Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-x86_64 |
[ 39.327019] ================================================================== [ 39.336351] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 39.344507] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 39.351886] [ 39.353372] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 39.353430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.353448] Hardware name: WinLink E850-96 board (DT) [ 39.353471] Call trace: [ 39.353485] show_stack+0x20/0x38 (C) [ 39.353519] dump_stack_lvl+0x8c/0xd0 [ 39.353556] print_report+0x118/0x608 [ 39.353587] kasan_report+0xdc/0x128 [ 39.353619] kasan_check_range+0x100/0x1a8 [ 39.353651] __kasan_check_write+0x20/0x30 [ 39.353687] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 39.353719] kasan_bitops_generic+0x110/0x1c8 [ 39.353750] kunit_try_run_case+0x170/0x3f0 [ 39.353787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.353826] kthread+0x328/0x630 [ 39.353862] ret_from_fork+0x10/0x20 [ 39.353898] [ 39.425063] Allocated by task 310: [ 39.428448] kasan_save_stack+0x3c/0x68 [ 39.432265] kasan_save_track+0x20/0x40 [ 39.436085] kasan_save_alloc_info+0x40/0x58 [ 39.440338] __kasan_kmalloc+0xd4/0xd8 [ 39.444071] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.448585] kasan_bitops_generic+0xa0/0x1c8 [ 39.452838] kunit_try_run_case+0x170/0x3f0 [ 39.457004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.462473] kthread+0x328/0x630 [ 39.465685] ret_from_fork+0x10/0x20 [ 39.469244] [ 39.470722] The buggy address belongs to the object at ffff000800d63020 [ 39.470722] which belongs to the cache kmalloc-16 of size 16 [ 39.483050] The buggy address is located 8 bytes inside of [ 39.483050] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 39.495285] [ 39.496765] The buggy address belongs to the physical page: [ 39.502320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 39.510305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.516814] page_type: f5(slab) [ 39.519952] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 39.527670] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 39.535392] page dumped because: kasan: bad access detected [ 39.540944] [ 39.542419] Memory state around the buggy address: [ 39.547199] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.554403] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.561610] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 39.568809] ^ [ 39.573326] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.580531] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.587733] ================================================================== [ 39.857451] ================================================================== [ 39.864471] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 39.872625] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 39.880002] [ 39.881487] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 39.881537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.881552] Hardware name: WinLink E850-96 board (DT) [ 39.881573] Call trace: [ 39.881586] show_stack+0x20/0x38 (C) [ 39.881620] dump_stack_lvl+0x8c/0xd0 [ 39.881659] print_report+0x118/0x608 [ 39.881688] kasan_report+0xdc/0x128 [ 39.881717] kasan_check_range+0x100/0x1a8 [ 39.881750] __kasan_check_write+0x20/0x30 [ 39.881781] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 39.881813] kasan_bitops_generic+0x110/0x1c8 [ 39.881844] kunit_try_run_case+0x170/0x3f0 [ 39.881879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.881915] kthread+0x328/0x630 [ 39.881950] ret_from_fork+0x10/0x20 [ 39.881987] [ 39.953178] Allocated by task 310: [ 39.956566] kasan_save_stack+0x3c/0x68 [ 39.960382] kasan_save_track+0x20/0x40 [ 39.964203] kasan_save_alloc_info+0x40/0x58 [ 39.968455] __kasan_kmalloc+0xd4/0xd8 [ 39.972188] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.976702] kasan_bitops_generic+0xa0/0x1c8 [ 39.980955] kunit_try_run_case+0x170/0x3f0 [ 39.985122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.990590] kthread+0x328/0x630 [ 39.993802] ret_from_fork+0x10/0x20 [ 39.997361] [ 39.998839] The buggy address belongs to the object at ffff000800d63020 [ 39.998839] which belongs to the cache kmalloc-16 of size 16 [ 40.011164] The buggy address is located 8 bytes inside of [ 40.011164] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 40.023402] [ 40.024880] The buggy address belongs to the physical page: [ 40.030438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 40.038420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.044930] page_type: f5(slab) [ 40.048067] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 40.055787] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.063506] page dumped because: kasan: bad access detected [ 40.069061] [ 40.070537] Memory state around the buggy address: [ 40.075318] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.082522] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.089726] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 40.096926] ^ [ 40.101445] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.108648] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.115849] ================================================================== [ 41.711041] ================================================================== [ 41.718085] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 41.726242] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 41.733533] [ 41.735015] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 41.735059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.735076] Hardware name: WinLink E850-96 board (DT) [ 41.735096] Call trace: [ 41.735110] show_stack+0x20/0x38 (C) [ 41.735140] dump_stack_lvl+0x8c/0xd0 [ 41.735175] print_report+0x118/0x608 [ 41.735208] kasan_report+0xdc/0x128 [ 41.735236] __asan_report_load8_noabort+0x20/0x30 [ 41.735274] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 41.735305] kasan_bitops_generic+0x110/0x1c8 [ 41.735335] kunit_try_run_case+0x170/0x3f0 [ 41.735370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.735408] kthread+0x328/0x630 [ 41.735440] ret_from_fork+0x10/0x20 [ 41.735473] [ 41.803324] Allocated by task 310: [ 41.806709] kasan_save_stack+0x3c/0x68 [ 41.810529] kasan_save_track+0x20/0x40 [ 41.814348] kasan_save_alloc_info+0x40/0x58 [ 41.818601] __kasan_kmalloc+0xd4/0xd8 [ 41.822334] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.826847] kasan_bitops_generic+0xa0/0x1c8 [ 41.831101] kunit_try_run_case+0x170/0x3f0 [ 41.835267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.840736] kthread+0x328/0x630 [ 41.843948] ret_from_fork+0x10/0x20 [ 41.847507] [ 41.848984] The buggy address belongs to the object at ffff000800d63020 [ 41.848984] which belongs to the cache kmalloc-16 of size 16 [ 41.861309] The buggy address is located 8 bytes inside of [ 41.861309] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 41.873548] [ 41.875024] The buggy address belongs to the physical page: [ 41.880580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 41.888566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.895076] page_type: f5(slab) [ 