Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-x86_64 |
[ 42.771790] ================================================================== [ 42.778833] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 42.787771] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 42.795062] [ 42.796543] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 42.796590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.796606] Hardware name: WinLink E850-96 board (DT) [ 42.796624] Call trace: [ 42.796636] show_stack+0x20/0x38 (C) [ 42.796665] dump_stack_lvl+0x8c/0xd0 [ 42.796697] print_report+0x118/0x608 [ 42.796724] kasan_report+0xdc/0x128 [ 42.796752] __asan_report_load8_noabort+0x20/0x30 [ 42.796790] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 42.796823] kasan_bitops_generic+0x11c/0x1c8 [ 42.796851] kunit_try_run_case+0x170/0x3f0 [ 42.796886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.796924] kthread+0x328/0x630 [ 42.796957] ret_from_fork+0x10/0x20 [ 42.796986] [ 42.865634] Allocated by task 310: [ 42.869020] kasan_save_stack+0x3c/0x68 [ 42.872839] kasan_save_track+0x20/0x40 [ 42.876658] kasan_save_alloc_info+0x40/0x58 [ 42.880912] __kasan_kmalloc+0xd4/0xd8 [ 42.884644] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.889158] kasan_bitops_generic+0xa0/0x1c8 [ 42.893411] kunit_try_run_case+0x170/0x3f0 [ 42.897578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.903047] kthread+0x328/0x630 [ 42.906258] ret_from_fork+0x10/0x20 [ 42.909817] [ 42.911293] The buggy address belongs to the object at ffff000800d63020 [ 42.911293] which belongs to the cache kmalloc-16 of size 16 [ 42.923620] The buggy address is located 8 bytes inside of [ 42.923620] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 42.935859] [ 42.937335] The buggy address belongs to the physical page: [ 42.942891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.950876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.957386] page_type: f5(slab) [ 42.960519] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.968244] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.975963] page dumped because: kasan: bad access detected [ 42.981518] [ 42.982993] Memory state around the buggy address: [ 42.987773] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.994976] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.002181] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.009382] ^ [ 43.013900] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.021104] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.028307] ================================================================== [ 44.098140] ================================================================== [ 44.105201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 44.114140] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 44.121431] [ 44.122912] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 44.122958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.122974] Hardware name: WinLink E850-96 board (DT) [ 44.122993] Call trace: [ 44.123005] show_stack+0x20/0x38 (C) [ 44.123037] dump_stack_lvl+0x8c/0xd0 [ 44.123069] print_report+0x118/0x608 [ 44.123099] kasan_report+0xdc/0x128 [ 44.123128] __asan_report_load8_noabort+0x20/0x30 [ 44.123160] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 44.123193] kasan_bitops_generic+0x11c/0x1c8 [ 44.123223] kunit_try_run_case+0x170/0x3f0 [ 44.123257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.123297] kthread+0x328/0x630 [ 44.123326] ret_from_fork+0x10/0x20 [ 44.123357] [ 44.192003] Allocated by task 310: [ 44.195389] kasan_save_stack+0x3c/0x68 [ 44.199208] kasan_save_track+0x20/0x40 [ 44.203027] kasan_save_alloc_info+0x40/0x58 [ 44.207281] __kasan_kmalloc+0xd4/0xd8 [ 44.211013] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.215527] kasan_bitops_generic+0xa0/0x1c8 [ 44.219780] kunit_try_run_case+0x170/0x3f0 [ 44.223947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.229416] kthread+0x328/0x630 [ 44.232628] ret_from_fork+0x10/0x20 [ 44.236186] [ 44.237664] The buggy address belongs to the object at ffff000800d63020 [ 44.237664] which belongs to the cache kmalloc-16 of size 16 [ 44.249989] The buggy address is located 8 bytes inside of [ 44.249989] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 44.262228] [ 44.263703] The buggy address belongs to the physical page: [ 44.269260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 44.277245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.283755] page_type: f5(slab) [ 44.286888] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.294612] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.302331] page dumped because: kasan: bad access detected [ 44.307887] [ 44.309362] Memory state around the buggy address: [ 44.314141] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.321345] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.328550] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.335751] ^ [ 44.340268] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.347474] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.354674] ================================================================== [ 42.504414] ================================================================== [ 42.511476] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 42.520414] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 42.527792] [ 42.529273] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 42.529319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.529335] Hardware name: WinLink E850-96 board (DT) [ 42.529352] Call trace: [ 42.529365] show_stack+0x20/0x38 (C) [ 42.529399] dump_stack_lvl+0x8c/0xd0 [ 42.529433] print_report+0x118/0x608 [ 42.529463] kasan_report+0xdc/0x128 [ 42.529493] kasan_check_range+0x100/0x1a8 [ 42.529525] __kasan_check_write+0x20/0x30 [ 42.529556] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 42.529589] kasan_bitops_generic+0x11c/0x1c8 [ 42.529618] kunit_try_run_case+0x170/0x3f0 [ 42.529655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.529691] kthread+0x328/0x630 [ 42.529723] ret_from_fork+0x10/0x20 [ 42.529753] [ 42.601749] Allocated by task 310: [ 42.605134] kasan_save_stack+0x3c/0x68 [ 42.608954] kasan_save_track+0x20/0x40 [ 42.612773] kasan_save_alloc_info+0x40/0x58 [ 42.617027] __kasan_kmalloc+0xd4/0xd8 [ 42.620759] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.625273] kasan_bitops_generic+0xa0/0x1c8 [ 42.629526] kunit_try_run_case+0x170/0x3f0 [ 42.633693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.639162] kthread+0x328/0x630 [ 42.642373] ret_from_fork+0x10/0x20 [ 42.645932] [ 42.647408] The buggy address belongs to the object at ffff000800d63020 [ 42.647408] which belongs to the cache kmalloc-16 of size 16 [ 42.659735] The buggy address is located 8 bytes inside of [ 42.659735] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 42.671974] [ 42.673450] The buggy address belongs to the physical page: [ 42.679006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.686991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.693501] page_type: f5(slab) [ 42.696634] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.704358] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.712077] page dumped because: kasan: bad access detected [ 42.717632] [ 42.719108] Memory state