Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 77.133585] ================================================================== [ 77.134168] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xb8c [ 77.134906] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.135524] [ 77.135750] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.136545] Hardware name: linux,dummy-virt (DT) [ 77.137223] Call trace: [ 77.137495] dump_backtrace+0xf8/0x118 [ 77.138001] show_stack+0x18/0x24 [ 77.138493] __dump_stack+0x28/0x38 [ 77.138923] dump_stack_lvl+0x54/0x6c [ 77.139375] print_address_description+0x7c/0x1ec [ 77.139925] print_report+0x50/0x68 [ 77.140368] kasan_report+0xac/0x100 [ 77.140868] kasan_check_range+0x260/0x2a0 [ 77.141357] __kasan_check_write+0x2c/0x3c [ 77.141807] kasan_bitops_generic+0x1f0/0xb8c [ 77.142271] kunit_try_run_case+0x80/0x184 [ 77.142725] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.143458] kthread+0x16c/0x21c [ 77.143876] ret_from_fork+0x10/0x20 [ 77.144331] [ 77.144522] Allocated by task 165: [ 77.144913] kasan_set_track+0x4c/0x80 [ 77.145535] kasan_save_alloc_info+0x28/0x34 [ 77.146028] __kasan_kmalloc+0x88/0xa0 [ 77.146469] kmalloc_trace+0x54/0x68 [ 77.146933] kasan_bitops_generic+0x4c/0xb8c [ 77.147394] kunit_try_run_case+0x80/0x184 [ 77.147873] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.148447] kthread+0x16c/0x21c [ 77.149014] ret_from_fork+0x10/0x20 [ 77.149468] [ 77.149659] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.149659] which belongs to the cache kmalloc-128 of size 128 [ 77.150611] The buggy address is located 8 bytes inside of [ 77.150611] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.151503] [ 77.151724] The buggy address belongs to the physical page: [ 77.152187] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.153137] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.153844] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.154527] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.155155] page dumped because: kasan: bad access detected [ 77.155635] [ 77.155851] Memory state around the buggy address: [ 77.156319] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.157615] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.158233] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.158846] ^ [ 77.159199] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.159838] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.160431] ================================================================== [ 77.328315] ================================================================== [ 77.329131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3a0/0xb8c [ 77.329836] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.330428] [ 77.330674] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.331422] Hardware name: linux,dummy-virt (DT) [ 77.331877] Call trace: [ 77.332156] dump_backtrace+0xf8/0x118 [ 77.332629] show_stack+0x18/0x24 [ 77.333098] __dump_stack+0x28/0x38 [ 77.333531] dump_stack_lvl+0x54/0x6c [ 77.333966] print_address_description+0x7c/0x1ec [ 77.334506] print_report+0x50/0x68 [ 77.335149] kasan_report+0xac/0x100 [ 77.335606] __asan_load8+0xa8/0xac [ 77.336017] kasan_bitops_generic+0x3a0/0xb8c [ 77.336534] kunit_try_run_case+0x80/0x184 [ 77.337175] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.337747] kthread+0x16c/0x21c [ 77.338175] ret_from_fork+0x10/0x20 [ 77.338628] [ 77.338882] Allocated by task 165: [ 77.339236] kasan_set_track+0x4c/0x80 [ 77.339735] kasan_save_alloc_info+0x28/0x34 [ 77.340203] __kasan_kmalloc+0x88/0xa0 [ 77.340843] kmalloc_trace+0x54/0x68 [ 77.341267] kasan_bitops_generic+0x4c/0xb8c [ 77.341733] kunit_try_run_case+0x80/0x184 [ 77.342195] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.342781] kthread+0x16c/0x21c [ 77.343186] ret_from_fork+0x10/0x20 [ 77.343615] [ 77.343828] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.343828] which belongs to the cache kmalloc-128 of size 128 [ 77.344732] The buggy address is located 8 bytes inside of [ 77.344732] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.345640] [ 77.345866] The buggy address belongs to the physical page: [ 77.346321] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.347257] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.347963] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.349185] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.349810] page dumped because: kasan: bad access detected [ 77.350289] [ 77.350481] Memory state around the buggy address: [ 77.350955] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.351567] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.352243] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.353030] ^ [ 77.353406] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.354034] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.354634] ================================================================== [ 77.529113] ================================================================== [ 77.529847] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x59c/0xb8c [ 77.530531] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.531160] [ 77.531378] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.532147] Hardware name: linux,dummy-virt (DT) [ 77.532561] Call trace: [ 77.532877] dump_backtrace+0xf8/0x118 [ 77.533357] show_stack+0x18/0x24 [ 77.533801] __dump_stack+0x28/0x38 [ 77.534213] dump_stack_lvl+0x54/0x6c [ 77.534691] print_address_description+0x7c/0x1ec [ 77.535247] print_report+0x50/0x68 [ 77.535705] kasan_report+0xac/0x100 [ 77.536159] __asan_load8+0xa8/0xac [ 77.536558] kasan_bitops_generic+0x59c/0xb8c [ 77.537065] kunit_try_run_case+0x80/0x184 [ 77.537536] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.538108] kthread+0x16c/0x21c [ 77.538542] ret_from_fork+0x10/0x20 [ 77.538971] [ 77.539166] Allocated by task 165: [ 77.539514] kasan_set_track+0x4c/0x80 [ 77.539987] kasan_save_alloc_info+0x28/0x34 [ 77.540450] __kasan_kmalloc+0x88/0xa0 [ 77.540931] kmalloc_trace+0x54/0x68 [ 77.541342] kasan_bitops_generic+0x4c/0xb8c [ 77.541804] kunit_try_run_case+0x80/0x184 [ 77.542288] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.542861] kthread+0x16c/0x21c [ 77.543273] ret_from_fork+0x10/0x20 [ 77.543713] [ 77.543945] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.543945] which belongs to the cache kmalloc-128 of size 128 [ 77.544858] The buggy address is located 8 bytes inside of [ 77.544858] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.545802] [ 77.546026] The buggy address belongs to the physical page: [ 77.546491] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.547281] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.547993] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.548683] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.549333] page dumped because: kasan: bad access detected [ 77.549814] [ 77.550033] Memory state around the buggy address: [ 77.550475] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.551117] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.551749] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.552319] ^ [ 77.552697] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.553324] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.553946] ================================================================== [ 77.355424] ================================================================== [ 77.355968] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3f4/0xb8c [ 77.356965] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.357607] [ 77.357876] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.358631] Hardware name: linux,dummy-virt (DT) [ 77.359060] Call trace: [ 77.359355] dump_backtrace+0xf8/0x118 [ 77.359851] show_stack+0x18/0x24 [ 77.360276] __dump_stack+0x28/0x38 [ 77.360878] dump_stack_lvl+0x54/0x6c [ 77.361331] print_address_description+0x7c/0x1ec [ 77.361975] print_report+0x50/0x68 [ 77.362408] kasan_report+0xac/0x100 [ 77.362877] kasan_check_range+0x260/0x2a0 [ 77.363436] __kasan_check_write+0x2c/0x3c [ 77.363929] kasan_bitops_generic+0x3f4/0xb8c [ 77.364404] kunit_try_run_case+0x80/0x184 [ 77.364884] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.365531] kthread+0x16c/0x21c [ 77.365959] ret_from_fork+0x10/0x20 [ 77.366405] [ 77.366635] Allocated by task 165: [ 77.367228] kasan_set_track+0x4c/0x80 [ 77.367685] kasan_save_alloc_info+0x28/0x34 [ 77.368143] __kasan_kmalloc+0x88/0xa0 [ 77.368728] kmalloc_trace+0x54/0x68 [ 77.369155] kasan_bitops_generic+0x4c/0xb8c [ 77.369706] kunit_try_run_case+0x80/0x184 [ 77.370220] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.371822] kthread+0x16c/0x21c [ 77.372471] ret_from_fork+0x10/0x20 [ 77.372878] [ 77.373061] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.373061] which belongs to the cache kmalloc-128 of size 128 [ 77.374474] The buggy address is located 8 bytes inside of [ 77.374474] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.376540] [ 77.377274] The buggy address belongs to the physical page: [ 77.378459] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.379463] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.380389] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.381700] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.382342] page dumped because: kasan: bad access detected [ 77.382875] [ 77.383076] Memory state around