Date
April 22, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 20.471198] ================================================================== [ 20.471333] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 20.471488] Read of size 8 at addr fff00000c40d2888 by task kunit_try_catch/263 [ 20.471617] [ 20.471837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.471894] Hardware name: linux,dummy-virt (DT) [ 20.472246] print_report+0x118/0x608 [ 20.472674] __asan_report_load8_noabort+0x20/0x30 [ 20.473485] kunit_try_run_case+0x170/0x3f0 [ 20.473763] kthread+0x328/0x630 [ 20.475442] [ 20.476638] __kasan_kmalloc+0xd4/0xd8 [ 20.476847] kasan_bitops_generic+0xa0/0x1c8 [ 20.477278] [ 20.477881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.477985] page_type: f5(slab) [ 20.478137] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.478295] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.478588] Memory state around the buggy address: [ 20.479647] >fff00000c40d2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.479813] fff00000c40d2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.480713] ==================================================================
[ 21.537034] ================================================================== [ 21.537667] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.538398] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.539563] [ 21.539835] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.539966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.540004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.540062] Call Trace: [ 21.540114] <TASK> [ 21.540162] dump_stack_lvl+0x73/0xb0 [ 21.540241] print_report+0xd1/0x650 [ 21.540322] ? __virt_addr_valid+0x1db/0x2d0 [ 21.540398] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.540482] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.540583] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.540670] kasan_report+0x141/0x180 [ 21.540748] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.540847] kasan_check_range+0x10c/0x1c0 [ 21.540931] __kasan_check_write+0x18/0x20 [ 21.541006] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.541090] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.541175] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.541259] ? trace_hardirqs_on+0x37/0xe0 [ 21.541330] ? kasan_bitops_generic+0x92/0x1c0 [ 21.541370] kasan_bitops_generic+0x116/0x1c0 [ 21.541401] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.541475] ? __pfx_read_tsc+0x10/0x10 [ 21.541587] ? ktime_get_ts64+0x86/0x230 [ 21.541632] kunit_try_run_case+0x1a5/0x480 [ 21.541670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.541702] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.541738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.541772] ? __kthread_parkme+0x82/0x180 [ 21.541804] ? preempt_count_sub+0x50/0x80 [ 21.541840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.541876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.541910] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.541943] kthread+0x337/0x6f0 [ 21.541973] ? trace_preempt_on+0x20/0xc0 [ 21.542006] ? __pfx_kthread+0x10/0x10 [ 21.542038] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.542069] ? calculate_sigpending+0x7b/0xa0 [ 21.542101] ? __pfx_kthread+0x10/0x10 [ 21.542132] ret_from_fork+0x41/0x80 [ 21.542163] ? __pfx_kthread+0x10/0x10 [ 21.542194] ret_from_fork_asm+0x1a/0x30 [ 21.542239] </TASK> [ 21.542252] [ 21.562060] Allocated by task 281: [ 21.562587] kasan_save_stack+0x45/0x70 [ 21.563016] kasan_save_track+0x18/0x40 [ 21.563443] kasan_save_alloc_info+0x3b/0x50 [ 21.563936] __kasan_kmalloc+0xb7/0xc0 [ 21.564352] __kmalloc_cache_noprof+0x189/0x420 [ 21.564918] kasan_bitops_generic+0x92/0x1c0 [ 21.565242] kunit_try_run_case+0x1a5/0x480 [ 21.565786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.566326] kthread+0x337/0x6f0 [ 21.567551] ret_from_fork+0x41/0x80 [ 21.567996] ret_from_fork_asm+0x1a/0x30 [ 21.568542] [ 21.568789] The buggy address belongs to the object at ffff8881017113c0 [ 21.568789] which belongs to the cache kmalloc-16 of size 16 [ 21.569987] The buggy address is located 8 bytes inside of [ 21.569987] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.571096] [ 21.571334] The buggy address belongs to the physical page: [ 21.571946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.573199] flags: 0x200000000000000(node=0|zone=2) [ 21.573738] page_type: f5(slab) [ 21.574142] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.574723] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.575829] page dumped because: kasan: bad access detected [ 21.576315] [ 21.576740] Memory state around the buggy address: [ 21.577184] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.577975] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.578788] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.579405] ^ [ 21.580696] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.581284] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.581870] ================================================================== [ 21.583290] ================================================================== [ 21.583940] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.584884] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.585508] [ 21.585827] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.586077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.586114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.586172] Call Trace: [ 21.586222] <TASK> [ 21.586275] dump_stack_lvl+0x73/0xb0 [ 21.586393] print_report+0xd1/0x650 [ 21.586629] ? __virt_addr_valid+0x1db/0x2d0 [ 21.586745] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.586832] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.586908] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.586992] kasan_report+0x141/0x180 [ 21.587107] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.587211] kasan_check_range+0x10c/0x1c0 [ 21.587293] __kasan_check_write+0x18/0x20 [ 21.587356] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.587400] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.587567] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.587609] ? trace_hardirqs_on+0x37/0xe0 [ 21.587643] ? kasan_bitops_generic+0x92/0x1c0 [ 21.587676] kasan_bitops_generic+0x116/0x1c0 [ 21.587706] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.587740] ? __pfx_read_tsc+0x10/0x10 [ 21.587769] ? ktime_get_ts64+0x86/0x230 [ 21.587803] kunit_try_run_case+0x1a5/0x480 [ 21.587838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.587867] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.587902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.587934] ? __kthread_parkme+0x82/0x180 [ 21.587966] ? preempt_count_sub+0x50/0x80 [ 21.588001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.588035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.588066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.588099] kthread+0x337/0x6f0 [ 21.588128] ? trace_preempt_on+0x20/0xc0 [ 21.588160] ? __pfx_kthread+0x10/0x10 [ 21.588190] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.588221] ? calculate_sigpending+0x7b/0xa0 [ 21.588250] ? __pfx_kthread+0x10/0x10 [ 21.588281] ret_from_fork+0x41/0x80 [ 