Date
June 26, 2025, 11:12 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 42.984018] ================================================================== [ 42.991048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 42.999205] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 43.006496] [ 43.007980] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 43.008033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.008051] Hardware name: WinLink E850-96 board (DT) [ 43.008071] Call trace: [ 43.008084] show_stack+0x20/0x38 (C) [ 43.008119] dump_stack_lvl+0x8c/0xd0 [ 43.008159] print_report+0x118/0x608 [ 43.008191] kasan_report+0xdc/0x128 [ 43.008219] __asan_report_load8_noabort+0x20/0x30 [ 43.008255] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 43.008289] kasan_bitops_generic+0x110/0x1c8 [ 43.008319] kunit_try_run_case+0x170/0x3f0 [ 43.008358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.008397] kthread+0x328/0x630 [ 43.008433] ret_from_fork+0x10/0x20 [ 43.008470] [ 43.076286] Allocated by task 310: [ 43.079672] kasan_save_stack+0x3c/0x68 [ 43.083491] kasan_save_track+0x20/0x40 [ 43.087310] kasan_save_alloc_info+0x40/0x58 [ 43.091564] __kasan_kmalloc+0xd4/0xd8 [ 43.095296] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.099810] kasan_bitops_generic+0xa0/0x1c8 [ 43.104063] kunit_try_run_case+0x170/0x3f0 [ 43.108230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.113699] kthread+0x328/0x630 [ 43.116911] ret_from_fork+0x10/0x20 [ 43.120470] [ 43.121945] The buggy address belongs to the object at ffff000802e0b440 [ 43.121945] which belongs to the cache kmalloc-16 of size 16 [ 43.134273] The buggy address is located 8 bytes inside of [ 43.134273] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 43.146511] [ 43.147989] The buggy address belongs to the physical page: [ 43.153546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 43.161530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.168039] page_type: f5(slab) [ 43.171176] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.178896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.186614] page dumped because: kasan: bad access detected [ 43.192170] [ 43.193646] Memory state around the buggy address: [ 43.198426] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 43.205630] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 43.212834] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 43.220034] ^ [ 43.225595] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.232798] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.240000] ================================================================== [ 41.387629] ================================================================== [ 41.396976] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.405133] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 41.412509] [ 41.413995] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 41.414056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.414074] Hardware name: WinLink E850-96 board (DT) [ 41.414098] Call trace: [ 41.414114] show_stack+0x20/0x38 (C) [ 41.414154] dump_stack_lvl+0x8c/0xd0 [ 41.414195] print_report+0x118/0x608 [ 41.414230] kasan_report+0xdc/0x128 [ 41.414260] kasan_check_range+0x100/0x1a8 [ 41.414294] __kasan_check_write+0x20/0x30 [ 41.414328] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.414364] kasan_bitops_generic+0x110/0x1c8 [ 41.414398] kunit_try_run_case+0x170/0x3f0 [ 41.414439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.414478] kthread+0x328/0x630 [ 41.414516] ret_from_fork+0x10/0x20 [ 41.414556] [ 41.485685] Allocated by task 310: [ 41.489075] kasan_save_stack+0x3c/0x68 [ 41.492890] kasan_save_track+0x20/0x40 [ 41.496709] kasan_save_alloc_info+0x40/0x58 [ 41.500963] __kasan_kmalloc+0xd4/0xd8 [ 41.504695] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.509209] kasan_bitops_generic+0xa0/0x1c8 [ 41.513464] kunit_try_run_case+0x170/0x3f0 [ 41.517629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.523098] kthread+0x328/0x630 [ 41.526310] ret_from_fork+0x10/0x20 [ 41.529869] [ 41.531347] The buggy address belongs to the object at ffff000802e0b440 [ 41.531347] which belongs to the cache kmalloc-16 of size 16 [ 41.543673] The buggy address is located 8 bytes inside of [ 41.543673] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 41.555910] [ 41.557390] The buggy address belongs to the physical page: [ 41.562946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 41.570929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.577439] page_type: f5(slab) [ 41.580578] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.588295] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.596013] page dumped because: kasan: bad access detected [ 41.601570] [ 41.603046] Memory state around the buggy address: [ 41.607827] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 41.615028] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 41.622232] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 41.629433] ^ [ 41.634992] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.642197] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.649400] ================================================================== [ 41.920181] ================================================================== [ 41.927176] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 41.935331] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 41.942710] [ 41.944193] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 41.944247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.944264] Hardware name: WinLink E850-96 board (DT) [ 41.944286] Call trace: [ 41.944298] show_stack+0x20/0x38 (C) [ 41.944330] dump_stack_lvl+0x8c/0xd0 [ 41.944368] print_report+0x118/0x608 [ 41.944399] kasan_report+0xdc/0x128 [ 41.944428] kasan_check_range+0x100/0x1a8 [ 41.944463] __kasan_check_write+0x20/0x30 [ 41.944496] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 41.944529] kasan_bitops_generic+0x110/0x1c8 [ 41.944558] kunit_try_run_case+0x170/0x3f0 [ 41.944598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.944640] kthread+0x328/0x630 [ 41.944675] ret_from_fork+0x10/0x20 [ 41.944708] [ 42.015886] Allocated by task 310: [ 42.019274] kasan_save_stack+0x3c/0x68 [ 42.023090] kasan_save_track+0x20/0x40 [ 42.026910] kasan_save_alloc_info+0x40/0x58 [ 42.031163] __kasan_kmalloc+0xd4/0xd8 [ 42.034896] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.039410] kasan_bitops_generic+0xa0/0x1c8 [ 42.043663] kunit_try_run_case+0x170/0x3f0 [ 42.047830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.053298] kthread+0x328/0x630 [ 42.056510] ret_from_fork+0x10/0x20 [ 42.060069] [ 42.061544] The buggy address belongs to the object at ffff000802e0b440 [ 42.061544] which belongs to the cache kmalloc-16 of size 16 [ 42.073871] The buggy address is located 8 bytes inside of [ 42.073871] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 42.086110] [ 42.087588] The buggy address belongs to the physical page: [ 42.093145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 42.101129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.107638] page_type: f5(slab) [ 42.110776] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.118495] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.126214] page dumped because: kasan: bad access detected [ 42.131769] [ 42.133245] Memory state around the buggy address: [ 42.138025] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 42.145228] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 42.152433] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 42.159634] ^ [ 42.165193] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.172398] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.179599] ================================================================== [ 