Date
April 22, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 21.835776] ================================================================== [ 21.836402] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.837020] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.838772] [ 21.839156] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.839297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.839338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.839398] Call Trace: [ 21.839437] <TASK> [ 21.839659] dump_stack_lvl+0x73/0xb0 [ 21.839747] print_report+0xd1/0x650 [ 21.839828] ? __virt_addr_valid+0x1db/0x2d0 [ 21.839902] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.839976] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.840055] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.840132] kasan_report+0x141/0x180 [ 21.840207] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.840282] kasan_check_range+0x10c/0x1c0 [ 21.840322] __kasan_check_write+0x18/0x20 [ 21.840352] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.840387] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.840422] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.840507] ? trace_hardirqs_on+0x37/0xe0 [ 21.840550] ? kasan_bitops_generic+0x92/0x1c0 [ 21.840585] kasan_bitops_generic+0x121/0x1c0 [ 21.840616] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.840647] ? __pfx_read_tsc+0x10/0x10 [ 21.840675] ? ktime_get_ts64+0x86/0x230 [ 21.840712] kunit_try_run_case+0x1a5/0x480 [ 21.840746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.840777] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.840813] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.840849] ? __kthread_parkme+0x82/0x180 [ 21.840881] ? preempt_count_sub+0x50/0x80 [ 21.840916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.840950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.840981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.841015] kthread+0x337/0x6f0 [ 21.841045] ? trace_preempt_on+0x20/0xc0 [ 21.841077] ? __pfx_kthread+0x10/0x10 [ 21.841109] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.841140] ? calculate_sigpending+0x7b/0xa0 [ 21.841171] ? __pfx_kthread+0x10/0x10 [ 21.841204] ret_from_fork+0x41/0x80 [ 21.841234] ? __pfx_kthread+0x10/0x10 [ 21.841266] ret_from_fork_asm+0x1a/0x30 [ 21.841310] </TASK> [ 21.841323] [ 21.859761] Allocated by task 281: [ 21.860274] kasan_save_stack+0x45/0x70 [ 21.860781] kasan_save_track+0x18/0x40 [ 21.861211] kasan_save_alloc_info+0x3b/0x50 [ 21.861716] __kasan_kmalloc+0xb7/0xc0 [ 21.862219] __kmalloc_cache_noprof+0x189/0x420 [ 21.862728] kasan_bitops_generic+0x92/0x1c0 [ 21.863234] kunit_try_run_case+0x1a5/0x480 [ 21.863700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.864212] kthread+0x337/0x6f0 [ 21.864586] ret_from_fork+0x41/0x80 [ 21.865019] ret_from_fork_asm+0x1a/0x30 [ 21.866228] [ 21.866560] The buggy address belongs to the object at ffff8881017113c0 [ 21.866560] which belongs to the cache kmalloc-16 of size 16 [ 21.867566] The buggy address is located 8 bytes inside of [ 21.867566] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.868574] [ 21.868833] The buggy address belongs to the physical page: [ 21.869269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.870060] flags: 0x200000000000000(node=0|zone=2) [ 21.870644] page_type: f5(slab) [ 21.870991] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.871743] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.872369] page dumped because: kasan: bad access detected [ 21.872792] [ 21.873047] Memory state around the buggy address: [ 21.873564] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.875003] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.875791] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.876349] ^ [ 21.877099] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.877799] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.878404] ================================================================== [ 22.054300] ================================================================== [ 22.055004] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 22.055576] Read of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 22.056194] [ 22.056376] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.056564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.056596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.056648] Call Trace: [ 22.056698] <TASK> [ 22.056819] dump_stack_lvl+0x73/0xb0 [ 22.058238] print_report+0xd1/0x650 [ 22.058316] ? __virt_addr_valid+0x1db/0x2d0 [ 22.058389] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 22.059358] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.059477] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 22.059750] kasan_report+0x141/0x180 [ 22.059835] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 22.059923] kasan_check_range+0x10c/0x1c0 [ 22.060003] __kasan_check_read+0x15/0x20 [ 22.060071] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 22.060147] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.060222] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.060288] ? trace_hardirqs_on+0x37/0xe0 [ 22.060350] ? kasan_bitops_generic+0x92/0x1c0 [ 22.060465] kasan_bitops_generic+0x121/0x1c0 [ 22.060569] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.060631] ? __pfx_read_tsc+0x10/0x10 [ 22.060688] ? ktime_get_ts64+0x86/0x230 [ 22.060748] kunit_try_run_case+0x1a5/0x480 [ 22.060815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.060876] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.060941] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.061011] ? __kthread_parkme+0x82/0x180 [ 22.061079] ? preempt_count_sub+0x50/0x80 [ 22.061153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.061222] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.061292] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.061358] kthread+0x337/0x6f0 [ 22.061456] ? trace_preempt_on+0x20/0xc0 [ 22.061562] ? __pfx_kthread+0x10/0x10 [ 22.061655] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.061711] ? calculate_sigpending+0x7b/0xa0 [ 22.061763] ? __pfx_kthread+0x10/0x10 [ 22.061817] ret_from_fork+0x41/0x80 [ 22.061867] ? __pfx_kthread+0x10/0x10 [ 22.061920] ret_from_fork_asm+0x1a/0x30 [ 22.061995] </TASK> [ 22.062018] [ 22.078159] Allocated by task 281: [ 22.078706] kasan_save_stack+0x45/0x70 [ 22.079160] kasan_save_track+0x18/0x40 [ 22.079765] kasan_save_alloc_info+0x3b/0x50 [ 22.080117] __kasan_kmalloc+0xb7/0xc0 [ 22.080653] __kmalloc_cache_noprof+0x189/0x420 [ 22.081177] kasan_bitops_generic+0x92/0x1c0 [ 22.081594] kunit_try_run_case+0x1a5/0x480 [ 22.081931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.082463] kthread+0x337/0x6f0 [ 22.082972] ret_from_fork+0x41/0x80 [ 22.083391] ret_from_fork_asm+0x1a/0x30 [ 22.083883] [ 22.084114] The buggy address belongs to the object at ffff8881017113c0 [ 22.084114] which belongs to the cache kmalloc-16 of size 16 [ 22.085014] The buggy address is located 8 bytes inside of [ 22.085014] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 22.086224] [ 22.086568] The buggy address belongs to the physical page: [ 22.087135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 22.087845] flags: 0x200000000000000(node=0|zone=2) [ 22.088468] page_type: f5(slab) [ 