the buggy address: [ 77.383472] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.384115] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.384830] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.385385] ^ [ 77.385725] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.386388] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.387009] ================================================================== [ 77.554786] ================================================================== [ 77.555326] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x5f4/0xb8c [ 77.556054] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.556734] [ 77.556981] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.557727] Hardware name: linux,dummy-virt (DT) [ 77.558168] Call trace: [ 77.558473] dump_backtrace+0xf8/0x118 [ 77.558963] show_stack+0x18/0x24 [ 77.559432] __dump_stack+0x28/0x38 [ 77.559882] dump_stack_lvl+0x54/0x6c [ 77.560315] print_address_description+0x7c/0x1ec [ 77.560867] print_report+0x50/0x68 [ 77.561328] kasan_report+0xac/0x100 [ 77.561783] kasan_check_range+0x260/0x2a0 [ 77.562288] __kasan_check_write+0x2c/0x3c [ 77.562730] kasan_bitops_generic+0x5f4/0xb8c [ 77.563226] kunit_try_run_case+0x80/0x184 [ 77.563693] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.564303] kthread+0x16c/0x21c [ 77.564713] ret_from_fork+0x10/0x20 [ 77.565166] [ 77.565354] Allocated by task 165: [ 77.565701] kasan_set_track+0x4c/0x80 [ 77.566164] kasan_save_alloc_info+0x28/0x34 [ 77.566647] __kasan_kmalloc+0x88/0xa0 [ 77.567153] kmalloc_trace+0x54/0x68 [ 77.567578] kasan_bitops_generic+0x4c/0xb8c [ 77.568060] kunit_try_run_case+0x80/0x184 [ 77.568568] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.569143] kthread+0x16c/0x21c [ 77.569546] ret_from_fork+0x10/0x20 [ 77.569997] [ 77.570190] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.570190] which belongs to the cache kmalloc-128 of size 128 [ 77.571146] The buggy address is located 8 bytes inside of [ 77.571146] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.572032] [ 77.572265] The buggy address belongs to the physical page: [ 77.572727] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.573536] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.574229] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.574913] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.575543] page dumped because: kasan: bad access detected [ 77.576015] [ 77.576229] Memory state around the buggy address: [ 77.576640] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.577297] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.577915] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.578522] ^ [ 77.578899] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.579539] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.580091] ================================================================== [ 77.051122] ================================================================== [ 77.051648] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xf8/0xb8c [ 77.052343] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.053031] [ 77.053273] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.054021] Hardware name: linux,dummy-virt (DT) [ 77.054472] Call trace: [ 77.054751] dump_backtrace+0xf8/0x118 [ 77.055713] show_stack+0x18/0x24 [ 77.056159] __dump_stack+0x28/0x38 [ 77.056743] dump_stack_lvl+0x54/0x6c [ 77.057199] print_address_description+0x7c/0x1ec [ 77.057791] print_report+0x50/0x68 [ 77.058261] kasan_report+0xac/0x100 [ 77.058705] __asan_load8+0xa8/0xac [ 77.059144] kasan_bitops_generic+0xf8/0xb8c [ 77.059609] kunit_try_run_case+0x80/0x184 [ 77.060089] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.060837] kthread+0x16c/0x21c [ 77.061265] ret_from_fork+0x10/0x20 [ 77.061712] [ 77.061911] Allocated by task 165: [ 77.062288] kasan_set_track+0x4c/0x80 [ 77.062754] kasan_save_alloc_info+0x28/0x34 [ 77.063257] __kasan_kmalloc+0x88/0xa0 [ 77.063787] kmalloc_trace+0x54/0x68 [ 77.064210] kasan_bitops_generic+0x4c/0xb8c [ 77.064872] kunit_try_run_case+0x80/0x184 [ 77.065357] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.065949] kthread+0x16c/0x21c [ 77.066363] ret_from_fork+0x10/0x20 [ 77.066804] [ 77.067001] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.067001] which belongs to the cache kmalloc-128 of size 128 [ 77.067945] The buggy address is located 8 bytes inside of [ 77.067945] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.069039] [ 77.069271] The buggy address belongs to the physical page: [ 77.069733] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.070524] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.071210] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.071910] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.072516] page