21.588310] ? __pfx_kthread+0x10/0x10 [ 21.588340] ret_from_fork_asm+0x1a/0x30 [ 21.588384] </TASK> [ 21.588398] [ 21.612702] Allocated by task 281: [ 21.613097] kasan_save_stack+0x45/0x70 [ 21.614097] kasan_save_track+0x18/0x40 [ 21.615122] kasan_save_alloc_info+0x3b/0x50 [ 21.615679] __kasan_kmalloc+0xb7/0xc0 [ 21.616016] __kmalloc_cache_noprof+0x189/0x420 [ 21.616369] kasan_bitops_generic+0x92/0x1c0 [ 21.617453] kunit_try_run_case+0x1a5/0x480 [ 21.618179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.618886] kthread+0x337/0x6f0 [ 21.619158] ret_from_fork+0x41/0x80 [ 21.619950] ret_from_fork_asm+0x1a/0x30 [ 21.620537] [ 21.620993] The buggy address belongs to the object at ffff8881017113c0 [ 21.620993] which belongs to the cache kmalloc-16 of size 16 [ 21.622656] The buggy address is located 8 bytes inside of [ 21.622656] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.623431] [ 21.624078] The buggy address belongs to the physical page: [ 21.624730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.625892] flags: 0x200000000000000(node=0|zone=2) [ 21.626344] page_type: f5(slab) [ 21.627034] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.628287] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.629045] page dumped because: kasan: bad access detected [ 21.629612] [ 21.629857] Memory state around the buggy address: [ 21.630286] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.631518] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.632645] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.633157] ^ [ 21.634139] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.634757] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.635743] ================================================================== [ 21.373278] ================================================================== [ 21.374099] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.375146] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.375905] [ 21.376221] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.376623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.376664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.376723] Call Trace: [ 21.376759] <TASK> [ 21.376809] dump_stack_lvl+0x73/0xb0 [ 21.376891] print_report+0xd1/0x650 [ 21.376975] ? __virt_addr_valid+0x1db/0x2d0 [ 21.377063] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.377215] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.377299] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.377386] kasan_report+0x141/0x180 [ 21.377669] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.377916] kasan_check_range+0x10c/0x1c0 [ 21.378031] __kasan_check_write+0x18/0x20 [ 21.378106] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.378188] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.378269] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.378316] ? trace_hardirqs_on+0x37/0xe0 [ 21.378352] ? kasan_bitops_generic+0x92/0x1c0 [ 21.378388] kasan_bitops_generic+0x116/0x1c0 [ 21.378444] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.378550] ? __pfx_read_tsc+0x10/0x10 [ 21.378613] ? ktime_get_ts64+0x86/0x230 [ 21.378675] kunit_try_run_case+0x1a5/0x480 [ 21.378736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.378792] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.378856] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.378919] ? __kthread_parkme+0x82/0x180 [ 21.378975] ? preempt_count_sub+0x50/0x80 [ 21.379040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.379099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.379156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.379221] kthread+0x337/0x6f0 [ 21.379280] ? trace_preempt_on+0x20/0xc0 [ 21.379342] ? __pfx_kthread+0x10/0x10 [ 21.379407] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.379528] ? calculate_sigpending+0x7b/0xa0 [ 21.379611] ? __pfx_kthread+0x10/0x10 [ 21.379664] ret_from_fork+0x41/0x80 [ 21.379698] ? __pfx_kthread+0x10/0x10 [ 21.379730] ret_from_fork_asm+0x1a/0x30 [ 21.379776] </TASK> [ 21.379790] [ 21.402768] Allocated by task 281: [ 21.403206] kasan_save_stack+0x45/0x70 [ 21.404164] kasan_save_track+0x18/0x40 [ 21.404779] kasan_save_alloc_info+0x3b/0x50 [ 21.405130] __kasan_kmalloc+0xb7/0xc0 [ 21.405793] __kmalloc_cache_noprof+0x189/0x420 [ 21.406238] kasan_bitops_generic+0x92/0x1c0 [ 21.406860] kunit_try_run_case+0x1a5/0x480 [ 21.407307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.407983] kthread+0x337/0x6f0 [ 21.408344] ret_from_fork+0x41/0x80 [ 21.409244] ret_from_fork_asm+0x1a/0x30 [ 21.409707] [ 21.410120] The buggy address belongs to the object at ffff8881017113c0 [ 21.410120] which belongs to the cache kmalloc-16 of size 16 [ 21.411207] The buggy address is located 8 bytes inside of [ 21.411207] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.413156] [ 21.413936] The buggy address belongs to the physical page: [ 21.415028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.416233] flags: 0x200000000000000(node=0|zone=2) [ 21.417008] page_type: f5(slab) [ 21.417271] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.417997] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.419619] page dumped because: kasan: bad access detected [ 21.420261] [ 21.420439] Memory state around the buggy address: [ 21.421058] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.422138] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.422550] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.423914] ^ [ 21.424422] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.425247] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.426337] ================================================================== [ 21.688106] ================================================================== [ 21.688780] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.689808] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.690350] [ 21.691316] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.691471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.692003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.692126] Call Trace: [ 21.692152] <TASK> [ 21.692196] dump_stack_lvl+0x73/0xb0 [ 21.692281] print_report+0xd1/0x650 [ 21.692359] ? __virt_addr_valid+0x1db/0x2d0 [ 21.692438] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.692562] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.692641] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.692724] kasan_report+0x141/0x180 [ 21.692801] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.692897] kasan_check_range+0x10c/0x1c0 [ 21.692977] __kasan_check_write+0x18/0x20 [ 21.693020] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.693060] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.693099] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.693130] ? trace_hardirqs_on+0x37/0xe0 [ 21.693163] ? kasan_bitops_generic+0x92/0x1c0 [ 21.693195] kasan_bitops_generic+0x116/0x1c0 [ 21.693223] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.693253] ? __pfx_read_tsc+0x10/0x10 [ 21.693279] ? ktime_get_ts64+0x86/0x230 [ 21.693313] kunit_try_run_case+0x1a5/0x480 [ 21.693345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.693375] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.693409] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.693525] ? __kthread_parkme+0x82/0x180 [ 21.693622] ? preempt_count_sub+0x50/0x80 [ 21.693697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.693770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.693847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.693911] kthread+0x337/0x6f0 [ 21.693976] ? trace_preempt_on+0x20/0xc0 [ 21.694052] ? __pfx_kthread+0x10/0x10 [ 21.694125] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.694181] ? calculate_sigpending+0x7b/0xa0 [ 21.694214] ? __pfx_kthread+0x10/0x10 [ 21.694247] ret_from_fork+0x41/0x80 [ 21.694277] ? __pfx_kthread+0x10/0x10 [ 21.694308] ret_from_fork_asm+0x1a/0x30 [ 21.694352] </TASK> [ 21.694365] [ 21.718324] Allocated by task 281: [ 21.719225] kasan_save_stack+0x45/0x70 [ 21.719636] kasan_save_track+0x18/0x40 [ 21.720060] kasan_save_alloc_info+0x3b/0x50 [ 21.720428] __kasan_kmalloc+0xb7/0xc0 [ 21.721292] __kmalloc_cache_noprof+0x189/0x420 [ 21.722014] kasan_bitops_generic+0x92/0x1c0 [ 21.722351] kunit_try_run_case+0x1a5/0x480 [ 21.723592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.724178] kthread+0x337/0x6f0 [ 21.724881] ret_from_fork+0x41/0x80 [ 21.725517] ret_from_fork_asm+0x1a/0x30 [ 21.726240] [ 21.726481] The buggy address belongs to the object at ffff8881017113c0 [ 21.726481] which belongs to the cache kmalloc-16 of size 16 [ 21.728231] The buggy address is located 8 bytes inside of [ 21.728231] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.730013] [ 21.730187] The buggy address belongs to the physical page: [ 21.731099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.731817] flags: 0x200000000000000(node=0|zone=2) [ 21.732250] page_type: f5(slab) [ 21.732681] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.733906] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.735110] page dumped because: kasan: bad access detected [ 21.735521] [ 21.736078] Memory state around the buggy address: [ 21.736786] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.737290] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.738154] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.738984] ^ [ 21.739406] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.740547] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.741274] ================================================================== [ 21.482101] ================================================================== [ 21.482656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.483857] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.485435] [ 21.485895] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.486026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.486045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.486078] Call Trace: [ 21.486107] <TASK> [ 21.486140] dump_stack_lvl+0x73/0xb0 [ 21.486223] print_report+0xd1/0x650 [ 21.486265] ? __virt_addr_valid+0x1db/0x2d0 [ 21.486298] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.486338] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.486370] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.486409] kasan_report+0x141/0x180 [ 21.486807] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.486892] kasan_check_range+0x10c/0x1c0 [ 21.486957] __kasan_check_write+0x18/0x20 [ 21.487010] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.487073] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.487138] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.487196] ? trace_hardirqs_on+0x37/0xe0 [ 21.487287] ? kasan_bitops_generic+0x92/0x1c0 [ 21.487562] kasan_bitops_generic+0x116/0x1c0 [ 21.487606] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.487639] ? __pfx_read_tsc+0x10/0x10 [ 21.487669] ? ktime_get_ts64+0x86/0x230 [ 21.487707] kunit_try_run_case+0x1a5/0x480 [ 21.487742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.487773] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.487810] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.487845] ? __kthread_parkme+0x82/0x180 [ 21.487876] ? preempt_count_sub+0x50/0x80 [ 21.487914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.487950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.487983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.488016] kthread+0x337/0x6f0 [ 21.488045] ? trace_preempt_on+0x20/0xc0 [ 21.488078] ? __pfx_kthread+0x10/0x10 [ 21.488109] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.488140] ? calculate_sigpending+0x7b/0xa0 [ 21.488172] ? __pfx_kthread+0x10/0x10 [ 21.488205] ret_from_fork+0x41/0x80 [ 21.488235] ? __pfx_kthread+0x10/0x10 [ 21.488271] ret_from_fork_asm+0x1a/0x30 [ 21.488317] </TASK> [ 21.488331] [ 21.510065] Allocated by task 281: [ 21.511128] kasan_save_stack+0x45/0x70 [ 21.511745] kasan_save_track+0x18/0x40 [ 21.512195] kasan_save_alloc_info+0x3b/0x50 [ 21.512787] __kasan_kmalloc+0xb7/0xc0 [ 21.513181] __kmalloc_cache_noprof+0x189/0x420 [ 21.513862] kasan_bitops_generic+0x92/0x1c0 [ 21.514277] kunit_try_run_case+0x1a5/0x480 [ 21.514921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.515515] kthread+0x337/0x6f0 [ 21.516321] ret_from_fork+0x41/0x80 [ 21.516770] ret_from_fork_asm+0x1a/0x30 [ 21.517348] [ 21.517616] The buggy address belongs to the object at ffff8881017113c0 [ 21.517616] which belongs to the cache kmalloc-16 of size 16 [ 21.519187] The buggy address is located 8 bytes inside of [ 21.519187] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.522376] [ 21.522786] The buggy address belongs to the physical page: [ 21.523717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.524121] flags: 0x200000000000000(node=0|zone=2) [ 21.524410] page_type: f5(slab) [ 21.525042] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.527074] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.528370] page dumped because: kasan: bad access detected [ 21.529228] [ 21.529613] Memory state around the buggy address: [ 21.529973] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.530328] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.532133] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.533063] ^ [ 21.533835] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.534793] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.535867] ================================================================== [ 21.636759] ================================================================== [ 21.637314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.639646] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.640869] [ 21.641371] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.641722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.641760] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.641820] Call Trace: [ 21.641867] <TASK> [ 21.641987] dump_stack_lvl+0x73/0xb0 [ 21.642049] print_report+0xd1/0x650 [ 21.642116] ? __virt_addr_valid+0x1db/0x2d0 [ 21.642150] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.642190] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.642224] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.642262] kasan_report+0x141/0x180 [ 21.642295] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.642341] kasan_check_range+0x10c/0x1c0 [ 21.642375] __kasan_check_write+0x18/0x20 [ 