22.089013] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.089715] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.090467] page dumped because: kasan: bad access detected [ 22.090981] [ 22.091213] Memory state around the buggy address: [ 22.091743] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.092196] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.093032] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.093737] ^ [ 22.094302] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.095132] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.095817] ================================================================== [ 22.098098] ================================================================== [ 22.098906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 22.100013] Read of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 22.101160] [ 22.101813] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.101937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.101975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.102032] Call Trace: [ 22.102080] <TASK> [ 22.102123] dump_stack_lvl+0x73/0xb0 [ 22.102197] print_report+0xd1/0x650 [ 22.102267] ? __virt_addr_valid+0x1db/0x2d0 [ 22.102331] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 22.102392] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.102970] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 22.103448] kasan_report+0x141/0x180 [ 22.103563] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 22.103662] __asan_report_load8_noabort+0x18/0x20 [ 22.103729] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 22.103768] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.103805] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.103838] ? trace_hardirqs_on+0x37/0xe0 [ 22.103905] ? kasan_bitops_generic+0x92/0x1c0 [ 22.103964] kasan_bitops_generic+0x121/0x1c0 [ 22.104029] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.104101] ? __pfx_read_tsc+0x10/0x10 [ 22.104170] ? ktime_get_ts64+0x86/0x230 [ 22.104254] kunit_try_run_case+0x1a5/0x480 [ 22.104334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.104403] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.104480] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.104578] ? __kthread_parkme+0x82/0x180 [ 22.104657] ? preempt_count_sub+0x50/0x80 [ 22.104737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.104857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.104933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.105007] kthread+0x337/0x6f0 [ 22.105076] ? trace_preempt_on+0x20/0xc0 [ 22.105151] ? __pfx_kthread+0x10/0x10 [ 22.105223] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.105291] ? calculate_sigpending+0x7b/0xa0 [ 22.105364] ? __pfx_kthread+0x10/0x10 [ 22.105443] ret_from_fork+0x41/0x80 [ 22.105555] ? __pfx_kthread+0x10/0x10 [ 22.105649] ret_from_fork_asm+0x1a/0x30 [ 22.105750] </TASK> [ 22.105784] [ 22.127573] Allocated by task 281: [ 22.127938] kasan_save_stack+0x45/0x70 [ 22.128548] kasan_save_track+0x18/0x40 [ 22.128962] kasan_save_alloc_info+0x3b/0x50 [ 22.129405] __kasan_kmalloc+0xb7/0xc0 [ 22.129805] __kmalloc_cache_noprof+0x189/0x420 [ 22.130219] kasan_bitops_generic+0x92/0x1c0 [ 22.130815] kunit_try_run_case+0x1a5/0x480 [ 22.131248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.131849] kthread+0x337/0x6f0 [ 22.132256] ret_from_fork+0x41/0x80 [ 22.132795] ret_from_fork_asm+0x1a/0x30 [ 22.133200] [ 22.133562] The buggy address belongs to the object at ffff8881017113c0 [ 22.133562] which belongs to the cache kmalloc-16 of size 16 [ 22.134688] The buggy address is located 8 bytes inside of [ 22.134688] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 22.135774] [ 22.136046] The buggy address belongs to the physical page: [ 22.136653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 22.137638] flags: 0x200000000000000(node=0|zone=2) [ 22.138169] page_type: f5(slab) [ 22.138595] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.139345] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.140072] page dumped because: kasan: bad access detected [ 22.140640] [ 22.140856] Memory state around the buggy address: [ 22.141380] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.142093] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.142730] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.143318] ^ [ 22.143944] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.144597] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.145675] ================================================================== [ 21.925304] ================================================================== [ 21.926630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.927358] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.928329] [ 21.928860] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.929036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.929077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.929136] Call Trace: [ 21.929177] <TASK> [ 21.929205] dump_stack_lvl+0x73/0xb0 [ 21.929245] print_report+0xd1/0x650 [ 21.929280] ? __virt_addr_valid+0x1db/0x2d0 [ 21.929310] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.929343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.929375] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.929409] kasan_report+0x141/0x180 [ 21.929512] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.929558] kasan_check_range+0x10c/0x1c0 [ 21.929606] __kasan_check_write+0x18/0x20 [ 21.929634] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.929668] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.929703] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.929733] ? trace_hardirqs_on+0x37/0xe0 [ 21.929765] ? kasan_bitops_generic+0x92/0x1c0 [ 21.929797] kasan_bitops_generic+0x121/0x1c0 [ 21.929825] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.929854] ? __pfx_read_tsc+0x10/0x10 [ 21.929881] ? ktime_get_ts64+0x86/0x230 [ 21.929915] kunit_try_run_case+0x1a5/0x480 [ 21.929949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.929980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.930016] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.930050] ? __kthread_parkme+0x82/0x180 [ 21.930080] ? preempt_count_sub+0x50/0x80 [ 21.930115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.930147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.930180] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.930213] kthread+0x337/0x6f0 [ 21.930242] ? trace_preempt_on+0x20/0xc0 [ 21.930274] ? __pfx_kthread+0x10/0x10 [ 21.930305] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.930335] ? calculate_sigpending+0x7b/0xa0 [ 21.930365] ? __pfx_kthread+0x10/0x10 [ 21.930396] ret_from_fork+0x41/0x80 [ 21.930457] ? __pfx_kthread+0x10/0x10 [ 21.930518] ret_from_fork_asm+0x1a/0x30 [ 21.930568] </TASK> [ 21.930582] [ 21.949805] Allocated by task 281: [ 21.950273] kasan_save_stack+0x45/0x70 [ 21.950797] kasan_save_track+0x18/0x40 [ 21.951274] kasan_save_alloc_info+0x3b/0x50 [ 21.951804] __kasan_kmalloc+0xb7/0xc0 [ 21.952127] __kmalloc_cache_noprof+0x189/0x420 [ 21.952556] kasan_bitops_generic+0x92/0x1c0 [ 21.953058] kunit_try_run_case+0x1a5/0x480 [ 21.953544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.954170] kthread+0x337/0x6f0 [ 21.954613] ret_from_fork+0x41/0x80 [ 