Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 13.556537] ================================================================== [ 13.557001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.557823] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.558491] [ 13.558734] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.558916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.558932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.558952] Call Trace: [ 13.558966] <TASK> [ 13.558983] dump_stack_lvl+0x73/0xb0 [ 13.559010] print_report+0xd1/0x650 [ 13.559032] ? __virt_addr_valid+0x1db/0x2d0 [ 13.559053] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.559078] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.559100] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.559138] kasan_report+0x141/0x180 [ 13.559160] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.559191] kasan_check_range+0x10c/0x1c0 [ 13.559214] __kasan_check_write+0x18/0x20 [ 13.559234] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.559260] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.559286] ? kasan_save_alloc_info+0x3b/0x50 [ 13.559306] ? kasan_save_stack+0x45/0x70 [ 13.559341] kasan_bitops_generic+0x116/0x1c0 [ 13.559363] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.559384] ? __pfx_read_tsc+0x10/0x10 [ 13.559404] ? ktime_get_ts64+0x86/0x230 [ 13.559428] kunit_try_run_case+0x1a5/0x480 [ 13.559453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.559475] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.559499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.559523] ? __kthread_parkme+0x82/0x180 [ 13.559546] ? preempt_count_sub+0x50/0x80 [ 13.559570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.559594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.559615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.559638] kthread+0x337/0x6f0 [ 13.559658] ? trace_preempt_on+0x20/0xc0 [ 13.559679] ? __pfx_kthread+0x10/0x10 [ 13.559701] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.559723] ? calculate_sigpending+0x7b/0xa0 [ 13.559744] ? __pfx_kthread+0x10/0x10 [ 13.559765] ret_from_fork+0x41/0x80 [ 13.559785] ? __pfx_kthread+0x10/0x10 [ 13.559806] ret_from_fork_asm+0x1a/0x30 [ 13.559837] </TASK> [ 13.559847] [ 13.571337] Allocated by task 281: [ 13.571644] kasan_save_stack+0x45/0x70 [ 13.571836] kasan_save_track+0x18/0x40 [ 13.572007] kasan_save_alloc_info+0x3b/0x50 [ 13.572539] __kasan_kmalloc+0xb7/0xc0 [ 13.572802] __kmalloc_cache_noprof+0x189/0x420 [ 13.573241] kasan_bitops_generic+0x92/0x1c0 [ 13.573469] kunit_try_run_case+0x1a5/0x480 [ 13.573652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.573875] kthread+0x337/0x6f0 [ 13.574025] ret_from_fork+0x41/0x80 [ 13.574541] ret_from_fork_asm+0x1a/0x30 [ 13.574787] [ 13.575015] The buggy address belongs to the object at ffff8881023f8300 [ 13.575015] which belongs to the cache kmalloc-16 of size 16 [ 13.575792] The buggy address is located 8 bytes inside of [ 13.575792] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.576562] [ 13.576675] The buggy address belongs to the physical page: [ 13.577059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.577517] flags: 0x200000000000000(node=0|zone=2) [ 13.577738] page_type: f5(slab) [ 13.577896] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.578438] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.579011] page dumped because: kasan: bad access detected [ 13.579424] [ 13.579521] Memory state around the buggy address: [ 13.579728] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.580021] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.580665] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.580985] ^ [ 13.581356] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.581791] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.582305] ================================================================== [ 13.511658] ================================================================== [ 13.512251] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.512699] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.513291] [ 13.513401] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.513560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.513575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.513603] Call Trace: [ 13.513616] <TASK> [ 13.513630] dump_stack_lvl+0x73/0xb0 [ 13.513657] print_report+0xd1/0x650 [ 13.513680] ? __virt_addr_valid+0x1db/0x2d0 [ 13.513702] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.513727] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.513749] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.513779] kasan_report+0x141/0x180 [ 13.513802] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.513833] kasan_check_range+0x10c/0x1c0 [ 13.513856] __kasan_check_write+0x18/0x20 [ 13.513875] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.513900] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.513926] ? kasan_save_alloc_info+0x3b/0x50 [ 13.513946] ? kasan_save_stack+0x45/0x70 [ 13.513971] kasan_bitops_generic+0x116/0x1c0 [ 13.513991] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.514011] ? __pfx_read_tsc+0x10/0x10 [ 13.514031] ? ktime_get_ts64+0x86/0x230 [ 13.514055] kunit_try_run_case+0x1a5/0x480 [ 13.514079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.514100] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.514146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.514170] ? __kthread_parkme+0x82/0x180 [ 13.514191] ? preempt_count_sub+0x50/0x80 [ 13.514228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.514250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.514273] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.514305] kthread+0x337/0x6f0 [ 13.514333] ? trace_preempt_on+0x20/0xc0 [ 13.514356] ? __pfx_kthread+0x10/0x10 [ 13.514377] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.514398] ? calculate_sigpending+0x7b/0xa0 [ 13.514421] ? __pfx_kthread+0x10/0x10 [ 13.514442] ret_from_fork+0x41/0x80 [ 13.514463] ? __pfx_kthread+0x10/0x10 [ 13.514484] ret_from_fork_asm+0x1a/0x30 [ 13.514515] </TASK> [ 13.514525] [ 13.522634] Allocated by task 281: [ 13.522807] kasan_save_stack+0x45/0x70 [ 13.523002] kasan_save_track+0x18/0x40 [ 13.524157] kasan_save_alloc_info+0x3b/0x50 [ 13.524377] __kasan_kmalloc+0xb7/0xc0 [ 13.524593] __kmalloc_cache_noprof+0x189/0x420 [ 13.524795] kasan_bitops_generic+0x92/0x1c0 [ 13.525002] kunit_try_run_case+0x1a5/0x480 [ 13.525215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.525487] kthread+0x337/0x6f0 [ 13.525682] ret_from_fork+0x41/0x80 [ 13.525871] ret_from_fork_asm+0x1a/0x30 [ 13.526087] [ 13.526187] The buggy address belongs to the object at ffff8881023f8300 [ 13.526187] which belongs to the cache kmalloc-16 of size 16 [ 13.526739] The buggy address is located 8 bytes inside of [ 13.526739] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.527285] [ 13.527435] The buggy address belongs to the physical page: [ 13.527648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.528021] flags: 