around the buggy address: [ 42.723888] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.731091] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.738296] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.745497] ^ [ 42.750015] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.757219] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.764420] ================================================================== [ 43.566899] ================================================================== [ 43.573961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 43.582898] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 43.590276] [ 43.591757] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 43.591804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.591820] Hardware name: WinLink E850-96 board (DT) [ 43.591838] Call trace: [ 43.591851] show_stack+0x20/0x38 (C) [ 43.591880] dump_stack_lvl+0x8c/0xd0 [ 43.591913] print_report+0x118/0x608 [ 43.591942] kasan_report+0xdc/0x128 [ 43.591970] kasan_check_range+0x100/0x1a8 [ 43.592002] __kasan_check_write+0x20/0x30 [ 43.592034] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 43.592068] kasan_bitops_generic+0x11c/0x1c8 [ 43.592096] kunit_try_run_case+0x170/0x3f0 [ 43.592129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.592166] kthread+0x328/0x630 [ 43.592201] ret_from_fork+0x10/0x20 [ 43.592230] [ 43.664233] Allocated by task 310: [ 43.667619] kasan_save_stack+0x3c/0x68 [ 43.671438] kasan_save_track+0x20/0x40 [ 43.675257] kasan_save_alloc_info+0x40/0x58 [ 43.679511] __kasan_kmalloc+0xd4/0xd8 [ 43.683243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.687757] kasan_bitops_generic+0xa0/0x1c8 [ 43.692011] kunit_try_run_case+0x170/0x3f0 [ 43.696177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.701646] kthread+0x328/0x630 [ 43.704858] ret_from_fork+0x10/0x20 [ 43.708416] [ 43.709894] The buggy address belongs to the object at ffff000800d63020 [ 43.709894] which belongs to the cache kmalloc-16 of size 16 [ 43.722219] The buggy address is located 8 bytes inside of [ 43.722219] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 43.734458] [ 43.735934] The buggy address belongs to the physical page: [ 43.741489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.749475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.755986] page_type: f5(slab) [ 43.759118] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.766843] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.774561] page dumped because: kasan: bad access detected [ 43.780117] [ 43.781592] Memory state around the buggy address: [ 43.786373] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.793575] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.800780] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.807981] ^ [ 43.812499] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.819704] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.826904] ================================================================== [ 43.834280] ================================================================== [ 43.841316] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 43.850255] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 43.857546] [ 43.859027] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 43.859074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.859089] Hardware name: WinLink E850-96 board (DT) [ 43.859106] Call trace: [ 43.859120] show_stack+0x20/0x38 (C) [ 43.859148] dump_stack_lvl+0x8c/0xd0 [ 43.859182] print_report+0x118/0x608 [ 43.859211] kasan_report+0xdc/0x128 [ 43.859241] __asan_report_load8_noabort+0x20/0x30 [ 43.859276] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 43.859310] kasan_bitops_generic+0x11c/0x1c8 [ 43.859338] kunit_try_run_case+0x170/0x3f0 [ 43.859369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.859407] kthread+0x328/0x630 [ 43.859438] ret_from_fork+0x10/0x20 [ 43.859469] [ 43.928118] Allocated by task 310: [ 43.931504] kasan_save_stack+0x3c/0x68 [ 43.935323] kasan_save_track+0x20/0x40 [ 43.939142] kasan_save_alloc_info+0x40/0x58 [ 43.943396] __kasan_kmalloc+0xd4/0xd8 [ 43.947128] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.951642] kasan_bitops_generic+0xa0/0x1c8 [ 43.955895] kunit_try_run_case+0x170/0x3f0 [ 43.960062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.965531] kthread+0x328/0x630 [ 43.968742] ret_from_fork+0x10/0x20 [ 43.972302] [ 43.973778] The buggy address belongs to the object at ffff000800d63020 [ 43.973778] which belongs to the cache kmalloc-16 of size 16 [ 43.986104] The buggy address is located 8 bytes inside of [ 43.986104] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 43.998343] [ 43.999819] The buggy address belongs to the physical page: [ 44.005375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 44.013360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.019870] page_type: f5(slab) [ 44.023003] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.030727] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.038446] page dumped because: kasan: bad access detected [ 44.044002] [ 44.045477] Memory state around the buggy address: [ 44.050255] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.057460] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.064665] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.071866] ^ [ 44.076384] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.083588] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.090790] ================================================================== [ 41.973352] ================================================================== [ 41.980406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 41.989259] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 41.996637] [ 41.998118] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 41.998164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.998181] Hardware name: WinLink E850-96 board (DT) [ 41.998200] Call trace: [ 41.998213] show_stack+0x20/0x38 (C) [ 41.998243] dump_stack_lvl+0x8c/0xd0 [ 41.998278] print_report+0x118/0x608 [ 41.998307] kasan_report+0xdc/0x128 [ 41.998335] kasan_check_range+0x100/0x1a8 [ 41.998367] __kasan_check_write+0x20/0x30 [ 41.998397] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 41.998432] kasan_bitops_generic+0x11c/0x1c8 [ 41.998461] kunit_try_run_case+0x170/0x3f0 [ 41.998495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.998532] kthread+0x328/0x630 [ 41.998563] ret_from_fork+0x10/0x20 [ 41.998594] [ 42.070507] Allocated by task 310: [ 42.073893] kasan_save_stack+0x3c/0x68 [ 42.077712] kasan_save_track+0x20/0x40 [ 42.081531] kasan_save_alloc_info+0x40/0x58 [ 42.085785] __kasan_kmalloc+0xd4/0xd8 [ 42.089517] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.094031] kasan_bitops_generic+0xa0/0x1c8 [ 42.098284] kunit_try_run_case+0x170/0x3f0 [ 42.102451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.107919] kthread+0x328/0x630 [ 42.111132] ret_from_fork+0x10/0x20 [ 42.114690] [ 42.116166] The buggy address belongs to the object at ffff000800d63020 [ 42.116166] which belongs to the cache kmalloc-16 of size 16 [ 42.128493] The buggy address is located 8 bytes inside of [ 42.128493] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 42.140732] [ 42.142209] The buggy address belongs to the