21.955018] ret_from_fork_asm+0x1a/0x30 [ 21.955343] [ 21.955680] The buggy address belongs to the object at ffff8881017113c0 [ 21.955680] which belongs to the cache kmalloc-16 of size 16 [ 21.956820] The buggy address is located 8 bytes inside of [ 21.956820] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.957702] [ 21.957913] The buggy address belongs to the physical page: [ 21.958544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.959297] flags: 0x200000000000000(node=0|zone=2) [ 21.959748] page_type: f5(slab) [ 21.960080] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.960792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.961410] page dumped because: kasan: bad access detected [ 21.961873] [ 21.962103] Memory state around the buggy address: [ 21.962597] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.963252] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.963898] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.964594] ^ [ 21.965139] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.965754] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.966393] ================================================================== [ 21.784840] ================================================================== [ 21.787699] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.790104] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.791656] [ 21.791860] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.791964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.791992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.792037] Call Trace: [ 21.792743] <TASK> [ 21.792800] dump_stack_lvl+0x73/0xb0 [ 21.792875] print_report+0xd1/0x650 [ 21.792959] ? __virt_addr_valid+0x1db/0x2d0 [ 21.793037] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.793122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.793204] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.793289] kasan_report+0x141/0x180 [ 21.793367] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.793546] kasan_check_range+0x10c/0x1c0 [ 21.793647] __kasan_check_write+0x18/0x20 [ 21.793711] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.793784] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.793861] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.793930] ? trace_hardirqs_on+0x37/0xe0 [ 21.793998] ? kasan_bitops_generic+0x92/0x1c0 [ 21.794077] kasan_bitops_generic+0x121/0x1c0 [ 21.794149] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.794227] ? __pfx_read_tsc+0x10/0x10 [ 21.794292] ? ktime_get_ts64+0x86/0x230 [ 21.794370] kunit_try_run_case+0x1a5/0x480 [ 21.794466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.794562] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.794650] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.794727] ? __kthread_parkme+0x82/0x180 [ 21.794788] ? preempt_count_sub+0x50/0x80 [ 21.794853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.794915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.794980] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.795048] kthread+0x337/0x6f0 [ 21.795099] ? trace_preempt_on+0x20/0xc0 [ 21.795159] ? __pfx_kthread+0x10/0x10 [ 21.795216] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.795273] ? calculate_sigpending+0x7b/0xa0 [ 21.795330] ? __pfx_kthread+0x10/0x10 [ 21.795388] ret_from_fork+0x41/0x80 [ 21.795445] ? __pfx_kthread+0x10/0x10 [ 21.795536] ret_from_fork_asm+0x1a/0x30 [ 21.795623] </TASK> [ 21.795648] [ 21.815829] Allocated by task 281: [ 21.816270] kasan_save_stack+0x45/0x70 [ 21.816857] kasan_save_track+0x18/0x40 [ 21.817339] kasan_save_alloc_info+0x3b/0x50 [ 21.817738] __kasan_kmalloc+0xb7/0xc0 [ 21.818052] __kmalloc_cache_noprof+0x189/0x420 [ 21.818648] kasan_bitops_generic+0x92/0x1c0 [ 21.819249] kunit_try_run_case+0x1a5/0x480 [ 21.819840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.820514] kthread+0x337/0x6f0 [ 21.821031] ret_from_fork+0x41/0x80 [ 21.821458] ret_from_fork_asm+0x1a/0x30 [ 21.822138] [ 21.822378] The buggy address belongs to the object at ffff8881017113c0 [ 21.822378] which belongs to the cache kmalloc-16 of size 16 [ 21.823577] The buggy address is located 8 bytes inside of [ 21.823577] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.824761] [ 21.824993] The buggy address belongs to the physical page: [ 21.825859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.826596] flags: 0x200000000000000(node=0|zone=2) [ 21.827070] page_type: f5(slab) [ 21.827691] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.828560] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.829149] page dumped because: kasan: bad access detected [ 21.829860] [ 21.830093] Memory state around the buggy address: [ 21.830568] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.831093] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.831722] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.832405] ^ [ 21.833024] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.833556] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.834105] ================================================================== [ 22.011523] ================================================================== [ 22.012246] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 22.013039] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 22.013642] [ 22.013987] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.014112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.014148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.014205] Call Trace: [ 22.014253] <TASK> [ 22.014305] dump_stack_lvl+0x73/0xb0 [ 22.014388] print_report+0xd1/0x650 [ 22.014504] ? __virt_addr_valid+0x1db/0x2d0 [ 22.014621] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 22.014706] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.014782] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 22.014860] kasan_report+0x141/0x180 [ 22.014985] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 22.015080] kasan_check_range+0x10c/0x1c0 [ 22.015166] __kasan_check_write+0x18/0x20 [ 22.015276] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 22.015364] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.015465] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.015540] ? trace_hardirqs_on+0x37/0xe0 [ 22.015577] ? kasan_bitops_generic+0x92/0x1c0 [ 22.015612] kasan_bitops_generic+0x121/0x1c0 [ 22.015670] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.015747] ? __pfx_read_tsc+0x10/0x10 [ 22.015850] ? ktime_get_ts64+0x86/0x230 [ 22.015937] kunit_try_run_case+0x1a5/0x480 [ 22.016019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.016091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.016209] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.016292] ? __kthread_parkme+0x82/0x180 [ 22.016365] ? preempt_count_sub+0x50/0x80 [ 22.016431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.016507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.016547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.016581] kthread+0x337/0x6f0 [ 22.016611] ? trace_preempt_on+0x20/0xc0 [ 22.016645] ? __pfx_kthread+0x10/0x10 [ 22.016678] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.016711] ? calculate_sigpending+0x7b/0xa0 [ 22.016743] ? __pfx_kthread+0x10/0x10 [ 22.016777] ret_from_fork+0x41/0x80 [ 22.016808] ? __pfx_kthread+0x10/0x10 [ 22.016841] ret_from_fork_asm+0x1a/0x30 [ 22.016887] </TASK> [ 22.016900] [ 22.033305] Allocated by task 281: [ 22.033827] kasan_save_stack+0x45/0x70 [ 22.034293] kasan_save_track+0x18/0x40 [ 22.034971] kasan_save_alloc_info+0x3b/0x50 [ 22.035430] __kasan_kmalloc+0xb7/0xc0 [ 22.035911] __kmalloc_cache_noprof+0x189/0x420 [ 22.036397] kasan_bitops_generic+0x92/0x1c0 [ 22.036904] kunit_try_run_case+0x1a5/0x480 [ 22.037247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.037656] kthread+0x337/0x6f0 [ 22.037948] ret_from_fork+0x41/0x80 [ 22.038255] ret_from_fork_asm+0x1a/0x30 [ 22.038831] [ 22.039067] The buggy address belongs to the object at ffff8881017113c0 [ 22.039067] which belongs to the cache kmalloc-16 of size 16 [ 22.040123] The buggy address is located 8 bytes inside of [ 22.040123] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 22.041201] [ 22.041472] The buggy address belongs to the physical page: [ 22.042078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 22.042791] flags: 0x200000000000000(node=0|zone=2) [ 22.043154] page_type: f5(slab) [ 22.043472] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.044181] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.044980] page dumped because: kasan: bad access detected [ 22.045587] [ 22.045823] Memory state around the buggy address: [ 22.046307] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.047069] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.047799] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.048347] ^ [ 22.048764] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.049227] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.051581] ================================================================== [ 21.968204] ================================================================== [ 21.969706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.970467] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.971620] [ 21.972060] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.972197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.972233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.972293] Call Trace: [ 21.972342] <TASK> [ 21.972391] dump_stack_lvl+0x73/0xb0 [ 21.972551] print_report+0xd1/0x650 [ 21.972629] ? __virt_addr_valid+0x1db/0x2d0 [ 21.972703] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.972775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.972834] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.972871] kasan_report+0x141/0x180 [ 21.972905] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.972946] kasan_check_range+0x10c/0x1c0 [ 21.972979] __kasan_check_write+0x18/0x20 [ 21.973007] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.973041] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.973077] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.973108] ? trace_hardirqs_on+0x37/0xe0 [ 21.973140] ? kasan_bitops_generic+0x92/0x1c0 [ 21.973173] kasan_bitops_generic+0x121/0x1c0 [ 21.973200] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.973228] ? __pfx_read_tsc+0x10/0x10 [ 21.973256] ? ktime_get_ts64+0x86/0x230 [ 21.973294] kunit_try_run_case+0x1a5/0x480 [ 21.973327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.973357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.973391] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.973471] ? __kthread_parkme+0x82/0x180 [ 21.973536] ? preempt_count_sub+0x50/0x80 [ 21.973571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.973616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.973648] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.973678] kthread+0x337/0x6f0 [ 21.973708] ? trace_preempt_on+0x20/0xc0 [ 21.973740] ? __pfx_kthread+0x10/0x10 [ 21.973771] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.973802] ? calculate_sigpending+0x7b/0xa0 [ 21.973831] ? __pfx_kthread+0x10/0x10 [ 21.973862] ret_from_fork+0x41/0x80 [ 21.973890] ? __pfx_kthread+0x10/0x10 [ 21.973922] ret_from_fork_asm+0x1a/0x30 [ 21.973966] </TASK> [ 21.973981] [ 21.990616] Allocated by task 281: [ 21.991093] kasan_save_stack+0x45/0x70 [ 21.991754] kasan_save_track+0x18/0x40 [ 21.992066] kasan_save_alloc_info+0x3b/0x50 [ 21.992626] __kasan_kmalloc+0xb7/0xc0 [ 21.993003] __kmalloc_cache_noprof+0x189/0x420 [ 21.993510] kasan_bitops_generic+0x92/0x1c0 [ 21.993955] kunit_try_run_case+0x1a5/0x480 [ 21.994422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.995004] kthread+0x337/0x6f0 [ 21.995306] ret_from_fork+0x41/0x80 [ 21.995826] ret_from_fork_asm+0x1a/0x30 [ 21.996435] [ 21.996722] The buggy address belongs to the object at ffff8881017113c0 [ 21.996722] which belongs to the cache kmalloc-16 of size 16 [ 21.997770] The buggy address is located 8 bytes inside of [ 21.997770] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.998762] [ 21.999014] The buggy address belongs to the physical page: [ 21.999565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 22.000259] flags: 0x200000000000000(node=0|zone=2) [ 22.000794] page_type: f5(slab) [ 22.001199] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.001915] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.002441] page dumped because: kasan: bad access detected [ 22.003919] [ 22.004136] Memory state around the buggy address: [ 22.004625] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.005182] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.007247] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.008498] ^ [ 22.008851] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.009464] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.010095] ================================================================== [ 21.742925] ================================================================== [ 21.743475] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.744678] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.745709] [ 21.746174] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.746305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.746381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.746440] Call Trace: [ 21.746479] <TASK> [ 21.746546] dump_stack_lvl+0x73/0xb0 [ 21.746621] print_report+0xd1/0x650 [ 21.746699] ? __virt_addr_valid+0x1db/0x2d0 [ 21.746768] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.746863] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.746925] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.746962] kasan_report+0x141/0x180 [ 21.746998] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.747042] kasan_check_range+0x10c/0x1c0 [ 21.747079] __kasan_check_write+0x18/0x20 [ 21.747109] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.747144] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.747179] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.747210] ? trace_hardirqs_on+0x37/0xe0 [ 21.747246] ? kasan_bitops_generic+0x92/0x1c0 [ 21.747279] kasan_bitops_generic+0x121/0x1c0 [ 21.747310] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.747340] ? __pfx_read_tsc+0x10/0x10 [ 21.747369] ? ktime_get_ts64+0x86/0x230 [ 21.747404] kunit_try_run_case+0x1a5/0x480 [ 21.747477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.747539] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.747582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.747620] ? __kthread_parkme+0x82/0x180 [ 