Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 44.554430] ================================================================== [ 44.561467] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.570406] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 44.577785] [ 44.579265] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 44.579312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.579328] Hardware name: WinLink E850-96 board (DT) [ 44.579344] Call trace: [ 44.579358] show_stack+0x20/0x38 (C) [ 44.579393] dump_stack_lvl+0x8c/0xd0 [ 44.579427] print_report+0x118/0x608 [ 44.579461] kasan_report+0xdc/0x128 [ 44.579494] kasan_check_range+0x100/0x1a8 [ 44.579529] __kasan_check_write+0x20/0x30 [ 44.579558] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.579594] kasan_bitops_generic+0x11c/0x1c8 [ 44.579628] kunit_try_run_case+0x170/0x3f0 [ 44.579661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.579698] kthread+0x328/0x630 [ 44.579725] ret_from_fork+0x10/0x20 [ 44.579758] [ 44.651741] Allocated by task 308: [ 44.655127] kasan_save_stack+0x3c/0x68 [ 44.658946] kasan_save_track+0x20/0x40 [ 44.662766] kasan_save_alloc_info+0x40/0x58 [ 44.667019] __kasan_kmalloc+0xd4/0xd8 [ 44.670752] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.675265] kasan_bitops_generic+0xa0/0x1c8 [ 44.679519] kunit_try_run_case+0x170/0x3f0 [ 44.683686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.689154] kthread+0x328/0x630 [ 44.692366] ret_from_fork+0x10/0x20 [ 44.695925] [ 44.697400] The buggy address belongs to the object at ffff000800d63060 [ 44.697400] which belongs to the cache kmalloc-16 of size 16 [ 44.709727] The buggy address is located 8 bytes inside of [ 44.709727] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 44.721966] [ 44.723442] The buggy address belongs to the physical page: [ 44.728998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 44.736983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.743494] page_type: f5(slab) [ 44.746627] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.754351] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.762070] page dumped because: kasan: bad access detected [ 44.767625] [ 44.769101] Memory state around the buggy address: [ 44.773879] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.781084] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.788289] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 44.795489] ^ [ 44.802090] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.809296] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.816496] ================================================================== [ 45.625215] ================================================================== [ 45.632284] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.641224] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 45.648602] [ 45.650082] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 45.650127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.650143] Hardware name: WinLink E850-96 board (DT) [ 45.650160] Call trace: [ 45.650176] show_stack+0x20/0x38 (C) [ 45.650206] dump_stack_lvl+0x8c/0xd0 [ 45.650239] print_report+0x118/0x608 [ 45.650273] kasan_report+0xdc/0x128 [ 45.650303] kasan_check_range+0x100/0x1a8 [ 45.650339] __kasan_check_write+0x20/0x30 [ 45.650369] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.650407] kasan_bitops_generic+0x11c/0x1c8 [ 45.650440] kunit_try_run_case+0x170/0x3f0 [ 45.650472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.650509] kthread+0x328/0x630 [ 45.650537] ret_from_fork+0x10/0x20 [ 45.650566] [ 45.722559] Allocated by task 308: [ 45.725944] kasan_save_stack+0x3c/0x68 [ 45.729764] kasan_save_track+0x20/0x40 [ 45.733583] kasan_save_alloc_info+0x40/0x58 [ 45.737836] __kasan_kmalloc+0xd4/0xd8 [ 45.741569] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.746083] kasan_bitops_generic+0xa0/0x1c8 [ 45.750336] kunit_try_run_case+0x170/0x3f0 [ 45.754503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.759971] kthread+0x328/0x630 [ 45.763183] ret_from_fork+0x10/0x20 [ 45.766742] [ 45.768218] The buggy address belongs to the object at ffff000800d63060 [ 45.768218] which belongs to the cache kmalloc-16 of size 16 [ 45.780545] The buggy address is located 8 bytes inside of [ 45.780545] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 45.792784] [ 45.794260] The buggy address belongs to the physical page: [ 45.799815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 45.807802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.814311] page_type: f5(slab) [ 45.817444] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.825169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.832887] page dumped because: kasan: bad access detected [ 45.838442] [ 45.839918] Memory state around the buggy address: [ 45.844697] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.851901] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.859106] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 45.866307] ^ [ 45.872908] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.880112] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.887313] ================================================================== [ 46.160653] ================================================================== [ 46.167694] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.176632] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 46.183924] [ 46.185405] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 46.185450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.185466] Hardware name: WinLink E850-96 board (DT) [ 46.185485] Call trace: [ 46.185498] show_stack+0x20/0x38 (C) [ 46.185533] dump_stack_lvl+0x8c/0xd0 [ 46.185565] print_report+0x118/0x608 [ 46.185599] kasan_report+0xdc/0x128 [ 46.185631] __asan_report_load8_noabort+0x20/0x30 [ 46.185669] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.185707] kasan_bitops_generic+0x11c/0x1c8 [ 46.185741] kunit_try_run_case+0x170/0x3f0 [ 46.185777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.185816] kthread+0x328/0x630 [ 46.185841] ret_from_fork+0x10/0x20 [ 46.185872] [ 46.254495] Allocated by task 308: [ 46.257881] kasan_save_stack+0x3c/0x68 [ 46.261700] kasan_save_track+0x20/0x40 [ 46.265519] kasan_save_alloc_info+0x40/0x58 [ 46.269773] __kasan_kmalloc+0xd4/0xd8 [ 46.273505] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.278019] kasan_bitops_generic+0xa0/0x1c8 [ 46.282273] kunit_try_run_case+0x170/0x3f0 [ 46.286439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.291908] kthread+0x328/0x630 [ 46.295120] ret_from_fork+0x10/0x20 [ 46.298678] [ 46.300154] The buggy address belongs to the object at ffff000800d63060 [ 46.300154] which belongs to the cache kmalloc-16 of size 16 [ 46.312481] The buggy address is located 8 bytes inside of [ 46.312481] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 46.324720] [ 46.326196] The buggy address belongs to the physical page: [ 46.331752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 46.339739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.346247] page_type: f5(slab) [ 46.349381] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.357105] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.364823] page dumped because: kasan: bad access detected [ 46.370379] [ 46.371854] Memory state around the buggy address: [ 46.376633] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.383838] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.391042] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 46.398243] ^ [ 46.404844] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.412049] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.419250] ================================================================== [ 45.089838] ================================================================== [ 45.096875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.105815] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 45.113193] [ 45.114674] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 45.114720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.114738] Hardware name: WinLink E850-96 board (DT) [ 45.114756] Call trace: [ 45.114769] show_stack+0x20/0x38 (C) [ 45.114803] dump_stack_lvl+0x8c/0xd0 [ 45.114839] print_report+0x118/0x608 [ 45.114873] kasan_report+0xdc/0x128 [ 45.114906] kasan_check_range+0x100/0x1a8 [ 45.114941] __kasan_check_write+0x20/0x30 [ 45.114971] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.115009] kasan_bitops_generic+0x11c/0x1c8 [ 45.115041] kunit_try_run_case+0x170/0x3f0 [ 45.115076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.115114] kthread+0x328/0x630 [ 45.115141] ret_from_fork+0x10/0x20 [ 45.115171] [ 45.187150] Allocated by task 308: [ 45.190536] kasan_save_stack+0x3c/0x68 [ 45.194355] kasan_save_track+0x20/0x40 [ 45.198174] kasan_save_alloc_info+0x40/0x58 [ 45.202428] __kasan_kmalloc+0xd4/0xd8 [ 45.206160] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.210674] kasan_bitops_generic+0xa0/0x1c8 [ 45.214928] kunit_try_run_case+0x170/0x3f0 [ 45.219094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.224563] kthread+0x328/0x630 [ 45.227774] ret_from_fork+0x10/0x20 [ 45.231334] [ 45.232809] The buggy address belongs to the object at ffff000800d63060 [ 45.232809] which belongs to the cache kmalloc-16 of size 16 [ 45.245137] The buggy address is located 8 bytes inside of [ 45.245137] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 45.257375] [ 45.258851] The buggy address belongs to the physical page: [ 45.264407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 45.272392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.278902] page_type: f5(slab) [ 45.282036] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.289760] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.297478] page dumped because: kasan: bad access detected [ 45.303034] [ 45.304509] Memory state around the buggy address: [ 45.309288] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.316492] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.323697] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 45.330898] ^ [ 45.337499] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.344704] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.351905] ================================================================== [ 45.359255] ================================================================== [ 45.366315] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.375255] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 45.382547] [ 45.384028] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 45.384074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.384092] Hardware name: WinLink E850-96 board (DT) [ 45.384109] Call trace: [ 45.384123] show_stack+0x20/0x38 (C) [ 45.384155] dump_stack_lvl+0x8c/0xd0 [ 45.384190] print_report+0x118/0x608 [ 45.384223] kasan_report+0xdc/0x128 [ 45.384255] __asan_report_load8_noabort+0x20/0x30 [ 45.384293] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.384331] kasan_bitops_generic+0x11c/0x1c8 [ 45.384364] kunit_try_run_case+0x170/0x3f0 [ 45.384398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.384436] kthread+0x328/0x630 [ 45.384464] ret_from_fork+0x10/0x20 [ 45.384494] [ 45.453118] Allocated by task 308: [ 45.456504] kasan_save_stack+0x3c/0x68 [ 45.460323] kasan_save_track+0x20/0x40 [ 45.464143] kasan_save_alloc_info+0x40/0x58 [ 45.468396] __kasan_kmalloc+0xd4/0xd8 [ 45.472128] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.476642] kasan_bitops_generic+0xa0/0x1c8 [ 45.480896] kunit_try_run_case+0x170/0x3f0 [ 45.485063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.490531] kthread+0x328/0x630 [ 45.493743] ret_from_fork+0x10/0x20 [ 45.497302] [ 45.498777] The buggy address belongs to the object at ffff000800d63060 [ 45.498777] which belongs to the cache kmalloc-16 of size 16 [ 45.511104] The buggy address is located 8 bytes inside of [ 45.511104] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 45.523343] [ 45.524819] The buggy address belongs to the physical page: [ 45.530375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 45.538360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.544870] page_type: f5(slab) [ 45.548004] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.555728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.563446] page dumped because: kasan: bad access detected [ 45.569002] [ 45.570477] Memory state around the buggy address: [ 45.575256] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.582461] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.589665] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 45.596866] ^ [ 45.603467] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.610672] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.617873] ================================================================== [ 45.894629] ================================================================== [ 45.901724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 45.910664] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 45.917955] [ 45.919435] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 45.919483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.919501] Hardware name: WinLink E850-96 board (DT) [ 45.919520] Call trace: [ 45.919532] show_stack+0x20/0x38 (C) [ 45.919567] dump_stack_lvl+0x8c/0xd0 [ 45.919599] print_report+0x118/0x608 [ 45.919631] kasan_report+0xdc/0x128 [ 45.919664] __asan_report_load8_noabort+0x20/0x30 [ 45.919700] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 45.919738] kasan_bitops_generic+0x11c/0x1c8 [ 45.919771] kunit_try_run_case+0x170/0x3f0 [ 45.919804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.919842] kthread+0x328/0x630 [ 45.919867] ret_from_fork+0x10/0x20 [ 45.919899] [ 45.988527] Allocated by task 308: [ 45.991912] kasan_save_stack+0x3c/0x68 [ 45.995732] kasan_save_track+0x20/0x40 [ 45.999551] kasan_save_alloc_info+0x40/0x58 [ 46.003804] __kasan_kmalloc+0xd4/0xd8 [ 46.007537] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.012051] kasan_bitops_generic+0xa0/0x1c8 [ 46.016305] kunit_try_run_case+0x170/0x3f0 [ 46.020471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.025940] kthread+0x328/0x630 [ 46.029151] ret_from_fork+0x10/0x20 [ 46.032710] [ 46.034186] The buggy address belongs to the object at ffff000800d63060 [ 46.034186] which belongs to the cache kmalloc-16 of size 16 [ 46.046513] The buggy address is located 8 bytes inside of [ 46.046513] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 46.058752] [ 