 43.392039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.400028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.406536] page_type: f5(slab) [ 43.409668] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.417392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.425111] page dumped because: kasan: bad access detected [ 43.430666] [ 43.432142] Memory state around the buggy address: [ 43.436921] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.444125] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.451330] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 43.458531] ^ [ 43.465131] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.472336] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.479537] ================================================================== [ 43.486941] ================================================================== [ 43.493948] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.502106] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 43.509484] [ 43.510967] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 43.511017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.511035] Hardware name: WinLink E850-96 board (DT) [ 43.511057] Call trace: [ 43.511068] show_stack+0x20/0x38 (C) [ 43.511105] dump_stack_lvl+0x8c/0xd0 [ 43.511140] print_report+0x118/0x608 [ 43.511175] kasan_report+0xdc/0x128 [ 43.511209] kasan_check_range+0x100/0x1a8 [ 43.511244] __kasan_check_write+0x20/0x30 [ 43.511273] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.511309] kasan_bitops_generic+0x110/0x1c8 [ 43.511341] kunit_try_run_case+0x170/0x3f0 [ 43.511377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.511416] kthread+0x328/0x630 [ 43.511443] ret_from_fork+0x10/0x20 [ 43.511476] [ 43.582660] Allocated by task 308: [ 43.586047] kasan_save_stack+0x3c/0x68 [ 43.589865] kasan_save_track+0x20/0x40 [ 43.593685] kasan_save_alloc_info+0x40/0x58 [ 43.597938] __kasan_kmalloc+0xd4/0xd8 [ 43.601670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.606184] kasan_bitops_generic+0xa0/0x1c8 [ 43.610438] kunit_try_run_case+0x170/0x3f0 [ 43.614604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.620073] kthread+0x328/0x630 [ 43.623285] ret_from_fork+0x10/0x20 [ 43.626844] [ 43.628319] The buggy address belongs to the object at ffff000800d63060 [ 43.628319] which belongs to the cache kmalloc-16 of size 16 [ 43.640646] The buggy address is located 8 bytes inside of [ 43.640646] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 43.652885] [ 43.654362] The buggy address belongs to the physical page: [ 43.659917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.667904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.674412] page_type: f5(slab) [ 43.677546] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.685270] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.692989] page dumped because: kasan: bad access detected [ 43.698544] [ 43.700019] Memory state around the buggy address: [ 43.704799] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.712003] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.719207] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 43.726408] ^ [ 43.733009] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.740214] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.747415] ================================================================== [ 41.352004] ================================================================== [ 41.361343] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.369500] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 41.376878] [ 41.378364] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 41.378423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.378442] Hardware name: WinLink E850-96 board (DT) [ 41.378465] Call trace: [ 41.378480] show_stack+0x20/0x38 (C) [ 41.378518] dump_stack_lvl+0x8c/0xd0 [ 41.378557] print_report+0x118/0x608 [ 41.378596] kasan_report+0xdc/0x128 [ 41.378633] kasan_check_range+0x100/0x1a8 [ 41.378670] __kasan_check_write+0x20/0x30 [ 41.378703] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.378738] kasan_bitops_generic+0x110/0x1c8 [ 41.378774] kunit_try_run_case+0x170/0x3f0 [ 41.378812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.378850] kthread+0x328/0x630 [ 41.378881] ret_from_fork+0x10/0x20 [ 41.378918] [ 41.450054] Allocated by task 308: [ 41.453442] kasan_save_stack+0x3c/0x68 [ 41.457258] kasan_save_track+0x20/0x40 [ 41.461079] kasan_save_alloc_info+0x40/0x58 [ 41.465331] __kasan_kmalloc+0xd4/0xd8 [ 41.469065] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.473577] kasan_bitops_generic+0xa0/0x1c8 [ 41.477831] kunit_try_run_case+0x170/0x3f0 [ 41.481997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.487467] kthread+0x328/0x630 [ 41.490678] ret_from_fork+0x10/0x20 [ 41.494237] [ 41.495714] The buggy address belongs to the object at ffff000800d63060 [ 41.495714] which belongs to the cache kmalloc-16 of size 16 [ 41.508041] The buggy address is located 8 bytes inside of [ 41.508041] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 41.520278] [ 41.521757] The buggy address belongs to the physical page: [ 41.527313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 41.535298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.541807] page_type: f5(slab) [ 41.544944] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.552663] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.560382] page dumped because: kasan: bad access detected [ 41.565937] [ 41.567413] Memory state around the buggy address: [ 41.572194] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.579396] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.586602] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 41.593801] ^ [ 41.600402] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.607607] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.614810] ================================================================== [ 41.886599] ================================================================== [ 41.893625] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 41.901783] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 41.909162] [ 41.910648] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 41.910701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.910718] Hardware name: WinLink E850-96 board (DT) [ 41.910739] Call trace: [ 41.910756] show_stack+0x20/0x38 (C) [ 41.910793] dump_stack_lvl+0x8c/0xd0 [ 41.910829] print_report+0x118/0x608 [ 41.910862] kasan_report+0xdc/0x128 [ 41.910897] kasan_check_range+0x100/0x1a8 [ 41.910932] __kasan_check_write+0x20/0x30 [ 41.910962] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 41.910999] kasan_bitops_generic+0x110/0x1c8 [ 41.911031] kunit_try_run_case+0x170/0x3f0 [ 41.911065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.911102] kthread+0x328/0x630 [ 41.911130] ret_from_fork+0x10/0x20 [ 41.911165] [ 41.982337] Allocated by task 308: [ 41.985724] kasan_save_stack+0x3c/0x68 [ 41.989544] kasan_save_track+0x20/0x40 [ 41.993363] kasan_save_alloc_info+0x40/0x58 [ 41.997615] __kasan_kmalloc+0xd4/0xd8 [ 42.001347] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.005861] kasan_bitops_generic+0xa0/0x1c8 [ 42.010115] kunit_try_run_case+0x170/0x3f0 [ 42.014281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.019750] kthread+0x328/0x630 [ 42.022962] ret_from_fork+0x10/0x20 [ 42.026521] [ 42.027998] The buggy address belongs to the object at ffff000800d63060 [ 42.027998] which belongs to the cache kmalloc-16 of size 16 [ 42.040323] The buggy address is located 8 bytes inside of [ 42.040323] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 42.052562] [ 42.054039] The buggy address belongs to the physical page: [ 42.059593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.067581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.074091] page_type: f5(slab) [ 42.077223] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.084947] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.092665] page dumped because: kasan: bad access detected [ 42.098221] [ 42.099696] Memory state around the buggy address: [ 42.104476] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.111680] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.118886] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 42.126085] ^ [ 42.132686] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.139891] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.147092] ==================================================================
[ 29.198001] ================================================================== [ 29.198113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 29.198350] [ 29.200443] kasan_bitops_generic+0x110/0x1c8 [ 29.205009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062bd [ 29.208563] ================================================================== [ 29.074580] ================================================================== [ 29.075249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 29.075470] Read of size 8 at addr fff00000c62bd348 by task kunit_try_catch/261 [ 29.076155] [ 29.076366] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.076550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.076823] Hardware name: linux,dummy-virt (DT) [ 29.076926] Call trace: [ 29.077098] show_stack+0x20/0x38 (C) [ 29.077327] dump_stack_lvl+0x8c/0xd0 [ 29.077653] print_report+0x118/0x608 [ 29.078033] kasan_report+0xdc/0x128 [ 29.078461] __asan_report_load8_noabort+0x20/0x30 [ 29.079164] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 29.079666] kasan_bitops_generic+0x110/0x1c8 [ 29.079842] kunit_try_run_case+0x170/0x3f0 [ 29.079999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.080362] kthread+0x328/0x630 [ 29.081266] ret_from_fork+0x10/0x20 [ 29.081776] [ 29.083384] __kasan_kmalloc+0xd4/0xd8 [ 29.085665] [ 29.085720] The buggy address belongs to the object at fff00000c62bd340 [ 29.085720] which belongs to the cache kmalloc-16 of size 16 [ 29.085867] The buggy address is located 8 bytes inside of [ 29.085867] allocated 9-byte region [fff00000c62bd340, fff00000c62bd349) [ 29.087696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.089269] page dumped because: kasan: bad access detected [ 29.089570] fff00000c62bd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.090674] ================================================================== [ 29.053613] ================================================================== [ 29.053779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 29.053959] Write of size 8 at addr fff00000c62bd348 by task kunit_try_catch/261 [ 29.054169] [ 29.054268] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 29.054657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.054870] Hardware name: linux,dummy-virt (DT) [ 29.054983] Call trace: [ 29.055063] show_stack+0x20/0x38 (C) [ 29.055442] dump_stack_lvl+0x8c/0xd0 [ 29.055612] print_report+0x118/0x608 [ 29.055752] kasan_report+0xdc/0x128 [ 29.056064] kasan_check_range+0x100/0x1a8 [ 29.056467] __kasan_check_write+0x20/0x30 [ 29.056590] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 29.056964] kasan_bitops_generic+0x110/0x1c8 [ 29.057105] kunit_try_run_case+0x170/0x3f0 [ 29.059364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.059580] kthread+0x328/0x630 [ 29.059685] ret_from_fork+0x10/0x20 [ 29.059758] [ 29.059784] Allocated by task 261: [ 29.059825] kasan_save_stack+0x3c/0x68 [ 29.059883] kasan_save_track+0x20/0x40 [ 29.059963] kasan_save_alloc_info+0x40/0x58 [ 29.060243] __kasan_kmalloc+0xd4/0xd8 [ 29.061011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.061259] kasan_bitops_generic+0xa0/0x1c8 [ 29.061743] kunit_try_run_case+0x170/0x3f0 [ 29.062280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.062683] kthread+0x328/0x630 [ 29.063171] ret_from_fork+0x10/0x20 [ 29.063295] [ 29.063352] The buggy address belongs to the object at fff00000c62bd340 [ 29.063352] which belongs to the cache kmalloc-16 of size 16 [ 29.063993] The buggy address is located 8 bytes inside of [ 29.063993] allocated 9-byte region [fff00000c62bd340, fff00000c62bd349) [ 29.064189] [ 29.064261] The buggy address belongs to the physical page: [ 29.064596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062bd [ 29.065478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.065650] page_type: f5(slab) [ 29.065791] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.066320] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.066893] page dumped because: kasan: bad access detected [ 29.067021] [ 29.067071] Memory state around the buggy address: [ 29.067162] fff00000c62bd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.067282] fff00000c62bd280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.067844] >fff00000c62bd300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 29.068128] ^ [ 29.068741] fff00000c62bd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.068877] fff00000c62bd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.069003] ==================================================================