0x200000000000000(node=0|zone=2) [ 13.528288] page_type: f5(slab) [ 13.528510] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.528921] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.529267] page dumped because: kasan: bad access detected [ 13.529591] [ 13.529662] Memory state around the buggy address: [ 13.529892] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.530193] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.530669] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.530957] ^ [ 13.531095] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.531530] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.531806] ================================================================== [ 13.630679] ================================================================== [ 13.630992] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.631511] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.631836] [ 13.631952] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.631995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.632007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.632026] Call Trace: [ 13.632037] <TASK> [ 13.632050] dump_stack_lvl+0x73/0xb0 [ 13.632073] print_report+0xd1/0x650 [ 13.632095] ? __virt_addr_valid+0x1db/0x2d0 [ 13.632116] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.632151] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.632174] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.632200] kasan_report+0x141/0x180 [ 13.632223] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.632265] kasan_check_range+0x10c/0x1c0 [ 13.632289] __kasan_check_write+0x18/0x20 [ 13.632308] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.632355] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.632381] ? kasan_save_alloc_info+0x3b/0x50 [ 13.632401] ? kasan_save_stack+0x45/0x70 [ 13.632434] kasan_bitops_generic+0x116/0x1c0 [ 13.632455] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.632475] ? __pfx_read_tsc+0x10/0x10 [ 13.632495] ? ktime_get_ts64+0x86/0x230 [ 13.632528] kunit_try_run_case+0x1a5/0x480 [ 13.632551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.632572] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.632595] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.632618] ? __kthread_parkme+0x82/0x180 [ 13.632638] ? preempt_count_sub+0x50/0x80 [ 13.632662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.632685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.632716] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.632738] kthread+0x337/0x6f0 [ 13.632759] ? trace_preempt_on+0x20/0xc0 [ 13.632791] ? __pfx_kthread+0x10/0x10 [ 13.632813] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.632834] ? calculate_sigpending+0x7b/0xa0 [ 13.632863] ? __pfx_kthread+0x10/0x10 [ 13.632884] ret_from_fork+0x41/0x80 [ 13.632904] ? __pfx_kthread+0x10/0x10 [ 13.632936] ret_from_fork_asm+0x1a/0x30 [ 13.632966] </TASK> [ 13.632976] [ 13.645657] Allocated by task 281: [ 13.645859] kasan_save_stack+0x45/0x70 [ 13.646053] kasan_save_track+0x18/0x40 [ 13.646666] kasan_save_alloc_info+0x3b/0x50 [ 13.647048] __kasan_kmalloc+0xb7/0xc0 [ 13.647282] __kmalloc_cache_noprof+0x189/0x420 [ 13.647625] kasan_bitops_generic+0x92/0x1c0 [ 13.647813] kunit_try_run_case+0x1a5/0x480 [ 13.648165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.648452] kthread+0x337/0x6f0 [ 13.648749] ret_from_fork+0x41/0x80 [ 13.648956] ret_from_fork_asm+0x1a/0x30 [ 13.649375] [ 13.649477] The buggy address belongs to the object at ffff8881023f8300 [ 13.649477] which belongs to the cache kmalloc-16 of size 16 [ 13.650171] The buggy address is located 8 bytes inside of [ 13.650171] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.650778] [ 13.651004] The buggy address belongs to the physical page: [ 13.651264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.651901] flags: 0x200000000000000(node=0|zone=2) [ 13.652130] page_type: f5(slab) [ 13.652279] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.652699] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.653117] page dumped because: kasan: bad access detected [ 13.653543] [ 13.653658] Memory state around the buggy address: [ 13.653993] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.654476] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.654785] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.655079] ^ [ 13.655486] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.655840] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.656213] ================================================================== [ 13.682871] ================================================================== [ 13.683716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.684207] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.684729] [ 13.684830] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.684873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.684885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.684906] Call Trace: [ 13.684921] <TASK> [ 13.684936] dump_stack_lvl+0x73/0xb0 [ 13.684960] print_report+0xd1/0x650 [ 13.684982] ? __virt_addr_valid+0x1db/0x2d0 [ 13.685002] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.685027] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.685049] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.685075] kasan_report+0x141/0x180 [ 13.685097] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.685262] kasan_check_range+0x10c/0x1c0 [ 13.685296] __kasan_check_write+0x18/0x20 [ 13.685318] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.685357] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.685383] ? kasan_save_alloc_info+0x3b/0x50 [ 13.685437] ? kasan_save_stack+0x45/0x70 [ 13.685463] kasan_bitops_generic+0x116/0x1c0 [ 13.685483] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.685505] ? __pfx_read_tsc+0x10/0x10 [ 13.685523] ? ktime_get_ts64+0x86/0x230 [ 13.685549] kunit_try_run_case+0x1a5/0x480 [ 13.685574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.685596] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.685620] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.685644] ? __kthread_parkme+0x82/0x180 [ 13.685665] ? preempt_count_sub+0x50/0x80 [ 13.685689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.685711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.685733] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.685756] kthread+0x337/0x6f0 [ 13.685782] ? trace_preempt_on+0x20/0xc0 [ 13.685804] ? __pfx_kthread+0x10/0x10 [ 13.685826] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.685848] ? calculate_sigpending+0x7b/0xa0 [ 13.685868] ? __pfx_kthread+0x10/0x10 [ 13.685891] ret_from_fork+0x41/0x80 [ 13.685912] ? __pfx_kthread+0x10/0x10 [ 13.685933] ret_from_fork_asm+0x1a/0x30 [ 13.685964] </TASK> [ 13.685975] [ 13.697351] Allocated by task 281: [ 13.697626] kasan_save_stack+0x45/0x70 [ 13.698027] kasan_save_track+0x18/0x40 [ 13.698316] kasan_save_alloc_info+0x3b/0x50 [ 13.698686] __kasan_kmalloc+0xb7/0xc0 [ 13.698877] __kmalloc_cache_noprof+0x189/0x420 [ 13.699078] kasan_bitops_generic+0x92/0x1c0 [ 13.699704] kunit_try_run_case+0x1a5/0x480 [ 13.699961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.700414] kthread+0x337/0x6f0 [ 13.700703] ret_from_fork+0x41/0x80 [ 13.700996] ret_from_fork_asm+0x1a/0x30 [ 13.701344] [ 13.701438] The buggy address belongs to the object at ffff8881023f8300 [ 13.701438] which belongs to the cache kmalloc-16 of size 16 [ 13.701925] The buggy address is located 8 bytes inside of [ 13.701925] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.702715] [ 13.702934] The buggy address belongs to the physical page: [ 13.703426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.703880] flags: 0x200000000000000(node=0|zone=2) [ 13.704240] page_type: f5(slab) [ 13.704412] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.704726] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.705030] page dumped because: kasan: bad access detected [ 13.705632] [ 13.705865] Memory state around the buggy address: [ 13.706369] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.706807] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.707321] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.707826] ^ [ 13.708001] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.708678] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.709155] ================================================================== [ 13.657348] ================================================================== [ 13.657653] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.658261] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.658565] [ 13.658689] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.658749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.658761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.658781] Call Trace: [ 13.658794] <TASK> [ 13.658811] dump_stack_lvl+0x73/0xb0 [ 13.658835] print_report+0xd1/0x650 [ 13.658857] ? __virt_addr_valid+0x1db/0x2d0 [ 13.658878] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.658903] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.658944] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.658970] kasan_report+0x141/0x180 [ 13.658993] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.659023] kasan_check_range+0x10c/0x1c0 [ 13.659048] __kasan_check_write+0x18/0x20 [ 13.659068] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.659094] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.659121] ? kasan_save_alloc_info+0x3b/0x50 [ 13.659152] ? kasan_save_stack+0x45/0x70 [ 13.659177] kasan_bitops_generic+0x116/0x1c0 [ 13.659215] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.659236] ? __pfx_read_tsc+0x10/0x10 [ 13.659255] ? ktime_get_ts64+0x86/0x230 [ 13.659279] kunit_try_run_case+0x1a5/0x480 [ 13.659303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.659335] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.659357] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.659381] ? __kthread_parkme+0x82/0x180 [ 13.659402] ? preempt_count_sub+0x50/0x80 [ 13.659426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.659450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.659472] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.659494] kthread+0x337/0x6f0 [ 13.659514] ? trace_preempt_on+0x20/0xc0 [ 13.659537] ? __pfx_kthread+0x10/0x10 [ 13.659558] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.659579] ? calculate_sigpending+0x7b/0xa0 [ 13.659600] ? __pfx_kthread+0x10/0x10 [ 13.659622] ret_from_fork+0x41/0x80 [ 13.659641] ? __pfx_kthread+0x10/0x10 [ 13.659663] ret_from_fork_asm+0x1a/0x30 [ 13.659693] </TASK> [ 13.659705] [ 13.669964] Allocated by task 281: [ 13.670416] kasan_save_stack+0x45/0x70 [ 13.670706] kasan_save_track+0x18/0x40 [ 13.670945] kasan_save_alloc_info+0x3b/0x50 [ 13.671288] __kasan_kmalloc+0xb7/0xc0 [ 13.671489] __kmalloc_cache_noprof+0x189/0x420 [ 13.671700] kasan_bitops_generic+0x92/0x1c0 [ 13.671895] kunit_try_run_case+0x1a5/0x480 [ 13.672090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.672644] kthread+0x337/0x6f0 [ 13.672942] ret_from_fork+0x41/0x80 [ 13.673397] ret_from_fork_asm+0x1a/0x30 [ 13.673647] [ 13.673904] The buggy address belongs to the object at ffff8881023f8300 [ 13.673904] which belongs to the cache kmalloc-16 of size 16 [ 13.674872] The buggy address is located 8 bytes inside of [ 13.674872] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.675790] [ 13.675895] The buggy address belongs to the physical page: [ 13.676502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.676839] flags: 0x200000000000000(node=0|zone=2) [ 13.677049] page_type: f5(slab) [ 13.677529] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.677962] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.678492] page dumped because: kasan: bad access detected [ 13.678910] [ 13.679156] Memory state around the buggy address: [ 13.679404] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.679696] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.679978] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.680577] ^ [ 13.680882] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.681413] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.682029] ================================================================== [ 13.532399] ================================================================== [ 13.532754] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.533095] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.533752] [ 13.533934] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.533996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.534007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.534087] Call Trace: [ 13.534102] <TASK> [ 13.534115] dump_stack_lvl+0x73/0xb0 [ 13.534179] print_report+0xd1/0x650 [ 13.534201] ? __virt_addr_valid+0x1db/0x2d0 [ 13.534222] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.534247] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.534271] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.534297] kasan_report+0x141/0x180 [ 13.534321] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.534361] kasan_check_range+0x10c/0x1c0 [ 13.534385] __kasan_check_write+0x18/0x20 [ 13.534406] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.534431] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.534458] ? kasan_save_alloc_info+0x3b/0x50 [ 13.534478] ? kasan_save_stack+0x45/0x70 [ 13.534503] kasan_bitops_generic+0x116/0x1c0 [ 13.534552] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.534574] ? __pfx_read_tsc+0x10/0x10 [ 13.534592] ? ktime_get_ts64+0x86/0x230 [ 13.534626] kunit_try_run_case+0x1a5/0x480 [ 13.534649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.534696] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.534719] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.534744] ? __kthread_parkme+0x82/0x180 [ 13.534774] ? preempt_count_sub+0x50/0x80 [ 13.534799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.534821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.534843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.534865] kthread+0x337/0x6f0 [ 