Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.447375] ================================================================== [ 19.447546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 19.447638] Read of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261 [ 19.447755] [ 19.447927] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.448237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.448323] Hardware name: linux,dummy-virt (DT) [ 19.448358] Call trace: [ 19.448617] show_stack+0x20/0x38 (C) [ 19.448813] dump_stack_lvl+0x8c/0xd0 [ 19.449084] print_report+0x118/0x5d0 [ 19.449281] kasan_report+0xdc/0x128 [ 19.449693] __asan_report_load8_noabort+0x20/0x30 [ 19.449770] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 19.450171] kasan_bitops_generic+0x110/0x1c8 [ 19.450264] kunit_try_run_case+0x170/0x3f0 [ 19.450382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.451064] kthread+0x328/0x630 [ 19.451280] ret_from_fork+0x10/0x20 [ 19.451357] [ 19.451378] Allocated by task 261: [ 19.451411] kasan_save_stack+0x3c/0x68 [ 19.451466] kasan_save_track+0x20/0x40 [ 19.451505] kasan_save_alloc_info+0x40/0x58 [ 19.451768] __kasan_kmalloc+0xd4/0xd8 [ 19.451963] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.452172] kasan_bitops_generic+0xa0/0x1c8 [ 19.452518] kunit_try_run_case+0x170/0x3f0 [ 19.452853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.453070] kthread+0x328/0x630 [ 19.453214] ret_from_fork+0x10/0x20 [ 19.453257] [ 19.453328] The buggy address belongs to the object at fff00000c3eb9280 [ 19.453328] which belongs to the cache kmalloc-16 of size 16 [ 19.453534] The buggy address is located 8 bytes inside of [ 19.453534] allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289) [ 19.453813] [ 19.453864] The buggy address belongs to the physical page: [ 19.453923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 19.453988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.454055] page_type: f5(slab) [ 19.454111] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.454176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.454221] page dumped because: kasan: bad access detected [ 19.454264] [ 19.454285] Memory state around the buggy address: [ 19.454329] fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.454375] fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.454422] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.454463] ^ [ 19.454496] fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.454556] fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.454626] ================================================================== [ 19.477319] ================================================================== [ 19.477410] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 19.477805] Read of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261 [ 19.477948] [ 19.478044] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.478205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.478285] Hardware name: linux,dummy-virt (DT) [ 19.478321] Call trace: [ 19.478346] show_stack+0x20/0x38 (C) [ 19.478455] dump_stack_lvl+0x8c/0xd0 [ 19.478508] print_report+0x118/0x5d0 [ 19.478800] kasan_report+0xdc/0x128 [ 19.479040] __asan_report_load8_noabort+0x20/0x30 [ 19.479143] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 19.479284] kasan_bitops_generic+0x110/0x1c8 [ 19.479439] kunit_try_run_case+0x170/0x3f0 [ 19.479515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.479578] kthread+0x328/0x630 [ 19.479902] ret_from_fork+0x10/0x20 [ 19.480154] [ 19.480271] Allocated by task 261: [ 19.480357] kasan_save_stack+0x3c/0x68 [ 19.480471] kasan_save_track+0x20/0x40 [ 19.480570] kasan_save_alloc_info+0x40/0x58 [ 19.480988] __kasan_kmalloc+0xd4/0xd8 [ 19.481059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.481224] kasan_bitops_generic+0xa0/0x1c8 [ 19.481376] kunit_try_run_case+0x170/0x3f0 [ 19.481514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.481639] kthread+0x328/0x630 [ 19.481687] ret_from_fork+0x10/0x20 [ 19.481725] [ 19.481902] The buggy address belongs to the object at fff00000c3eb9280 [ 19.481902] which belongs to the cache kmalloc-16 of size 16 [ 19.482181] The buggy address is located 8 bytes inside of [ 19.482181] allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289) [ 19.482272] [ 19.482408] The buggy address belongs to the physical page: [ 19.482473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 19.482947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.483148] page_type: f5(slab) [ 19.483226] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.483627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.483958] page dumped because: kasan: bad access detected [ 19.484032] [ 19.484101] Memory state around the buggy address: [ 19.484233] fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.484344] fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.484479] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.484521] ^ [ 19.484737] fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.484812] fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.485267] ================================================================== [ 19.400165] ================================================================== [ 19.400237] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.400477] Read of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261 [ 19.400646] [ 19.400693] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.401101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.401150] Hardware name: linux,dummy-virt (DT) [ 19.401185] Call trace: [ 19.401239] show_stack+0x20/0x38 (C) [ 19.401300] dump_stack_lvl+0x8c/0xd0 [ 19.401354] print_report+0x118/0x5d0 [ 19.401868] kasan_report+0xdc/0x128 [ 19.401943] __asan_report_load8_noabort+0x20/0x30 [ 19.401997] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.402124] kasan_bitops_generic+0x110/0x1c8 [ 19.402180] kunit_try_run_case+0x170/0x3f0 [ 19.402231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.402908] kthread+0x328/0x630 [ 19.402979] ret_from_fork+0x10/0x20 [ 19.403034] [ 19.403169] Allocated by task 261: [ 19.403213] kasan_save_stack+0x3c/0x68 [ 19.403289] kasan_save_track+0x20/0x40 [ 19.403494] kasan_save_alloc_info+0x40/0x58 [ 19.403692] __kasan_kmalloc+0xd4/0xd8 [ 19.403740] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.403835] kasan_bitops_generic+0xa0/0x1c8 [ 19.403954] kunit_try_run_case+0x170/0x3f0 [ 19.404019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.404442] kthread+0x328/0x630 [ 19.404697] ret_from_fork+0x10/0x20 [ 19.404862] [ 19.405004] The buggy address belongs to the object at fff00000c3eb9280 [ 19.405004] which belongs to the cache kmalloc-16 of size 16 [ 19.405144] The buggy address is located 8 bytes inside of [ 19.405144] allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289) [ 19.405375] [ 19.405460] The buggy address belongs to the physical page: [ 19.405675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 19.405818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.406019] page_type: f5(slab) [ 19.406296] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.406392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.406447] page dumped because: kasan: bad access detected [ 19.406490] [ 19.406552] Memory state around the buggy address: [ 19.406589] fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.406635] fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.406707] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.406757] ^ [ 19.406802] fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.406861] fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.406911] ================================================================== [ 19.429108] ================================================================== [ 19.429177] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 19.429234] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261 [ 19.429285] [ 19.429361] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.429449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.429487] Hardware name: linux,dummy-virt (DT) [ 19.429519] Call trace: [ 19.429556] show_stack+0x20/0x38 (C) [ 19.429607] dump_stack_lvl+0x8c/0xd0 [ 19.429658] print_report+0x118/0x5d0 [ 19.429726] kasan_report+0xdc/0x128 [ 19.429783] kasan_check_range+0x100/0x1a8 [ 19.429832] __kasan_check_write+0x20/0x30 [ 19.429886] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 19.429940] kasan_bitops_generic+0x110/0x1c8 [ 19.430000] kunit_try_run_case+0x170/0x3f0 [ 19.430051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.430113] kthread+0x328/0x630 [ 19.430167] ret_from_fork+0x10/0x20 [ 19.430218] [ 19.430248] Allocated by task 261: [ 19.430280] kasan_save_stack+0x3c/0x68 [ 19.430323] kasan_save_track+0x20/0x40 [ 19.430371] kasan_save_alloc_info+0x40/0x58 [ 19.430413] __kasan_kmalloc+0xd4/0xd8 [ 19.430452] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.430494] kasan_bitops_generic+0xa0/0x1c8 [ 19.430535] kunit_try_run_case+0x170/0x3f0 [ 19.430575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.430621] kthread+0x328/0x630 [ 19.430654] ret_from_fork+0x10/0x20 [ 19.430701] [ 19.430724] The buggy address belongs to the object at fff00000c3eb9280 [ 19.430724] which belongs to the cache kmalloc-16 of size 16 [ 19.430791] The buggy address is located 8 bytes inside of [ 19.430791] allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289) [ 19.431189] [ 19.431225] The buggy address belongs to the physical page: [ 19.431262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 19.431865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.431944] page_type: f5(slab) [ 19.432399] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.432628] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.432676] page dumped because: kasan: bad access detected [ 19.433080] [ 19.433167] Memory state around the buggy address: [ 19.433288] fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.433394] fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.433541] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.433584] ^ [ 19.434020] fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.434161] fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.434348] ================================================================== [ 19.417125] ================================================================== [ 19.417222] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.417286] Read of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261 [ 19.417338] [ 19.418337] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.418473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.418506] Hardware name: linux,dummy-virt (DT) [ 19.418613] Call trace: [ 19.418640] show_stack+0x20/0x38 (C) [ 19.418700] dump_stack_lvl+0x8c/0xd0 [ 19.418755] print_report+0x118/0x5d0 [ 19.419108] kasan_report+0xdc/0x128 [ 19.419257] __asan_report_load8_noabort+0x20/0x30 [ 19.419509] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.419877] kasan_bitops_generic+0x110/0x1c8 [ 19.419953] kunit_try_run_case+0x170/0x3f0 [ 19.420004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.420061] kthread+0x328/0x630 [ 19.420756] ret_from_fork+0x10/0x20 [ 19.420935] [ 19.420960] Allocated by task 261: [ 19.421189] kasan_save_stack+0x3c/0x68 [ 19.421410] kasan_save_track+0x20/0x40 [ 19.421511] kasan_save_alloc_info+0x40/0x58 [ 19.421743] __kasan_kmalloc+0xd4/0xd8 [ 19.421901] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.422120] kasan_bitops_generic+0xa0/0x1c8 [ 19.422278] kunit_try_run_case+0x170/0x3f0 [ 19.422648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.422919] kthread+0x328/0x630 [ 19.423155] ret_from_fork+0x10/0x20 [ 19.423467] [ 19.423590] The buggy address belongs to the object at fff00000c3eb9280 [ 19.423590] which belongs to the cache kmalloc-16 of size 16 [ 19.423976] The buggy address is located 8 bytes inside of [ 19.423976] allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289) [ 19.424157] [ 19.424219] The buggy address belongs to the physical page: [ 19.424434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 19.424530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.424867] page_type: f5(slab) [ 19.425040] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.425124] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.425507] page dumped because: kasan: bad access detected [ 19.425799] [ 19.425992] Memory state around the buggy address: [ 19.426036] fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.426246] fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.426624] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.427070] ^ [ 19.427127] fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.427188] fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.427384] ================================================================== [ 19.435130] ================================================================== [ 19.435241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 19.435326] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261 [ 19.435378] [ 19.435561] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.435825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.436062] Hardware name: linux,dummy-virt (DT) [ 19.436141] Call trace: [ 19.436301] show_stack+0x20/0x38 (C) [ 19.436550] dump_stack_lvl+0x8c/0xd0 [ 19.436730] print_report+0x118/0x5d0 [ 19.436884] kasan_report+0xdc/0x128 [ 19.436970] kasan_check_range+0x100/0x1a8 [ 19.437111] __kasan_check_write+0x20/0x30 [ 19.437223] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 19.437605] kasan_bitops_generic+0x110/0x1c8 [ 19.437832] kunit_try_run_case+0x170/0x3f0 [ 19.438043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.438151] kthread+0x328/0x630 [ 19.438342] ret_from_fork+0x10/0x20 [ 19.438615] [ 19.438663] Allocated by task 261: [ 19.438861] kasan_save_stack+0x3c/0x68 [ 19.438995] kasan_save_track+0x20/0x40 [ 19.439036] kasan_save_alloc_info+0x40/0x58 [ 19.439320] __kasan_kmalloc+0xd4/0xd8 [ 19.439541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.440065] kasan_bitops_generic+0xa0/0x1c8 [ 19.440400] kunit_try_run_case+0x170/0x3f0 [ 19.440528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.440612] kthread+0x328/0x630 [ 19.440790] ret_from_fork+0x10/0x20 [ 19.440890] [ 19.440941] The buggy address belongs to the object at fff00000c3eb9280 [ 19.440941] which belongs to the cache kmalloc-16 of size 16 [ 19.441584] The buggy address is located 8 bytes inside of [ 19.441584] allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289) [ 19.441681] [ 19.441793] The buggy address belongs to the physical page: [ 19.442268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 19.442606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.442706] page_type: f5(slab) [ 19.443046] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.443191] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.443300] page dumped because: kasan: bad access detected [ 19.443338] [ 19.443365] Memory state around the buggy address: [ 19.443403] fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.443806] fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.443986] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.444589] ^ [ 19.444709] fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.444909] fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.445062] ================================================================== [ 19.408997] ================================================================== [ 19.409112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.409189] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261 [ 19.409241] [ 19.409482] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.409600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.409679] Hardware name: linux,dummy-virt (DT) [ 19.409713] Call trace: [ 19.409740] show_stack+0x20/0x38 (C) [ 19.410123] dump_stack_lvl+0x8c/0xd0 [ 19.410186] print_report+0x118/0x5d0 [ 19.410325] kasan_report+0xdc/0x128 [ 19.410432] kasan_check_range+0x100/0x1a8 [ 19.410558] __kasan_check_write+0x20/0x30 [ 19.410607] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.411043] kasan_bitops_generic+0x110/0x1c8 [ 19.411122] kunit_try_run_case+0x170/0x3f0 [ 19.411247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.411320] kthread+0x328/0x630 [ 19.411415] ret_from_fork+0x10/0x20 [ 19.411500] [ 19.411524] Allocated by task 261: [ 19.411558] kasan_save_stack+0x3c/0x68 [ 19.411604] kasan_save_track+0x20/0x40 [ 19.411983] kasan_save_alloc_info+0x40/0x58 [ 19.412125] __kasan_kmalloc+0xd4/0xd8 [ 19.412300] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.412385] kasan_bitops_generic+0xa0/0x1c8 [ 19.412445] kunit_try_run_case+0x170/0x3f0 [ 19.412914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.413033] kthread+0x328/0x630 [ 19.413131] ret_from_fork+0x10/0x20 [ 19.413291] [ 19.413319] The buggy address belongs to the object at fff00000c3eb9280 [ 19.413319] which belongs to the cache kmalloc-16 of size 16 [ 19.413393] The buggy address is located 8 bytes inside of [ 19.413393] allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289) [ 19.413457] [ 19.413619] The buggy address belongs to the physical page: [ 19.413796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 19.413864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.413975] page_type: f5(slab) [ 19.414034] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.414093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.414135] page dumped because: kasan: bad access detected [ 19.414179] [ 19.414207] Memory state around the buggy address: [ 19.414257] fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.414317] fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.414371] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.414412] ^ [ 19.414456] fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.414510] fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.414550] ================================================================== [ 19.387461] ================================================================== [ 19.387549] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.387637] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261 [ 19.387692] [ 19.387742] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.387830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.388254] Hardware name: linux,dummy-virt (DT) [ 19.388802] Call trace: [ 19.389096] show_stack+0x20/0x38 (C) [ 19.389189] dump_stack_lvl+0x8c/0xd0 [ 19.389400] print_report+0x118/0x5d0 [ 19.389506] kasan_report+0xdc/0x128 [ 19.389777] kasan_check_range+0x100/0x1a8 [ 19.389869] __kasan_check_write+0x20/0x30 [ 19.390701] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.390838] kasan_bitops_generic+0x110/0x1c8 [ 19.391225] kunit_try_run_case+0x170/0x3f0 [ 19.391364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.391449] kthread+0x328/0x630 [ 19.391536] ret_from_fork+0x10/0x20 [ 19.391643] [ 19.391808] Allocated by task 261: [ 19.392217] kasan_save_stack+0x3c/0x68 [ 19.392280] kasan_save_track+0x20/0x40 [ 19.392357] kasan_save_alloc_info+0x40/0x58 [ 19.392684] __kasan_kmalloc+0xd4/0xd8 [ 19.392830] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.393115] kasan_bitops_generic+0xa0/0x1c8 [ 19.393252] kunit_try_run_case+0x170/0x3f0 [ 19.393315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.393812] kthread+0x328/0x630 [ 19.394064] ret_from_fork+0x10/0x20 [ 19.394149] [ 19.394300] The buggy address belongs to the object at fff00000c3eb9280 [ 19.394300] which belongs to the cache kmalloc-16 of size 16 [ 19.394511] The buggy address is located 8 bytes inside of [ 19.394511] allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289) [ 19.394737] [ 19.394764] The buggy address belongs to the physical page: [ 19.395003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 19.395376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.395444] page_type: f5(slab) [ 19.395492] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.395897] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.396030] page dumped because: kasan: bad access detected [ 19.396086] [ 19.396355] Memory state around the buggy address: [ 19.396402] fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.396768] fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.396870] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.396961] ^ [ 19.397174] fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.397220] fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.397262] ================================================================== [ 19.457405] ================================================================== [ 19.457482] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 19.457542] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261 [ 19.457597] [ 19.457978] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.458087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.458193] Hardware name: linux,dummy-virt (DT) [ 19.458232] Call trace: [ 19.458276] show_stack+0x20/0x38 (C) [ 19.458626] dump_stack_lvl+0x8c/0xd0 [ 19.459000] print_report+0x118/0x5d0 [ 19.459104] kasan_report+0xdc/0x128 [ 19.459413] kasan_check_range+0x100/0x1a8 [ 19.459925] __kasan_check_write+0x20/0x30 [ 19.460017] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 19.460100] kasan_bitops_generic+0x110/0x1c8 [ 19.460260] kunit_try_run_case+0x170/0x3f0 [ 19.460568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.460925] kthread+0x328/0x630 [ 19.460991] ret_from_fork+0x10/0x20 [ 19.461646] [ 19.461702] Allocated by task 261: [ 19.461859] kasan_save_stack+0x3c/0x68 [ 19.462088] kasan_save_track+0x20/0x40 [ 19.462335] kasan_save_alloc_info+0x40/0x58 [ 19.462407] __kasan_kmalloc+0xd4/0xd8 [ 19.462565] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.462722] kasan_bitops_generic+0xa0/0x1c8 [ 19.462768] kunit_try_run_case+0x170/0x3f0 [ 19.462991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.463106] kthread+0x328/0x630 [ 19.463264] ret_from_fork+0x10/0x20 [ 19.463495] [ 19.463595] The buggy address belongs to the object at fff00000c3eb9280 [ 19.463595] which belongs to the cache kmalloc-16 of size 16 [ 19.463923] The buggy address is located 8 bytes inside of [ 19.463923] allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289) [ 19.464064] [ 19.464270] The buggy address belongs to the physical page: [ 19.464368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 19.464550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.464706] page_type: f5(slab) [ 19.464821] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.465149] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.465216] page dumped because: kasan: bad access detected [ 19.465396] [ 19.465489] Memory state around the buggy address: [ 19.465654] fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.465733] fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.465934] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.466150] ^ [ 19.466220] fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.466546] fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.466916] ================================================================== [ 19.468432] ================================================================== [ 19.468495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 19.468557] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261 [ 19.469084] [ 19.469426] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.469537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.469568] Hardware name: linux,dummy-virt (DT) [ 19.469602] Call trace: [ 19.469630] show_stack+0x20/0x38 (C) [ 19.469686] dump_stack_lvl+0x8c/0xd0 [ 19.469741] print_report+0x118/0x5d0 [ 19.469792] kasan_report+0xdc/0x128 [ 19.469840] kasan_check_range+0x100/0x1a8 [ 19.469902] __kasan_check_write+0x20/0x30 [ 19.470074] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 19.470138] kasan_bitops_generic+0x110/0x1c8 [ 19.470186] kunit_try_run_case+0x170/0x3f0 [ 19.470236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.470309] kthread+0x328/0x630 [ 19.470354] ret_from_fork+0x10/0x20 [ 19.470407] [ 19.470428] Allocated by task 261: [ 19.470460] kasan_save_stack+0x3c/0x68 [ 19.470503] kasan_save_track+0x20/0x40 [ 19.470565] kasan_save_alloc_info+0x40/0x58 [ 19.470607] __kasan_kmalloc+0xd4/0xd8 [ 19.470645] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.470698] kasan_bitops_generic+0xa0/0x1c8 [ 19.470746] kunit_try_run_case+0x170/0x3f0 [ 19.470794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.471128] kthread+0x328/0x630 [ 19.471212] ret_from_fork+0x10/0x20 [ 19.471256] [ 19.471504] The buggy address belongs to the object at fff00000c3eb9280 [ 19.471504] which belongs to the cache kmalloc-16 of size 16 [ 19.472215] The buggy address is located 8 bytes inside of [ 19.472215] allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289) [ 19.472457] [ 19.472551] The buggy address belongs to the physical page: [ 19.472753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9 [ 19.472821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.473181] page_type: f5(slab) [ 19.473352] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.473449] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.473672] page dumped because: kasan: bad access detected [ 19.473750] [ 19.473932] Memory state around the buggy address: [ 19.474111] fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.474343] fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.474461] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.474536] ^ [ 19.474627] fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.475039] fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.475154] ==================================================================
[ 18.935540] ================================================================== [ 18.936033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.936095] Read of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261 [ 18.936147] [ 18.936186] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.936266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.936294] Hardware name: linux,dummy-virt (DT) [ 18.936339] Call trace: [ 18.936363] show_stack+0x20/0x38 (C) [ 18.936425] dump_stack_lvl+0x8c/0xd0 [ 18.936473] print_report+0x118/0x5d0 [ 18.936529] kasan_report+0xdc/0x128 [ 18.936575] __asan_report_load8_noabort+0x20/0x30 [ 18.936630] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.936683] kasan_bitops_generic+0x110/0x1c8 [ 18.936792] kunit_try_run_case+0x170/0x3f0 [ 18.936843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.936898] kthread+0x328/0x630 [ 18.936942] ret_from_fork+0x10/0x20 [ 18.936993] [ 18.937013] Allocated by task 261: [ 18.937066] kasan_save_stack+0x3c/0x68 [ 18.937108] kasan_save_track+0x20/0x40 [ 18.937148] kasan_save_alloc_info+0x40/0x58 [ 18.937189] __kasan_kmalloc+0xd4/0xd8 [ 18.937235] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.937276] kasan_bitops_generic+0xa0/0x1c8 [ 18.937314] kunit_try_run_case+0x170/0x3f0 [ 18.937364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.937529] kthread+0x328/0x630 [ 18.937586] ret_from_fork+0x10/0x20 [ 18.937624] [ 18.937705] The buggy address belongs to the object at fff00000c5a02c60 [ 18.937705] which belongs to the cache kmalloc-16 of size 16 [ 18.937809] The buggy address is located 8 bytes inside of [ 18.937809] allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69) [ 18.937871] [ 18.937893] The buggy address belongs to the physical page: [ 18.937925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 18.937980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.938027] page_type: f5(slab) [ 18.938068] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.938120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.938178] page dumped because: kasan: bad access detected [ 18.938274] [ 18.938361] Memory state around the buggy address: [ 18.938402] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 18.938525] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.938570] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 18.938609] ^ [ 18.938651] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.938695] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.938734] ================================================================== [ 18.930477] ================================================================== [ 18.930547] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.930612] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261 [ 18.930699] [ 18.930735] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.930819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.930848] Hardware name: linux,dummy-virt (DT) [ 18.930882] Call trace: [ 18.930913] show_stack+0x20/0x38 (C) [ 18.931114] dump_stack_lvl+0x8c/0xd0 [ 18.931249] print_report+0x118/0x5d0 [ 18.931364] kasan_report+0xdc/0x128 [ 18.931410] kasan_check_range+0x100/0x1a8 [ 18.931460] __kasan_check_write+0x20/0x30 [ 18.931506] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.931558] kasan_bitops_generic+0x110/0x1c8 [ 18.931605] kunit_try_run_case+0x170/0x3f0 [ 18.931654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.931707] kthread+0x328/0x630 [ 18.931751] ret_from_fork+0x10/0x20 [ 18.931800] [ 18.931820] Allocated by task 261: [ 18.931849] kasan_save_stack+0x3c/0x68 [ 18.931891] kasan_save_track+0x20/0x40 [ 18.931930] kasan_save_alloc_info+0x40/0x58 [ 18.931972] __kasan_kmalloc+0xd4/0xd8 [ 18.932009] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.932051] kasan_bitops_generic+0xa0/0x1c8 [ 18.932091] kunit_try_run_case+0x170/0x3f0 [ 18.932129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.932209] kthread+0x328/0x630 [ 18.932383] ret_from_fork+0x10/0x20 [ 18.932426] [ 18.932447] The buggy address belongs to the object at fff00000c5a02c60 [ 18.932447] which belongs to the cache kmalloc-16 of size 16 [ 18.932550] The buggy address is located 8 bytes inside of [ 18.932550] allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69) [ 18.932614] [ 18.932636] The buggy address belongs to the physical page: [ 18.932667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 18.932722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.932772] page_type: f5(slab) [ 18.932812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.932865] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.932920] page dumped because: kasan: bad access detected [ 18.933165] [ 18.933186] Memory state around the buggy address: [ 18.934011] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 18.934130] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.934213] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 18.934277] ^ [ 18.934340] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.934386] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.934426] ================================================================== [ 18.940469] ================================================================== [ 18.940581] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 18.940749] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261 [ 18.940801] [ 18.940848] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.941120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.941838] Hardware name: linux,dummy-virt (DT) [ 18.942501] Call trace: [ 18.942687] show_stack+0x20/0x38 (C) [ 18.942880] dump_stack_lvl+0x8c/0xd0 [ 18.942936] print_report+0x118/0x5d0 [ 18.943346] kasan_report+0xdc/0x128 [ 18.943409] kasan_check_range+0x100/0x1a8 [ 18.943890] __kasan_check_write+0x20/0x30 [ 18.943939] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 18.943992] kasan_bitops_generic+0x110/0x1c8 [ 18.944515] kunit_try_run_case+0x170/0x3f0 [ 18.944800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.944900] kthread+0x328/0x630 [ 18.944946] ret_from_fork+0x10/0x20 [ 18.944994] [ 18.945016] Allocated by task 261: [ 18.945279] kasan_save_stack+0x3c/0x68 [ 18.945351] kasan_save_track+0x20/0x40 [ 18.945598] kasan_save_alloc_info+0x40/0x58 [ 18.945642] __kasan_kmalloc+0xd4/0xd8 [ 18.945680] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.946286] kasan_bitops_generic+0xa0/0x1c8 [ 18.946702] kunit_try_run_case+0x170/0x3f0 [ 18.946749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.946931] kthread+0x328/0x630 [ 18.947269] ret_from_fork+0x10/0x20 [ 18.947557] [ 18.947587] The buggy address belongs to the object at fff00000c5a02c60 [ 18.947587] which belongs to the cache kmalloc-16 of size 16 [ 18.947961] The buggy address is located 8 bytes inside of [ 18.947961] allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69) [ 18.948038] [ 18.948290] The buggy address belongs to the physical page: [ 18.948353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 18.948411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.949109] page_type: f5(slab) [ 18.949355] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.949450] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.949501] page dumped because: kasan: bad access detected [ 18.949800] [ 18.950016] Memory state around the buggy address: [ 18.950055] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 18.950382] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.950723] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 18.950965] ^ [ 