21.642402] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.642469] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.642545] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.642580] ? trace_hardirqs_on+0x37/0xe0 [ 21.642613] ? kasan_bitops_generic+0x92/0x1c0 [ 21.642648] kasan_bitops_generic+0x116/0x1c0 [ 21.642678] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.642709] ? __pfx_read_tsc+0x10/0x10 [ 21.642738] ? ktime_get_ts64+0x86/0x230 [ 21.642775] kunit_try_run_case+0x1a5/0x480 [ 21.642810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.642840] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.642876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.642912] ? __kthread_parkme+0x82/0x180 [ 21.642942] ? preempt_count_sub+0x50/0x80 [ 21.642978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.643011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.643044] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.643077] kthread+0x337/0x6f0 [ 21.643107] ? trace_preempt_on+0x20/0xc0 [ 21.643139] ? __pfx_kthread+0x10/0x10 [ 21.643171] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.643203] ? calculate_sigpending+0x7b/0xa0 [ 21.643233] ? __pfx_kthread+0x10/0x10 [ 21.643266] ret_from_fork+0x41/0x80 [ 21.643296] ? __pfx_kthread+0x10/0x10 [ 21.643328] ret_from_fork_asm+0x1a/0x30 [ 21.643373] </TASK> [ 21.643386] [ 21.668929] Allocated by task 281: [ 21.669674] kasan_save_stack+0x45/0x70 [ 21.670156] kasan_save_track+0x18/0x40 [ 21.670682] kasan_save_alloc_info+0x3b/0x50 [ 21.671086] __kasan_kmalloc+0xb7/0xc0 [ 21.671555] __kmalloc_cache_noprof+0x189/0x420 [ 21.671986] kasan_bitops_generic+0x92/0x1c0 [ 21.672557] kunit_try_run_case+0x1a5/0x480 [ 21.672976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.673684] kthread+0x337/0x6f0 [ 21.674063] ret_from_fork+0x41/0x80 [ 21.674548] ret_from_fork_asm+0x1a/0x30 [ 21.675016] [ 21.675299] The buggy address belongs to the object at ffff8881017113c0 [ 21.675299] which belongs to the cache kmalloc-16 of size 16 [ 21.676308] The buggy address is located 8 bytes inside of [ 21.676308] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.677227] [ 21.677638] The buggy address belongs to the physical page: [ 21.678135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.678768] flags: 0x200000000000000(node=0|zone=2) [ 21.679283] page_type: f5(slab) [ 21.679904] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.680695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.681157] page dumped because: kasan: bad access detected [ 21.681761] [ 21.681986] Memory state around the buggy address: [ 21.682586] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.683357] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.684060] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.684715] ^ [ 21.685088] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.685774] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.686464] ================================================================== [ 21.427885] ================================================================== [ 21.428447] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.430024] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.430542] [ 21.431419] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.431631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.431653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.431684] Call Trace: [ 21.431710] <TASK> [ 21.431731] dump_stack_lvl+0x73/0xb0 [ 21.431770] print_report+0xd1/0x650 [ 21.431805] ? __virt_addr_valid+0x1db/0x2d0 [ 21.431836] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.431874] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.431909] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.431948] kasan_report+0x141/0x180 [ 21.431981] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.432027] kasan_check_range+0x10c/0x1c0 [ 21.432063] __kasan_check_write+0x18/0x20 [ 21.432091] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.432133] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.432174] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.432205] ? trace_hardirqs_on+0x37/0xe0 [ 21.432238] ? kasan_bitops_generic+0x92/0x1c0 [ 21.432274] kasan_bitops_generic+0x116/0x1c0 [ 21.432302] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.432334] ? __pfx_read_tsc+0x10/0x10 [ 21.432363] ? ktime_get_ts64+0x86/0x230 [ 21.432400] kunit_try_run_case+0x1a5/0x480 [ 21.432536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.432616] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.432691] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.432765] ? __kthread_parkme+0x82/0x180 [ 21.432829] ? preempt_count_sub+0x50/0x80 [ 21.432905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.432982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.433021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.433053] kthread+0x337/0x6f0 [ 21.433084] ? trace_preempt_on+0x20/0xc0 [ 21.433115] ? __pfx_kthread+0x10/0x10 [ 21.433148] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.433179] ? calculate_sigpending+0x7b/0xa0 [ 21.433212] ? __pfx_kthread+0x10/0x10 [ 21.433244] ret_from_fork+0x41/0x80 [ 21.433273] ? __pfx_kthread+0x10/0x10 [ 21.433338] ret_from_fork_asm+0x1a/0x30 [ 21.433548] </TASK> [ 21.433588] [ 21.457258] Allocated by task 281: [ 21.458498] kasan_save_stack+0x45/0x70 [ 21.458953] kasan_save_track+0x18/0x40 [ 21.459269] kasan_save_alloc_info+0x3b/0x50 [ 21.460215] __kasan_kmalloc+0xb7/0xc0 [ 21.461094] __kmalloc_cache_noprof+0x189/0x420 [ 21.461979] kasan_bitops_generic+0x92/0x1c0 [ 21.462345] kunit_try_run_case+0x1a5/0x480 [ 21.462991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.463514] kthread+0x337/0x6f0 [ 21.464052] ret_from_fork+0x41/0x80 [ 21.464401] ret_from_fork_asm+0x1a/0x30 [ 21.465278] [ 21.465826] The buggy address belongs to the object at ffff8881017113c0 [ 21.465826] which belongs to the cache kmalloc-16 of size 16 [ 21.467185] The buggy address is located 8 bytes inside of [ 21.467185] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.468467] [ 21.468832] The buggy address belongs to the physical page: [ 21.469717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.471260] flags: 0x200000000000000(node=0|zone=2) [ 21.472068] page_type: f5(slab) [ 21.472909] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.473818] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.474339] page dumped because: kasan: bad access detected [ 21.475184] [ 21.475374] Memory state around the buggy address: [ 21.476064] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.476593] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.477306] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.478818] ^ [ 21.479250] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.480111] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.481044] ================================================================== [ 21.323996] ================================================================== [ 21.324762] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.325469] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.326033] [ 21.326307] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.326444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.326482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.326893] Call Trace: [ 21.326937] <TASK> [ 21.326992] dump_stack_lvl+0x73/0xb0 [ 21.327083] print_report+0xd1/0x650 [ 21.327162] ? __virt_addr_valid+0x1db/0x2d0 [ 21.327245] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.327329] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.327408] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.327657] kasan_report+0x141/0x180 [ 21.327739] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.327839] kasan_check_range+0x10c/0x1c0 [ 21.327922] __kasan_check_write+0x18/0x20 [ 21.327998] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.328082] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.328136] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.328170] ? trace_hardirqs_on+0x37/0xe0 [ 21.328208] ? kasan_bitops_generic+0x92/0x1c0 [ 21.328244] kasan_bitops_generic+0x116/0x1c0 [ 21.328272] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.328305] ? __pfx_read_tsc+0x10/0x10 [ 21.328337] ? ktime_get_ts64+0x86/0x230 [ 21.328376] kunit_try_run_case+0x1a5/0x480 [ 21.328433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.328571] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.328619] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.328654] ? __kthread_parkme+0x82/0x180 [ 21.328686] ? preempt_count_sub+0x50/0x80 [ 21.328723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.328756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.328787] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.328818] kthread+0x337/0x6f0 [ 21.328849] ? trace_preempt_on+0x20/0xc0 [ 21.328881] ? __pfx_kthread+0x10/0x10 [ 21.328912] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.328942] ? calculate_sigpending+0x7b/0xa0 [ 21.328973] ? __pfx_kthread+0x10/0x10 [ 21.329003] ret_from_fork+0x41/0x80 [ 21.329032] ? __pfx_kthread+0x10/0x10 [ 21.329063] ret_from_fork_asm+0x1a/0x30 [ 21.329107] </TASK> [ 21.329121] [ 21.351342] Allocated by task 281: [ 21.351676] kasan_save_stack+0x45/0x70 [ 21.352036] kasan_save_track+0x18/0x40 [ 21.353764] kasan_save_alloc_info+0x3b/0x50 [ 21.354231] __kasan_kmalloc+0xb7/0xc0 [ 21.354963] __kmalloc_cache_noprof+0x189/0x420 [ 21.355963] kasan_bitops_generic+0x92/0x1c0 [ 21.356142] kunit_try_run_case+0x1a5/0x480 [ 21.356309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.357301] kthread+0x337/0x6f0 [ 21.357841] ret_from_fork+0x41/0x80 [ 21.358731] ret_from_fork_asm+0x1a/0x30 [ 21.359330] [ 21.359550] The buggy address belongs to the object at ffff8881017113c0 [ 21.359550] which belongs to the cache kmalloc-16 of size 16 [ 21.360472] The buggy address is located 8 bytes inside of [ 21.360472] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.361241] [ 21.361477] The buggy address belongs to the physical page: [ 21.362219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.362936] flags: 0x200000000000000(node=0|zone=2) [ 21.363650] page_type: f5(slab) [ 21.363963] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.364677] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.365235] page dumped because: kasan: bad access detected [ 21.365746] [ 21.365977] Memory state around the buggy address: [ 21.366340] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.367038] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.367611] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.369263] ^ [ 21.370214] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.370973] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.371382] ==================================================================
[ 22.154540] ================================================================== [ 22.155193] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 22.155938] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.156599] [ 22.156748] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.156780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.156789] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.156800] Call trace: [ 22.156807] show_stack+0x20/0x38 (C) [ 22.156827] dump_stack_lvl+0x8c/0xd0 [ 22.156846] print_report+0x118/0x608 [ 22.156865] kasan_report+0xdc/0x128 [ 22.156884] __asan_report_load8_noabort+0x20/0x30 [ 22.156906] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 22.156932] kasan_bitops_generic+0x110/0x1c8 [ 22.156951] kunit_try_run_case+0x170/0x3f0 [ 22.156973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.156999] kthread+0x328/0x630 [ 22.157020] ret_from_fork+0x10/0x20 [ 22.157041] [ 22.163048] Allocated by task 319: [ 22.163363] kasan_save_stack+0x3c/0x68 [ 22.163724] kasan_save_track+0x20/0x40 [ 22.164082] kasan_save_alloc_info+0x40/0x58 [ 22.164481] __kasan_kmalloc+0xd4/0xd8 [ 22.164830] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.165254] kasan_bitops_generic+0xa0/0x1c8 [ 22.165650] kunit_try_run_case+0x170/0x3f0 [ 22.166044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.166552] kthread+0x328/0x630 [ 22.166861] ret_from_fork+0x10/0x20 [ 22.167199] [ 22.167345] The buggy address belongs to the object at ffff00000a7446c0 [ 22.167345] which belongs to the cache kmalloc-16 of size 16 [ 22.168446] The buggy address is located 8 bytes inside of [ 22.168446] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.169541] [ 22.169688] The buggy address belongs to the physical page: [ 22.170191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.170899] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.171493] page_type: f5(slab) [ 22.171791] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.172491] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.173186] page dumped because: kasan: bad access detected [ 22.173690] [ 22.173836] Memory state around the buggy address: [ 22.174274] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.174927] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.175579] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.176229] ^ [ 22.176735] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.177388] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.178038] ================================================================== [ 21.957544] ================================================================== [ 21.958221] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 21.958998] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 21.959667] [ 21.959824] CPU: 3 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.959862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.959874] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.959887] Call trace: [ 21.959897] show_stack+0x20/0x38 (C) [ 21.959921] dump_stack_lvl+0x8c/0xd0 [ 21.959945] print_report+0x118/0x608 [ 21.959967] kasan_report+0xdc/0x128 [ 21.959988] __asan_report_load8_noabort+0x20/0x30 [ 21.960012] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 21.960040] kasan_bitops_generic+0x110/0x1c8 [ 21.960061] kunit_try_run_case+0x170/0x3f0 [ 21.960088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.960118] kthread+0x328/0x630 [ 21.960143] ret_from_fork+0x10/0x20 [ 21.960168] [ 21.966189] Allocated by task 319: [ 21.966507] kasan_save_stack+0x3c/0x68 [ 21.966869] kasan_save_track+0x20/0x40 [ 21.967231] kasan_save_alloc_info+0x40/0x58 [ 21.967633] __kasan_kmalloc+0xd4/0xd8 [ 21.967986] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.968414] kasan_bitops_generic+0xa0/0x1c8 [ 21.968813] kunit_try_run_case+0x170/0x3f0 [ 