21.747654] ? preempt_count_sub+0x50/0x80 [ 21.747691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.747726] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.747759] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.747793] kthread+0x337/0x6f0 [ 21.747824] ? trace_preempt_on+0x20/0xc0 [ 21.747858] ? __pfx_kthread+0x10/0x10 [ 21.747891] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.747923] ? calculate_sigpending+0x7b/0xa0 [ 21.747955] ? __pfx_kthread+0x10/0x10 [ 21.747988] ret_from_fork+0x41/0x80 [ 21.748019] ? __pfx_kthread+0x10/0x10 [ 21.748053] ret_from_fork_asm+0x1a/0x30 [ 21.748099] </TASK> [ 21.748112] [ 21.766481] Allocated by task 281: [ 21.766905] kasan_save_stack+0x45/0x70 [ 21.767406] kasan_save_track+0x18/0x40 [ 21.767905] kasan_save_alloc_info+0x3b/0x50 [ 21.768348] __kasan_kmalloc+0xb7/0xc0 [ 21.768818] __kmalloc_cache_noprof+0x189/0x420 [ 21.769307] kasan_bitops_generic+0x92/0x1c0 [ 21.769802] kunit_try_run_case+0x1a5/0x480 [ 21.770265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.770817] kthread+0x337/0x6f0 [ 21.771110] ret_from_fork+0x41/0x80 [ 21.771462] ret_from_fork_asm+0x1a/0x30 [ 21.771972] [ 21.772210] The buggy address belongs to the object at ffff8881017113c0 [ 21.772210] which belongs to the cache kmalloc-16 of size 16 [ 21.773332] The buggy address is located 8 bytes inside of [ 21.773332] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.774179] [ 21.774515] The buggy address belongs to the physical page: [ 21.775035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.775746] flags: 0x200000000000000(node=0|zone=2) [ 21.776247] page_type: f5(slab) [ 21.776695] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.777185] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.777956] page dumped because: kasan: bad access detected [ 21.778514] [ 21.778725] Memory state around the buggy address: [ 21.779192] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.779879] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.780394] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.781042] ^ [ 21.781459] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.782173] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.783058] ================================================================== [ 21.879473] ================================================================== [ 21.880612] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.881396] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281 [ 21.882214] [ 21.882453] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 21.882543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.882561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.882594] Call Trace: [ 21.882617] <TASK> [ 21.882640] dump_stack_lvl+0x73/0xb0 [ 21.882679] print_report+0xd1/0x650 [ 21.882714] ? __virt_addr_valid+0x1db/0x2d0 [ 21.882746] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.882780] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.882813] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.882848] kasan_report+0x141/0x180 [ 21.882881] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.882925] kasan_check_range+0x10c/0x1c0 [ 21.883002] __kasan_check_write+0x18/0x20 [ 21.883073] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.883156] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.883242] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.883315] ? trace_hardirqs_on+0x37/0xe0 [ 21.883395] ? kasan_bitops_generic+0x92/0x1c0 [ 21.883500] kasan_bitops_generic+0x121/0x1c0 [ 21.883578] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.883660] ? __pfx_read_tsc+0x10/0x10 [ 21.883726] ? ktime_get_ts64+0x86/0x230 [ 21.883809] kunit_try_run_case+0x1a5/0x480 [ 21.883883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.883952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.884027] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.884104] ? __kthread_parkme+0x82/0x180 [ 21.884232] ? preempt_count_sub+0x50/0x80 [ 21.884274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.884310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.884343] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.884376] kthread+0x337/0x6f0 [ 21.884406] ? trace_preempt_on+0x20/0xc0 [ 21.884470] ? __pfx_kthread+0x10/0x10 [ 21.884535] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.884570] ? calculate_sigpending+0x7b/0xa0 [ 21.884604] ? __pfx_kthread+0x10/0x10 [ 21.884638] ret_from_fork+0x41/0x80 [ 21.884670] ? __pfx_kthread+0x10/0x10 [ 21.884703] ret_from_fork_asm+0x1a/0x30 [ 21.884748] </TASK> [ 21.884762] [ 21.905217] Allocated by task 281: [ 21.905900] kasan_save_stack+0x45/0x70 [ 21.906506] kasan_save_track+0x18/0x40 [ 21.907021] kasan_save_alloc_info+0x3b/0x50 [ 21.907613] __kasan_kmalloc+0xb7/0xc0 [ 21.908135] __kmalloc_cache_noprof+0x189/0x420 [ 21.908781] kasan_bitops_generic+0x92/0x1c0 [ 21.909152] kunit_try_run_case+0x1a5/0x480 [ 21.909898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.910353] kthread+0x337/0x6f0 [ 21.911074] ret_from_fork+0x41/0x80 [ 21.911352] ret_from_fork_asm+0x1a/0x30 [ 21.911847] [ 21.912646] The buggy address belongs to the object at ffff8881017113c0 [ 21.912646] which belongs to the cache kmalloc-16 of size 16 [ 21.913729] The buggy address is located 8 bytes inside of [ 21.913729] allocated 9-byte region [ffff8881017113c0, ffff8881017113c9) [ 21.914940] [ 21.915178] The buggy address belongs to the physical page: [ 21.915953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711 [ 21.916801] flags: 0x200000000000000(node=0|zone=2) [ 21.917378] page_type: f5(slab) [ 21.917994] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.919127] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.919670] page dumped because: kasan: bad access detected [ 21.920183] [ 21.920384] Memory state around the buggy address: [ 21.921294] ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.921762] ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.922008] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.922243] ^ [ 21.922468] ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.922933] ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.923837] ==================================================================