46.060228] The buggy address belongs to the physical page: [ 46.065784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 46.073769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.080279] page_type: f5(slab) [ 46.083412] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.091137] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.098855] page dumped because: kasan: bad access detected [ 46.104411] [ 46.105886] Memory state around the buggy address: [ 46.110665] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.117870] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.125074] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 46.132275] ^ [ 46.138876] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.146081] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.153282] ================================================================== [ 44.823844] ================================================================== [ 44.830909] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.839847] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 44.847138] [ 44.848619] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 44.848664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.848680] Hardware name: WinLink E850-96 board (DT) [ 44.848699] Call trace: [ 44.848711] show_stack+0x20/0x38 (C) [ 44.848746] dump_stack_lvl+0x8c/0xd0 [ 44.848781] print_report+0x118/0x608 [ 44.848813] kasan_report+0xdc/0x128 [ 44.848847] __asan_report_load8_noabort+0x20/0x30 [ 44.848885] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.848923] kasan_bitops_generic+0x11c/0x1c8 [ 44.848955] kunit_try_run_case+0x170/0x3f0 [ 44.848991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.849029] kthread+0x328/0x630 [ 44.849056] ret_from_fork+0x10/0x20 [ 44.849087] [ 44.917710] Allocated by task 308: [ 44.921095] kasan_save_stack+0x3c/0x68 [ 44.924915] kasan_save_track+0x20/0x40 [ 44.928734] kasan_save_alloc_info+0x40/0x58 [ 44.932987] __kasan_kmalloc+0xd4/0xd8 [ 44.936720] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.941234] kasan_bitops_generic+0xa0/0x1c8 [ 44.945487] kunit_try_run_case+0x170/0x3f0 [ 44.949654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.955122] kthread+0x328/0x630 [ 44.958334] ret_from_fork+0x10/0x20 [ 44.961893] [ 44.963369] The buggy address belongs to the object at ffff000800d63060 [ 44.963369] which belongs to the cache kmalloc-16 of size 16 [ 44.975696] The buggy address is located 8 bytes inside of [ 44.975696] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 44.987935] [ 44.989410] The buggy address belongs to the physical page: [ 44.994966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 45.002952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.009462] page_type: f5(slab) [ 45.012595] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.020320] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.028038] page dumped because: kasan: bad access detected [ 45.033593] [ 45.035069] Memory state around the buggy address: [ 45.039847] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.047052] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.054257] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 45.061457] ^ [ 45.068058] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.075263] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.082465] ================================================================== [ 44.288411] ================================================================== [ 44.295498] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.304438] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 44.311730] [ 44.313210] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 44.313255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.313276] Hardware name: WinLink E850-96 board (DT) [ 44.313293] Call trace: [ 44.313307] show_stack+0x20/0x38 (C) [ 44.313342] dump_stack_lvl+0x8c/0xd0 [ 44.313378] print_report+0x118/0x608 [ 44.313410] kasan_report+0xdc/0x128 [ 44.313443] __asan_report_load8_noabort+0x20/0x30 [ 44.313480] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.313518] kasan_bitops_generic+0x11c/0x1c8 [ 44.313549] kunit_try_run_case+0x170/0x3f0 [ 44.313584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.313623] kthread+0x328/0x630 [ 44.313649] ret_from_fork+0x10/0x20 [ 44.313681] [ 44.382301] Allocated by task 308: [ 44.385687] kasan_save_stack+0x3c/0x68 [ 44.389506] kasan_save_track+0x20/0x40 [ 44.393325] kasan_save_alloc_info+0x40/0x58 [ 44.397579] __kasan_kmalloc+0xd4/0xd8 [ 44.401311] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.405825] kasan_bitops_generic+0xa0/0x1c8 [ 44.410078] kunit_try_run_case+0x170/0x3f0 [ 44.414245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.419714] kthread+0x328/0x630 [ 44.422926] ret_from_fork+0x10/0x20 [ 44.426485] [ 44.427960] The buggy address belongs to the object at ffff000800d63060 [ 44.427960] which belongs to the cache kmalloc-16 of size 16 [ 44.440287] The buggy address is located 8 bytes inside of [ 44.440287] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 44.452526] [ 44.454002] The buggy address belongs to the physical page: [ 44.459559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 44.467543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.474054] page_type: f5(slab) [ 44.477187] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.484911] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.492630] page dumped because: kasan: bad access detected [ 44.498185] [ 44.499660] Memory state around the buggy address: [ 44.504438] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.511644] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.518848] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 44.526049] ^ [ 44.532650] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.539855] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.547056] ================================================================== [ 44.019166] ================================================================== [ 44.026233] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.035084] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308 [ 44.042463] [ 44.043942] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 44.043991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.044006] Hardware name: WinLink E850-96 board (DT) [ 44.044026] Call trace: [ 44.044040] show_stack+0x20/0x38 (C) [ 44.044075] dump_stack_lvl+0x8c/0xd0 [ 44.044112] print_report+0x118/0x608 [ 44.044144] kasan_report+0xdc/0x128 [ 44.044178] kasan_check_range+0x100/0x1a8 [ 44.044212] __kasan_check_write+0x20/0x30 [ 44.044241] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.044280] kasan_bitops_generic+0x11c/0x1c8 [ 44.044312] kunit_try_run_case+0x170/0x3f0 [ 44.044346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.044385] kthread+0x328/0x630 [ 44.044411] ret_from_fork+0x10/0x20 [ 44.044444] [ 44.116333] Allocated by task 308: [ 44.119718] kasan_save_stack+0x3c/0x68 [ 44.123538] kasan_save_track+0x20/0x40 [ 44.127357] kasan_save_alloc_info+0x40/0x58 [ 44.131611] __kasan_kmalloc+0xd4/0xd8 [ 44.135343] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.139857] kasan_bitops_generic+0xa0/0x1c8 [ 44.144110] kunit_try_run_case+0x170/0x3f0 [ 44.148277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.153746] kthread+0x328/0x630 [ 44.156957] ret_from_fork+0x10/0x20 [ 44.160516] [ 44.161992] The buggy address belongs to the object at ffff000800d63060 [ 44.161992] which belongs to the cache kmalloc-16 of size 16 [ 44.174319] The buggy address is located 8 bytes inside of [ 44.174319] allocated 9-byte region [ffff000800d63060, ffff000800d63069) [ 44.186558] [ 44.188034] The buggy address belongs to the physical page: [ 44.193590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 44.201575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.208085] page_type: f5(slab) [ 44.211218] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.218943] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.226661] page dumped because: kasan: bad access detected [ 44.232217] [ 44.233692] Memory state around the buggy address: [ 44.238471] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.245675] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.252880] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 44.260081] ^ [ 44.266682] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.273887] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.281087] ==================================================================
[ 29.274767] ================================================================== [ 29.274884] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 29.275026] Read of size 8 at addr fff00000c62bd348 by task kunit_try_catch/261 [ 29.281860] dump_stack_lvl+0x8c/0xd0 [ 29.283022] print_report+0x118/0x608 [ 29.283831] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 29.286509] kasan_bitops_generic+0xa0/0x1c8 [ 29.287976] [ 29.288508] page_type: f5(slab) [ 29.289759] fff00000c62bd280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.293255] ==================================================================
[ 23.073944] ================================================================== [ 23.074791] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 23.075585] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 23.076840] [ 23.077342] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.077454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.077488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.077562] Call Trace: [ 23.077608] <TASK> [ 23.077668] dump_stack_lvl+0x73/0xb0 [ 23.077762] print_report+0xd1/0x650 [ 23.077830] ? __virt_addr_valid+0x1db/0x2d0 [ 23.077911] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 23.077996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.078134] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 23.078254] kasan_report+0x141/0x180 [ 23.078329] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 23.078425] kasan_check_range+0x10c/0x1c0 [ 23.078553] __kasan_check_write+0x18/0x20 [ 23.078640] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 23.078703] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.078759] kasan_bitops_generic+0x121/0x1c0 [ 23.078795] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.078836] ? __pfx_read_tsc+0x10/0x10 [ 23.078869] ? ktime_get_ts64+0x86/0x230 [ 23.078904] kunit_try_run_case+0x1a5/0x480 [ 23.078944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.078980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.079015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.079048] ? __kthread_parkme+0x82/0x180 [ 23.079077] ? preempt_count_sub+0x50/0x80 [ 23.079109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.079146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.079180] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.079216] kthread+0x337/0x6f0 [ 23.079283] ? trace_preempt_on+0x20/0xc0 [ 23.079322] ? __pfx_kthread+0x10/0x10 [ 23.079353] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.079384] ? calculate_sigpending+0x7b/0xa0 [ 23.079419] ? __pfx_kthread+0x10/0x10 [ 23.079449] ret_from_fork+0x116/0x1d0 [ 23.079475] ? __pfx_kthread+0x10/0x10 [ 23.079528] ret_from_fork_asm+0x1a/0x30 [ 23.079616] </TASK> [ 23.079663] [ 23.104877] Allocated by task 279: [ 23.105776] kasan_save_stack+0x45/0x70 [ 23.106164] kasan_save_track+0x18/0x40 [ 23.106913] kasan_save_alloc_info+0x3b/0x50 [ 23.107960] __kasan_kmalloc+0xb7/0xc0 [ 23.108477] __kmalloc_cache_noprof+0x189/0x420 [ 23.109346] kasan_bitops_generic+0x92/0x1c0 [ 23.109628] kunit_try_run_case+0x1a5/0x480 [ 23.110494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.111249] kthread+0x337/0x6f0 [ 23.111567] ret_from_fork+0x116/0x1d0 [ 23.111840] ret_from_fork_asm+0x1a/0x30 [ 23.112120] [ 23.112287] The buggy address belongs to the object at ffff8881023e2400 [ 23.112287] which belongs to the cache kmalloc-16 of size 16 [ 23.114970] The buggy address is located 8 bytes inside of [ 23.114970] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 23.116066] [ 23.116251] The buggy address belongs to the physical page: [ 23.116726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 23.118395] flags: 0x200000000000000(node=0|zone=2) [ 23.119132] page_type: f5(slab) [ 23.119697] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.120407] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.121871] page dumped because: kasan: bad access detected [ 23.122255] [ 23.122981] Memory state around the buggy address: [ 23.123463] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 23.124204] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 23.124941] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.125977] ^ [ 23.126849] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.127420] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.128586] ================================================================== [ 22.810899] ================================================================== [ 22.812342] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 22.814032] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.814983] [ 22.815282] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.815386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.815404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.815436] Call Trace: [ 22.815460] <TASK> [ 22.815490] dump_stack_lvl+0x73/0xb0 [ 22.815609] print_report+0xd1/0x650 [ 22.815688] ? __virt_addr_valid+0x1db/0x2d0 [ 22.815771] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 22.815855] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.815928] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 22.816030] kasan_report+0x141/0x180 [ 22.816067] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 22.816112] kasan_check_range+0x10c/0x1c0 [ 22.816147] __kasan_check_write+0x18/0x20 [ 22.816174] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 22.816216] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.816304] kasan_bitops_generic+0x121/0x1c0 [ 22.816343] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.816380] ? __pfx_read_tsc+0x10/0x10 [ 22.816413] ? ktime_get_ts64+0x86/0x230 [ 22.816446] kunit_try_run_case+0x1a5/0x480 [ 22.816556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.816635] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.816704] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.816774] ? __kthread_parkme+0x82/0x180 [ 22.816838] ? preempt_count_sub+0x50/0x80 [ 