13.534886] ? trace_preempt_on+0x20/0xc0 [ 13.534909] ? __pfx_kthread+0x10/0x10 [ 13.534930] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.534951] ? calculate_sigpending+0x7b/0xa0 [ 13.534972] ? __pfx_kthread+0x10/0x10 [ 13.534993] ret_from_fork+0x41/0x80 [ 13.535014] ? __pfx_kthread+0x10/0x10 [ 13.535034] ret_from_fork_asm+0x1a/0x30 [ 13.535065] </TASK> [ 13.535075] [ 13.544500] Allocated by task 281: [ 13.544721] kasan_save_stack+0x45/0x70 [ 13.544974] kasan_save_track+0x18/0x40 [ 13.545186] kasan_save_alloc_info+0x3b/0x50 [ 13.545404] __kasan_kmalloc+0xb7/0xc0 [ 13.545613] __kmalloc_cache_noprof+0x189/0x420 [ 13.545853] kasan_bitops_generic+0x92/0x1c0 [ 13.546074] kunit_try_run_case+0x1a5/0x480 [ 13.547086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.547312] kthread+0x337/0x6f0 [ 13.547554] ret_from_fork+0x41/0x80 [ 13.547705] ret_from_fork_asm+0x1a/0x30 [ 13.547910] [ 13.547999] The buggy address belongs to the object at ffff8881023f8300 [ 13.547999] which belongs to the cache kmalloc-16 of size 16 [ 13.548976] The buggy address is located 8 bytes inside of [ 13.548976] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.549562] [ 13.549662] The buggy address belongs to the physical page: [ 13.549913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.550620] flags: 0x200000000000000(node=0|zone=2) [ 13.550832] page_type: f5(slab) [ 13.551174] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.551476] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.551922] page dumped because: kasan: bad access detected [ 13.552369] [ 13.552462] Memory state around the buggy address: [ 13.552826] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.553289] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.553740] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.554203] ^ [ 13.554498] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.554962] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.555465] ================================================================== [ 13.583804] ================================================================== [ 13.584123] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.584685] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.585500] [ 13.585725] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.585791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.585803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.585825] Call Trace: [ 13.585837] <TASK> [ 13.585857] dump_stack_lvl+0x73/0xb0 [ 13.585884] print_report+0xd1/0x650 [ 13.585907] ? __virt_addr_valid+0x1db/0x2d0 [ 13.585928] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.585954] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.585977] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.586002] kasan_report+0x141/0x180 [ 13.586025] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.586056] kasan_check_range+0x10c/0x1c0 [ 13.586080] __kasan_check_write+0x18/0x20 [ 13.586099] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.586157] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.586186] ? kasan_save_alloc_info+0x3b/0x50 [ 13.586205] ? kasan_save_stack+0x45/0x70 [ 13.586230] kasan_bitops_generic+0x116/0x1c0 [ 13.586250] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.586272] ? __pfx_read_tsc+0x10/0x10 [ 13.586291] ? ktime_get_ts64+0x86/0x230 [ 13.586316] kunit_try_run_case+0x1a5/0x480 [ 13.586349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.586370] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.586394] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.586417] ? __kthread_parkme+0x82/0x180 [ 13.586439] ? preempt_count_sub+0x50/0x80 [ 13.586464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.586487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.586509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.586531] kthread+0x337/0x6f0 [ 13.586551] ? trace_preempt_on+0x20/0xc0 [ 13.586574] ? __pfx_kthread+0x10/0x10 [ 13.586596] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.586617] ? calculate_sigpending+0x7b/0xa0 [ 13.586638] ? __pfx_kthread+0x10/0x10 [ 13.586659] ret_from_fork+0x41/0x80 [ 13.586679] ? __pfx_kthread+0x10/0x10 [ 13.586700] ret_from_fork_asm+0x1a/0x30 [ 13.586732] </TASK> [ 13.586742] [ 13.597621] Allocated by task 281: [ 13.598063] kasan_save_stack+0x45/0x70 [ 13.598332] kasan_save_track+0x18/0x40 [ 13.598508] kasan_save_alloc_info+0x3b/0x50 [ 13.598696] __kasan_kmalloc+0xb7/0xc0 [ 13.598868] __kmalloc_cache_noprof+0x189/0x420 [ 13.599077] kasan_bitops_generic+0x92/0x1c0 [ 13.599560] kunit_try_run_case+0x1a5/0x480 [ 13.599763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.599998] kthread+0x337/0x6f0 [ 13.600417] ret_from_fork+0x41/0x80 [ 13.600684] ret_from_fork_asm+0x1a/0x30 [ 13.601142] [ 13.601397] The buggy address belongs to the object at ffff8881023f8300 [ 13.601397] which belongs to the cache kmalloc-16 of size 16 [ 13.601969] The buggy address is located 8 bytes inside of [ 13.601969] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.602785] [ 13.603014] The buggy address belongs to the physical page: [ 13.603384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.603715] flags: 0x200000000000000(node=0|zone=2) [ 13.603930] page_type: f5(slab) [ 13.604085] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.604966] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.605660] page dumped because: kasan: bad access detected [ 13.606091] [ 13.606534] Memory state around the buggy address: [ 13.606833] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.607474] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.607924] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.608529] ^ [ 13.608847] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.609543] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.609998] ================================================================== [ 13.611228] ================================================================== [ 13.611489] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.612136] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.612681] [ 13.612792] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.612838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.612851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.612872] Call Trace: [ 13.612887] <TASK> [ 13.612901] dump_stack_lvl+0x73/0xb0 [ 13.612925] print_report+0xd1/0x650 [ 13.612948] ? __virt_addr_valid+0x1db/0x2d0 [ 13.612969] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.612994] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.613017] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.613043] kasan_report+0x141/0x180 [ 13.613065] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.613096] kasan_check_range+0x10c/0x1c0 [ 13.613120] __kasan_check_write+0x18/0x20 [ 13.613145] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.613171] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.613197] ? kasan_save_alloc_info+0x3b/0x50 [ 13.613218] ? kasan_save_stack+0x45/0x70 [ 13.613243] kasan_bitops_generic+0x116/0x1c0 [ 