[ 22.227511] ================================================================== [ 22.228156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 22.228953] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.229613] [ 22.229755] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.229777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.229784] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.229791] Call trace: [ 22.229796] show_stack+0x20/0x38 (C) [ 22.229809] dump_stack_lvl+0x8c/0xd0 [ 22.229822] print_report+0x118/0x608 [ 22.229835] kasan_report+0xdc/0x128 [ 22.229848] kasan_check_range+0x100/0x1a8 [ 22.229862] __kasan_check_write+0x20/0x30 [ 22.229876] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 22.229891] kasan_bitops_generic+0x11c/0x1c8 [ 22.229904] kunit_try_run_case+0x170/0x3f0 [ 22.229919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.229937] kthread+0x328/0x630 [ 22.229952] ret_from_fork+0x10/0x20 [ 22.229965] [ 22.236308] Allocated by task 319: [ 22.236616] kasan_save_stack+0x3c/0x68 [ 22.236967] kasan_save_track+0x20/0x40 [ 22.237317] kasan_save_alloc_info+0x40/0x58 [ 22.237705] __kasan_kmalloc+0xd4/0xd8 [ 22.238048] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.238462] kasan_bitops_generic+0xa0/0x1c8 [ 22.238850] kunit_try_run_case+0x170/0x3f0 [ 22.239233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.239730] kthread+0x328/0x630 [ 22.240030] ret_from_fork+0x10/0x20 [ 22.240358] [ 22.240498] The buggy address belongs to the object at ffff00000a7446c0 [ 22.240498] which belongs to the cache kmalloc-16 of size 16 [ 22.241588] The buggy address is located 8 bytes inside of [ 22.241588] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.242673] [ 22.242814] The buggy address belongs to the physical page: [ 22.243311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.244009] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.244594] page_type: f5(slab) [ 22.244884] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.245574] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.246261] page dumped because: kasan: bad access detected [ 22.246759] [ 22.246899] Memory state around the buggy address: [ 22.247329] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.247972] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.248616] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.249258] ^ [ 22.249757] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.250400] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.251042] ================================================================== [ 22.323907] ================================================================== [ 22.324551] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 22.325347] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.326006] [ 22.326148] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.326170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.326177] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.326185] Call trace: [ 22.326189] show_stack+0x20/0x38 (C) [ 22.326203] dump_stack_lvl+0x8c/0xd0 [ 22.326216] print_report+0x118/0x608 [ 22.326228] kasan_report+0xdc/0x128 [ 22.326241] kasan_check_range+0x100/0x1a8 [ 22.326255] __kasan_check_write+0x20/0x30 [ 22.326269] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 22.326285] kasan_bitops_generic+0x11c/0x1c8 [ 22.326297] kunit_try_run_case+0x170/0x3f0 [ 22.326313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.326330] kthread+0x328/0x630 [ 22.326345] ret_from_fork+0x10/0x20 [ 22.326359] [ 22.332699] Allocated by task 319: [ 22.333007] kasan_save_stack+0x3c/0x68 [ 22.333358] kasan_save_track+0x20/0x40 [ 22.333708] kasan_save_alloc_info+0x40/0x58 [ 22.334098] __kasan_kmalloc+0xd4/0xd8 [ 22.334442] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.334856] kasan_bitops_generic+0xa0/0x1c8 [ 22.335245] kunit_try_run_case+0x170/0x3f0 [ 22.335628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.336125] kthread+0x328/0x630 [ 22.336425] ret_from_fork+0x10/0x20 [ 22.336754] [ 22.336894] The buggy address belongs to the object at ffff00000a7446c0 [ 22.336894] which belongs to the cache kmalloc-16 of size 16 [ 22.337984] The buggy address is located 8 bytes inside of [ 22.337984] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.339069] [ 22.339209] The buggy address belongs to the physical page: [ 22.339706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.340404] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.340989] page_type: f5(slab) [ 22.341280] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.341971] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.342658] page dumped because: kasan: bad access detected [ 22.343156] [ 22.343296] Memory state around the buggy address: [ 22.343726] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.344369] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.345013] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.345655] ^ [ 22.346154] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.346797] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.347439] ================================================================== [ 22.372155] ================================================================== [ 22.372794] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 22.373583] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.374229] [ 22.374366] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.374381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.374385] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.374390] Call trace: [ 22.374394] show_stack+0x20/0x38 (C) [ 22.374403] dump_stack_lvl+0x8c/0xd0 [ 22.374411] print_report+0x118/0x608 [ 22.374420] kasan_report+0xdc/0x128 [ 22.374428] __asan_report_load8_noabort+0x20/0x30 [ 22.374439] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 22.374449] kasan_bitops_generic+0x11c/0x1c8 [ 22.374457] kunit_try_run_case+0x170/0x3f0 [ 22.374467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.374479] kthread+0x328/0x630 [ 22.374489] ret_from_fork+0x10/0x20 [ 22.374499] [ 22.380517] Allocated by task 319: [ 22.380822] kasan_save_stack+0x3c/0x68 [ 22.381166] kasan_save_track+0x20/0x40 [ 22.381509] kasan_save_alloc_info+0x40/0x58 [ 22.381892] __kasan_kmalloc+0xd4/0xd8 [ 22.382229] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.382636] kasan_bitops_generic+0xa0/0x1c8 [ 22.383018] kunit_try_run_case+0x170/0x3f0 [ 22.383394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.383883] kthread+0x328/0x630 [ 22.384176] ret_from_fork+0x10/0x20 [ 22.384498] [ 22.384635] The buggy address belongs to the object at ffff00000a7446c0 [ 22.384635] which belongs to the cache kmalloc-16 of size 16 [ 22.385717] The buggy address is located 8 bytes inside of [ 22.385717] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.386794] [ 22.386932] The buggy address belongs to the physical page: [ 22.387424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.388116] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.388693] page_type: f5(slab) [ 22.388978] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.389662] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.390343] page dumped because: kasan: bad access detected [ 22.390835] [ 22.390973] Memory state around the buggy address: [ 22.391399] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.392036] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.392672] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.393310] ^ [ 22.393804] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.394442] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.395077] ================================================================== [ 22.299984] ================================================================== [ 22.300629] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 22.301426] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.302079] [ 22.302221] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.302243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.302250] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.302258] Call trace: [ 22.302262] show_stack+0x20/0x38 (C) [ 22.302276] dump_stack_lvl+0x8c/0xd0 [ 22.302290] print_report+0x118/0x608 [ 22.302302] kasan_report+0xdc/0x128 [ 22.302315] __asan_report_load8_noabort+0x20/0x30 [ 22.302331] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 22.302346] kasan_bitops_generic+0x11c/0x1c8 [ 22.302358] kunit_try_run_case+0x170/0x3f0 [ 22.302374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.302392] kthread+0x328/0x630 [ 22.302407] ret_from_fork+0x10/0x20 [ 22.302421] [ 22.308463] Allocated by task 319: [ 22.308772] kasan_save_stack+0x3c/0x68 [ 22.309123] kasan_save_track+0x20/0x40 [ 22.309473] kasan_save_alloc_info+0x40/0x58 [ 22.309864] __kasan_kmalloc+0xd4/0xd8 [ 22.310206] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.310620] kasan_bitops_generic+0xa0/0x1c8 [ 22.311007] kunit_try_run_case+0x170/0x3f0 [ 22.311390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.311887] kthread+0x328/0x630 [ 22.312187] ret_from_fork+0x10/0x20 [ 22.312515] [ 22.312656] The buggy address belongs to the object at ffff00000a7446c0 [ 22.312656] which belongs to the cache kmalloc-16 of size 16 [ 22.313746] The buggy address is located 8 bytes inside of [ 22.313746] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.314830] [ 22.314970] The buggy address belongs to the physical page: [ 22.315467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.316165] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.316750] page_type: f5(slab) [ 22.317039] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.317728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.318417] page dumped because: kasan: bad access detected [ 22.318915] [ 22.319055] Memory state around the buggy address: [ 22.319484] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.320128] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.320771] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.321412] ^ [ 22.321911] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.322555] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.323196] ================================================================== [ 22.275717] ================================================================== [ 22.276363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 22.277162] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.277822] [ 22.277965] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.277988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.277994] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.278001] Call trace: [ 22.278007] show_stack+0x20/0x38 (C) [ 22.278021] dump_stack_lvl+0x8c/0xd0 [ 22.278034] print_report+0x118/0x608 [ 22.278048] kasan_report+0xdc/0x128 [ 22.278060] kasan_check_range+0x100/0x1a8 [ 22.278074] __kasan_check_write+0x20/0x30 [ 22.278088] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 22.278103] kasan_bitops_generic+0x11c/0x1c8 [ 22.278115] kunit_try_run_case+0x170/0x3f0 [ 22.278131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.278149] kthread+0x328/0x630 [ 22.278164] ret_from_fork+0x10/0x20 [ 22.278178] [ 22.284518] Allocated by task 319: [ 22.284827] kasan_save_stack+0x3c/0x68 [ 22.285177] kasan_save_track+0x20/0x40 [ 22.285525] kasan_save_alloc_info+0x40/0x58 [ 22.285916] __kasan_kmalloc+0xd4/0xd8 [ 22.286257] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.286674] kasan_bitops_generic+0xa0/0x1c8 [ 22.287062] kunit_try_run_case+0x170/0x3f0 [ 22.287445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.287942] kthread+0x328/0x630 [ 22.288241] ret_from_fork+0x10/0x20 [ 22.288570] [ 22.288710] The buggy address belongs to the object at ffff00000a7446c0 [ 22.288710] which belongs to the cache kmalloc-16 of size 16 [ 22.289800] The buggy address is located 8 bytes inside of [ 22.289800] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.290883] [ 22.291023] The buggy address belongs to the physical page: [ 22.291521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.292219] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.292803] page_type: f5(slab) [ 22.293093] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.293783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.294469] page dumped because: kasan: bad access detected [ 22.294967] [ 22.295107] Memory state around the buggy address: [ 22.295537] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.296181] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.296824] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.297466] ^ [ 22.297965] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.298608] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.299250] ================================================================== [ 22.348145] ================================================================== [ 22.348790] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 22.349586] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.350239] [ 22.350381] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.350403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.350410] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.350417] Call trace: [ 22.350422] show_stack+0x20/0x38 (C) [ 22.350435] dump_stack_lvl+0x8c/0xd0 [ 22.350448] print_report+0x118/0x608 [ 22.350461] kasan_report+0xdc/0x128 [ 22.350474] __asan_report_load8_noabort+0x20/0x30 [ 22.350489] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 22.350504] kasan_bitops_generic+0x11c/0x1c8 [ 22.350516] kunit_try_run_case+0x170/0x3f0 [ 22.350531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.350549] kthread+0x328/0x630 [ 22.350564] ret_from_fork+0x10/0x20 [ 22.350578] [ 22.356620] Allocated by task 319: [ 22.356928] kasan_save_stack+0x3c/0x68 [ 22.357279] kasan_save_track+0x20/0x40 [ 22.357629] kasan_save_alloc_info+0x40/0x58 [ 22.358020] __kasan_kmalloc+0xd4/0xd8 [ 22.358362] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.358776] kasan_bitops_generic+0xa0/0x1c8 [ 22.359164] kunit_try_run_case+0x170/0x3f0 [ 22.359547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.360044] kthread+0x328/0x630 [ 22.360344] ret_from_fork+0x10/0x20 [ 22.360672] [ 22.360814] The buggy address belongs to the object at ffff00000a7446c0 [ 22.360814] which belongs to the cache kmalloc-16 of size 16 [ 22.361904] The buggy address is located 8 bytes inside of [ 22.361904] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.362989] [ 22.363129] The buggy address belongs to the physical page: [ 22.363626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.364325] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.364908] page_type: f5(slab) [ 22.365198] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.365888] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.366576] page dumped because: kasan: bad access detected [ 22.367074] [ 22.367215] Memory state around the buggy address: [ 22.367644] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.368288] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.368932] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.369573] ^ [ 22.370073] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.370716] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.371357] ================================================================== [ 22.251755] ================================================================== [ 22.252400] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 22.253196] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.253849] [ 22.253991] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.254013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.254019] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.254027] Call