physical page: [ 42.147764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.155749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.162259] page_type: f5(slab) [ 42.165392] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.173117] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.180835] page dumped because: kasan: bad access detected [ 42.186391] [ 42.187866] Memory state around the buggy address: [ 42.192646] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.199849] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.207054] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.214255] ^ [ 42.218773] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.225977] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.233178] ================================================================== [ 43.303010] ================================================================== [ 43.310073] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 43.319013] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 43.326304] [ 43.327784] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 43.327832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.327849] Hardware name: WinLink E850-96 board (DT) [ 43.327869] Call trace: [ 43.327880] show_stack+0x20/0x38 (C) [ 43.327909] dump_stack_lvl+0x8c/0xd0 [ 43.327941] print_report+0x118/0x608 [ 43.327970] kasan_report+0xdc/0x128 [ 43.328000] __asan_report_load8_noabort+0x20/0x30 [ 43.328033] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 43.328068] kasan_bitops_generic+0x11c/0x1c8 [ 43.328096] kunit_try_run_case+0x170/0x3f0 [ 43.328131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.328169] kthread+0x328/0x630 [ 43.328202] ret_from_fork+0x10/0x20 [ 43.328231] [ 43.396876] Allocated by task 310: [ 43.400262] kasan_save_stack+0x3c/0x68 [ 43.404081] kasan_save_track+0x20/0x40 [ 43.407900] kasan_save_alloc_info+0x40/0x58 [ 43.412154] __kasan_kmalloc+0xd4/0xd8 [ 43.415886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.420400] kasan_bitops_generic+0xa0/0x1c8 [ 43.424653] kunit_try_run_case+0x170/0x3f0 [ 43.428820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.434289] kthread+0x328/0x630 [ 43.437501] ret_from_fork+0x10/0x20 [ 43.441059] [ 43.442537] The buggy address belongs to the object at ffff000800d63020 [ 43.442537] which belongs to the cache kmalloc-16 of size 16 [ 43.454862] The buggy address is located 8 bytes inside of [ 43.454862] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 43.467101] [ 43.468576] The buggy address belongs to the physical page: [ 43.474132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.482118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.488628] page_type: f5(slab) [ 43.491761] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.499485] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.507205] page dumped because: kasan: bad access detected [ 43.512760] [ 43.514235] Memory state around the buggy address: [ 43.519014] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.526218] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.533423] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.540624] ^ [ 43.545142] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.552346] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.559547] ================================================================== [ 42.240553] ================================================================== [ 42.247590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 42.256530] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 42.263820] [ 42.265300] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 42.265345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.265360] Hardware name: WinLink E850-96 board (DT) [ 42.265378] Call trace: [ 42.265390] show_stack+0x20/0x38 (C) [ 42.265424] dump_stack_lvl+0x8c/0xd0 [ 42.265456] print_report+0x118/0x608 [ 42.265486] kasan_report+0xdc/0x128 [ 42.265515] __asan_report_load8_noabort+0x20/0x30 [ 42.265548] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 42.265583] kasan_bitops_generic+0x11c/0x1c8 [ 42.265610] kunit_try_run_case+0x170/0x3f0 [ 42.265645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.265685] kthread+0x328/0x630 [ 42.265715] ret_from_fork+0x10/0x20 [ 42.265747] [ 42.334392] Allocated by task 310: [ 42.337778] kasan_save_stack+0x3c/0x68 [ 42.341597] kasan_save_track+0x20/0x40 [ 42.345416] kasan_save_alloc_info+0x40/0x58 [ 42.349670] __kasan_kmalloc+0xd4/0xd8 [ 42.353402] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.357916] kasan_bitops_generic+0xa0/0x1c8 [ 42.362170] kunit_try_run_case+0x170/0x3f0 [ 42.366336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.371805] kthread+0x328/0x630 [ 42.375016] ret_from_fork+0x10/0x20 [ 42.378575] [ 42.380052] The buggy address belongs to the object at ffff000800d63020 [ 42.380052] which belongs to the cache kmalloc-16 of size 16 [ 42.392378] The buggy address is located 8 bytes inside of [ 42.392378] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 42.404617] [ 42.406094] The buggy address belongs to the physical page: [ 42.411648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 42.419634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.426144] page_type: f5(slab) [ 42.429277] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.437001] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.444720] page dumped because: kasan: bad access detected [ 42.450276] [ 42.451751] Memory state around the buggy address: [ 42.456530] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.463734] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.470939] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.478140] ^ [ 42.482658] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.489862] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.497064] ================================================================== [ 43.035627] ================================================================== [ 43.042716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 43.051656] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310 [ 43.059034] [ 43.060514] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 43.060562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.060577] Hardware name: WinLink E850-96 board (DT) [ 43.060596] Call trace: [ 43.060606] show_stack+0x20/0x38 (C) [ 43.060636] dump_stack_lvl+0x8c/0xd0 [ 43.060669] print_report+0x118/0x608 [ 43.060698] kasan_report+0xdc/0x128 [ 43.060726] kasan_check_range+0x100/0x1a8 [ 43.060757] __kasan_check_write+0x20/0x30 [ 43.060788] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 43.060822] kasan_bitops_generic+0x11c/0x1c8 [ 43.060853] kunit_try_run_case+0x170/0x3f0 [ 43.060888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.060927] kthread+0x328/0x630 [ 43.060959] ret_from_fork+0x10/0x20 [ 43.060989] [ 43.132992] Allocated by task 310: [ 43.136376] kasan_save_stack+0x3c/0x68 [ 43.140196] kasan_save_track+0x20/0x40 [ 43.144015] kasan_save_alloc_info+0x40/0x58 [ 43.148268] __kasan_kmalloc+0xd4/0xd8 [ 43.152001] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.156515] kasan_bitops_generic+0xa0/0x1c8 [ 43.160768] kunit_try_run_case+0x170/0x3f0 [ 43.164935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.170404] kthread+0x328/0x630 [ 