[ 29.228920] ================================================================== [ 29.229466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 29.239291] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 29.251461] The buggy address is located 8 bytes inside of [ 29.251461] allocated 9-byte region [fff00000c60a60c0, fff00000c60a60c9) [ 29.257351] >fff00000c60a6080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 29.257403] ^ [ 29.257940] ==================================================================
[ 22.439411] ================================================================== [ 22.441822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 22.443829] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.445432] [ 22.445730] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.445859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.445882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.445915] Call Trace: [ 22.445940] <TASK> [ 22.445965] dump_stack_lvl+0x73/0xb0 [ 22.446056] print_report+0xd1/0x650 [ 22.446131] ? __virt_addr_valid+0x1db/0x2d0 [ 22.446205] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 22.446287] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.446365] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 22.446450] kasan_report+0x141/0x180 [ 22.446561] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 22.446661] kasan_check_range+0x10c/0x1c0 [ 22.446743] __kasan_check_write+0x18/0x20 [ 22.446813] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 22.446872] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.446913] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.446958] ? finish_task_switch.isra.0+0x156/0x700 [ 22.446993] ? kasan_bitops_generic+0x92/0x1c0 [ 22.447032] kasan_bitops_generic+0x116/0x1c0 [ 22.447067] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.447103] ? __pfx_read_tsc+0x10/0x10 [ 22.447134] ? ktime_get_ts64+0x86/0x230 [ 22.447168] kunit_try_run_case+0x1a5/0x480 [ 22.447205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.447278] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.447323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.447359] ? __kthread_parkme+0x82/0x180 [ 22.447389] ? preempt_count_sub+0x50/0x80 [ 22.447421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.447457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.447491] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.447643] kthread+0x337/0x6f0 [ 22.447706] ? trace_preempt_on+0x20/0xc0 [ 22.447747] ? __pfx_kthread+0x10/0x10 [ 22.447777] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.447808] ? calculate_sigpending+0x7b/0xa0 [ 22.447843] ? __pfx_kthread+0x10/0x10 [ 22.447872] ret_from_fork+0x116/0x1d0 [ 22.447897] ? __pfx_kthread+0x10/0x10 [ 22.447925] ret_from_fork_asm+0x1a/0x30 [ 22.447966] </TASK> [ 22.447982] [ 22.467553] Allocated by task 279: [ 22.468899] kasan_save_stack+0x45/0x70 [ 22.469323] kasan_save_track+0x18/0x40 [ 22.469936] kasan_save_alloc_info+0x3b/0x50 [ 22.470406] __kasan_kmalloc+0xb7/0xc0 [ 22.470750] __kmalloc_cache_noprof+0x189/0x420 [ 22.471121] kasan_bitops_generic+0x92/0x1c0 [ 22.472109] kunit_try_run_case+0x1a5/0x480 [ 22.472615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.473144] kthread+0x337/0x6f0 [ 22.473674] ret_from_fork+0x116/0x1d0 [ 22.474303] ret_from_fork_asm+0x1a/0x30 [ 22.474704] [ 22.474896] The buggy address belongs to the object at ffff8881023e2400 [ 22.474896] which belongs to the cache kmalloc-16 of size 16 [ 22.475597] The buggy address is located 8 bytes inside of [ 22.475597] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 22.476654] [ 22.477608] The buggy address belongs to the physical page: [ 22.478123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 22.479581] flags: 0x200000000000000(node=0|zone=2) [ 22.480098] page_type: f5(slab) [ 22.480456] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.481935] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.482641] page dumped because: kasan: bad access detected [ 22.483081] [ 22.483269] Memory state around the buggy address: [ 22.483666] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 22.484558] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.485749] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.486847] ^ [ 22.487242] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.488096] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.488773] ================================================================== [ 22.376162] ================================================================== [ 22.376790] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 22.378131] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.379518] [ 22.379992] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.380162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.380204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.380288] Call Trace: [ 22.380337] <TASK> [ 22.380367] dump_stack_lvl+0x73/0xb0 [ 22.380419] print_report+0xd1/0x650 [ 22.380454] ? __virt_addr_valid+0x1db/0x2d0 [ 22.380487] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 22.380563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.380598] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 22.380655] kasan_report+0x141/0x180 [ 22.380689] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 22.380732] kasan_check_range+0x10c/0x1c0 [ 22.380767] __kasan_check_write+0x18/0x20 [ 22.380794] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 22.380831] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.380869] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.380911] ? finish_task_switch.isra.0+0x156/0x700 [ 22.380944] ? kasan_bitops_generic+0x92/0x1c0 [ 22.380982] kasan_bitops_generic+0x116/0x1c0 [ 22.381016] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.381052] ? __pfx_read_tsc+0x10/0x10 [ 22.381082] ? ktime_get_ts64+0x86/0x230 [ 22.381115] kunit_try_run_case+0x1a5/0x480 [ 22.381151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.381185] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.381220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.381253] ? __kthread_parkme+0x82/0x180 [ 22.381280] ? preempt_count_sub+0x50/0x80 [ 22.381310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.381346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.381379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.381414] kthread+0x337/0x6f0 [ 22.381439] ? trace_preempt_on+0x20/0xc0 [ 22.381472] ? __pfx_kthread+0x10/0x10 [ 22.381541] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.381629] ? calculate_sigpending+0x7b/0xa0 [ 22.381707] ? __pfx_kthread+0x10/0x10 [ 22.381776] ret_from_fork+0x116/0x1d0 [ 22.381807] ? __pfx_kthread+0x10/0x10 [ 22.381839] ret_from_fork_asm+0x1a/0x30 [ 22.381880] </TASK> [ 22.381895] [ 22.410579] Allocated by task 279: [ 22.411153] kasan_save_stack+0x45/0x70 [ 22.411802] kasan_save_track+0x18/0x40 [ 22.412342] kasan_save_alloc_info+0x3b/0x50 [ 22.413188] __kasan_kmalloc+0xb7/0xc0 [ 22.413989] __kmalloc_cache_noprof+0x189/0x420 [ 22.414892] kasan_bitops_generic+0x92/0x1c0 [ 22.415196] kunit_try_run_case+0x1a5/0x480 [ 22.416247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.417083] kthread+0x337/0x6f0 [ 22.417453] ret_from_fork+0x116/0x1d0 [ 22.417892] ret_from_fork_asm+0x1a/0x30 [ 22.418667] [ 22.418937] The buggy address belongs to the object at ffff8881023e2400 [ 22.418937] which belongs to the cache kmalloc-16 of size 16 [ 22.420568] The buggy address is located 8 bytes inside of [ 22.420568] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 22.421819] [ 22.422175] The buggy address belongs to the physical page: [ 22.423072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 22.423807] flags: 0x200000000000000(node=0|zone=2) [ 22.424231] page_type: f5(slab) [ 22.424627] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.425400] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.425974] page dumped because: kasan: bad access detected [ 22.426608] [ 22.426834] Memory state around the buggy address: [ 22.428224] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 22.430747] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.431654] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.432027] ^ [ 22.433057] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.434893] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.436962] ================================================================== [ 22.591201] ================================================================== [ 22.591822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 22.593426] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.594372] [ 22.595069] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.595297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.595340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.595399] Call Trace: [ 22.595447] <TASK> [ 22.595517] dump_stack_lvl+0x73/0xb0 [ 22.595619] print_report+0xd1/0x650 [ 22.595892] ? __virt_addr_valid+0x1db/0x2d0 [ 22.595975] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 22.596050] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.596086] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 22.596124] kasan_report+0x141/0x180 [ 22.596157] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 22.596200] kasan_check_range+0x10c/0x1c0 [ 22.596254] __kasan_check_write+0x18/0x20 [ 22.596299] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 22.596341] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.596380] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.596424] ? finish_task_switch.isra.0+0x156/0x700 [ 22.596459] ? kasan_bitops_generic+0x92/0x1c0 [ 22.596520] kasan_bitops_generic+0x116/0x1c0 [ 22.596611] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.596691] ? __pfx_read_tsc+0x10/0x10 [ 22.596748] ? ktime_get_ts64+0x86/0x230 [ 22.596815] kunit_try_run_case+0x1a5/0x480 [ 22.596895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.596964] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.597032] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.597089] ? __kthread_parkme+0x82/0x180 [ 22.597119] ? preempt_count_sub+0x50/0x80 [ 22.597150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.597186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.597221] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.597295] kthread+0x337/0x6f0 [ 22.597326] ? trace_preempt_on+0x20/0xc0 [ 22.597360] ? __pfx_kthread+0x10/0x10 [ 22.597388] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.597419] ? calculate_sigpending+0x7b/0xa0 [ 22.597452] ? __pfx_kthread+0x10/0x10 [ 22.597541] ret_from_fork+0x116/0x1d0 [ 22.597606] ? __pfx_kthread+0x10/0x10 [ 22.597694] ret_from_fork_asm+0x1a/0x30 [ 22.597759] </TASK> [ 22.597775] [ 22.621272] Allocated by task 279: [ 22.621932] kasan_save_stack+0x45/0x70 [ 22.623156] kasan_save_track+0x18/0x40 [ 22.623723] kasan_save_alloc_info+0x3b/0x50 [ 22.624209] __kasan_kmalloc+0xb7/0xc0 [ 22.624893] __kmalloc_cache_noprof+0x189/0x420 [ 22.625466] kasan_bitops_generic+0x92/0x1c0 [ 22.626075] kunit_try_run_case+0x1a5/0x480 [ 22.627132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.627729] kthread+0x337/0x6f0 [ 22.628082] ret_from_fork+0x116/0x1d0 [ 22.628920] ret_from_fork_asm+0x1a/0x30 [ 22.629101] [ 22.629198] The buggy address belongs to the object at ffff8881023e2400 [ 22.629198] which belongs to the cache kmalloc-16 of size 16 [ 22.630766] The buggy address is located 8 bytes inside of [ 22.630766] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 22.631802] [ 22.631965] The buggy address belongs to the physical page: [ 22.633194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 22.634247] flags: 0x200000000000000(node=0|zone=2) [ 22.634837] page_type: f5(slab) [ 22.635200] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.635818] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.636745] page dumped because: kasan: bad access detected [ 22.637795] [ 22.638023] Memory state around the buggy address: [ 22.638930] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 22.639806] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.640634] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.641970] ^ [ 22.642731] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.643034] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.643344] ================================================================== [ 22.700786] ================================================================== [ 