43.247315] ================================================================== [ 43.254412] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.262569] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 43.269947] [ 43.271430] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 43.271484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.271503] Hardware name: WinLink E850-96 board (DT) [ 43.271524] Call trace: [ 43.271536] show_stack+0x20/0x38 (C) [ 43.271572] dump_stack_lvl+0x8c/0xd0 [ 43.271612] print_report+0x118/0x608 [ 43.271643] kasan_report+0xdc/0x128 [ 43.271672] kasan_check_range+0x100/0x1a8 [ 43.271706] __kasan_check_write+0x20/0x30 [ 43.271738] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.271772] kasan_bitops_generic+0x110/0x1c8 [ 43.271802] kunit_try_run_case+0x170/0x3f0 [ 43.271839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.271878] kthread+0x328/0x630 [ 43.271912] ret_from_fork+0x10/0x20 [ 43.271945] [ 43.343122] Allocated by task 310: [ 43.346510] kasan_save_stack+0x3c/0x68 [ 43.350327] kasan_save_track+0x20/0x40 [ 43.354147] kasan_save_alloc_info+0x40/0x58 [ 43.358400] __kasan_kmalloc+0xd4/0xd8 [ 43.362133] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.366647] kasan_bitops_generic+0xa0/0x1c8 [ 43.370900] kunit_try_run_case+0x170/0x3f0 [ 43.375066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.380535] kthread+0x328/0x630 [ 43.383747] ret_from_fork+0x10/0x20 [ 43.387306] [ 43.388782] The buggy address belongs to the object at ffff000802e0b440 [ 43.388782] which belongs to the cache kmalloc-16 of size 16 [ 43.401108] The buggy address is located 8 bytes inside of [ 43.401108] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 43.413347] [ 43.414825] The buggy address belongs to the physical page: [ 43.420382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 43.428366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.434875] page_type: f5(slab) [ 43.438013] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.445732] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.453451] page dumped because: kasan: bad access detected [ 43.459006] [ 43.460482] Memory state around the buggy address: [ 43.465264] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 43.472465] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 43.479671] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 43.486871] ^ [ 43.492431] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.499635] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.506836] ================================================================== [ 43.780993] ================================================================== [ 43.788084] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.796241] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 43.803532] [ 43.805015] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 43.805066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.805081] Hardware name: WinLink E850-96 board (DT) [ 43.805101] Call trace: [ 43.805114] show_stack+0x20/0x38 (C) [ 43.805146] dump_stack_lvl+0x8c/0xd0 [ 43.805186] print_report+0x118/0x608 [ 43.805215] kasan_report+0xdc/0x128 [ 43.805245] __asan_report_load8_noabort+0x20/0x30 [ 43.805282] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.805314] kasan_bitops_generic+0x110/0x1c8 [ 43.805345] kunit_try_run_case+0x170/0x3f0 [ 43.805382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.805421] kthread+0x328/0x630 [ 43.805455] ret_from_fork+0x10/0x20 [ 43.805491] [ 43.873323] Allocated by task 310: [ 43.876709] kasan_save_stack+0x3c/0x68 [ 43.880528] kasan_save_track+0x20/0x40 [ 43.884347] kasan_save_alloc_info+0x40/0x58 [ 43.888600] __kasan_kmalloc+0xd4/0xd8 [ 43.892333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.896847] kasan_bitops_generic+0xa0/0x1c8 [ 43.901100] kunit_try_run_case+0x170/0x3f0 [ 43.905267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.910736] kthread+0x328/0x630 [ 43.913947] ret_from_fork+0x10/0x20 [ 43.917507] [ 43.918981] The buggy address belongs to the object at ffff000802e0b440 [ 43.918981] which belongs to the cache kmalloc-16 of size 16 [ 43.931308] The buggy address is located 8 bytes inside of [ 43.931308] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 43.943548] [ 43.945024] The buggy address belongs to the physical page: [ 43.950582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 43.958567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.965075] page_type: f5(slab) [ 43.968210] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.975932] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.983651] page dumped because: kasan: bad access detected [ 43.989206] [ 43.990682] Memory state around the buggy address: [ 43.995463] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 44.002665] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 44.009870] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 44.017071] ^ [ 44.022630] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.029835] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.037036] ================================================================== [ 42.717119] ================================================================== [ 42.724212] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.732368] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 42.739746] [ 42.741229] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 42.741285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.741304] Hardware name: WinLink E850-96 board (DT) [ 42.741323] Call trace: [ 42.741336] show_stack+0x20/0x38 (C) [ 42.741370] dump_stack_lvl+0x8c/0xd0 [ 42.741410] print_report+0x118/0x608 [ 42.741440] kasan_report+0xdc/0x128 [ 42.741471] kasan_check_range+0x100/0x1a8 [ 42.741504] __kasan_check_write+0x20/0x30 [ 42.741539] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.741573] kasan_bitops_generic+0x110/0x1c8 [ 42.741604] kunit_try_run_case+0x170/0x3f0 [ 42.741642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.741682] kthread+0x328/0x630 [ 42.741716] ret_from_fork+0x10/0x20 [ 42.741750] [ 42.812921] Allocated by task 310: [ 42.816308] kasan_save_stack+0x3c/0x68 [ 42.820127] kasan_save_track+0x20/0x40 [ 42.823947] kasan_save_alloc_info+0x40/0x58 [ 42.828200] __kasan_kmalloc+0xd4/0xd8 [ 42.831933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.836446] kasan_bitops_generic+0xa0/0x1c8 [ 42.840700] kunit_try_run_case+0x170/0x3f0 [ 42.844866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.850334] kthread+0x328/0x630 [ 42.853546] ret_from_fork+0x10/0x20 [ 42.857106] [ 42.858581] The buggy address belongs to the object at ffff000802e0b440 [ 42.858581] which belongs to the cache kmalloc-16 of size 16 [ 42.870909] The buggy address is located 8 bytes inside of [ 42.870909] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 42.883147] [ 42.884625] The buggy address belongs to the physical page: [ 42.890182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 42.898166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.904674] page_type: f5(slab) [ 42.907812] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.915532] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.923251] page dumped because: kasan: bad access detected [ 42.928806] [ 42.930281] Memory state around the buggy address: [ 42.935064] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 42.942267] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 42.949471] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 42.956670] ^ [ 42.962231] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.969435] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.976635] ================================================================== [ 