43.173615] ret_from_fork+0x10/0x20 [ 43.177175] [ 43.178652] The buggy address belongs to the object at ffff000800d63020 [ 43.178652] which belongs to the cache kmalloc-16 of size 16 [ 43.190977] The buggy address is located 8 bytes inside of [ 43.190977] allocated 9-byte region [ffff000800d63020, ffff000800d63029) [ 43.203216] [ 43.204692] The buggy address belongs to the physical page: [ 43.210249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 43.218233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.224743] page_type: f5(slab) [ 43.227876] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.235600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.243320] page dumped because: kasan: bad access detected [ 43.248875] [ 43.250350] Memory state around the buggy address: [ 43.255129] ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.262334] ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.269538] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.276739] ^ [ 43.281257] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.288461] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.295664] ==================================================================
[ 17.469564] ================================================================== [ 17.469963] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.470748] Read of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.471121] [ 17.471352] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.471453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.471481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.471524] Call Trace: [ 17.471566] <TASK> [ 17.471607] dump_stack_lvl+0x73/0xb0 [ 17.471673] print_report+0xd1/0x650 [ 17.471720] ? __virt_addr_valid+0x1db/0x2d0 [ 17.471755] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.471782] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.471813] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.471841] kasan_report+0x141/0x180 [ 17.471883] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.471914] __asan_report_load8_noabort+0x18/0x20 [ 17.471939] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.471965] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.471994] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.472017] ? trace_hardirqs_on+0x37/0xe0 [ 17.472044] ? kasan_bitops_generic+0x92/0x1c0 [ 17.472375] kasan_bitops_generic+0x121/0x1c0 [ 17.472445] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.472478] ? __pfx_read_tsc+0x10/0x10 [ 17.472504] ? ktime_get_ts64+0x86/0x230 [ 17.472534] kunit_try_run_case+0x1a5/0x480 [ 17.472564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.472589] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.472617] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.472643] ? __kthread_parkme+0x82/0x180 [ 17.472668] ? preempt_count_sub+0x50/0x80 [ 17.472697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.472723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.472750] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.472775] kthread+0x337/0x6f0 [ 17.472794] ? trace_preempt_on+0x20/0xc0 [ 17.472819] ? __pfx_kthread+0x10/0x10 [ 17.472840] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.472864] ? calculate_sigpending+0x7b/0xa0 [ 17.472888] ? __pfx_kthread+0x10/0x10 [ 17.472908] ret_from_fork+0x41/0x80 [ 17.472931] ? __pfx_kthread+0x10/0x10 [ 17.472951] ret_from_fork_asm+0x1a/0x30 [ 17.472986] </TASK> [ 17.472999] [ 17.487051] Allocated by task 282: [ 17.487541] kasan_save_stack+0x45/0x70 [ 17.487910] kasan_save_track+0x18/0x40 [ 17.488099] kasan_save_alloc_info+0x3b/0x50 [ 17.488298] __kasan_kmalloc+0xb7/0xc0 [ 17.488500] __kmalloc_cache_noprof+0x189/0x420 [ 17.489043] kasan_bitops_generic+0x92/0x1c0 [ 17.489897] kunit_try_run_case+0x1a5/0x480 [ 17.490606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.490998] kthread+0x337/0x6f0 [ 17.491568] ret_from_fork+0x41/0x80 [ 17.491824] ret_from_fork_asm+0x1a/0x30 [ 17.492002] [ 17.492428] The buggy address belongs to the object at ffff8881024d2600 [ 17.492428] which belongs to the cache kmalloc-16 of size 16 [ 17.493119] The buggy address is located 8 bytes inside of [ 17.493119] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.493909] [ 17.494304] The buggy address belongs to the physical page: [ 17.495004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.495581] flags: 0x200000000000000(node=0|zone=2) [ 17.495989] page_type: f5(slab) [ 17.496509] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.496991] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.497731] page dumped because: kasan: bad access detected [ 17.498324] [ 17.498476] Memory state around the buggy address: [ 17.498676] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.499595] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.500069] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.500573] ^ [ 17.500779] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.501863] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.502211] ================================================================== [ 17.230843] ================================================================== [ 17.232001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.232923] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.234084] [ 17.234564] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.234684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.234711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.234750] Call Trace: [ 17.234781] <TASK> [ 17.234819] dump_stack_lvl+0x73/0xb0 [ 17.234881] print_report+0xd1/0x650 [ 17.234924] ? __virt_addr_valid+0x1db/0x2d0 [ 17.234970] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.235020] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.235066] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.235107] kasan_report+0x141/0x180 [ 17.235133] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.235165] kasan_check_range+0x10c/0x1c0 [ 17.235188] __kasan_check_write+0x18/0x20 [ 17.235272] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.235316] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.235374] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.235400] ? trace_hardirqs_on+0x37/0xe0 [ 17.235427] ? kasan_bitops_generic+0x92/0x1c0 [ 17.235453] kasan_bitops_generic+0x121/0x1c0 [ 17.235477] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.235502] ? __pfx_read_tsc+0x10/0x10 [ 17.235525] ? ktime_get_ts64+0x86/0x230 [ 17.235555] kunit_try_run_case+0x1a5/0x480 [ 17.235583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.235607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.235636] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.235662] ? __kthread_parkme+0x82/0x180 [ 17.235688] ? preempt_count_sub+0x50/0x80 [ 17.235717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.235743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.235769] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.235794] kthread+0x337/0x6f0 [ 17.235813] ? trace_preempt_on+0x20/0xc0 [ 17.235837] ? __pfx_kthread+0x10/0x10 [ 17.235857] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.235881] ? calculate_sigpending+0x7b/0xa0 [ 17.235905] ? __pfx_kthread+0x10/0x10 [ 17.235925] ret_from_fork+0x41/0x80 [ 17.235947] ? __pfx_kthread+0x10/0x10 [ 