21.969209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.969719] kthread+0x328/0x630 [ 21.970030] ret_from_fork+0x10/0x20 [ 21.970371] [ 21.970518] The buggy address belongs to the object at ffff00000a7446c0 [ 21.970518] which belongs to the cache kmalloc-16 of size 16 [ 21.971623] The buggy address is located 8 bytes inside of [ 21.971623] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 21.972721] [ 21.972870] The buggy address belongs to the physical page: [ 21.973377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 21.974089] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.974689] page_type: f5(slab) [ 21.974993] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 21.975698] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.976397] page dumped because: kasan: bad access detected [ 21.976903] [ 21.977050] Memory state around the buggy address: [ 21.977489] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.978145] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 21.978800] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.979452] ^ [ 21.979961] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.980616] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.981269] ================================================================== [ 22.056343] ================================================================== [ 22.056999] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 22.057743] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.058414] [ 22.058563] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.058597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.058606] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.058617] Call trace: [ 22.058625] show_stack+0x20/0x38 (C) [ 22.058645] dump_stack_lvl+0x8c/0xd0 [ 22.058664] print_report+0x118/0x608 [ 22.058683] kasan_report+0xdc/0x128 [ 22.058701] kasan_check_range+0x100/0x1a8 [ 22.058722] __kasan_check_write+0x20/0x30 [ 22.058743] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 22.058769] kasan_bitops_generic+0x110/0x1c8 [ 22.058787] kunit_try_run_case+0x170/0x3f0 [ 22.058811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.058836] kthread+0x328/0x630 [ 22.058858] ret_from_fork+0x10/0x20 [ 22.058879] [ 22.065191] Allocated by task 319: [ 22.065508] kasan_save_stack+0x3c/0x68 [ 22.065867] kasan_save_track+0x20/0x40 [ 22.066227] kasan_save_alloc_info+0x40/0x58 [ 22.066627] __kasan_kmalloc+0xd4/0xd8 [ 22.066978] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.067404] kasan_bitops_generic+0xa0/0x1c8 [ 22.067800] kunit_try_run_case+0x170/0x3f0 [ 22.068193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.068702] kthread+0x328/0x630 [ 22.069011] ret_from_fork+0x10/0x20 [ 22.069349] [ 22.069495] The buggy address belongs to the object at ffff00000a7446c0 [ 22.069495] which belongs to the cache kmalloc-16 of size 16 [ 22.070596] The buggy address is located 8 bytes inside of [ 22.070596] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.071693] [ 22.071838] The buggy address belongs to the physical page: [ 22.072342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.073049] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.073644] page_type: f5(slab) [ 22.073941] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.074642] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.075336] page dumped because: kasan: bad access detected [ 22.075841] [ 22.075986] Memory state around the buggy address: [ 22.076424] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.077075] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.077728] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.078377] ^ [ 22.078884] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.079536] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.080186] ================================================================== [ 22.031604] ================================================================== [ 22.032258] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 22.033004] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.033674] [ 22.033823] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.033856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.033866] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.033877] Call trace: [ 22.033884] show_stack+0x20/0x38 (C) [ 22.033905] dump_stack_lvl+0x8c/0xd0 [ 22.033924] print_report+0x118/0x608 [ 22.033942] kasan_report+0xdc/0x128 [ 22.033961] kasan_check_range+0x100/0x1a8 [ 22.033981] __kasan_check_write+0x20/0x30 [ 22.034003] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 22.034028] kasan_bitops_generic+0x110/0x1c8 [ 22.034047] kunit_try_run_case+0x170/0x3f0 [ 22.034069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.034096] kthread+0x328/0x630 [ 22.034118] ret_from_fork+0x10/0x20 [ 22.034139] [ 22.040450] Allocated by task 319: [ 22.040765] kasan_save_stack+0x3c/0x68 [ 22.041126] kasan_save_track+0x20/0x40 [ 22.041485] kasan_save_alloc_info+0x40/0x58 [ 22.041885] __kasan_kmalloc+0xd4/0xd8 [ 22.042235] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.042660] kasan_bitops_generic+0xa0/0x1c8 [ 22.043056] kunit_try_run_case+0x170/0x3f0 [ 22.043449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.043958] kthread+0x328/0x630 [ 22.044267] ret_from_fork+0x10/0x20 [ 22.044604] [ 22.044750] The buggy address belongs to the object at ffff00000a7446c0 [ 22.044750] which belongs to the cache kmalloc-16 of size 16 [ 22.045852] The buggy address is located 8 bytes inside of [ 22.045852] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.046947] [ 22.047093] The buggy address belongs to the physical page: [ 22.047596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.048304] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.048898] page_type: f5(slab) [ 22.049196] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.049896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.050592] page dumped because: kasan: bad access detected [ 22.051095] [ 22.051241] Memory state around the buggy address: [ 22.051678] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.052330] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.052983] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.053632] ^ [ 22.054139] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.054791] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.055442] ================================================================== [ 21.982009] ================================================================== [ 21.982672] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 21.983423] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 21.984095] [ 21.984252] CPU: 3 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.984287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.984298] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.984312] Call trace: [ 21.984320] show_stack+0x20/0x38 (C) [ 21.984344] dump_stack_lvl+0x8c/0xd0 [ 21.984368] print_report+0x118/0x608 [ 21.984390] kasan_report+0xdc/0x128 [ 21.984410] kasan_check_range+0x100/0x1a8 [ 21.984432] __kasan_check_write+0x20/0x30 [ 21.984456] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 21.984484] kasan_bitops_generic+0x110/0x1c8 [ 21.984505] kunit_try_run_case+0x170/0x3f0 [ 