Date
June 2, 2025, 2:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-x86_64 |
[ 42.737527] ================================================================== [ 42.744626] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 42.753565] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 42.760857] [ 42.762336] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 42.762382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.762398] Hardware name: WinLink E850-96 board (DT) [ 42.762416] Call trace: [ 42.762430] show_stack+0x20/0x38 (C) [ 42.762461] dump_stack_lvl+0x8c/0xd0 [ 42.762492] print_report+0x118/0x608 [ 42.762521] kasan_report+0xdc/0x128 [ 42.762551] __asan_report_load8_noabort+0x20/0x30 [ 42.762585] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 42.762619] kasan_bitops_generic+0x11c/0x1c8 [ 42.762648] kunit_try_run_case+0x170/0x3f0 [ 42.762678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.762718] kthread+0x328/0x630 [ 42.762747] ret_from_fork+0x10/0x20 [ 42.762778] [ 42.831429] Allocated by task 308: [ 42.834815] kasan_save_stack+0x3c/0x68 [ 42.838633] kasan_save_track+0x20/0x40 [ 42.842453] kasan_save_alloc_info+0x40/0x58 [ 42.846706] __kasan_kmalloc+0xd4/0xd8 [ 42.850439] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.854953] kasan_bitops_generic+0xa0/0x1c8 [ 42.859206] kunit_try_run_case+0x170/0x3f0 [ 42.863373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.868841] kthread+0x328/0x630 [ 42.872053] ret_from_fork+0x10/0x20 [ 42.875612] [ 42.877087] The buggy address belongs to the object at ffff0008037171e0 [ 42.877087] which belongs to the cache kmalloc-16 of size 16 [ 42.889414] The buggy address is located 8 bytes inside of [ 42.889414] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 42.901653] [ 42.903129] The buggy address belongs to the physical page: [ 42.908685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 42.916671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.923182] page_type: f5(slab) [ 42.926315] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.934038] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.941757] page dumped because: kasan: bad access detected [ 42.947312] [ 42.948788] Memory state around the buggy address: [ 42.953566] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 42.960771] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 42.967975] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 42.975177] ^ [ 42.981777] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.988982] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.996183] ================================================================== [ 43.538960] ================================================================== [ 43.546003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 43.554942] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 43.562320] [ 43.563801] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 43.563848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.563864] Hardware name: WinLink E850-96 board (DT) [ 43.563883] Call trace: [ 43.563895] show_stack+0x20/0x38 (C) [ 43.563926] dump_stack_lvl+0x8c/0xd0 [ 43.563957] print_report+0x118/0x608 [ 43.563986] kasan_report+0xdc/0x128 [ 43.564014] kasan_check_range+0x100/0x1a8 [ 43.564044] __kasan_check_write+0x20/0x30 [ 43.564076] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 43.564109] kasan_bitops_generic+0x11c/0x1c8 [ 43.564137] kunit_try_run_case+0x170/0x3f0 [ 43.564169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.564207] kthread+0x328/0x630 [ 43.564238] ret_from_fork+0x10/0x20 [ 43.564269] [ 43.636277] Allocated by task 308: [ 43.639665] kasan_save_stack+0x3c/0x68 [ 43.643482] kasan_save_track+0x20/0x40 [ 43.647302] kasan_save_alloc_info+0x40/0x58 [ 43.651555] __kasan_kmalloc+0xd4/0xd8 [ 43.655288] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.659802] kasan_bitops_generic+0xa0/0x1c8 [ 43.664055] kunit_try_run_case+0x170/0x3f0 [ 43.668222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.673690] kthread+0x328/0x630 [ 43.676902] ret_from_fork+0x10/0x20 [ 43.680461] [ 43.681937] The buggy address belongs to the object at ffff0008037171e0 [ 43.681937] which belongs to the cache kmalloc-16 of size 16 [ 43.694263] The buggy address is located 8 bytes inside of [ 43.694263] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 43.706502] [ 43.707978] The buggy address belongs to the physical page: [ 43.713535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 43.721521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.728030] page_type: f5(slab) [ 43.731162] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.738887] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.746606] page dumped because: kasan: bad access detected [ 43.752161] [ 43.753637] Memory state around the buggy address: [ 43.758415] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 43.765620] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 43.772824] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 43.780025] ^ [ 43.786626] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.793831] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.801032] ================================================================== [ 44.074342] ================================================================== [ 44.081411] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 44.090351] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 44.097642] [ 44.099123] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 44.099169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.099185] Hardware name: WinLink E850-96 board (DT) [ 44.099206] Call trace: [ 44.099218] show_stack+0x20/0x38 (C) [ 44.099249] dump_stack_lvl+0x8c/0xd0 [ 44.099279] print_report+0x118/0x608 [ 44.099308] kasan_report+0xdc/0x128 [ 44.099336] __asan_report_load8_noabort+0x20/0x30 [ 44.099371] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 44.099404] kasan_bitops_generic+0x11c/0x1c8 [ 44.099433] kunit_try_run_case+0x170/0x3f0 [ 44.099467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.099504] kthread+0x328/0x630 [ 44.099536] ret_from_fork+0x10/0x20 [ 44.099567] [ 44.168214] Allocated by task 308: [ 44.171600] kasan_save_stack+0x3c/0x68 [ 44.175419] kasan_save_track+0x20/0x40 [ 44.179238] kasan_save_alloc_info+0x40/0x58 [ 44.183492] __kasan_kmalloc+0xd4/0xd8 [ 44.187224] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.191738] kasan_bitops_generic+0xa0/0x1c8 [ 44.195992] kunit_try_run_case+0x170/0x3f0 [ 44.200158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.205627] kthread+0x328/0x630 [ 44.208839] ret_from_fork+0x10/0x20 [ 44.212398] [ 44.213873] The buggy address belongs to the object at ffff0008037171e0 [ 44.213873] which belongs to the cache kmalloc-16 of size 16 [ 44.226200] The buggy address is located 8 bytes inside of [ 44.226200] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 44.238439] [ 44.239915] The buggy address belongs to the physical page: [ 44.245471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 44.253458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.259966] page_type: f5(slab) [ 44.263100] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.270823] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.278542] page dumped because: kasan: bad access detected [ 44.284098] [ 44.285573] Memory state around the buggy address: [ 44.290351] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 44.297556] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 44.304761] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 44.311962] ^ [ 44.318562] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.325768] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.332968] ================================================================== [ 43.808380] ================================================================== [ 43.815443] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 43.824383] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 43.831674] [ 43.833154] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 43.833200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.833216] Hardware name: WinLink E850-96 board (DT) [ 43.833235] Call trace: [ 43.833247] show_stack+0x20/0x38 (C) [ 43.833277] dump_stack_lvl+0x8c/0xd0 [ 43.833310] print_report+0x118/0x608 [ 43.833339] kasan_report+0xdc/0x128 [ 43.833366] __asan_report_load8_noabort+0x20/0x30 [ 43.833400] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 43.833435] kasan_bitops_generic+0x11c/0x1c8 [ 43.833462] kunit_try_run_case+0x170/0x3f0 [ 43.833494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.833532] kthread+0x328/0x630 [ 43.833564] ret_from_fork+0x10/0x20 [ 43.833597] [ 43.902246] Allocated by task 308: [ 43.905633] kasan_save_stack+0x3c/0x68 [ 43.909451] kasan_save_track+0x20/0x40 [ 43.913270] kasan_save_alloc_info+0x40/0x58 [ 43.917523] __kasan_kmalloc+0xd4/0xd8 [ 43.921256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.925770] kasan_bitops_generic+0xa0/0x1c8 [ 43.930023] kunit_try_run_case+0x170/0x3f0 [ 43.934190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.939659] kthread+0x328/0x630 [ 43.942870] ret_from_fork+0x10/0x20 [ 43.946429] [ 43.947905] The buggy address belongs to the object at ffff0008037171e0 [ 43.947905] which belongs to the cache kmalloc-16 of size 16 [ 43.960231] The buggy address is located 8 bytes inside of [ 43.960231] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 43.972470] [ 43.973946] The buggy address belongs to the physical page: [ 43.979502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 43.987489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.993998] page_type: f5(slab) [ 43.997131] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.004855] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.012574] page dumped because: kasan: bad access detected [ 44.018129] [ 44.019605] Memory state around the buggy address: [ 44.024384] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 44.031588] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 44.038792] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 44.045994] ^ [ 44.052594] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.059799] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.067000] ================================================================== [ 42.468115] ================================================================== [ 42.475185] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 42.484125] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 42.491503] [ 42.492983] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 42.493029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.493044] Hardware name: WinLink E850-96 board (DT) [ 42.493063] Call trace: [ 42.493075] show_stack+0x20/0x38 (C) [ 42.493107] dump_stack_lvl+0x8c/0xd0 [ 42.493138] print_report+0x118/0x608 [ 42.493166] kasan_report+0xdc/0x128 [ 42.493195] kasan_check_range+0x100/0x1a8 [ 42.493227] __kasan_check_write+0x20/0x30 [ 42.493258] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 42.493290] kasan_bitops_generic+0x11c/0x1c8 [ 42.493319] kunit_try_run_case+0x170/0x3f0 [ 42.493349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.493386] kthread+0x328/0x630 [ 42.493417] ret_from_fork+0x10/0x20 [ 42.493448] [ 42.565460] Allocated by task 308: [ 42.568846] kasan_save_stack+0x3c/0x68 [ 42.572665] kasan_save_track+0x20/0x40 [ 42.576485] kasan_save_alloc_info+0x40/0x58 [ 42.580738] __kasan_kmalloc+0xd4/0xd8 [ 42.584470] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.588984] kasan_bitops_generic+0xa0/0x1c8 [ 42.593238] kunit_try_run_case+0x170/0x3f0 [ 42.597404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.602873] kthread+0x328/0x630 [ 42.606085] ret_from_fork+0x10/0x20 [ 42.609644] [ 42.611119] The buggy address belongs to the object at ffff0008037171e0 [ 42.611119] which belongs to the cache kmalloc-16 of size 16 [ 42.623446] The buggy address is located 8 bytes inside of [ 42.623446] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 42.635685] [ 42.637161] The buggy address belongs to the physical page: [ 42.642717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 42.650704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.657214] page_type: f5(slab) [ 42.660347] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.668070] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.675789] page dumped because: kasan: bad access detected [ 42.681344] [ 42.682820] Memory state around the buggy address: [ 42.687598] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 42.694802] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 42.702007] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 42.709208] ^ [ 42.715809] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.723014] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.730215] ================================================================== [ 42.202156] ================================================================== [ 42.209217] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 42.218157] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 42.225448] [ 42.226930] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 42.226978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.226997] Hardware name: WinLink E850-96 board (DT) [ 42.227012] Call trace: [ 42.227022] show_stack+0x20/0x38 (C) [ 42.227050] dump_stack_lvl+0x8c/0xd0 [ 42.227083] print_report+0x118/0x608 [ 42.227110] kasan_report+0xdc/0x128 [ 42.227140] __asan_report_load8_noabort+0x20/0x30 [ 42.227172] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 42.227205] kasan_bitops_generic+0x11c/0x1c8 [ 42.227232] kunit_try_run_case+0x170/0x3f0 [ 42.227263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.227300] kthread+0x328/0x630 [ 42.227330] ret_from_fork+0x10/0x20 [ 42.227359] [ 42.296020] Allocated by task 308: [ 42.299407] kasan_save_stack+0x3c/0x68 [ 42.303225] kasan_save_track+0x20/0x40 [ 42.307044] kasan_save_alloc_info+0x40/0x58 [ 42.311298] __kasan_kmalloc+0xd4/0xd8 [ 42.315030] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.319544] kasan_bitops_generic+0xa0/0x1c8 [ 42.323797] kunit_try_run_case+0x170/0x3f0 [ 42.327964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.333433] kthread+0x328/0x630 [ 42.336644] ret_from_fork+0x10/0x20 [ 42.340203] [ 42.341679] The buggy address belongs to the object at ffff0008037171e0 [ 42.341679] which belongs to the cache kmalloc-16 of size 16 [ 42.354006] The buggy address is located 8 bytes inside of [ 42.354006] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 42.366245] [ 42.367720] The buggy address belongs to the physical page: [ 42.373279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 