42.450507] ================================================================== [ 42.457375] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.465532] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 42.472910] [ 42.474395] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 42.474449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.474467] Hardware name: WinLink E850-96 board (DT) [ 42.474489] Call trace: [ 42.474502] show_stack+0x20/0x38 (C) [ 42.474536] dump_stack_lvl+0x8c/0xd0 [ 42.474575] print_report+0x118/0x608 [ 42.474608] kasan_report+0xdc/0x128 [ 42.474638] kasan_check_range+0x100/0x1a8 [ 42.474671] __kasan_check_write+0x20/0x30 [ 42.474707] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.474740] kasan_bitops_generic+0x110/0x1c8 [ 42.474771] kunit_try_run_case+0x170/0x3f0 [ 42.474808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.474849] kthread+0x328/0x630 [ 42.474886] ret_from_fork+0x10/0x20 [ 42.474918] [ 42.546086] Allocated by task 310: [ 42.549472] kasan_save_stack+0x3c/0x68 [ 42.553291] kasan_save_track+0x20/0x40 [ 42.557110] kasan_save_alloc_info+0x40/0x58 [ 42.561364] __kasan_kmalloc+0xd4/0xd8 [ 42.565096] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.569610] kasan_bitops_generic+0xa0/0x1c8 [ 42.573863] kunit_try_run_case+0x170/0x3f0 [ 42.578030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.583498] kthread+0x328/0x630 [ 42.586711] ret_from_fork+0x10/0x20 [ 42.590269] [ 42.591745] The buggy address belongs to the object at ffff000802e0b440 [ 42.591745] which belongs to the cache kmalloc-16 of size 16 [ 42.604073] The buggy address is located 8 bytes inside of [ 42.604073] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 42.616311] [ 42.617789] The buggy address belongs to the physical page: [ 42.623346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 42.631330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.637838] page_type: f5(slab) [ 42.640975] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.648695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.656414] page dumped because: kasan: bad access detected [ 42.661969] [ 42.663445] Memory state around the buggy address: [ 42.668228] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 42.675430] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 42.682635] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 42.689834] ^ [ 42.695393] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.702599] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.709799] ================================================================== [ 43.514165] ================================================================== [ 43.521248] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.529405] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 43.536783] [ 43.538267] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 43.538318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.538336] Hardware name: WinLink E850-96 board (DT) [ 43.538357] Call trace: [ 43.538371] show_stack+0x20/0x38 (C) [ 43.538405] dump_stack_lvl+0x8c/0xd0 [ 43.538443] print_report+0x118/0x608 [ 43.538472] kasan_report+0xdc/0x128 [ 43.538502] kasan_check_range+0x100/0x1a8 [ 43.538535] __kasan_check_write+0x20/0x30 [ 43.538567] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.538600] kasan_bitops_generic+0x110/0x1c8 [ 43.538629] kunit_try_run_case+0x170/0x3f0 [ 43.538666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.538705] kthread+0x328/0x630 [ 43.538739] ret_from_fork+0x10/0x20 [ 43.538773] [ 43.609959] Allocated by task 310: [ 43.613346] kasan_save_stack+0x3c/0x68 [ 43.617163] kasan_save_track+0x20/0x40 [ 43.620983] kasan_save_alloc_info+0x40/0x58 [ 43.625236] __kasan_kmalloc+0xd4/0xd8 [ 43.628969] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.633483] kasan_bitops_generic+0xa0/0x1c8 [ 43.637736] kunit_try_run_case+0x170/0x3f0 [ 43.641903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.647371] kthread+0x328/0x630 [ 43.650583] ret_from_fork+0x10/0x20 [ 43.654143] [ 43.655618] The buggy address belongs to the object at ffff000802e0b440 [ 43.655618] which belongs to the cache kmalloc-16 of size 16 [ 43.667944] The buggy address is located 8 bytes inside of [ 43.667944] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 43.680184] [ 43.681661] The buggy address belongs to the physical page: [ 43.687218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 43.695203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.701712] page_type: f5(slab) [ 43.704846] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.712568] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.720287] page dumped because: kasan: bad access detected [ 43.725842] [ 43.727318] Memory state around the buggy address: [ 43.732098] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 43.739302] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 43.746507] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 43.753707] ^ [ 43.759267] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.766472] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.773672] ================================================================== [ 42.187051] ================================================================== [ 42.194012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.202168] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 42.209459] [ 42.210944] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 42.211003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.211022] Hardware name: WinLink E850-96 board (DT) [ 42.211042] Call trace: [ 42.211056] show_stack+0x20/0x38 (C) [ 42.211090] dump_stack_lvl+0x8c/0xd0 [ 42.211133] print_report+0x118/0x608 [ 42.211165] kasan_report+0xdc/0x128 [ 42.211197] __asan_report_load8_noabort+0x20/0x30 [ 42.211235] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.211268] kasan_bitops_generic+0x110/0x1c8 [ 42.211298] kunit_try_run_case+0x170/0x3f0 [ 42.211338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.211379] kthread+0x328/0x630 [ 42.211416] ret_from_fork+0x10/0x20 [ 42.211450] [ 42.279251] Allocated by task 310: [ 42.282637] kasan_save_stack+0x3c/0x68 [ 42.286454] kasan_save_track+0x20/0x40 [ 42.290274] kasan_save_alloc_info+0x40/0x58 [ 42.294527] __kasan_kmalloc+0xd4/0xd8 [ 42.298260] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.302774] kasan_bitops_generic+0xa0/0x1c8 [ 42.307027] kunit_try_run_case+0x170/0x3f0 [ 42.311194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.316662] kthread+0x328/0x630 [ 42.319875] ret_from_fork+0x10/0x20 [ 42.323434] [ 42.324909] The buggy address belongs to the object at ffff000802e0b440 [ 42.324909] which belongs to the cache kmalloc-16 of size 16 [ 42.337237] The buggy address is located 8 bytes inside of [ 42.337237] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 42.349474] [ 42.350953] The buggy address belongs to the physical page: [ 42.356510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 42.364494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.371003] page_type: f5(slab) [ 42.374140] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.381859] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.389578] page dumped because: kasan: bad access detected [ 42.395135] [ 42.396609] Memory state around the buggy address: [ 42.401392] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 42.408592] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 42.415797] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 42.422997] ^ [ 42.428559] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.435763] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.442963] ================================================================== [ 41.656797] ================================================================== [ 