18.951016] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.951429] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.951496] ================================================================== [ 18.963422] ================================================================== [ 18.963477] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 18.964846] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261 [ 18.964934] [ 18.964969] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.965442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.965503] Hardware name: linux,dummy-virt (DT) [ 18.965787] Call trace: [ 18.965868] show_stack+0x20/0x38 (C) [ 18.966160] dump_stack_lvl+0x8c/0xd0 [ 18.966412] print_report+0x118/0x5d0 [ 18.966463] kasan_report+0xdc/0x128 [ 18.966512] kasan_check_range+0x100/0x1a8 [ 18.967228] __kasan_check_write+0x20/0x30 [ 18.967348] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 18.967403] kasan_bitops_generic+0x110/0x1c8 [ 18.967452] kunit_try_run_case+0x170/0x3f0 [ 18.967500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.967555] kthread+0x328/0x630 [ 18.967600] ret_from_fork+0x10/0x20 [ 18.967649] [ 18.967670] Allocated by task 261: [ 18.967700] kasan_save_stack+0x3c/0x68 [ 18.967743] kasan_save_track+0x20/0x40 [ 18.967782] kasan_save_alloc_info+0x40/0x58 [ 18.967825] __kasan_kmalloc+0xd4/0xd8 [ 18.967862] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.967904] kasan_bitops_generic+0xa0/0x1c8 [ 18.967944] kunit_try_run_case+0x170/0x3f0 [ 18.967982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.968028] kthread+0x328/0x630 [ 18.968063] ret_from_fork+0x10/0x20 [ 18.968471] [ 18.968531] The buggy address belongs to the object at fff00000c5a02c60 [ 18.968531] which belongs to the cache kmalloc-16 of size 16 [ 18.969187] The buggy address is located 8 bytes inside of [ 18.969187] allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69) [ 18.969350] [ 18.969376] The buggy address belongs to the physical page: [ 18.969409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 18.969463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.969513] page_type: f5(slab) [ 18.969554] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.969606] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.969648] page dumped because: kasan: bad access detected [ 18.969785] [ 18.970185] Memory state around the buggy address: [ 18.970224] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 18.970771] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.970844] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 18.971724] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.974184] __kasan_check_write+0x20/0x30 [ 18.978212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.981207] page dumped because: kasan: bad access detected [ 18.986304] [ 18.988952] kasan_bitops_generic+0x110/0x1c8 [ 18.992234] kunit_try_run_case+0x170/0x3f0 [ 18.992958] page_type: f5(slab) [ 18.993309] ^ [ 18.995371] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261 [ 18.995422] [ 18.995458] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.995540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.996005] Hardware name: linux,dummy-virt (DT) [ 18.996054] Call trace: [ 18.996083] show_stack+0x20/0x38 (C) [ 18.997149] dump_stack_lvl+0x8c/0xd0 [ 18.997222] print_report+0x118/0x5d0 [ 18.997274] kasan_report+0xdc/0x128 [ 18.997666] kasan_check_range+0x100/0x1a8 [ 18.997978] __kasan_check_write+0x20/0x30 [ 18.998152] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 19.000384] kasan_save_stack+0x3c/0x68 [ 19.000606] kasan_bitops_generic+0xa0/0x1c8 [ 19.002057] ret_from_fork+0x10/0x20 [ 19.002889] The buggy address is located 8 bytes inside of [ 19.002889] allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69) [ 19.006018] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 19.007096] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.011929] ================================================================== [ 18.952570] ================================================================== [ 18.953366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 18.953452] Read of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261 [ 18.953606] [ 18.953650] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.953834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.954047] Hardware name: linux,dummy-virt (DT) [ 18.954081] Call trace: [ 18.954253] show_stack+0x20/0x38 (C) [ 18.954330] dump_stack_lvl+0x8c/0xd0 [ 18.954380] print_report+0x118/0x5d0 [ 18.954852] kasan_report+0xdc/0x128 [ 18.955088] __asan_report_load8_noabort+0x20/0x30 [ 18.955156] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 18.955873] kasan_bitops_generic+0x110/0x1c8 [ 18.955937] kunit_try_run_case+0x170/0x3f0 [ 18.956605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.956835] kthread+0x328/0x630 [ 18.956882] ret_from_fork+0x10/0x20 [ 18.957334] [ 18.957437] Allocated by task 261: [ 18.957609] kasan_save_stack+0x3c/0x68 [ 18.957663] kasan_save_track+0x20/0x40 [ 18.957702] kasan_save_alloc_info+0x40/0x58 [ 18.957743] __kasan_kmalloc+0xd4/0xd8 [ 18.957780] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.958366] kasan_bitops_generic+0xa0/0x1c8 [ 18.958415] kunit_try_run_case+0x170/0x3f0 [ 18.958456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.958502] kthread+0x328/0x630 [ 18.958536] ret_from_fork+0x10/0x20 [ 18.958746] [ 18.958771] The buggy address belongs to the object at fff00000c5a02c60 [ 18.958771] which belongs to the cache kmalloc-16 of size 16 [ 18.959124] The buggy address is located 8 bytes inside of [ 18.959124] allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69) [ 18.959227] [ 18.959532] The buggy address belongs to the physical page: [ 18.959572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 18.959892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.960097] page_type: f5(slab) [ 18.960221] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.960375] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.960525] page dumped because: kasan: bad access detected [ 18.960565] [ 18.960586] Memory state around the buggy address: [ 18.961439] fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 18.961541] fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.961645] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 18.961745] ^ [ 18.961999] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.962215] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.962261] ==================================================================
[ 14.216122] ================================================================== [ 14.216599] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.217022] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.217394] [ 14.217487] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.217529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.217540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.217560] Call Trace: [ 14.217573] <TASK> [ 14.217586] dump_stack_lvl+0x73/0xb0 [ 14.217634] print_report+0xd1/0x610 [ 14.217666] ? __virt_addr_valid+0x1db/0x2d0 [ 14.217687] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.217741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.217788] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.217815] kasan_report+0x141/0x180 [ 14.217836] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.217878] kasan_check_range+0x10c/0x1c0 [ 14.217901] __kasan_check_write+0x18/0x20 [ 14.217920] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.217947] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.217974] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.217998] ? trace_hardirqs_on+0x37/0xe0 [ 14.218020] ? kasan_bitops_generic+0x92/0x1c0 [ 14.218047] kasan_bitops_generic+0x116/0x1c0 [ 14.218070] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.218096] ? __pfx_read_tsc+0x10/0x10 [ 14.218116] ? ktime_get_ts64+0x86/0x230 [ 14.218141] kunit_try_run_case+0x1a5/0x480 [ 14.218164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.218213] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.218237] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.218261] ? __kthread_parkme+0x82/0x180 [ 14.218291] ? preempt_count_sub+0x50/0x80 [ 14.218316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.218365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.218389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.218413] kthread+0x337/0x6f0 [ 14.218449] ? trace_preempt_on+0x20/0xc0 [ 14.218471] ? __pfx_kthread+0x10/0x10 [ 14.218492] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.218560] ? calculate_sigpending+0x7b/0xa0 [ 14.218584] ? __pfx_kthread+0x10/0x10 [ 14.218606] ret_from_fork+0x116/0x1d0 [ 14.218634] ? __pfx_kthread+0x10/0x10 [ 14.218655] ret_from_fork_asm+0x1a/0x30 [ 14.218687] </TASK> [ 14.218697] [ 14.227512] Allocated by task 279: [ 14.227715] kasan_save_stack+0x45/0x70 [ 14.227895] kasan_save_track+0x18/0x40 [ 14.228027] kasan_save_alloc_info+0x3b/0x50 [ 14.228172] __kasan_kmalloc+0xb7/0xc0 [ 14.228301] __kmalloc_cache_noprof+0x189/0x420 [ 14.228497] kasan_bitops_generic+0x92/0x1c0 [ 14.228830] kunit_try_run_case+0x1a5/0x480 [ 14.229127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.229357] kthread+0x337/0x6f0 [ 14.229484] ret_from_fork+0x116/0x1d0 [ 14.229845] ret_from_fork_asm+0x1a/0x30 [ 14.230076] [ 14.230188] The buggy address belongs to the object at ffff888101684300 [ 14.230188] which belongs to the cache kmalloc-16 of size 16 [ 14.230796] The buggy address is located 8 bytes inside of [ 14.230796] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.231264] [ 14.231374] The buggy address belongs to the physical page: [ 14.231667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.232031] flags: 0x200000000000000(node=0|zone=2) [ 14.232222] page_type: f5(slab) [ 14.232426] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.232788] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.233122] page dumped because: kasan: bad access detected [ 14.233371] [ 14.233472] Memory state around the buggy address: [ 14.233727] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.234048] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.234425] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.234778] ^ [ 14.234964] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.235293] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.235684] ================================================================== [ 14.174371] ================================================================== [ 14.175452] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.175805] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.176021] [ 14.176101] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.176142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.176153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.176173] Call Trace: [ 14.176187] <TASK> [ 14.176202] dump_stack_lvl+0x73/0xb0 [ 14.176226] print_report+0xd1/0x610 [ 14.176403] ? __virt_addr_valid+0x1db/0x2d0 [ 14.176428] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.176469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.176491] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.176517] kasan_report+0x141/0x180 [ 14.176578] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.176624] kasan_check_range+0x10c/0x1c0 [ 14.176661] __kasan_check_write+0x18/0x20 [ 14.176680] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.176720] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.176760] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.176798] ? trace_hardirqs_on+0x37/0xe0 [ 14.176833] ? kasan_bitops_generic+0x92/0x1c0 [ 14.176860] kasan_bitops_generic+0x116/0x1c0 [ 14.176884] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.176910] ? __pfx_read_tsc+0x10/0x10 [ 14.176930] ? ktime_get_ts64+0x86/0x230 [ 14.176959] kunit_try_run_case+0x1a5/0x480 [ 14.176982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.177005] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.177028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.177052] ? __kthread_parkme+0x82/0x180 [ 14.177072] ? preempt_count_sub+0x50/0x80 [ 14.177096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.177119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.177148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.177172] kthread+0x337/0x6f0 [ 14.177192] ? trace_preempt_on+0x20/0xc0 [ 14.177215] ? __pfx_kthread+0x10/0x10 [ 14.177234] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.177254] ? calculate_sigpending+0x7b/0xa0 [ 14.177278] ? __pfx_kthread+0x10/0x10 [ 14.177299] ret_from_fork+0x116/0x1d0 [ 14.177317] ? __pfx_kthread+0x10/0x10 [ 14.177336] ret_from_fork_asm+0x1a/0x30 [ 14.177369] </TASK> [ 14.177378] [ 14.186282] Allocated by task 279: [ 14.186482] kasan_save_stack+0x45/0x70 [ 14.186716] kasan_save_track+0x18/0x40 [ 14.186906] kasan_save_alloc_info+0x3b/0x50 [ 14.187132] __kasan_kmalloc+0xb7/0xc0 [ 14.187329] __kmalloc_cache_noprof+0x189/0x420 [ 14.187562] kasan_bitops_generic+0x92/0x1c0 [ 14.187811] kunit_try_run_case+0x1a5/0x480 [ 14.188068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.188325] kthread+0x337/0x6f0 [ 14.188498] ret_from_fork+0x116/0x1d0 [ 14.188679] ret_from_fork_asm+0x1a/0x30 [ 14.188874] [ 14.188966] The buggy address belongs to the object at ffff888101684300 [ 14.188966] which belongs to the cache kmalloc-16 of size 16 [ 14.189755] The buggy address is located 8 bytes inside of [ 14.189755] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.190273] [ 14.190364] The buggy address belongs to the physical page: [ 14.190726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.191071] flags: 0x200000000000000(node=0|zone=2) [ 14.191301] page_type: f5(slab) [ 14.191415] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.191959] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.192291] page dumped because: kasan: bad access detected [ 14.192633] [ 14.192753] Memory state around the buggy address: [ 14.192903] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.193229] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.193643] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.193958] ^ [ 14.194129] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.194463] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.194769] ================================================================== [ 14.237014] ================================================================== [ 14.237770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.238169] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.238546] [ 14.238689] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.238758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.238782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.238802] Call Trace: [ 14.238828] <TASK> [ 14.238855] dump_stack_lvl+0x73/0xb0 [ 14.238897] print_report+0xd1/0x610 [ 14.238931] ? __virt_addr_valid+0x1db/0x2d0 [ 14.238966] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.238992] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.239014] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.239041] kasan_report+0x141/0x180 [ 14.239064] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.239096] kasan_check_range+0x10c/0x1c0 [ 14.239120] __kasan_check_write+0x18/0x20 [ 14.239139] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.239177] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.239206] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.239231] ? trace_hardirqs_on+0x37/0xe0 [ 14.239266] ? kasan_bitops_generic+0x92/0x1c0 [ 14.239294] kasan_bitops_generic+0x116/0x1c0 [ 14.239317] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.239342] ? __pfx_read_tsc+0x10/0x10 [ 14.239363] ? ktime_get_ts64+0x86/0x230 [ 14.239387] kunit_try_run_case+0x1a5/0x480 [ 14.239411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.239433] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.239466] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.239490] ? __kthread_parkme+0x82/0x180 [ 14.239509] ? preempt_count_sub+0x50/0x80 [ 14.239533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.239557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.239582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.239606] kthread+0x337/0x6f0 [ 14.239625] ? trace_preempt_on+0x20/0xc0 [ 14.239646] ? __pfx_kthread+0x10/0x10 [ 14.239667] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.239688] ? calculate_sigpending+0x7b/0xa0 [ 14.239712] ? __pfx_kthread+0x10/0x10 [ 14.239734] ret_from_fork+0x116/0x1d0 [ 14.239752] ? __pfx_kthread+0x10/0x10 [ 14.239772] ret_from_fork_asm+0x1a/0x30 [ 14.239804] </TASK> [ 14.239813] [ 14.248207] Allocated by task 279: [ 14.248452] kasan_save_stack+0x45/0x70 [ 