42.381263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.387773] page_type: f5(slab) [ 42.390907] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.398629] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.406348] page dumped because: kasan: bad access detected [ 42.411904] [ 42.413379] Memory state around the buggy address: [ 42.418157] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 42.425362] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 42.432567] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 42.439768] ^ [ 42.446368] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.453573] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.460775] ================================================================== [ 43.003551] ================================================================== [ 43.010594] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 43.019534] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 43.026912] [ 43.028393] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 43.028439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.028457] Hardware name: WinLink E850-96 board (DT) [ 43.028476] Call trace: [ 43.028486] show_stack+0x20/0x38 (C) [ 43.028519] dump_stack_lvl+0x8c/0xd0 [ 43.028549] print_report+0x118/0x608 [ 43.028579] kasan_report+0xdc/0x128 [ 43.028608] kasan_check_range+0x100/0x1a8 [ 43.028639] __kasan_check_write+0x20/0x30 [ 43.028671] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 43.028705] kasan_bitops_generic+0x11c/0x1c8 [ 43.028733] kunit_try_run_case+0x170/0x3f0 [ 43.028767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.028804] kthread+0x328/0x630 [ 43.028836] ret_from_fork+0x10/0x20 [ 43.028866] [ 43.100869] Allocated by task 308: [ 43.104256] kasan_save_stack+0x3c/0x68 [ 43.108074] kasan_save_track+0x20/0x40 [ 43.111893] kasan_save_alloc_info+0x40/0x58 [ 43.116147] __kasan_kmalloc+0xd4/0xd8 [ 43.119879] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.124393] kasan_bitops_generic+0xa0/0x1c8 [ 43.128646] kunit_try_run_case+0x170/0x3f0 [ 43.132813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.138282] kthread+0x328/0x630 [ 43.141493] ret_from_fork+0x10/0x20 [ 43.145053] [ 43.146528] The buggy address belongs to the object at ffff0008037171e0 [ 43.146528] which belongs to the cache kmalloc-16 of size 16 [ 43.158854] The buggy address is located 8 bytes inside of [ 43.158854] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 43.171094] [ 43.172570] The buggy address belongs to the physical page: [ 43.178127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 43.186113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.192622] page_type: f5(slab) [ 43.195756] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.203478] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.211197] page dumped because: kasan: bad access detected [ 43.216753] [ 43.218228] Memory state around the buggy address: [ 43.223006] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 43.230211] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 43.237415] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 43.244617] ^ [ 43.251217] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.258422] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.265623] ================================================================== [ 41.932920] ================================================================== [ 41.939950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 41.948803] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 41.956181] [ 41.957662] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 41.957709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.957726] Hardware name: WinLink E850-96 board (DT) [ 41.957747] Call trace: [ 41.957759] show_stack+0x20/0x38 (C) [ 41.957792] dump_stack_lvl+0x8c/0xd0 [ 41.957823] print_report+0x118/0x608 [ 41.957852] kasan_report+0xdc/0x128 [ 41.957882] kasan_check_range+0x100/0x1a8 [ 41.957912] __kasan_check_write+0x20/0x30 [ 41.957943] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 41.957977] kasan_bitops_generic+0x11c/0x1c8 [ 41.958005] kunit_try_run_case+0x170/0x3f0 [ 41.958037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.958074] kthread+0x328/0x630 [ 41.958107] ret_from_fork+0x10/0x20 [ 41.958139] [ 42.030052] Allocated by task 308: [ 42.033439] kasan_save_stack+0x3c/0x68 [ 42.037257] kasan_save_track+0x20/0x40 [ 42.041076] kasan_save_alloc_info+0x40/0x58 [ 42.045329] __kasan_kmalloc+0xd4/0xd8 [ 42.049062] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.053575] kasan_bitops_generic+0xa0/0x1c8 [ 42.057829] kunit_try_run_case+0x170/0x3f0 [ 42.061995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.067464] kthread+0x328/0x630 [ 42.070676] ret_from_fork+0x10/0x20 [ 42.074235] [ 42.075711] The buggy address belongs to the object at ffff0008037171e0 [ 42.075711] which belongs to the cache kmalloc-16 of size 16 [ 42.088037] The buggy address is located 8 bytes inside of [ 42.088037] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 42.100276] [ 42.101752] The buggy address belongs to the physical page: [ 42.107310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 42.115295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.121805] page_type: f5(slab) [ 42.124938] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.132661] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.140380] page dumped because: kasan: bad access detected [ 42.145935] [ 42.147411] Memory state around the buggy address: [ 42.152190] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 42.159394] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 42.166598] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 42.173800] ^ [ 42.180400] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.187605] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.194806] ================================================================== [ 43.272967] ================================================================== [ 43.280034] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 43.288974] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308 [ 43.296266] [ 43.297745] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 43.297790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.297804] Hardware name: WinLink E850-96 board (DT) [ 43.297823] Call trace: [ 43.297834] show_stack+0x20/0x38 (C) [ 43.297863] dump_stack_lvl+0x8c/0xd0 [ 43.297895] print_report+0x118/0x608 [ 43.297921] kasan_report+0xdc/0x128 [ 43.297949] __asan_report_load8_noabort+0x20/0x30 [ 43.297982] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 43.298016] kasan_bitops_generic+0x11c/0x1c8 [ 43.298046] kunit_try_run_case+0x170/0x3f0 [ 43.298080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.298117] kthread+0x328/0x630 [ 43.298148] ret_from_fork+0x10/0x20 [ 43.298178] [ 43.366837] Allocated by task 308: [ 43.370223] kasan_save_stack+0x3c/0x68 [ 43.374042] kasan_save_track+0x20/0x40 [ 43.377861] kasan_save_alloc_info+0x40/0x58 [ 43.382115] __kasan_kmalloc+0xd4/0xd8 [ 43.385847] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.390361] kasan_bitops_generic+0xa0/0x1c8 [ 43.394614] kunit_try_run_case+0x170/0x3f0 [ 43.398781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.404250] kthread+0x328/0x630 [ 43.407461] ret_from_fork+0x10/0x20 [ 43.411021] [ 43.412496] The buggy address belongs to