41.663812] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.671967] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310 [ 41.679260] [ 41.680743] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 41.680800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.680815] Hardware name: WinLink E850-96 board (DT) [ 41.680838] Call trace: [ 41.680853] show_stack+0x20/0x38 (C) [ 41.680887] dump_stack_lvl+0x8c/0xd0 [ 41.680927] print_report+0x118/0x608 [ 41.680955] kasan_report+0xdc/0x128 [ 41.680986] __asan_report_load8_noabort+0x20/0x30 [ 41.681024] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.681058] kasan_bitops_generic+0x110/0x1c8 [ 41.681091] kunit_try_run_case+0x170/0x3f0 [ 41.681130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.681169] kthread+0x328/0x630 [ 41.681205] ret_from_fork+0x10/0x20 [ 41.681240] [ 41.749049] Allocated by task 310: [ 41.752436] kasan_save_stack+0x3c/0x68 [ 41.756254] kasan_save_track+0x20/0x40 [ 41.760074] kasan_save_alloc_info+0x40/0x58 [ 41.764327] __kasan_kmalloc+0xd4/0xd8 [ 41.768060] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.772573] kasan_bitops_generic+0xa0/0x1c8 [ 41.776828] kunit_try_run_case+0x170/0x3f0 [ 41.780993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.786462] kthread+0x328/0x630 [ 41.789674] ret_from_fork+0x10/0x20 [ 41.793233] [ 41.794710] The buggy address belongs to the object at ffff000802e0b440 [ 41.794710] which belongs to the cache kmalloc-16 of size 16 [ 41.807035] The buggy address is located 8 bytes inside of [ 41.807035] allocated 9-byte region [ffff000802e0b440, ffff000802e0b449) [ 41.819274] [ 41.820753] The buggy address belongs to the physical page: [ 41.826308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b [ 41.834293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.840801] page_type: f5(slab) [ 41.843939] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.851659] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.859377] page dumped because: kasan: bad access detected [ 41.864932] [ 41.866408] Memory state around the buggy address: [ 41.871190] ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 41.878392] ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc [ 41.885596] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 41.892797] ^ [ 41.898357] ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.905561] ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.912762] ==================================================================
[ 20.352156] ================================================================== [ 20.352219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.352277] Write of size 8 at addr fff00000c3ef2e88 by task kunit_try_catch/263 [ 20.352331] [ 20.352364] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.352451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.352483] Hardware name: linux,dummy-virt (DT) [ 20.352517] Call trace: [ 20.352543] show_stack+0x20/0x38 (C) [ 20.352595] dump_stack_lvl+0x8c/0xd0 [ 20.352646] print_report+0x118/0x608 [ 20.352693] kasan_report+0xdc/0x128 [ 20.352739] kasan_check_range+0x100/0x1a8 [ 20.352788] __kasan_check_write+0x20/0x30 [ 20.352838] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.352905] kasan_bitops_generic+0x110/0x1c8 [ 20.352954] kunit_try_run_case+0x170/0x3f0 [ 20.353006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.353096] kthread+0x328/0x630 [ 20.354394] ret_from_fork+0x10/0x20 [ 20.354449] [ 20.354476] Allocated by task 263: [ 20.354508] kasan_save_stack+0x3c/0x68 [ 20.354566] kasan_save_track+0x20/0x40 [ 20.354605] kasan_save_alloc_info+0x40/0x58 [ 20.354648] __kasan_kmalloc+0xd4/0xd8 [ 20.354689] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.354731] kasan_bitops_generic+0xa0/0x1c8 [ 20.354772] kunit_try_run_case+0x170/0x3f0 [ 20.354824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.354884] kthread+0x328/0x630 [ 20.354936] ret_from_fork+0x10/0x20 [ 20.354974] [ 20.354996] The buggy address belongs to the object at fff00000c3ef2e80 [ 20.354996] which belongs to the cache kmalloc-16 of size 16 [ 20.355056] The buggy address is located 8 bytes inside of [ 20.355056] allocated 9-byte region [fff00000c3ef2e80, fff00000c3ef2e89) [ 20.355131] [ 20.355180] The buggy address belongs to the physical page: [ 20.355222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef2 [ 20.355279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.355328] page_type: f5(slab) [ 20.355369] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.355424] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.355469] page dumped because: kasan: bad access detected [ 20.355519] [ 20.355554] Memory state around the buggy address: [ 20.355598] fff00000c3ef2d80: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc [ 20.355659] fff00000c3ef2e00: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc [ 20.355705] >fff00000c3ef2e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.355761] ^ [ 20.355807] fff00000c3ef2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.356766] fff00000c3ef2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.357026] ================================================================== [ 20.358750] ================================================================== [ 20.359120] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.359449] Read of size 8 at addr fff00000c3ef2e88 by task kunit_try_catch/263 [ 20.359521] [ 20.359692] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT [ 20.359834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.360158] Hardware name: linux,dummy-virt (DT) [ 20.360283] Call trace: [ 20.360351] show_stack+0x20/0x38 (C) [ 20.360408] dump_stack_lvl+0x8c/0xd0 [ 20.361503] print_report+0x118/0x608 [ 20.361658] kasan_report+0xdc/0x128 [ 20.361867] __asan_report_load8_noabort+0x20/0x30 [ 20.361930] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.362401] kasan_bitops_generic+0x110/0x1c8 [ 20.362654] kunit_try_run_case+0x170/0x3f0 [ 20.362777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.363361] kthread+0x328/0x630 [ 20.363611] ret_from_fork+0x10/0x20 [ 20.363783] [ 20.363864] Allocated by task 263: [ 20.364072] kasan_save_stack+0x3c/0x68 [ 20.364134] kasan_save_track+0x20/0x40 [ 20.364346] kasan_save_alloc_info+0x40/0x58 [ 20.364687] __kasan_kmalloc+0xd4/0xd8 [ 20.364891] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.365027] kasan_bitops_generic+0xa0/0x1c8 [ 20.365219] kunit_try_run_case+0x170/0x3f0 [ 20.365321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.367892] page_type: f5(slab) [ 20.368477] page dumped because: kasan: bad access detected [ 20.369499] fff00000c3ef2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.371212] [ 20.372040] Hardware name: linux,dummy-virt (DT) [ 20.372383] __kasan_check_write+0x20/0x30 [ 20.372757] Allocated by task 263: [ 20.374656] ret_from_fork+0x10/0x20 [ 20.375283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef2 [ 20.376088] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.377326] ==================================================================