14.248875] kasan_save_track+0x18/0x40 [ 14.249069] kasan_save_alloc_info+0x3b/0x50 [ 14.249289] __kasan_kmalloc+0xb7/0xc0 [ 14.249481] __kmalloc_cache_noprof+0x189/0x420 [ 14.249766] kasan_bitops_generic+0x92/0x1c0 [ 14.249990] kunit_try_run_case+0x1a5/0x480 [ 14.250211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.250482] kthread+0x337/0x6f0 [ 14.250743] ret_from_fork+0x116/0x1d0 [ 14.250971] ret_from_fork_asm+0x1a/0x30 [ 14.251179] [ 14.251277] The buggy address belongs to the object at ffff888101684300 [ 14.251277] which belongs to the cache kmalloc-16 of size 16 [ 14.251894] The buggy address is located 8 bytes inside of [ 14.251894] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.252398] [ 14.252490] The buggy address belongs to the physical page: [ 14.252811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.253184] flags: 0x200000000000000(node=0|zone=2) [ 14.253411] page_type: f5(slab) [ 14.253626] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.253966] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.254293] page dumped because: kasan: bad access detected [ 14.254579] [ 14.254657] Memory state around the buggy address: [ 14.254808] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.255018] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.255229] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.255452] ^ [ 14.255695] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.256020] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.256330] ================================================================== [ 14.153594] ================================================================== [ 14.154112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.154633] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.155173] [ 14.155280] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.155321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.155332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.155352] Call Trace: [ 14.155365] <TASK> [ 14.155379] dump_stack_lvl+0x73/0xb0 [ 14.155424] print_report+0xd1/0x610 [ 14.155455] ? __virt_addr_valid+0x1db/0x2d0 [ 14.155477] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.155503] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.155525] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.155558] kasan_report+0x141/0x180 [ 14.155580] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.155611] kasan_check_range+0x10c/0x1c0 [ 14.155634] __kasan_check_write+0x18/0x20 [ 14.155653] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.155678] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.155705] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.155729] ? trace_hardirqs_on+0x37/0xe0 [ 14.155750] ? kasan_bitops_generic+0x92/0x1c0 [ 14.155778] kasan_bitops_generic+0x116/0x1c0 [ 14.155801] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.155825] ? __pfx_read_tsc+0x10/0x10 [ 14.155844] ? ktime_get_ts64+0x86/0x230 [ 14.155868] kunit_try_run_case+0x1a5/0x480 [ 14.155892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.155914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.155939] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.155962] ? __kthread_parkme+0x82/0x180 [ 14.155981] ? preempt_count_sub+0x50/0x80 [ 14.156006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.156029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.156052] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.156076] kthread+0x337/0x6f0 [ 14.156095] ? trace_preempt_on+0x20/0xc0 [ 14.156116] ? __pfx_kthread+0x10/0x10 [ 14.156136] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.156156] ? calculate_sigpending+0x7b/0xa0 [ 14.156181] ? __pfx_kthread+0x10/0x10 [ 14.156203] ret_from_fork+0x116/0x1d0 [ 14.156221] ? __pfx_kthread+0x10/0x10 [ 14.156241] ret_from_fork_asm+0x1a/0x30 [ 14.156273] </TASK> [ 14.156281] [ 14.165187] Allocated by task 279: [ 14.165350] kasan_save_stack+0x45/0x70 [ 14.165563] kasan_save_track+0x18/0x40 [ 14.165737] kasan_save_alloc_info+0x3b/0x50 [ 14.165954] __kasan_kmalloc+0xb7/0xc0 [ 14.166086] __kmalloc_cache_noprof+0x189/0x420 [ 14.166334] kasan_bitops_generic+0x92/0x1c0 [ 14.166542] kunit_try_run_case+0x1a5/0x480 [ 14.166769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.166968] kthread+0x337/0x6f0 [ 14.167089] ret_from_fork+0x116/0x1d0 [ 14.167223] ret_from_fork_asm+0x1a/0x30 [ 14.167364] [ 14.167433] The buggy address belongs to the object at ffff888101684300 [ 14.167433] which belongs to the cache kmalloc-16 of size 16 [ 14.168388] The buggy address is located 8 bytes inside of [ 14.168388] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.169190] [ 14.169263] The buggy address belongs to the physical page: [ 14.169451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.170127] flags: 0x200000000000000(node=0|zone=2) [ 14.170431] page_type: f5(slab) [ 14.170668] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.170918] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.171256] page dumped because: kasan: bad access detected [ 14.171550] [ 14.171621] Memory state around the buggy address: [ 14.171861] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.172216] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.172556] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.172877] ^ [ 14.173073] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.173396] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.173805] ================================================================== [ 14.114361] ================================================================== [ 14.114802] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.115415] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.116200] [ 14.116415] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.116466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.116477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.116497] Call Trace: [ 14.116508] <TASK> [ 14.116522] dump_stack_lvl+0x73/0xb0 [ 14.116549] print_report+0xd1/0x610 [ 14.116580] ? __virt_addr_valid+0x1db/0x2d0 [ 14.116602] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.116626] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.116660] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.116686] kasan_report+0x141/0x180 [ 14.116707] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.116739] kasan_check_range+0x10c/0x1c0 [ 14.116762] __kasan_check_write+0x18/0x20 [ 14.116780] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.116807] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.116834] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.116857] ? trace_hardirqs_on+0x37/0xe0 [ 14.116878] ? kasan_bitops_generic+0x92/0x1c0 [ 14.116906] kasan_bitops_generic+0x116/0x1c0 [ 14.116929] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.116953] ? __pfx_read_tsc+0x10/0x10 [ 14.116973] ? ktime_get_ts64+0x86/0x230 [ 14.116997] kunit_try_run_case+0x1a5/0x480 [ 14.117030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.117052] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.117075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.117104] ? __kthread_parkme+0x82/0x180 [ 14.117124] ? preempt_count_sub+0x50/0x80 [ 14.117151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.117175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.117199] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.117222] kthread+0x337/0x6f0 [ 14.117240] ? trace_preempt_on+0x20/0xc0 [ 14.117261] ? __pfx_kthread+0x10/0x10 [ 14.117282] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.117302] ? calculate_sigpending+0x7b/0xa0 [ 14.117325] ? __pfx_kthread+0x10/0x10 [ 14.117347] ret_from_fork+0x116/0x1d0 [ 14.117365] ? __pfx_kthread+0x10/0x10 [ 14.117385] ret_from_fork_asm+0x1a/0x30 [ 14.117417] </TASK> [ 14.117426] [ 14.127814] Allocated by task 279: [ 14.127946] kasan_save_stack+0x45/0x70 [ 14.128090] kasan_save_track+0x18/0x40 [ 14.128225] kasan_save_alloc_info+0x3b/0x50 [ 14.128466] __kasan_kmalloc+0xb7/0xc0 [ 14.128651] __kmalloc_cache_noprof+0x189/0x420 [ 14.128915] kasan_bitops_generic+0x92/0x1c0 [ 14.129131] kunit_try_run_case+0x1a5/0x480 [ 14.129308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.129493] kthread+0x337/0x6f0 [ 14.129786] ret_from_fork+0x116/0x1d0 [ 14.129976] ret_from_fork_asm+0x1a/0x30 [ 14.130173] [ 14.130303] The buggy address belongs to the object at ffff888101684300 [ 14.130303] which belongs to the cache kmalloc-16 of size 16 [ 14.130773] The buggy address is located 8 bytes inside of [ 14.130773] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.131298] [ 14.131394] The buggy address belongs to the physical page: [ 14.131681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.132022] flags: 0x200000000000000(node=0|zone=2) [ 14.132240] page_type: f5(slab) [ 14.132424] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.132776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.133086] page dumped because: kasan: bad access detected [ 14.133306] [ 14.133420] Memory state around the buggy address: [ 14.133637] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.133857] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.134075] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.134290] ^ [ 14.134494] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.134810] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.135130] ================================================================== [ 14.135918] ================================================================== [ 14.136272] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.136616] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.136916] [ 14.137023] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.137063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.137073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.137093] Call Trace: [ 14.137104] <TASK> [ 14.137117] dump_stack_lvl+0x73/0xb0 [ 14.137146] print_report+0xd1/0x610 [ 14.137166] ? __virt_addr_valid+0x1db/0x2d0 [ 14.137186] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.137211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.137231] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.137256] kasan_report+0x141/0x180 [ 14.137276] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.137306] kasan_check_range+0x10c/0x1c0 [ 14.137328] __kasan_check_write+0x18/0x20 [ 14.137346] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.137371] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.137396] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.137418] ? trace_hardirqs_on+0x37/0xe0 [ 14.137457] ? kasan_bitops_generic+0x92/0x1c0 [ 14.137484] kasan_bitops_generic+0x116/0x1c0 [ 14.137507] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.137530] ? __pfx_read_tsc+0x10/0x10 [ 14.137549] ? ktime_get_ts64+0x86/0x230 [ 14.137572] kunit_try_run_case+0x1a5/0x480 [ 14.137594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.137615] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.137638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.137661] ? __kthread_parkme+0x82/0x180 [ 14.137680] ? preempt_count_sub+0x50/0x80 [ 14.137703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.137725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.137748] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.137784] kthread+0x337/0x6f0 [ 14.137803] ? trace_preempt_on+0x20/0xc0 [ 14.137824] ? __pfx_kthread+0x10/0x10 [ 14.137844] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.137865] ? calculate_sigpending+0x7b/0xa0 [ 14.137889] ? __pfx_kthread+0x10/0x10 [ 14.137910] ret_from_fork+0x116/0x1d0 [ 14.137928] ? __pfx_kthread+0x10/0x10 [ 14.137947] ret_from_fork_asm+0x1a/0x30 [ 14.137979] </TASK> [ 14.137999] [ 14.146183] Allocated by task 279: [ 14.146310] kasan_save_stack+0x45/0x70 [ 14.146456] kasan_save_track+0x18/0x40 [ 14.146763] kasan_save_alloc_info+0x3b/0x50 [ 14.146999] __kasan_kmalloc+0xb7/0xc0 [ 14.147204] __kmalloc_cache_noprof+0x189/0x420 [ 14.147429] kasan_bitops_generic+0x92/0x1c0 [ 14.147663] kunit_try_run_case+0x1a5/0x480 [ 14.147818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.148020] kthread+0x337/0x6f0 [ 14.148203] ret_from_fork+0x116/0x1d0 [ 14.148384] ret_from_fork_asm+0x1a/0x30 [ 14.148548] [ 14.148642] The buggy address belongs to the object at ffff888101684300 [ 14.148642] which belongs to the cache kmalloc-16 of size 16 [ 14.149080] The buggy address is located 8 bytes inside of [ 14.149080] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.149565] [ 14.149672] The buggy address belongs to the physical page: [ 14.149864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.150214] flags: 0x200000000000000(node=0|zone=2) [ 14.150424] page_type: f5(slab) [ 14.150650] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.150955] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.151263] page dumped because: kasan: bad access detected [ 14.151511] [ 14.151639] Memory state around the buggy address: [ 14.151835] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.152146] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.152394] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.152610] ^ [ 14.152728] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.152935] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.153143] ================================================================== [ 14.195779] ================================================================== [ 14.196164] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.196616] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.196937] [ 14.197060] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.197134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.197145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.197178] Call Trace: [ 14.197203] <TASK> [ 14.197217] dump_stack_lvl+0x73/0xb0 [ 14.197257] print_report+0xd1/0x610 [ 14.197291] ? __virt_addr_valid+0x1db/0x2d0 [ 14.197325] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.197365] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.197401] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.197453] kasan_report+0x141/0x180 [ 14.197484] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.197515] kasan_check_range+0x10c/0x1c0 [ 14.197550] __kasan_check_write+0x18/0x20 [ 14.197569] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.197595] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.197622] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.197645] ? trace_hardirqs_on+0x37/0xe0 [ 14.197666] ? kasan_bitops_generic+0x92/0x1c0 [ 14.197693] kasan_bitops_generic+0x116/0x1c0 [ 14.197717] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.197741] ? __pfx_read_tsc+0x10/0x10 [ 14.197761] ? ktime_get_ts64+0x86/0x230 [ 14.197785] kunit_try_run_case+0x1a5/0x480 [ 14.197809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.197831] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.197854] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.197878] ? __kthread_parkme+0x82/0x180 [ 14.197898] ? preempt_count_sub+0x50/0x80 [ 14.197922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.197945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.197969] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.197994] kthread+0x337/0x6f0 [ 14.198011] ? trace_preempt_on+0x20/0xc0 [ 14.198033] ? __pfx_kthread+0x10/0x10 [ 14.198053] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.198074] ? calculate_sigpending+0x7b/0xa0 [ 14.198098] ? __pfx_kthread+0x10/0x10 [ 14.198119] ret_from_fork+0x116/0x1d0 [ 14.198137] ? __pfx_kthread+0x10/0x10 [ 14.198156] ret_from_fork_asm+0x1a/0x30 [ 14.198189] </TASK> [ 14.198198] [ 14.207253] Allocated by task 279: [ 14.207452] kasan_save_stack+0x45/0x70 [ 14.207684] kasan_save_track+0x18/0x40 [ 14.207893] kasan_save_alloc_info+0x3b/0x50 [ 14.208124] __kasan_kmalloc+0xb7/0xc0 [ 14.208309] __kmalloc_cache_noprof+0x189/0x420 [ 14.208573] kasan_bitops_generic+0x92/0x1c0 [ 14.208852] kunit_try_run_case+0x1a5/0x480 [ 14.209087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.209341] kthread+0x337/0x6f0 [ 14.209526] ret_from_fork+0x116/0x1d0 [ 14.209740] ret_from_fork_asm+0x1a/0x30 [ 14.210041] [ 14.210156] The buggy address belongs to the object at ffff888101684300 [ 14.210156] which belongs to the cache kmalloc-16 of size 16 [ 14.210668] The buggy address is located 8 bytes inside of [ 14.210668] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.211211] [ 14.211284] The buggy address belongs to the physical page: [ 14.211564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.211993] flags: 0x200000000000000(node=0|zone=2) [ 14.212219] page_type: f5(slab) [ 14.212396] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.212715] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.213059] page