dumped because: kasan: bad access detected [ 77.073000] [ 77.073207] Memory state around the buggy address: [ 77.073655] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.074273] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.075401] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.076020] ^ [ 77.076398] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.077160] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.077768] ================================================================== [ 77.299899] ================================================================== [ 77.300401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x350/0xb8c [ 77.300999] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.301503] [ 77.301697] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.303215] Hardware name: linux,dummy-virt (DT) [ 77.303622] Call trace: [ 77.303896] dump_backtrace+0xf8/0x118 [ 77.304374] show_stack+0x18/0x24 [ 77.304971] __dump_stack+0x28/0x38 [ 77.305397] dump_stack_lvl+0x54/0x6c [ 77.305855] print_address_description+0x7c/0x1ec [ 77.306376] print_report+0x50/0x68 [ 77.307140] kasan_report+0xac/0x100 [ 77.307636] kasan_check_range+0x260/0x2a0 [ 77.308126] __kasan_check_write+0x2c/0x3c [ 77.308589] kasan_bitops_generic+0x350/0xb8c [ 77.309249] kunit_try_run_case+0x80/0x184 [ 77.309767] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.310362] kthread+0x16c/0x21c [ 77.310814] ret_from_fork+0x10/0x20 [ 77.311260] [ 77.311447] Allocated by task 165: [ 77.311828] kasan_set_track+0x4c/0x80 [ 77.312294] kasan_save_alloc_info+0x28/0x34 [ 77.312980] __kasan_kmalloc+0x88/0xa0 [ 77.313493] kmalloc_trace+0x54/0x68 [ 77.313946] kasan_bitops_generic+0x4c/0xb8c [ 77.314427] kunit_try_run_case+0x80/0x184 [ 77.314911] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.315496] kthread+0x16c/0x21c [ 77.315936] ret_from_fork+0x10/0x20 [ 77.316378] [ 77.316577] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.316577] which belongs to the cache kmalloc-128 of size 128 [ 77.317614] The buggy address is located 8 bytes inside of [ 77.317614] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.318537] [ 77.318764] The buggy address belongs to the physical page: [ 77.319218] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.319993] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.321222] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.321892] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.322488] page dumped because: kasan: bad access detected [ 77.322973] [ 77.323166] Memory state around the buggy address: [ 77.323586] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.324249] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.325061] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.325674] ^ [ 77.326057] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.326690] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.327305] ================================================================== [ 77.447241] ================================================================== [ 77.447881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4a8/0xb8c [ 77.448571] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.449317] [ 77.449568] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.450305] Hardware name: linux,dummy-virt (DT) [ 77.450742] Call trace: [ 77.451315] dump_backtrace+0xf8/0x118 [ 77.451802] show_stack+0x18/0x24 [ 77.452230] __dump_stack+0x28/0x38 [ 77.452658] dump_stack_lvl+0x54/0x6c [ 77.453131] print_address_description+0x7c/0x1ec [ 77.453666] print_report+0x50/0x68 [ 77.454355] kasan_report+0xac/0x100 [ 77.454852] __asan_load8+0xa8/0xac [ 77.455249] kasan_bitops_generic+0x4a8/0xb8c [ 77.455741] kunit_try_run_case+0x80/0x184 [ 77.456259] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.456848] kthread+0x16c/0x21c [ 77.457300] ret_from_fork+0x10/0x20 [ 77.457717] [ 77.457921] Allocated by task 165: [ 77.458285] kasan_set_track+0x4c/0x80 [ 77.458767] kasan_save_alloc_info+0x28/0x34 [ 77.459226] __kasan_kmalloc+0x88/0xa0 [ 77.459734] kmalloc_trace+0x54/0x68 [ 77.460154] kasan_bitops_generic+0x4c/0xb8c [ 77.460646] kunit_try_run_case+0x80/0x184 [ 77.461118] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.461710] kthread+0x16c/0x21c [ 77.462133] ret_from_fork+0x10/0x20 [ 77.462585] [ 77.462810] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.462810] which belongs to the cache kmalloc-128 of size 128 [ 77.463748] The buggy address is located 8 bytes inside of [ 77.463748] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.464643] [ 77.464878] The buggy address belongs