22.816903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.816980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.817031] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.817068] kthread+0x337/0x6f0 [ 22.817096] ? trace_preempt_on+0x20/0xc0 [ 22.817130] ? __pfx_kthread+0x10/0x10 [ 22.817159] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.817189] ? calculate_sigpending+0x7b/0xa0 [ 22.817234] ? __pfx_kthread+0x10/0x10 [ 22.817297] ret_from_fork+0x116/0x1d0 [ 22.817325] ? __pfx_kthread+0x10/0x10 [ 22.817355] ret_from_fork_asm+0x1a/0x30 [ 22.817397] </TASK> [ 22.817411] [ 22.831983] Allocated by task 279: [ 22.832386] kasan_save_stack+0x45/0x70 [ 22.832777] kasan_save_track+0x18/0x40 [ 22.833096] kasan_save_alloc_info+0x3b/0x50 [ 22.833442] __kasan_kmalloc+0xb7/0xc0 [ 22.833878] __kmalloc_cache_noprof+0x189/0x420 [ 22.835103] kasan_bitops_generic+0x92/0x1c0 [ 22.836074] kunit_try_run_case+0x1a5/0x480 [ 22.836898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.837420] kthread+0x337/0x6f0 [ 22.838465] ret_from_fork+0x116/0x1d0 [ 22.838984] ret_from_fork_asm+0x1a/0x30 [ 22.839314] [ 22.839570] The buggy address belongs to the object at ffff8881023e2400 [ 22.839570] which belongs to the cache kmalloc-16 of size 16 [ 22.841016] The buggy address is located 8 bytes inside of [ 22.841016] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 22.841770] [ 22.841967] The buggy address belongs to the physical page: [ 22.842341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 22.843047] flags: 0x200000000000000(node=0|zone=2) [ 22.844263] page_type: f5(slab) [ 22.844946] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.845961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.846781] page dumped because: kasan: bad access detected [ 22.847379] [ 22.848016] Memory state around the buggy address: [ 22.848481] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 22.849077] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.849990] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.850576] ^ [ 22.850956] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.853427] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.853905] ================================================================== [ 22.903831] ================================================================== [ 22.904645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 22.905460] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.906090] [ 22.906378] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.906726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.906773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.906836] Call Trace: [ 22.906891] <TASK> [ 22.906944] dump_stack_lvl+0x73/0xb0 [ 22.907104] print_report+0xd1/0x650 [ 22.907190] ? __virt_addr_valid+0x1db/0x2d0 [ 22.907315] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 22.907400] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.907472] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 22.908057] kasan_report+0x141/0x180 [ 22.908185] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 22.908361] kasan_check_range+0x10c/0x1c0 [ 22.908451] __kasan_check_write+0x18/0x20 [ 22.908693] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 22.908768] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.908826] kasan_bitops_generic+0x121/0x1c0 [ 22.908862] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.908899] ? __pfx_read_tsc+0x10/0x10 [ 22.908931] ? ktime_get_ts64+0x86/0x230 [ 22.908965] kunit_try_run_case+0x1a5/0x480 [ 22.909003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.909037] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.909071] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.909105] ? __kthread_parkme+0x82/0x180 [ 22.909134] ? preempt_count_sub+0x50/0x80 [ 22.909166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.909201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.909237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.909272] kthread+0x337/0x6f0 [ 22.909301] ? trace_preempt_on+0x20/0xc0 [ 22.909386] ? __pfx_kthread+0x10/0x10 [ 22.909422] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.909453] ? calculate_sigpending+0x7b/0xa0 [ 22.909488] ? __pfx_kthread+0x10/0x10 [ 22.909558] ret_from_fork+0x116/0x1d0 [ 22.909686] ? __pfx_kthread+0x10/0x10 [ 22.909729] ret_from_fork_asm+0x1a/0x30 [ 22.909773] </TASK> [ 22.909789] [ 22.934118] Allocated by task 279: [ 22.935076] kasan_save_stack+0x45/0x70 [ 22.935686] kasan_save_track+0x18/0x40 [ 22.936424] kasan_save_alloc_info+0x3b/0x50 [ 22.937469] __kasan_kmalloc+0xb7/0xc0 [ 22.937964] __kmalloc_cache_noprof+0x189/0x420 [ 22.938452] kasan_bitops_generic+0x92/0x1c0 [ 22.939323] kunit_try_run_case+0x1a5/0x480 [ 22.940002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.941068] kthread+0x337/0x6f0 [ 22.941388] ret_from_fork+0x116/0x1d0 [ 22.942191] ret_from_fork_asm+0x1a/0x30 [ 22.942855] [ 22.943298] The buggy address belongs to the object at ffff8881023e2400 [ 22.943298] which belongs to the cache kmalloc-16 of size 16 [ 22.945065] The buggy address is located 8 bytes inside of [ 22.945065] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 22.946682] [ 22.946944] The buggy address belongs to the physical page: [ 22.947396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 22.948299] flags: 0x200000000000000(node=0|zone=2) [ 22.949002] page_type: f5(slab) [ 22.949291] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.950937] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.951801] page dumped because: kasan: bad access detected [ 22.952300] [ 22.952474] Memory state around the buggy address: [ 22.952815] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 22.953281] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.954483] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.955733] ^ [ 22.956074] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.956647] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.958063] ================================================================== [ 22.959398] ================================================================== [ 22.959891] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 22.960974] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.961940] [ 22.962200] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.962336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.962377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.962438] Call Trace: [ 22.962493] <TASK> [ 22.962568] dump_stack_lvl+0x73/0xb0 [ 22.962664] print_report+0xd1/0x650 [ 22.962748] ? __virt_addr_valid+0x1db/0x2d0 [ 22.962827] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 22.962918] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.963000] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 22.963092] kasan_report+0x141/0x180 [ 22.963181] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 22.964452] kasan_check_range+0x10c/0x1c0 [ 22.965892] __kasan_check_write+0x18/0x20 [ 22.965986] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 22.966067] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.966155] kasan_bitops_generic+0x121/0x1c0 [ 22.966234] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.966303] ? __pfx_read_tsc+0x10/0x10 [ 22.966362] ? ktime_get_ts64+0x86/0x230 [ 22.966432] kunit_try_run_case+0x1a5/0x480 [ 22.966520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.966590] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.966657] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.966727] ? __kthread_parkme+0x82/0x180 [ 22.966796] ? preempt_count_sub+0x50/0x80 [ 22.966866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.966941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.967013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.967082] kthread+0x337/0x6f0 [ 22.967136] ? trace_preempt_on+0x20/0xc0 [ 22.967204] ? __pfx_kthread+0x10/0x10 [ 22.967258] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.967313] ? calculate_sigpending+0x7b/0xa0 [ 22.967373] ? __pfx_kthread+0x10/0x10 [ 22.967424] ret_from_fork+0x116/0x1d0 [ 22.967470] ? __pfx_kthread+0x10/0x10 [ 22.968160] ret_from_fork_asm+0x1a/0x30 [ 22.968284] </TASK> [ 22.968317] [ 22.994150] Allocated by task 279: [ 22.995200] kasan_save_stack+0x45/0x70 [ 22.995829] kasan_save_track+0x18/0x40 [ 22.996290] kasan_save_alloc_info+0x3b/0x50 [ 22.996898] __kasan_kmalloc+0xb7/0xc0 [ 22.997270] __kmalloc_cache_noprof+0x189/0x420 [ 22.998000] kasan_bitops_generic+0x92/0x1c0 [ 22.998468] kunit_try_run_case+0x1a5/0x480 [ 22.999455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.000094] kthread+0x337/0x6f0 [ 23.000515] ret_from_fork+0x116/0x1d0 [ 23.001021] ret_from_fork_asm+0x1a/0x30 [ 23.001433] [ 23.001856] The buggy address belongs to the object at ffff8881023e2400 [ 23.001856] which belongs to the cache kmalloc-16 of size 16 [ 23.002761] The buggy address is located 8 bytes inside of [ 23.002761] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 23.003610] [ 23.003846] The buggy address belongs to the physical page: [ 23.005320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 23.006183] flags: 0x200000000000000(node=0|zone=2) [ 23.006812] page_type: f5(slab) [ 23.007176] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.008482] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.009336] page dumped because: kasan: bad access detected [ 23.009962] [ 23.010626] Memory state around the buggy address: [ 23.011550] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 23.012217] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 23.013764] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.014367] ^ [ 23.014967] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.016032] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.017253] ================================================================== [ 23.129758] ================================================================== [ 23.130983] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 23.131722] Read of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 23.132229] [ 23.133154] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.133335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.133375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.133437] Call Trace: [ 23.133489] <TASK> [ 23.133559] dump_stack_lvl+0x73/0xb0 [ 23.133676] print_report+0xd1/0x650 [ 23.133759] ? __virt_addr_valid+0x1db/0x2d0 [ 23.133834] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 23.133917] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.133988] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 23.134070] kasan_report+0x141/0x180 [ 23.134142] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 23.134202] kasan_check_range+0x10c/0x1c0 [ 23.134279] __kasan_check_read+0x15/0x20 [ 23.134313] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 23.134356] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.134409] kasan_bitops_generic+0x121/0x1c0 [ 23.134444] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.134484] ? __pfx_read_tsc+0x10/0x10 [ 23.134556] ? ktime_get_ts64+0x86/0x230 [ 23.134635] kunit_try_run_case+0x1a5/0x480 [ 23.134723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.134778] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.134815] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.134851] ? __kthread_parkme+0x82/0x180 [ 23.134880] ? preempt_count_sub+0x50/0x80 [ 23.134911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.134947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.134981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.135017] kthread+0x337/0x6f0 [ 23.135045] ? trace_preempt_on+0x20/0xc0 [ 23.135081] ? __pfx_kthread+0x10/0x10 [ 23.135109] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.135140] ? calculate_sigpending+0x7b/0xa0 [ 23.135173] ? __pfx_kthread+0x10/0x10 [ 23.135202] ret_from_fork+0x116/0x1d0 [ 23.135229] ? __pfx_kthread+0x10/0x10 [ 23.135257] ret_from_fork_asm+0x1a/0x30 [ 23.135299] </TASK> [ 23.135313] [ 23.159513] Allocated by task 279: [ 23.160294] kasan_save_stack+0x45/0x70 [ 23.161145] kasan_save_track+0x18/0x40 [ 23.162009] kasan_save_alloc_info+0x3b/0x50 [ 23.162389] __kasan_kmalloc+0xb7/0xc0 [ 23.162735] __kmalloc_cache_noprof+0x189/0x420 [ 23.163237] kasan_bitops_generic+0x92/0x1c0 [ 23.163781] kunit_try_run_case+0x1a5/0x480 [ 23.164142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.164738] kthread+0x337/0x6f0 [ 23.165585] ret_from_fork+0x116/0x1d0 [ 23.165983] ret_from_fork_asm+0x1a/0x30 [ 23.167119] [ 23.167390] The buggy address belongs to the object at ffff8881023e2400 [ 23.167390] which belongs to the cache kmalloc-16 of size 16 [ 23.168302] The buggy address is located 8 bytes inside of [ 23.168302] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 23.170384] [ 23.171009] The buggy address belongs to the physical page: [ 23.171430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 23.172583] flags: 0x200000000000000(node=0|zone=2) [ 23.173906] page_type: f5(slab) [ 23.174200] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.174713] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.175287] page dumped because: kasan: bad access detected [ 23.175896] [ 23.176792] Memory state around the buggy address: [ 23.177221] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 23.178433] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 23.178984] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.180157] ^ [ 23.181018] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.182152] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.182924] ================================================================== [ 23.018491] ================================================================== [ 23.019187] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 23.021271] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 23.022908] [ 23.023407] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.023518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.023560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.023670] Call Trace: [ 23.023726] <TASK> [ 23.023804] dump_stack_lvl+0x73/0xb0 [ 23.023880] print_report+0xd1/0x650 [ 23.023919] ? __virt_addr_valid+0x1db/0x2d0 [ 23.023955] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 23.023999] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.024032] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 23.024075] kasan_report+0x141/0x180 [ 23.024106] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 23.024151] kasan_check_range+0x10c/0x1c0 [ 23.024186] __kasan_check_write+0x18/0x20 [ 23.024212] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 23.024323] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.024421] kasan_bitops_generic+0x121/0x1c0 [ 23.024459] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.024516] ? __pfx_read_tsc+0x10/0x10 [ 23.024596] ? ktime_get_ts64+0x86/0x230 [ 23.024670] kunit_try_run_case+0x1a5/0x480 [ 23.024744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.024783] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.024819] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.024854] ? __kthread_parkme+0x82/0x180 [ 23.024883] ? preempt_count_sub+0x50/0x80 [ 23.024915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.024951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.024983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.025017] kthread+0x337/0x6f0 [ 23.025044] ? trace_preempt_on+0x20/0xc0 [ 23.025077] ? __pfx_kthread+0x10/0x10 [ 23.025105] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.025135] ? calculate_sigpending+0x7b/0xa0 [ 23.025168] ? __pfx_kthread+0x10/0x10 [ 23.025197] ret_from_fork+0x116/0x1d0 [ 23.025229] ? __pfx_kthread+0x10/0x10 [ 23.025300] ret_from_fork_asm+0x1a/0x30 [ 23.025345] </TASK> [ 23.025359] [ 23.048024] Allocated by task 279: [ 23.048616] kasan_save_stack+0x45/0x70 [ 23.049018] kasan_save_track+0x18/0x40 [ 23.049462] kasan_save_alloc_info+0x3b/0x50 [ 23.049957] __kasan_kmalloc+0xb7/0xc0 [ 23.050518] __kmalloc_cache_noprof+0x189/0x420 [ 23.050888] kasan_bitops_generic+0x92/0x1c0 [ 23.051257] kunit_try_run_case+0x1a5/0x480 [ 23.051813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.052440] kthread+0x337/0x6f0 [ 23.052844] ret_from_fork+0x116/0x1d0 [ 23.053117] ret_from_fork_asm+0x1a/0x30 [ 23.053459] [ 23.053669] The buggy address belongs to the object at ffff8881023e2400 [ 23.053669] which belongs to the cache kmalloc-16 of size 16 [ 23.054339] The buggy address is located 8 bytes inside of [ 23.054339] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 23.056298] [ 23.056569] The buggy address belongs to the physical page: [ 23.057074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 23.060940] flags: 0x200000000000000(node=0|zone=2) [ 23.061953] page_type: f5(slab) [ 23.062932] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.064124] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.065562] page dumped because: kasan: bad access detected [ 23.066092] [ 23.066385] Memory state around the buggy address: [ 23.066824] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 23.067832] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 23.068285] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.069491] ^ [ 23.069810] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.070921] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.071954] ================================================================== [ 22.758820] ================================================================== [ 22.759588] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 22.760608] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.761241] [ 22.761989] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.762551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.762573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.762638] Call Trace: [ 22.762683] <TASK> [ 22.762733] dump_stack_lvl+0x73/0xb0 [ 22.762786] print_report+0xd1/0x650 [ 22.762820] ? __virt_addr_valid+0x1db/0x2d0 [ 22.762852] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 22.762890] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.762921] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 22.762961] kasan_report+0x141/0x180 [ 22.762991] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 22.763035] kasan_check_range+0x10c/0x1c0 [ 22.763069] __kasan_check_write+0x18/0x20 [ 22.763094] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 22.763133] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.763182] kasan_bitops_generic+0x121/0x1c0 [ 22.763216] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.763279] ? __pfx_read_tsc+0x10/0x10 [ 22.763313] ? ktime_get_ts64+0x86/0x230 [ 22.763348] kunit_try_run_case+0x1a5/0x480 [ 22.763386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.763419] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.763453] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.763488] ? __kthread_parkme+0x82/0x180 [ 22.763557] ? preempt_count_sub+0x50/0x80 [ 22.763642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.763693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.763729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.763764] kthread+0x337/0x6f0 [ 22.763792] ? trace_preempt_on+0x20/0xc0 [ 22.763828] ? __pfx_kthread+0x10/0x10 [ 22.763855] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.763887] ? calculate_sigpending+0x7b/0xa0 [ 22.763920] ? __pfx_kthread+0x10/0x10 [ 22.763950] ret_from_fork+0x116/0x1d0 [ 22.763976] ? __pfx_kthread+0x10/0x10 [ 22.764005] ret_from_fork_asm+0x1a/0x30 [ 22.764048] </TASK> [ 22.764063] [ 22.787353] Allocated by task 279: [ 22.788055] kasan_save_stack+0x45/0x70 [ 22.788827] kasan_save_track+0x18/0x40 [ 22.789121] kasan_save_alloc_info+0x3b/0x50 [ 22.790067] __kasan_kmalloc+0xb7/0xc0 [ 22.790991] __kmalloc_cache_noprof+0x189/0x420 [ 22.791891] kasan_bitops_generic+0x92/0x1c0 [ 22.792139] kunit_try_run_case+0x1a5/0x480 [ 22.792323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.792603] kthread+0x337/0x6f0 [ 22.792900] ret_from_fork+0x116/0x1d0 [ 22.793319] ret_from_fork_asm+0x1a/0x30 [ 22.794384] [ 22.794700] The buggy address belongs to the object at ffff8881023e2400 [ 22.794700] which belongs to the cache kmalloc-16 of size 16 [ 22.795991] The buggy address is located 8 bytes inside of [ 22.795991] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 22.797396] [ 22.798030] The buggy address belongs to the physical page: [ 22.798811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 22.799754] flags: 0x200000000000000(node=0|zone=2) [ 22.800383] page_type: f5(slab) [ 22.801209] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.802147] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.802906] page dumped because: kasan: bad access detected [ 22.803392] [ 22.803810] Memory state around the buggy address: [ 22.804180] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 22.805051] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.805571] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.806746] ^ [ 22.807314] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.808314] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.809515] ================================================================== [ 22.855319] ================================================================== [ 22.856530] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 22.857533] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 22.858450] [ 22.858760] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 22.858884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.858922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.858983] Call Trace: [ 22.859032] <TASK> [ 22.859084] dump_stack_lvl+0x73/0xb0 [ 22.859173] print_report+0xd1/0x650 [ 22.859337] ? __virt_addr_valid+0x1db/0x2d0 [ 22.859415] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 22.859513] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.859595] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 22.859685] kasan_report+0x141/0x180 [ 22.859762] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 22.859859] kasan_check_range+0x10c/0x1c0 [ 22.859942] __kasan_check_write+0x18/0x20 [ 22.860013] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 22.860096] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.860202] kasan_bitops_generic+0x121/0x1c0 [ 22.861146] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.861232] ? __pfx_read_tsc+0x10/0x10 [ 22.861324] ? ktime_get_ts64+0x86/0x230 [ 22.861403] kunit_try_run_case+0x1a5/0x480 [ 22.861488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.861748] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.861798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.861838] ? __kthread_parkme+0x82/0x180 [ 22.861871] ? preempt_count_sub+0x50/0x80 [ 22.861904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.861942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.861979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.862015] kthread+0x337/0x6f0 [ 22.862042] ? trace_preempt_on+0x20/0xc0 [ 22.862079] ? __pfx_kthread+0x10/0x10 [ 22.862110] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.862142] ? calculate_sigpending+0x7b/0xa0 [ 22.862178] ? __pfx_kthread+0x10/0x10 [ 22.862209] ret_from_fork+0x116/0x1d0 [ 22.862289] ? __pfx_kthread+0x10/0x10 [ 22.862325] ret_from_fork_asm+0x1a/0x30 [ 22.862370] </TASK> [ 22.862386] [ 22.882468] Allocated by task 279: [ 22.883176] kasan_save_stack+0x45/0x70 [ 22.883685] kasan_save_track+0x18/0x40 [ 22.884040] kasan_save_alloc_info+0x3b/0x50 [ 22.884534] __kasan_kmalloc+0xb7/0xc0 [ 22.884883] __kmalloc_cache_noprof+0x189/0x420 [ 22.885304] kasan_bitops_generic+0x92/0x1c0 [ 22.886429] kunit_try_run_case+0x1a5/0x480 [ 22.887198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.887902] kthread+0x337/0x6f0 [ 22.888276] ret_from_fork+0x116/0x1d0 [ 22.888806] ret_from_fork_asm+0x1a/0x30 [ 22.889283] [ 22.889526] The buggy address belongs to the object at ffff8881023e2400 [ 22.889526] which belongs to the cache kmalloc-16 of size 16 [ 22.891253] The buggy address is located 8 bytes inside of [ 22.891253] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 22.892359] [ 22.892772] The buggy address belongs to the physical page: [ 22.893238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 22.894433] flags: 0x200000000000000(node=0|zone=2) [ 22.895118] page_type: f5(slab) [ 22.895580] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.896234] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.897008] page dumped because: kasan: bad access detected [ 22.898171] [ 22.898455] Memory state around the buggy address: [ 22.899117] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 22.899901] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.900885] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.901453] ^ [ 22.901835] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.902354] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.902878] ================================================================== [ 23.184174] ================================================================== [ 23.184796] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 23.186126] Read of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279 [ 23.187975] [ 23.188197] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 23.188320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.188360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.188620] Call Trace: [ 23.188682] <TASK> [ 23.188737] dump_stack_lvl+0x73/0xb0 [ 23.188807] print_report+0xd1/0x650 [ 23.188845] ? __virt_addr_valid+0x1db/0x2d0 [ 23.188879] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 23.188917] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.188950] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 23.188989] kasan_report+0x141/0x180 [ 23.189020] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 23.189065] __asan_report_load8_noabort+0x18/0x20 [ 23.189101] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 23.189141] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.189190] kasan_bitops_generic+0x121/0x1c0 [ 23.189233] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.189299] ? __pfx_read_tsc+0x10/0x10 [ 23.189334] ? ktime_get_ts64+0x86/0x230 [ 23.189368] kunit_try_run_case+0x1a5/0x480 [ 23.189406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.189440] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.189473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.189529] ? __kthread_parkme+0x82/0x180 [ 23.189598] ? preempt_count_sub+0x50/0x80 [ 23.189697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.189770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.189841] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.189906] kthread+0x337/0x6f0 [ 23.189968] ? trace_preempt_on+0x20/0xc0 [ 23.190045] ? __pfx_kthread+0x10/0x10 [ 23.190082] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.190116] ? calculate_sigpending+0x7b/0xa0 [ 23.190150] ? __pfx_kthread+0x10/0x10 [ 23.190179] ret_from_fork+0x116/0x1d0 [ 23.190206] ? __pfx_kthread+0x10/0x10 [ 23.190285] ret_from_fork_asm+0x1a/0x30 [ 23.190335] </TASK> [ 23.190352] [ 23.211358] Allocated by task 279: [ 23.211754] kasan_save_stack+0x45/0x70 [ 23.212293] kasan_save_track+0x18/0x40 [ 23.212707] kasan_save_alloc_info+0x3b/0x50 [ 23.213124] __kasan_kmalloc+0xb7/0xc0 [ 23.213609] __kmalloc_cache_noprof+0x189/0x420 [ 23.214010] kasan_bitops_generic+0x92/0x1c0 [ 23.214390] kunit_try_run_case+0x1a5/0x480 [ 23.214805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.215339] kthread+0x337/0x6f0 [ 23.215800] ret_from_fork+0x116/0x1d0 [ 23.216216] ret_from_fork_asm+0x1a/0x30 [ 23.216905] [ 23.217142] The buggy address belongs to the object at ffff8881023e2400 [ 23.217142] which belongs to the cache kmalloc-16 of size 16 [ 23.218414] The buggy address is located 8 bytes inside of [ 23.218414] allocated 9-byte region [ffff8881023e2400, ffff8881023e2409) [ 23.219361] [ 23.219725] The buggy address belongs to the physical page: [ 23.220354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2 [ 23.221030] flags: 0x200000000000000(node=0|zone=2) [ 23.221477] page_type: f5(slab) [ 23.221935] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.222717] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.223347] page dumped because: kasan: bad access detected [ 23.223889] [ 23.224160] Memory state around the buggy address: [ 23.224698] ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 23.225399] ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 23.226097] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.226844] ^ [ 23.227287] ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.228842] ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.235467] ==================================================================