the object at ffff0008037171e0 [ 43.412496] which belongs to the cache kmalloc-16 of size 16 [ 43.424823] The buggy address is located 8 bytes inside of [ 43.424823] allocated 9-byte region [ffff0008037171e0, ffff0008037171e9) [ 43.437062] [ 43.438538] The buggy address belongs to the physical page: [ 43.444094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717 [ 43.452080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.458591] page_type: f5(slab) [ 43.461724] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.469446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.477165] page dumped because: kasan: bad access detected [ 43.482721] [ 43.484196] Memory state around the buggy address: [ 43.488974] ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc [ 43.496179] ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc [ 43.503384] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc [ 43.510585] ^ [ 43.517185] ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.524390] ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.531592] ==================================================================
[ 19.672835] ================================================================== [ 19.673543] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 19.673958] Read of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282 [ 19.674609] [ 19.675147] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.675269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.675300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.675348] Call Trace: [ 19.675391] <TASK> [ 19.675433] dump_stack_lvl+0x73/0xb0 [ 19.675507] print_report+0xd1/0x650 [ 19.675555] ? __virt_addr_valid+0x1db/0x2d0 [ 19.675605] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 19.675663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.675708] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 19.675768] kasan_report+0x141/0x180 [ 19.675819] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 19.675874] __asan_report_load8_noabort+0x18/0x20 [ 19.675919] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 19.675968] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.676016] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.676065] ? trace_hardirqs_on+0x37/0xe0 [ 19.676150] ? kasan_bitops_generic+0x92/0x1c0 [ 19.676192] kasan_bitops_generic+0x121/0x1c0 [ 19.676217] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.676241] ? __pfx_read_tsc+0x10/0x10 [ 19.676266] ? ktime_get_ts64+0x86/0x230 [ 19.676296] kunit_try_run_case+0x1a5/0x480 [ 19.676324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.676347] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.676374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.676399] ? __kthread_parkme+0x82/0x180 [ 19.676425] ? preempt_count_sub+0x50/0x80 [ 19.676453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.676479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.676504] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.676528] kthread+0x337/0x6f0 [ 19.676548] ? trace_preempt_on+0x20/0xc0 [ 19.676573] ? __pfx_kthread+0x10/0x10 [ 19.676593] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.676616] ? calculate_sigpending+0x7b/0xa0 [ 19.676640] ? __pfx_kthread+0x10/0x10 [ 19.676661] ret_from_fork+0x41/0x80 [ 19.676685] ? __pfx_kthread+0x10/0x10 [ 19.676705] ret_from_fork_asm+0x1a/0x30 [ 19.676740] </TASK> [ 19.676779] [ 19.686355] Allocated by task 282: [ 19.686733] kasan_save_stack+0x45/0x70 [ 19.688928] kasan_save_track+0x18/0x40 [ 19.689798] kasan_save_alloc_info+0x3b/0x50 [ 19.690192] __kasan_kmalloc+0xb7/0xc0 [ 19.690511] __kmalloc_cache_noprof+0x189/0x420 [ 19.690912] kasan_bitops_generic+0x92/0x1c0 [ 19.691309] kunit_try_run_case+0x1a5/0x480 [ 19.691687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.691932] kthread+0x337/0x6f0 [ 19.692131] ret_from_fork+0x41/0x80 [ 19.692322] ret_from_fork_asm+0x1a/0x30 [ 19.692513] [ 19.692629] The buggy address belongs to the object at ffff888101d9a440 [ 19.692629] which belongs to the cache kmalloc-16 of size 16 [ 19.693188] The buggy address is located 8 bytes inside of [ 19.693188] allocated 9-byte region [ffff888101d9a440, ffff888101d9a449) [ 19.693600] [ 19.693805] The buggy address belongs to the physical page: [ 19.694284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a [ 19.694719] flags: 0x200000000000000(node=0|zone=2) [ 19.694962] page_type: f5(slab) [ 19.696139] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.696742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.697928] page dumped because: kasan: bad access detected [ 19.698197] [ 19.698291] Memory state around the buggy address: [ 19.698489] ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 19.698738] ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.699308] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.699820] ^ [ 19.700293] ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.700831] ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.701281] ================================================================== [ 19.546217] ================================================================== [ 19.547289] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 19.548187] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282 [ 19.548915] [ 19.549080] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.549171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.549187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.549212] Call Trace: [ 19.549238] <TASK> [ 19.549264] dump_stack_lvl+0x73/0xb0 [ 19.549309] print_report+0xd1/0x650 [ 19.549337] ? __virt_addr_valid+0x1db/0x2d0 [ 19.549363] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 19.549390] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.549415] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 19.549440] kasan_report+0x141/0x180 [ 19.549464] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 19.549495] kasan_check_range+0x10c/0x1c0 [ 19.549517] __kasan_check_write+0x18/0x20 [ 19.549539] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 19.549564] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.549591] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.549614] ? trace_hardirqs_on+0x37/0xe0 [ 19.549638] ? kasan_bitops_generic+0x92/0x1c0 [ 19.549665] kasan_bitops_generic+0x121/0x1c0 [ 19.549687] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.549711] ? __pfx_read_tsc+0x10/0x10 [ 19.549733] ? ktime_get_ts64+0x86/0x230 [ 19.549791] kunit_try_run_case+0x1a5/0x480 [ 19.549842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.549884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.549929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.549974] ? __kthread_parkme+0x82/0x180 [ 19.550023] ? preempt_count_sub+0x50/0x80 [ 19.550078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.550129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.550172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.550226] kthread+0x337/0x6f0 [ 19.550279] ? trace_preempt_on+0x20/0xc0 [ 19.550328] ? __pfx_kthread+0x10/0x10 [ 19.550372] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.550417] ? calculate_sigpending+0x7b/0xa0 [ 19.550466] ? __pfx_kthread+0x10/0x10 [ 19.550512] ret_from_fork+0x41/0x80 [ 19.550561] ? __pfx_kthread+0x10/0x10 [ 19.550597] ret_from_fork_asm+0x1a/0x30 [ 19.550657] </TASK> [ 