to the physical page: [ 77.465364] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.466188] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.466862] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.467518] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.468150] page dumped because: kasan: bad access detected [ 77.468666] [ 77.468889] Memory state around the buggy address: [ 77.469337] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.469983] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.470632] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.471235] ^ [ 77.471630] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.472284] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.472885] ================================================================== [ 77.502968] ================================================================== [ 77.503478] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x54c/0xb8c [ 77.504260] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.504870] [ 77.505135] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.505896] Hardware name: linux,dummy-virt (DT) [ 77.506336] Call trace: [ 77.506608] dump_backtrace+0xf8/0x118 [ 77.507105] show_stack+0x18/0x24 [ 77.507533] __dump_stack+0x28/0x38 [ 77.507954] dump_stack_lvl+0x54/0x6c [ 77.508416] print_address_description+0x7c/0x1ec [ 77.508962] print_report+0x50/0x68 [ 77.509441] kasan_report+0xac/0x100 [ 77.509903] __asan_load8+0xa8/0xac [ 77.510323] kasan_bitops_generic+0x54c/0xb8c [ 77.510812] kunit_try_run_case+0x80/0x184 [ 77.511324] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.511901] kthread+0x16c/0x21c [ 77.512321] ret_from_fork+0x10/0x20 [ 77.512785] [ 77.512992] Allocated by task 165: [ 77.513336] kasan_set_track+0x4c/0x80 [ 77.513810] kasan_save_alloc_info+0x28/0x34 [ 77.514293] __kasan_kmalloc+0x88/0xa0 [ 77.514791] kmalloc_trace+0x54/0x68 [ 77.515239] kasan_bitops_generic+0x4c/0xb8c [ 77.515706] kunit_try_run_case+0x80/0x184 [ 77.516190] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.516768] kthread+0x16c/0x21c [ 77.517215] ret_from_fork+0x10/0x20 [ 77.517659] [ 77.517877] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.517877] which belongs to the cache kmalloc-128 of size 128 [ 77.518811] The buggy address is located 8 bytes inside of [ 77.518811] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.519688] [ 77.519923] The buggy address belongs to the physical page: [ 77.520390] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.521217] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.521896] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.522553] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.523147] page dumped because: kasan: bad access detected [ 77.523625] [ 77.523857] Memory state around the buggy address: [ 77.524315] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.524942] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.525579] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.526178] ^ [ 77.526554] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.527206] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.527818] ================================================================== [ 77.022844] ================================================================== [ 77.023726] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xa8/0xb8c [ 77.024415] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.025160] [ 77.025657] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.026431] Hardware name: linux,dummy-virt (DT) [ 77.026850] Call trace: [ 77.027114] dump_backtrace+0xf8/0x118 [ 77.027651] show_stack+0x18/0x24 [ 77.028125] __dump_stack+0x28/0x38 [ 77.028601] dump_stack_lvl+0x54/0x6c [ 77.029074] print_address_description+0x7c/0x1ec [ 77.029642] print_report+0x50/0x68 [ 77.030141] kasan_report+0xac/0x100 [ 77.030584] kasan_check_range+0x260/0x2a0 [ 77.031068] __kasan_check_write+0x2c/0x3c [ 77.031542] kasan_bitops_generic+0xa8/0xb8c [ 77.032025] kunit_try_run_case+0x80/0x184 [ 77.032497] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.033071] kthread+0x16c/0x21c [ 77.033483] ret_from_fork+0x10/0x20 [ 77.033938] [ 77.034121] Allocated by task 165: [ 77.034467] kasan_set_track+0x4c/0x80 [ 77.035154] kasan_save_alloc_info+0x28/0x34 [ 77.035629] __kasan_kmalloc+0x88/0xa0 [ 77.036096] kmalloc_trace+0x54/0x68 [ 77.036519] kasan_bitops_generic+0x4c/0xb8c [ 77.037145] kunit_try_run_case+0x80/0x184 [ 77.037613] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.038193] kthread+0x16c/0x21c [ 77.038599] ret_from_fork+0x10/0x20 [ 77.039051] [ 77.039243] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.039243] which belongs to the cache kmalloc-128 