22.701190] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 22.702660] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.704098] [ 22.704469] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.705200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.705269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.705326] Call Trace: [ 22.705373] <TASK> [ 22.705413] dump_stack_lvl+0x73/0xb0 [ 22.705701] print_report+0xd1/0x650 [ 22.705791] ? __virt_addr_valid+0x1db/0x2d0 [ 22.705911] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 22.706031] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.706108] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 22.706186] kasan_report+0x141/0x180 [ 22.706294] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 22.706382] kasan_check_range+0x10c/0x1c0 [ 22.706454] __kasan_check_write+0x18/0x20 [ 22.707012] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 22.707106] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.707190] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.707282] ? finish_task_switch.isra.0+0x156/0x700 [ 22.707345] ? kasan_bitops_generic+0x92/0x1c0 [ 22.707419] kasan_bitops_generic+0x116/0x1c0 [ 22.707477] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.707583] ? __pfx_read_tsc+0x10/0x10 [ 22.707638] ? ktime_get_ts64+0x86/0x230 [ 22.707694] kunit_try_run_case+0x1a5/0x480 [ 22.707755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.707807] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.707863] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.707918] ? __kthread_parkme+0x82/0x180 [ 22.707964] ? preempt_count_sub+0x50/0x80 [ 22.708019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.708074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.708130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.708186] kthread+0x337/0x6f0 [ 22.708232] ? trace_preempt_on+0x20/0xc0 [ 22.708288] ? __pfx_kthread+0x10/0x10 [ 22.708339] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.708390] ? calculate_sigpending+0x7b/0xa0 [ 22.708446] ? __pfx_kthread+0x10/0x10 [ 22.708517] ret_from_fork+0x116/0x1d0 [ 22.709335] ? __pfx_kthread+0x10/0x10 [ 22.709404] ret_from_fork_asm+0x1a/0x30 [ 22.709478] </TASK> [ 22.709556] [ 22.734382] Allocated by task 279: [ 22.734788] kasan_save_stack+0x45/0x70 [ 22.735183] kasan_save_track+0x18/0x40 [ 22.735567] kasan_save_alloc_info+0x3b/0x50 [ 22.735963] __kasan_kmalloc+0xb7/0xc0 [ 22.736327] __kmalloc_cache_noprof+0x189/0x420 [ 22.737463] kasan_bitops_generic+0x92/0x1c0 [ 22.738076] kunit_try_run_case+0x1a5/0x480 [ 22.738787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.739371] kthread+0x337/0x6f0 [ 22.739974] ret_from_fork+0x116/0x1d0 [ 22.740442] ret_from_fork_asm+0x1a/0x30 [ 22.741336] [ 22.741788] The buggy address belongs to the object at ffff8881023e2400 [ 22.741788] which belongs to the cache kmalloc-16 of size 16 [ 22.742996] The buggy address is located 8 bytes inside of [ 22.742996] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 22.744241] [ 22.745179] The buggy address belongs to the physical page: [ 22.745931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 22.746770] flags: 0x200000000000000(node=0|zone=2) [ 22.747304] page_type: f5(slab) [ 22.747897] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.749157] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.749837] page dumped because: kasan: bad access detected [ 22.750437] [ 22.750866] Memory state around the buggy address: [ 22.751409] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 22.752144] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.753311] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.753873] ^ [ 22.754265] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.754941] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.755577] ================================================================== [ 22.319941] ================================================================== [ 22.320653] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 22.321963] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.323375] [ 22.323906] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.324039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.324081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.324147] Call Trace: [ 22.324194] <TASK> [ 22.324262] dump_stack_lvl+0x73/0xb0 [ 22.324326] print_report+0xd1/0x650 [ 22.324363] ? __virt_addr_valid+0x1db/0x2d0 [ 22.324401] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 22.324438] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.324471] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 22.324536] kasan_report+0x141/0x180 [ 22.324619] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 22.324705] kasan_check_range+0x10c/0x1c0 [ 22.324745] __kasan_check_write+0x18/0x20 [ 22.324775] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 22.324816] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.324858] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.324903] ? finish_task_switch.isra.0+0x156/0x700 [ 22.324938] ? kasan_bitops_generic+0x92/0x1c0 [ 22.324978] kasan_bitops_generic+0x116/0x1c0 [ 22.325014] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.325051] ? __pfx_read_tsc+0x10/0x10 [ 22.325082] ? ktime_get_ts64+0x86/0x230 [ 22.325118] kunit_try_run_case+0x1a5/0x480 [ 22.325158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.325193] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.325247] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.325297] ? __kthread_parkme+0x82/0x180 [ 22.325328] ? preempt_count_sub+0x50/0x80 [ 22.325360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.325396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.325431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.325466] kthread+0x337/0x6f0 [ 22.325513] ? trace_preempt_on+0x20/0xc0 [ 22.325602] ? __pfx_kthread+0x10/0x10 [ 22.325695] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.325761] ? calculate_sigpending+0x7b/0xa0 [ 22.325836] ? __pfx_kthread+0x10/0x10 [ 22.325907] ret_from_fork+0x116/0x1d0 [ 22.325974] ? __pfx_kthread+0x10/0x10 [ 22.326025] ret_from_fork_asm+0x1a/0x30 [ 22.326072] </TASK> [ 22.326087] [ 22.349215] Allocated by task 279: [ 22.349605] kasan_save_stack+0x45/0x70 [ 22.349985] kasan_save_track+0x18/0x40 [ 22.351485] kasan_save_alloc_info+0x3b/0x50 [ 22.352761] __kasan_kmalloc+0xb7/0xc0 [ 22.353272] __kmalloc_cache_noprof+0x189/0x420 [ 22.354233] kasan_bitops_generic+0x92/0x1c0 [ 22.354442] kunit_try_run_case+0x1a5/0x480 [ 22.354841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.356019] kthread+0x337/0x6f0 [ 22.356428] ret_from_fork+0x116/0x1d0 [ 22.356847] ret_from_fork_asm+0x1a/0x30 [ 22.357444] [ 22.357692] The buggy address belongs to the object at ffff8881023e2400 [ 22.357692] which belongs to the cache kmalloc-16 of size 16 [ 22.358936] The buggy address is located 8 bytes inside of [ 22.358936] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 22.360385] [ 22.360778] The buggy address belongs to the physical page: [ 22.362153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 22.362793] flags: 0x200000000000000(node=0|zone=2) [ 22.363585] page_type: f5(slab) [ 22.363956] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.364943] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.365595] page dumped because: kasan: bad access detected [ 22.366530] [ 22.367227] Memory state around the buggy address: [ 22.368153] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 22.369074] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.370198] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.372275] ^ [ 22.372772] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.373596] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.374883] ================================================================== [ 22.537467] ================================================================== [ 22.538171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 22.539094] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.540244] [ 22.540542] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.540673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.540887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.540961] Call Trace: [ 22.541014] <TASK> [ 22.541069] dump_stack_lvl+0x73/0xb0 [ 22.541180] print_report+0xd1/0x650 [ 22.541262] ? __virt_addr_valid+0x1db/0x2d0 [ 22.541381] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 22.541468] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.541707] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 22.541761] kasan_report+0x141/0x180 [ 22.541797] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 22.541843] kasan_check_range+0x10c/0x1c0 [ 22.541878] __kasan_check_write+0x18/0x20 [ 22.541907] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 22.541947] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.541986] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.542031] ? finish_task_switch.isra.0+0x156/0x700 [ 22.542064] ? kasan_bitops_generic+0x92/0x1c0 [ 22.542104] kasan_bitops_generic+0x116/0x1c0 [ 22.542139] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.542177] ? __pfx_read_tsc+0x10/0x10 [ 22.542209] ? ktime_get_ts64+0x86/0x230 [ 22.542242] kunit_try_run_case+0x1a5/0x480 [ 22.542282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.542315] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.542398] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.542440] ? __kthread_parkme+0x82/0x180 [ 22.542467] ? preempt_count_sub+0x50/0x80 [ 22.542524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.542622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.542700] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.542740] kthread+0x337/0x6f0 [ 22.542769] ? trace_preempt_on+0x20/0xc0 [ 22.542803] ? __pfx_kthread+0x10/0x10 [ 22.542832] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.542864] ? calculate_sigpending+0x7b/0xa0 [ 22.542897] ? __pfx_kthread+0x10/0x10 [ 22.542927] ret_from_fork+0x116/0x1d0 [ 22.542952] ? __pfx_kthread+0x10/0x10 [ 22.542981] ret_from_fork_asm+0x1a/0x30 [ 22.543022] </TASK> [ 22.543036] [ 22.565875] Allocated by task 279: [ 22.566393] kasan_save_stack+0x45/0x70 [ 22.566977] kasan_save_track+0x18/0x40 [ 22.567516] kasan_save_alloc_info+0x3b/0x50 [ 22.568732] __kasan_kmalloc+0xb7/0xc0 [ 22.569006] __kmalloc_cache_noprof+0x189/0x420 [ 22.569793] kasan_bitops_generic+0x92/0x1c0 [ 22.570292] kunit_try_run_case+0x1a5/0x480 [ 22.570918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.571520] kthread+0x337/0x6f0 [ 22.572469] ret_from_fork+0x116/0x1d0 [ 22.572844] ret_from_fork_asm+0x1a/0x30 [ 22.573877] [ 22.573984] The buggy address belongs to the object at ffff8881023e2400 [ 22.573984] which belongs to the cache kmalloc-16 of size 16 [ 22.575211] The buggy address is located 8 bytes inside of [ 22.575211] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 22.577374] [ 22.577845] The buggy address belongs to the physical page: [ 22.578936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 22.579746] flags: 0x200000000000000(node=0|zone=2) [ 22.580288] page_type: f5(slab) [ 22.580592] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.581258] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.581895] page dumped because: kasan: bad access detected [ 22.583247] [ 22.583637] Memory state around the buggy address: [ 22.584485] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 22.585599] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.586346] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.587493] ^ [ 22.587960] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.589667] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.590181] ================================================================== [ 22.644593] ================================================================== [ 22.647009] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 22.647898] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.648416] [ 22.648655] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.648786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.648826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.648889] Call Trace: [ 22.648941] <TASK> [ 22.648994] dump_stack_lvl+0x73/0xb0 [ 22.649151] print_report+0xd1/0x650 [ 22.649241] ? __virt_addr_valid+0x1db/0x2d0 [ 22.649322] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 22.649437] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.649535] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 22.649663] kasan_report+0x141/0x180 [ 22.649730] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 22.649820] kasan_check_range+0x10c/0x1c0 [ 22.649901] __kasan_check_write+0x18/0x20 [ 22.649968] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 