19.550676] [ 19.564205] Allocated by task 282: [ 19.564530] kasan_save_stack+0x45/0x70 [ 19.564817] kasan_save_track+0x18/0x40 [ 19.565025] kasan_save_alloc_info+0x3b/0x50 [ 19.565236] __kasan_kmalloc+0xb7/0xc0 [ 19.565437] __kmalloc_cache_noprof+0x189/0x420 [ 19.565787] kasan_bitops_generic+0x92/0x1c0 [ 19.566216] kunit_try_run_case+0x1a5/0x480 [ 19.566611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.567077] kthread+0x337/0x6f0 [ 19.567403] ret_from_fork+0x41/0x80 [ 19.567775] ret_from_fork_asm+0x1a/0x30 [ 19.568173] [ 19.568368] The buggy address belongs to the object at ffff888101d9a440 [ 19.568368] which belongs to the cache kmalloc-16 of size 16 [ 19.569011] The buggy address is located 8 bytes inside of [ 19.569011] allocated 9-byte region [ffff888101d9a440, ffff888101d9a449) [ 19.569486] [ 19.569630] The buggy address belongs to the physical page: [ 19.570131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a [ 19.570780] flags: 0x200000000000000(node=0|zone=2) [ 19.571269] page_type: f5(slab) [ 19.571614] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.572245] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.572857] page dumped because: kasan: bad access detected [ 19.573275] [ 19.573465] Memory state around the buggy address: [ 19.573785] ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 19.574162] ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.574452] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.575047] ^ [ 19.575547] ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.576082] ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.576555] ================================================================== [ 19.512488] ================================================================== [ 19.512941] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 19.513678] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282 [ 19.514269] [ 19.514534] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.514651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.514682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.514727] Call Trace: [ 19.514786] <TASK> [ 19.514845] dump_stack_lvl+0x73/0xb0 [ 19.514929] print_report+0xd1/0x650 [ 19.514998] ? __virt_addr_valid+0x1db/0x2d0 [ 19.515056] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 19.515146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.515188] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 19.515220] kasan_report+0x141/0x180 [ 19.515246] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 19.515303] kasan_check_range+0x10c/0x1c0 [ 19.515342] __kasan_check_write+0x18/0x20 [ 19.515381] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 19.515431] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.515521] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.515569] ? trace_hardirqs_on+0x37/0xe0 [ 19.515613] ? kasan_bitops_generic+0x92/0x1c0 [ 19.515671] kasan_bitops_generic+0x121/0x1c0 [ 19.515760] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.515813] ? __pfx_read_tsc+0x10/0x10 [ 19.515862] ? ktime_get_ts64+0x86/0x230 [ 19.515925] kunit_try_run_case+0x1a5/0x480 [ 19.515972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.515998] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.516024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.516049] ? __kthread_parkme+0x82/0x180 [ 19.516073] ? preempt_count_sub+0x50/0x80 [ 19.516119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.516165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.516192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.516217] kthread+0x337/0x6f0 [ 19.516237] ? trace_preempt_on+0x20/0xc0 [ 19.516263] ? __pfx_kthread+0x10/0x10 [ 19.516284] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.516307] ? calculate_sigpending+0x7b/0xa0 [ 19.516333] ? __pfx_kthread+0x10/0x10 [ 19.516354] ret_from_fork+0x41/0x80 [ 19.516378] ? __pfx_kthread+0x10/0x10 [ 19.516398] ret_from_fork_asm+0x1a/0x30 [ 19.516433] </TASK> [ 19.516451] [ 19.531159] Allocated by task 282: [ 19.531475] kasan_save_stack+0x45/0x70 [ 19.531703] kasan_save_track+0x18/0x40 [ 19.532000] kasan_save_alloc_info+0x3b/0x50 [ 19.532295] __kasan_kmalloc+0xb7/0xc0 [ 19.532609] __kmalloc_cache_noprof+0x189/0x420 [ 19.533032] kasan_bitops_generic+0x92/0x1c0 [ 19.533417] kunit_try_run_case+0x1a5/0x480 [ 19.533973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.534470] kthread+0x337/0x6f0 [ 19.534785] ret_from_fork+0x41/0x80 [ 19.535084] ret_from_fork_asm+0x1a/0x30 [ 19.535504] [ 19.535713] The buggy address belongs to the object at ffff888101d9a440 [ 19.535713] which belongs to the cache kmalloc-16 of size 16 [ 19.536202] The buggy address is located 8 bytes inside of [ 19.536202] allocated 9-byte region [ffff888101d9a440, ffff888101d9a449) [ 19.537192] [ 19.537576] The buggy address belongs to the physical page: [ 19.537989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a [ 19.538841] flags: 0x200000000000000(node=0|zone=2) [ 19.539178] page_type: f5(slab) [ 19.539391] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.539998] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.540475] page dumped because: kasan: bad access detected [ 19.540860] [ 19.540986] Memory state around the buggy address: [ 19.541210] ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 19.541958] ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.542766] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.543092] ^ [ 19.543912] ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544373] ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544973] ================================================================== [ 19.477768] ================================================================== [ 19.478632] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 19.479121] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282 [ 19.479703] [ 19.480150] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.480503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.480522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.480546] Call Trace: [ 19.480571] <TASK> [ 19.480597] dump_stack_lvl+0x73/0xb0 [ 19.480644] print_report+0xd1/0x650 [ 19.480670] ? __virt_addr_valid+0x1db/0x2d0 [ 19.480698] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 19.480724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.480769] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 19.480800] kasan_report+0x141/0x180 [ 19.480825] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 19.480856] kasan_check_range+0x10c/0x1c0 [ 19.480879] __kasan_check_write+0x18/0x20 [ 19.480901] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 19.480927] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.480954] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.480977] ? trace_hardirqs_on+0x37/0xe0 [ 19.481003] ? kasan_bitops_generic+0x92/0x1c0 [ 19.481028] kasan_bitops_generic+0x121/0x1c0 [ 19.481051] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.481075] ? __pfx_read_tsc+0x10/0x10 [ 19.481098] ? ktime_get_ts64+0x86/0x230 [ 19.481144] kunit_try_run_case+0x1a5/0x480 [ 19.481175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.481199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.481225] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.481249] ? __kthread_parkme+0x82/0x180 [ 19.481274] ? preempt_count_sub+0x50/0x80 [ 