of size 128 [ 77.040214] The buggy address is located 8 bytes inside of [ 77.040214] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.041690] [ 77.041934] The buggy address belongs to the physical page: [ 77.042387] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.043173] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.043846] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.044508] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.045265] page dumped because: kasan: bad access detected [ 77.045738] [ 77.045950] Memory state around the buggy address: [ 77.046420] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.047061] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.047682] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.048338] ^ [ 77.048888] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.049497] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.050103] ================================================================== [ 77.078629] ================================================================== [ 77.079206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x14c/0xb8c [ 77.079947] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.080559] [ 77.081080] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.081812] Hardware name: linux,dummy-virt (DT) [ 77.082244] Call trace: [ 77.082515] dump_backtrace+0xf8/0x118 [ 77.082987] show_stack+0x18/0x24 [ 77.083408] __dump_stack+0x28/0x38 [ 77.083845] dump_stack_lvl+0x54/0x6c [ 77.084272] print_address_description+0x7c/0x1ec [ 77.084971] print_report+0x50/0x68 [ 77.085418] kasan_report+0xac/0x100 [ 77.085875] kasan_check_range+0x260/0x2a0 [ 77.086351] __kasan_check_write+0x2c/0x3c [ 77.086807] kasan_bitops_generic+0x14c/0xb8c [ 77.087278] kunit_try_run_case+0x80/0x184 [ 77.087729] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.088316] kthread+0x16c/0x21c [ 77.088827] ret_from_fork+0x10/0x20 [ 77.089277] [ 77.089472] Allocated by task 165: [ 77.089848] kasan_set_track+0x4c/0x80 [ 77.090335] kasan_save_alloc_info+0x28/0x34 [ 77.090944] __kasan_kmalloc+0x88/0xa0 [ 77.091411] kmalloc_trace+0x54/0x68 [ 77.091834] kasan_bitops_generic+0x4c/0xb8c [ 77.092317] kunit_try_run_case+0x80/0x184 [ 77.092944] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.093518] kthread+0x16c/0x21c [ 77.093941] ret_from_fork+0x10/0x20 [ 77.094384] [ 77.094572] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.094572] which belongs to the cache kmalloc-128 of size 128 [ 77.095493] The buggy address is located 8 bytes inside of [ 77.095493] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.096403] [ 77.096624] The buggy address belongs to the physical page: [ 77.097088] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.097867] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.098554] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.099425] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.100043] page dumped because: kasan: bad access detected [ 77.100529] [ 77.101252] Memory state around the buggy address: [ 77.101695] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.102367] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.102987] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.103561] ^ [ 77.103931] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.104563] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.105286] ================================================================== [ 77.473981] ================================================================== [ 77.474512] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4fc/0xb8c [ 77.475252] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.475868] [ 77.476100] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.476964] Hardware name: linux,dummy-virt (DT) [ 77.477410] Call trace: [ 77.477670] dump_backtrace+0xf8/0x118 [ 77.478134] show_stack+0x18/0x24 [ 77.478572] __dump_stack+0x28/0x38 [ 77.479038] dump_stack_lvl+0x54/0x6c [ 77.479514] print_address_description+0x7c/0x1ec [ 77.480065] print_report+0x50/0x68 [ 77.480522] kasan_report+0xac/0x100 [ 77.481018] kasan_check_range+0x260/0x2a0 [ 77.481495] __kasan_check_write+0x2c/0x3c [ 77.481942] kasan_bitops_generic+0x4fc/0xb8c [ 77.482448] kunit_try_run_case+0x80/0x184 [ 77.482947] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.483507] kthread+0x16c/0x21c [ 77.483937] ret_from_fork+0x10/0x20 [ 77.484354] [ 77.484554] Allocated by task 165: [ 77.484942] kasan_set_track+0x4c/0x80 [ 77.485432] kasan_save_alloc_info+0x28/0x34 [ 77.485902] __kasan_kmalloc+0x88/0xa0 [ 77.486356] kmalloc_trace+0x54/0x68 [ 77.486818] kasan_bitops_generic+0x4c/0xb8c [ 77.487288] kunit_try_run_case+0x80/0x184 [ 