Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 13.824559] ================================================================== [ 13.824881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.825783] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.826153] [ 13.826248] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.826296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.826338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.826633] Call Trace: [ 13.826653] <TASK> [ 13.826672] dump_stack_lvl+0x73/0xb0 [ 13.826699] print_report+0xd1/0x650 [ 13.826722] ? __virt_addr_valid+0x1db/0x2d0 [ 13.826743] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.826767] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.826790] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.826814] kasan_report+0x141/0x180 [ 13.826836] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.826864] kasan_check_range+0x10c/0x1c0 [ 13.826887] __kasan_check_write+0x18/0x20 [ 13.826907] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.826931] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.826955] ? kasan_save_alloc_info+0x3b/0x50 [ 13.826975] ? kasan_save_stack+0x45/0x70 [ 13.827001] kasan_bitops_generic+0x121/0x1c0 [ 13.827020] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.827041] ? __pfx_read_tsc+0x10/0x10 [ 13.827059] ? ktime_get_ts64+0x86/0x230 [ 13.827085] kunit_try_run_case+0x1a5/0x480 [ 13.827108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.827144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.827168] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.827191] ? __kthread_parkme+0x82/0x180 [ 13.827212] ? preempt_count_sub+0x50/0x80 [ 13.827237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.827259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.827282] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.827304] kthread+0x337/0x6f0 [ 13.827337] ? trace_preempt_on+0x20/0xc0 [ 13.827359] ? __pfx_kthread+0x10/0x10 [ 13.827381] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.827403] ? calculate_sigpending+0x7b/0xa0 [ 13.827425] ? __pfx_kthread+0x10/0x10 [ 13.827446] ret_from_fork+0x41/0x80 [ 13.827466] ? __pfx_kthread+0x10/0x10 [ 13.827487] ret_from_fork_asm+0x1a/0x30 [ 13.827518] </TASK> [ 13.827528] [ 13.837427] Allocated by task 281: [ 13.837608] kasan_save_stack+0x45/0x70 [ 13.837793] kasan_save_track+0x18/0x40 [ 13.837968] kasan_save_alloc_info+0x3b/0x50 [ 13.838124] __kasan_kmalloc+0xb7/0xc0 [ 13.838843] __kmalloc_cache_noprof+0x189/0x420 [ 13.839059] kasan_bitops_generic+0x92/0x1c0 [ 13.839269] kunit_try_run_case+0x1a5/0x480 [ 13.839633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.839864] kthread+0x337/0x6f0 [ 13.840149] ret_from_fork+0x41/0x80 [ 13.840287] ret_from_fork_asm+0x1a/0x30 [ 13.840593] [ 13.840693] The buggy address belongs to the object at ffff8881023f8300 [ 13.840693] which belongs to the cache kmalloc-16 of size 16 [ 13.841376] The buggy address is located 8 bytes inside of [ 13.841376] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.841848] [ 13.841940] The buggy address belongs to the physical page: [ 13.842159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.842712] flags: 0x200000000000000(node=0|zone=2) [ 13.842940] page_type: f5(slab) [ 13.843231] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.843650] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.844017] page dumped because: kasan: bad access detected [ 13.844364] [ 13.844514] Memory state around the buggy address: [ 13.844705] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.845139] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.845523] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.845814] ^ [ 13.846085] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.846456] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.846745] ================================================================== [ 13.870733] ================================================================== [ 13.871024] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.871977] Read of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.872513] [ 13.872837] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.872885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.872897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.872916] Call Trace: [ 13.872930] <TASK> [ 13.872942] dump_stack_lvl+0x73/0xb0 [ 13.872966] print_report+0xd1/0x650 [ 13.872988] ? __virt_addr_valid+0x1db/0x2d0 [ 13.873009] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.873032] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.873055] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.873078] kasan_report+0x141/0x180 [ 13.873101] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.873238] kasan_check_range+0x10c/0x1c0 [ 13.873266] __kasan_check_read+0x15/0x20 [ 13.873286] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.873311] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.873351] ? kasan_save_alloc_info+0x3b/0x50 [ 13.873371] ? kasan_save_stack+0x45/0x70 [ 13.873396] kasan_bitops_generic+0x121/0x1c0 [ 13.873416] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.873437] ? __pfx_read_tsc+0x10/0x10 [ 13.873456] ? ktime_get_ts64+0x86/0x230 [ 13.873480] kunit_try_run_case+0x1a5/0x480 [ 13.873504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.873525] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.873548] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.873571] ? __kthread_parkme+0x82/0x180 [ 13.873592] ? preempt_count_sub+0x50/0x80 [ 13.873616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.873639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.873661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.873683] kthread+0x337/0x6f0 [ 13.873703] ? trace_preempt_on+0x20/0xc0 [ 13.873726] ? __pfx_kthread+0x10/0x10 [ 13.873747] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.873772] ? calculate_sigpending+0x7b/0xa0 [ 13.873793] ? __pfx_kthread+0x10/0x10 [ 13.873815] ret_from_fork+0x41/0x80 [ 13.873834] ? __pfx_kthread+0x10/0x10 [ 13.873856] ret_from_fork_asm+0x1a/0x30 [ 13.873888] </TASK> [ 13.873897] [ 13.883906] Allocated by task 281: [ 13.884180] kasan_save_stack+0x45/0x70 [ 13.884379] kasan_save_track+0x18/0x40 [ 13.884561] kasan_save_alloc_info+0x3b/0x50 [ 13.884756] __kasan_kmalloc+0xb7/0xc0 [ 13.884931] __kmalloc_cache_noprof+0x189/0x420 [ 13.885128] kasan_bitops_generic+0x92/0x1c0 [ 13.885605] kunit_try_run_case+0x1a5/0x480 [ 13.885777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.886139] kthread+0x337/0x6f0 [ 13.886310] ret_from_fork+0x41/0x80 [ 13.886582] ret_from_fork_asm+0x1a/0x30 [ 13.886874] [ 13.886974] The buggy address belongs to the object at ffff8881023f8300 [ 13.886974] which belongs to the cache kmalloc-16 of size 16 [ 13.887564] The buggy address is located 8 bytes inside of [ 13.887564] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.888200] [ 13.888304] The buggy address belongs to the physical page: [ 13.888535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.888860] flags: 0x200000000000000(node=0|zone=2) [ 13.889072] page_type: f5(slab) [ 13.889479] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.889860] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.890268] page