[ 13.024981] ================================================================== [ 13.025314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.025646] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280 [ 13.026087] [ 13.026186] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.026235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.026248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.026270] Call Trace: [ 13.026289] <TASK> [ 13.026307] dump_stack_lvl+0x73/0xb0 [ 13.026332] print_report+0xd1/0x650 [ 13.026354] ? __virt_addr_valid+0x1db/0x2d0 [ 13.026379] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.026400] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.026423] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.026445] kasan_report+0x141/0x180 [ 13.026469] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.026495] kasan_check_range+0x10c/0x1c0 [ 13.026515] __kasan_check_write+0x18/0x20 [ 13.026534] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.026556] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.026578] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.026599] ? trace_hardirqs_on+0x37/0xe0 [ 13.026621] ? kasan_bitops_generic+0x92/0x1c0 [ 13.026645] kasan_bitops_generic+0x116/0x1c0 [ 13.026665] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.026687] ? __pfx_read_tsc+0x10/0x10 [ 13.026707] ? ktime_get_ts64+0x86/0x230 [ 13.026732] kunit_try_run_case+0x1a5/0x480 [ 13.026757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.026778] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.026802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.026826] ? __kthread_parkme+0x82/0x180 [ 13.026889] ? preempt_count_sub+0x50/0x80 [ 13.026926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.026950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.026973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.026996] kthread+0x337/0x6f0 [ 13.027014] ? trace_preempt_on+0x20/0xc0 [ 13.027036] ? __pfx_kthread+0x10/0x10 [ 13.027054] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.027075] ? calculate_sigpending+0x7b/0xa0 [ 13.027097] ? __pfx_kthread+0x10/0x10 [ 13.027115] ret_from_fork+0x41/0x80 [ 13.027136] ? __pfx_kthread+0x10/0x10 [ 13.027153] ret_from_fork_asm+0x1a/0x30 [ 13.027185] </TASK> [ 13.027195] [ 13.035601] Allocated by task 280: [ 13.036034] kasan_save_stack+0x45/0x70 [ 13.036251] kasan_save_track+0x18/0x40 [ 13.036488] kasan_save_alloc_info+0x3b/0x50 [ 13.036701] __kasan_kmalloc+0xb7/0xc0 [ 13.036867] __kmalloc_cache_noprof+0x189/0x420 [ 13.037038] kasan_bitops_generic+0x92/0x1c0 [ 13.037253] kunit_try_run_case+0x1a5/0x480 [ 13.037450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.037814] kthread+0x337/0x6f0 [ 13.037952] ret_from_fork+0x41/0x80 [ 13.038083] ret_from_fork_asm+0x1a/0x30 [ 13.038222] [ 13.038294] The buggy address belongs to the object at ffff8881025a7fe0 [ 13.038294] which belongs to the cache kmalloc-16 of size 16 [ 13.038776] The buggy address is located 8 bytes inside of [ 13.038776] allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9) [ 13.039356] [ 13.039455] The buggy address belongs to the physical page: [ 13.039759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7 [ 13.040091] flags: 0x200000000000000(node=0|zone=2) [ 13.040272] page_type: f5(slab) [ 13.040401] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.040986] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.041329] page dumped because: kasan: bad access detected [ 13.041590] [ 13.041667] Memory state around the buggy address: [ 13.042240] ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc [ 13.042465] ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.042679] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.043008] ^ [ 13.043412] ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.043641] ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.043853] ================================================================== [ 12.964591] ================================================================== [ 12.965076] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 12.965424] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280 [ 12.966058] [ 12.966185] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 12.966233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.966244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.966267] Call Trace: [ 12.966284] <TASK> [ 12.966302] dump_stack_lvl+0x73/0xb0 [ 12.966328] print_report+0xd1/0x650 [ 12.966350] ? __virt_addr_valid+0x1db/0x2d0 [ 12.966372] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 12.966395] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.966418] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 12.966440] kasan_report+0x141/0x180 [ 12.966462] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 12.966489] kasan_check_range+0x10c/0x1c0 [ 12.966510] __kasan_check_write+0x18/0x20 [ 12.966530] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 12.966554] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 12.966577] ? __kmalloc_cache_noprof+0x189/0x420 [ 12.966598] ? trace_hardirqs_on+0x37/0xe0 [ 12.966621] ? kasan_bitops_generic+0x92/0x1c0 [ 12.966645] kasan_bitops_generic+0x116/0x1c0 [ 12.966665] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 12.966687] ? __pfx_read_tsc+0x10/0x10 [ 12.966707] ? ktime_get_ts64+0x86/0x230 [ 12.966734] kunit_try_run_case+0x1a5/0x480 [ 12.966759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.966781] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.966805] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.966828] ? __kthread_parkme+0x82/0x180 [ 12.966849] ? preempt_count_sub+0x50/0x80 [ 12.966874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.966898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.966935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.966957] kthread+0x337/0x6f0 [ 12.966974] ? trace_preempt_on+0x20/0xc0 [ 12.966996] ? __pfx_kthread+0x10/0x10 [ 12.967062] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.967086] ? calculate_sigpending+0x7b/0xa0 [ 12.967108] ? __pfx_kthread+0x10/0x10 [ 12.967126] ret_from_fork+0x41/0x80 [ 12.967147] ? __pfx_kthread+0x10/0x10 [ 12.967164] ret_from_fork_asm+0x1a/0x30 [ 12.967196] </TASK> [ 12.967206] [ 12.974981] Allocated by task 280: [ 12.975164] kasan_save_stack+0x45/0x70 [ 12.975360] kasan_save_track+0x18/0x40 [ 12.975520] kasan_save_alloc_info+0x3b/0x50 [ 12.975735] __kasan_kmalloc+0xb7/0xc0 [ 12.975925] __kmalloc_cache_noprof+0x189/0x420 [ 12.976119] kasan_bitops_generic+0x92/0x1c0 [ 12.976322] kunit_try_run_case+0x1a5/0x480 [ 12.976505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.976813] kthread+0x337/0x6f0 [ 12.976985] ret_from_fork+0x41/0x80 [ 12.977137] ret_from_fork_asm+0x1a/0x30 [ 12.977315] [ 12.977385] The buggy address belongs to the object at ffff8881025a7fe0 [ 12.977385] which belongs to the cache kmalloc-16 of size 16 [ 12.977751] The buggy address is located 8 bytes inside of [ 12.977751] allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9) [ 12.978268] [ 12.978366] The buggy address belongs to the physical page: [ 12.978723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7 [ 12.978980] flags: 0x200000000000000(node=0|zone=2) [ 12.979579] page_type: f5(slab) [ 12.979767] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.980130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.980471] page dumped because: kasan: bad access detected [ 12.980730] [ 12.980800] Memory state around the buggy address: [ 12.981041] ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc [ 12.981308] ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 12.981522] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 12.982110] ^ [ 12.982350] ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.982566] ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.982914] ================================================================== [ 13.003165] ================================================================== [ 13.003501] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.004161] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280 [ 13.004505] [ 13.004640] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.004688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.004700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.004760] Call Trace: [ 13.004779] <TASK> [ 13.004795] dump_stack_lvl+0x73/0xb0 [ 13.004820] print_report+0xd1/0x650 [ 