[ 21.588029] ================================================================== [ 21.588505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.589601] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.590869] [ 21.591187] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.591310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.591344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.591375] Call Trace: [ 21.591395] <TASK> [ 21.591415] dump_stack_lvl+0x73/0xb0 [ 21.591474] print_report+0xd1/0x650 [ 21.591534] ? __virt_addr_valid+0x1db/0x2d0 [ 21.591569] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.591611] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.591643] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.591684] kasan_report+0x141/0x180 [ 21.591715] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.591759] kasan_check_range+0x10c/0x1c0 [ 21.591793] __kasan_check_write+0x18/0x20 [ 21.591819] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.591859] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.591950] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.592031] ? trace_hardirqs_on+0x37/0xe0 [ 21.592085] ? kasan_bitops_generic+0x92/0x1c0 [ 21.592204] kasan_bitops_generic+0x121/0x1c0 [ 21.592291] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.592353] ? __pfx_read_tsc+0x10/0x10 [ 21.592386] ? ktime_get_ts64+0x86/0x230 [ 21.592418] kunit_try_run_case+0x1a5/0x480 [ 21.592455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.592488] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.592521] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.592556] ? __kthread_parkme+0x82/0x180 [ 21.592586] ? preempt_count_sub+0x50/0x80 [ 21.592618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.592655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.592689] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.592762] kthread+0x337/0x6f0 [ 21.592820] ? trace_preempt_on+0x20/0xc0 [ 21.592900] ? __pfx_kthread+0x10/0x10 [ 21.592964] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.593029] ? calculate_sigpending+0x7b/0xa0 [ 21.593100] ? __pfx_kthread+0x10/0x10 [ 21.593170] ret_from_fork+0x116/0x1d0 [ 21.593368] ? __pfx_kthread+0x10/0x10 [ 21.593444] ret_from_fork_asm+0x1a/0x30 [ 21.593528] </TASK> [ 21.593559] [ 21.616282] Allocated by task 279: [ 21.616570] kasan_save_stack+0x45/0x70 [ 21.616922] kasan_save_track+0x18/0x40 [ 21.618262] kasan_save_alloc_info+0x3b/0x50 [ 21.619042] __kasan_kmalloc+0xb7/0xc0 [ 21.619327] __kmalloc_cache_noprof+0x189/0x420 [ 21.619800] kasan_bitops_generic+0x92/0x1c0 [ 21.620738] kunit_try_run_case+0x1a5/0x480 [ 21.621288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.621786] kthread+0x337/0x6f0 [ 21.622538] ret_from_fork+0x116/0x1d0 [ 21.622862] ret_from_fork_asm+0x1a/0x30 [ 21.623711] [ 21.623922] The buggy address belongs to the object at ffff888101e49ec0 [ 21.623922] which belongs to the cache kmalloc-16 of size 16 [ 21.625279] The buggy address is located 8 bytes inside of [ 21.625279] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.626486] [ 21.626683] The buggy address belongs to the physical page: [ 21.627698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.628266] flags: 0x200000000000000(node=0|zone=2) [ 21.628902] page_type: f5(slab) [ 21.629388] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.630018] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.630979] page dumped because: kasan: bad access detected [ 21.631515] [ 21.632039] Memory state around the buggy address: [ 21.632701] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.633447] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.634206] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.634722] ^ [ 21.635460] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.636166] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.636848] ================================================================== [ 21.496668] ================================================================== [ 21.498015] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.498780] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.499340] [ 21.499703] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.500033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.500071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.500126] Call Trace: [ 21.500168] <TASK> [ 21.500204] dump_stack_lvl+0x73/0xb0 [ 21.500284] print_report+0xd1/0x650 [ 21.500357] ? __virt_addr_valid+0x1db/0x2d0 [ 21.500432] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.500862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.500961] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.501041] kasan_report+0x141/0x180 [ 21.501080] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.501167] kasan_check_range+0x10c/0x1c0 [ 21.501232] __kasan_check_write+0x18/0x20 [ 21.501266] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.501308] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.501351] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.501385] ? trace_hardirqs_on+0x37/0xe0 [ 21.501414] ? kasan_bitops_generic+0x92/0x1c0 [ 21.501453] kasan_bitops_generic+0x121/0x1c0 [ 21.501486] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.501561] ? __pfx_read_tsc+0x10/0x10 [ 21.501645] ? ktime_get_ts64+0x86/0x230 [ 21.501727] kunit_try_run_case+0x1a5/0x480 [ 21.501814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.501873] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.501935] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.501970] ? __kthread_parkme+0x82/0x180 [ 21.502001] ? preempt_count_sub+0x50/0x80 [ 21.502033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.502069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.502144] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.502187] kthread+0x337/0x6f0 [ 21.502218] ? trace_preempt_on+0x20/0xc0 [ 21.502248] ? __pfx_kthread+0x10/0x10 [ 21.502290] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.502322] ? calculate_sigpending+0x7b/0xa0 [ 21.502357] ? __pfx_kthread+0x10/0x10 [ 21.502387] ret_from_fork+0x116/0x1d0 [ 21.502412] ? __pfx_kthread+0x10/0x10 [ 21.502440] ret_from_fork_asm+0x1a/0x30 [ 21.502482] </TASK> [ 21.502496] [ 21.519359] Allocated by task 279: [ 21.519730] kasan_save_stack+0x45/0x70 [ 21.520248] kasan_save_track+0x18/0x40 [ 21.520686] kasan_save_alloc_info+0x3b/0x50 [ 21.521262] __kasan_kmalloc+0xb7/0xc0 [ 21.521690] __kmalloc_cache_noprof+0x189/0x420 [ 21.522283] kasan_bitops_generic+0x92/0x1c0 [ 21.522747] kunit_try_run_case+0x1a5/0x480 [ 21.523290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.523848] kthread+0x337/0x6f0 [ 21.524311] ret_from_fork+0x116/0x1d0 [ 21.524729] ret_from_fork_asm+0x1a/0x30 [ 21.525235] [ 21.525474] The buggy address belongs to the object at ffff888101e49ec0 [ 21.525474] which belongs to the cache kmalloc-16 of size 16 [ 21.526428] The buggy address is located 8 bytes inside of [ 21.526428] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.527369] [ 21.527628] The buggy address belongs to the physical page: [ 21.528245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.529006] flags: 0x200000000000000(node=0|zone=2) [ 21.529564] page_type: f5(slab) [ 21.529981] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.530685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.531434] page dumped because: kasan: bad access detected [ 21.531979] [ 21.532266] Memory state around the buggy address: [ 21.532739] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.533993] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.534687] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.535219] ^ [ 21.535588] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.537197] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.538075] ================================================================== [ 21.772722] ================================================================== [ 21.774243] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.775643] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.776562] [ 21.777022] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.777255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.777299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.777358] Call Trace: [ 21.777380] <TASK> [ 21.777399] dump_stack_lvl+0x73/0xb0 [ 21.777443] print_report+0xd1/0x650 [ 21.777477] ? __virt_addr_valid+0x1db/0x2d0 [ 21.777509] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.777550] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.777581] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.777622] kasan_report+0x141/0x180 [ 21.777652] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.777700] kasan_check_range+0x10c/0x1c0 [ 21.777734] __kasan_check_write+0x18/0x20 [ 21.777761] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.777802] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.777844] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.777904] ? trace_hardirqs_on+0x37/0xe0 [ 21.777942] ? kasan_bitops_generic+0x92/0x1c0 [ 21.777982] kasan_bitops_generic+0x121/0x1c0 [ 21.778015] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.778051] ? __pfx_read_tsc+0x10/0x10 [ 21.778079] ? ktime_get_ts64+0x86/0x230 [ 21.778156] kunit_try_run_case+0x1a5/0x480 [ 21.778196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.778232] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.778274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.778310] ? __kthread_parkme+0x82/0x180 [ 21.778339] ? preempt_count_sub+0x50/0x80 [ 21.778369] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.778404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.778438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.778473] kthread+0x337/0x6f0 [ 21.778500] ? trace_preempt_on+0x20/0xc0 [ 21.778531] ? __pfx_kthread+0x10/0x10 [ 21.778558] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.778589] ? calculate_sigpending+0x7b/0xa0 [ 21.778623] ? __pfx_kthread+0x10/0x10 [ 21.778653] ret_from_fork+0x116/0x1d0 [ 21.778679] ? __pfx_kthread+0x10/0x10 [ 21.778707] ret_from_fork_asm+0x1a/0x30 [ 21.778747] </TASK> [ 21.778761] [ 21.797822] Allocated by task 279: [ 21.798327] kasan_save_stack+0x45/0x70 [ 21.798795] kasan_save_track+0x18/0x40 [ 21.799247] kasan_save_alloc_info+0x3b/0x50 [ 21.799749] __kasan_kmalloc+0xb7/0xc0 [ 21.800229] __kmalloc_cache_noprof+0x189/0x420 [ 21.800719] kasan_bitops_generic+0x92/0x1c0 [ 21.801197] kunit_try_run_case+0x1a5/0x480 [ 21.801678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.802147] kthread+0x337/0x6f0 [ 21.802593] ret_from_fork+0x116/0x1d0 [ 21.803014] ret_from_fork_asm+0x1a/0x30 [ 21.803702] [ 21.803979] The buggy address belongs to the object at ffff888101e49ec0 [ 21.803979] which belongs to the cache kmalloc-16 of size 16 [ 21.804710] The buggy address is located 8 bytes inside of [ 21.804710] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.805774] [ 21.806058] The buggy address belongs to the physical page: [ 21.806577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.807252] flags: 0x200000000000000(node=0|zone=2) [ 21.807780] page_type: f5(slab) [ 21.808257] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.808949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.809693] page dumped because: kasan: bad access detected [ 21.810232] [ 21.810488] Memory state around the buggy address: [ 21.810981] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.811787] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.812602] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.813262] ^ [ 21.813761] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.814441] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.815055] ================================================================== [ 21.686268] ================================================================== [ 21.687248] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.688006] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.688678] [ 21.688981] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.689099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.689136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.689201] Call Trace: [ 21.689240] <TASK> [ 21.689284] dump_stack_lvl+0x73/0xb0 [ 21.689392] print_report+0xd1/0x650 [ 21.689500] ? __virt_addr_valid+0x1db/0x2d0 [ 21.689577] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.689662] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.689764] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.689898] kasan_report+0x141/0x180 [ 21.689977] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.690096] kasan_check_range+0x10c/0x1c0 [ 21.690209] __kasan_check_write+0x18/0x20 [ 21.690305] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.690352] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.690394] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.690431] ? trace_hardirqs_on+0x37/0xe0 [ 21.690464] ? kasan_bitops_generic+0x92/0x1c0 [ 21.690504] kasan_bitops_generic+0x121/0x1c0 [ 21.690539] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.690577] ? __pfx_read_tsc+0x10/0x10 [ 21.690608] ? ktime_get_ts64+0x86/0x230 [ 21.690642] kunit_try_run_case+0x1a5/0x480 [ 21.690676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.690712] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.690747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.690781] ? __kthread_parkme+0x82/0x180 [ 21.690810] ? preempt_count_sub+0x50/0x80 [ 21.690841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.690895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.690941] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.690977] kthread+0x337/0x6f0 [ 21.691005] ? trace_preempt_on+0x20/0xc0 [ 21.691037] ? __pfx_kthread+0x10/0x10 [ 21.691066] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.691106] ? calculate_sigpending+0x7b/0xa0 [ 21.691165] ? __pfx_kthread+0x10/0x10 [ 21.691199] ret_from_fork+0x116/0x1d0 [ 21.691225] ? __pfx_kthread+0x10/0x10 [ 21.691255] ret_from_fork_asm+0x1a/0x30 [ 21.691296] </TASK> [ 21.691310] [ 21.708602] Allocated by task 279: [ 21.708990] kasan_save_stack+0x45/0x70 [ 21.709556] kasan_save_track+0x18/0x40 [ 21.710039] kasan_save_alloc_info+0x3b/0x50 [ 21.710504] __kasan_kmalloc+0xb7/0xc0 [ 21.710968] __kmalloc_cache_noprof+0x189/0x420 [ 21.711598] kasan_bitops_generic+0x92/0x1c0 [ 21.712102] kunit_try_run_case+0x1a5/0x480 [ 21.712503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.712997] kthread+0x337/0x6f0 [ 21.713298] ret_from_fork+0x116/0x1d0 [ 21.713615] ret_from_fork_asm+0x1a/0x30 [ 21.713994] [ 21.714328] The buggy address belongs to the object at ffff888101e49ec0 [ 21.714328] which belongs to the cache kmalloc-16 of size 16 [ 21.715559] The buggy address is located 8 bytes inside of [ 