dumped because: kasan: bad access detected [ 13.890507] [ 13.890715] Memory state around the buggy address: [ 13.890897] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.891511] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.891861] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.892276] ^ [ 13.892451] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.892906] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.893656] ================================================================== [ 13.790647] ================================================================== [ 13.790911] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.791296] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.791933] [ 13.792028] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.792070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.792081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.792101] Call Trace: [ 13.792113] <TASK> [ 13.792125] dump_stack_lvl+0x73/0xb0 [ 13.792169] print_report+0xd1/0x650 [ 13.792191] ? __virt_addr_valid+0x1db/0x2d0 [ 13.793438] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.793831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.793855] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.793881] kasan_report+0x141/0x180 [ 13.793904] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.793933] kasan_check_range+0x10c/0x1c0 [ 13.793957] __kasan_check_write+0x18/0x20 [ 13.793977] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.794001] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.794025] ? kasan_save_alloc_info+0x3b/0x50 [ 13.794044] ? kasan_save_stack+0x45/0x70 [ 13.794070] kasan_bitops_generic+0x121/0x1c0 [ 13.794090] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.794369] ? __pfx_read_tsc+0x10/0x10 [ 13.794400] ? ktime_get_ts64+0x86/0x230 [ 13.794439] kunit_try_run_case+0x1a5/0x480 [ 13.794465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.794488] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.794511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.794534] ? __kthread_parkme+0x82/0x180 [ 13.794557] ? preempt_count_sub+0x50/0x80 [ 13.794581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.794604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.794626] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.794649] kthread+0x337/0x6f0 [ 13.794669] ? trace_preempt_on+0x20/0xc0 [ 13.794691] ? __pfx_kthread+0x10/0x10 [ 13.794712] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.794734] ? calculate_sigpending+0x7b/0xa0 [ 13.794754] ? __pfx_kthread+0x10/0x10 [ 13.794777] ret_from_fork+0x41/0x80 [ 13.794797] ? __pfx_kthread+0x10/0x10 [ 13.794818] ret_from_fork_asm+0x1a/0x30 [ 13.794848] </TASK> [ 13.794859] [ 13.811333] Allocated by task 281: [ 13.811876] kasan_save_stack+0x45/0x70 [ 13.812466] kasan_save_track+0x18/0x40 [ 13.812966] kasan_save_alloc_info+0x3b/0x50 [ 13.813277] __kasan_kmalloc+0xb7/0xc0 [ 13.813434] __kmalloc_cache_noprof+0x189/0x420 [ 13.813594] kasan_bitops_generic+0x92/0x1c0 [ 13.813737] kunit_try_run_case+0x1a5/0x480 [ 13.813890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.814066] kthread+0x337/0x6f0 [ 13.814196] ret_from_fork+0x41/0x80 [ 13.814335] ret_from_fork_asm+0x1a/0x30 [ 13.814473] [ 13.814543] The buggy address belongs to the object at ffff8881023f8300 [ 13.814543] which belongs to the cache kmalloc-16 of size 16 [ 13.814893] The buggy address is located 8 bytes inside of [ 13.814893] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.815241] [ 13.815313] The buggy address belongs to the physical page: [ 13.816549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.817643] flags: 0x200000000000000(node=0|zone=2) [ 13.818388] page_type: f5(slab) [ 13.818960] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.819770] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.820143] page dumped because: kasan: bad access detected [ 13.820453] [ 13.820531] Memory state around the buggy address: [ 13.820869] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.821278] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.821550] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.821950] ^ [ 13.822183] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.822589] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.822994] ================================================================== [ 13.895099] ================================================================== [ 13.895556] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.895831] Read of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.896050] [ 13.896131] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.896173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.896187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.896206] Call Trace: [ 13.896220] <TASK> [ 13.896235] dump_stack_lvl+0x73/0xb0 [ 13.896258] print_report+0xd1/0x650 [ 13.896280] ? __virt_addr_valid+0x1db/0x2d0 [ 13.896300] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.896338] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.896360] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.896383] kasan_report+0x141/0x180 [ 13.896404] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.896431] __asan_report_load8_noabort+0x18/0x20 [ 13.896452] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.896476] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.896499] ? kasan_save_alloc_info+0x3b/0x50 [ 13.896518] ? kasan_save_stack+0x45/0x70 [ 13.896541] kasan_bitops_generic+0x121/0x1c0 [ 13.896561] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.896580] ? __pfx_read_tsc+0x10/0x10 [ 13.896599] ? ktime_get_ts64+0x86/0x230 [ 13.896622] kunit_try_run_case+0x1a5/0x480 [ 13.897172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.897202] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.897227] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.897250] ? __kthread_parkme+0x82/0x180 [ 13.897272] ? preempt_count_sub+0x50/0x80 [ 13.897297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.897332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.897356] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.897380] kthread+0x337/0x6f0 [ 13.897401] ? trace_preempt_on+0x20/0xc0 [ 13.897423] ? __pfx_kthread+0x10/0x10 [ 13.897446] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.897468] ? calculate_sigpending+0x7b/0xa0 [ 13.897489] ? __pfx_kthread+0x10/0x10 [ 13.897512] ret_from_fork+0x41/0x80 [ 13.897533] ? __pfx_kthread+0x10/0x10 [ 13.897555] ret_from_fork_asm+0x1a/0x30 [ 13.897586] </TASK> [ 13.897597] [ 13.907511] Allocated by task 281: [ 13.907640] kasan_save_stack+0x45/0x70 [ 13.907784] kasan_save_track+0x18/0x40 [ 13.907918] kasan_save_alloc_info+0x3b/0x50 [ 13.908062] __kasan_kmalloc+0xb7/0xc0 [ 13.908381] __kmalloc_cache_noprof+0x189/0x420 [ 13.908768] kasan_bitops_generic+0x92/0x1c0 [ 13.909159] kunit_try_run_case+0x1a5/0x480 [ 13.909541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.910000] kthread+0x337/0x6f0 [ 13.910332] ret_from_fork+0x41/0x80 [ 13.910671] ret_from_fork_asm+0x1a/0x30 [ 13.911032] [ 13.911211] The buggy address belongs to the object at ffff8881023f8300 [ 13.911211] which belongs to the cache kmalloc-16 of size 16 [ 13.912260] The buggy address