41.898209] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.905933] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.913652] page dumped because: kasan: bad access detected [ 41.919207] [ 41.920683] Memory state around the buggy address: [ 41.925461] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.932666] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.939871] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.947072] ^ [ 41.951589] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.958794] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.965995] ================================================================== [ 40.123151] ================================================================== [ 40.130263] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 40.138418] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 40.145710] [ 40.147194] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 40.147245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.147261] Hardware name: WinLink E850-96 board (DT) [ 40.147280] Call trace: [ 40.147294] show_stack+0x20/0x38 (C) [ 40.147329] dump_stack_lvl+0x8c/0xd0 [ 40.147364] print_report+0x118/0x608 [ 40.147393] kasan_report+0xdc/0x128 [ 40.147420] __asan_report_load8_noabort+0x20/0x30 [ 40.147456] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 40.147487] kasan_bitops_generic+0x110/0x1c8 [ 40.147517] kunit_try_run_case+0x170/0x3f0 [ 40.147551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.147588] kthread+0x328/0x630 [ 40.147620] ret_from_fork+0x10/0x20 [ 40.147653] [ 40.215500] Allocated by task 310: [ 40.218886] kasan_save_stack+0x3c/0x68 [ 40.222705] kasan_save_track+0x20/0x40 [ 40.226524] kasan_save_alloc_info+0x40/0x58 [ 40.230778] __kasan_kmalloc+0xd4/0xd8 [ 40.234510] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.239024] kasan_bitops_generic+0xa0/0x1c8 [ 40.243278] kunit_try_run_case+0x170/0x3f0 [ 40.247444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.252913] kthread+0x328/0x630 [ 40.256125] ret_from_fork+0x10/0x20 [ 40.259684] [ 40.261161] The buggy address belongs to the object at ffff000800d63020 [ 40.261161] which belongs to the cache kmalloc-16 of size 16 [ 40.273486] The buggy address is located 8 bytes inside of [ 40.273486] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 40.285725] [ 40.287202] The buggy address belongs to the physical page: [ 40.292758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 40.300742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.307252] page_type: f5(slab) [ 40.310387] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 40.318110] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.325829] page dumped because: kasan: bad access detected [ 40.331384] [ 40.332859] Memory state around the buggy address: [ 40.337640] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.344843] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.352047] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 40.359248] ^ [ 40.363766] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.370971] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.378171] ================================================================== [ 40.917079] ================================================================== [ 40.924174] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 40.932330] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 40.939621] [ 40.941106] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 40.941156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.941173] Hardware name: WinLink E850-96 board (DT) [ 40.941192] Call trace: [ 40.941204] show_stack+0x20/0x38 (C) [ 40.941238] dump_stack_lvl+0x8c/0xd0 [ 40.941272] print_report+0x118/0x608 [ 40.941303] kasan_report+0xdc/0x128 [ 40.941331] __asan_report_load8_noabort+0x20/0x30 [ 40.941370] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 40.941402] kasan_bitops_generic+0x110/0x1c8 [ 40.941432] kunit_try_run_case+0x170/0x3f0 [ 40.941467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.941504] kthread+0x328/0x630 [ 40.941538] ret_from_fork+0x10/0x20 [ 40.941570] [ 41.009412] Allocated by task 310: [ 41.012798] kasan_save_stack+0x3c/0x68 [ 41.016617] kasan_save_track+0x20/0x40 [ 41.020436] kasan_save_alloc_info+0x40/0x58 [ 41.024690] __kasan_kmalloc+0xd4/0xd8 [ 41.028422] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.032936] kasan_bitops_generic+0xa0/0x1c8 [ 41.037189] kunit_try_run_case+0x170/0x3f0 [ 41.041356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.046824] kthread+0x328/0x630 [ 41.050036] ret_from_fork+0x10/0x20 [ 41.053595] [ 41.055072] The buggy address belongs to the object at ffff000800d63020 [ 41.055072] which belongs to the cache kmalloc-16 of size 16 [ 41.067398] The buggy address is located 8 bytes inside of [ 41.067398] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 41.079637] [ 41.081113] The buggy address belongs to the physical page: [ 41.086670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 41.094654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.101164] page_type: f5(slab) [ 41.104298] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.112022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.119740] page dumped because: kasan: bad access detected [ 41.125296] [ 41.126771] Memory state around the buggy address: [ 41.131551] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.138754] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.145959] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.153160] ^ [ 41.157677] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.164882] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.172083] ================================================================== [ 41.445191] ================================================================== [ 41.452292] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 41.460447] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 41.467825] [ 41.469306] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 41.469356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.469372] Hardware name: WinLink E850-96 board (DT) [ 41.469391] Call trace: [ 41.469403] show_stack+0x20/0x38 (C) [ 41.469435] dump_stack_lvl+0x8c/0xd0 [ 41.469472] print_report+0x118/0x608 [ 41.469502] kasan_report+0xdc/0x128 [ 41.469531] kasan_check_range+0x100/0x1a8 [ 41.469559] __kasan_check_write+0x20/0x30 [ 41.469593] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 41.469625] kasan_bitops_generic+0x110/0x1c8 [ 41.469653] kunit_try_run_case+0x170/0x3f0 [ 41.469685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.469725] kthread+0x328/0x630 [ 41.469757] ret_from_fork+0x10/0x20 [ 41.469791] [ 41.541001] Allocated by task 310: [ 41.544387] kasan_save_stack+0x3c/0x68 [ 41.548206] kasan_save_track+0x20/0x40 [ 41.552025] kasan_save_alloc_info+0x40/0x58 [ 41.556279] __kasan_kmalloc+0xd4/0xd8 [ 41.560011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.564525] kasan_bitops_generic+0xa0/0x1c8 [ 41.568779] kunit_try_run_case+0x170/0x3f0 [ 41.572945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.578414] kthread+0x328/0x630 [ 41.581626] ret_from_fork+0x10/0x20 [ 