dumped because: kasan: bad access detected [ 14.213275] [ 14.213345] Memory state around the buggy address: [ 14.213529] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.213852] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.214161] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.214505] ^ [ 14.214693] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.214943] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.215147] ================================================================== [ 14.083813] ================================================================== [ 14.084406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.085006] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279 [ 14.085642] [ 14.085791] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.085952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.085966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.086059] Call Trace: [ 14.086073] <TASK> [ 14.086087] dump_stack_lvl+0x73/0xb0 [ 14.086118] print_report+0xd1/0x610 [ 14.086140] ? __virt_addr_valid+0x1db/0x2d0 [ 14.086163] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.086188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.086211] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.086238] kasan_report+0x141/0x180 [ 14.086259] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.086291] kasan_check_range+0x10c/0x1c0 [ 14.086314] __kasan_check_write+0x18/0x20 [ 14.086333] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.086359] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.086386] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.086422] ? trace_hardirqs_on+0x37/0xe0 [ 14.086457] ? kasan_bitops_generic+0x92/0x1c0 [ 14.086485] kasan_bitops_generic+0x116/0x1c0 [ 14.086508] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.086533] ? __pfx_read_tsc+0x10/0x10 [ 14.086553] ? ktime_get_ts64+0x86/0x230 [ 14.086578] kunit_try_run_case+0x1a5/0x480 [ 14.086601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.086623] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.086648] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.086671] ? __kthread_parkme+0x82/0x180 [ 14.086690] ? preempt_count_sub+0x50/0x80 [ 14.086713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.086737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.086760] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.086784] kthread+0x337/0x6f0 [ 14.086803] ? trace_preempt_on+0x20/0xc0 [ 14.086824] ? __pfx_kthread+0x10/0x10 [ 14.086844] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.086865] ? calculate_sigpending+0x7b/0xa0 [ 14.086888] ? __pfx_kthread+0x10/0x10 [ 14.086909] ret_from_fork+0x116/0x1d0 [ 14.086927] ? __pfx_kthread+0x10/0x10 [ 14.086946] ret_from_fork_asm+0x1a/0x30 [ 14.086978] </TASK> [ 14.086987] [ 14.100160] Allocated by task 279: [ 14.100516] kasan_save_stack+0x45/0x70 [ 14.101069] kasan_save_track+0x18/0x40 [ 14.101283] kasan_save_alloc_info+0x3b/0x50 [ 14.101505] __kasan_kmalloc+0xb7/0xc0 [ 14.101963] __kmalloc_cache_noprof+0x189/0x420 [ 14.102213] kasan_bitops_generic+0x92/0x1c0 [ 14.102548] kunit_try_run_case+0x1a5/0x480 [ 14.103026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.103375] kthread+0x337/0x6f0 [ 14.103599] ret_from_fork+0x116/0x1d0 [ 14.103781] ret_from_fork_asm+0x1a/0x30 [ 14.104280] [ 14.104365] The buggy address belongs to the object at ffff888101684300 [ 14.104365] which belongs to the cache kmalloc-16 of size 16 [ 14.105247] The buggy address is located 8 bytes inside of [ 14.105247] allocated 9-byte region [ffff888101684300, ffff888101684309) [ 14.106184] [ 14.106265] The buggy address belongs to the physical page: [ 14.106697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684 [ 14.107545] flags: 0x200000000000000(node=0|zone=2) [ 14.108098] page_type: f5(slab) [ 14.108351] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.108895] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.109135] page dumped because: kasan: bad access detected [ 14.109311] [ 14.109381] Memory state around the buggy address: [ 14.110036] ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 14.110777] ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.111391] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.112137] ^ [ 14.112514] ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.113262] ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.113853] ==================================================================
[ 14.602909] ================================================================== [ 14.603979] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.604866] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.605611] [ 14.605842] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.605897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.605910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.605931] Call Trace: [ 14.605950] <TASK> [ 14.605970] dump_stack_lvl+0x73/0xb0 [ 14.606099] print_report+0xd1/0x610 [ 14.606127] ? __virt_addr_valid+0x1db/0x2d0 [ 14.606151] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.606177] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.606199] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.606225] kasan_report+0x141/0x180 [ 14.606247] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.606278] kasan_check_range+0x10c/0x1c0 [ 14.606302] __kasan_check_write+0x18/0x20 [ 14.606320] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.606346] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.606373] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.606399] ? kasan_bitops_generic+0x92/0x1c0 [ 14.606425] kasan_bitops_generic+0x116/0x1c0 [ 14.606449] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.606472] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.606500] kunit_try_run_case+0x1a5/0x480 [ 14.606525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.606547] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.606572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.606595] ? __kthread_parkme+0x82/0x180 [ 14.606615] ? preempt_count_sub+0x50/0x80 [ 14.606639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.606663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.606689] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.606713] kthread+0x337/0x6f0 [ 14.606731] ? trace_preempt_on+0x20/0xc0 [ 14.606754] ? __pfx_kthread+0x10/0x10 [ 14.606773] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.606794] ? calculate_sigpending+0x7b/0xa0 [ 14.606819] ? __pfx_kthread+0x10/0x10 [ 14.606840] ret_from_fork+0x116/0x1d0 [ 14.606860] ? __pfx_kthread+0x10/0x10 [ 14.606882] ret_from_fork_asm+0x1a/0x30 [ 14.606913] </TASK> [ 14.606923] [ 14.615622] Allocated by task 278: [ 14.615810] kasan_save_stack+0x45/0x70 [ 14.616253] kasan_save_track+0x18/0x40 [ 14.616408] kasan_save_alloc_info+0x3b/0x50 [ 14.616639] __kasan_kmalloc+0xb7/0xc0 [ 14.616831] __kmalloc_cache_noprof+0x189/0x420 [ 14.617155] kasan_bitops_generic+0x92/0x1c0 [ 14.617370] kunit_try_run_case+0x1a5/0x480 [ 14.617606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.617823] kthread+0x337/0x6f0 [ 14.617947] ret_from_fork+0x116/0x1d0 [ 14.618248] ret_from_fork_asm+0x1a/0x30 [ 14.618459] [ 14.618585] The buggy address belongs to the object at ffff888102712180 [ 14.618585] which belongs to the cache kmalloc-16 of size 16 [ 14.619209] The buggy address is located 8 bytes inside of [ 14.619209] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.619685] [ 14.619786] The buggy address belongs to the physical page: [ 14.620364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.620737] flags: 0x200000000000000(node=0|zone=2) [ 14.620941] page_type: f5(slab) [ 14.621211] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.621531] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.621835] page dumped because: kasan: bad access detected [ 14.622162] [ 14.622239] Memory state around the buggy address: [ 14.622495] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.622738] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.622957] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.623343] ^ [ 14.623542] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.623865] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.624432] ================================================================== [ 14.472553] ================================================================== [ 14.472881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.473267] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.473898] [ 14.474158] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.474210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.474221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.474244] Call Trace: [ 14.474265] <TASK> [ 14.474285] dump_stack_lvl+0x73/0xb0 [ 14.474318] print_report+0xd1/0x610 [ 14.474342] ? __virt_addr_valid+0x1db/0x2d0 [ 14.474367] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.474392] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.474415] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.474453] kasan_report+0x141/0x180 [ 14.474475] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.474505] kasan_check_range+0x10c/0x1c0 [ 14.474529] __kasan_check_write+0x18/0x20 [ 14.474547] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.474574] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.474602] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.474628] ? kasan_bitops_generic+0x92/0x1c0 [ 14.474655] kasan_bitops_generic+0x116/0x1c0 [ 14.474678] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.474702] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.474730] kunit_try_run_case+0x1a5/0x480 [ 14.474755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.474778] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.474802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.474826] ? __kthread_parkme+0x82/0x180 [ 14.474847] ? preempt_count_sub+0x50/0x80 [ 14.474873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.474897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.474922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.474946] kthread+0x337/0x6f0 [ 14.474964] ? trace_preempt_on+0x20/0xc0 [ 14.474987] ? __pfx_kthread+0x10/0x10 [ 14.475007] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.475103] ? calculate_sigpending+0x7b/0xa0 [ 14.475128] ? __pfx_kthread+0x10/0x10 [ 14.475149] ret_from_fork+0x116/0x1d0 [ 14.475169] ? __pfx_kthread+0x10/0x10 [ 14.475189] ret_from_fork_asm+0x1a/0x30 [ 14.475220] </TASK> [ 14.475230] [ 14.490796] Allocated by task 278: [ 14.490957] kasan_save_stack+0x45/0x70 [ 14.491430] kasan_save_track+0x18/0x40 [ 14.491799] kasan_save_alloc_info+0x3b/0x50 [ 14.492253] __kasan_kmalloc+0xb7/0xc0 [ 14.493104] __kmalloc_cache_noprof+0x189/0x420 [ 14.493572] kasan_bitops_generic+0x92/0x1c0 [ 14.494174] kunit_try_run_case+0x1a5/0x480 [ 14.494654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.494970] kthread+0x337/0x6f0 [ 14.495334] ret_from_fork+0x116/0x1d0 [ 14.495676] ret_from_fork_asm+0x1a/0x30 [ 14.496245] [ 14.496426] The buggy address belongs to the object at ffff888102712180 [ 14.496426] which belongs to the cache kmalloc-16 of size 16 [ 14.497240] The buggy address is located 8 bytes inside of [ 14.497240] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.498563] [ 14.498644] The buggy address belongs to the physical page: [ 14.498843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.499701] flags: 0x200000000000000(node=0|zone=2) [ 14.500684] page_type: f5(slab) [ 14.500823] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.501270] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.501957] page dumped because: kasan: bad access detected [ 14.502741] [ 14.502953] Memory state around the buggy address: [ 14.503545] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.503953] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.504530] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.505247] ^ [ 14.505629] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.506386] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.506979] ================================================================== [ 14.544219] ================================================================== [ 14.545150] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.546152] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.546996] [ 14.547337] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.547391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.547403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.547426] Call Trace: [ 14.547439] <TASK> [ 14.547460] dump_stack_lvl+0x73/0xb0 [ 14.547498] print_report+0xd1/0x610 [ 14.547521] ? __virt_addr_valid+0x1db/0x2d0 [ 14.547545] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.547572] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.547594] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.547620] kasan_report+0x141/0x180 [ 14.547641] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.547671] kasan_check_range+0x10c/0x1c0 [ 14.547694] __kasan_check_write+0x18/0x20 [ 14.547713] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.547739] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.547765] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.547791] ? kasan_bitops_generic+0x92/0x1c0 [ 14.547817] kasan_bitops_generic+0x116/0x1c0 [ 14.547841] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.547864] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.547892] kunit_try_run_case+0x1a5/0x480 [ 14.547917] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.547938] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.547963] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.547986] ? __kthread_parkme+0x82/0x180 [ 14.548007] ? preempt_count_sub+0x50/0x80 [ 14.548047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.548070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.548094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.548119] kthread+0x337/0x6f0 [ 14.548137] ? trace_preempt_on+0x20/0xc0 [ 14.548160] ? __pfx_kthread+0x10/0x10 [ 14.548191] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.548213] ? calculate_sigpending+0x7b/0xa0 [ 14.548238] ? __pfx_kthread+0x10/0x10 [ 14.548258] ret_from_fork+0x116/0x1d0 [ 14.548278] ? __pfx_kthread+0x10/0x10 [ 14.548297] ret_from_fork_asm+0x1a/0x30 [ 14.548328] </TASK> [ 14.548339] [ 14.560989] Allocated by task 278: [ 14.561333] kasan_save_stack+0x45/0x70 [ 14.561555] kasan_save_track+0x18/0x40 [ 14.561816] kasan_save_alloc_info+0x3b/0x50 [ 14.561969] __kasan_kmalloc+0xb7/0xc0 [ 14.562144] __kmalloc_cache_noprof+0x189/0x420 [ 14.562367] kasan_bitops_generic+0x92/0x1c0 [ 14.562583] kunit_try_run_case+0x1a5/0x480 [ 14.562763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.563257] kthread+0x337/0x6f0 [ 14.563400] ret_from_fork+0x116/0x1d0 [ 14.563536] ret_from_fork_asm+0x1a/0x30 [ 14.563754] [ 14.563853] The buggy address belongs to the object at ffff888102712180 [ 14.563853] which belongs to the cache kmalloc-16 of size 16 [ 14.564759] The buggy address is located 8 bytes inside of [ 14.564759] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.565329] [ 14.565409] The buggy address belongs to the physical page: [ 14.565716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.566072] flags: 0x200000000000000(node=0|zone=2) [ 14.566379] page_type: f5(slab) [ 14.566596] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.567002] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.567321] page dumped because: kasan: bad access detected [ 14.567497] [ 14.567566] Memory state around the buggy address: [ 14.567722] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.568401] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.568706] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.569039] ^ [ 14.569177] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.569575] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.569851] ================================================================== [ 14.624977] ================================================================== [ 14.625380] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.625728] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.626044] [ 14.626153] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.626199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.626211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.626233] Call Trace: [ 14.626252] <TASK> [ 14.626271] dump_stack_lvl+0x73/0xb0 [ 14.626300] print_report+0xd1/0x610 [ 14.626322] ? __virt_addr_valid+0x1db/0x2d0 [ 