17.235967] ret_from_fork_asm+0x1a/0x30 [ 17.236001] </TASK> [ 17.236015] [ 17.247459] Allocated by task 282: [ 17.247829] kasan_save_stack+0x45/0x70 [ 17.248194] kasan_save_track+0x18/0x40 [ 17.248576] kasan_save_alloc_info+0x3b/0x50 [ 17.248892] __kasan_kmalloc+0xb7/0xc0 [ 17.249272] __kmalloc_cache_noprof+0x189/0x420 [ 17.249596] kasan_bitops_generic+0x92/0x1c0 [ 17.250010] kunit_try_run_case+0x1a5/0x480 [ 17.250235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.250701] kthread+0x337/0x6f0 [ 17.251008] ret_from_fork+0x41/0x80 [ 17.251326] ret_from_fork_asm+0x1a/0x30 [ 17.251628] [ 17.251755] The buggy address belongs to the object at ffff8881024d2600 [ 17.251755] which belongs to the cache kmalloc-16 of size 16 [ 17.252147] The buggy address is located 8 bytes inside of [ 17.252147] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.253056] [ 17.253300] The buggy address belongs to the physical page: [ 17.253577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.254106] flags: 0x200000000000000(node=0|zone=2) [ 17.254366] page_type: f5(slab) [ 17.254563] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.254851] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.255161] page dumped because: kasan: bad access detected [ 17.255399] [ 17.255561] Memory state around the buggy address: [ 17.255925] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.256549] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.257620] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.258180] ^ [ 17.258582] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.259130] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.260555] ================================================================== [ 17.433873] ================================================================== [ 17.434348] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.434895] Read of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.435459] [ 17.435711] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.435821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.435850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.435899] Call Trace: [ 17.435945] <TASK> [ 17.435989] dump_stack_lvl+0x73/0xb0 [ 17.436057] print_report+0xd1/0x650 [ 17.436103] ? __virt_addr_valid+0x1db/0x2d0 [ 17.436149] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.436197] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.436245] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.436299] kasan_report+0x141/0x180 [ 17.436379] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.436443] kasan_check_range+0x10c/0x1c0 [ 17.436492] __kasan_check_read+0x15/0x20 [ 17.436538] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.436590] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.436645] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.436689] ? trace_hardirqs_on+0x37/0xe0 [ 17.436723] ? kasan_bitops_generic+0x92/0x1c0 [ 17.436752] kasan_bitops_generic+0x121/0x1c0 [ 17.436775] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.436800] ? __pfx_read_tsc+0x10/0x10 [ 17.436828] ? ktime_get_ts64+0x86/0x230 [ 17.436877] kunit_try_run_case+0x1a5/0x480 [ 17.436925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.436964] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.437024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.437075] ? __kthread_parkme+0x82/0x180 [ 17.437129] ? preempt_count_sub+0x50/0x80 [ 17.437186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.437240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.437294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.438147] kthread+0x337/0x6f0 [ 17.438253] ? trace_preempt_on+0x20/0xc0 [ 17.438309] ? __pfx_kthread+0x10/0x10 [ 17.438369] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.438421] ? calculate_sigpending+0x7b/0xa0 [ 17.438470] ? __pfx_kthread+0x10/0x10 [ 17.438513] ret_from_fork+0x41/0x80 [ 17.438559] ? __pfx_kthread+0x10/0x10 [ 17.438602] ret_from_fork_asm+0x1a/0x30 [ 17.438673] </TASK> [ 17.438695] [ 17.452706] Allocated by task 282: [ 17.453318] kasan_save_stack+0x45/0x70 [ 17.453689] kasan_save_track+0x18/0x40 [ 17.454075] kasan_save_alloc_info+0x3b/0x50 [ 17.454311] __kasan_kmalloc+0xb7/0xc0 [ 17.454597] __kmalloc_cache_noprof+0x189/0x420 [ 17.454951] kasan_bitops_generic+0x92/0x1c0 [ 17.455206] kunit_try_run_case+0x1a5/0x480 [ 17.455516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.456232] kthread+0x337/0x6f0 [ 17.456856] ret_from_fork+0x41/0x80 [ 17.457027] ret_from_fork_asm+0x1a/0x30 [ 17.457562] [ 17.457686] The buggy address belongs to the object at ffff8881024d2600 [ 17.457686] which belongs to the cache kmalloc-16 of size 16 [ 17.458874] The buggy address is located 8 bytes inside of [ 17.458874] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.459706] [ 17.459916] The buggy address belongs to the physical page: [ 17.460515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.460928] flags: 0x200000000000000(node=0|zone=2) [ 17.461262] page_type: f5(slab) [ 17.461696] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.462429] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.462951] page dumped because: kasan: bad access detected [ 17.463520] [ 17.463663] Memory state around the buggy address: [ 17.464048] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.464570] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.465497] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.465952] ^ [ 17.466494] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.467091] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.467637] ================================================================== [ 17.261698] ================================================================== [ 17.263924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.265052] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.266470] [ 17.267493] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.267636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.267680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.267731] Call Trace: [ 17.267774] <TASK> [ 17.267804] dump_stack_lvl+0x73/0xb0 [ 17.267850] print_report+0xd1/0x650 [ 17.267879] ? __virt_addr_valid+0x1db/0x2d0 [ 17.267905] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.267931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.267957] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.267983] kasan_report+0x141/0x180 [ 17.268009] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.268040] kasan_check_range+0x10c/0x1c0 [ 17.268072] __kasan_check_write+0x18/0x20 [ 17.268106] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.268134] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.268161] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.268185] ? trace_hardirqs_on+0x37/0xe0 [ 17.268235] ? kasan_bitops_generic+0x92/0x1c0 [ 17.268276] kasan_bitops_generic+0x121/0x1c0 [ 17.268310] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.268360] ? __pfx_read_tsc+0x10/0x10 [ 17.268397] ? ktime_get_ts64+0x86/0x230 [ 17.268443] kunit_try_run_case+0x1a5/0x480 [ 17.268484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.268518] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.268559] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.268596] ? __kthread_parkme+0x82/0x180 [ 