22.650045] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.650125] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.650217] ? finish_task_switch.isra.0+0x156/0x700 [ 22.650294] ? kasan_bitops_generic+0x92/0x1c0 [ 22.650382] kasan_bitops_generic+0x116/0x1c0 [ 22.650457] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.650529] ? __pfx_read_tsc+0x10/0x10 [ 22.650869] ? ktime_get_ts64+0x86/0x230 [ 22.650911] kunit_try_run_case+0x1a5/0x480 [ 22.650952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.650987] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.651020] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.651054] ? __kthread_parkme+0x82/0x180 [ 22.651080] ? preempt_count_sub+0x50/0x80 [ 22.651110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.651145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.651178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.651214] kthread+0x337/0x6f0 [ 22.651284] ? trace_preempt_on+0x20/0xc0 [ 22.651324] ? __pfx_kthread+0x10/0x10 [ 22.651353] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.651384] ? calculate_sigpending+0x7b/0xa0 [ 22.651417] ? __pfx_kthread+0x10/0x10 [ 22.651446] ret_from_fork+0x116/0x1d0 [ 22.651471] ? __pfx_kthread+0x10/0x10 [ 22.651523] ret_from_fork_asm+0x1a/0x30 [ 22.651643] </TASK> [ 22.651688] [ 22.675477] Allocated by task 279: [ 22.676180] kasan_save_stack+0x45/0x70 [ 22.676661] kasan_save_track+0x18/0x40 [ 22.677406] kasan_save_alloc_info+0x3b/0x50 [ 22.678064] __kasan_kmalloc+0xb7/0xc0 [ 22.679015] __kmalloc_cache_noprof+0x189/0x420 [ 22.679599] kasan_bitops_generic+0x92/0x1c0 [ 22.680076] kunit_try_run_case+0x1a5/0x480 [ 22.680530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.681159] kthread+0x337/0x6f0 [ 22.681688] ret_from_fork+0x116/0x1d0 [ 22.682032] ret_from_fork_asm+0x1a/0x30 [ 22.682576] [ 22.682807] The buggy address belongs to the object at ffff8881023e2400 [ 22.682807] which belongs to the cache kmalloc-16 of size 16 [ 22.683881] The buggy address is located 8 bytes inside of [ 22.683881] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 22.685517] [ 22.685831] The buggy address belongs to the physical page: [ 22.686380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 22.687077] flags: 0x200000000000000(node=0|zone=2) [ 22.687715] page_type: f5(slab) [ 22.688097] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.688729] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.689652] page dumped because: kasan: bad access detected [ 22.690103] [ 22.690408] Memory state around the buggy address: [ 22.691096] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 22.691859] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.692917] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.694403] ^ [ 22.695928] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.697783] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.698962] ================================================================== [ 22.489783] ================================================================== [ 22.490363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 22.490976] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.491471] [ 22.491764] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.491894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.491936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.492000] Call Trace: [ 22.492050] <TASK> [ 22.492103] dump_stack_lvl+0x73/0xb0 [ 22.492197] print_report+0xd1/0x650 [ 22.492269] ? __virt_addr_valid+0x1db/0x2d0 [ 22.492349] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 22.492432] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.493302] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 22.493398] kasan_report+0x141/0x180 [ 22.493480] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 22.493737] kasan_check_range+0x10c/0x1c0 [ 22.493819] __kasan_check_write+0x18/0x20 [ 22.493887] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 22.493971] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.494058] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.494155] ? finish_task_switch.isra.0+0x156/0x700 [ 22.494232] ? kasan_bitops_generic+0x92/0x1c0 [ 22.494320] kasan_bitops_generic+0x116/0x1c0 [ 22.494366] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.494403] ? __pfx_read_tsc+0x10/0x10 [ 22.494436] ? ktime_get_ts64+0x86/0x230 [ 22.494471] kunit_try_run_case+0x1a5/0x480 [ 22.494543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.494669] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.494713] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.494752] ? __kthread_parkme+0x82/0x180 [ 22.494783] ? preempt_count_sub+0x50/0x80 [ 22.494815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.494851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.494886] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.494920] kthread+0x337/0x6f0 [ 22.494949] ? trace_preempt_on+0x20/0xc0 [ 22.494986] ? __pfx_kthread+0x10/0x10 [ 22.495015] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.495046] ? calculate_sigpending+0x7b/0xa0 [ 22.495081] ? __pfx_kthread+0x10/0x10 [ 22.495110] ret_from_fork+0x116/0x1d0 [ 22.495138] ? __pfx_kthread+0x10/0x10 [ 22.495166] ret_from_fork_asm+0x1a/0x30 [ 22.495208] </TASK> [ 22.495241] [ 22.515925] Allocated by task 279: [ 22.516401] kasan_save_stack+0x45/0x70 [ 22.517044] kasan_save_track+0x18/0x40 [ 22.517521] kasan_save_alloc_info+0x3b/0x50 [ 22.518699] __kasan_kmalloc+0xb7/0xc0 [ 22.519113] __kmalloc_cache_noprof+0x189/0x420 [ 22.519743] kasan_bitops_generic+0x92/0x1c0 [ 22.520121] kunit_try_run_case+0x1a5/0x480 [ 22.520651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.521191] kthread+0x337/0x6f0 [ 22.522084] ret_from_fork+0x116/0x1d0 [ 22.522725] ret_from_fork_asm+0x1a/0x30 [ 22.523184] [ 22.523447] The buggy address belongs to the object at ffff8881023e2400 [ 22.523447] which belongs to the cache kmalloc-16 of size 16 [ 22.524719] The buggy address is located 8 bytes inside of [ 22.524719] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 22.526245] [ 22.526451] The buggy address belongs to the physical page: [ 22.526951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 22.527671] flags: 0x200000000000000(node=0|zone=2) [ 22.528086] page_type: f5(slab) [ 22.528466] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.529404] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.530926] page dumped because: kasan: bad access detected [ 22.531476] [ 22.531849] Memory state around the buggy address: [ 22.532269] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 22.533032] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.533695] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.534224] ^ [ 22.534614] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.535179] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.536344] ==================================================================
[ 21.213381] ================================================================== [ 21.213845] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.215251] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.215821] [ 21.216057] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.216173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.216212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.216271] Call Trace: [ 21.216307] <TASK> [ 21.216353] dump_stack_lvl+0x73/0xb0 [ 21.216441] print_report+0xd1/0x650 [ 21.216522] ? __virt_addr_valid+0x1db/0x2d0 [ 21.216602] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.216686] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.216764] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.216848] kasan_report+0x141/0x180 [ 21.216946] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.217039] kasan_check_range+0x10c/0x1c0 [ 21.217122] __kasan_check_write+0x18/0x20 [ 21.217197] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.217283] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.217368] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.217446] ? trace_hardirqs_on+0x37/0xe0 [ 21.217516] ? kasan_bitops_generic+0x92/0x1c0 [ 21.217558] kasan_bitops_generic+0x116/0x1c0 [ 21.217594] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.217632] ? __pfx_read_tsc+0x10/0x10 [ 21.217663] ? ktime_get_ts64+0x86/0x230 [ 21.217697] kunit_try_run_case+0x1a5/0x480 [ 21.217735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.217768] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.217803] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.217837] ? __kthread_parkme+0x82/0x180 [ 21.217865] ? preempt_count_sub+0x50/0x80 [ 21.217964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.218007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.218045] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.218082] kthread+0x337/0x6f0 [ 21.218159] ? trace_preempt_on+0x20/0xc0 [ 21.218195] ? __pfx_kthread+0x10/0x10 [ 21.218226] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.218269] ? calculate_sigpending+0x7b/0xa0 [ 21.218308] ? __pfx_kthread+0x10/0x10 [ 21.218339] ret_from_fork+0x116/0x1d0 [ 21.218365] ? __pfx_kthread+0x10/0x10 [ 21.218394] ret_from_fork_asm+0x1a/0x30 [ 21.218435] </TASK> [ 21.218448] [ 21.240714] Allocated by task 279: [ 21.241076] kasan_save_stack+0x45/0x70 [ 21.241827] kasan_save_track+0x18/0x40 [ 21.242463] kasan_save_alloc_info+0x3b/0x50 [ 21.243028] __kasan_kmalloc+0xb7/0xc0 [ 21.243728] __kmalloc_cache_noprof+0x189/0x420 [ 21.244377] kasan_bitops_generic+0x92/0x1c0 [ 21.244793] kunit_try_run_case+0x1a5/0x480 [ 21.245180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.245991] kthread+0x337/0x6f0 [ 21.246618] ret_from_fork+0x116/0x1d0 [ 21.247268] ret_from_fork_asm+0x1a/0x30 [ 21.247612] [ 21.247847] The buggy address belongs to the object at ffff888101e49ec0 [ 21.247847] which belongs to the cache kmalloc-16 of size 16 [ 21.249476] The buggy address is located 8 bytes inside of [ 21.249476] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.250452] [ 21.250680] The buggy address belongs to the physical page: [ 21.251189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.252020] flags: 0x200000000000000(node=0|zone=2) [ 21.252642] page_type: f5(slab) [ 21.253089] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.253818] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.254617] page dumped because: kasan: bad access detected [ 21.255208] [ 21.255492] Memory state around the buggy address: [ 21.256011] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.256913] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.257627] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.258423] ^ [ 21.259018] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.259707] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.260397] ================================================================== [ 21.166180] ================================================================== [ 21.166463] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.167824] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.169343] [ 21.169590] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.169708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.169751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.169810] Call Trace: [ 21.169849] <TASK> [ 21.169909] dump_stack_lvl+0x73/0xb0 [ 21.169967] print_report+0xd1/0x650 [ 21.170001] ? __virt_addr_valid+0x1db/0x2d0 [ 21.170033] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.170071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.170113] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.170854] kasan_report+0x141/0x180 [ 21.170952] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.171030] kasan_check_range+0x10c/0x1c0 [ 21.171070] __kasan_check_write+0x18/0x20 [ 21.171115] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.171192] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.171234] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.171269] ? trace_hardirqs_on+0x37/0xe0 [ 21.171303] ? kasan_bitops_generic+0x92/0x1c0 [ 21.171344] kasan_bitops_generic+0x116/0x1c0 [ 21.171378] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.171414] ? __pfx_read_tsc+0x10/0x10 [ 21.171443] ? ktime_get_ts64+0x86/0x230 [ 21.171477] kunit_try_run_case+0x1a5/0x480 [ 21.171511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.171545] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.171580] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.171614] ? __kthread_parkme+0x82/0x180 [ 21.171642] ? preempt_count_sub+0x50/0x80 [ 21.171674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.171710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.171743] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.171779] kthread+0x337/0x6f0 [ 21.171826] ? trace_preempt_on+0x20/0xc0 [ 21.171865] ? __pfx_kthread+0x10/0x10 [ 21.171925] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.171958] ? calculate_sigpending+0x7b/0xa0 [ 21.171994] ? __pfx_kthread+0x10/0x10 [ 21.172024] ret_from_fork+0x116/0x1d0 [ 21.172052] ? __pfx_kthread+0x10/0x10 [ 21.172082] ret_from_fork_asm+0x1a/0x30 [ 21.172145] </TASK> [ 21.172162] [ 21.191352] Allocated by task 279: [ 21.192298] kasan_save_stack+0x45/0x70 [ 21.192697] kasan_save_track+0x18/0x40 [ 21.193704] kasan_save_alloc_info+0x3b/0x50 [ 21.194289] __kasan_kmalloc+0xb7/0xc0 [ 21.194728] __kmalloc_cache_noprof+0x189/0x420 [ 21.195222] kasan_bitops_generic+0x92/0x1c0 [ 21.195660] kunit_try_run_case+0x1a5/0x480 [ 21.196044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.196558] kthread+0x337/0x6f0 [ 21.196853] ret_from_fork+0x116/0x1d0 [ 21.197291] ret_from_fork_asm+0x1a/0x30 [ 21.198076] [ 21.198492] The buggy address belongs to the object at ffff888101e49ec0 [ 21.198492] which belongs to the cache kmalloc-16 of size 16 [ 21.199661] The buggy address is located 8 bytes inside of [ 21.199661] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.200837] [ 21.201145] The buggy address belongs to the physical page: [ 21.202319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.202986] flags: 0x200000000000000(node=0|zone=2) [ 21.203780] page_type: f5(slab) [ 21.204351] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.205093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.205919] page dumped because: kasan: bad access detected [ 21.206374] [ 21.206856] Memory state around the buggy address: [ 21.207302] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.208244] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.208768] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.210236] ^ [ 21.210661] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.211459] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.212071] ================================================================== [ 21.307857] ================================================================== [ 21.308796] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.309528] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.310303] [ 21.310642] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.310757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.310846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.310937] Call Trace: [ 21.310998] <TASK> [ 21.311042] dump_stack_lvl+0x73/0xb0 [ 21.311128] print_report+0xd1/0x650 [ 21.311244] ? __virt_addr_valid+0x1db/0x2d0 [ 21.311373] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.311473] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.311548] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.311631] kasan_report+0x141/0x180 [ 21.311682] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.311727] kasan_check_range+0x10c/0x1c0 [ 21.311762] __kasan_check_write+0x18/0x20 [ 21.311789] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.311826] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.311864] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.311936] ? trace_hardirqs_on+0x37/0xe0 [ 21.311970] ? kasan_bitops_generic+0x92/0x1c0 [ 21.312010] kasan_bitops_generic+0x116/0x1c0 [ 21.312044] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.312080] ? __pfx_read_tsc+0x10/0x10 [ 21.312151] ? ktime_get_ts64+0x86/0x230 [ 21.312193] kunit_try_run_case+0x1a5/0x480 [ 21.312231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.312265] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.312298] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.312331] ? __kthread_parkme+0x82/0x180 [ 21.312363] ? preempt_count_sub+0x50/0x80 [ 21.312395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.312431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.312466] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.312501] kthread+0x337/0x6f0 [ 21.312528] ? trace_preempt_on+0x20/0xc0 [ 21.312559] ? __pfx_kthread+0x10/0x10 [ 21.312588] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.312619] ? calculate_sigpending+0x7b/0xa0 [ 21.312653] ? __pfx_kthread+0x10/0x10 [ 21.312683] ret_from_fork+0x116/0x1d0 [ 21.312708] ? __pfx_kthread+0x10/0x10 [ 21.312738] ret_from_fork_asm+0x1a/0x30 [ 21.312779] </TASK> [ 21.312794] [ 21.333068] Allocated by task 279: [ 21.333674] kasan_save_stack+0x45/0x70 [ 21.334082] kasan_save_track+0x18/0x40 [ 21.336682] kasan_save_alloc_info+0x3b/0x50 [ 21.337030] __kasan_kmalloc+0xb7/0xc0 [ 21.337344] __kmalloc_cache_noprof+0x189/0x420 [ 21.337663] kasan_bitops_generic+0x92/0x1c0 [ 21.339641] kunit_try_run_case+0x1a5/0x480 [ 21.340991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.342517] kthread+0x337/0x6f0 [ 21.342829] ret_from_fork+0x116/0x1d0 [ 21.343687] ret_from_fork_asm+0x1a/0x30 [ 21.344049] [ 21.344479] The buggy address belongs to the object at ffff888101e49ec0 [ 21.344479] which belongs to the cache kmalloc-16 of size 16 [ 21.345726] The buggy address is located 8 bytes inside of [ 21.345726] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.346981] [ 21.347246] The buggy address belongs to the physical page: [ 21.347718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.348438] flags: 0x200000000000000(node=0|zone=2) [ 21.348803] page_type: f5(slab) [ 21.349207] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.349953] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.350786] page dumped because: kasan: bad access detected [ 21.351793] [ 21.352041] Memory state around the buggy address: [ 21.352530] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.353148] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.353729] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.354286] ^ [ 21.354687] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.355611] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.356326] ================================================================== [ 21.262905] ================================================================== [ 21.263792] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.264601] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.265283] [ 21.265712] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.265832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.265872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.265984] Call Trace: [ 21.266044] <TASK> [ 21.266180] dump_stack_lvl+0x73/0xb0 [ 21.266304] print_report+0xd1/0x650 [ 21.266377] ? __virt_addr_valid+0x1db/0x2d0 [ 21.266455] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.266500] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.266686] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.266783] kasan_report+0x141/0x180 [ 21.266868] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.266968] kasan_check_range+0x10c/0x1c0 [ 21.267009] __kasan_check_write+0x18/0x20 [ 21.267038] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.267077] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.267166] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.267207] ? trace_hardirqs_on+0x37/0xe0 [ 21.267241] ? kasan_bitops_generic+0x92/0x1c0 [ 21.267280] kasan_bitops_generic+0x116/0x1c0 [ 21.267314] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.267350] ? __pfx_read_tsc+0x10/0x10 [ 21.267380] ? ktime_get_ts64+0x86/0x230 [ 21.267413] kunit_try_run_case+0x1a5/0x480 [ 21.267448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.267482] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.267515] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.267549] ? __kthread_parkme+0x82/0x180 [ 21.267577] ? preempt_count_sub+0x50/0x80 [ 21.267609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.267644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.267678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.267712] kthread+0x337/0x6f0 [ 21.267739] ? trace_preempt_on+0x20/0xc0 [ 21.267770] ? __pfx_kthread+0x10/0x10 [ 21.267799] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.267829] ? calculate_sigpending+0x7b/0xa0 [ 21.267863] ? __pfx_kthread+0x10/0x10 [ 21.267920] ret_from_fork+0x116/0x1d0 [ 21.267949] ? __pfx_kthread+0x10/0x10 [ 21.267978] ret_from_fork_asm+0x1a/0x30 [ 21.268019] </TASK> [ 21.268035] [ 21.285224] Allocated by task 279: [ 21.285638] kasan_save_stack+0x45/0x70 [ 21.286396] kasan_save_track+0x18/0x40 [ 21.287142] kasan_save_alloc_info+0x3b/0x50 [ 21.287894] __kasan_kmalloc+0xb7/0xc0 [ 21.288831] __kmalloc_cache_noprof+0x189/0x420 [ 21.289820] kasan_bitops_generic+0x92/0x1c0 [ 21.290401] kunit_try_run_case+0x1a5/0x480 [ 21.290947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.291526] kthread+0x337/0x6f0 [ 21.292001] ret_from_fork+0x116/0x1d0 [ 21.292526] ret_from_fork_asm+0x1a/0x30 [ 21.293142] [ 21.293479] The buggy address belongs to the object at ffff888101e49ec0 [ 21.293479] which belongs to the cache kmalloc-16 of size 16 [ 21.294598] The buggy address is located 8 bytes inside of [ 21.294598] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.295584] [ 21.295932] The buggy address belongs to the physical page: [ 21.296580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.297334] flags: 0x200000000000000(node=0|zone=2) [ 21.297799] page_type: f5(slab) [ 21.298325] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.298955] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.299854] page dumped because: kasan: bad access detected [ 21.300810] [ 21.300985] Memory state around the buggy address: [ 21.301495] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.302506] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.303038] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.304023] ^ [ 21.304380] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.305234] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.306131] ================================================================== [ 21.446015] ================================================================== [ 21.446731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.447542] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.448573] [ 21.448790] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.448924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.448965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.449020] Call Trace: [ 21.449055] <TASK> [ 21.449094] dump_stack_lvl+0x73/0xb0 [ 21.449237] print_report+0xd1/0x650 [ 21.449318] ? __virt_addr_valid+0x1db/0x2d0 [ 21.449391] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.449478] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.449619] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.449704] kasan_report+0x141/0x180 [ 21.449815] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.449959] kasan_check_range+0x10c/0x1c0 [ 21.450072] __kasan_check_write+0x18/0x20 [ 21.450192] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.450284] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.450369] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.450450] ? trace_hardirqs_on+0x37/0xe0 [ 21.450522] ? kasan_bitops_generic+0x92/0x1c0 [ 21.450607] kasan_bitops_generic+0x116/0x1c0 [ 21.450684] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.450761] ? __pfx_read_tsc+0x10/0x10 [ 21.450832] ? ktime_get_ts64+0x86/0x230 [ 21.450928] kunit_try_run_case+0x1a5/0x480 [ 21.451053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.451197] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.451275] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.451355] ? __kthread_parkme+0x82/0x180 [ 21.451426] ? preempt_count_sub+0x50/0x80 [ 21.451486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.451525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.451560] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.451595] kthread+0x337/0x6f0 [ 21.451622] ? trace_preempt_on+0x20/0xc0 [ 21.451654] ? __pfx_kthread+0x10/0x10 [ 21.451684] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.451714] ? calculate_sigpending+0x7b/0xa0 [ 21.451747] ? __pfx_kthread+0x10/0x10 [ 21.451778] ret_from_fork+0x116/0x1d0 [ 21.451802] ? __pfx_kthread+0x10/0x10 [ 21.451830] ret_from_fork_asm+0x1a/0x30 [ 21.451871] </TASK> [ 21.451914] [ 21.473618] Allocated by task 279: [ 21.474411] kasan_save_stack+0x45/0x70 [ 21.474752] kasan_save_track+0x18/0x40 [ 21.475088] kasan_save_alloc_info+0x3b/0x50 [ 21.475461] __kasan_kmalloc+0xb7/0xc0 [ 21.475772] __kmalloc_cache_noprof+0x189/0x420 [ 21.477248] kasan_bitops_generic+0x92/0x1c0 [ 21.477606] kunit_try_run_case+0x1a5/0x480 [ 21.478162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.478802] kthread+0x337/0x6f0 [ 21.479148] ret_from_fork+0x116/0x1d0 [ 21.479892] ret_from_fork_asm+0x1a/0x30 [ 21.480605] [ 21.480972] The buggy address belongs to the object at ffff888101e49ec0 [ 21.480972] which belongs to the cache kmalloc-16 of size 16 [ 21.482620] The