is located 8 bytes inside of [ 13.912260] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.913074] [ 13.913218] The buggy address belongs to the physical page: [ 13.913465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.913703] flags: 0x200000000000000(node=0|zone=2) [ 13.913868] page_type: f5(slab) [ 13.913987] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.914440] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.915067] page dumped because: kasan: bad access detected [ 13.915571] [ 13.915724] Memory state around the buggy address: [ 13.916162] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.916768] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.917383] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.917985] ^ [ 13.918343] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.918801] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.919013] ================================================================== [ 13.847996] ================================================================== [ 13.848336] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.848919] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.849286] [ 13.849688] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.849831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.849845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.849866] Call Trace: [ 13.849880] <TASK> [ 13.849895] dump_stack_lvl+0x73/0xb0 [ 13.849920] print_report+0xd1/0x650 [ 13.849943] ? __virt_addr_valid+0x1db/0x2d0 [ 13.849964] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.849987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.850009] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.850034] kasan_report+0x141/0x180 [ 13.850056] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.850084] kasan_check_range+0x10c/0x1c0 [ 13.850109] __kasan_check_write+0x18/0x20 [ 13.850207] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.850232] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.850258] ? kasan_save_alloc_info+0x3b/0x50 [ 13.850278] ? kasan_save_stack+0x45/0x70 [ 13.850303] kasan_bitops_generic+0x121/0x1c0 [ 13.850338] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.850360] ? __pfx_read_tsc+0x10/0x10 [ 13.850379] ? ktime_get_ts64+0x86/0x230 [ 13.850404] kunit_try_run_case+0x1a5/0x480 [ 13.850428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.850449] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.850473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.850497] ? __kthread_parkme+0x82/0x180 [ 13.850518] ? preempt_count_sub+0x50/0x80 [ 13.850543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.850566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.850590] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.850614] kthread+0x337/0x6f0 [ 13.850636] ? trace_preempt_on+0x20/0xc0 [ 13.850658] ? __pfx_kthread+0x10/0x10 [ 13.850680] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.850702] ? calculate_sigpending+0x7b/0xa0 [ 13.850723] ? __pfx_kthread+0x10/0x10 [ 13.850746] ret_from_fork+0x41/0x80 [ 13.850767] ? __pfx_kthread+0x10/0x10 [ 13.850788] ret_from_fork_asm+0x1a/0x30 [ 13.850819] </TASK> [ 13.850829] [ 13.860893] Allocated by task 281: [ 13.861071] kasan_save_stack+0x45/0x70 [ 13.861607] kasan_save_track+0x18/0x40 [ 13.861858] kasan_save_alloc_info+0x3b/0x50 [ 13.862100] __kasan_kmalloc+0xb7/0xc0 [ 13.862370] __kmalloc_cache_noprof+0x189/0x420 [ 13.862699] kasan_bitops_generic+0x92/0x1c0 [ 13.862900] kunit_try_run_case+0x1a5/0x480 [ 13.863214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.863467] kthread+0x337/0x6f0 [ 13.863623] ret_from_fork+0x41/0x80 [ 13.863783] ret_from_fork_asm+0x1a/0x30 [ 13.863961] [ 13.864038] The buggy address belongs to the object at ffff8881023f8300 [ 13.864038] which belongs to the cache kmalloc-16 of size 16 [ 13.864822] The buggy address is located 8 bytes inside of [ 13.864822] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.865451] [ 13.865691] The buggy address belongs to the physical page: [ 13.865934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.866408] flags: 0x200000000000000(node=0|zone=2) [ 13.866714] page_type: f5(slab) [ 13.866844] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.867306] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.867671] page dumped because: kasan: bad access detected [ 13.867849] [ 13.867942] Memory state around the buggy address: [ 13.868164] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.868644] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.869015] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.869367] ^ [ 13.869648] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.869907] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.870198] ================================================================== [ 13.772974] ================================================================== [ 13.773485] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.773926] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.774331] [ 13.774431] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.774473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.774495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.774516] Call Trace: [ 13.774528] <TASK> [ 13.774541] dump_stack_lvl+0x73/0xb0 [ 13.774563] print_report+0xd1/0x650 [ 13.774586] ? __virt_addr_valid+0x1db/0x2d0 [ 13.774607] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.774630] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.774652] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.774676] kasan_report+0x141/0x180 [ 13.774700] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.774731] kasan_check_range+0x10c/0x1c0 [ 13.774756] __kasan_check_write+0x18/0x20 [ 13.774777] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.774800] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.774824] ? kasan_save_alloc_info+0x3b/0x50 [ 13.774844] ? kasan_save_stack+0x45/0x70 [ 13.774869] kasan_bitops_generic+0x121/0x1c0 [ 13.774889] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.774910] ? __pfx_read_tsc+0x10/0x10 [ 13.774929] ? ktime_get_ts64+0x86/0x230 [ 13.774953] kunit_try_run_case+0x1a5/0x480 [ 13.774976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.774998] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.775021] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.775045] ? __kthread_parkme+0x82/0x180 [ 13.775066] ? preempt_count_sub+0x50/0x80 [ 13.775089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.775112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.775145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.775168] kthread+0x337/0x6f0 [ 13.775189] ? trace_preempt_on+0x20/0xc0 [ 13.775212] ? __pfx_kthread+0x10/0x10 [ 13.775234] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.775255] ? calculate_sigpending+0x7b/0xa0 [ 13.775276] ? __pfx_kthread+0x10/0x10 [ 13.775298] ret_from_fork+0x41/0x80 [ 13.775318] ? __pfx_kthread+0x10/0x10 [ 13.775351] ret_from_fork_asm+0x1a/0x30 [ 13.775383] </TASK> [ 13.775394] [ 13.782579] Allocated by task 281: [ 13.782919] kasan_save_stack+0x45/0x70 [ 13.783114] kasan_save_track+0x18/0x40 [ 13.783313] kasan_save_alloc_info+0x3b/0x50 [ 13.783525] __kasan_kmalloc+0xb7/0xc0 [ 