13.613272] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.613294] ? __pfx_read_tsc+0x10/0x10 [ 13.613313] ? ktime_get_ts64+0x86/0x230 [ 13.613353] kunit_try_run_case+0x1a5/0x480 [ 13.613376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.613397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.613421] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.613457] ? __kthread_parkme+0x82/0x180 [ 13.613487] ? preempt_count_sub+0x50/0x80 [ 13.613511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.613534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.613575] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.613599] kthread+0x337/0x6f0 [ 13.613618] ? trace_preempt_on+0x20/0xc0 [ 13.613642] ? __pfx_kthread+0x10/0x10 [ 13.613663] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.613685] ? calculate_sigpending+0x7b/0xa0 [ 13.613706] ? __pfx_kthread+0x10/0x10 [ 13.613728] ret_from_fork+0x41/0x80 [ 13.613748] ? __pfx_kthread+0x10/0x10 [ 13.613774] ret_from_fork_asm+0x1a/0x30 [ 13.613805] </TASK> [ 13.613815] [ 13.621808] Allocated by task 281: [ 13.622007] kasan_save_stack+0x45/0x70 [ 13.622204] kasan_save_track+0x18/0x40 [ 13.622458] kasan_save_alloc_info+0x3b/0x50 [ 13.622843] __kasan_kmalloc+0xb7/0xc0 [ 13.623026] __kmalloc_cache_noprof+0x189/0x420 [ 13.623178] kasan_bitops_generic+0x92/0x1c0 [ 13.623332] kunit_try_run_case+0x1a5/0x480 [ 13.623494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.623774] kthread+0x337/0x6f0 [ 13.623969] ret_from_fork+0x41/0x80 [ 13.624332] ret_from_fork_asm+0x1a/0x30 [ 13.624530] [ 13.624612] The buggy address belongs to the object at ffff8881023f8300 [ 13.624612] which belongs to the cache kmalloc-16 of size 16 [ 13.624960] The buggy address is located 8 bytes inside of [ 13.624960] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.625441] [ 13.625533] The buggy address belongs to the physical page: [ 13.625814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.626057] flags: 0x200000000000000(node=0|zone=2) [ 13.626217] page_type: f5(slab) [ 13.626355] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.626697] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.627066] page dumped because: kasan: bad access detected [ 13.627526] [ 13.627610] Memory state around the buggy address: [ 13.627774] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.628079] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.628552] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.628859] ^ [ 13.629026] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.629360] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.629657] ==================================================================
[ 23.724262] ================================================================== [ 23.724917] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 23.725660] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.726331] [ 23.726480] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.726513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.726523] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.726533] Call trace: [ 23.726541] show_stack+0x20/0x38 (C) [ 23.726561] dump_stack_lvl+0x8c/0xd0 [ 23.726579] print_report+0x118/0x608 [ 23.726598] kasan_report+0xdc/0x128 [ 23.726617] kasan_check_range+0x100/0x1a8 [ 23.726637] __kasan_check_write+0x20/0x30 [ 23.726658] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 23.726684] kasan_bitops_generic+0x110/0x1c8 [ 23.726703] kunit_try_run_case+0x170/0x3f0 [ 23.726726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.726751] kthread+0x328/0x630 [ 23.726774] ret_from_fork+0x10/0x20 [ 23.726795] [ 23.733103] Allocated by task 315: [ 23.733418] kasan_save_stack+0x3c/0x68 [ 23.733778] kasan_save_track+0x20/0x40 [ 23.734136] kasan_save_alloc_info+0x40/0x58 [ 23.734536] __kasan_kmalloc+0xd4/0xd8 [ 23.734886] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.735312] kasan_bitops_generic+0xa0/0x1c8 [ 23.735708] kunit_try_run_case+0x170/0x3f0 [ 23.736101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.736610] kthread+0x328/0x630 [ 23.736920] ret_from_fork+0x10/0x20 [ 23.737258] [ 23.737404] The buggy address belongs to the object at ffff000001193200 [ 23.737404] which belongs to the cache kmalloc-16 of size 16 [ 23.738505] The buggy address is located 8 bytes inside of [ 23.738505] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.739601] [ 23.739746] The buggy address belongs to the physical page: [ 23.740251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.740958] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.741551] page_type: f5(slab) [ 23.741849] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.742550] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.743246] page dumped because: kasan: bad access detected [ 23.743750] [ 23.743896] Memory state around the buggy address: [ 23.744333] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.744985] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.745637] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.746286] ^ [ 23.746610] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.747263] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.747912] ================================================================== [ 23.675690] ================================================================== [ 23.676345] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 23.677089] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.677753] [ 23.677902] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.677935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.677945] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.677956] Call trace: [ 23.677964] show_stack+0x20/0x38 (C) [ 23.677984] dump_stack_lvl+0x8c/0xd0 [ 23.678003] print_report+0x118/0x608 [ 23.678022] kasan_report+0xdc/0x128 [ 23.678041] __asan_report_load8_noabort+0x20/0x30 [ 23.678064] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 23.678090] kasan_bitops_generic+0x110/0x1c8 [ 23.678109] kunit_try_run_case+0x170/0x3f0 [ 23.678132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.678158] kthread+0x328/0x630 [ 23.678180] ret_from_fork+0x10/0x20 [ 23.678201] [ 23.684211] Allocated by task 315: [ 23.684525] kasan_save_stack+0x3c/0x68 [ 23.684884] kasan_save_track+0x20/0x40 [ 23.685244] kasan_save_alloc_info+0x40/0x58 [ 23.685642] __kasan_kmalloc+0xd4/0xd8 [ 23.685993] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.686419] kasan_bitops_generic+0xa0/0x1c8 [ 23.686816] kunit_try_run_case+0x170/0x3f0 [ 23.687208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.687716] kthread+0x328/0x630 [ 23.688026] ret_from_fork+0x10/0x20 [ 23.688364] [ 23.688510] The buggy address belongs to the object at ffff000001193200 [ 23.688510] which belongs to the cache kmalloc-16 of size 16 [ 23.689612] The buggy address is located 8 bytes inside of [ 23.689612] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.690706] [ 23.690852] The buggy address belongs to the physical page: [ 23.691356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.692064] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.692657] page_type: f5(slab) [ 23.692956] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.693656] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.694351] page dumped because: kasan: bad access detected [ 23.694855] [ 23.695001] Memory state around the buggy address: [ 23.695438] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.696090] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.696743] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.697392] ^ [ 23.697715] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.698367] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.699017] ================================================================== [ 23.748692] ================================================================== [ 23.749347] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 23.750091] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.750753] [ 23.750902] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.750934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.750944] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.750954] Call trace: [ 23.750962] show_stack+0x20/0x38 (C) [ 23.750982] dump_stack_lvl+0x8c/0xd0 [ 23.751001] print_report+0x118/0x608 [ 23.751020] kasan_report+0xdc/0x128 [ 23.751039] __asan_report_load8_noabort+0x20/0x30 [ 23.751061] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 23.751087] kasan_bitops_generic+0x110/0x1c8 [ 23.751105] kunit_try_run_case+0x170/0x3f0 [ 23.751128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.751154] kthread+0x328/0x630 [ 23.751176] ret_from_fork+0x10/0x20 [ 23.751197] [ 23.757201] Allocated by task 315: [ 23.757516] kasan_save_stack+0x3c/0x68 [ 23.757876] kasan_save_track+0x20/0x40 [ 23.758234] kasan_save_alloc_info+0x40/0x58 [ 23.758633] __kasan_kmalloc+0xd4/0xd8 [ 23.758984] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.759409] kasan_bitops_generic+0xa0/0x1c8 [ 23.759806] kunit_try_run_case+0x170/0x3f0 [ 23.760200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.760708] kthread+0x328/0x630 [ 23.761018] ret_from_fork+0x10/0x20 [ 23.761356] [ 23.761502] The buggy address belongs to the object at ffff000001193200 [ 23.761502] which belongs to the cache kmalloc-16 of size 16 [ 23.762603] The buggy address is located 8 bytes inside of [ 23.762603] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.763699] [ 23.763845] The buggy address belongs to the physical page: [ 23.764349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.765056] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.765650] page_type: f5(slab) [ 23.765949] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.766650] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.767344] page dumped because: kasan: bad access detected [ 23.767849] [ 23.767994] Memory state around the buggy address: [ 23.768431] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.769083] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.769734] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.770385] ^ [ 23.770708] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.771360] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.772009] ================================================================== [ 23.772770] ================================================================== [ 23.773425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 23.774169] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.774838] [ 23.774988] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.775020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.775029] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.775040] Call trace: [ 23.775047] show_stack+0x20/0x38 (C) [ 23.775067] dump_stack_lvl+0x8c/0xd0 [ 23.775086] print_report+0x118/0x608 [ 23.775105] kasan_report+0xdc/0x128 [ 23.775123] kasan_check_range+0x100/0x1a8 [ 23.775143] __kasan_check_write+0x20/0x30 [ 23.775165] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 23.775191] kasan_bitops_generic+0x110/0x1c8 [ 23.775210] kunit_try_run_case+0x170/0x3f0 [ 23.775232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.775258] kthread+0x328/0x630 [ 23.775280] ret_from_fork+0x10/0x20 [ 23.775300] [ 23.781612] Allocated by task 315: [ 23.781928] kasan_save_stack+0x3c/0x68 [ 23.782288] kasan_save_track+0x20/0x40 [ 23.782646] kasan_save_alloc_info+0x40/0x58 [ 23.783045] __kasan_kmalloc+0xd4/0xd8 [ 23.783397] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.783823] kasan_bitops_generic+0xa0/0x1c8 [ 23.784220] kunit_try_run_case+0x170/0x3f0 [ 23.784613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.785121] kthread+0x328/0x630 [ 23.785430] ret_from_fork+0x10/0x20 [ 23.785767] [ 23.785913] The buggy address belongs to the object at ffff000001193200 [ 23.785913] which belongs to the cache kmalloc-16 of size 16 [ 23.787014] The buggy address is located 8 bytes inside of [ 23.787014] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.788110] [ 23.788257] The buggy address belongs to the physical page: [ 23.788761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.789468] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.790061] page_type: f5(slab) [ 23.790360] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.791060] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.791755] page dumped because: kasan: bad access detected [ 23.792259] [ 23.792405] Memory state around the buggy address: [ 23.792841] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.793494] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.794146] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.794795] ^ [ 23.795119] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.795771] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.796420] ================================================================== [ 23.821857] ================================================================== [ 23.822509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 23.823247] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.823904] [ 23.824050] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.824077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.824084] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.824093] Call trace: [ 23.824099] show_stack+0x20/0x38 (C) [ 23.824116] dump_stack_lvl+0x8c/0xd0 [ 23.824132] print_report+0x118/0x608 [ 23.824147] kasan_report+0xdc/0x128 [ 23.824162] __asan_report_load8_noabort+0x20/0x30 [ 23.824180] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 23.824201] kasan_bitops_generic+0x110/0x1c8 [ 23.824216] kunit_try_run_case+0x170/0x3f0 [ 23.824235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.824256] kthread+0x328/0x630 [ 23.824274] ret_from_fork+0x10/0x20 [ 23.824291] [ 23.830277] Allocated by task 315: [ 23.830589] kasan_save_stack+0x3c/0x68 [ 23.830943] kasan_save_track+0x20/0x40 [ 23.831297] kasan_save_alloc_info+0x40/0x58 [ 23.831691] __kasan_kmalloc+0xd4/0xd8 [ 23.832036] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.832456] kasan_bitops_generic+0xa0/0x1c8 [ 