buggy address is located 8 bytes inside of [ 21.482620] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.483520] [ 21.483980] The buggy address belongs to the physical page: [ 21.484581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.485538] flags: 0x200000000000000(node=0|zone=2) [ 21.486122] page_type: f5(slab) [ 21.486818] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.487746] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.488932] page dumped because: kasan: bad access detected [ 21.489346] [ 21.489579] Memory state around the buggy address: [ 21.490496] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.491025] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.491839] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.492764] ^ [ 21.493846] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.494700] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.495488] ================================================================== [ 21.358334] ================================================================== [ 21.359206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.360486] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.361258] [ 21.361476] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.361593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.361632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.361682] Call Trace: [ 21.361699] <TASK> [ 21.361718] dump_stack_lvl+0x73/0xb0 [ 21.361761] print_report+0xd1/0x650 [ 21.361798] ? __virt_addr_valid+0x1db/0x2d0 [ 21.361867] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.361963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.362041] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.362125] kasan_report+0x141/0x180 [ 21.362203] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.362305] kasan_check_range+0x10c/0x1c0 [ 21.362384] __kasan_check_write+0x18/0x20 [ 21.362452] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.362536] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.362619] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.362673] ? trace_hardirqs_on+0x37/0xe0 [ 21.362729] ? kasan_bitops_generic+0x92/0x1c0 [ 21.362772] kasan_bitops_generic+0x116/0x1c0 [ 21.362808] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.362845] ? __pfx_read_tsc+0x10/0x10 [ 21.362918] ? ktime_get_ts64+0x86/0x230 [ 21.362961] kunit_try_run_case+0x1a5/0x480 [ 21.362998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.363033] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.363067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.363126] ? __kthread_parkme+0x82/0x180 [ 21.363173] ? preempt_count_sub+0x50/0x80 [ 21.363205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.363241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.363276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.363311] kthread+0x337/0x6f0 [ 21.363337] ? trace_preempt_on+0x20/0xc0 [ 21.363368] ? __pfx_kthread+0x10/0x10 [ 21.363395] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.363427] ? calculate_sigpending+0x7b/0xa0 [ 21.363460] ? __pfx_kthread+0x10/0x10 [ 21.363490] ret_from_fork+0x116/0x1d0 [ 21.363514] ? __pfx_kthread+0x10/0x10 [ 21.363543] ret_from_fork_asm+0x1a/0x30 [ 21.363583] </TASK> [ 21.363599] [ 21.384572] Allocated by task 279: [ 21.384720] kasan_save_stack+0x45/0x70 [ 21.384936] kasan_save_track+0x18/0x40 [ 21.385346] kasan_save_alloc_info+0x3b/0x50 [ 21.385821] __kasan_kmalloc+0xb7/0xc0 [ 21.386192] __kmalloc_cache_noprof+0x189/0x420 [ 21.386675] kasan_bitops_generic+0x92/0x1c0 [ 21.387197] kunit_try_run_case+0x1a5/0x480 [ 21.387564] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.388149] kthread+0x337/0x6f0 [ 21.388495] ret_from_fork+0x116/0x1d0 [ 21.388953] ret_from_fork_asm+0x1a/0x30 [ 21.389279] [ 21.389459] The buggy address belongs to the object at ffff888101e49ec0 [ 21.389459] which belongs to the cache kmalloc-16 of size 16 [ 21.390504] The buggy address is located 8 bytes inside of [ 21.390504] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.391683] [ 21.391921] The buggy address belongs to the physical page: [ 21.392599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.393215] flags: 0x200000000000000(node=0|zone=2) [ 21.394000] page_type: f5(slab) [ 21.394323] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.395034] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.395593] page dumped because: kasan: bad access detected [ 21.396003] [ 21.396235] Memory state around the buggy address: [ 21.396811] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.397574] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.398370] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.398985] ^ [ 21.399452] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.399923] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.400693] ================================================================== [ 21.402033] ================================================================== [ 21.402615] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.403441] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.403941] [ 21.404243] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.404362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.404399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.404456] Call Trace: [ 21.404498] <TASK> [ 21.404536] dump_stack_lvl+0x73/0xb0 [ 21.404619] print_report+0xd1/0x650 [ 21.404694] ? __virt_addr_valid+0x1db/0x2d0 [ 21.404769] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.404849] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.405016] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.405098] kasan_report+0x141/0x180 [ 21.405199] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.405284] kasan_check_range+0x10c/0x1c0 [ 21.405680] __kasan_check_write+0x18/0x20 [ 21.405759] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.405849] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.405960] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.406038] ? trace_hardirqs_on+0x37/0xe0 [ 21.406116] ? kasan_bitops_generic+0x92/0x1c0 [ 21.406204] kasan_bitops_generic+0x116/0x1c0 [ 21.406297] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.406377] ? __pfx_read_tsc+0x10/0x10 [ 21.406452] ? ktime_get_ts64+0x86/0x230 [ 21.406529] kunit_try_run_case+0x1a5/0x480 [ 21.406609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.406684] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.406757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.406834] ? __kthread_parkme+0x82/0x180 [ 21.406905] ? preempt_count_sub+0x50/0x80 [ 21.406943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.406980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.407015] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.407052] kthread+0x337/0x6f0 [ 21.407080] ? trace_preempt_on+0x20/0xc0 [ 21.407148] ? __pfx_kthread+0x10/0x10 [ 21.407183] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.407217] ? calculate_sigpending+0x7b/0xa0 [ 21.407252] ? __pfx_kthread+0x10/0x10 [ 21.407281] ret_from_fork+0x116/0x1d0 [ 21.407306] ? __pfx_kthread+0x10/0x10 [ 21.407335] ret_from_fork_asm+0x1a/0x30 [ 21.407376] </TASK> [ 21.407390] [ 21.428008] Allocated by task 279: [ 21.428439] kasan_save_stack+0x45/0x70 [ 21.428858] kasan_save_track+0x18/0x40 [ 21.429359] kasan_save_alloc_info+0x3b/0x50 [ 21.429867] __kasan_kmalloc+0xb7/0xc0 [ 21.430353] __kmalloc_cache_noprof+0x189/0x420 [ 21.430796] kasan_bitops_generic+0x92/0x1c0 [ 21.431336] kunit_try_run_case+0x1a5/0x480 [ 21.431800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.432290] kthread+0x337/0x6f0 [ 21.432725] ret_from_fork+0x116/0x1d0 [ 21.433244] ret_from_fork_asm+0x1a/0x30 [ 21.433576] [ 21.433840] The buggy address belongs to the object at ffff888101e49ec0 [ 21.433840] which belongs to the cache kmalloc-16 of size 16 [ 21.434956] The buggy address is located 8 bytes inside of [ 21.434956] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.435832] [ 21.436088] The buggy address belongs to the physical page: [ 21.436606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.437418] flags: 0x200000000000000(node=0|zone=2) [ 21.437916] page_type: f5(slab) [ 21.438341] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.439040] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.439585] page dumped because: kasan: bad access detected [ 21.439976] [ 21.440297] Memory state around the buggy address: [ 21.440824] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.441600] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.442351] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.442864] ^ [ 21.443456] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.444081] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.444726] ================================================================== [ 21.123152] ================================================================== [ 21.124128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.124820] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.125523] [ 21.125812] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.125955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.126063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.126147] Call Trace: [ 21.126191] <TASK> [ 21.126237] dump_stack_lvl+0x73/0xb0 [ 21.126344] print_report+0xd1/0x650 [ 21.126494] ? __virt_addr_valid+0x1db/0x2d0 [ 21.126579] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.126726] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.126809] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.126911] kasan_report+0x141/0x180 [ 21.126980] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.127029] kasan_check_range+0x10c/0x1c0 [ 21.127064] __kasan_check_write+0x18/0x20 [ 21.127092] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.127161] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.127206] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.127245] ? trace_hardirqs_on+0x37/0xe0 [ 21.127278] ? kasan_bitops_generic+0x92/0x1c0 [ 21.127318] kasan_bitops_generic+0x116/0x1c0 [ 21.127352] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.127389] ? __pfx_read_tsc+0x10/0x10 [ 21.127419] ? ktime_get_ts64+0x86/0x230 [ 21.127454] kunit_try_run_case+0x1a5/0x480 [ 21.127492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.127526] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.127562] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.127596] ? __kthread_parkme+0x82/0x180 [ 21.127625] ? preempt_count_sub+0x50/0x80 [ 21.127657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.127692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.127725] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.127761] kthread+0x337/0x6f0 [ 21.127788] ? trace_preempt_on+0x20/0xc0 [ 21.127818] ? __pfx_kthread+0x10/0x10 [ 21.127846] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.127901] ? calculate_sigpending+0x7b/0xa0 [ 21.127940] ? __pfx_kthread+0x10/0x10 [ 21.127971] ret_from_fork+0x116/0x1d0 [ 21.127998] ? __pfx_kthread+0x10/0x10 [ 21.128026] ret_from_fork_asm+0x1a/0x30 [ 21.128068] </TASK> [ 21.128083] [ 21.145511] Allocated by task 279: [ 21.145935] kasan_save_stack+0x45/0x70 [ 21.146409] kasan_save_track+0x18/0x40 [ 21.146903] kasan_save_alloc_info+0x3b/0x50 [ 21.147440] __kasan_kmalloc+0xb7/0xc0 [ 21.147907] __kmalloc_cache_noprof+0x189/0x420 [ 21.148472] kasan_bitops_generic+0x92/0x1c0 [ 21.148895] kunit_try_run_case+0x1a5/0x480 [ 21.149238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.149629] kthread+0x337/0x6f0 [ 21.150022] ret_from_fork+0x116/0x1d0 [ 21.150510] ret_from_fork_asm+0x1a/0x30 [ 21.150976] [ 21.151218] The buggy address belongs to the object at ffff888101e49ec0 [ 21.151218] which belongs to the cache kmalloc-16 of size 16 [ 21.152271] The buggy address is located 8 bytes inside of [ 21.152271] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.153572] [ 21.153763] The buggy address belongs to the physical page: [ 21.154374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.155220] flags: 0x200000000000000(node=0|zone=2) [ 21.155647] page_type: f5(slab) [ 21.157260] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.157751] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.158233] page dumped because: kasan: bad access detected [ 21.158612] [ 21.158951] Memory state around the buggy address: [ 21.159756] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.161003] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.161811] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.162624] ^ [ 21.163058] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.163562] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.164610] ==================================================================