14.626345] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.626372] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.626394] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.626550] kasan_report+0x141/0x180 [ 14.626576] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.626607] kasan_check_range+0x10c/0x1c0 [ 14.626631] __kasan_check_write+0x18/0x20 [ 14.626650] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.626675] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.626703] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.626730] ? kasan_bitops_generic+0x92/0x1c0 [ 14.626758] kasan_bitops_generic+0x116/0x1c0 [ 14.626781] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.626805] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.626833] kunit_try_run_case+0x1a5/0x480 [ 14.626858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.626880] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.626904] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.626927] ? __kthread_parkme+0x82/0x180 [ 14.626948] ? preempt_count_sub+0x50/0x80 [ 14.626972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.627065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.627094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.627119] kthread+0x337/0x6f0 [ 14.627138] ? trace_preempt_on+0x20/0xc0 [ 14.627161] ? __pfx_kthread+0x10/0x10 [ 14.627181] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.627205] ? calculate_sigpending+0x7b/0xa0 [ 14.627229] ? __pfx_kthread+0x10/0x10 [ 14.627250] ret_from_fork+0x116/0x1d0 [ 14.627268] ? __pfx_kthread+0x10/0x10 [ 14.627288] ret_from_fork_asm+0x1a/0x30 [ 14.627318] </TASK> [ 14.627330] [ 14.635825] Allocated by task 278: [ 14.636254] kasan_save_stack+0x45/0x70 [ 14.636460] kasan_save_track+0x18/0x40 [ 14.636692] kasan_save_alloc_info+0x3b/0x50 [ 14.636858] __kasan_kmalloc+0xb7/0xc0 [ 14.636992] __kmalloc_cache_noprof+0x189/0x420 [ 14.637241] kasan_bitops_generic+0x92/0x1c0 [ 14.637390] kunit_try_run_case+0x1a5/0x480 [ 14.637561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.637747] kthread+0x337/0x6f0 [ 14.637914] ret_from_fork+0x116/0x1d0 [ 14.638212] ret_from_fork_asm+0x1a/0x30 [ 14.638418] [ 14.638512] The buggy address belongs to the object at ffff888102712180 [ 14.638512] which belongs to the cache kmalloc-16 of size 16 [ 14.639048] The buggy address is located 8 bytes inside of [ 14.639048] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.639562] [ 14.639657] The buggy address belongs to the physical page: [ 14.639912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.640278] flags: 0x200000000000000(node=0|zone=2) [ 14.640871] page_type: f5(slab) [ 14.641140] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.641515] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.641826] page dumped because: kasan: bad access detected [ 14.642163] [ 14.642259] Memory state around the buggy address: [ 14.642489] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.642800] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.643174] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.643469] ^ [ 14.643641] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.643911] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.644454] ================================================================== [ 14.435314] ================================================================== [ 14.436646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.436946] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.437660] [ 14.437864] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.437915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.437927] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.437951] Call Trace: [ 14.437965] <TASK> [ 14.437984] dump_stack_lvl+0x73/0xb0 [ 14.438092] print_report+0xd1/0x610 [ 14.438119] ? __virt_addr_valid+0x1db/0x2d0 [ 14.438143] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.438170] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.438192] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.438219] kasan_report+0x141/0x180 [ 14.438240] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.438271] kasan_check_range+0x10c/0x1c0 [ 14.438294] __kasan_check_write+0x18/0x20 [ 14.438314] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.438339] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.438367] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.438393] ? kasan_bitops_generic+0x92/0x1c0 [ 14.438419] kasan_bitops_generic+0x116/0x1c0 [ 14.438453] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.438477] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.438504] kunit_try_run_case+0x1a5/0x480 [ 14.438529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.438552] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.438577] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.438601] ? __kthread_parkme+0x82/0x180 [ 14.438621] ? preempt_count_sub+0x50/0x80 [ 14.438646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.438670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.438693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.438717] kthread+0x337/0x6f0 [ 14.438736] ? trace_preempt_on+0x20/0xc0 [ 14.438760] ? __pfx_kthread+0x10/0x10 [ 14.438779] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.438801] ? calculate_sigpending+0x7b/0xa0 [ 14.438825] ? __pfx_kthread+0x10/0x10 [ 14.438846] ret_from_fork+0x116/0x1d0 [ 14.438865] ? __pfx_kthread+0x10/0x10 [ 14.438885] ret_from_fork_asm+0x1a/0x30 [ 14.438916] </TASK> [ 14.438927] [ 14.454888] Allocated by task 278: [ 14.455485] kasan_save_stack+0x45/0x70 [ 14.455880] kasan_save_track+0x18/0x40 [ 14.456492] kasan_save_alloc_info+0x3b/0x50 [ 14.456946] __kasan_kmalloc+0xb7/0xc0 [ 14.457415] __kmalloc_cache_noprof+0x189/0x420 [ 14.457966] kasan_bitops_generic+0x92/0x1c0 [ 14.458402] kunit_try_run_case+0x1a5/0x480 [ 14.458563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.458741] kthread+0x337/0x6f0 [ 14.458863] ret_from_fork+0x116/0x1d0 [ 14.458997] ret_from_fork_asm+0x1a/0x30 [ 14.459958] [ 14.460281] The buggy address belongs to the object at ffff888102712180 [ 14.460281] which belongs to the cache kmalloc-16 of size 16 [ 14.461783] The buggy address is located 8 bytes inside of [ 14.461783] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.463201] [ 14.463570] The buggy address belongs to the physical page: [ 14.463968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.464901] flags: 0x200000000000000(node=0|zone=2) [ 14.465307] page_type: f5(slab) [ 14.465822] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.466258] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.467131] page dumped because: kasan: bad access detected [ 14.467623] [ 14.467700] Memory state around the buggy address: [ 14.467857] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.468084] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.468766] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.469601] ^ [ 14.470047] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.470708] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.471590] ================================================================== [ 14.570548] ================================================================== [ 14.570874] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.571317] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.571702] [ 14.571812] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.571859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.571870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.571892] Call Trace: [ 14.571905] <TASK> [ 14.571924] dump_stack_lvl+0x73/0xb0 [ 14.571955] print_report+0xd1/0x610 [ 14.571978] ? __virt_addr_valid+0x1db/0x2d0 [ 14.572002] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.572040] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.572062] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.572089] kasan_report+0x141/0x180 [ 14.572111] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.572142] kasan_check_range+0x10c/0x1c0 [ 14.572165] __kasan_check_write+0x18/0x20 [ 14.572183] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.572209] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.572236] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.572262] ? kasan_bitops_generic+0x92/0x1c0 [ 14.572625] kasan_bitops_generic+0x116/0x1c0 [ 14.572651] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.572675] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.572703] kunit_try_run_case+0x1a5/0x480 [ 14.572727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.572749] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.572775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.572798] ? __kthread_parkme+0x82/0x180 [ 14.572819] ? preempt_count_sub+0x50/0x80 [ 14.572855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.572879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.572902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.572927] kthread+0x337/0x6f0 [ 14.572945] ? trace_preempt_on+0x20/0xc0 [ 14.572968] ? __pfx_kthread+0x10/0x10 [ 14.572988] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.573022] ? calculate_sigpending+0x7b/0xa0 [ 14.573387] ? __pfx_kthread+0x10/0x10 [ 14.573409] ret_from_fork+0x116/0x1d0 [ 14.573428] ? __pfx_kthread+0x10/0x10 [ 14.573449] ret_from_fork_asm+0x1a/0x30 [ 14.573480] </TASK> [ 14.573491] [ 14.587329] Allocated by task 278: [ 14.587543] kasan_save_stack+0x45/0x70 [ 14.587753] kasan_save_track+0x18/0x40 [ 14.587936] kasan_save_alloc_info+0x3b/0x50 [ 14.588907] __kasan_kmalloc+0xb7/0xc0 [ 14.589255] __kmalloc_cache_noprof+0x189/0x420 [ 14.589752] kasan_bitops_generic+0x92/0x1c0 [ 14.590223] kunit_try_run_case+0x1a5/0x480 [ 14.590540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.590907] kthread+0x337/0x6f0 [ 14.591148] ret_from_fork+0x116/0x1d0 [ 14.591331] ret_from_fork_asm+0x1a/0x30 [ 14.591900] [ 14.591991] The buggy address belongs to the object at ffff888102712180 [ 14.591991] which belongs to the cache kmalloc-16 of size 16 [ 14.592937] The buggy address is located 8 bytes inside of [ 14.592937] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.594271] [ 14.594456] The buggy address belongs to the physical page: [ 14.594947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.596244] flags: 0x200000000000000(node=0|zone=2) [ 14.596660] page_type: f5(slab) [ 14.596998] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.597327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.597937] page dumped because: kasan: bad access detected [ 14.598413] [ 14.598510] Memory state around the buggy address: [ 14.598721] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.599369] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.599914] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.600683] ^ [ 14.600864] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.601453] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.601969] ================================================================== [ 14.507871] ================================================================== [ 14.508621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.509335] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.510176] [ 14.510396] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.510448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.510460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.510481] Call Trace: [ 14.510501] <TASK> [ 14.510520] dump_stack_lvl+0x73/0xb0 [ 14.510559] print_report+0xd1/0x610 [ 14.510583] ? __virt_addr_valid+0x1db/0x2d0 [ 14.510606] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.510632] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.510654] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.510680] kasan_report+0x141/0x180 [ 14.510701] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.510756] kasan_check_range+0x10c/0x1c0 [ 14.510779] __kasan_check_write+0x18/0x20 [ 14.510799] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.510824] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.510851] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.510877] ? kasan_bitops_generic+0x92/0x1c0 [ 14.510904] kasan_bitops_generic+0x116/0x1c0 [ 14.510928] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.510951] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.510980] kunit_try_run_case+0x1a5/0x480 [ 14.511005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.511039] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.511065] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.511090] ? __kthread_parkme+0x82/0x180 [ 14.511111] ? preempt_count_sub+0x50/0x80 [ 14.511136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.511160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.511184] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.511208] kthread+0x337/0x6f0 [ 14.511226] ? trace_preempt_on+0x20/0xc0 [ 14.511250] ? __pfx_kthread+0x10/0x10 [ 14.511270] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.511292] ? calculate_sigpending+0x7b/0xa0 [ 14.511316] ? __pfx_kthread+0x10/0x10 [ 14.511337] ret_from_fork+0x116/0x1d0 [ 14.511356] ? __pfx_kthread+0x10/0x10 [ 14.511376] ret_from_fork_asm+0x1a/0x30 [ 14.511408] </TASK> [ 14.511417] [ 14.527508] Allocated by task 278: [ 14.527871] kasan_save_stack+0x45/0x70 [ 14.528316] kasan_save_track+0x18/0x40 [ 14.528892] kasan_save_alloc_info+0x3b/0x50 [ 14.529415] __kasan_kmalloc+0xb7/0xc0 [ 14.529915] __kmalloc_cache_noprof+0x189/0x420 [ 14.530328] kasan_bitops_generic+0x92/0x1c0 [ 14.530791] kunit_try_run_case+0x1a5/0x480 [ 14.531160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.531744] kthread+0x337/0x6f0 [ 14.531922] ret_from_fork+0x116/0x1d0 [ 14.532392] ret_from_fork_asm+0x1a/0x30 [ 14.532934] [ 14.533145] The buggy address belongs to the object at ffff888102712180 [ 14.533145] which belongs to the cache kmalloc-16 of size 16 [ 14.533938] The buggy address is located 8 bytes inside of [ 14.533938] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.535078] [ 14.535322] The buggy address belongs to the physical page: [ 14.535647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.535896] flags: 0x200000000000000(node=0|zone=2) [ 14.536534] page_type: f5(slab) [ 14.536873] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.537697] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.538424] page dumped because: kasan: bad access detected [ 14.539134] [ 14.539211] Memory state around the buggy address: [ 14.539372] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.539975] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.541046] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.541689] ^ [ 14.542051] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.542653] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.542983] ================================================================== [ 14.644971] ================================================================== [ 14.645410] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.645816] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278 [ 14.646205] [ 14.646324] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.646372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.646384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.646406] Call Trace: [ 14.646425] <TASK> [ 14.646443] dump_stack_lvl+0x73/0xb0 [ 14.646473] print_report+0xd1/0x610 [ 14.646523] ? __virt_addr_valid+0x1db/0x2d0 [ 14.646548] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.646573] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.646595] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.646621] kasan_report+0x141/0x180 [ 14.646643] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.646673] kasan_check_range+0x10c/0x1c0 [ 14.646696] __kasan_check_write+0x18/0x20 [ 14.646715] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.646741] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.646767] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.646792] ? kasan_bitops_generic+0x92/0x1c0 [ 14.646819] kasan_bitops_generic+0x116/0x1c0 [ 14.646843] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.646866] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.646894] kunit_try_run_case+0x1a5/0x480 [ 14.646918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.646940] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.646965] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.646989] ? __kthread_parkme+0x82/0x180 [ 14.647098] ? preempt_count_sub+0x50/0x80 [ 14.647122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.647146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.647170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.647195] kthread+0x337/0x6f0 [ 14.647213] ? trace_preempt_on+0x20/0xc0 [ 14.647236] ? __pfx_kthread+0x10/0x10 [ 14.647256] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.647277] ? calculate_sigpending+0x7b/0xa0 [ 14.647302] ? __pfx_kthread+0x10/0x10 [ 14.647322] ret_from_fork+0x116/0x1d0 [ 14.647341] ? __pfx_kthread+0x10/0x10 [ 14.647361] ret_from_fork_asm+0x1a/0x30 [ 14.647392] </TASK> [ 14.647402] [ 14.655804] Allocated by task 278: [ 14.656282] kasan_save_stack+0x45/0x70 [ 14.656516] kasan_save_track+0x18/0x40 [ 14.656731] kasan_save_alloc_info+0x3b/0x50 [ 14.656949] __kasan_kmalloc+0xb7/0xc0 [ 14.657226] __kmalloc_cache_noprof+0x189/0x420 [ 14.657455] kasan_bitops_generic+0x92/0x1c0 [ 14.657689] kunit_try_run_case+0x1a5/0x480 [ 14.657899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.658094] kthread+0x337/0x6f0 [ 14.658270] ret_from_fork+0x116/0x1d0 [ 14.658455] ret_from_fork_asm+0x1a/0x30 [ 14.658632] [ 14.658726] The buggy address belongs to the object at ffff888102712180 [ 14.658726] which belongs to the cache kmalloc-16 of size 16 [ 14.659224] The buggy address is located 8 bytes inside of [ 14.659224] allocated 9-byte region [ffff888102712180, ffff888102712189) [ 14.659687] [ 14.659781] The buggy address belongs to the physical page: [ 14.660302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712 [ 14.660678] flags: 0x200000000000000(node=0|zone=2) [ 14.660902] page_type: f5(slab) [ 14.661160] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.661507] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.661801] page dumped because: kasan: bad access detected [ 14.662137] [ 14.662213] Memory state around the buggy address: [ 14.662439] ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.662746] ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.663107] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.663372] ^ [ 14.663578] ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.663862] ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.664446] ==================================================================