21.715559] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.717999] [ 21.718281] The buggy address belongs to the physical page: [ 21.718666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.719479] flags: 0x200000000000000(node=0|zone=2) [ 21.721019] page_type: f5(slab) [ 21.721587] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.722410] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.723591] page dumped because: kasan: bad access detected [ 21.724202] [ 21.724388] Memory state around the buggy address: [ 21.724834] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.725455] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.726425] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.727166] ^ [ 21.727688] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.728640] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.729438] ================================================================== [ 21.816167] ================================================================== [ 21.817324] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.818060] Read of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.818792] [ 21.819529] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.819652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.819692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.819750] Call Trace: [ 21.819791] <TASK> [ 21.819832] dump_stack_lvl+0x73/0xb0 [ 21.819935] print_report+0xd1/0x650 [ 21.820008] ? __virt_addr_valid+0x1db/0x2d0 [ 21.820082] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.820167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.820241] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.820321] kasan_report+0x141/0x180 [ 21.820395] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.820489] kasan_check_range+0x10c/0x1c0 [ 21.820565] __kasan_check_read+0x15/0x20 [ 21.820632] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.820718] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.820808] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.820967] ? trace_hardirqs_on+0x37/0xe0 [ 21.821111] ? kasan_bitops_generic+0x92/0x1c0 [ 21.821202] kasan_bitops_generic+0x121/0x1c0 [ 21.821278] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.821359] ? __pfx_read_tsc+0x10/0x10 [ 21.821431] ? ktime_get_ts64+0x86/0x230 [ 21.821506] kunit_try_run_case+0x1a5/0x480 [ 21.821581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.821641] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.821681] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.821716] ? __kthread_parkme+0x82/0x180 [ 21.821746] ? preempt_count_sub+0x50/0x80 [ 21.821777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.821812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.821846] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.821908] kthread+0x337/0x6f0 [ 21.821942] ? trace_preempt_on+0x20/0xc0 [ 21.821975] ? __pfx_kthread+0x10/0x10 [ 21.822004] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.822036] ? calculate_sigpending+0x7b/0xa0 [ 21.822072] ? __pfx_kthread+0x10/0x10 [ 21.822113] ret_from_fork+0x116/0x1d0 [ 21.822162] ? __pfx_kthread+0x10/0x10 [ 21.822191] ret_from_fork_asm+0x1a/0x30 [ 21.822234] </TASK> [ 21.822250] [ 21.840249] Allocated by task 279: [ 21.840687] kasan_save_stack+0x45/0x70 [ 21.841172] kasan_save_track+0x18/0x40 [ 21.841663] kasan_save_alloc_info+0x3b/0x50 [ 21.842187] __kasan_kmalloc+0xb7/0xc0 [ 21.842696] __kmalloc_cache_noprof+0x189/0x420 [ 21.843246] kasan_bitops_generic+0x92/0x1c0 [ 21.843772] kunit_try_run_case+0x1a5/0x480 [ 21.844134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.844528] kthread+0x337/0x6f0 [ 21.844822] ret_from_fork+0x116/0x1d0 [ 21.845393] ret_from_fork_asm+0x1a/0x30 [ 21.845852] [ 21.846105] The buggy address belongs to the object at ffff888101e49ec0 [ 21.846105] which belongs to the cache kmalloc-16 of size 16 [ 21.847615] The buggy address is located 8 bytes inside of [ 21.847615] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.848326] [ 21.848515] The buggy address belongs to the physical page: [ 21.849153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.849906] flags: 0x200000000000000(node=0|zone=2) [ 21.851776] page_type: f5(slab) [ 21.852164] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.852832] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.854306] page dumped because: kasan: bad access detected [ 21.855064] [ 21.855456] Memory state around the buggy address: [ 21.855791] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.856478] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.857017] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.857644] ^ [ 21.858528] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.859076] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.860934] ================================================================== [ 21.638723] ================================================================== [ 21.639285] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.640414] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.641214] [ 21.641646] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.641940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.642174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.642239] Call Trace: [ 21.642300] <TASK> [ 21.642347] dump_stack_lvl+0x73/0xb0 [ 21.642643] print_report+0xd1/0x650 [ 21.642685] ? __virt_addr_valid+0x1db/0x2d0 [ 21.642721] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.642762] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.642792] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.642832] kasan_report+0x141/0x180 [ 21.642864] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.642941] kasan_check_range+0x10c/0x1c0 [ 21.642978] __kasan_check_write+0x18/0x20 [ 21.643007] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.643046] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.643087] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.643160] ? trace_hardirqs_on+0x37/0xe0 [ 21.643196] ? kasan_bitops_generic+0x92/0x1c0 [ 21.643237] kasan_bitops_generic+0x121/0x1c0 [ 21.643271] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.643308] ? __pfx_read_tsc+0x10/0x10 [ 21.643337] ? ktime_get_ts64+0x86/0x230 [ 21.643370] kunit_try_run_case+0x1a5/0x480 [ 21.643404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.643438] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.643471] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.643504] ? __kthread_parkme+0x82/0x180 [ 21.643533] ? preempt_count_sub+0x50/0x80 [ 21.643565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.643601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.643636] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.643670] kthread+0x337/0x6f0 [ 21.643697] ? trace_preempt_on+0x20/0xc0 [ 21.643728] ? __pfx_kthread+0x10/0x10 [ 21.643756] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.643787] ? calculate_sigpending+0x7b/0xa0 [ 21.643820] ? __pfx_kthread+0x10/0x10 [ 21.643849] ret_from_fork+0x116/0x1d0 [ 21.643894] ? __pfx_kthread+0x10/0x10 [ 21.643931] ret_from_fork_asm+0x1a/0x30 [ 21.643973] </TASK> [ 21.643989] [ 21.665631] Allocated by task 279: [ 21.666007] kasan_save_stack+0x45/0x70 [ 21.667001] kasan_save_track+0x18/0x40 [ 21.667698] kasan_save_alloc_info+0x3b/0x50 [ 21.668069] __kasan_kmalloc+0xb7/0xc0 [ 21.668930] __kmalloc_cache_noprof+0x189/0x420 [ 21.669569] kasan_bitops_generic+0x92/0x1c0 [ 21.669986] kunit_try_run_case+0x1a5/0x480 [ 21.670925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.671447] kthread+0x337/0x6f0 [ 21.671810] ret_from_fork+0x116/0x1d0 [ 21.672607] ret_from_fork_asm+0x1a/0x30 [ 21.672978] [ 21.673182] The buggy address belongs to the object at ffff888101e49ec0 [ 21.673182] which belongs to the cache kmalloc-16 of size 16 [ 21.674594] The buggy address is located 8 bytes inside of [ 21.674594] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.675940] [ 21.676146] The buggy address belongs to the physical page: [ 21.676485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.677685] flags: 0x200000000000000(node=0|zone=2) [ 21.678122] page_type: f5(slab) [ 21.678502] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.679386] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.679645] page dumped because: kasan: bad access detected [ 21.679840] [ 21.679958] Memory state around the buggy address: [ 21.680211] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.681593] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.682236] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.682755] ^ [ 21.683177] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.683809] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.684623] ================================================================== [ 21.730614] ================================================================== [ 21.731282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.732034] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.732940] [ 21.733158] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.733257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.733291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.733341] Call Trace: [ 21.733375] <TASK> [ 21.733413] dump_stack_lvl+0x73/0xb0 [ 21.733530] print_report+0xd1/0x650 [ 21.733616] ? __virt_addr_valid+0x1db/0x2d0 [ 21.733692] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.733778] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.733859] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.733970] kasan_report+0x141/0x180 [ 21.734048] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.734149] kasan_check_range+0x10c/0x1c0 [ 21.734233] __kasan_check_write+0x18/0x20 [ 21.734312] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.734433] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.734529] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.734609] ? trace_hardirqs_on+0x37/0xe0 [ 21.734682] ? kasan_bitops_generic+0x92/0x1c0 [ 21.734770] kasan_bitops_generic+0x121/0x1c0 [ 21.734845] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.734944] ? __pfx_read_tsc+0x10/0x10 [ 21.735015] ? ktime_get_ts64+0x86/0x230 [ 21.735098] kunit_try_run_case+0x1a5/0x480 [ 21.735215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.735327] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.735409] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.735490] ? __kthread_parkme+0x82/0x180 [ 21.735559] ? preempt_count_sub+0x50/0x80 [ 21.735633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.735684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.735720] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.735756] kthread+0x337/0x6f0 [ 21.735783] ? trace_preempt_on+0x20/0xc0 [ 21.735814] ? __pfx_kthread+0x10/0x10 [ 21.735842] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.735893] ? calculate_sigpending+0x7b/0xa0 [ 21.735940] ? __pfx_kthread+0x10/0x10 [ 21.735972] ret_from_fork+0x116/0x1d0 [ 21.735999] ? __pfx_kthread+0x10/0x10 [ 21.736028] ret_from_fork_asm+0x1a/0x30 [ 21.736069] </TASK> [ 21.736084] [ 21.753363] Allocated by task 279: [ 21.753727] kasan_save_stack+0x45/0x70 [ 21.754213] kasan_save_track+0x18/0x40 [ 21.754633] kasan_save_alloc_info+0x3b/0x50 [ 21.755072] __kasan_kmalloc+0xb7/0xc0 [ 21.755392] __kmalloc_cache_noprof+0x189/0x420 [ 21.755864] kasan_bitops_generic+0x92/0x1c0 [ 21.756465] kunit_try_run_case+0x1a5/0x480 [ 21.757055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.757621] kthread+0x337/0x6f0 [ 21.757951] ret_from_fork+0x116/0x1d0 [ 21.758589] ret_from_fork_asm+0x1a/0x30 [ 21.759008] [ 21.759337] The buggy address belongs to the object at ffff888101e49ec0 [ 21.759337] which belongs to the cache kmalloc-16 of size 16 [ 21.760341] The buggy address is located 8 bytes inside of [ 21.760341] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.761056] [ 21.761250] The buggy address belongs to the physical page: [ 21.761772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.762721] flags: 0x200000000000000(node=0|zone=2) [ 21.763379] page_type: f5(slab) [ 21.763663] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.764326] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.765029] page dumped because: kasan: bad access detected [ 21.765538] [ 21.765729] Memory state around the buggy address: [ 21.766137] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.766991] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.767962] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.768828] ^ [ 21.769452] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.769944] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.770628] ================================================================== [ 21.861818] ================================================================== [ 21.862518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.864803] Read of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.865448] [ 21.865677] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.865774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.865802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.865849] Call Trace: [ 21.865895] <TASK> [ 21.865925] dump_stack_lvl+0x73/0xb0 [ 21.865989] print_report+0xd1/0x650 [ 21.866042] ? __virt_addr_valid+0x1db/0x2d0 [ 21.866107] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.866189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.866272] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.866353] kasan_report+0x141/0x180 [ 21.866424] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.866517] __asan_report_load8_noabort+0x18/0x20 [ 21.866597] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.866679] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.866756] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.866815] ? trace_hardirqs_on+0x37/0xe0 [ 21.869217] ? kasan_bitops_generic+0x92/0x1c0 [ 21.869310] kasan_bitops_generic+0x121/0x1c0 [ 21.869387] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.869457] ? __pfx_read_tsc+0x10/0x10 [ 21.869511] ? ktime_get_ts64+0x86/0x230 [ 21.869568] kunit_try_run_case+0x1a5/0x480 [ 21.869627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.869682] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.869737] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.869793] ? __kthread_parkme+0x82/0x180 [ 21.869843] ? preempt_count_sub+0x50/0x80 [ 21.869920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.869982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.870040] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.870097] kthread+0x337/0x6f0 [ 21.870149] ? trace_preempt_on+0x20/0xc0 [ 21.870203] ? __pfx_kthread+0x10/0x10 [ 21.870260] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.870315] ? calculate_sigpending+0x7b/0xa0 [ 21.870369] ? __pfx_kthread+0x10/0x10 [ 21.870420] ret_from_fork+0x116/0x1d0 [ 21.870462] ? __pfx_kthread+0x10/0x10 [ 21.870607] ret_from_fork_asm+0x1a/0x30 [ 21.870655] </TASK> [ 21.870673] [ 21.892536] Allocated by task 279: [ 21.892926] kasan_save_stack+0x45/0x70 [ 21.893381] kasan_save_track+0x18/0x40 [ 21.894350] kasan_save_alloc_info+0x3b/0x50 [ 21.894697] __kasan_kmalloc+0xb7/0xc0 [ 21.895075] __kmalloc_cache_noprof+0x189/0x420 [ 21.896095] kasan_bitops_generic+0x92/0x1c0 [ 21.896543] kunit_try_run_case+0x1a5/0x480 [ 21.896914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.897355] kthread+0x337/0x6f0 [ 21.897769] ret_from_fork+0x116/0x1d0 [ 21.898193] ret_from_fork_asm+0x1a/0x30 [ 21.898676] [ 21.898917] The buggy address belongs to the object at ffff888101e49ec0 [ 21.898917] which belongs to the cache kmalloc-16 of size 16 [ 21.899971] The buggy address is located 8 bytes inside of [ 21.899971] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.900934] [ 21.901210] The buggy address belongs to the physical page: [ 21.901724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.902317] flags: 0x200000000000000(node=0|zone=2) [ 21.903005] page_type: f5(slab) [ 21.903351] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.904154] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.905193] page dumped because: kasan: bad access detected [ 21.905576] [ 21.905788] Memory state around the buggy address: [ 21.906340] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.907092] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.907641] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.908777] ^ [ 21.909829] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.910362] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.911099] ================================================================== [ 21.538953] ================================================================== [ 21.540030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.541150] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279 [ 21.542065] [ 21.542481] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.542594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.542634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.542687] Call Trace: [ 21.542726] <TASK> [ 21.542764] dump_stack_lvl+0x73/0xb0 [ 21.542848] print_report+0xd1/0x650 [ 21.542984] ? __virt_addr_valid+0x1db/0x2d0 [ 21.543083] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.543259] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.543336] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.543418] kasan_report+0x141/0x180 [ 21.543489] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.543585] kasan_check_range+0x10c/0x1c0 [ 21.543658] __kasan_check_write+0x18/0x20 [ 21.543692] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.543735] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.543776] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.543812] ? trace_hardirqs_on+0x37/0xe0 [ 21.543842] ? kasan_bitops_generic+0x92/0x1c0 [ 21.543905] kasan_bitops_generic+0x121/0x1c0 [ 21.543948] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.543986] ? __pfx_read_tsc+0x10/0x10 [ 21.544016] ? ktime_get_ts64+0x86/0x230 [ 21.544050] kunit_try_run_case+0x1a5/0x480 [ 21.544085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.544181] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.544220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.544256] ? __kthread_parkme+0x82/0x180 [ 21.544285] ? preempt_count_sub+0x50/0x80 [ 21.544317] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.544352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.544387] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.544423] kthread+0x337/0x6f0 [ 21.544450] ? trace_preempt_on+0x20/0xc0 [ 21.544481] ? __pfx_kthread+0x10/0x10 [ 21.544510] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.544541] ? calculate_sigpending+0x7b/0xa0 [ 21.544574] ? __pfx_kthread+0x10/0x10 [ 21.544603] ret_from_fork+0x116/0x1d0 [ 21.544628] ? __pfx_kthread+0x10/0x10 [ 21.544657] ret_from_fork_asm+0x1a/0x30 [ 21.544698] </TASK> [ 21.544711] [ 21.566390] Allocated by task 279: [ 21.566824] kasan_save_stack+0x45/0x70 [ 21.567931] kasan_save_track+0x18/0x40 [ 21.568337] kasan_save_alloc_info+0x3b/0x50 [ 21.569022] __kasan_kmalloc+0xb7/0xc0 [ 21.569488] __kmalloc_cache_noprof+0x189/0x420 [ 21.569718] kasan_bitops_generic+0x92/0x1c0 [ 21.569966] kunit_try_run_case+0x1a5/0x480 [ 21.570753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.571294] kthread+0x337/0x6f0 [ 21.571666] ret_from_fork+0x116/0x1d0 [ 21.572069] ret_from_fork_asm+0x1a/0x30 [ 21.572483] [ 21.572670] The buggy address belongs to the object at ffff888101e49ec0 [ 21.572670] which belongs to the cache kmalloc-16 of size 16 [ 21.573649] The buggy address is located 8 bytes inside of [ 21.573649] allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9) [ 21.574865] [ 21.575491] The buggy address belongs to the physical page: [ 21.576394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49 [ 21.577063] flags: 0x200000000000000(node=0|zone=2) [ 21.577824] page_type: f5(slab) [ 21.578081] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.578840] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.579632] page dumped because: kasan: bad access detected [ 21.580053] [ 21.580707] Memory state around the buggy address: [ 21.581628] ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 21.582122] ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.582771] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.583535] ^ [ 21.584038] ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.585101] ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.585954] ==================================================================
[ 23.062056] ================================================================== [ 23.062700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 23.063498] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 23.064157] [ 23.064300] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 23.064321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.064328] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.064336] Call trace: [ 23.064341] show_stack+0x20/0x38 (C) [ 23.064354] dump_stack_lvl+0x8c/0xd0 [ 23.064369] print_report+0x118/0x608 [ 23.064384] kasan_report+0xdc/0x128 [ 23.064398] kasan_check_range+0x100/0x1a8 [ 23.064414] __kasan_check_write+0x20/0x30 [ 23.064426] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 23.064443] kasan_bitops_generic+0x11c/0x1c8 [ 23.064457] kunit_try_run_case+0x170/0x3f0 [ 23.064471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.064488] kthread+0x328/0x630 [ 23.064499] ret_from_fork+0x10/0x20 [ 23.064513] [ 23.070855] Allocated by task 314: [ 23.071163] kasan_save_stack+0x3c/0x68 [ 23.071516] kasan_save_track+0x20/0x40 [ 23.071869] kasan_save_alloc_info+0x40/0x58 [ 23.072261] __kasan_kmalloc+0xd4/0xd8 [ 23.072605] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.073017] kasan_bitops_generic+0xa0/0x1c8 [ 23.073408] kunit_try_run_case+0x170/0x3f0 [ 23.073790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.074287] kthread+0x328/0x630 [ 23.074584] ret_from_fork+0x10/0x20 [ 23.074913] [ 23.075053] The buggy address belongs to the object at ffff00000223e620 [ 23.075053] which belongs to the cache kmalloc-16 of size 16 [ 23.076143] The buggy address is located 8 bytes inside of [ 23.076143] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 23.077226] [ 23.077367] The buggy address belongs to the physical page: [ 23.077865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 23.078563] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.079148] page_type: f5(slab) [ 23.079437] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.080128] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.080816] page dumped because: kasan: bad access detected [ 23.081314] [ 23.081454] Memory state around the buggy address: [ 23.081884] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.082528] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.083172] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 23.083814] ^ [ 23.084222] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.084865] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.085507] ================================================================== [ 22.917362] ================================================================== [ 22.918014] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 22.918815] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.919485] [ 22.919634] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.919665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.919675] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.919686] Call trace: [ 22.919693] show_stack+0x20/0x38 (C) [ 22.919713] dump_stack_lvl+0x8c/0xd0 [ 22.919734] print_report+0x118/0x608 [ 22.919756] kasan_report+0xdc/0x128 [ 22.919777] kasan_check_range+0x100/0x1a8 [ 22.919801] __kasan_check_write+0x20/0x30 [ 22.919819] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 22.919843] kasan_bitops_generic+0x11c/0x1c8 [ 22.919864] kunit_try_run_case+0x170/0x3f0 [ 22.919885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.919910] kthread+0x328/0x630 [ 22.919926] ret_from_fork+0x10/0x20 [ 22.919945] [ 22.926318] Allocated by task 314: [ 22.926633] kasan_save_stack+0x3c/0x68 [ 22.926994] kasan_save_track+0x20/0x40 [ 22.927356] kasan_save_alloc_info+0x40/0x58 [ 22.927757] __kasan_kmalloc+0xd4/0xd8 [ 22.928110] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.928532] kasan_bitops_generic+0xa0/0x1c8 [ 22.928931] kunit_try_run_case+0x170/0x3f0 [ 22.929322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.929830] kthread+0x328/0x630 [ 22.930134] ret_from_fork+0x10/0x20 [ 22.930471] [ 22.930617] The buggy address belongs to the object at ffff00000223e620 [ 22.930617] which belongs to the cache kmalloc-16 of size 16 [ 22.931717] The buggy address is located 8 bytes inside of [ 22.931717] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.932813] [ 22.932959] The buggy address belongs to the physical page: [ 22.933462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.934169] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.934762] page_type: f5(slab) [ 22.935060] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.935760] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.936456] page dumped because: kasan: bad access detected [ 22.936961] [ 22.937108] Memory state around the buggy address: [ 22.937545] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.938199] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.938851] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.939502] ^ [ 22.939918] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.940570] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.941218] ================================================================== [ 22.942095] ================================================================== [ 22.942741] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 22.943540] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.944192] [ 22.944335] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.944357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.944363] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.944370] Call trace: [ 22.944375] show_stack+0x20/0x38 (C) [ 22.944389] dump_stack_lvl+0x8c/0xd0 [ 22.944404] print_report+0x118/0x608 [ 22.944419] kasan_report+0xdc/0x128 [ 22.944433] __asan_report_load8_noabort+0x20/0x30 [ 22.944451] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 22.944467] kasan_bitops_generic+0x11c/0x1c8 [ 22.944481] kunit_try_run_case+0x170/0x3f0 [ 22.944496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.944513] kthread+0x328/0x630 [ 22.944523] ret_from_fork+0x10/0x20 [ 22.944537] [ 22.950579] Allocated by task 314: [ 22.950888] kasan_save_stack+0x3c/0x68 [ 22.951240] kasan_save_track+0x20/0x40 [ 22.951593] kasan_save_alloc_info+0x40/0x58 [ 22.951985] __kasan_kmalloc+0xd4/0xd8 [ 22.952329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.952742] kasan_bitops_generic+0xa0/0x1c8 [ 22.953132] kunit_try_run_case+0x170/0x3f0 [ 22.953514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.954011] kthread+0x328/0x630 [ 22.954307] ret_from_fork+0x10/0x20 [ 22.954635] [ 22.954776] The buggy address belongs to the object at ffff00000223e620 [ 22.954776] which belongs to the cache kmalloc-16 of size 16 [ 22.955866] The buggy address is located 8 bytes inside of [ 22.955866] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.956950] [ 22.957091] The buggy address belongs to the physical page: [ 22.957589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.958287] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.958870] page_type: f5(slab) [ 22.959159] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.959850] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.960537] page dumped because: kasan: bad access detected [ 22.961035] [ 22.961174] Memory state around the buggy address: [ 22.961605] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.962249] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.962892] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.963534] ^ [ 22.963942] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.964585] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.965227] ================================================================== [ 22.965964] ================================================================== [ 22.966610] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 22.967408] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.968068] [ 22.968210] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.968232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.968238] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.968246] Call trace: [ 22.968250] show_stack+0x20/0x38 (C) [ 22.968265] dump_stack_lvl+0x8c/0xd0 [ 22.968280] print_report+0x118/0x608 [ 22.968295] kasan_report+0xdc/0x128 [ 22.968309] kasan_check_range+0x100/0x1a8 [ 22.968325] __kasan_check_write+0x20/0x30 [ 22.968337] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 22.968354] kasan_bitops_generic+0x11c/0x1c8 [ 22.968367] kunit_try_run_case+0x170/0x3f0 [ 