trace: [ 22.254032] show_stack+0x20/0x38 (C) [ 22.254045] dump_stack_lvl+0x8c/0xd0 [ 22.254058] print_report+0x118/0x608 [ 22.254071] kasan_report+0xdc/0x128 [ 22.254083] __asan_report_load8_noabort+0x20/0x30 [ 22.254099] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 22.254114] kasan_bitops_generic+0x11c/0x1c8 [ 22.254126] kunit_try_run_case+0x170/0x3f0 [ 22.254141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.254159] kthread+0x328/0x630 [ 22.254174] ret_from_fork+0x10/0x20 [ 22.254188] [ 22.260229] Allocated by task 319: [ 22.260537] kasan_save_stack+0x3c/0x68 [ 22.260889] kasan_save_track+0x20/0x40 [ 22.261239] kasan_save_alloc_info+0x40/0x58 [ 22.261629] __kasan_kmalloc+0xd4/0xd8 [ 22.261971] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.262385] kasan_bitops_generic+0xa0/0x1c8 [ 22.262772] kunit_try_run_case+0x170/0x3f0 [ 22.263154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.263652] kthread+0x328/0x630 [ 22.263951] ret_from_fork+0x10/0x20 [ 22.264279] [ 22.264420] The buggy address belongs to the object at ffff00000a7446c0 [ 22.264420] which belongs to the cache kmalloc-16 of size 16 [ 22.265510] The buggy address is located 8 bytes inside of [ 22.265510] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.266593] [ 22.266733] The buggy address belongs to the physical page: [ 22.267230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.267928] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.268512] page_type: f5(slab) [ 22.268803] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.269493] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.270180] page dumped because: kasan: bad access detected [ 22.270678] [ 22.270818] Memory state around the buggy address: [ 22.271247] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.271891] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.272534] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.273176] ^ [ 22.273676] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.274320] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.274962] ================================================================== [ 22.178781] ================================================================== [ 22.179434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 22.180232] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.180902] [ 22.181052] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.181084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.181093] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.181103] Call trace: [ 22.181110] show_stack+0x20/0x38 (C) [ 22.181131] dump_stack_lvl+0x8c/0xd0 [ 22.181150] print_report+0x118/0x608 [ 22.181169] kasan_report+0xdc/0x128 [ 22.181187] kasan_check_range+0x100/0x1a8 [ 22.181207] __kasan_check_write+0x20/0x30 [ 22.181229] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 22.181250] kasan_bitops_generic+0x11c/0x1c8 [ 22.181269] kunit_try_run_case+0x170/0x3f0 [ 22.181291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.181316] kthread+0x328/0x630 [ 22.181338] ret_from_fork+0x10/0x20 [ 22.181359] [ 22.187727] Allocated by task 319: [ 22.188043] kasan_save_stack+0x3c/0x68 [ 22.188402] kasan_save_track+0x20/0x40 [ 22.188761] kasan_save_alloc_info+0x40/0x58 [ 22.189160] __kasan_kmalloc+0xd4/0xd8 [ 22.189510] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.189936] kasan_bitops_generic+0xa0/0x1c8 [ 22.190332] kunit_try_run_case+0x170/0x3f0 [ 22.190726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.191235] kthread+0x328/0x630 [ 22.191544] ret_from_fork+0x10/0x20 [ 22.191882] [ 22.192028] The buggy address belongs to the object at ffff00000a7446c0 [ 22.192028] which belongs to the cache kmalloc-16 of size 16 [ 22.193129] The buggy address is located 8 bytes inside of [ 22.193129] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.194226] [ 22.194372] The buggy address belongs to the physical page: [ 22.194875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.195583] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.196178] page_type: f5(slab) [ 22.196475] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.197176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.197872] page dumped because: kasan: bad access detected [ 22.198376] [ 22.198520] Memory state around the buggy address: [ 22.198957] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.199610] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.200263] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.200913] ^ [ 22.201419] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.202071] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.202720] ================================================================== [ 22.203570] ================================================================== [ 22.204216] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 22.205013] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319 [ 22.205665] [ 22.205808] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 22.205830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.205837] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.205844] Call trace: [ 22.205850] show_stack+0x20/0x38 (C) [ 22.205863] dump_stack_lvl+0x8c/0xd0 [ 22.205876] print_report+0x118/0x608 [ 22.205889] kasan_report+0xdc/0x128 [ 22.205902] __asan_report_load8_noabort+0x20/0x30 [ 22.205917] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 22.205932] kasan_bitops_generic+0x11c/0x1c8 [ 22.205945] kunit_try_run_case+0x170/0x3f0 [ 22.205960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.205978] kthread+0x328/0x630 [ 22.205993] ret_from_fork+0x10/0x20 [ 22.206007] [ 22.212049] Allocated by task 319: [ 22.212358] kasan_save_stack+0x3c/0x68 [ 22.212709] kasan_save_track+0x20/0x40 [ 22.213059] kasan_save_alloc_info+0x40/0x58 [ 22.213450] __kasan_kmalloc+0xd4/0xd8 [ 22.213791] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.214206] kasan_bitops_generic+0xa0/0x1c8 [ 22.214593] kunit_try_run_case+0x170/0x3f0 [ 22.214976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.215473] kthread+0x328/0x630 [ 22.215773] ret_from_fork+0x10/0x20 [ 22.216101] [ 22.216242] The buggy address belongs to the object at ffff00000a7446c0 [ 22.216242] which belongs to the cache kmalloc-16 of size 16 [ 22.217332] The buggy address is located 8 bytes inside of [ 22.217332] allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9) [ 22.218417] [ 22.218558] The buggy address belongs to the physical page: [ 22.219055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744 [ 22.219753] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.220338] page_type: f5(slab) [ 22.220629] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 22.221319] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.222006] page dumped because: kasan: bad access detected [ 22.222503] [ 22.222644] Memory state around the buggy address: [ 22.223074] ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.223717] ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 22.224361] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.225003] ^ [ 22.225502] ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.226144] ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.226786] ==================================================================