41.585184] [ 41.586660] The buggy address belongs to the object at ffff000800d63020 [ 41.586660] which belongs to the cache kmalloc-16 of size 16 [ 41.598987] The buggy address is located 8 bytes inside of [ 41.598987] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 41.611227] [ 41.612702] The buggy address belongs to the physical page: [ 41.618257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 41.626243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.632755] page_type: f5(slab) [ 41.635888] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.643611] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.651329] page dumped because: kasan: bad access detected [ 41.656885] [ 41.658360] Memory state around the buggy address: [ 41.663140] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.670343] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.677548] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.684749] ^ [ 41.689267] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.696472] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.703672] ================================================================== [ 39.595066] ================================================================== [ 39.602145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 39.610301] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 39.617593] [ 39.619077] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 39.619125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.619143] Hardware name: WinLink E850-96 board (DT) [ 39.619165] Call trace: [ 39.619181] show_stack+0x20/0x38 (C) [ 39.619214] dump_stack_lvl+0x8c/0xd0 [ 39.619250] print_report+0x118/0x608 [ 39.619280] kasan_report+0xdc/0x128 [ 39.619309] __asan_report_load8_noabort+0x20/0x30 [ 39.619346] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 39.619377] kasan_bitops_generic+0x110/0x1c8 [ 39.619405] kunit_try_run_case+0x170/0x3f0 [ 39.619441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.619478] kthread+0x328/0x630 [ 39.619513] ret_from_fork+0x10/0x20 [ 39.619547] [ 39.687383] Allocated by task 310: [ 39.690770] kasan_save_stack+0x3c/0x68 [ 39.694588] kasan_save_track+0x20/0x40 [ 39.698407] kasan_save_alloc_info+0x40/0x58 [ 39.702661] __kasan_kmalloc+0xd4/0xd8 [ 39.706393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.710907] kasan_bitops_generic+0xa0/0x1c8 [ 39.715160] kunit_try_run_case+0x170/0x3f0 [ 39.719327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.724796] kthread+0x328/0x630 [ 39.728008] ret_from_fork+0x10/0x20 [ 39.731566] [ 39.733044] The buggy address belongs to the object at ffff000800d63020 [ 39.733044] which belongs to the cache kmalloc-16 of size 16 [ 39.745369] The buggy address is located 8 bytes inside of [ 39.745369] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 39.757608] [ 39.759087] The buggy address belongs to the physical page: [ 39.764641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 39.772625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.779135] page_type: f5(slab) [ 39.782272] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 39.789992] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 39.797711] page dumped because: kasan: bad access detected [ 39.803267] [ 39.804742] Memory state around the buggy address: [ 39.809523] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.816726] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.823932] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 39.831131] ^ [ 39.835649] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.842854] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.850055] ================================================================== [ 40.385489] ================================================================== [ 40.392586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 40.400741] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 40.408119] [ 40.409601] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 40.409654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.409670] Hardware name: WinLink E850-96 board (DT) [ 40.409689] Call trace: [ 40.409702] show_stack+0x20/0x38 (C) [ 40.409733] dump_stack_lvl+0x8c/0xd0 [ 40.409767] print_report+0x118/0x608 [ 40.409798] kasan_report+0xdc/0x128 [ 40.409826] kasan_check_range+0x100/0x1a8 [ 40.409859] __kasan_check_write+0x20/0x30 [ 40.409891] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 40.409921] kasan_bitops_generic+0x110/0x1c8 [ 40.409950] kunit_try_run_case+0x170/0x3f0 [ 40.409986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.410023] kthread+0x328/0x630 [ 40.410058] ret_from_fork+0x10/0x20 [ 40.410095] [ 40.481295] Allocated by task 310: [ 40.484680] kasan_save_stack+0x3c/0x68 [ 40.488499] kasan_save_track+0x20/0x40 [ 40.492319] kasan_save_alloc_info+0x40/0x58 [ 40.496573] __kasan_kmalloc+0xd4/0xd8 [ 40.500305] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.504819] kasan_bitops_generic+0xa0/0x1c8 [ 40.509072] kunit_try_run_case+0x170/0x3f0 [ 40.513238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.518708] kthread+0x328/0x630 [ 40.521919] ret_from_fork+0x10/0x20 [ 40.525478] [ 40.526954] The buggy address belongs to the object at ffff000800d63020 [ 40.526954] which belongs to the cache kmalloc-16 of size 16 [ 40.539282] The buggy address is located 8 bytes inside of [ 40.539282] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 40.551519] [ 40.552997] The buggy address belongs to the physical page: [ 40.558554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 40.566537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.573047] page_type: f5(slab) [ 40.576183] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 40.583904] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.591623] page dumped because: kasan: bad access detected [ 40.597178] [ 40.598654] Memory state around the buggy address: [ 40.603435] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.610639] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.617844] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 40.625043] ^ [ 40.629560] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.636765] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.643968] ================================================================== [ 41.179386] ================================================================== [ 41.186497] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 41.194652] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 41.202031] [ 41.203515] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 41.203562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.203579] Hardware name: WinLink E850-96 board (DT) [ 41.203596] Call trace: [ 41.203608] show_stack+0x20/0x38 (C) [ 41.203639] dump_stack_lvl+0x8c/0xd0 [ 41.203673] print_report+0x118/0x608 [ 41.203703] kasan_report+0xdc/0x128 [ 41.203733] kasan_check_range+0x100/0x1a8 [ 41.203765] __kasan_check_write+0x20/0x30 [ 41.203800] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 41.203832] kasan_bitops_generic+0x110/0x1c8 [ 41.203862] kunit_try_run_case+0x170/0x3f0 [ 41.203896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.203935] kthread+0x328/0x630 [ 41.203967] ret_from_fork+0x10/0x20 [ 41.203998] [ 41.275206] Allocated by task 310: [ 41.278592] kasan_save_stack+0x3c/0x68 [ 41.282411] kasan_save_track+0x20/0x40 [ 41.286231] kasan_save_alloc_info+0x40/0x58 [ 41.290484] __kasan_kmalloc+0xd4/0xd8 [ 41.294217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.298730] kasan_bitops_generic+0xa0/0x1c8 [ 41.302984] kunit_try_run_case+0x170/0x3f0 [ 41.307150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.312619] kthread+0x328/0x630 [ 41.315831] ret_from_fork+0x10/0x20 [ 41.319390] [ 41.320866] The buggy address belongs to the object at ffff000800d63020 [ 41.320866] which belongs to the cache kmalloc-16 of size 16 [ 41.333192] The buggy address is located 8 bytes inside of [ 41.333192] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 41.345431] [ 41.346907] The buggy address belongs to the physical page: [ 41.352464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 41.360450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.366960] page_type: f5(slab) [ 41.370093] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.377816] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.385535] page dumped because: kasan: bad access detected [ 41.391090] [ 41.392566] Memory state around the buggy address: [ 41.397347] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.404549] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.411753] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.418954] ^ [ 41.423472] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.430677] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.437878] ================================================================== [ 40.651273] ================================================================== [ 40.658380] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 40.666535] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 40.673914] [ 40.675400] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 40.675448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.675465] Hardware name: WinLink E850-96 board (DT) [ 40.675485] Call trace: [ 40.675497] show_stack+0x20/0x38 (C) [ 40.675531] dump_stack_lvl+0x8c/0xd0 [ 40.675566] print_report+0x118/0x608 [ 40.675593] kasan_report+0xdc/0x128 [ 40.675619] kasan_check_range+0x100/0x1a8 [ 40.675650] __kasan_check_write+0x20/0x30 [ 40.675682] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 40.675715] kasan_bitops_generic+0x110/0x1c8 [ 40.675745] kunit_try_run_case+0x170/0x3f0 [ 40.675779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.675817] kthread+0x328/0x630 [ 40.675849] ret_from_fork+0x10/0x20 [ 40.675884] [ 40.747089] Allocated by task 310: [ 40.750477] kasan_save_stack+0x3c/0x68 [ 40.754294] kasan_save_track+0x20/0x40 [ 40.758114] kasan_save_alloc_info+0x40/0x58 [ 40.762367] __kasan_kmalloc+0xd4/0xd8 [ 40.766100] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.770614] kasan_bitops_generic+0xa0/0x1c8 [ 40.774867] kunit_try_run_case+0x170/0x3f0 [ 40.779033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.784502] kthread+0x328/0x630 [ 40.787714] ret_from_fork+0x10/0x20 [ 40.791273] [ 40.792749] The buggy address belongs to the object at ffff000800d63020 [ 40.792749] which belongs to the cache kmalloc-16 of size 16 [ 40.805076] The buggy address is located 8 bytes inside of [ 40.805076] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 40.817314] [ 40.818790] The buggy address belongs to the physical page: [ 40.824347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 40.832331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.838842] page_type: f5(slab) [ 40.841976] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 40.849700] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.857418] page dumped because: kasan: bad access detected [ 40.862973] [ 40.864449] Memory state around the buggy address: [ 40.869230] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.876432] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.883636] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 40.890837] ^ [ 40.895355] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.902560] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.909761] ==================================================================
[ 16.955051] ================================================================== [ 16.955595] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.956005] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 16.957024] [ 16.957737] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 16.957854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.957882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.957934] Call Trace: [ 16.957977] <TASK> [ 16.958019] dump_stack_lvl+0x73/0xb0 [ 16.958127] print_report+0xd1/0x650 [ 16.958184] ? __virt_addr_valid+0x1db/0x2d0 [ 16.958423] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.958462] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.958490] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.958515] kasan_report+0x141/0x180 [ 16.958543] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.958573] kasan_check_range+0x10c/0x1c0 [ 16.958596] __kasan_check_write+0x18/0x20 [ 16.958618] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.958643] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.958668] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.958692] ? trace_hardirqs_on+0x37/0xe0 [ 16.958719] ? kasan_bitops_generic+0x92/0x1c0 [ 16.958746] kasan_bitops_generic+0x116/0x1c0 [ 16.958769] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.958794] ? __pfx_read_tsc+0x10/0x10 [ 16.958817] ? ktime_get_ts64+0x86/0x230 [ 16.958846] kunit_try_run_case+0x1a5/0x480 [ 16.958875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.958900] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.958928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.958955] ? __kthread_parkme+0x82/0x180 [ 16.958980] ? preempt_count_sub+0x50/0x80 [ 16.959009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.959035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.959061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.959087] kthread+0x337/0x6f0 [ 16.959106] ? trace_preempt_on+0x20/0xc0 [ 16.959131] ? __pfx_kthread+0x10/0x10 [ 16.959151] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.959175] ? calculate_sigpending+0x7b/0xa0 [ 16.959199] ? __pfx_kthread+0x10/0x10 [ 16.959219] ret_from_fork+0x41/0x80 [ 16.959243] ? __pfx_kthread+0x10/0x10 [ 16.959263] ret_from_fork_asm+0x1a/0x30 [ 16.959348] </TASK> [ 16.959370] [ 16.975226] Allocated by task 282: [ 16.975492] kasan_save_stack+0x45/0x70 [ 16.975911] kasan_save_track+0x18/0x40 [ 16.976445] kasan_save_alloc_info+0x3b/0x50 [ 16.977037] __kasan_kmalloc+0xb7/0xc0 [ 16.977914] __kmalloc_cache_noprof+0x189/0x420 [ 16.978357] kasan_bitops_generic+0x92/0x1c0 [ 16.978678] kunit_try_run_case+0x1a5/0x480 [ 16.979100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.979707] kthread+0x337/0x6f0 [ 16.979962] ret_from_fork+0x41/0x80 [ 16.980268] ret_from_fork_asm+0x1a/0x30 [ 16.980545] [ 16.980923] The buggy address belongs to the object at ffff8881024d2600 [ 16.980923] which belongs to the cache kmalloc-16 of size 16 [ 16.981925] The buggy address is located 8 bytes inside of [ 16.981925] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 16.982774] [ 16.982911] The buggy address belongs to the physical page: [ 16.983175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 16.984167] flags: 0x200000000000000(node=0|zone=2) [ 16.985178] page_type: f5(slab) [ 16.985734] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.986575] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.986938] page dumped because: kasan: bad access detected [ 16.987485] [ 16.987926] Memory state around the buggy address: [ 16.988303] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.988899] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 16.989411] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.990400] ^ [ 16.990640] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.991115] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.991868] ================================================================== [ 16.879845] ================================================================== [ 16.880325] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.881008] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 16.882046] [ 16.882296] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 16.882781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.882812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.882862] Call Trace: [ 16.882891] <TASK> [ 16.882934] dump_stack_lvl+0x73/0xb0 [ 16.882996] print_report+0xd1/0x650 [ 16.883026] ? __virt_addr_valid+0x1db/0x2d0 [ 16.883055] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.883123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.883169] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.883230] kasan_report+0x141/0x180 [ 16.883271] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.883329] kasan_check_range+0x10c/0x1c0 [ 16.883393] __kasan_check_write+0x18/0x20 [ 16.883439] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 16.883481] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.883519] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.883547] ? trace_hardirqs_on+0x37/0xe0 [ 16.883575] ? kasan_bitops_generic+0x92/0x1c0 [ 16.883604] kasan_bitops_generic+0x116/0x1c0 [ 16.883627] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.883651] ? __pfx_read_tsc+0x10/0x10 [ 16.883675] ? ktime_get_ts64+0x86/0x230 [ 16.883706] kunit_try_run_case+0x1a5/0x480 [ 16.883735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.883760] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.883788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.883814] ? __kthread_parkme+0x82/0x180 [ 16.883840] ? preempt_count_sub+0x50/0x80 [ 16.883868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.883895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.883921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.883946] kthread+0x337/0x6f0 [ 16.883965] ? trace_preempt_on+0x20/0xc0 [ 16.883990] ? __pfx_kthread+0x10/0x10 [ 16.884009] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.884034] ? calculate_sigpending+0x7b/0xa0 [ 16.884059] ? __pfx_kthread+0x10/0x10 [ 16.884093] ret_from_fork+0x41/0x80 [ 16.884127] ? __pfx_kthread+0x10/0x10 [ 16.884156] ret_from_fork_asm+0x1a/0x30 [ 16.884252] </TASK> [ 16.884282] [ 16.899519] Allocated by task 282: [ 16.899880] kasan_save_stack+0x45/0x70 [ 16.900889] kasan_save_track+0x18/0x40 [ 16.901116] kasan_save_alloc_info+0x3b/0x50 [ 16.901761] __kasan_kmalloc+0xb7/0xc0 [ 16.901975] __kmalloc_cache_noprof+0x189/0x420 [ 16.902783] kasan_bitops_generic+0x92/0x1c0 [ 16.903297] kunit_try_run_case+0x1a5/0x480 [ 16.903866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.904272] kthread+0x337/0x6f0 [ 16.904599] ret_from_fork+0x41/0x80 [ 16.905031] ret_from_fork_asm+0x1a/0x30 [ 16.905690] [ 16.905861] The buggy address belongs to the object at ffff8881024d2600 [ 16.905861] which belongs to the cache kmalloc-16 of size 16 [ 16.907130] The buggy address is located 8 bytes inside of [ 16.907130] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 16.907720] [ 16.907837] The buggy address belongs to the physical page: [ 16.908106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 16.908509] flags: 0x200000000000000(node=0|zone=2) [ 16.908771] page_type: f5(slab) [ 16.908967] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.910075] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.910569] page dumped because: kasan: bad access detected [ 16.911199] [ 16.911367] Memory state around the buggy address: [ 16.911619] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.911950] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 16.912787] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.913360] ^ [ 16.913828] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.914686] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.915488] ================================================================== [ 17.110540] ================================================================== [ 17.113560] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 17.113927] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.115512] [ 17.115809] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.115915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.115941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.115986] Call Trace: [ 17.116028] <TASK> [ 17.116542] dump_stack_lvl+0x73/0xb0 [ 17.116647] print_report+0xd1/0x650 [ 17.116696] ? __virt_addr_valid+0x1db/0x2d0 [ 17.116738] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 17.116780] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.116829] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 17.116869] kasan_report+0x141/0x180 [ 17.116913] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 17.116969] kasan_check_range+0x10c/0x1c0 [ 17.117027] __kasan_check_write+0x18/0x20 [ 17.117088] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 17.117135] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 17.117184] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.117229] ? trace_hardirqs_on+0x37/0xe0 [ 17.117272] ? kasan_bitops_generic+0x92/0x1c0 [ 17.117322] kasan_bitops_generic+0x116/0x1c0 [ 17.117385] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.117428] ? __pfx_read_tsc+0x10/0x10 [ 17.117469] ? ktime_get_ts64+0x86/0x230 [ 17.117524] kunit_try_run_case+0x1a5/0x480 [ 17.117575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.117621] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.117668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.117715] ? __kthread_parkme+0x82/0x180 [ 17.117758] ? preempt_count_sub+0x50/0x80 [ 17.117812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.117859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.117903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.117947] kthread+0x337/0x6f0 [ 17.117982] ? trace_preempt_on+0x20/0xc0 [ 17.118024] ? __pfx_kthread+0x10/0x10 [ 17.118062] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.118102] ? calculate_sigpending+0x7b/0xa0 [ 17.118143] ? __pfx_kthread+0x10/0x10 [ 