17.268635] ? preempt_count_sub+0x50/0x80 [ 17.268682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.268719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.268747] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.268773] kthread+0x337/0x6f0 [ 17.268793] ? trace_preempt_on+0x20/0xc0 [ 17.268819] ? __pfx_kthread+0x10/0x10 [ 17.268839] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.268863] ? calculate_sigpending+0x7b/0xa0 [ 17.268889] ? __pfx_kthread+0x10/0x10 [ 17.268909] ret_from_fork+0x41/0x80 [ 17.268932] ? __pfx_kthread+0x10/0x10 [ 17.268952] ret_from_fork_asm+0x1a/0x30 [ 17.268987] </TASK> [ 17.268999] [ 17.285562] Allocated by task 282: [ 17.285933] kasan_save_stack+0x45/0x70 [ 17.286768] kasan_save_track+0x18/0x40 [ 17.287046] kasan_save_alloc_info+0x3b/0x50 [ 17.287824] __kasan_kmalloc+0xb7/0xc0 [ 17.288274] __kmalloc_cache_noprof+0x189/0x420 [ 17.288850] kasan_bitops_generic+0x92/0x1c0 [ 17.289410] kunit_try_run_case+0x1a5/0x480 [ 17.289745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.290039] kthread+0x337/0x6f0 [ 17.290361] ret_from_fork+0x41/0x80 [ 17.290547] ret_from_fork_asm+0x1a/0x30 [ 17.290999] [ 17.291167] The buggy address belongs to the object at ffff8881024d2600 [ 17.291167] which belongs to the cache kmalloc-16 of size 16 [ 17.292266] The buggy address is located 8 bytes inside of [ 17.292266] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.292885] [ 17.293452] The buggy address belongs to the physical page: [ 17.294551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.295004] flags: 0x200000000000000(node=0|zone=2) [ 17.295406] page_type: f5(slab) [ 17.295870] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.296492] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.297277] page dumped because: kasan: bad access detected [ 17.297497] [ 17.297595] Memory state around the buggy address: [ 17.297940] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.298618] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.299287] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.299884] ^ [ 17.300539] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.301119] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.301574] ================================================================== [ 17.191855] ================================================================== [ 17.192951] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.193632] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.194602] [ 17.195367] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.195699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.195726] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.195756] Call Trace: [ 17.195774] <TASK> [ 17.195800] dump_stack_lvl+0x73/0xb0 [ 17.195843] print_report+0xd1/0x650 [ 17.195871] ? __virt_addr_valid+0x1db/0x2d0 [ 17.195899] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.195926] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.195951] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.195978] kasan_report+0x141/0x180 [ 17.196003] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.196035] kasan_check_range+0x10c/0x1c0 [ 17.196058] __kasan_check_write+0x18/0x20 [ 17.196102] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.196130] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.196158] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.196183] ? trace_hardirqs_on+0x37/0xe0 [ 17.196212] ? kasan_bitops_generic+0x92/0x1c0 [ 17.196287] kasan_bitops_generic+0x121/0x1c0 [ 17.196330] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.196387] ? __pfx_read_tsc+0x10/0x10 [ 17.196424] ? ktime_get_ts64+0x86/0x230 [ 17.196471] kunit_try_run_case+0x1a5/0x480 [ 17.196517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.196577] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.196625] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.196667] ? __kthread_parkme+0x82/0x180 [ 17.196704] ? preempt_count_sub+0x50/0x80 [ 17.196735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.196762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.196790] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.196816] kthread+0x337/0x6f0 [ 17.196834] ? trace_preempt_on+0x20/0xc0 [ 17.196861] ? __pfx_kthread+0x10/0x10 [ 17.196881] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.196906] ? calculate_sigpending+0x7b/0xa0 [ 17.196931] ? __pfx_kthread+0x10/0x10 [ 17.196951] ret_from_fork+0x41/0x80 [ 17.196976] ? __pfx_kthread+0x10/0x10 [ 17.196997] ret_from_fork_asm+0x1a/0x30 [ 17.197045] </TASK> [ 17.197060] [ 17.213849] Allocated by task 282: [ 17.214240] kasan_save_stack+0x45/0x70 [ 17.214609] kasan_save_track+0x18/0x40 [ 17.214889] kasan_save_alloc_info+0x3b/0x50 [ 17.215779] __kasan_kmalloc+0xb7/0xc0 [ 17.215972] __kmalloc_cache_noprof+0x189/0x420 [ 17.216213] kasan_bitops_generic+0x92/0x1c0 [ 17.217174] kunit_try_run_case+0x1a5/0x480 [ 17.218066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.218581] kthread+0x337/0x6f0 [ 17.218963] ret_from_fork+0x41/0x80 [ 17.219267] ret_from_fork_asm+0x1a/0x30 [ 17.219471] [ 17.219638] The buggy address belongs to the object at ffff8881024d2600 [ 17.219638] which belongs to the cache kmalloc-16 of size 16 [ 17.220786] The buggy address is located 8 bytes inside of [ 17.220786] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.221885] [ 17.222086] The buggy address belongs to the physical page: [ 17.222675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.223076] flags: 0x200000000000000(node=0|zone=2) [ 17.223503] page_type: f5(slab) [ 17.223852] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.224905] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.226198] page dumped because: kasan: bad access detected [ 17.226447] [ 17.226519] Memory state around the buggy address: [ 17.226631] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.226770] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.226904] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.227034] ^ [ 17.227315] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.227869] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.228879] ================================================================== [ 17.367999] ================================================================== [ 17.368570] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.368944] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.369505] [ 17.369742] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.369825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.369847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.369884] Call Trace: [ 17.369925] <TASK> [ 17.369965] dump_stack_lvl+0x73/0xb0 [ 17.370020] print_report+0xd1/0x650 [ 17.370094] ? __virt_addr_valid+0x1db/0x2d0 [ 17.370148] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.370226] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.370275] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.370358] kasan_report+0x141/0x180 [ 17.370424] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.370502] kasan_check_range+0x10c/0x1c0 [ 17.370561] __kasan_check_write+0x18/0x20 [ 17.370600] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.370643] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.370690] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.370731] ? trace_hardirqs_on+0x37/0xe0 [ 17.370779] ? kasan_bitops_generic+0x92/0x1c0 [ 17.371446] kasan_bitops_generic+0x121/0x1c0 [ 17.371512] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.371593] ? __pfx_read_tsc+0x10/0x10 [ 17.371630] ? ktime_get_ts64+0x86/0x230 [ 17.371680] kunit_try_run_case+0x1a5/0x480 [ 17.371726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.371767] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.371817] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.372151] ? __kthread_parkme+0x82/0x180 [ 17.372219] ? preempt_count_sub+0x50/0x80 [ 17.372285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.372329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.372562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.372614] kthread+0x337/0x6f0 [ 17.372653] ? trace_preempt_on+0x20/0xc0 [ 17.372706] ? __pfx_kthread+0x10/0x10 [ 17.372749] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.372800] ? calculate_sigpending+0x7b/0xa0 [ 17.372847] ? __pfx_kthread+0x10/0x10 [ 17.372891] ret_from_fork+0x41/0x80 [ 17.372937] ? __pfx_kthread+0x10/0x10 [ 17.372980] ret_from_fork_asm+0x1a/0x30 [ 17.373051] </TASK> [ 17.373106] [ 17.387135] Allocated by task 282: [ 17.388253] kasan_save_stack+0x45/0x70 [ 17.389103] kasan_save_track+0x18/0x40 [ 17.390003] kasan_save_alloc_info+0x3b/0x50 [ 17.390443] __kasan_kmalloc+0xb7/0xc0 [ 17.390735] __kmalloc_cache_noprof+0x189/0x420 [ 17.390961] kasan_bitops_generic+0x92/0x1c0 [ 17.391737] kunit_try_run_case+0x1a5/0x480 [ 17.392000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.392741] kthread+0x337/0x6f0 [ 17.393102] ret_from_fork+0x41/0x80 [ 17.393370] ret_from_fork_asm+0x1a/0x30 [ 17.393637] [ 17.393758] The buggy address belongs to the object at ffff8881024d2600 [ 17.393758] which belongs to the cache kmalloc-16 of size 16 [ 17.394679] The buggy address is located 8 bytes inside of [ 17.394679] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.396075] [ 17.396260] The buggy address belongs to the physical page: [ 17.396646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.397234] flags: 0x200000000000000(node=0|zone=2) [ 17.397511] page_type: f5(slab) [ 17.397878] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.398622] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.399199] page dumped because: kasan: bad access detected [ 17.399577] [ 17.399701] Memory state around the buggy address: [ 17.399906] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.400483] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.400859] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.401329] ^ [ 17.401610] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.402232] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.402925] ================================================================== [ 17.339525] ================================================================== [ 17.340147] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.340895] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.341793] [ 17.341994] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.342292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.342328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.342394] Call Trace: [ 17.342426] <TASK> [ 17.342527] dump_stack_lvl+0x73/0xb0 [ 17.342594] print_report+0xd1/0x650 [ 17.342625] ? __virt_addr_valid+0x1db/0x2d0 [ 17.342651] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.342677] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.342702] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.342729] kasan_report+0x141/0x180 [ 17.342754] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.342787] kasan_check_range+0x10c/0x1c0 [ 17.342809] __kasan_check_write+0x18/0x20 [ 17.342831] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.342857] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.342884] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.342908] ? trace_hardirqs_on+0x37/0xe0 [ 17.342933] ? kasan_bitops_generic+0x92/0x1c0 [ 17.342959] kasan_bitops_generic+0x121/0x1c0 [ 17.342982] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.343005] ? __pfx_read_tsc+0x10/0x10 [ 17.343027] ? ktime_get_ts64+0x86/0x230 [ 17.343056] kunit_try_run_case+0x1a5/0x480 [ 17.343095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.343121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.343150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.343177] ? __kthread_parkme+0x82/0x180 [ 17.343201] ? preempt_count_sub+0x50/0x80 [ 17.343231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.343257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.343283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.343309] kthread+0x337/0x6f0 [ 17.343329] ? trace_preempt_on+0x20/0xc0 [ 17.343373] ? __pfx_kthread+0x10/0x10 [ 17.343395] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.343419] ? calculate_sigpending+0x7b/0xa0 [ 17.343443] ? __pfx_kthread+0x10/0x10 [ 17.343464] ret_from_fork+0x41/0x80 [ 17.343488] ? __pfx_kthread+0x10/0x10 [ 17.343508] ret_from_fork_asm+0x1a/0x30 [ 17.343543] </TASK> [ 17.343555] [ 17.354974] Allocated by task 282: [ 17.355322] kasan_save_stack+0x45/0x70 [ 17.355641] kasan_save_track+0x18/0x40 [ 17.355843] kasan_save_alloc_info+0x3b/0x50 [ 17.356230] __kasan_kmalloc+0xb7/0xc0 [ 17.356581] __kmalloc_cache_noprof+0x189/0x420 [ 17.356966] kasan_bitops_generic+0x92/0x1c0 [ 17.357349] kunit_try_run_case+0x1a5/0x480 [ 17.357642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.357918] kthread+0x337/0x6f0 [ 17.358283] ret_from_fork+0x41/0x80 [ 17.358636] ret_from_fork_asm+0x1a/0x30 [ 17.358988] [ 17.359193] The buggy address belongs to the object at ffff8881024d2600 [ 17.359193] which belongs to the cache kmalloc-16 of size 16 [ 17.359804] The buggy address is located 8 bytes inside of [ 17.359804] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.360316] [ 17.360530] The buggy address belongs to the physical page: [ 17.360983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.361538] flags: 0x200000000000000(node=0|zone=2) [ 17.361971] page_type: f5(slab) [ 17.362314] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.362627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.362904] page dumped because: kasan: bad access detected [ 17.363302] [ 17.363516] Memory state around the buggy address: [ 17.363915] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.364499] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.365053] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.365660] ^ [ 17.365919] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.366240] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.366815] ================================================================== [ 17.302970] ================================================================== [ 17.303517] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.304280] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.304840] [ 17.305392] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.305544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.305570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.305612] Call Trace: [ 17.305655] <TASK> [ 17.305694] dump_stack_lvl+0x73/0xb0 [ 17.305802] print_report+0xd1/0x650 [ 17.305857] ? __virt_addr_valid+0x1db/0x2d0 [ 