23.832847] kunit_try_run_case+0x170/0x3f0 [ 23.833233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.833735] kthread+0x328/0x630 [ 23.834039] ret_from_fork+0x10/0x20 [ 23.834370] [ 23.834513] The buggy address belongs to the object at ffff000001193200 [ 23.834513] which belongs to the cache kmalloc-16 of size 16 [ 23.835608] The buggy address is located 8 bytes inside of [ 23.835608] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.836697] [ 23.836841] The buggy address belongs to the physical page: [ 23.837341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.838044] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.838633] page_type: f5(slab) [ 23.838926] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.839620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.840310] page dumped because: kasan: bad access detected [ 23.840809] [ 23.840950] Memory state around the buggy address: [ 23.841383] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.842031] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.842678] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.843323] ^ [ 23.843643] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.844290] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.844935] ================================================================== [ 23.625892] ================================================================== [ 23.626578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 23.627354] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.628033] [ 23.628199] CPU: 2 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.628249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.628265] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.628283] Call trace: [ 23.628295] show_stack+0x20/0x38 (C) [ 23.628329] dump_stack_lvl+0x8c/0xd0 [ 23.628361] print_report+0x118/0x608 [ 23.628392] kasan_report+0xdc/0x128 [ 23.628420] __asan_report_load8_noabort+0x20/0x30 [ 23.628455] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 23.628494] kasan_bitops_generic+0x110/0x1c8 [ 23.628523] kunit_try_run_case+0x170/0x3f0 [ 23.628560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.628600] kthread+0x328/0x630 [ 23.628634] ret_from_fork+0x10/0x20 [ 23.628668] [ 23.634734] Allocated by task 315: [ 23.635061] kasan_save_stack+0x3c/0x68 [ 23.635435] kasan_save_track+0x20/0x40 [ 23.635808] kasan_save_alloc_info+0x40/0x58 [ 23.636221] __kasan_kmalloc+0xd4/0xd8 [ 23.636585] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.637028] kasan_bitops_generic+0xa0/0x1c8 [ 23.637439] kunit_try_run_case+0x170/0x3f0 [ 23.637848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.638374] kthread+0x328/0x630 [ 23.638697] ret_from_fork+0x10/0x20 [ 23.639049] [ 23.639203] The buggy address belongs to the object at ffff000001193200 [ 23.639203] which belongs to the cache kmalloc-16 of size 16 [ 23.640321] The buggy address is located 8 bytes inside of [ 23.640321] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.641436] [ 23.641592] The buggy address belongs to the physical page: [ 23.642107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.642834] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.643446] page_type: f5(slab) [ 23.643760] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.644476] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.645185] page dumped because: kasan: bad access detected [ 23.645701] [ 23.645856] Memory state around the buggy address: [ 23.646305] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.646974] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.647642] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.648305] ^ [ 23.648641] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.649308] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.649972] ================================================================== [ 23.699814] ================================================================== [ 23.700470] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 23.701214] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.701884] [ 23.702034] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.702068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.702077] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.702088] Call trace: [ 23.702095] show_stack+0x20/0x38 (C) [ 23.702116] dump_stack_lvl+0x8c/0xd0 [ 23.702135] print_report+0x118/0x608 [ 23.702154] kasan_report+0xdc/0x128 [ 23.702172] kasan_check_range+0x100/0x1a8 [ 23.702193] __kasan_check_write+0x20/0x30 [ 23.702214] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 23.702240] kasan_bitops_generic+0x110/0x1c8 [ 23.702258] kunit_try_run_case+0x170/0x3f0 [ 23.702281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.702307] kthread+0x328/0x630 [ 23.702329] ret_from_fork+0x10/0x20 [ 23.702350] [ 23.708660] Allocated by task 315: [ 23.708975] kasan_save_stack+0x3c/0x68 [ 23.709336] kasan_save_track+0x20/0x40 [ 23.709695] kasan_save_alloc_info+0x40/0x58 [ 23.710093] __kasan_kmalloc+0xd4/0xd8 [ 23.710443] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.710868] kasan_bitops_generic+0xa0/0x1c8 [ 23.711265] kunit_try_run_case+0x170/0x3f0 [ 23.711657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.712166] kthread+0x328/0x630 [ 23.712476] ret_from_fork+0x10/0x20 [ 23.712812] [ 23.712958] The buggy address belongs to the object at ffff000001193200 [ 23.712958] which belongs to the cache kmalloc-16 of size 16 [ 23.714058] The buggy address is located 8 bytes inside of [ 23.714058] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.715155] [ 23.715300] The buggy address belongs to the physical page: [ 23.715803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.716510] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.717104] page_type: f5(slab) [ 23.717401] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.718102] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.718796] page dumped because: kasan: bad access detected [ 23.719301] [ 23.719446] Memory state around the buggy address: [ 23.719883] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.720535] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.721187] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.721837] ^ [ 23.722160] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.722812] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.723462] ================================================================== [ 23.797186] ================================================================== [ 23.797839] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 23.798583] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.799253] [ 23.799402] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.799433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.799442] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.799453] Call trace: [ 23.799460] show_stack+0x20/0x38 (C) [ 23.799480] dump_stack_lvl+0x8c/0xd0 [ 23.799499] print_report+0x118/0x608 [ 23.799517] kasan_report+0xdc/0x128 [ 23.799535] kasan_check_range+0x100/0x1a8 [ 23.799556] __kasan_check_write+0x20/0x30 [ 23.799577] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 23.799602] kasan_bitops_generic+0x110/0x1c8 [ 23.799621] kunit_try_run_case+0x170/0x3f0 [ 23.799643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.799669] kthread+0x328/0x630 [ 23.799690] ret_from_fork+0x10/0x20 [ 23.799711] [ 23.806023] Allocated by task 315: [ 23.806339] kasan_save_stack+0x3c/0x68 [ 23.806697] kasan_save_track+0x20/0x40 [ 23.807056] kasan_save_alloc_info+0x40/0x58 [ 23.807455] __kasan_kmalloc+0xd4/0xd8 [ 23.807806] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.808232] kasan_bitops_generic+0xa0/0x1c8 [ 23.808627] kunit_try_run_case+0x170/0x3f0 [ 23.809019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.809527] kthread+0x328/0x630 [ 23.809837] ret_from_fork+0x10/0x20 [ 23.810175] [ 23.810321] The buggy address belongs to the object at ffff000001193200 [ 23.810321] which belongs to the cache kmalloc-16 of size 16 [ 23.811421] The buggy address is located 8 bytes inside of [ 23.811421] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.812516] [ 23.812662] The buggy address belongs to the physical page: [ 23.813166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.813873] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.814468] page_type: f5(slab) [ 23.814765] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.815465] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.816160] page dumped because: kasan: bad access detected [ 23.816664] [ 23.816809] Memory state around the buggy address: [ 23.817247] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.817900] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.818552] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.819202] ^ [ 23.819526] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.820177] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.820826] ================================================================== [ 23.600005] ================================================================== [ 23.601047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 23.601821] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.602508] [ 23.602671] CPU: 2 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.602722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.602737] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.602756] Call trace: [ 23.602768] show_stack+0x20/0x38 (C) [ 23.602802] dump_stack_lvl+0x8c/0xd0 [ 23.602834] print_report+0x118/0x608 [ 23.602864] kasan_report+0xdc/0x128 [ 23.602893] kasan_check_range+0x100/0x1a8 [ 23.602925] __kasan_check_write+0x20/0x30 [ 23.602957] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 23.602998] kasan_bitops_generic+0x110/0x1c8 [ 23.603027] kunit_try_run_case+0x170/0x3f0 [ 23.603063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.603103] kthread+0x328/0x630 [ 23.603137] ret_from_fork+0x10/0x20 [ 23.603170] [ 23.609541] Allocated by task 315: [ 23.609868] kasan_save_stack+0x3c/0x68 [ 23.610242] kasan_save_track+0x20/0x40 [ 23.610615] kasan_save_alloc_info+0x40/0x58 [ 23.611030] __kasan_kmalloc+0xd4/0xd8 [ 23.611395] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.611838] kasan_bitops_generic+0xa0/0x1c8 [ 23.612248] kunit_try_run_case+0x170/0x3f0 [ 23.612656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.613182] kthread+0x328/0x630 [ 23.613505] ret_from_fork+0x10/0x20 [ 23.613857] [ 23.614012] The buggy address belongs to the object at ffff000001193200 [ 23.614012] which belongs to the cache kmalloc-16 of size 16 [ 23.615131] The buggy address is located 8 bytes inside of [ 23.615131] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.616246] [ 23.616401] The buggy address belongs to the physical page: [ 23.616918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.617645] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.618257] page_type: f5(slab) [ 23.618572] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.619289] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.619998] page dumped because: kasan: bad access detected [ 23.620513] [ 23.620666] Memory state around the buggy address: [ 23.621116] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.621784] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.622454] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.623117] ^ [ 23.623453] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.624121] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.624784] ================================================================== [ 23.651105] ================================================================== [ 23.651779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 23.652539] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.653212] [ 23.653368] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.653405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.653415] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.653428] Call trace: [ 23.653436] show_stack+0x20/0x38 (C) [ 23.653460] dump_stack_lvl+0x8c/0xd0 [ 23.653482] print_report+0x118/0x608 [ 23.653502] kasan_report+0xdc/0x128 [ 23.653520] kasan_check_range+0x100/0x1a8 [ 23.653540] __kasan_check_write+0x20/0x30 [ 23.653562] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 23.653588] kasan_bitops_generic+0x110/0x1c8 [ 23.653607] kunit_try_run_case+0x170/0x3f0 [ 23.653631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.653658] kthread+0x328/0x630 [ 23.653681] ret_from_fork+0x10/0x20 [ 23.653703] [ 23.660014] Allocated by task 315: [ 23.660333] kasan_save_stack+0x3c/0x68 [ 23.660695] kasan_save_track+0x20/0x40 [ 23.661054] kasan_save_alloc_info+0x40/0x58 [ 23.661452] __kasan_kmalloc+0xd4/0xd8 [ 23.661803] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.662230] kasan_bitops_generic+0xa0/0x1c8 [ 23.662628] kunit_try_run_case+0x170/0x3f0 [ 23.663021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.663531] kthread+0x328/0x630 [ 23.663840] ret_from_fork+0x10/0x20 [ 23.664179] [ 23.664326] The buggy address belongs to the object at ffff000001193200 [ 23.664326] which belongs to the cache kmalloc-16 of size 16 [ 23.665428] The buggy address is located 8 bytes inside of [ 23.665428] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.666524] [ 23.666671] The buggy address belongs to the physical page: [ 23.667176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.667886] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.668484] page_type: f5(slab) [ 23.668785] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.669487] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.670182] page dumped because: kasan: bad access detected [ 23.670687] [ 23.670832] Memory state around the buggy address: [ 23.671269] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.671923] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.672575] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.673225] ^ [ 23.673548] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.674201] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.674850] ==================================================================