19.481301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.481327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.481351] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.481376] kthread+0x337/0x6f0 [ 19.481394] ? trace_preempt_on+0x20/0xc0 [ 19.481418] ? __pfx_kthread+0x10/0x10 [ 19.481438] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.481461] ? calculate_sigpending+0x7b/0xa0 [ 19.481485] ? __pfx_kthread+0x10/0x10 [ 19.481506] ret_from_fork+0x41/0x80 [ 19.481528] ? __pfx_kthread+0x10/0x10 [ 19.481548] ret_from_fork_asm+0x1a/0x30 [ 19.481582] </TASK> [ 19.481597] [ 19.497016] Allocated by task 282: [ 19.497498] kasan_save_stack+0x45/0x70 [ 19.497718] kasan_save_track+0x18/0x40 [ 19.497900] kasan_save_alloc_info+0x3b/0x50 [ 19.498522] __kasan_kmalloc+0xb7/0xc0 [ 19.498781] __kmalloc_cache_noprof+0x189/0x420 [ 19.498969] kasan_bitops_generic+0x92/0x1c0 [ 19.499668] kunit_try_run_case+0x1a5/0x480 [ 19.499951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.500723] kthread+0x337/0x6f0 [ 19.500932] ret_from_fork+0x41/0x80 [ 19.501484] ret_from_fork_asm+0x1a/0x30 [ 19.501680] [ 19.502151] The buggy address belongs to the object at ffff888101d9a440 [ 19.502151] which belongs to the cache kmalloc-16 of size 16 [ 19.503051] The buggy address is located 8 bytes inside of [ 19.503051] allocated 9-byte region [ffff888101d9a440, ffff888101d9a449) [ 19.503710] [ 19.503873] The buggy address belongs to the physical page: [ 19.504080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a [ 19.505555] flags: 0x200000000000000(node=0|zone=2) [ 19.505872] page_type: f5(slab) [ 19.506343] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.506758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.507312] page dumped because: kasan: bad access detected [ 19.507636] [ 19.507841] Memory state around the buggy address: [ 19.508219] ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 19.508674] ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.509126] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.509553] ^ [ 19.510030] ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.510548] ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.511076] ================================================================== [ 19.444722] ================================================================== [ 19.445095] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 19.445389] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282 [ 19.445948] [ 19.446217] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.446375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.446405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.446454] Call Trace: [ 19.446499] <TASK> [ 19.446543] dump_stack_lvl+0x73/0xb0 [ 19.446620] print_report+0xd1/0x650 [ 19.446675] ? __virt_addr_valid+0x1db/0x2d0 [ 19.446728] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 19.446798] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.446853] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 19.446905] kasan_report+0x141/0x180 [ 19.446943] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 19.446988] kasan_check_range+0x10c/0x1c0 [ 19.447022] __kasan_check_write+0x18/0x20 [ 19.447054] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 19.447094] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.447138] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.447176] ? trace_hardirqs_on+0x37/0xe0 [ 19.447218] ? kasan_bitops_generic+0x92/0x1c0 [ 19.447269] kasan_bitops_generic+0x121/0x1c0 [ 19.447310] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.447407] ? __pfx_read_tsc+0x10/0x10 [ 19.447471] ? ktime_get_ts64+0x86/0x230 [ 19.447529] kunit_try_run_case+0x1a5/0x480 [ 19.447588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.447648] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.447725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.447793] ? __kthread_parkme+0x82/0x180 [ 19.447840] ? preempt_count_sub+0x50/0x80 [ 19.447892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.447946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.447991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.448036] kthread+0x337/0x6f0 [ 19.448076] ? trace_preempt_on+0x20/0xc0 [ 19.448142] ? __pfx_kthread+0x10/0x10 [ 19.448187] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.448239] ? calculate_sigpending+0x7b/0xa0 [ 19.448291] ? __pfx_kthread+0x10/0x10 [ 19.448329] ret_from_fork+0x41/0x80 [ 19.448355] ? __pfx_kthread+0x10/0x10 [ 19.448377] ret_from_fork_asm+0x1a/0x30 [ 19.448414] </TASK> [ 19.448431] [ 19.462249] Allocated by task 282: [ 19.462577] kasan_save_stack+0x45/0x70 [ 19.462938] kasan_save_track+0x18/0x40 [ 19.463353] kasan_save_alloc_info+0x3b/0x50 [ 19.463607] __kasan_kmalloc+0xb7/0xc0 [ 19.463972] __kmalloc_cache_noprof+0x189/0x420 [ 19.464204] kasan_bitops_generic+0x92/0x1c0 [ 19.464599] kunit_try_run_case+0x1a5/0x480 [ 19.465194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.465566] kthread+0x337/0x6f0 [ 19.465776] ret_from_fork+0x41/0x80 [ 19.466134] ret_from_fork_asm+0x1a/0x30 [ 19.466531] [ 19.466768] The buggy address belongs to the object at ffff888101d9a440 [ 19.466768] which belongs to the cache kmalloc-16 of size 16 [ 19.467331] The buggy address is located 8 bytes inside of [ 19.467331] allocated 9-byte region [ffff888101d9a440, ffff888101d9a449) [ 19.468365] [ 19.468506] The buggy address belongs to the physical page: [ 19.469044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a [ 19.469511] flags: 0x200000000000000(node=0|zone=2) [ 19.469775] page_type: f5(slab) [ 19.470095] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.470868] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.471342] page dumped because: kasan: bad access detected [ 19.471732] [ 19.471951] Memory state around the buggy address: [ 19.472396] ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 19.472672] ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.473228] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.473783] ^ [ 19.474171] ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.474595] ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.475822] ================================================================== [ 19.401997] ================================================================== [ 19.402531] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 19.403383] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282 [ 19.403654] [ 19.403887] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.403995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.404026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.404074] Call Trace: [ 19.404150] <TASK> [ 19.404201] dump_stack_lvl+0x73/0xb0 [ 19.404274] print_report+0xd1/0x650 [ 19.404329] ? __virt_addr_valid+0x1db/0x2d0 [ 19.404378] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 19.404431] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.404484] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 19.404539] kasan_report+0x141/0x180 [ 19.404587] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 19.404656] kasan_check_range+0x10c/0x1c0 [ 19.404704] __kasan_check_write+0x18/0x20 [ 19.404762] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 19.404812] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.404861] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.404913] ? trace_hardirqs_on+0x37/0xe0 [ 19.404963] ? kasan_bitops_generic+0x92/0x1c0 [ 19.405012] kasan_bitops_generic+0x121/0x1c0 [ 19.405060] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.405142] ? __pfx_read_tsc+0x10/0x10 [ 19.405195] ? ktime_get_ts64+0x86/0x230 [ 19.405258] kunit_try_run_case+0x1a5/0x480 [ 19.405315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.405389] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.405440] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.405488] ? __kthread_parkme+0x82/0x180 [ 19.405527] ? preempt_count_sub+0x50/0x80 [ 19.405575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.405626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.405674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.405758] kthread+0x337/0x6f0 [ 19.405800] ? trace_preempt_on+0x20/0xc0 [ 19.405860] ? __pfx_kthread+0x10/0x10 [ 19.405902] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.405946] ? calculate_sigpending+0x7b/0xa0 [ 19.405992] ? __pfx_kthread+0x10/0x10 [ 19.406037] ret_from_fork+0x41/0x80 [ 19.406086] ? __pfx_kthread+0x10/0x10 [ 19.406168] ret_from_fork_asm+0x1a/0x30 [ 19.406244] </TASK> [ 19.406276] [ 19.428143] Allocated by task 282: [ 19.428494] kasan_save_stack+0x45/0x70 [ 19.428862] kasan_save_track+0x18/0x40 [ 19.429769] kasan_save_alloc_info+0x3b/0x50 [ 19.430091] __kasan_kmalloc+0xb7/0xc0 [ 19.430310] __kmalloc_cache_noprof+0x189/0x420 [ 19.430820] kasan_bitops_generic+0x92/0x1c0 [ 19.431062] kunit_try_run_case+0x1a5/0x480 [ 19.431863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.432444] kthread+0x337/0x6f0 [ 19.432725] ret_from_fork+0x41/0x80 [ 19.433310] ret_from_fork_asm+0x1a/0x30 [ 19.433522] [ 19.433668] The buggy address belongs to the object at ffff888101d9a440 [ 19.433668] which belongs to the cache kmalloc-16 of size 16 [ 19.434806] The buggy address is located 8 bytes inside of [ 19.434806] allocated 9-byte region [ffff888101d9a440, ffff888101d9a449) [ 19.435845] [ 19.436035] The buggy address belongs to the physical page: [ 19.436623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a [ 19.437071] flags: 0x200000000000000(node=0|zone=2) [ 19.437481] page_type: f5(slab) [ 19.437675] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.438429] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.438906] page dumped because: kasan: bad access detected [ 19.439724] [ 19.439963] Memory state around the buggy address: [ 19.440522] ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 19.441092] ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.441581] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.441909] ^ [ 19.442072] ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.442665] ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.443221] ================================================================== [ 19.640072] ================================================================== [ 19.640863] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 19.641928] Read of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282 [ 19.642396] [ 19.642646] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.642798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.642831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.642882] Call Trace: [ 19.642925] <TASK> [ 19.642970] dump_stack_lvl+0x73/0xb0 [ 19.643044] print_report+0xd1/0x650 [ 19.643097] ? __virt_addr_valid+0x1db/0x2d0 [ 19.643147] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 19.643202] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.643254] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 19.643295] kasan_report+0x141/0x180 [ 19.643322] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 19.643353] kasan_check_range+0x10c/0x1c0 [ 19.643376] __kasan_check_read+0x15/0x20 [ 19.643397] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 19.643423] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.643449] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.643473] ? trace_hardirqs_on+0x37/0xe0 [ 19.643498] ? kasan_bitops_generic+0x92/0x1c0 [ 19.643525] kasan_bitops_generic+0x121/0x1c0 [ 19.643547] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.643571] ? __pfx_read_tsc+0x10/0x10 [ 19.643594] ? ktime_get_ts64+0x86/0x230 [ 19.643632] kunit_try_run_case+0x1a5/0x480 [ 19.643668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.643692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.643719] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.643744] ? __kthread_parkme+0x82/0x180 [ 19.644348] ? preempt_count_sub+0x50/0x80 [ 19.644418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.644472] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.644546] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.644597] kthread+0x337/0x6f0 [ 19.644648] ? trace_preempt_on+0x20/0xc0 [ 19.644710] ? __pfx_kthread+0x10/0x10 [ 19.644767] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.644827] ? calculate_sigpending+0x7b/0xa0 [ 19.644872] ? __pfx_kthread+0x10/0x10 [ 19.644916] ret_from_fork+0x41/0x80 [ 19.644975] ? __pfx_kthread+0x10/0x10 [ 19.645021] ret_from_fork_asm+0x1a/0x30 [ 19.645097] </TASK> [ 19.645515] [ 19.657987] Allocated by task 282: [ 19.658560] kasan_save_stack+0x45/0x70 [ 19.658863] kasan_save_track+0x18/0x40 [ 19.659293] kasan_save_alloc_info+0x3b/0x50 [ 19.659545] __kasan_kmalloc+0xb7/0xc0 [ 19.659769] __kmalloc_cache_noprof+0x189/0x420 [ 19.660025] kasan_bitops_generic+0x92/0x1c0 [ 19.660407] kunit_try_run_case+0x1a5/0x480 [ 19.660799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.661251] kthread+0x337/0x6f0 [ 19.661567] ret_from_fork+0x41/0x80 [ 19.662050] ret_from_fork_asm+0x1a/0x30 [ 19.662444] [ 19.662668] The buggy address belongs to the object at ffff888101d9a440 [ 19.662668] which belongs to the cache kmalloc-16 of size 16 [ 19.663681] The buggy address is located 8 bytes inside of [ 19.663681] allocated 9-byte region [ffff888101d9a440, ffff888101d9a449) [ 19.664763] [ 19.664982] The buggy address belongs to the physical page: [ 19.665536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a [ 19.666113] flags: 0x200000000000000(node=0|zone=2) [ 19.666566] page_type: f5(slab) [ 19.666895] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.667585] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.667928] page dumped because: kasan: bad access detected [ 19.668684] [ 19.668858] Memory state around the buggy address: [ 19.669362] ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 19.669653] ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.669989] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.670299] ^ [ 19.670780] ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671076] ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671466] ================================================================== [ 19.578130] ================================================================== [ 19.578674] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 19.579343] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282 [ 19.579650] [ 19.579891] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.579988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.580010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.580045] Call Trace: [ 19.580082] <TASK> [ 19.580145] dump_stack_lvl+0x73/0xb0 [ 19.580229] print_report+0xd1/0x650 [ 19.580277] ? __virt_addr_valid+0x1db/0x2d0 [ 