13.004844] ? __virt_addr_valid+0x1db/0x2d0 [ 13.004866] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.004887] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.004910] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.004945] kasan_report+0x141/0x180 [ 13.004968] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.004997] kasan_check_range+0x10c/0x1c0 [ 13.005017] __kasan_check_write+0x18/0x20 [ 13.005036] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.005058] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.005081] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.005102] ? trace_hardirqs_on+0x37/0xe0 [ 13.005125] ? kasan_bitops_generic+0x92/0x1c0 [ 13.005149] kasan_bitops_generic+0x116/0x1c0 [ 13.005168] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.005189] ? __pfx_read_tsc+0x10/0x10 [ 13.005210] ? ktime_get_ts64+0x86/0x230 [ 13.005235] kunit_try_run_case+0x1a5/0x480 [ 13.005260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.005282] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.005306] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.005329] ? __kthread_parkme+0x82/0x180 [ 13.005350] ? preempt_count_sub+0x50/0x80 [ 13.005376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.005400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.005422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.005445] kthread+0x337/0x6f0 [ 13.005462] ? trace_preempt_on+0x20/0xc0 [ 13.005484] ? __pfx_kthread+0x10/0x10 [ 13.005502] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.005523] ? calculate_sigpending+0x7b/0xa0 [ 13.005544] ? __pfx_kthread+0x10/0x10 [ 13.005563] ret_from_fork+0x41/0x80 [ 13.005582] ? __pfx_kthread+0x10/0x10 [ 13.005600] ret_from_fork_asm+0x1a/0x30 [ 13.005631] </TASK> [ 13.005641] [ 13.013950] Allocated by task 280: [ 13.014145] kasan_save_stack+0x45/0x70 [ 13.014357] kasan_save_track+0x18/0x40 [ 13.014547] kasan_save_alloc_info+0x3b/0x50 [ 13.014799] __kasan_kmalloc+0xb7/0xc0 [ 13.014999] __kmalloc_cache_noprof+0x189/0x420 [ 13.015176] kasan_bitops_generic+0x92/0x1c0 [ 13.015369] kunit_try_run_case+0x1a5/0x480 [ 13.015518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.016022] kthread+0x337/0x6f0 [ 13.016177] ret_from_fork+0x41/0x80 [ 13.016354] ret_from_fork_asm+0x1a/0x30 [ 13.016537] [ 13.016666] The buggy address belongs to the object at ffff8881025a7fe0 [ 13.016666] which belongs to the cache kmalloc-16 of size 16 [ 13.017146] The buggy address is located 8 bytes inside of [ 13.017146] allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9) [ 13.017541] [ 13.017620] The buggy address belongs to the physical page: [ 13.017794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7 [ 13.018476] flags: 0x200000000000000(node=0|zone=2) [ 13.019824] page_type: f5(slab) [ 13.020265] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.020779] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.021309] page dumped because: kasan: bad access detected [ 13.021554] [ 13.021818] Memory state around the buggy address: [ 13.022220] ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc [ 13.022519] ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.023285] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.023565] ^ [ 13.023849] ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.024262] ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.024516] ================================================================== [ 12.983459] ================================================================== [ 12.984201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 12.984585] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280 [ 12.984809] [ 12.984897] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 12.984960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.984972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.984993] Call Trace: [ 12.985011] <TASK> [ 12.985029] dump_stack_lvl+0x73/0xb0 [ 12.985055] print_report+0xd1/0x650 [ 12.985077] ? __virt_addr_valid+0x1db/0x2d0 [ 12.985099] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 12.985120] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.985143] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 12.985165] kasan_report+0x141/0x180 [ 12.985188] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 12.985214] kasan_check_range+0x10c/0x1c0 [ 12.985234] __kasan_check_write+0x18/0x20 [ 12.985254] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 12.985276] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 12.985299] ? __kmalloc_cache_noprof+0x189/0x420 [ 12.985322] ? trace_hardirqs_on+0x37/0xe0 [ 12.985345] ? kasan_bitops_generic+0x92/0x1c0 [ 12.985370] kasan_bitops_generic+0x116/0x1c0 [ 12.985390] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 12.985413] ? __pfx_read_tsc+0x10/0x10 [ 12.985432] ? ktime_get_ts64+0x86/0x230 [ 12.985458] kunit_try_run_case+0x1a5/0x480 [ 12.985483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.985505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.985529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.985552] ? __kthread_parkme+0x82/0x180 [ 12.985635] ? preempt_count_sub+0x50/0x80 [ 12.985668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.985692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.985746] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.985770] kthread+0x337/0x6f0 [ 12.985788] ? trace_preempt_on+0x20/0xc0 [ 12.985810] ? __pfx_kthread+0x10/0x10 [ 12.985829] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.985850] ? calculate_sigpending+0x7b/0xa0 [ 12.985873] ? __pfx_kthread+0x10/0x10 [ 12.985890] ret_from_fork+0x41/0x80 [ 12.985911] ? __pfx_kthread+0x10/0x10 [ 12.985941] ret_from_fork_asm+0x1a/0x30 [ 12.985973] </TASK> [ 12.985983] [ 12.994278] Allocated by task 280: [ 12.994469] kasan_save_stack+0x45/0x70 [ 12.995019] kasan_save_track+0x18/0x40 [ 12.995234] kasan_save_alloc_info+0x3b/0x50 [ 12.995402] __kasan_kmalloc+0xb7/0xc0 [ 12.995617] __kmalloc_cache_noprof+0x189/0x420 [ 12.995868] kasan_bitops_generic+0x92/0x1c0 [ 12.996078] kunit_try_run_case+0x1a5/0x480 [ 12.996225] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.996480] kthread+0x337/0x6f0 [ 12.996765] ret_from_fork+0x41/0x80 [ 12.996937] ret_from_fork_asm+0x1a/0x30 [ 12.997122] [ 12.997212] The buggy address belongs to the object at ffff8881025a7fe0 [ 12.997212] which belongs to the cache kmalloc-16 of size 16 [ 12.997641] The buggy address is located 8 bytes inside of [ 12.997641] allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9) [ 12.998325] [ 12.998405] The buggy address belongs to the physical page: [ 12.998674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7 [ 12.999106] flags: 0x200000000000000(node=0|zone=2) [ 12.999270] page_type: f5(slab) [ 12.999394] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.999623] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.999846] page dumped because: kasan: bad access detected [ 13.000212] [ 13.000311] Memory state around the buggy address: [ 13.000534] ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc [ 13.001228] ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.001573] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.001931] ^ [ 13.002147] ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.002364] ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.002580] ================================================================== [ 12.923731] ================================================================== [ 12.924277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 12.924964] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280 [ 12.925271] [ 12.925377] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 12.925429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.925441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.925464] Call