13.783711] __kmalloc_cache_noprof+0x189/0x420 [ 13.783927] kasan_bitops_generic+0x92/0x1c0 [ 13.784139] kunit_try_run_case+0x1a5/0x480 [ 13.784354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.784601] kthread+0x337/0x6f0 [ 13.784769] ret_from_fork+0x41/0x80 [ 13.784958] ret_from_fork_asm+0x1a/0x30 [ 13.785130] [ 13.785226] The buggy address belongs to the object at ffff8881023f8300 [ 13.785226] which belongs to the cache kmalloc-16 of size 16 [ 13.785587] The buggy address is located 8 bytes inside of [ 13.785587] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.785937] [ 13.786009] The buggy address belongs to the physical page: [ 13.786211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.786570] flags: 0x200000000000000(node=0|zone=2) [ 13.786805] page_type: f5(slab) [ 13.786995] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.787546] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.787881] page dumped because: kasan: bad access detected [ 13.788087] [ 13.788155] Memory state around the buggy address: [ 13.788308] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.788530] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.788742] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.789299] ^ [ 13.789484] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.789800] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.790120] ================================================================== [ 13.755611] ================================================================== [ 13.755956] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.756421] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.756659] [ 13.756741] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.756781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.756794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.756813] Call Trace: [ 13.756826] <TASK> [ 13.756839] dump_stack_lvl+0x73/0xb0 [ 13.756863] print_report+0xd1/0x650 [ 13.756884] ? __virt_addr_valid+0x1db/0x2d0 [ 13.756907] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.756931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.756953] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.756977] kasan_report+0x141/0x180 [ 13.757000] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.757028] kasan_check_range+0x10c/0x1c0 [ 13.757052] __kasan_check_write+0x18/0x20 [ 13.757072] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.757095] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.757120] ? kasan_save_alloc_info+0x3b/0x50 [ 13.757139] ? kasan_save_stack+0x45/0x70 [ 13.757165] kasan_bitops_generic+0x121/0x1c0 [ 13.757184] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.757205] ? __pfx_read_tsc+0x10/0x10 [ 13.757224] ? ktime_get_ts64+0x86/0x230 [ 13.757249] kunit_try_run_case+0x1a5/0x480 [ 13.757272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.757293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.757316] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.757352] ? __kthread_parkme+0x82/0x180 [ 13.757372] ? preempt_count_sub+0x50/0x80 [ 13.757397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.757419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.757441] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.757464] kthread+0x337/0x6f0 [ 13.757491] ? trace_preempt_on+0x20/0xc0 [ 13.757514] ? __pfx_kthread+0x10/0x10 [ 13.757536] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.757558] ? calculate_sigpending+0x7b/0xa0 [ 13.757579] ? __pfx_kthread+0x10/0x10 [ 13.757603] ret_from_fork+0x41/0x80 [ 13.757624] ? __pfx_kthread+0x10/0x10 [ 13.757645] ret_from_fork_asm+0x1a/0x30 [ 13.757677] </TASK> [ 13.757687] [ 13.765461] Allocated by task 281: [ 13.765620] kasan_save_stack+0x45/0x70 [ 13.765772] kasan_save_track+0x18/0x40 [ 13.765958] kasan_save_alloc_info+0x3b/0x50 [ 13.766155] __kasan_kmalloc+0xb7/0xc0 [ 13.766285] __kmalloc_cache_noprof+0x189/0x420 [ 13.766531] kasan_bitops_generic+0x92/0x1c0 [ 13.766741] kunit_try_run_case+0x1a5/0x480 [ 13.766953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.767175] kthread+0x337/0x6f0 [ 13.767296] ret_from_fork+0x41/0x80 [ 13.767433] ret_from_fork_asm+0x1a/0x30 [ 13.767571] [ 13.767639] The buggy address belongs to the object at ffff8881023f8300 [ 13.767639] which belongs to the cache kmalloc-16 of size 16 [ 13.767983] The buggy address is located 8 bytes inside of [ 13.767983] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.768352] [ 13.768449] The buggy address belongs to the physical page: [ 13.768695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.769037] flags: 0x200000000000000(node=0|zone=2) [ 13.769398] page_type: f5(slab) [ 13.769563] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.769899] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.770310] page dumped because: kasan: bad access detected [ 13.770567] [ 13.770633] Memory state around the buggy address: [ 13.770785] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.770994] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.771202] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.771632] ^ [ 13.771805] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.772119] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.772454] ================================================================== [ 13.710248] ================================================================== [ 13.710539] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.710869] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.711618] [ 13.711825] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.711872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.711885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.711912] Call Trace: [ 13.711924] <TASK> [ 13.711937] dump_stack_lvl+0x73/0xb0 [ 13.711962] print_report+0xd1/0x650 [ 13.711984] ? __virt_addr_valid+0x1db/0x2d0 [ 13.712005] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.712028] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.712050] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.712074] kasan_report+0x141/0x180 [ 13.712098] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.712217] kasan_check_range+0x10c/0x1c0 [ 13.712250] __kasan_check_write+0x18/0x20 [ 13.712271] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.712295] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.712318] ? kasan_save_alloc_info+0x3b/0x50 [ 13.712385] ? kasan_save_stack+0x45/0x70 [ 13.712410] kasan_bitops_generic+0x121/0x1c0 [ 13.712430] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.712451] ? __pfx_read_tsc+0x10/0x10 [ 13.712470] ? ktime_get_ts64+0x86/0x230 [ 13.712495] kunit_try_run_case+0x1a5/0x480 [ 13.712518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.712540] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.712563] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.712587] ? __kthread_parkme+0x82/0x180 [ 13.712608] ? preempt_count_sub+0x50/0x80 [ 13.712633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.712656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.712678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.712701] kthread+0x337/0x6f0 [ 13.712721] ? trace_preempt_on+0x20/0xc0 [ 13.712744] ? __pfx_kthread+0x10/0x10 [ 