19.580331] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 19.580385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.580439] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 19.580492] kasan_report+0x141/0x180 [ 19.580546] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 19.580614] kasan_check_range+0x10c/0x1c0 [ 19.580663] __kasan_check_write+0x18/0x20 [ 19.580706] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 19.580779] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.580833] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.580875] ? trace_hardirqs_on+0x37/0xe0 [ 19.581216] ? kasan_bitops_generic+0x92/0x1c0 [ 19.581287] kasan_bitops_generic+0x121/0x1c0 [ 19.581341] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.581389] ? __pfx_read_tsc+0x10/0x10 [ 19.581436] ? ktime_get_ts64+0x86/0x230 [ 19.581690] kunit_try_run_case+0x1a5/0x480 [ 19.581742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.581791] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.581830] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.581866] ? __kthread_parkme+0x82/0x180 [ 19.581900] ? preempt_count_sub+0x50/0x80 [ 19.581943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.581983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.582024] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.582070] kthread+0x337/0x6f0 [ 19.582108] ? trace_preempt_on+0x20/0xc0 [ 19.582207] ? __pfx_kthread+0x10/0x10 [ 19.582251] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.582297] ? calculate_sigpending+0x7b/0xa0 [ 19.582346] ? __pfx_kthread+0x10/0x10 [ 19.582387] ret_from_fork+0x41/0x80 [ 19.582433] ? __pfx_kthread+0x10/0x10 [ 19.582473] ret_from_fork_asm+0x1a/0x30 [ 19.582569] </TASK> [ 19.582599] [ 19.594242] Allocated by task 282: [ 19.594650] kasan_save_stack+0x45/0x70 [ 19.595009] kasan_save_track+0x18/0x40 [ 19.595486] kasan_save_alloc_info+0x3b/0x50 [ 19.595811] __kasan_kmalloc+0xb7/0xc0 [ 19.596092] __kmalloc_cache_noprof+0x189/0x420 [ 19.596405] kasan_bitops_generic+0x92/0x1c0 [ 19.596622] kunit_try_run_case+0x1a5/0x480 [ 19.596854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.597100] kthread+0x337/0x6f0 [ 19.597287] ret_from_fork+0x41/0x80 [ 19.597480] ret_from_fork_asm+0x1a/0x30 [ 19.597853] [ 19.598107] The buggy address belongs to the object at ffff888101d9a440 [ 19.598107] which belongs to the cache kmalloc-16 of size 16 [ 19.599009] The buggy address is located 8 bytes inside of [ 19.599009] allocated 9-byte region [ffff888101d9a440, ffff888101d9a449) [ 19.600278] [ 19.600473] The buggy address belongs to the physical page: [ 19.600802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a [ 19.601126] flags: 0x200000000000000(node=0|zone=2) [ 19.601373] page_type: f5(slab) [ 19.601613] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.602220] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.602852] page dumped because: kasan: bad access detected [ 19.603291] [ 19.603546] Memory state around the buggy address: [ 19.603974] ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 19.604709] ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.605092] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.605482] ^ [ 19.605734] ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.606029] ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.606314] ================================================================== [ 19.608476] ================================================================== [ 19.609146] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 19.610162] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282 [ 19.610757] [ 19.611023] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 19.611160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.611193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.611242] Call Trace: [ 19.611287] <TASK> [ 19.611334] dump_stack_lvl+0x73/0xb0 [ 19.611405] print_report+0xd1/0x650 [ 19.611461] ? __virt_addr_valid+0x1db/0x2d0 [ 19.611515] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 19.611570] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.611640] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 19.611698] kasan_report+0x141/0x180 [ 19.612233] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 19.612343] kasan_check_range+0x10c/0x1c0 [ 19.612403] __kasan_check_write+0x18/0x20 [ 19.612450] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 19.612505] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.612566] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.612616] ? trace_hardirqs_on+0x37/0xe0 [ 19.612669] ? kasan_bitops_generic+0x92/0x1c0 [ 19.612726] kasan_bitops_generic+0x121/0x1c0 [ 19.612787] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.612840] ? __pfx_read_tsc+0x10/0x10 [ 19.612887] ? ktime_get_ts64+0x86/0x230 [ 19.612946] kunit_try_run_case+0x1a5/0x480 [ 19.612999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.613039] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.613073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.613097] ? __kthread_parkme+0x82/0x180 [ 19.613156] ? preempt_count_sub+0x50/0x80 [ 19.613189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.613216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.613240] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.613265] kthread+0x337/0x6f0 [ 19.613285] ? trace_preempt_on+0x20/0xc0 [ 19.613310] ? __pfx_kthread+0x10/0x10 [ 19.613329] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.613352] ? calculate_sigpending+0x7b/0xa0 [ 19.613377] ? __pfx_kthread+0x10/0x10 [ 19.613398] ret_from_fork+0x41/0x80 [ 19.613420] ? __pfx_kthread+0x10/0x10 [ 19.613441] ret_from_fork_asm+0x1a/0x30 [ 19.613476] </TASK> [ 19.613492] [ 19.625938] Allocated by task 282: [ 19.626307] kasan_save_stack+0x45/0x70 [ 19.626718] kasan_save_track+0x18/0x40 [ 19.627160] kasan_save_alloc_info+0x3b/0x50 [ 19.627649] __kasan_kmalloc+0xb7/0xc0 [ 19.628038] __kmalloc_cache_noprof+0x189/0x420 [ 19.628475] kasan_bitops_generic+0x92/0x1c0 [ 19.628701] kunit_try_run_case+0x1a5/0x480 [ 19.629097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.629545] kthread+0x337/0x6f0 [ 19.629883] ret_from_fork+0x41/0x80 [ 19.630165] ret_from_fork_asm+0x1a/0x30 [ 19.630485] [ 19.630701] The buggy address belongs to the object at ffff888101d9a440 [ 19.630701] which belongs to the cache kmalloc-16 of size 16 [ 19.631525] The buggy address is located 8 bytes inside of [ 19.631525] allocated 9-byte region [ffff888101d9a440, ffff888101d9a449) [ 19.632319] [ 19.632464] The buggy address belongs to the physical page: [ 19.632706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a [ 19.633032] flags: 0x200000000000000(node=0|zone=2) [ 19.633607] page_type: f5(slab) [ 19.633987] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.634578] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.635284] page dumped because: kasan: bad access detected [ 19.635868] [ 19.636061] Memory state around the buggy address: [ 19.636355] ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 19.636650] ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.636952] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.637234] ^ [ 19.637555] ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.638162] ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.638778] ==================================================================