22.968382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.968399] kthread+0x328/0x630 [ 22.968411] ret_from_fork+0x10/0x20 [ 22.968424] [ 22.974766] Allocated by task 314: [ 22.975074] kasan_save_stack+0x3c/0x68 [ 22.975427] kasan_save_track+0x20/0x40 [ 22.975780] kasan_save_alloc_info+0x40/0x58 [ 22.976172] __kasan_kmalloc+0xd4/0xd8 [ 22.976516] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.976929] kasan_bitops_generic+0xa0/0x1c8 [ 22.977320] kunit_try_run_case+0x170/0x3f0 [ 22.977701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.978198] kthread+0x328/0x630 [ 22.978494] ret_from_fork+0x10/0x20 [ 22.978823] [ 22.978964] The buggy address belongs to the object at ffff00000223e620 [ 22.978964] which belongs to the cache kmalloc-16 of size 16 [ 22.980053] The buggy address is located 8 bytes inside of [ 22.980053] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 22.981138] [ 22.981278] The buggy address belongs to the physical page: [ 22.981776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 22.982474] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.983059] page_type: f5(slab) [ 22.983349] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.984039] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.984726] page dumped because: kasan: bad access detected [ 22.985222] [ 22.985362] Memory state around the buggy address: [ 22.985792] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.986436] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.987080] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.987722] ^ [ 22.988129] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.988774] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.989415] ================================================================== [ 23.086244] ================================================================== [ 23.086888] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 23.087686] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 23.088339] [ 23.088482] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 23.088504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.088510] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.088518] Call trace: [ 23.088523] show_stack+0x20/0x38 (C) [ 23.088536] dump_stack_lvl+0x8c/0xd0 [ 23.088552] print_report+0x118/0x608 [ 23.088566] kasan_report+0xdc/0x128 [ 23.088581] __asan_report_load8_noabort+0x20/0x30 [ 23.088599] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 23.088616] kasan_bitops_generic+0x11c/0x1c8 [ 23.088630] kunit_try_run_case+0x170/0x3f0 [ 23.088645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.088662] kthread+0x328/0x630 [ 23.088673] ret_from_fork+0x10/0x20 [ 23.088686] [ 23.094729] Allocated by task 314: [ 23.095037] kasan_save_stack+0x3c/0x68 [ 23.095390] kasan_save_track+0x20/0x40 [ 23.095742] kasan_save_alloc_info+0x40/0x58 [ 23.096134] __kasan_kmalloc+0xd4/0xd8 [ 23.096480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.096892] kasan_bitops_generic+0xa0/0x1c8 [ 23.097282] kunit_try_run_case+0x170/0x3f0 [ 23.097664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.098162] kthread+0x328/0x630 [ 23.098458] ret_from_fork+0x10/0x20 [ 23.098786] [ 23.098927] The buggy address belongs to the object at ffff00000223e620 [ 23.098927] which belongs to the cache kmalloc-16 of size 16 [ 23.100016] The buggy address is located 8 bytes inside of [ 23.100016] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 23.101101] [ 23.101241] The buggy address belongs to the physical page: [ 23.101739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 23.102437] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.103022] page_type: f5(slab) [ 23.103310] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.104001] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.104688] page dumped because: kasan: bad access detected [ 23.105184] [ 23.105324] Memory state around the buggy address: [ 23.105754] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.106398] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.107042] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 23.107684] ^ [ 23.108092] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.108735] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.109377] ================================================================== [ 23.013983] ================================================================== [ 23.014628] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 23.015426] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 23.016086] [ 23.016229] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 23.016251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.016258] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.016265] Call trace: [ 23.016270] show_stack+0x20/0x38 (C) [ 23.016283] dump_stack_lvl+0x8c/0xd0 [ 23.016298] print_report+0x118/0x608 [ 23.016313] kasan_report+0xdc/0x128 [ 23.016328] kasan_check_range+0x100/0x1a8 [ 23.016344] __kasan_check_write+0x20/0x30 [ 23.016357] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 23.016373] kasan_bitops_generic+0x11c/0x1c8 [ 23.016387] kunit_try_run_case+0x170/0x3f0 [ 23.016402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.016418] kthread+0x328/0x630 [ 23.016429] ret_from_fork+0x10/0x20 [ 23.016443] [ 23.022783] Allocated by task 314: [ 23.023091] kasan_save_stack+0x3c/0x68 [ 23.023444] kasan_save_track+0x20/0x40 [ 23.023797] kasan_save_alloc_info+0x40/0x58 [ 23.024188] __kasan_kmalloc+0xd4/0xd8 [ 23.024532] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.024945] kasan_bitops_generic+0xa0/0x1c8 [ 23.025335] kunit_try_run_case+0x170/0x3f0 [ 23.025717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.026214] kthread+0x328/0x630 [ 23.026510] ret_from_fork+0x10/0x20 [ 23.026839] [ 23.026979] The buggy address belongs to the object at ffff00000223e620 [ 23.026979] which belongs to the cache kmalloc-16 of size 16 [ 23.028068] The buggy address is located 8 bytes inside of [ 23.028068] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 23.029153] [ 23.029294] The buggy address belongs to the physical page: [ 23.029791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 23.030489] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.031073] page_type: f5(slab) [ 23.031363] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.032053] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.032740] page dumped because: kasan: bad access detected [ 23.033236] [ 23.033377] Memory state around the buggy address: [ 23.033806] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.034450] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.035093] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 23.035735] ^ [ 23.036143] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.036787] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.037429] ================================================================== [ 23.038196] ================================================================== [ 23.038843] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 23.039643] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 23.040295] [ 23.040439] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 23.040461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.040467] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.040475] Call trace: [ 23.040480] show_stack+0x20/0x38 (C) [ 23.040494] dump_stack_lvl+0x8c/0xd0 [ 23.040510] print_report+0x118/0x608 [ 23.040525] kasan_report+0xdc/0x128 [ 23.040540] __asan_report_load8_noabort+0x20/0x30 [ 23.040557] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 23.040574] kasan_bitops_generic+0x11c/0x1c8 [ 23.040589] kunit_try_run_case+0x170/0x3f0 [ 23.040604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.040621] kthread+0x328/0x630 [ 23.040632] ret_from_fork+0x10/0x20 [ 23.040646] [ 23.046690] Allocated by task 314: [ 23.046998] kasan_save_stack+0x3c/0x68 [ 23.047351] kasan_save_track+0x20/0x40 [ 23.047704] kasan_save_alloc_info+0x40/0x58 [ 23.048096] __kasan_kmalloc+0xd4/0xd8 [ 23.048440] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.048853] kasan_bitops_generic+0xa0/0x1c8 [ 23.049244] kunit_try_run_case+0x170/0x3f0 [ 23.049626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.050123] kthread+0x328/0x630 [ 23.050420] ret_from_fork+0x10/0x20 [ 23.050748] [ 23.050889] The buggy address belongs to the object at ffff00000223e620 [ 23.050889] which belongs to the cache kmalloc-16 of size 16 [ 23.051979] The buggy address is located 8 bytes inside of [ 23.051979] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 23.053063] [ 23.053204] The buggy address belongs to the physical page: [ 23.053702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 23.054399] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.054985] page_type: f5(slab) [ 23.055275] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.055965] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.056652] page dumped because: kasan: bad access detected [ 23.057149] [ 23.057289] Memory state around the buggy address: [ 23.057719] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.058363] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.059007] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 23.059649] ^ [ 23.060056] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.060700] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.061342] ================================================================== [ 23.110108] ================================================================== [ 23.110752] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 23.111551] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 23.112204] [ 23.112347] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 23.112368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.112374] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.112382] Call trace: [ 23.112386] show_stack+0x20/0x38 (C) [ 23.112400] dump_stack_lvl+0x8c/0xd0 [ 23.112415] print_report+0x118/0x608 [ 23.112430] kasan_report+0xdc/0x128 [ 23.112445] __asan_report_load8_noabort+0x20/0x30 [ 23.112462] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 23.112479] kasan_bitops_generic+0x11c/0x1c8 [ 23.112492] kunit_try_run_case+0x170/0x3f0 [ 23.112507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.112524] kthread+0x328/0x630 [ 23.112535] ret_from_fork+0x10/0x20 [ 23.112548] [ 23.118590] Allocated by task 314: [ 23.118898] kasan_save_stack+0x3c/0x68 [ 23.119251] kasan_save_track+0x20/0x40 [ 23.119604] kasan_save_alloc_info+0x40/0x58 [ 23.119995] __kasan_kmalloc+0xd4/0xd8 [ 23.120339] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.120751] kasan_bitops_generic+0xa0/0x1c8 [ 23.121142] kunit_try_run_case+0x170/0x3f0 [ 23.121524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.122021] kthread+0x328/0x630 [ 23.122317] ret_from_fork+0x10/0x20 [ 23.122645] [ 23.122785] The buggy address belongs to the object at ffff00000223e620 [ 23.122785] which belongs to the cache kmalloc-16 of size 16 [ 23.123875] The buggy address is located 8 bytes inside of [ 23.123875] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 23.124959] [ 23.125100] The buggy address belongs to the physical page: [ 23.125598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 23.126296] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.126880] page_type: f5(slab) [ 23.127170] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.127861] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.128549] page dumped because: kasan: bad access detected [ 23.129047] [ 23.129187] Memory state around the buggy address: [ 23.129616] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.130260] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.130904] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 23.131545] ^ [ 23.131954] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.132598] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.133240] ================================================================== [ 22.990128] ================================================================== [ 22.990772] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 22.991571] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314 [ 22.992224] [ 22.992367] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.992388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.992395] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.992402] Call trace: [ 22.992407] show_stack+0x20/0x38 (C) [ 22.992421] dump_stack_lvl+0x8c/0xd0 [ 22.992435] print_report+0x118/0x608 [ 22.992450] kasan_report+0xdc/0x128 [ 22.992464] __asan_report_load8_noabort+0x20/0x30 [ 22.992482] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 22.992499] kasan_bitops_generic+0x11c/0x1c8 [ 22.992513] kunit_try_run_case+0x170/0x3f0 [ 22.992528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.992545] kthread+0x328/0x630 [ 22.992555] ret_from_fork+0x10/0x20 [ 22.992569] [ 22.998610] Allocated by task 314: [ 22.998918] kasan_save_stack+0x3c/0x68 [ 22.999271] kasan_save_track+0x20/0x40 [ 22.999624] kasan_save_alloc_info+0x40/0x58 [ 23.000016] __kasan_kmalloc+0xd4/0xd8 [ 23.000360] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.000772] kasan_bitops_generic+0xa0/0x1c8 [ 23.001162] kunit_try_run_case+0x170/0x3f0 [ 23.001544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.002041] kthread+0x328/0x630 [ 23.002337] ret_from_fork+0x10/0x20 [ 23.002667] [ 23.002807] The buggy address belongs to the object at ffff00000223e620 [ 23.002807] which belongs to the cache kmalloc-16 of size 16 [ 23.003897] The buggy address is located 8 bytes inside of [ 23.003897] allocated 9-byte region [ffff00000223e620, ffff00000223e629) [ 23.004981] [ 23.005121] The buggy address belongs to the physical page: [ 23.005618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e [ 23.006317] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.006902] page_type: f5(slab) [ 23.007192] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.007883] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.008570] page dumped because: kasan: bad access detected [ 23.009067] [ 23.009207] Memory state around the buggy address: [ 23.009636] ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.010280] ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.010923] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 23.011565] ^ [ 23.011973] ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.012616] ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.013258] ==================================================================