[ 22.819967] ================================================================== [ 22.820621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 22.821364] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.822027] [ 22.822176] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.822209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.822219] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.822230] Call trace: [ 22.822237] show_stack+0x20/0x38 (C) [ 22.822258] dump_stack_lvl+0x8c/0xd0 [ 22.822279] print_report+0x118/0x608 [ 22.822301] kasan_report+0xdc/0x128 [ 22.822322] __asan_report_load8_noabort+0x20/0x30 [ 22.822347] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 22.822370] kasan_bitops_generic+0x110/0x1c8 [ 22.822392] kunit_try_run_case+0x170/0x3f0 [ 22.822413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.822438] kthread+0x328/0x630 [ 22.822454] ret_from_fork+0x10/0x20 [ 22.822475] [ 22.828485] Allocated by task 314: [ 22.828801] kasan_save_stack+0x3c/0x68 [ 22.829163] kasan_save_track+0x20/0x40 [ 22.829524] kasan_save_alloc_info+0x40/0x58 [ 22.829925] __kasan_kmalloc+0xd4/0xd8 [ 22.830280] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.830701] kasan_bitops_generic+0xa0/0x1c8 [ 22.831100] kunit_try_run_case+0x170/0x3f0 [ 22.831493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.832001] kthread+0x328/0x630 [ 22.832305] ret_from_fork+0x10/0x20 [ 22.832642] [ 22.832789] The buggy address belongs to the object at ffff00000223e620 [ 22.832789] which belongs to the cache kmalloc-16 of size 16 [ 22.833890] The buggy address is located 8 bytes inside of [ 22.833890] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.834986] [ 22.835133] The buggy address belongs to the physical page: [ 22.835637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.836345] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.836939] page_type: f5(slab) [ 22.837237] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.837937] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.838633] page dumped because: kasan: bad access detected [ 22.839137] [ 22.839282] Memory state around the buggy address: [ 22.839721] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.840373] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.841026] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.841675] ^ [ 22.842091] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.842743] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.843393] ================================================================== [ 22.770764] ================================================================== [ 22.771420] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 22.772162] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.772833] [ 22.772983] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.773016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.773026] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.773037] Call trace: [ 22.773045] show_stack+0x20/0x38 (C) [ 22.773066] dump_stack_lvl+0x8c/0xd0 [ 22.773088] print_report+0x118/0x608 [ 22.773110] kasan_report+0xdc/0x128 [ 22.773132] kasan_check_range+0x100/0x1a8 [ 22.773155] __kasan_check_write+0x20/0x30 [ 22.773174] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 22.773197] kasan_bitops_generic+0x110/0x1c8 [ 22.773217] kunit_try_run_case+0x170/0x3f0 [ 22.773239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.773264] kthread+0x328/0x630 [ 22.773280] ret_from_fork+0x10/0x20 [ 22.773301] [ 22.779615] Allocated by task 314: [ 22.779931] kasan_save_stack+0x3c/0x68 [ 22.780293] kasan_save_track+0x20/0x40 [ 22.780655] kasan_save_alloc_info+0x40/0x58 [ 22.781057] __kasan_kmalloc+0xd4/0xd8 [ 22.781411] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.781832] kasan_bitops_generic+0xa0/0x1c8 [ 22.782232] kunit_try_run_case+0x170/0x3f0 [ 22.782624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.783132] kthread+0x328/0x630 [ 22.783436] ret_from_fork+0x10/0x20 [ 22.783774] [ 22.783919] The buggy address belongs to the object at ffff00000223e620 [ 22.783919] which belongs to the cache kmalloc-16 of size 16 [ 22.785020] The buggy address is located 8 bytes inside of [ 22.785020] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.786116] [ 22.786262] The buggy address belongs to the physical page: [ 22.786766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.787475] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.788068] page_type: f5(slab) [ 22.788366] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.789066] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.789763] page dumped because: kasan: bad access detected [ 22.790266] [ 22.790413] Memory state around the buggy address: [ 22.790851] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.791504] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.792157] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.792807] ^ [ 22.793223] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.793875] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.794525] ================================================================== [ 22.746277] ================================================================== [ 22.746954] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 22.747710] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.748376] [ 22.748532] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.748571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.748581] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.748595] Call trace: [ 22.748604] show_stack+0x20/0x38 (C) [ 22.748631] dump_stack_lvl+0x8c/0xd0 [ 22.748656] print_report+0x118/0x608 [ 22.748679] kasan_report+0xdc/0x128 [ 22.748701] __asan_report_load8_noabort+0x20/0x30 [ 22.748726] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 22.748749] kasan_bitops_generic+0x110/0x1c8 [ 22.748771] kunit_try_run_case+0x170/0x3f0 [ 22.748794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.748819] kthread+0x328/0x630 [ 22.748837] ret_from_fork+0x10/0x20 [ 22.748858] [ 22.754869] Allocated by task 314: [ 22.755187] kasan_save_stack+0x3c/0x68 [ 22.755553] kasan_save_track+0x20/0x40 [ 22.755915] kasan_save_alloc_info+0x40/0x58 [ 22.756316] __kasan_kmalloc+0xd4/0xd8 [ 22.756672] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.757095] kasan_bitops_generic+0xa0/0x1c8 [ 22.757493] kunit_try_run_case+0x170/0x3f0 [ 22.757884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.758392] kthread+0x328/0x630 [ 22.758696] ret_from_fork+0x10/0x20 [ 22.759034] [ 22.759181] The buggy address belongs to the object at ffff00000223e620 [ 22.759181] which belongs to the cache kmalloc-16 of size 16 [ 22.760282] The buggy address is located 8 bytes inside of [ 22.760282] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.761380] [ 22.761526] The buggy address belongs to the physical page: [ 22.762031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.762741] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.763338] page_type: f5(slab) [ 22.763638] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.764339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.765034] page dumped because: kasan: bad access detected [ 22.765539] [ 22.765685] Memory state around the buggy address: [ 22.766123] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.766777] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.767429] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.768079] ^ [ 22.768495] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.769148] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.769798] ================================================================== [ 22.893201] ================================================================== [ 22.893855] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 22.894597] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.895259] [ 22.895408] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.895440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.895450] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.895461] Call trace: [ 22.895468] show_stack+0x20/0x38 (C) [ 22.895488] dump_stack_lvl+0x8c/0xd0 [ 22.895510] print_report+0x118/0x608 [ 22.895531] kasan_report+0xdc/0x128 [ 22.895553] __asan_report_load8_noabort+0x20/0x30 [ 22.895578] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 22.895601] kasan_bitops_generic+0x110/0x1c8 [ 22.895622] kunit_try_run_case+0x170/0x3f0 [ 22.895643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.895667] kthread+0x328/0x630 [ 22.895683] ret_from_fork+0x10/0x20 [ 22.895704] [ 22.901714] Allocated by task 314: [ 22.902029] kasan_save_stack+0x3c/0x68 [ 22.902390] kasan_save_track+0x20/0x40 [ 22.902753] kasan_save_alloc_info+0x40/0x58 [ 22.903155] __kasan_kmalloc+0xd4/0xd8 [ 22.903509] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.903931] kasan_bitops_generic+0xa0/0x1c8 [ 22.904329] kunit_try_run_case+0x170/0x3f0 [ 22.904721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.905228] kthread+0x328/0x630 [ 22.905531] ret_from_fork+0x10/0x20 [ 22.905868] [ 22.906014] The buggy address belongs to the object at ffff00000223e620 [ 22.906014] which belongs to the cache kmalloc-16 of size 16 [ 22.907115] The buggy address is located 8 bytes inside of [ 22.907115] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.908209] [ 22.908355] The buggy address belongs to the physical page: [ 22.908860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.909568] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.910160] page_type: f5(slab) [ 22.910459] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.911158] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.911855] page dumped because: kasan: bad access detected [ 22.912359] [ 22.912504] Memory state around the buggy address: [ 22.912943] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.913594] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.914247] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.914896] ^ [ 22.915312] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.915965] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.916615] ================================================================== [ 22.671062] ================================================================== [ 22.672107] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 22.672876] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.673561] [ 22.673724] CPU: 3 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.673774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.673789] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.673807] Call trace: [ 22.673819] show_stack+0x20/0x38 (C) [ 22.673852] dump_stack_lvl+0x8c/0xd0 [ 22.673888] print_report+0x118/0x608 [ 22.673922] kasan_report+0xdc/0x128 [ 22.673953] kasan_check_range+0x100/0x1a8 [ 22.673988] __kasan_check_write+0x20/0x30 [ 22.674017] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 22.674052] kasan_bitops_generic+0x110/0x1c8 [ 22.674085] kunit_try_run_case+0x170/0x3f0 [ 22.674119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.674157] kthread+0x328/0x630 [ 22.674184] ret_from_fork+0x10/0x20 [ 22.674217] [ 22.680582] Allocated by task 314: [ 22.680907] kasan_save_stack+0x3c/0x68 [ 22.681284] kasan_save_track+0x20/0x40 [ 22.681660] kasan_save_alloc_info+0x40/0x58 [ 22.682076] __kasan_kmalloc+0xd4/0xd8 [ 22.682444] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.682882] kasan_bitops_generic+0xa0/0x1c8 [ 22.683297] kunit_try_run_case+0x170/0x3f0 [ 22.683704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.684228] kthread+0x328/0x630 [ 22.684545] ret_from_fork+0x10/0x20 [ 22.684895] [ 22.685049] The buggy address belongs to the object at ffff00000223e620 [ 22.685049] which belongs to the cache kmalloc-16 of size 16 [ 22.686166] The buggy address is located 8 bytes inside of [ 22.686166] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.687279] [ 22.687434] The buggy address belongs to the physical page: [ 22.687949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.688675] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.689287] page_type: f5(slab) [ 22.689598] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.690314] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.691022] page dumped because: kasan: bad access detected [ 22.691537] [ 22.691690] Memory state around the buggy address: [ 22.692140] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.692807] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.693474] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.694136] ^ [ 22.694563] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.695229] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.695892] ================================================================== [ 22.844170] ================================================================== [ 