13.712765] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.712787] ? calculate_sigpending+0x7b/0xa0 [ 13.712808] ? __pfx_kthread+0x10/0x10 [ 13.712830] ret_from_fork+0x41/0x80 [ 13.712849] ? __pfx_kthread+0x10/0x10 [ 13.712871] ret_from_fork_asm+0x1a/0x30 [ 13.712902] </TASK> [ 13.712911] [ 13.723977] Allocated by task 281: [ 13.724503] kasan_save_stack+0x45/0x70 [ 13.724769] kasan_save_track+0x18/0x40 [ 13.725097] kasan_save_alloc_info+0x3b/0x50 [ 13.725490] __kasan_kmalloc+0xb7/0xc0 [ 13.725900] __kmalloc_cache_noprof+0x189/0x420 [ 13.726385] kasan_bitops_generic+0x92/0x1c0 [ 13.726604] kunit_try_run_case+0x1a5/0x480 [ 13.726802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.727037] kthread+0x337/0x6f0 [ 13.727416] ret_from_fork+0x41/0x80 [ 13.727706] ret_from_fork_asm+0x1a/0x30 [ 13.728076] [ 13.728345] The buggy address belongs to the object at ffff8881023f8300 [ 13.728345] which belongs to the cache kmalloc-16 of size 16 [ 13.728838] The buggy address is located 8 bytes inside of [ 13.728838] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.729817] [ 13.729904] The buggy address belongs to the physical page: [ 13.730358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.730857] flags: 0x200000000000000(node=0|zone=2) [ 13.731275] page_type: f5(slab) [ 13.731567] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.732214] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.732543] page dumped because: kasan: bad access detected [ 13.732767] [ 13.732853] Memory state around the buggy address: [ 13.733053] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.733693] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.734308] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.734807] ^ [ 13.735101] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.735609] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.736029] ================================================================== [ 13.737426] ================================================================== [ 13.737743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.738455] Write of size 8 at addr ffff8881023f8308 by task kunit_try_catch/281 [ 13.738774] [ 13.738875] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 13.738919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.738931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.738951] Call Trace: [ 13.738966] <TASK> [ 13.738982] dump_stack_lvl+0x73/0xb0 [ 13.739007] print_report+0xd1/0x650 [ 13.739029] ? __virt_addr_valid+0x1db/0x2d0 [ 13.739050] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.739073] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.739096] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.739120] kasan_report+0x141/0x180 [ 13.739146] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.739175] kasan_check_range+0x10c/0x1c0 [ 13.739199] __kasan_check_write+0x18/0x20 [ 13.739219] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.739242] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.739267] ? kasan_save_alloc_info+0x3b/0x50 [ 13.739286] ? kasan_save_stack+0x45/0x70 [ 13.739311] kasan_bitops_generic+0x121/0x1c0 [ 13.739341] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.739362] ? __pfx_read_tsc+0x10/0x10 [ 13.739394] ? ktime_get_ts64+0x86/0x230 [ 13.739419] kunit_try_run_case+0x1a5/0x480 [ 13.739443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.739465] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.739488] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.739512] ? __kthread_parkme+0x82/0x180 [ 13.739534] ? preempt_count_sub+0x50/0x80 [ 13.739559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.739581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.739604] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.739626] kthread+0x337/0x6f0 [ 13.739647] ? trace_preempt_on+0x20/0xc0 [ 13.739669] ? __pfx_kthread+0x10/0x10 [ 13.739691] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.739713] ? calculate_sigpending+0x7b/0xa0 [ 13.739734] ? __pfx_kthread+0x10/0x10 [ 13.739756] ret_from_fork+0x41/0x80 [ 13.739775] ? __pfx_kthread+0x10/0x10 [ 13.739797] ret_from_fork_asm+0x1a/0x30 [ 13.739828] </TASK> [ 13.739838] [ 13.747929] Allocated by task 281: [ 13.748122] kasan_save_stack+0x45/0x70 [ 13.748348] kasan_save_track+0x18/0x40 [ 13.748541] kasan_save_alloc_info+0x3b/0x50 [ 13.748744] __kasan_kmalloc+0xb7/0xc0 [ 13.748913] __kmalloc_cache_noprof+0x189/0x420 [ 13.749063] kasan_bitops_generic+0x92/0x1c0 [ 13.749206] kunit_try_run_case+0x1a5/0x480 [ 13.749359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.749671] kthread+0x337/0x6f0 [ 13.749844] ret_from_fork+0x41/0x80 [ 13.750025] ret_from_fork_asm+0x1a/0x30 [ 13.750218] [ 13.750396] The buggy address belongs to the object at ffff8881023f8300 [ 13.750396] which belongs to the cache kmalloc-16 of size 16 [ 13.750900] The buggy address is located 8 bytes inside of [ 13.750900] allocated 9-byte region [ffff8881023f8300, ffff8881023f8309) [ 13.751375] [ 13.751468] The buggy address belongs to the physical page: [ 13.751705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023f8 [ 13.751987] flags: 0x200000000000000(node=0|zone=2) [ 13.752192] page_type: f5(slab) [ 13.752370] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.752714] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.752998] page dumped because: kasan: bad access detected [ 13.753246] [ 13.753333] Memory state around the buggy address: [ 13.753497] ffff8881023f8200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.753806] ffff8881023f8280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.754083] >ffff8881023f8300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.754397] ^ [ 13.754535] ffff8881023f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.754853] ffff8881023f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.755085] ==================================================================
[ 23.845737] ================================================================== [ 23.846388] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 23.847183] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.847847] [ 23.847992] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.848019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.848027] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.848036] Call trace: [ 23.848042] show_stack+0x20/0x38 (C) [ 23.848059] dump_stack_lvl+0x8c/0xd0 [ 23.848074] print_report+0x118/0x608 [ 23.848090] kasan_report+0xdc/0x128 [ 23.848105] kasan_check_range+0x100/0x1a8 [ 23.848122] __kasan_check_write+0x20/0x30 [ 23.848138] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 23.848156] kasan_bitops_generic+0x11c/0x1c8 [ 23.848171] kunit_try_run_case+0x170/0x3f0 [ 23.848190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.848211] kthread+0x328/0x630 [ 23.848229] ret_from_fork+0x10/0x20 [ 23.848246] [ 23.854593] Allocated by task 315: [ 23.854904] kasan_save_stack+0x3c/0x68 [ 23.855258] kasan_save_track+0x20/0x40 [ 23.855611] kasan_save_alloc_info+0x40/0x58 [ 23.856004] __kasan_kmalloc+0xd4/0xd8 [ 23.856349] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.856769] kasan_bitops_generic+0xa0/0x1c8 [ 23.857160] kunit_try_run_case+0x170/0x3f0 [ 23.857547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.858049] kthread+0x328/0x630 [ 23.858352] ret_from_fork+0x10/0x20 [ 23.858683] [ 23.858827] The buggy address belongs to the object at ffff000001193200 [ 23.858827] which belongs to the cache kmalloc-16 of size 16 [ 23.859920] The buggy address is located 8 bytes inside of [ 23.859920] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.861008] [ 23.861151] The buggy address belongs to the physical page: [ 23.861651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.862353] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.862943] page_type: f5(slab) [ 23.863236] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.863930] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.864621] page dumped because: kasan: bad access detected [ 23.865121] [ 23.865263] Memory state around the buggy address: [ 23.865697] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.866344] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.866992] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.867636] ^ [ 23.867956] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.868603] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.869248] ================================================================== [ 23.966393] ================================================================== [ 23.967043] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 23.967844] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.968501] [ 23.968647] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.968672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.968680] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.968690] Call trace: [ 23.968695] show_stack+0x20/0x38 (C) [ 23.968712] dump_stack_lvl+0x8c/0xd0 [ 23.968727] print_report+0x118/0x608 [ 23.968743] kasan_report+0xdc/0x128 [ 23.968758] __asan_report_load8_noabort+0x20/0x30 [ 23.968776] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 23.968794] kasan_bitops_generic+0x11c/0x1c8 [ 23.968809] kunit_try_run_case+0x170/0x3f0 [ 23.968828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.968849] kthread+0x328/0x630 [ 23.968867] ret_from_fork+0x10/0x20 [ 23.968884] [ 23.974936] Allocated by task 315: [ 23.975248] kasan_save_stack+0x3c/0x68 [ 23.975602] kasan_save_track+0x20/0x40 [ 23.975956] kasan_save_alloc_info+0x40/0x58 [ 23.976349] __kasan_kmalloc+0xd4/0xd8 [ 23.976695] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.977114] kasan_bitops_generic+0xa0/0x1c8 [ 23.977506] kunit_try_run_case+0x170/0x3f0 [ 23.977893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.978395] kthread+0x328/0x630 [ 23.978699] ret_from_fork+0x10/0x20 [ 23.979031] [ 23.979173] The buggy address belongs to the object at ffff000001193200 [ 23.979173] which belongs to the cache kmalloc-16 of size 16 [ 23.980268] The buggy address is located 8 bytes inside of [ 23.980268] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.981358] [ 23.981500] The buggy address belongs to the physical page: [ 23.981999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.982701] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.983290] page_type: f5(slab) [ 23.983582] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.984276] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.984966] page dumped because: kasan: bad access detected [ 23.985467] [ 23.985609] Memory state around the buggy address: [ 23.986041] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.986689] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.987335] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.987980] ^ [ 23.988300] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.988947] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.989592] ================================================================== [ 23.869996] ================================================================== [ 23.870646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 23.871445] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.872102] [ 23.872247] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.872274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.872281] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.872290] Call trace: [ 23.872296] show_stack+0x20/0x38 (C) [ 23.872312] dump_stack_lvl+0x8c/0xd0 [ 23.872327] print_report+0x118/0x608 [ 23.872342] kasan_report+0xdc/0x128 [ 23.872357] __asan_report_load8_noabort+0x20/0x30 [ 23.872376] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 23.872393] kasan_bitops_generic+0x11c/0x1c8 [ 23.872408] kunit_try_run_case+0x170/0x3f0 [ 23.872426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.872447] kthread+0x328/0x630 [ 23.872465] ret_from_fork+0x10/0x20 [ 23.872482] [ 23.878535] Allocated by task 315: [ 23.878846] kasan_save_stack+0x3c/0x68 [ 23.879200] kasan_save_track+0x20/0x40 [ 23.879553] kasan_save_alloc_info+0x40/0x58 [ 23.879947] __kasan_kmalloc+0xd4/0xd8 [ 23.880292] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.880712] kasan_bitops_generic+0xa0/0x1c8 [ 23.881103] kunit_try_run_case+0x170/0x3f0 [ 23.881489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.881991] kthread+0x328/0x630 [ 23.882295] ret_from_fork+0x10/0x20 [ 23.882627] [ 23.882769] The buggy address belongs to the object at ffff000001193200 [ 23.882769] which belongs to the cache kmalloc-16 of size 16 [ 23.883863] The buggy address is located 8 bytes inside of [ 23.883863] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.884952] [ 23.885094] The buggy address belongs to the physical page: [ 23.885594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.886297] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.886886] page_type: f5(slab) [ 23.887179] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.887873] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.888564] page dumped because: kasan: bad access detected [ 23.889065] [ 23.889206] Memory state around the buggy address: [ 23.889639] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.890286] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.890934] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.891579] ^ [ 23.891899] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.892546] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.893191] ================================================================== [ 24.038037] ================================================================== [ 24.038676] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 24.039465] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 24.040110] [ 24.040248] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.040263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.040267] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.040272] Call trace: [ 24.040276] show_stack+0x20/0x38 (C) [ 24.040284] dump_stack_lvl+0x8c/0xd0 [ 24.040293] print_report+0x118/0x608 [ 24.040301] kasan_report+0xdc/0x128 [ 24.040310] __asan_report_load8_noabort+0x20/0x30 [ 24.040320] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 24.040330] kasan_bitops_generic+0x11c/0x1c8 [ 24.040338] kunit_try_run_case+0x170/0x3f0 [ 24.040349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.040361] kthread+0x328/0x630 [ 24.040370] ret_from_fork+0x10/0x20 [ 24.040380] [ 24.046399] Allocated by task 315: [ 24.046704] kasan_save_stack+0x3c/0x68 [ 24.047048] kasan_save_track+0x20/0x40 [ 24.047391] kasan_save_alloc_info+0x40/0x58 [ 24.047774] __kasan_kmalloc+0xd4/0xd8 [ 24.048111] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.048518] kasan_bitops_generic+0xa0/0x1c8 [ 24.048899] kunit_try_run_case+0x170/0x3f0 [ 24.049275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.049765] kthread+0x328/0x630 [ 24.050058] ret_from_fork+0x10/0x20 [ 24.050380] [ 24.050517] The buggy address belongs to the object at ffff000001193200 [ 24.050517] which belongs to the cache kmalloc-16 of size 16 [ 24.051599] The buggy address is located 8 bytes inside of [ 24.051599] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 24.052674] [ 24.052811] The buggy address belongs to the physical page: [ 24.053302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 24.053994] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.054571] page_type: f5(slab) [ 24.054855] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 24.055538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.056220] page dumped because: kasan: bad access detected [ 24.056712] [ 24.056850] Memory state around the buggy address: [ 24.057275] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.057912] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 24.058549] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.059185] ^ [ 24.059498] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.060135] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.060771] ================================================================== [ 23.893918] ================================================================== [ 23.894565] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 23.895365] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.896029] [ 23.896174] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.896200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.896208] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.896216] Call trace: [ 23.896222] show_stack+0x20/0x38 (C) [ 23.896238] dump_stack_lvl+0x8c/0xd0 [ 23.896253] print_report+0x118/0x608 [ 23.896269] kasan_report+0xdc/0x128 [ 23.896284] kasan_check_range+0x100/0x1a8 [ 23.896300] __kasan_check_write+0x20/0x30 [ 23.896317] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 23.896335] kasan_bitops_generic+0x11c/0x1c8 [ 23.896350] kunit_try_run_case+0x170/0x3f0 [ 23.896368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.896389] kthread+0x328/0x630 [ 23.896406] ret_from_fork+0x10/0x20 [ 23.896423] [ 23.902778] Allocated by task 315: [ 23.903088] kasan_save_stack+0x3c/0x68 [ 23.903443] kasan_save_track+0x20/0x40 [ 23.903796] kasan_save_alloc_info+0x40/0x58 [ 23.904190] __kasan_kmalloc+0xd4/0xd8 [ 23.904535] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.904954] kasan_bitops_generic+0xa0/0x1c8 [ 23.905346] kunit_try_run_case+0x170/0x3f0 [ 23.905732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.906234] kthread+0x328/0x630 [ 23.906537] ret_from_fork+0x10/0x20 [ 23.906869] [ 23.907011] The buggy address belongs to the object at ffff000001193200 [ 23.907011] which belongs to the cache kmalloc-16 of size 16 [ 23.908105] The buggy address is located 8 bytes inside of [ 23.908105] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.909194] [ 23.909337] The buggy address belongs to the physical page: [ 23.909836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.910538] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.911126] page_type: f5(slab) [ 23.911420] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.912114] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.912804] page dumped because: kasan: bad access detected [ 23.913305] [ 23.913446] Memory state around the buggy address: [ 23.913879] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.914526] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.915173] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.915819] ^ [ 23.916139] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.916786] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.917431] ================================================================== [ 23.990313] ================================================================== [ 23.990961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 23.991761] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.992425] [ 23.992570] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.992596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.992604] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.992612] Call trace: [ 23.992618] show_stack+0x20/0x38 (C) [ 23.992635] dump_stack_lvl+0x8c/0xd0 [ 23.992649] print_report+0x118/0x608 [ 23.992665] kasan_report+0xdc/0x128 [ 23.992680] kasan_check_range+0x100/0x1a8 [ 23.992696] __kasan_check_write+0x20/0x30 [ 23.992714] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 23.992731] kasan_bitops_generic+0x11c/0x1c8 [ 23.992746] kunit_try_run_case+0x170/0x3f0 [ 23.992765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.992785] kthread+0x328/0x630 [ 23.992803] ret_from_fork+0x10/0x20 [ 23.992820] [ 23.999174] Allocated by task 315: [ 23.999485] kasan_save_stack+0x3c/0x68 [ 23.999839] kasan_save_track+0x20/0x40 [ 24.000192] kasan_save_alloc_info+0x40/0x58 [ 24.000586] __kasan_kmalloc+0xd4/0xd8 [ 24.000932] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.001350] kasan_bitops_generic+0xa0/0x1c8 [ 24.001743] kunit_try_run_case+0x170/0x3f0 [ 24.002130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.002631] kthread+0x328/0x630 [ 24.002935] ret_from_fork+0x10/0x20 [ 24.003267] [ 24.003410] The buggy address belongs to the object at ffff000001193200 [ 24.003410] which belongs to the cache kmalloc-16 of size 16 [ 24.004504] The buggy address is located 8 bytes inside of [ 24.004504] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 24.005592] [ 24.005735] The buggy address belongs to the physical page: [ 24.006235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 24.006935] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.007524] page_type: f5(slab) [ 24.007818] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 24.008511] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.009201] page dumped because: kasan: bad access detected [ 24.009702] [ 24.009844] Memory state around the buggy address: [ 24.010277] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.010923] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 24.011570] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.012214] ^ [ 24.012535] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.013182] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.013826] ================================================================== [ 23.918183] ================================================================== [ 23.918831] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 23.919631] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.920288] [ 23.920434] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.920459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.920467] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.920476] Call trace: [ 23.920482] show_stack+0x20/0x38 (C) [ 23.920498] dump_stack_lvl+0x8c/0xd0 [ 23.920513] print_report+0x118/0x608 [ 