21.984530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.984559] kthread+0x328/0x630 [ 21.984583] ret_from_fork+0x10/0x20 [ 21.984607] [ 21.990925] Allocated by task 319: [ 21.991243] kasan_save_stack+0x3c/0x68 [ 21.991605] kasan_save_track+0x20/0x40 [ 21.991966] kasan_save_alloc_info+0x40/0x58 [ 21.992368] __kasan_kmalloc+0xd4/0xd8 [ 21.992720] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.993148] kasan_bitops_generic+0xa0/0x1c8 [ 21.993547] kunit_try_run_case+0x170/0x3f0 [ 21.993942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.994453] kthread+0x328/0x630 [ 21.994764] ret_from_fork+0x10/0x20 [ 21.995103] [ 21.995250] The buggy address belongs to the object at ffff00000a7446c0 [ 21.995250] which belongs to the cache kmalloc-16 of size 16 [ 21.996353] The buggy address is located 8 bytes inside of [ 21.996353] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 21.997452] [ 21.997600] The buggy address belongs to the physical page: [ 21.998108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 21.998819] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.999418] page_type: f5(slab) [ 21.999718] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.000422] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.001119] page dumped because: kasan: bad access detected [ 22.001626] [ 22.001773] Memory state around the buggy address: [ 22.002212] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.002867] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.003522] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.004175] ^ [ 22.004683] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.005338] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.005990] ================================================================== [ 21.931736] ================================================================== [ 21.932799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 21.933572] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 21.934260] [ 21.934425] CPU: 3 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.934476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.934492] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.934510] Call trace: [ 21.934523] show_stack+0x20/0x38 (C) [ 21.934557] dump_stack_lvl+0x8c/0xd0 [ 21.934589] print_report+0x118/0x608 [ 21.934619] kasan_report+0xdc/0x128 [ 21.934648] kasan_check_range+0x100/0x1a8 [ 21.934680] __kasan_check_write+0x20/0x30 [ 21.934712] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 21.934752] kasan_bitops_generic+0x110/0x1c8 [ 21.934782] kunit_try_run_case+0x170/0x3f0 [ 21.934817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.934857] kthread+0x328/0x630 [ 21.934891] ret_from_fork+0x10/0x20 [ 21.934924] [ 21.941297] Allocated by task 319: [ 21.941627] kasan_save_stack+0x3c/0x68 [ 21.942003] kasan_save_track+0x20/0x40 [ 21.942376] kasan_save_alloc_info+0x40/0x58 [ 21.942788] __kasan_kmalloc+0xd4/0xd8 [ 21.943153] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.943595] kasan_bitops_generic+0xa0/0x1c8 [ 21.944006] kunit_try_run_case+0x170/0x3f0 [ 21.944415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.944940] kthread+0x328/0x630 [ 21.945265] ret_from_fork+0x10/0x20 [ 21.945616] [ 21.945772] The buggy address belongs to the object at ffff00000a7446c0 [ 21.945772] which belongs to the cache kmalloc-16 of size 16 [ 21.946890] The buggy address is located 8 bytes inside of [ 21.946890] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 21.948003] [ 21.948159] The buggy address belongs to the physical page: [ 21.948677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 21.949404] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.950018] page_type: f5(slab) [ 21.950331] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 21.951048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.951757] page dumped because: kasan: bad access detected [ 21.952273] [ 21.952427] Memory state around the buggy address: [ 21.952877] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.953545] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 21.954213] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.954877] ^ [ 21.955397] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.956064] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.956728] ================================================================== [ 22.105340] ================================================================== [ 22.105993] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 22.106736] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.107407] [ 22.107556] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.107588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.107598] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.107608] Call trace: [ 22.107616] show_stack+0x20/0x38 (C) [ 22.107636] dump_stack_lvl+0x8c/0xd0 [ 22.107655] print_report+0x118/0x608 [ 22.107673] kasan_report+0xdc/0x128 [ 22.107692] kasan_check_range+0x100/0x1a8 [ 22.107712] __kasan_check_write+0x20/0x30 [ 22.107733] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 22.107759] kasan_bitops_generic+0x110/0x1c8 [ 22.107778] kunit_try_run_case+0x170/0x3f0 [ 22.107799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.107825] kthread+0x328/0x630 [ 22.107847] ret_from_fork+0x10/0x20 [ 22.107868] [ 22.114177] Allocated by task 319: [ 22.114493] kasan_save_stack+0x3c/0x68 [ 22.114853] kasan_save_track+0x20/0x40 [ 22.115211] kasan_save_alloc_info+0x40/0x58 [ 22.115611] __kasan_kmalloc+0xd4/0xd8 [ 22.115962] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.116387] kasan_bitops_generic+0xa0/0x1c8 [ 22.116784] kunit_try_run_case+0x170/0x3f0 [ 22.117177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.117685] kthread+0x328/0x630 [ 22.117993] ret_from_fork+0x10/0x20 [ 22.118330] [ 22.118476] The buggy address belongs to the object at ffff00000a7446c0 [ 22.118476] which belongs to the cache kmalloc-16 of size 16 [ 22.119577] The buggy address is located 8 bytes inside of [ 22.119577] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.120673] [ 22.120819] The buggy address belongs to the physical page: [ 22.121323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.122030] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.122625] page_type: f5(slab) [ 22.122923] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.123624] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.124319] page dumped because: kasan: bad access detected [ 22.124822] [ 22.124968] Memory state around the buggy address: [ 22.125406] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.126058] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.126710] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.127360] ^ [ 22.127866] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.128519] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.129168] ================================================================== [ 22.081066] ================================================================== [ 22.081723] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 22.082469] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.083130] [ 22.083279] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.083312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.083322] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.083332] Call