17.118177] ret_from_fork+0x41/0x80 [ 17.118216] ? __pfx_kthread+0x10/0x10 [ 17.118250] ret_from_fork_asm+0x1a/0x30 [ 17.118310] </TASK> [ 17.119692] [ 17.137878] Allocated by task 282: [ 17.138599] kasan_save_stack+0x45/0x70 [ 17.138870] kasan_save_track+0x18/0x40 [ 17.139837] kasan_save_alloc_info+0x3b/0x50 [ 17.140160] __kasan_kmalloc+0xb7/0xc0 [ 17.140388] __kmalloc_cache_noprof+0x189/0x420 [ 17.141065] kasan_bitops_generic+0x92/0x1c0 [ 17.141917] kunit_try_run_case+0x1a5/0x480 [ 17.142632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.142869] kthread+0x337/0x6f0 [ 17.143541] ret_from_fork+0x41/0x80 [ 17.143795] ret_from_fork_asm+0x1a/0x30 [ 17.144013] [ 17.144146] The buggy address belongs to the object at ffff8881024d2600 [ 17.144146] which belongs to the cache kmalloc-16 of size 16 [ 17.146157] The buggy address is located 8 bytes inside of [ 17.146157] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.146902] [ 17.147426] The buggy address belongs to the physical page: [ 17.148084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.148576] flags: 0x200000000000000(node=0|zone=2) [ 17.149486] page_type: f5(slab) [ 17.149823] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.150528] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.151067] page dumped because: kasan: bad access detected [ 17.151289] [ 17.151399] Memory state around the buggy address: [ 17.151788] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.152284] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.152566] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.153719] ^ [ 17.153923] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.154628] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.155050] ================================================================== [ 17.072627] ================================================================== [ 17.072977] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 17.073947] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.074511] [ 17.074691] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.074786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.074815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.074852] Call Trace: [ 17.074880] <TASK> [ 17.074908] dump_stack_lvl+0x73/0xb0 [ 17.074948] print_report+0xd1/0x650 [ 17.074984] ? __virt_addr_valid+0x1db/0x2d0 [ 17.075019] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 17.075044] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.075069] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 17.075094] kasan_report+0x141/0x180 [ 17.075119] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 17.075149] kasan_check_range+0x10c/0x1c0 [ 17.075172] __kasan_check_write+0x18/0x20 [ 17.075195] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 17.075220] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 17.075246] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.075270] ? trace_hardirqs_on+0x37/0xe0 [ 17.075295] ? kasan_bitops_generic+0x92/0x1c0 [ 17.075322] kasan_bitops_generic+0x116/0x1c0 [ 17.075386] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.075431] ? __pfx_read_tsc+0x10/0x10 [ 17.075679] ? ktime_get_ts64+0x86/0x230 [ 17.075759] kunit_try_run_case+0x1a5/0x480 [ 17.075818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.075866] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.075922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.075958] ? __kthread_parkme+0x82/0x180 [ 17.075985] ? preempt_count_sub+0x50/0x80 [ 17.076016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.076045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.076075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.076108] kthread+0x337/0x6f0 [ 17.076126] ? trace_preempt_on+0x20/0xc0 [ 17.076153] ? __pfx_kthread+0x10/0x10 [ 17.076172] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.076197] ? calculate_sigpending+0x7b/0xa0 [ 17.076236] ? __pfx_kthread+0x10/0x10 [ 17.076268] ret_from_fork+0x41/0x80 [ 17.076305] ? __pfx_kthread+0x10/0x10 [ 17.076352] ret_from_fork_asm+0x1a/0x30 [ 17.076411] </TASK> [ 17.076432] [ 17.090330] Allocated by task 282: [ 17.091237] kasan_save_stack+0x45/0x70 [ 17.091661] kasan_save_track+0x18/0x40 [ 17.092432] kasan_save_alloc_info+0x3b/0x50 [ 17.092837] __kasan_kmalloc+0xb7/0xc0 [ 17.093207] __kmalloc_cache_noprof+0x189/0x420 [ 17.093442] kasan_bitops_generic+0x92/0x1c0 [ 17.093955] kunit_try_run_case+0x1a5/0x480 [ 17.094868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.095384] kthread+0x337/0x6f0 [ 17.095922] ret_from_fork+0x41/0x80 [ 17.096240] ret_from_fork_asm+0x1a/0x30 [ 17.096609] [ 17.097055] The buggy address belongs to the object at ffff8881024d2600 [ 17.097055] which belongs to the cache kmalloc-16 of size 16 [ 17.098110] The buggy address is located 8 bytes inside of [ 17.098110] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.099098] [ 17.099314] The buggy address belongs to the physical page: [ 17.099950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.100979] flags: 0x200000000000000(node=0|zone=2) [ 17.101317] page_type: f5(slab) [ 17.101539] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.102281] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.103135] page dumped because: kasan: bad access detected [ 17.103737] [ 17.103927] Memory state around the buggy address: [ 17.104292] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.104890] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.105725] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.106363] ^ [ 17.106862] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.107528] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.109305] ================================================================== [ 17.034009] ================================================================== [ 17.035198] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 17.035958] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.036548] [ 17.036721] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.036820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.036848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.036894] Call Trace: [ 17.036938] <TASK> [ 17.036981] dump_stack_lvl+0x73/0xb0 [ 17.037056] print_report+0xd1/0x650 [ 17.037101] ? __virt_addr_valid+0x1db/0x2d0 [ 17.037130] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 17.037157] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.037184] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 17.037225] kasan_report+0x141/0x180 [ 17.037260] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 17.037290] kasan_check_range+0x10c/0x1c0 [ 17.037314] __kasan_check_write+0x18/0x20 [ 17.037356] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 17.037395] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 17.037429] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.037454] ? trace_hardirqs_on+0x37/0xe0 [ 17.037482] ? kasan_bitops_generic+0x92/0x1c0 [ 17.037510] kasan_bitops_generic+0x116/0x1c0 [ 17.037533] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.037558] ? __pfx_read_tsc+0x10/0x10 [ 17.037582] ? ktime_get_ts64+0x86/0x230 [ 17.037613] kunit_try_run_case+0x1a5/0x480 [ 17.037643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.037668] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.037699] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.037727] ? __kthread_parkme+0x82/0x180 [ 17.037753] ? preempt_count_sub+0x50/0x80 [ 17.037782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.037808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.037835] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.037861] kthread+0x337/0x6f0 [ 17.037881] ? trace_preempt_on+0x20/0xc0 [ 17.037906] ? __pfx_kthread+0x10/0x10 [ 17.037927] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.037952] ? calculate_sigpending+0x7b/0xa0 [ 17.037977] ? __pfx_kthread+0x10/0x10 [ 17.037998] ret_from_fork+0x41/0x80 [ 17.038021] ? __pfx_kthread+0x10/0x10 [ 17.038042] ret_from_fork_asm+0x1a/0x30 [ 17.038647] </TASK> [ 17.038697] [ 17.054044] Allocated by task 282: [ 17.054399] kasan_save_stack+0x45/0x70 [ 17.054759] kasan_save_track+0x18/0x40 [ 17.055026] kasan_save_alloc_info+0x3b/0x50 [ 17.056196] __kasan_kmalloc+0xb7/0xc0 [ 17.056496] __kmalloc_cache_noprof+0x189/0x420 [ 17.056785] kasan_bitops_generic+0x92/0x1c0 [ 17.057224] kunit_try_run_case+0x1a5/0x480 [ 17.057867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.058142] kthread+0x337/0x6f0 [ 17.058524] ret_from_fork+0x41/0x80 [ 17.059058] ret_from_fork_asm+0x1a/0x30 [ 17.059529] [ 17.059723] The buggy address belongs to the object at ffff8881024d2600 [ 17.059723] which belongs to the cache kmalloc-16 of size 16 [ 17.060720] The buggy address is located 8 bytes inside of [ 17.060720] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.061497] [ 17.061631] The buggy address belongs to the physical page: [ 17.062023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.062846] flags: 0x200000000000000(node=0|zone=2) [ 17.063605] page_type: f5(slab) [ 17.063853] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.064575] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.065408] page dumped because: kasan: bad access detected [ 17.065785] [ 17.066263] Memory state around the buggy address: [ 17.067070] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.067657] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.068012] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.068651] ^ [ 17.069674] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.070029] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.070845] ================================================================== [ 17.156129] ================================================================== [ 17.156700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 17.157405] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.157702] [ 17.158514] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.158635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.158668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.158715] Call Trace: [ 17.158759] <TASK> [ 17.158979] dump_stack_lvl+0x73/0xb0 [ 17.159059] print_report+0xd1/0x650 [ 17.159108] ? __virt_addr_valid+0x1db/0x2d0 [ 17.159155] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 17.159200] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.159242] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 17.159284] kasan_report+0x141/0x180 [ 17.159329] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 17.159401] kasan_check_range+0x10c/0x1c0 [ 17.159449] __kasan_check_write+0x18/0x20 [ 17.159492] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 17.159533] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 17.159826] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.159856] ? trace_hardirqs_on+0x37/0xe0 [ 17.159884] ? kasan_bitops_generic+0x92/0x1c0 [ 17.159913] kasan_bitops_generic+0x116/0x1c0 [ 17.159937] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.159960] ? __pfx_read_tsc+0x10/0x10 [ 17.159984] ? ktime_get_ts64+0x86/0x230 [ 17.160013] kunit_try_run_case+0x1a5/0x480 [ 17.160042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.160069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.160105] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.160131] ? __kthread_parkme+0x82/0x180 [ 17.160158] ? preempt_count_sub+0x50/0x80 [ 17.160187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.160251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.160305] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.160359] kthread+0x337/0x6f0 [ 17.160384] ? trace_preempt_on+0x20/0xc0 [ 17.160409] ? __pfx_kthread+0x10/0x10 [ 17.160429] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.160454] ? calculate_sigpending+0x7b/0xa0 [ 17.160480] ? __pfx_kthread+0x10/0x10 [ 17.160501] ret_from_fork+0x41/0x80 [ 17.160524] ? __pfx_kthread+0x10/0x10 [ 17.160548] ret_from_fork_asm+0x1a/0x30 [ 17.160584] </TASK> [ 17.160597] [ 17.174644] Allocated by task 282: [ 17.174970] kasan_save_stack+0x45/0x70 [ 17.175478] kasan_save_track+0x18/0x40 [ 17.175835] kasan_save_alloc_info+0x3b/0x50 [ 17.176232] __kasan_kmalloc+0xb7/0xc0 [ 17.176700] __kmalloc_cache_noprof+0x189/0x420 [ 17.176924] kasan_bitops_generic+0x92/0x1c0 [ 17.177285] kunit_try_run_case+0x1a5/0x480 [ 17.177713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.178286] kthread+0x337/0x6f0 [ 17.178731] ret_from_fork+0x41/0x80 [ 17.179212] ret_from_fork_asm+0x1a/0x30 [ 17.179662] [ 17.179869] The buggy address belongs to the object at ffff8881024d2600 [ 17.179869] which belongs to the cache kmalloc-16 of size 16 [ 17.180910] The buggy address is located 8 bytes inside of [ 17.180910] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.181729] [ 17.181954] The buggy address belongs to the physical page: [ 17.182545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.183098] flags: 0x200000000000000(node=0|zone=2) [ 17.183639] page_type: f5(slab) [ 17.184003] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.184834] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.185140] page dumped because: kasan: bad access detected [ 17.185736] [ 17.185925] Memory state around the buggy address: [ 17.186450] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.187063] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.187840] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.188463] ^ [ 17.188694] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.189728] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.190471] ================================================================== [ 16.992873] ================================================================== [ 16.993465] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.994256] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 16.994851] [ 16.996008] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 16.996138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.996186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.996230] Call Trace: [ 16.996272] <TASK> [ 16.996318] dump_stack_lvl+0x73/0xb0 [ 16.996411] print_report+0xd1/0x650 [ 16.996460] ? __virt_addr_valid+0x1db/0x2d0 [ 16.996503] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.996548] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.996597] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.996799] kasan_report+0x141/0x180 [ 16.996849] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.996889] kasan_check_range+0x10c/0x1c0 [ 16.996920] __kasan_check_write+0x18/0x20 [ 16.996949] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.996981] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.997027] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.997064] ? trace_hardirqs_on+0x37/0xe0 [ 16.997101] ? kasan_bitops_generic+0x92/0x1c0 [ 16.997129] kasan_bitops_generic+0x116/0x1c0 [ 16.997152] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.997177] ? __pfx_read_tsc+0x10/0x10 [ 16.997201] ? ktime_get_ts64+0x86/0x230 [ 16.997287] kunit_try_run_case+0x1a5/0x480 [ 16.997359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.997400] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.997433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.997461] ? __kthread_parkme+0x82/0x180 [ 16.997488] ? preempt_count_sub+0x50/0x80 [ 16.997518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.997546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.997574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.997601] kthread+0x337/0x6f0 [ 16.997621] ? trace_preempt_on+0x20/0xc0 [ 16.997648] ? __pfx_kthread+0x10/0x10 [ 16.997669] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.997696] ? calculate_sigpending+0x7b/0xa0 [ 16.997721] ? __pfx_kthread+0x10/0x10 [ 16.997742] ret_from_fork+0x41/0x80 [ 16.997766] ? __pfx_kthread+0x10/0x10 [ 16.997786] ret_from_fork_asm+0x1a/0x30 [ 16.997823] </TASK> [ 16.997836] [ 17.015247] Allocated by task 282: [ 17.015531] kasan_save_stack+0x45/0x70 [ 17.015792] kasan_save_track+0x18/0x40 [ 17.016146] kasan_save_alloc_info+0x3b/0x50 [ 17.017164] __kasan_kmalloc+0xb7/0xc0 [ 17.017472] __kmalloc_cache_noprof+0x189/0x420 [ 17.018033] kasan_bitops_generic+0x92/0x1c0 [ 17.018826] kunit_try_run_case+0x1a5/0x480 [ 17.019037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.019838] kthread+0x337/0x6f0 [ 17.020088] ret_from_fork+0x41/0x80 [ 17.020999] ret_from_fork_asm+0x1a/0x30 [ 17.021431] [ 17.021607] The buggy address belongs to the object at ffff8881024d2600 [ 17.021607] which belongs to the cache kmalloc-16 of size 16 [ 17.023045] The buggy address is located 8 bytes inside of [ 17.023045] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.023810] [ 17.023934] The buggy address belongs to the physical page: [ 17.025117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.025708] flags: 0x200000000000000(node=0|zone=2) [ 17.026104] page_type: f5(slab) [ 17.026628] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.027706] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.028421] page dumped because: kasan: bad access detected [ 17.028647] [ 17.028822] Memory state around the buggy address: [ 17.029785] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.030045] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.030812] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.031221] ^ [ 17.031391] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.031905] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.033202] ================================================================== [ 16.917324] ================================================================== [ 16.918403] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.919063] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 16.919570] [ 16.920043] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 16.920164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.920195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.920254] Call Trace: [ 16.920361] <TASK> [ 16.920411] dump_stack_lvl+0x73/0xb0 [ 16.920464] print_report+0xd1/0x650 [ 16.920519] ? __virt_addr_valid+0x1db/0x2d0 [ 16.920564] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.920611] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.920807] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.920862] kasan_report+0x141/0x180 [ 16.920912] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.920971] kasan_check_range+0x10c/0x1c0 [ 16.921028] __kasan_check_write+0x18/0x20 [ 16.921100] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 16.921132] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.921160] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.921187] ? trace_hardirqs_on+0x37/0xe0 [ 16.921230] ? kasan_bitops_generic+0x92/0x1c0 [ 16.921318] kasan_bitops_generic+0x116/0x1c0 [ 16.921375] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.921416] ? __pfx_read_tsc+0x10/0x10 [ 16.921453] ? ktime_get_ts64+0x86/0x230 [ 16.921503] kunit_try_run_case+0x1a5/0x480 [ 16.921550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.921587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.921617] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.921645] ? __kthread_parkme+0x82/0x180 [ 16.921672] ? preempt_count_sub+0x50/0x80 [ 16.921703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.921730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.921759] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.921785] kthread+0x337/0x6f0 [ 16.921804] ? trace_preempt_on+0x20/0xc0 [ 16.921830] ? __pfx_kthread+0x10/0x10 [ 16.921850] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.921875] ? calculate_sigpending+0x7b/0xa0 [ 16.921900] ? __pfx_kthread+0x10/0x10 [ 16.921920] ret_from_fork+0x41/0x80 [ 16.921944] ? __pfx_kthread+0x10/0x10 [ 16.921964] ret_from_fork_asm+0x1a/0x30 [ 16.922000] </TASK> [ 16.922012] [ 16.938747] Allocated by task 282: [ 16.939118] kasan_save_stack+0x45/0x70 [ 16.939914] kasan_save_track+0x18/0x40 [ 16.940163] kasan_save_alloc_info+0x3b/0x50 [ 16.940688] __kasan_kmalloc+0xb7/0xc0 [ 16.941010] __kmalloc_cache_noprof+0x189/0x420 [ 16.941693] kasan_bitops_generic+0x92/0x1c0 [ 16.942071] kunit_try_run_case+0x1a5/0x480 [ 16.942570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.942944] kthread+0x337/0x6f0 [ 16.943166] ret_from_fork+0x41/0x80 [ 16.943859] ret_from_fork_asm+0x1a/0x30 [ 16.944081] [ 16.944200] The buggy address belongs to the object at ffff8881024d2600 [ 16.944200] which belongs to the cache kmalloc-16 of size 16 [ 16.944941] The buggy address is located 8 bytes inside of [ 16.944941] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 16.945752] [ 16.945886] The buggy address belongs to the physical page: [ 16.946304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 16.947176] flags: 0x200000000000000(node=0|zone=2) [ 16.947907] page_type: f5(slab) [ 16.948156] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.948878] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.949550] page dumped because: kasan: bad access detected [ 16.949955] [ 16.950105] Memory state around the buggy address: [ 16.950742] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.951111] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 16.951911] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.952306] ^ [ 16.952772] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.953048] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.953723] ==================================================================