17.305950] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.306018] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.306071] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.306124] kasan_report+0x141/0x180 [ 17.306173] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.306230] kasan_check_range+0x10c/0x1c0 [ 17.306276] __kasan_check_write+0x18/0x20 [ 17.306300] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.306328] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.306387] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.306425] ? trace_hardirqs_on+0x37/0xe0 [ 17.306462] ? kasan_bitops_generic+0x92/0x1c0 [ 17.306503] kasan_bitops_generic+0x121/0x1c0 [ 17.306537] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.306574] ? __pfx_read_tsc+0x10/0x10 [ 17.306610] ? ktime_get_ts64+0x86/0x230 [ 17.306655] kunit_try_run_case+0x1a5/0x480 [ 17.306708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.306743] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.306787] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.306837] ? __kthread_parkme+0x82/0x180 [ 17.306877] ? preempt_count_sub+0x50/0x80 [ 17.306912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.306939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.306966] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.306991] kthread+0x337/0x6f0 [ 17.307011] ? trace_preempt_on+0x20/0xc0 [ 17.307035] ? __pfx_kthread+0x10/0x10 [ 17.307055] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.307088] ? calculate_sigpending+0x7b/0xa0 [ 17.307112] ? __pfx_kthread+0x10/0x10 [ 17.307133] ret_from_fork+0x41/0x80 [ 17.307155] ? __pfx_kthread+0x10/0x10 [ 17.307177] ret_from_fork_asm+0x1a/0x30 [ 17.307239] </TASK> [ 17.307270] [ 17.321549] Allocated by task 282: [ 17.321988] kasan_save_stack+0x45/0x70 [ 17.322705] kasan_save_track+0x18/0x40 [ 17.323013] kasan_save_alloc_info+0x3b/0x50 [ 17.323404] __kasan_kmalloc+0xb7/0xc0 [ 17.323736] __kmalloc_cache_noprof+0x189/0x420 [ 17.324176] kasan_bitops_generic+0x92/0x1c0 [ 17.325351] kunit_try_run_case+0x1a5/0x480 [ 17.325886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.326473] kthread+0x337/0x6f0 [ 17.326670] ret_from_fork+0x41/0x80 [ 17.327280] ret_from_fork_asm+0x1a/0x30 [ 17.327868] [ 17.327948] The buggy address belongs to the object at ffff8881024d2600 [ 17.327948] which belongs to the cache kmalloc-16 of size 16 [ 17.328699] The buggy address is located 8 bytes inside of [ 17.328699] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.329515] [ 17.329709] The buggy address belongs to the physical page: [ 17.330554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.331141] flags: 0x200000000000000(node=0|zone=2) [ 17.331358] page_type: f5(slab) [ 17.331555] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.332240] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.332815] page dumped because: kasan: bad access detected [ 17.333025] [ 17.333695] Memory state around the buggy address: [ 17.334481] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.334889] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.335497] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.336232] ^ [ 17.336564] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.336836] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.337607] ================================================================== [ 17.405191] ================================================================== [ 17.405832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.406368] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282 [ 17.406905] [ 17.407149] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 17.407251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.407278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.407323] Call Trace: [ 17.407391] <TASK> [ 17.407450] dump_stack_lvl+0x73/0xb0 [ 17.407513] print_report+0xd1/0x650 [ 17.407561] ? __virt_addr_valid+0x1db/0x2d0 [ 17.407611] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.407672] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.407734] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.407781] kasan_report+0x141/0x180 [ 17.407834] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.407892] kasan_check_range+0x10c/0x1c0 [ 17.407936] __kasan_check_write+0x18/0x20 [ 17.407975] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.408040] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.408109] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.408174] ? trace_hardirqs_on+0x37/0xe0 [ 17.408218] ? kasan_bitops_generic+0x92/0x1c0 [ 17.408247] kasan_bitops_generic+0x121/0x1c0 [ 17.408271] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.408295] ? __pfx_read_tsc+0x10/0x10 [ 17.408320] ? ktime_get_ts64+0x86/0x230 [ 17.408374] kunit_try_run_case+0x1a5/0x480 [ 17.408406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.408431] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.408459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.408487] ? __kthread_parkme+0x82/0x180 [ 17.408512] ? preempt_count_sub+0x50/0x80 [ 17.408542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.408571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.408598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.408623] kthread+0x337/0x6f0 [ 17.408642] ? trace_preempt_on+0x20/0xc0 [ 17.408667] ? __pfx_kthread+0x10/0x10 [ 17.408687] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.408711] ? calculate_sigpending+0x7b/0xa0 [ 17.408736] ? __pfx_kthread+0x10/0x10 [ 17.408756] ret_from_fork+0x41/0x80 [ 17.408780] ? __pfx_kthread+0x10/0x10 [ 17.408801] ret_from_fork_asm+0x1a/0x30 [ 17.408836] </TASK> [ 17.408849] [ 17.420091] Allocated by task 282: [ 17.420297] kasan_save_stack+0x45/0x70 [ 17.420690] kasan_save_track+0x18/0x40 [ 17.421080] kasan_save_alloc_info+0x3b/0x50 [ 17.421641] __kasan_kmalloc+0xb7/0xc0 [ 17.422005] __kmalloc_cache_noprof+0x189/0x420 [ 17.422436] kasan_bitops_generic+0x92/0x1c0 [ 17.422646] kunit_try_run_case+0x1a5/0x480 [ 17.422850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.423361] kthread+0x337/0x6f0 [ 17.423668] ret_from_fork+0x41/0x80 [ 17.424013] ret_from_fork_asm+0x1a/0x30 [ 17.424397] [ 17.424596] The buggy address belongs to the object at ffff8881024d2600 [ 17.424596] which belongs to the cache kmalloc-16 of size 16 [ 17.425303] The buggy address is located 8 bytes inside of [ 17.425303] allocated 9-byte region [ffff8881024d2600, ffff8881024d2609) [ 17.426009] [ 17.426273] The buggy address belongs to the physical page: [ 17.426552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2 [ 17.427103] flags: 0x200000000000000(node=0|zone=2) [ 17.427394] page_type: f5(slab) [ 17.427738] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.428255] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.428679] page dumped because: kasan: bad access detected [ 17.429052] [ 17.429187] Memory state around the buggy address: [ 17.429436] ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.429991] ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 17.430432] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.430702] ^ [ 17.430876] ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.431312] ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.431964] ==================================================================