trace: [ 22.083340] show_stack+0x20/0x38 (C) [ 22.083360] dump_stack_lvl+0x8c/0xd0 [ 22.083381] print_report+0x118/0x608 [ 22.083399] kasan_report+0xdc/0x128 [ 22.083417] __asan_report_load8_noabort+0x20/0x30 [ 22.083439] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 22.083465] kasan_bitops_generic+0x110/0x1c8 [ 22.083484] kunit_try_run_case+0x170/0x3f0 [ 22.083507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.083533] kthread+0x328/0x630 [ 22.083554] ret_from_fork+0x10/0x20 [ 22.083576] [ 22.089588] Allocated by task 319: [ 22.089904] kasan_save_stack+0x3c/0x68 [ 22.090262] kasan_save_track+0x20/0x40 [ 22.090620] kasan_save_alloc_info+0x40/0x58 [ 22.091018] __kasan_kmalloc+0xd4/0xd8 [ 22.091368] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.091794] kasan_bitops_generic+0xa0/0x1c8 [ 22.092189] kunit_try_run_case+0x170/0x3f0 [ 22.092582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.093091] kthread+0x328/0x630 [ 22.093400] ret_from_fork+0x10/0x20 [ 22.093737] [ 22.093883] The buggy address belongs to the object at ffff00000a7446c0 [ 22.093883] which belongs to the cache kmalloc-16 of size 16 [ 22.094984] The buggy address is located 8 bytes inside of [ 22.094984] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.096080] [ 22.096226] The buggy address belongs to the physical page: [ 22.096729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.097437] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.098032] page_type: f5(slab) [ 22.098330] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.099031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.099725] page dumped because: kasan: bad access detected [ 22.100229] [ 22.100375] Memory state around the buggy address: [ 22.100812] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.101464] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.102117] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.102766] ^ [ 22.103271] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.103924] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.104574] ================================================================== [ 22.007156] ================================================================== [ 22.007832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 22.008593] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.009258] [ 22.009414] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.009452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.009463] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.009475] Call trace: [ 22.009484] show_stack+0x20/0x38 (C) [ 22.009508] dump_stack_lvl+0x8c/0xd0 [ 22.009530] print_report+0x118/0x608 [ 22.009549] kasan_report+0xdc/0x128 [ 22.009568] __asan_report_load8_noabort+0x20/0x30 [ 22.009592] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 22.009618] kasan_bitops_generic+0x110/0x1c8 [ 22.009637] kunit_try_run_case+0x170/0x3f0 [ 22.009661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.009687] kthread+0x328/0x630 [ 22.009711] ret_from_fork+0x10/0x20 [ 22.009733] [ 22.015743] Allocated by task 319: [ 22.016061] kasan_save_stack+0x3c/0x68 [ 22.016423] kasan_save_track+0x20/0x40 [ 22.016782] kasan_save_alloc_info+0x40/0x58 [ 22.017181] __kasan_kmalloc+0xd4/0xd8 [ 22.017533] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.017959] kasan_bitops_generic+0xa0/0x1c8 [ 22.018356] kunit_try_run_case+0x170/0x3f0 [ 22.018747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.019255] kthread+0x328/0x630 [ 22.019563] ret_from_fork+0x10/0x20 [ 22.019902] [ 22.020047] The buggy address belongs to the object at ffff00000a7446c0 [ 22.020047] which belongs to the cache kmalloc-16 of size 16 [ 22.021149] The buggy address is located 8 bytes inside of [ 22.021149] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.022247] [ 22.022395] The buggy address belongs to the physical page: [ 22.022900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.023613] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.024211] page_type: f5(slab) [ 22.024512] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.025215] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.025909] page dumped because: kasan: bad access detected [ 22.026414] [ 22.026559] Memory state around the buggy address: [ 22.026996] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.027649] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.028303] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.028951] ^ [ 22.029458] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.030110] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.030760] ================================================================== [ 22.129931] ================================================================== [ 22.130585] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 22.131329] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.131999] [ 22.132148] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.132180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.132190] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.132200] Call trace: [ 22.132208] show_stack+0x20/0x38 (C) [ 22.132227] dump_stack_lvl+0x8c/0xd0 [ 22.132246] print_report+0x118/0x608 [ 22.132265] kasan_report+0xdc/0x128 [ 22.132284] kasan_check_range+0x100/0x1a8 [ 22.132304] __kasan_check_write+0x20/0x30 [ 22.132325] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 22.132351] kasan_bitops_generic+0x110/0x1c8 [ 22.132370] kunit_try_run_case+0x170/0x3f0 [ 22.132392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.132418] kthread+0x328/0x630 [ 22.132440] ret_from_fork+0x10/0x20 [ 22.132460] [ 22.138770] Allocated by task 319: [ 22.139084] kasan_save_stack+0x3c/0x68 [ 22.139442] kasan_save_track+0x20/0x40 [ 22.139801] kasan_save_alloc_info+0x40/0x58 [ 22.140200] __kasan_kmalloc+0xd4/0xd8 [ 22.140550] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.140975] kasan_bitops_generic+0xa0/0x1c8 [ 22.141370] kunit_try_run_case+0x170/0x3f0 [ 22.141762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.142271] kthread+0x328/0x630 [ 22.142579] ret_from_fork+0x10/0x20 [ 22.142917] [ 22.143063] The buggy address belongs to the object at ffff00000a7446c0 [ 22.143063] which belongs to the cache kmalloc-16 of size 16 [ 22.144164] The buggy address is located 8 bytes inside of [ 22.144164] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.145259] [ 22.145405] The buggy address belongs to the physical page: [ 22.145909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.146617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.147211] page_type: f5(slab) [ 22.147508] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.148208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.148903] page dumped because: kasan: bad access detected [ 22.149407] [ 22.149554] Memory state around the buggy address: [ 22.149990] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.150642] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.151294] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.151944] ^ [ 22.152451] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.153104] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.153753] ==================================================================