23.920529] kasan_report+0xdc/0x128 [ 23.920544] __asan_report_load8_noabort+0x20/0x30 [ 23.920562] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 23.920580] kasan_bitops_generic+0x11c/0x1c8 [ 23.920594] kunit_try_run_case+0x170/0x3f0 [ 23.920612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.920633] kthread+0x328/0x630 [ 23.920651] ret_from_fork+0x10/0x20 [ 23.920668] [ 23.926719] Allocated by task 315: [ 23.927031] kasan_save_stack+0x3c/0x68 [ 23.927385] kasan_save_track+0x20/0x40 [ 23.927738] kasan_save_alloc_info+0x40/0x58 [ 23.928132] __kasan_kmalloc+0xd4/0xd8 [ 23.928477] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.928896] kasan_bitops_generic+0xa0/0x1c8 [ 23.929287] kunit_try_run_case+0x170/0x3f0 [ 23.929674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.930176] kthread+0x328/0x630 [ 23.930479] ret_from_fork+0x10/0x20 [ 23.930811] [ 23.930954] The buggy address belongs to the object at ffff000001193200 [ 23.930954] which belongs to the cache kmalloc-16 of size 16 [ 23.932048] The buggy address is located 8 bytes inside of [ 23.932048] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.933137] [ 23.933279] The buggy address belongs to the physical page: [ 23.933778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.934479] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.935067] page_type: f5(slab) [ 23.935361] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.936054] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.936744] page dumped because: kasan: bad access detected [ 23.937245] [ 23.937387] Memory state around the buggy address: [ 23.937820] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.938466] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.939114] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.939759] ^ [ 23.940079] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.940726] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.941371] ================================================================== [ 24.014638] ================================================================== [ 24.015277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 24.016066] Read of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 24.016712] [ 24.016850] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 24.016865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.016869] Hardware name: Radxa ROCK Pi 4B (DT) [ 24.016875] Call trace: [ 24.016878] show_stack+0x20/0x38 (C) [ 24.016887] dump_stack_lvl+0x8c/0xd0 [ 24.016896] print_report+0x118/0x608 [ 24.016904] kasan_report+0xdc/0x128 [ 24.016913] __asan_report_load8_noabort+0x20/0x30 [ 24.016923] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 24.016933] kasan_bitops_generic+0x11c/0x1c8 [ 24.016941] kunit_try_run_case+0x170/0x3f0 [ 24.016952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.016963] kthread+0x328/0x630 [ 24.016974] ret_from_fork+0x10/0x20 [ 24.016983] [ 24.023000] Allocated by task 315: [ 24.023304] kasan_save_stack+0x3c/0x68 [ 24.023650] kasan_save_track+0x20/0x40 [ 24.023993] kasan_save_alloc_info+0x40/0x58 [ 24.024376] __kasan_kmalloc+0xd4/0xd8 [ 24.024713] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.025120] kasan_bitops_generic+0xa0/0x1c8 [ 24.025502] kunit_try_run_case+0x170/0x3f0 [ 24.025879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.026370] kthread+0x328/0x630 [ 24.026663] ret_from_fork+0x10/0x20 [ 24.026985] [ 24.027123] The buggy address belongs to the object at ffff000001193200 [ 24.027123] which belongs to the cache kmalloc-16 of size 16 [ 24.028206] The buggy address is located 8 bytes inside of [ 24.028206] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 24.029282] [ 24.029419] The buggy address belongs to the physical page: [ 24.029911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 24.030603] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 24.031181] page_type: f5(slab) [ 24.031465] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 24.032149] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.032831] page dumped because: kasan: bad access detected [ 24.033322] [ 24.033460] Memory state around the buggy address: [ 24.033886] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.034523] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 24.035160] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.035796] ^ [ 24.036108] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.036745] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.037381] ================================================================== [ 23.942128] ================================================================== [ 23.942776] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 23.943576] Write of size 8 at addr ffff000001193208 by task kunit_try_catch/315 [ 23.944240] [ 23.944385] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 23.944411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.944419] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.944428] Call trace: [ 23.944434] show_stack+0x20/0x38 (C) [ 23.944450] dump_stack_lvl+0x8c/0xd0 [ 23.944465] print_report+0x118/0x608 [ 23.944480] kasan_report+0xdc/0x128 [ 23.944495] kasan_check_range+0x100/0x1a8 [ 23.944512] __kasan_check_write+0x20/0x30 [ 23.944530] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 23.944547] kasan_bitops_generic+0x11c/0x1c8 [ 23.944562] kunit_try_run_case+0x170/0x3f0 [ 23.944581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.944602] kthread+0x328/0x630 [ 23.944619] ret_from_fork+0x10/0x20 [ 23.944636] [ 23.950988] Allocated by task 315: [ 23.951299] kasan_save_stack+0x3c/0x68 [ 23.951653] kasan_save_track+0x20/0x40 [ 23.952007] kasan_save_alloc_info+0x40/0x58 [ 23.952401] __kasan_kmalloc+0xd4/0xd8 [ 23.952747] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.953166] kasan_bitops_generic+0xa0/0x1c8 [ 23.953557] kunit_try_run_case+0x170/0x3f0 [ 23.953944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.954446] kthread+0x328/0x630 [ 23.954750] ret_from_fork+0x10/0x20 [ 23.955082] [ 23.955224] The buggy address belongs to the object at ffff000001193200 [ 23.955224] which belongs to the cache kmalloc-16 of size 16 [ 23.956318] The buggy address is located 8 bytes inside of [ 23.956318] allocated 9-byte region [ffff000001193200, ffff000001193209) [ 23.957407] [ 23.957550] The buggy address belongs to the physical page: [ 23.958050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1193 [ 23.958751] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.959340] page_type: f5(slab) [ 23.959633] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 23.960327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.961017] page dumped because: kasan: bad access detected [ 23.961517] [ 23.961659] Memory state around the buggy address: [ 23.962092] ffff000001193100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.962739] ffff000001193180: fa fb fc fc fa fb fc fc 00 06 fc fc 00 05 fc fc [ 23.963387] >ffff000001193200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.964032] ^ [ 23.964351] ffff000001193280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.964999] ffff000001193300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.965643] ==================================================================