[ 14.256956] ================================================================== [ 14.257751] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.258143] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.259802] [ 14.259952] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.259998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.260009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.260031] Call Trace: [ 14.260043] <TASK> [ 14.260058] dump_stack_lvl+0x73/0xb0 [ 14.260089] print_report+0xd1/0x610 [ 14.260112] ? __virt_addr_valid+0x1db/0x2d0 [ 14.260136] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.260161] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.260184] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.260211] kasan_report+0x141/0x180 [ 14.260232] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.260265] kasan_check_range+0x10c/0x1c0 [ 14.260288] __kasan_check_write+0x18/0x20 [ 14.260308] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.260335] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.260362] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.260386] ? trace_hardirqs_on+0x37/0xe0 [ 14.260409] ? kasan_bitops_generic+0x92/0x1c0 [ 14.260438] kasan_bitops_generic+0x116/0x1c0 [ 14.260461] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.260487] ? __pfx_read_tsc+0x10/0x10 [ 14.260508] ? ktime_get_ts64+0x86/0x230 [ 14.260624] kunit_try_run_case+0x1a5/0x480 [ 14.260651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.260673] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.260698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.260722] ? __kthread_parkme+0x82/0x180 [ 14.260744] ? preempt_count_sub+0x50/0x80 [ 14.260769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.260793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.260817] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.260841] kthread+0x337/0x6f0 [ 14.260861] ? trace_preempt_on+0x20/0xc0 [ 14.260883] ? __pfx_kthread+0x10/0x10 [ 14.260916] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.260937] ? calculate_sigpending+0x7b/0xa0 [ 14.260962] ? __pfx_kthread+0x10/0x10 [ 14.260983] ret_from_fork+0x116/0x1d0 [ 14.261002] ? __pfx_kthread+0x10/0x10 [ 14.261023] ret_from_fork_asm+0x1a/0x30 [ 14.261055] </TASK> [ 14.261067] [ 14.270106] Allocated by task 278: [ 14.270281] kasan_save_stack+0x45/0x70 [ 14.270466] kasan_save_track+0x18/0x40 [ 14.270625] kasan_save_alloc_info+0x3b/0x50 [ 14.270780] __kasan_kmalloc+0xb7/0xc0 [ 14.270983] __kmalloc_cache_noprof+0x189/0x420 [ 14.271224] kasan_bitops_generic+0x92/0x1c0 [ 14.271421] kunit_try_run_case+0x1a5/0x480 [ 14.271568] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.271743] kthread+0x337/0x6f0 [ 14.271864] ret_from_fork+0x116/0x1d0 [ 14.272006] ret_from_fork_asm+0x1a/0x30 [ 14.272149] [ 14.272219] The buggy address belongs to the object at ffff888102837220 [ 14.272219] which belongs to the cache kmalloc-16 of size 16 [ 14.272574] The buggy address is located 8 bytes inside of [ 14.272574] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.273311] [ 14.273415] The buggy address belongs to the physical page: [ 14.273924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.274684] flags: 0x200000000000000(node=0|zone=2) [ 14.274941] page_type: f5(slab) [ 14.275109] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.275646] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.276030] page dumped because: kasan: bad access detected [ 14.276284] [ 14.276376] Memory state around the buggy address: [ 14.276570] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.276844] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.277418] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.277856] ^ [ 14.278110] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.278406] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.278789] ================================================================== [ 14.235997] ================================================================== [ 14.236290] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.236548] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.236772] [ 14.236859] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.236915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.236927] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.236949] Call Trace: [ 14.236965] <TASK> [ 14.236981] dump_stack_lvl+0x73/0xb0 [ 14.237008] print_report+0xd1/0x610 [ 14.237030] ? __virt_addr_valid+0x1db/0x2d0 [ 14.237053] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.237077] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.237099] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.237125] kasan_report+0x141/0x180 [ 14.237146] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.237177] kasan_check_range+0x10c/0x1c0 [ 14.237200] __kasan_check_write+0x18/0x20 [ 14.237218] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.237243] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.237270] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.237293] ? trace_hardirqs_on+0x37/0xe0 [ 14.237315] ? kasan_bitops_generic+0x92/0x1c0 [ 14.237343] kasan_bitops_generic+0x116/0x1c0 [ 14.237365] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.237390] ? __pfx_read_tsc+0x10/0x10 [ 14.237411] ? ktime_get_ts64+0x86/0x230 [ 14.237449] kunit_try_run_case+0x1a5/0x480 [ 14.237474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.237497] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.237522] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.237547] ? __kthread_parkme+0x82/0x180 [ 14.237567] ? preempt_count_sub+0x50/0x80 [ 14.237593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.237617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.237640] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.237665] kthread+0x337/0x6f0 [ 14.237684] ? trace_preempt_on+0x20/0xc0 [ 14.237706] ? __pfx_kthread+0x10/0x10 [ 14.237726] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.237747] ? calculate_sigpending+0x7b/0xa0 [ 14.237771] ? __pfx_kthread+0x10/0x10 [ 14.237792] ret_from_fork+0x116/0x1d0 [ 14.237811] ? __pfx_kthread+0x10/0x10 [ 14.237831] ret_from_fork_asm+0x1a/0x30 [ 14.237863] </TASK> [ 14.237873] [ 14.248167] Allocated by task 278: [ 14.248342] kasan_save_stack+0x45/0x70 [ 14.248507] kasan_save_track+0x18/0x40 [ 14.248706] kasan_save_alloc_info+0x3b/0x50 [ 14.248990] __kasan_kmalloc+0xb7/0xc0 [ 14.249146] __kmalloc_cache_noprof+0x189/0x420 [ 14.249361] kasan_bitops_generic+0x92/0x1c0 [ 14.249618] kunit_try_run_case+0x1a5/0x480 [ 14.249801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.250097] kthread+0x337/0x6f0 [ 14.250235] ret_from_fork+0x116/0x1d0 [ 14.250406] ret_from_fork_asm+0x1a/0x30 [ 14.250737] [ 14.250818] The buggy address belongs to the object at ffff888102837220 [ 14.250818] which belongs to the cache kmalloc-16 of size 16 [ 14.251691] The buggy address is located 8 bytes inside of [ 14.251691] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.252316] [ 14.252408] The buggy address belongs to the physical page: [ 14.252705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.253066] flags: 0x200000000000000(node=0|zone=2) [ 14.253268] page_type: f5(slab) [ 14.253429] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.253807] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.254161] page dumped because: kasan: bad access detected [ 14.254343] [ 14.254435] Memory state around the buggy address: [ 14.254932] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.255223] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.255443] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.255656] ^ [ 14.255805] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.256035] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.256257] ================================================================== [ 14.342049] ================================================================== [ 14.342353] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.342971] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.343253] [ 14.343343] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.343387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.343398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.343422] Call Trace: [ 14.343439] <TASK> [ 14.343458] dump_stack_lvl+0x73/0xb0 [ 14.343488] print_report+0xd1/0x610 [ 14.343510] ? __virt_addr_valid+0x1db/0x2d0 [ 14.343534] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.343560] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.343584] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.343611] kasan_report+0x141/0x180 [ 14.343632] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.343664] kasan_check_range+0x10c/0x1c0 [ 14.343688] __kasan_check_write+0x18/0x20 [ 14.343708] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.343735] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.343762] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.343786] ? trace_hardirqs_on+0x37/0xe0 [ 14.343808] ? kasan_bitops_generic+0x92/0x1c0 [ 14.343836] kasan_bitops_generic+0x116/0x1c0 [ 14.343860] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.343885] ? __pfx_read_tsc+0x10/0x10 [ 14.343917] ? ktime_get_ts64+0x86/0x230 [ 14.343942] kunit_try_run_case+0x1a5/0x480 [ 14.343967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.343990] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.344015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.344039] ? __kthread_parkme+0x82/0x180 [ 14.344060] ? preempt_count_sub+0x50/0x80 [ 14.344085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.344109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.344133] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.344156] kthread+0x337/0x6f0 [ 14.344176] ? trace_preempt_on+0x20/0xc0 [ 14.344198] ? __pfx_kthread+0x10/0x10 [ 14.344218] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.344240] ? calculate_sigpending+0x7b/0xa0 [ 14.344263] ? __pfx_kthread+0x10/0x10 [ 14.344285] ret_from_fork+0x116/0x1d0 [ 14.344303] ? __pfx_kthread+0x10/0x10 [ 14.344324] ret_from_fork_asm+0x1a/0x30 [ 14.344356] </TASK> [ 14.344367] [ 14.353821] Allocated by task 278: [ 14.354057] kasan_save_stack+0x45/0x70 [ 14.354259] kasan_save_track+0x18/0x40 [ 14.354429] kasan_save_alloc_info+0x3b/0x50 [ 14.354872] __kasan_kmalloc+0xb7/0xc0 [ 14.355129] __kmalloc_cache_noprof+0x189/0x420 [ 14.355329] kasan_bitops_generic+0x92/0x1c0 [ 14.355507] kunit_try_run_case+0x1a5/0x480 [ 14.355655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.356046] kthread+0x337/0x6f0 [ 14.356227] ret_from_fork+0x116/0x1d0 [ 14.356420] ret_from_fork_asm+0x1a/0x30 [ 14.356744] [ 14.356817] The buggy address belongs to the object at ffff888102837220 [ 14.356817] which belongs to the cache kmalloc-16 of size 16 [ 14.357392] The buggy address is located 8 bytes inside of [ 14.357392] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.357937] [ 14.358045] The buggy address belongs to the physical page: [ 14.358260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.358792] flags: 0x200000000000000(node=0|zone=2) [ 14.358979] page_type: f5(slab) [ 14.359214] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.359628] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.359911] page dumped because: kasan: bad access detected [ 14.360086] [ 14.360155] Memory state around the buggy address: [ 14.360310] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.360527] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.360744] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.361074] ^ [ 14.361286] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.361598] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.361995] ================================================================== [ 14.322093] ================================================================== [ 14.322372] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.322773] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.323071] [ 14.323197] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.323240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.323252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.323273] Call Trace: [ 14.323287] <TASK> [ 14.323301] dump_stack_lvl+0x73/0xb0 [ 14.323329] print_report+0xd1/0x610 [ 14.323351] ? __virt_addr_valid+0x1db/0x2d0 [ 14.323376] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.323402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.323425] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.323451] kasan_report+0x141/0x180 [ 14.323473] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.323505] kasan_check_range+0x10c/0x1c0 [ 14.323529] __kasan_check_write+0x18/0x20 [ 14.323548] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.323575] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.323602] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.323626] ? trace_hardirqs_on+0x37/0xe0 [ 14.323649] ? kasan_bitops_generic+0x92/0x1c0 [ 14.323677] kasan_bitops_generic+0x116/0x1c0 [ 14.323700] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.323725] ? __pfx_read_tsc+0x10/0x10 [ 14.323746] ? ktime_get_ts64+0x86/0x230 [ 14.323770] kunit_try_run_case+0x1a5/0x480 [ 14.323794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.323816] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.323840] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.323863] ? __kthread_parkme+0x82/0x180 [ 14.323884] ? preempt_count_sub+0x50/0x80 [ 14.323919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.323943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.323967] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.324184] kthread+0x337/0x6f0 [ 14.324208] ? trace_preempt_on+0x20/0xc0 [ 14.324231] ? __pfx_kthread+0x10/0x10 [ 14.324252] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.324274] ? calculate_sigpending+0x7b/0xa0 [ 14.324298] ? __pfx_kthread+0x10/0x10 [ 14.324320] ret_from_fork+0x116/0x1d0 [ 14.324339] ? __pfx_kthread+0x10/0x10 [ 14.324359] ret_from_fork_asm+0x1a/0x30 [ 14.324391] </TASK> [ 14.324402] [ 14.333233] Allocated by task 278: [ 14.333437] kasan_save_stack+0x45/0x70 [ 14.333646] kasan_save_track+0x18/0x40 [ 14.333833] kasan_save_alloc_info+0x3b/0x50 [ 14.334092] __kasan_kmalloc+0xb7/0xc0 [ 14.334254] __kmalloc_cache_noprof+0x189/0x420 [ 14.334446] kasan_bitops_generic+0x92/0x1c0 [ 14.334643] kunit_try_run_case+0x1a5/0x480 [ 14.334823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.335097] kthread+0x337/0x6f0 [ 14.335252] ret_from_fork+0x116/0x1d0 [ 14.335437] ret_from_fork_asm+0x1a/0x30 [ 14.335605] [ 14.335698] The buggy address belongs to the object at ffff888102837220 [ 14.335698] which belongs to the cache kmalloc-16 of size 16 [ 