22.844824] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 22.845566] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.846236] [ 22.846386] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.846418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.846428] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.846439] Call trace: [ 22.846446] show_stack+0x20/0x38 (C) [ 22.846466] dump_stack_lvl+0x8c/0xd0 [ 22.846488] print_report+0x118/0x608 [ 22.846510] kasan_report+0xdc/0x128 [ 22.846532] kasan_check_range+0x100/0x1a8 [ 22.846554] __kasan_check_write+0x20/0x30 [ 22.846573] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 22.846595] kasan_bitops_generic+0x110/0x1c8 [ 22.846616] kunit_try_run_case+0x170/0x3f0 [ 22.846638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.846662] kthread+0x328/0x630 [ 22.846678] ret_from_fork+0x10/0x20 [ 22.846699] [ 22.853008] Allocated by task 314: [ 22.853322] kasan_save_stack+0x3c/0x68 [ 22.853684] kasan_save_track+0x20/0x40 [ 22.854045] kasan_save_alloc_info+0x40/0x58 [ 22.854447] __kasan_kmalloc+0xd4/0xd8 [ 22.854801] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.855223] kasan_bitops_generic+0xa0/0x1c8 [ 22.855623] kunit_try_run_case+0x170/0x3f0 [ 22.856014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.856521] kthread+0x328/0x630 [ 22.856826] ret_from_fork+0x10/0x20 [ 22.857163] [ 22.857309] The buggy address belongs to the object at ffff00000223e620 [ 22.857309] which belongs to the cache kmalloc-16 of size 16 [ 22.858411] The buggy address is located 8 bytes inside of [ 22.858411] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.859505] [ 22.859651] The buggy address belongs to the physical page: [ 22.860155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.860862] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.861456] page_type: f5(slab) [ 22.861752] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.862453] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.863148] page dumped because: kasan: bad access detected [ 22.863652] [ 22.863798] Memory state around the buggy address: [ 22.864236] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.864888] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.865540] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.866190] ^ [ 22.866605] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.867259] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.867908] ================================================================== [ 22.868677] ================================================================== [ 22.869331] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 22.870071] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.870740] [ 22.870889] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.870921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.870930] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.870941] Call trace: [ 22.870949] show_stack+0x20/0x38 (C) [ 22.870969] dump_stack_lvl+0x8c/0xd0 [ 22.870990] print_report+0x118/0x608 [ 22.871012] kasan_report+0xdc/0x128 [ 22.871033] kasan_check_range+0x100/0x1a8 [ 22.871057] __kasan_check_write+0x20/0x30 [ 22.871075] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 22.871098] kasan_bitops_generic+0x110/0x1c8 [ 22.871119] kunit_try_run_case+0x170/0x3f0 [ 22.871140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.871164] kthread+0x328/0x630 [ 22.871180] ret_from_fork+0x10/0x20 [ 22.871201] [ 22.877511] Allocated by task 314: [ 22.877824] kasan_save_stack+0x3c/0x68 [ 22.878186] kasan_save_track+0x20/0x40 [ 22.878547] kasan_save_alloc_info+0x40/0x58 [ 22.878950] __kasan_kmalloc+0xd4/0xd8 [ 22.879303] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.879726] kasan_bitops_generic+0xa0/0x1c8 [ 22.880126] kunit_try_run_case+0x170/0x3f0 [ 22.880517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.881025] kthread+0x328/0x630 [ 22.881329] ret_from_fork+0x10/0x20 [ 22.881666] [ 22.881812] The buggy address belongs to the object at ffff00000223e620 [ 22.881812] which belongs to the cache kmalloc-16 of size 16 [ 22.882913] The buggy address is located 8 bytes inside of [ 22.882913] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.884008] [ 22.884154] The buggy address belongs to the physical page: [ 22.884659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.885367] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.885960] page_type: f5(slab) [ 22.886258] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.886958] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.887654] page dumped because: kasan: bad access detected [ 22.888158] [ 22.888305] Memory state around the buggy address: [ 22.888742] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.889395] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.890047] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.890697] ^ [ 22.891112] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.891764] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.892414] ================================================================== [ 22.696794] ================================================================== [ 22.697466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 22.698232] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.698898] [ 22.699053] CPU: 3 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.699089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.699101] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.699114] Call trace: [ 22.699123] show_stack+0x20/0x38 (C) [ 22.699147] dump_stack_lvl+0x8c/0xd0 [ 22.699173] print_report+0x118/0x608 [ 22.699198] kasan_report+0xdc/0x128 [ 22.699221] __asan_report_load8_noabort+0x20/0x30 [ 22.699248] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 22.699272] kasan_bitops_generic+0x110/0x1c8 [ 22.699296] kunit_try_run_case+0x170/0x3f0 [ 22.699321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.699348] kthread+0x328/0x630 [ 22.699368] ret_from_fork+0x10/0x20 [ 22.699391] [ 22.705411] Allocated by task 314: [ 22.705729] kasan_save_stack+0x3c/0x68 [ 22.706093] kasan_save_track+0x20/0x40 [ 22.706456] kasan_save_alloc_info+0x40/0x58 [ 22.706861] __kasan_kmalloc+0xd4/0xd8 [ 22.707217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.707643] kasan_bitops_generic+0xa0/0x1c8 [ 22.708045] kunit_try_run_case+0x170/0x3f0 [ 22.708439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.708949] kthread+0x328/0x630 [ 22.709257] ret_from_fork+0x10/0x20 [ 22.709596] [ 22.709744] The buggy address belongs to the object at ffff00000223e620 [ 22.709744] which belongs to the cache kmalloc-16 of size 16 [ 22.710848] The buggy address is located 8 bytes inside of [ 22.710848] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.711946] [ 22.712094] The buggy address belongs to the physical page: [ 22.712602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.713313] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.713913] page_type: f5(slab) [ 22.714216] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.714919] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.715617] page dumped because: kasan: bad access detected [ 22.716123] [ 22.716269] Memory state around the buggy address: [ 22.716710] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.717367] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.718023] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.718675] ^ [ 22.719093] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.719747] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.720400] ================================================================== [ 22.721177] ================================================================== [ 22.721839] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 22.722586] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.723259] [ 22.723413] CPU: 3 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.723449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.723460] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.723474] Call trace: [ 22.723482] show_stack+0x20/0x38 (C) [ 22.723507] dump_stack_lvl+0x8c/0xd0 [ 22.723533] print_report+0x118/0x608 [ 22.723557] kasan_report+0xdc/0x128 [ 22.723579] kasan_check_range+0x100/0x1a8 [ 22.723605] __kasan_check_write+0x20/0x30 [ 22.723625] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 22.723650] kasan_bitops_generic+0x110/0x1c8 [ 22.723673] kunit_try_run_case+0x170/0x3f0 [ 22.723698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.723725] kthread+0x328/0x630 [ 22.723744] ret_from_fork+0x10/0x20 [ 22.723767] [ 22.730086] Allocated by task 314: [ 22.730406] kasan_save_stack+0x3c/0x68 [ 22.730772] kasan_save_track+0x20/0x40 [ 22.731136] kasan_save_alloc_info+0x40/0x58 [ 22.731539] __kasan_kmalloc+0xd4/0xd8 [ 22.731896] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.732320] kasan_bitops_generic+0xa0/0x1c8 [ 22.732723] kunit_try_run_case+0x170/0x3f0 [ 22.733117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.733627] kthread+0x328/0x630 [ 22.733934] ret_from_fork+0x10/0x20 [ 22.734273] [ 22.734421] The buggy address belongs to the object at ffff00000223e620 [ 22.734421] which belongs to the cache kmalloc-16 of size 16 [ 22.735525] The buggy address is located 8 bytes inside of [ 22.735525] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.736623] [ 22.736771] The buggy address belongs to the physical page: [ 22.737277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.737988] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.738586] page_type: f5(slab) [ 22.738887] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.739590] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.740287] page dumped because: kasan: bad access detected [ 22.740793] [ 22.740940] Memory state around the buggy address: [ 22.741379] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.742035] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.742690] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.743341] ^ [ 22.743758] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.744413] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.745066] ================================================================== [ 22.795394] ================================================================== [ 22.796048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 22.796790] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.797459] [ 22.797609] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.797641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.797651] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.797663] Call trace: [ 22.797670] show_stack+0x20/0x38 (C) [ 22.797691] dump_stack_lvl+0x8c/0xd0 [ 22.797713] print_report+0x118/0x608 [ 22.797735] kasan_report+0xdc/0x128 [ 22.797756] kasan_check_range+0x100/0x1a8 [ 22.797779] __kasan_check_write+0x20/0x30 [ 22.797797] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 22.797821] kasan_bitops_generic+0x110/0x1c8 [ 22.797842] kunit_try_run_case+0x170/0x3f0 [ 22.797863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.797889] kthread+0x328/0x630 [ 22.797905] ret_from_fork+0x10/0x20 [ 22.797925] [ 22.804236] Allocated by task 314: [ 22.804551] kasan_save_stack+0x3c/0x68 [ 22.804913] kasan_save_track+0x20/0x40 [ 22.805275] kasan_save_alloc_info+0x40/0x58 [ 22.805676] __kasan_kmalloc+0xd4/0xd8 [ 22.806029] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.806451] kasan_bitops_generic+0xa0/0x1c8 [ 22.806851] kunit_try_run_case+0x170/0x3f0 [ 22.807243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.807750] kthread+0x328/0x630 [ 22.808055] ret_from_fork+0x10/0x20 [ 22.808393] [ 22.808540] The buggy address belongs to the object at ffff00000223e620 [ 22.808540] which belongs to the cache kmalloc-16 of size 16 [ 22.809641] The buggy address is located 8 bytes inside of [ 22.809641] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.810737] [ 22.810883] The buggy address belongs to the physical page: [ 22.811386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.812094] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.812687] page_type: f5(slab) [ 22.812985] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.813686] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.814380] page dumped because: kasan: bad access detected [ 22.814885] [ 22.815031] Memory state around the buggy address: [ 22.815467] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.816121] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.816773] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.817423] ^ [ 22.817839] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.818492] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.819141] ==================================================================