Trace: [ 12.925476] <TASK> [ 12.925495] dump_stack_lvl+0x73/0xb0 [ 12.925524] print_report+0xd1/0x650 [ 12.925547] ? __virt_addr_valid+0x1db/0x2d0 [ 12.925570] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 12.925591] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.925615] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 12.925637] kasan_report+0x141/0x180 [ 12.925660] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 12.925687] kasan_check_range+0x10c/0x1c0 [ 12.925707] __kasan_check_write+0x18/0x20 [ 12.926156] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 12.926183] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 12.926205] ? __kmalloc_cache_noprof+0x189/0x420 [ 12.926230] ? trace_hardirqs_on+0x37/0xe0 [ 12.926254] ? kasan_bitops_generic+0x92/0x1c0 [ 12.926278] kasan_bitops_generic+0x116/0x1c0 [ 12.926299] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 12.926320] ? __pfx_read_tsc+0x10/0x10 [ 12.926340] ? ktime_get_ts64+0x86/0x230 [ 12.926366] kunit_try_run_case+0x1a5/0x480 [ 12.926392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.926414] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.926438] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.926461] ? __kthread_parkme+0x82/0x180 [ 12.926483] ? preempt_count_sub+0x50/0x80 [ 12.926510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.926533] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.926555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.926579] kthread+0x337/0x6f0 [ 12.926595] ? trace_preempt_on+0x20/0xc0 [ 12.926619] ? __pfx_kthread+0x10/0x10 [ 12.926638] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.926659] ? calculate_sigpending+0x7b/0xa0 [ 12.926681] ? __pfx_kthread+0x10/0x10 [ 12.926699] ret_from_fork+0x41/0x80 [ 12.926721] ? __pfx_kthread+0x10/0x10 [ 12.926738] ret_from_fork_asm+0x1a/0x30 [ 12.926771] </TASK> [ 12.926782] [ 12.935379] Allocated by task 280: [ 12.935527] kasan_save_stack+0x45/0x70 [ 12.935974] kasan_save_track+0x18/0x40 [ 12.936168] kasan_save_alloc_info+0x3b/0x50 [ 12.936334] __kasan_kmalloc+0xb7/0xc0 [ 12.936468] __kmalloc_cache_noprof+0x189/0x420 [ 12.936632] kasan_bitops_generic+0x92/0x1c0 [ 12.936835] kunit_try_run_case+0x1a5/0x480 [ 12.937057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.937388] kthread+0x337/0x6f0 [ 12.937531] ret_from_fork+0x41/0x80 [ 12.937682] ret_from_fork_asm+0x1a/0x30 [ 12.937821] [ 12.937891] The buggy address belongs to the object at ffff8881025a7fe0 [ 12.937891] which belongs to the cache kmalloc-16 of size 16 [ 12.938900] The buggy address is located 8 bytes inside of [ 12.938900] allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9) [ 12.939416] [ 12.939522] The buggy address belongs to the physical page: [ 12.939832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7 [ 12.940172] flags: 0x200000000000000(node=0|zone=2) [ 12.940364] page_type: f5(slab) [ 12.940490] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.940950] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.941232] page dumped because: kasan: bad access detected [ 12.941403] [ 12.941471] Memory state around the buggy address: [ 12.941627] ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc [ 12.942173] ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 12.942492] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 12.942926] ^ [ 12.943238] ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.943541] ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.943965] ================================================================== [ 13.044677] ================================================================== [ 13.045248] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.045651] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280 [ 13.045995] [ 13.046087] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.046135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.046148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.046169] Call Trace: [ 13.046187] <TASK> [ 13.046205] dump_stack_lvl+0x73/0xb0 [ 13.046231] print_report+0xd1/0x650 [ 13.046253] ? __virt_addr_valid+0x1db/0x2d0 [ 13.046275] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.046297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.046318] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.046340] kasan_report+0x141/0x180 [ 13.046363] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.046390] kasan_check_range+0x10c/0x1c0 [ 13.046409] __kasan_check_write+0x18/0x20 [ 13.046432] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.046454] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.046476] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.046497] ? trace_hardirqs_on+0x37/0xe0 [ 13.046519] ? kasan_bitops_generic+0x92/0x1c0 [ 13.046543] kasan_bitops_generic+0x116/0x1c0 [ 13.046563] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.046585] ? __pfx_read_tsc+0x10/0x10 [ 13.046604] ? ktime_get_ts64+0x86/0x230 [ 13.046630] kunit_try_run_case+0x1a5/0x480 [ 13.046654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.046677] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.046701] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.046743] ? __kthread_parkme+0x82/0x180 [ 13.046766] ? preempt_count_sub+0x50/0x80 [ 13.046791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.046814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.046838] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.046860] kthread+0x337/0x6f0 [ 13.046877] ? trace_preempt_on+0x20/0xc0 [ 13.046899] ? __pfx_kthread+0x10/0x10 [ 13.046927] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.046948] ? calculate_sigpending+0x7b/0xa0 [ 13.046970] ? __pfx_kthread+0x10/0x10 [ 13.046989] ret_from_fork+0x41/0x80 [ 13.047009] ? __pfx_kthread+0x10/0x10 [ 13.047027] ret_from_fork_asm+0x1a/0x30 [ 13.047059] </TASK> [ 13.047070] [ 13.055678] Allocated by task 280: [ 13.056089] kasan_save_stack+0x45/0x70 [ 13.056302] kasan_save_track+0x18/0x40 [ 13.056439] kasan_save_alloc_info+0x3b/0x50 [ 13.056620] __kasan_kmalloc+0xb7/0xc0 [ 13.056935] __kmalloc_cache_noprof+0x189/0x420 [ 13.057160] kasan_bitops_generic+0x92/0x1c0 [ 13.057369] kunit_try_run_case+0x1a5/0x480 [ 13.057562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.057746] kthread+0x337/0x6f0 [ 13.057866] ret_from_fork+0x41/0x80 [ 13.058009] ret_from_fork_asm+0x1a/0x30 [ 13.058202] [ 13.058299] The buggy address belongs to the object at ffff8881025a7fe0 [ 13.058299] which belongs to the cache kmalloc-16 of size 16 [ 13.058954] The buggy address is located 8 bytes inside of [ 13.058954] allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9) [ 13.059408] [ 13.059504] The buggy address belongs to the physical page: [ 13.060054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7 [ 13.060371] flags: 0x200000000000000(node=0|zone=2) [ 13.060588] page_type: f5(slab) [ 13.060714] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.061021] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.061361] page dumped because: kasan: bad access detected [ 13.061654] [ 13.061773] Memory state around the buggy address: [ 13.061989] ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc [ 13.062284] ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.062558] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.062913] ^ [ 13.063130] ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.063428] ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.063742] ================================================================== [ 12.944531] ================================================================== [ 12.944817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 12.945532] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280 [ 12.946100] [ 12.946219] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 12.946266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.946278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.946300] Call Trace: [ 12.946318] <TASK> [ 12.946336] dump_stack_lvl+0x73/0xb0 [ 12.946362] print_report+0xd1/0x650 [ 12.946385] ? __virt_addr_valid+0x1db/0x2d0 [ 12.946407] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 12.946429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.946452] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 12.946474] kasan_report+0x141/0x180 [ 12.946497] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 12.946524] kasan_check_range+0x10c/0x1c0 [ 12.946546] __kasan_check_write+0x18/0x20 [ 12.946565] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 12.946588] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 12.946611] ? __kmalloc_cache_noprof+0x189/0x420 [ 12.946632] ? trace_hardirqs_on+0x37/0xe0 [ 12.946655] ? kasan_bitops_generic+0x92/0x1c0 [ 12.946679] kasan_bitops_generic+0x116/0x1c0 [ 12.946698] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 12.946739] ? __pfx_read_tsc+0x10/0x10 [ 12.946759] ? ktime_get_ts64+0x86/0x230 [ 12.946784] kunit_try_run_case+0x1a5/0x480 [ 12.946810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.946832] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.946855] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.946879] ? __kthread_parkme+0x82/0x180 [ 12.946900] ? preempt_count_sub+0x50/0x80 [ 12.946941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.946965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.946987] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.947010] kthread+0x337/0x6f0 [ 12.947027] ? trace_preempt_on+0x20/0xc0 [ 12.947048] ? __pfx_kthread+0x10/0x10 [ 12.947066] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.947087] ? calculate_sigpending+0x7b/0xa0 [ 12.947109] ? __pfx_kthread+0x10/0x10 [ 12.947127] ret_from_fork+0x41/0x80 [ 12.947148] ? __pfx_kthread+0x10/0x10 [ 12.947165] ret_from_fork_asm+0x1a/0x30 [ 12.947196] </TASK> [ 12.947208] [ 12.955447] Allocated by task 280: [ 12.955666] kasan_save_stack+0x45/0x70 [ 12.955876] kasan_save_track+0x18/0x40 [ 12.956077] kasan_save_alloc_info+0x3b/0x50 [ 12.956294] __kasan_kmalloc+0xb7/0xc0 [ 12.956578] __kmalloc_cache_noprof+0x189/0x420 [ 12.956727] kasan_bitops_generic+0x92/0x1c0 [ 12.956871] kunit_try_run_case+0x1a5/0x480 [ 12.957024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.957512] kthread+0x337/0x6f0 [ 12.957823] ret_from_fork+0x41/0x80 [ 12.958018] ret_from_fork_asm+0x1a/0x30 [ 12.958218] [ 12.958314] The buggy address belongs to the object at ffff8881025a7fe0 [ 12.958314] which belongs to the cache kmalloc-16 of size 16 [ 12.958732] The buggy address is located 8 bytes inside of [ 12.958732] allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9) [ 12.959092] [ 12.959182] The buggy address belongs to the physical page: [ 12.959448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7 [ 12.960458] flags: 0x200000000000000(node=0|zone=2) [ 12.960733] page_type: f5(slab) [ 12.960987] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.961268] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.961572] page dumped because: kasan: bad access detected [ 12.961983] [ 12.962079] Memory state around the buggy address: [ 12.962258] ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc [ 12.962540] ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 12.962784] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 12.963100] ^ [ 12.963300] ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.963513] ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.963725] ================================================================== [ 13.064523] ================================================================== [ 13.064804] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.065135] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280 [ 13.065357] [ 13.065446] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc3 #1 PREEMPT(voluntary) [ 13.065492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.065504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.065525] Call Trace: [ 13.065559] <TASK> [ 13.065578] dump_stack_lvl+0x73/0xb0 [ 13.065602] print_report+0xd1/0x650 [ 13.065624] ? __virt_addr_valid+0x1db/0x2d0 [ 13.065646] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.065667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.065690] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.065712] kasan_report+0x141/0x180 [ 13.065734] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.065760] kasan_check_range+0x10c/0x1c0 [ 13.065781] __kasan_check_write+0x18/0x20 [ 13.065800] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.065822] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.065845] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.065868] ? trace_hardirqs_on+0x37/0xe0 [ 13.065893] ? kasan_bitops_generic+0x92/0x1c0 [ 13.065929] kasan_bitops_generic+0x116/0x1c0 [ 13.065950] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.065972] ? __pfx_read_tsc+0x10/0x10 [ 13.065991] ? ktime_get_ts64+0x86/0x230 [ 13.066018] kunit_try_run_case+0x1a5/0x480 [ 13.066044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.066066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.066090] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.066114] ? __kthread_parkme+0x82/0x180 [ 13.066137] ? preempt_count_sub+0x50/0x80 [ 13.066163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.066187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.066211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.066234] kthread+0x337/0x6f0 [ 13.066250] ? trace_preempt_on+0x20/0xc0 [ 13.066272] ? __pfx_kthread+0x10/0x10 [ 13.066291] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.066312] ? calculate_sigpending+0x7b/0xa0 [ 13.066333] ? __pfx_kthread+0x10/0x10 [ 13.066352] ret_from_fork+0x41/0x80 [ 13.066372] ? __pfx_kthread+0x10/0x10 [ 13.066390] ret_from_fork_asm+0x1a/0x30 [ 13.066421] </TASK> [ 13.066432] [ 13.075200] Allocated by task 280: [ 13.075407] kasan_save_stack+0x45/0x70 [ 13.075613] kasan_save_track+0x18/0x40 [ 13.075853] kasan_save_alloc_info+0x3b/0x50 [ 13.076064] __kasan_kmalloc+0xb7/0xc0 [ 13.076253] __kmalloc_cache_noprof+0x189/0x420 [ 13.076433] kasan_bitops_generic+0x92/0x1c0 [ 13.076579] kunit_try_run_case+0x1a5/0x480 [ 13.076811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.077085] kthread+0x337/0x6f0 [ 13.077258] ret_from_fork+0x41/0x80 [ 13.077443] ret_from_fork_asm+0x1a/0x30 [ 13.077750] [ 13.077853] The buggy address belongs to the object at ffff8881025a7fe0 [ 13.077853] which belongs to the cache kmalloc-16 of size 16 [ 13.078273] The buggy address is located 8 bytes inside of [ 13.078273] allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9) [ 13.078632] [ 13.078727] The buggy address belongs to the physical page: [ 13.078983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7 [ 13.079388] flags: 0x200000000000000(node=0|zone=2) [ 13.079753] page_type: f5(slab) [ 13.080055] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.080296] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.080523] page dumped because: kasan: bad access detected [ 13.081824] [ 13.082033] Memory state around the buggy address: [ 13.082424] ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc [ 13.083227] ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.083685] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.084140] ^ [ 13.084423] ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.085073] ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 13.085376] ==================================================================