14.336210] The buggy address is located 8 bytes inside of [ 14.336210] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.336642] [ 14.336715] The buggy address belongs to the physical page: [ 14.336890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.337144] flags: 0x200000000000000(node=0|zone=2) [ 14.337310] page_type: f5(slab) [ 14.337435] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.337785] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.338552] page dumped because: kasan: bad access detected [ 14.338816] [ 14.338923] Memory state around the buggy address: [ 14.339147] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.339705] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.339933] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.340146] ^ [ 14.340293] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.341099] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.341428] ================================================================== [ 14.212718] ================================================================== [ 14.213787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.214330] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.214728] [ 14.214840] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.214886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.214909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.214933] Call Trace: [ 14.214944] <TASK> [ 14.214960] dump_stack_lvl+0x73/0xb0 [ 14.214999] print_report+0xd1/0x610 [ 14.215023] ? __virt_addr_valid+0x1db/0x2d0 [ 14.215046] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.215073] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.215096] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.215123] kasan_report+0x141/0x180 [ 14.215145] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.215177] kasan_check_range+0x10c/0x1c0 [ 14.215201] __kasan_check_write+0x18/0x20 [ 14.215221] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.215248] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.215276] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.215300] ? trace_hardirqs_on+0x37/0xe0 [ 14.215323] ? kasan_bitops_generic+0x92/0x1c0 [ 14.215352] kasan_bitops_generic+0x116/0x1c0 [ 14.215376] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.215402] ? __pfx_read_tsc+0x10/0x10 [ 14.215423] ? ktime_get_ts64+0x86/0x230 [ 14.215448] kunit_try_run_case+0x1a5/0x480 [ 14.215473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.215497] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.215525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.215605] ? __kthread_parkme+0x82/0x180 [ 14.215626] ? preempt_count_sub+0x50/0x80 [ 14.215651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.215675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.215700] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.215727] kthread+0x337/0x6f0 [ 14.215745] ? trace_preempt_on+0x20/0xc0 [ 14.215766] ? __pfx_kthread+0x10/0x10 [ 14.215787] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.215808] ? calculate_sigpending+0x7b/0xa0 [ 14.215834] ? __pfx_kthread+0x10/0x10 [ 14.215857] ret_from_fork+0x116/0x1d0 [ 14.215877] ? __pfx_kthread+0x10/0x10 [ 14.215908] ret_from_fork_asm+0x1a/0x30 [ 14.215941] </TASK> [ 14.215952] [ 14.224703] Allocated by task 278: [ 14.224861] kasan_save_stack+0x45/0x70 [ 14.225081] kasan_save_track+0x18/0x40 [ 14.225219] kasan_save_alloc_info+0x3b/0x50 [ 14.225417] __kasan_kmalloc+0xb7/0xc0 [ 14.225604] __kmalloc_cache_noprof+0x189/0x420 [ 14.225825] kasan_bitops_generic+0x92/0x1c0 [ 14.226106] kunit_try_run_case+0x1a5/0x480 [ 14.226309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.226608] kthread+0x337/0x6f0 [ 14.226776] ret_from_fork+0x116/0x1d0 [ 14.226957] ret_from_fork_asm+0x1a/0x30 [ 14.227193] [ 14.227276] The buggy address belongs to the object at ffff888102837220 [ 14.227276] which belongs to the cache kmalloc-16 of size 16 [ 14.227801] The buggy address is located 8 bytes inside of [ 14.227801] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.228171] [ 14.228246] The buggy address belongs to the physical page: [ 14.228421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.228666] flags: 0x200000000000000(node=0|zone=2) [ 14.228833] page_type: f5(slab) [ 14.228991] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.229770] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.230325] page dumped because: kasan: bad access detected [ 14.230522] [ 14.230591] Memory state around the buggy address: [ 14.230748] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.230979] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.231197] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.231468] ^ [ 14.231919] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.232601] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.232948] ================================================================== [ 14.362459] ================================================================== [ 14.363150] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.363413] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.363963] [ 14.364202] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.364247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.364258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.364279] Call Trace: [ 14.364293] <TASK> [ 14.364309] dump_stack_lvl+0x73/0xb0 [ 14.364338] print_report+0xd1/0x610 [ 14.364359] ? __virt_addr_valid+0x1db/0x2d0 [ 14.364382] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.364408] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.364431] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.364458] kasan_report+0x141/0x180 [ 14.364480] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.364511] kasan_check_range+0x10c/0x1c0 [ 14.364584] __kasan_check_write+0x18/0x20 [ 14.364604] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.364631] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.364659] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.364682] ? trace_hardirqs_on+0x37/0xe0 [ 14.364705] ? kasan_bitops_generic+0x92/0x1c0 [ 14.364733] kasan_bitops_generic+0x116/0x1c0 [ 14.364757] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.364782] ? __pfx_read_tsc+0x10/0x10 [ 14.364803] ? ktime_get_ts64+0x86/0x230 [ 14.364827] kunit_try_run_case+0x1a5/0x480 [ 14.364853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.364875] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.364915] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.364939] ? __kthread_parkme+0x82/0x180 [ 14.364959] ? preempt_count_sub+0x50/0x80 [ 14.364984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.365009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.365032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.365057] kthread+0x337/0x6f0 [ 14.365076] ? trace_preempt_on+0x20/0xc0 [ 14.365098] ? __pfx_kthread+0x10/0x10 [ 14.365118] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.365139] ? calculate_sigpending+0x7b/0xa0 [ 14.365164] ? __pfx_kthread+0x10/0x10 [ 14.365185] ret_from_fork+0x116/0x1d0 [ 14.365203] ? __pfx_kthread+0x10/0x10 [ 14.365224] ret_from_fork_asm+0x1a/0x30 [ 14.365256] </TASK> [ 14.365267] [ 14.374150] Allocated by task 278: [ 14.374296] kasan_save_stack+0x45/0x70 [ 14.374446] kasan_save_track+0x18/0x40 [ 14.374933] kasan_save_alloc_info+0x3b/0x50 [ 14.375300] __kasan_kmalloc+0xb7/0xc0 [ 14.375509] __kmalloc_cache_noprof+0x189/0x420 [ 14.375803] kasan_bitops_generic+0x92/0x1c0 [ 14.376044] kunit_try_run_case+0x1a5/0x480 [ 14.376241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.376417] kthread+0x337/0x6f0 [ 14.376539] ret_from_fork+0x116/0x1d0 [ 14.376672] ret_from_fork_asm+0x1a/0x30 [ 14.376812] [ 14.376882] The buggy address belongs to the object at ffff888102837220 [ 14.376882] which belongs to the cache kmalloc-16 of size 16 [ 14.377453] The buggy address is located 8 bytes inside of [ 14.377453] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.378428] [ 14.378700] The buggy address belongs to the physical page: [ 14.379193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.379698] flags: 0x200000000000000(node=0|zone=2) [ 14.379867] page_type: f5(slab) [ 14.380008] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.380742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.381064] page dumped because: kasan: bad access detected [ 14.381316] [ 14.381409] Memory state around the buggy address: [ 14.381710] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.382047] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.382281] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.382496] ^ [ 14.382701] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.383034] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.383399] ================================================================== [ 14.279275] ================================================================== [ 14.279509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.280000] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.280342] [ 14.280461] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.280504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.280515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.280536] Call Trace: [ 14.280553] <TASK> [ 14.280569] dump_stack_lvl+0x73/0xb0 [ 14.280598] print_report+0xd1/0x610 [ 14.280621] ? __virt_addr_valid+0x1db/0x2d0 [ 14.280644] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.280669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.280693] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.280719] kasan_report+0x141/0x180 [ 14.280742] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.280774] kasan_check_range+0x10c/0x1c0 [ 14.280798] __kasan_check_write+0x18/0x20 [ 14.280817] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.280844] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.280871] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.280914] ? trace_hardirqs_on+0x37/0xe0 [ 14.280936] ? kasan_bitops_generic+0x92/0x1c0 [ 14.280965] kasan_bitops_generic+0x116/0x1c0 [ 14.282259] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.282298] ? __pfx_read_tsc+0x10/0x10 [ 14.282321] ? ktime_get_ts64+0x86/0x230 [ 14.282347] kunit_try_run_case+0x1a5/0x480 [ 14.282380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.282404] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.282429] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.282453] ? __kthread_parkme+0x82/0x180 [ 14.282473] ? preempt_count_sub+0x50/0x80 [ 14.282498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.282522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.282640] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.282666] kthread+0x337/0x6f0 [ 14.282686] ? trace_preempt_on+0x20/0xc0 [ 14.282708] ? __pfx_kthread+0x10/0x10 [ 14.282729] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.282751] ? calculate_sigpending+0x7b/0xa0 [ 14.282783] ? __pfx_kthread+0x10/0x10 [ 14.282805] ret_from_fork+0x116/0x1d0 [ 14.282823] ? __pfx_kthread+0x10/0x10 [ 14.282843] ret_from_fork_asm+0x1a/0x30 [ 14.282876] </TASK> [ 14.282886] [ 14.292499] Allocated by task 278: [ 14.292687] kasan_save_stack+0x45/0x70 [ 14.292911] kasan_save_track+0x18/0x40 [ 14.293280] kasan_save_alloc_info+0x3b/0x50 [ 14.293461] __kasan_kmalloc+0xb7/0xc0 [ 14.293839] __kmalloc_cache_noprof+0x189/0x420 [ 14.294101] kasan_bitops_generic+0x92/0x1c0 [ 14.294306] kunit_try_run_case+0x1a5/0x480 [ 14.294473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.294884] kthread+0x337/0x6f0 [ 14.295083] ret_from_fork+0x116/0x1d0 [ 14.295250] ret_from_fork_asm+0x1a/0x30 [ 14.295449] [ 14.295533] The buggy address belongs to the object at ffff888102837220 [ 14.295533] which belongs to the cache kmalloc-16 of size 16 [ 14.295928] The buggy address is located 8 bytes inside of [ 14.295928] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.296282] [ 14.296353] The buggy address belongs to the physical page: [ 14.296589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.297269] flags: 0x200000000000000(node=0|zone=2) [ 14.297513] page_type: f5(slab) [ 14.297750] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.298132] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.298368] page dumped because: kasan: bad access detected [ 14.298669] [ 14.298773] Memory state around the buggy address: [ 14.299105] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.299436] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.299956] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.300245] ^ [ 14.300444] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.300922] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.301234] ================================================================== [ 14.301739] ================================================================== [ 14.302141] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.302409] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278 [ 14.303027] [ 14.303159] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.303205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.303217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.303239] Call Trace: [ 14.303256] <TASK> [ 14.303274] dump_stack_lvl+0x73/0xb0 [ 14.303303] print_report+0xd1/0x610 [ 14.303325] ? __virt_addr_valid+0x1db/0x2d0 [ 14.303349] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.303375] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.303399] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.303425] kasan_report+0x141/0x180 [ 14.303448] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.303481] kasan_check_range+0x10c/0x1c0 [ 14.303505] __kasan_check_write+0x18/0x20 [ 14.303525] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.303597] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.303625] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.303649] ? trace_hardirqs_on+0x37/0xe0 [ 14.303672] ? kasan_bitops_generic+0x92/0x1c0 [ 14.303701] kasan_bitops_generic+0x116/0x1c0 [ 14.303724] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.303750] ? __pfx_read_tsc+0x10/0x10 [ 14.303772] ? ktime_get_ts64+0x86/0x230 [ 14.303798] kunit_try_run_case+0x1a5/0x480 [ 14.303823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.303845] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.303870] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.303906] ? __kthread_parkme+0x82/0x180 [ 14.303927] ? preempt_count_sub+0x50/0x80 [ 14.303952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.303976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.304008] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.304032] kthread+0x337/0x6f0 [ 14.304051] ? trace_preempt_on+0x20/0xc0 [ 14.304073] ? __pfx_kthread+0x10/0x10 [ 14.304094] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.304115] ? calculate_sigpending+0x7b/0xa0 [ 14.304141] ? __pfx_kthread+0x10/0x10 [ 14.304162] ret_from_fork+0x116/0x1d0 [ 14.304180] ? __pfx_kthread+0x10/0x10 [ 14.304200] ret_from_fork_asm+0x1a/0x30 [ 14.304232] </TASK> [ 14.304245] [ 14.313093] Allocated by task 278: [ 14.313271] kasan_save_stack+0x45/0x70 [ 14.313420] kasan_save_track+0x18/0x40 [ 14.313620] kasan_save_alloc_info+0x3b/0x50 [ 14.313829] __kasan_kmalloc+0xb7/0xc0 [ 14.314037] __kmalloc_cache_noprof+0x189/0x420 [ 14.314242] kasan_bitops_generic+0x92/0x1c0 [ 14.314416] kunit_try_run_case+0x1a5/0x480 [ 14.314614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.314822] kthread+0x337/0x6f0 [ 14.314955] ret_from_fork+0x116/0x1d0 [ 14.315089] ret_from_fork_asm+0x1a/0x30 [ 14.315228] [ 14.315298] The buggy address belongs to the object at ffff888102837220 [ 14.315298] which belongs to the cache kmalloc-16 of size 16 [ 14.315651] The buggy address is located 8 bytes inside of [ 14.315651] allocated 9-byte region [ffff888102837220, ffff888102837229) [ 14.316260] [ 14.316361] The buggy address belongs to the physical page: [ 14.316764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837 [ 14.317327] flags: 0x200000000000000(node=0|zone=2) [ 14.317662] page_type: f5(slab) [ 14.317837] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.318250] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.318482] page dumped because: kasan: bad access detected [ 14.319063] [ 14.319246] Memory state around the buggy address: [ 14.319431] ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc [ 14.319925] ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.320148] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.320422] ^ [ 14.320751] ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.321196] ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.321600] ==================================================================