77.487740] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.488321] kthread+0x16c/0x21c [ 77.488737] ret_from_fork+0x10/0x20 [ 77.489173] [ 77.489393] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.489393] which belongs to the cache kmalloc-128 of size 128 [ 77.490314] The buggy address is located 8 bytes inside of [ 77.490314] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.491219] [ 77.491414] The buggy address belongs to the physical page: [ 77.491884] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.492659] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.493349] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.494006] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.494603] page dumped because: kasan: bad access detected [ 77.495084] [ 77.495278] Memory state around the buggy address: [ 77.495699] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.496343] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.497030] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.497600] ^ [ 77.497967] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.498587] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.499194] ================================================================== [ 77.216777] ================================================================== [ 77.217329] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x260/0xb8c [ 77.218332] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.218998] [ 77.219243] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.219990] Hardware name: linux,dummy-virt (DT) [ 77.220431] Call trace: [ 77.220876] dump_backtrace+0xf8/0x118 [ 77.221344] show_stack+0x18/0x24 [ 77.221783] __dump_stack+0x28/0x38 [ 77.222203] dump_stack_lvl+0x54/0x6c [ 77.222633] print_address_description+0x7c/0x1ec [ 77.223173] print_report+0x50/0x68 [ 77.223609] kasan_report+0xac/0x100 [ 77.224070] kasan_check_range+0x260/0x2a0 [ 77.224603] __kasan_check_write+0x2c/0x3c [ 77.225213] kasan_bitops_generic+0x260/0xb8c [ 77.225726] kunit_try_run_case+0x80/0x184 [ 77.226195] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.226789] kthread+0x16c/0x21c [ 77.227237] ret_from_fork+0x10/0x20 [ 77.227645] [ 77.227848] Allocated by task 165: [ 77.228217] kasan_set_track+0x4c/0x80 [ 77.228906] kasan_save_alloc_info+0x28/0x34 [ 77.229366] __kasan_kmalloc+0x88/0xa0 [ 77.229886] kmalloc_trace+0x54/0x68 [ 77.230292] kasan_bitops_generic+0x4c/0xb8c [ 77.230797] kunit_try_run_case+0x80/0x184 [ 77.231262] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.231874] kthread+0x16c/0x21c [ 77.232289] ret_from_fork+0x10/0x20 [ 77.232860] [ 77.233088] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.233088] which belongs to the cache kmalloc-128 of size 128 [ 77.234051] The buggy address is located 8 bytes inside of [ 77.234051] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.234975] [ 77.235215] The buggy address belongs to the physical page: [ 77.235678] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.236451] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.237657] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.238324] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.238920] page dumped because: kasan: bad access detected [ 77.239396] [ 77.239597] Memory state around the buggy address: [ 77.240022] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.240798] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.241397] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.241987] ^ [ 77.242364] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.243008] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.243603] ================================================================== [ 77.244485] ================================================================== [ 77.245384] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2ac/0xb8c [ 77.246116] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.246743] [ 77.246962] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.247724] Hardware name: linux,dummy-virt (DT) [ 77.248149] Call trace: [ 77.248428] dump_backtrace+0xf8/0x118 [ 77.249050] show_stack+0x18/0x24 [ 77.249502] __dump_stack+0x28/0x38 [ 77.249929] dump_stack_lvl+0x54/0x6c [ 77.250389] print_address_description+0x7c/0x1ec [ 77.250939] print_report+0x50/0x68 [ 77.251400] kasan_report+0xac/0x100 [ 77.251851] kasan_check_range+0x260/0x2a0 [ 77.252342] __kasan_check_write+0x2c/0x3c [ 77.253039] kasan_bitops_generic+0x2ac/0xb8c [ 77.253573] kunit_try_run_case+0x80/0x184 [ 77.254050] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.254638] kthread+0x16c/0x21c [ 77.255052] ret_from_fork+0x10/0x20 [ 77.255490] [ 77.255679] Allocated by task 165: [ 77.256052] kasan_set_track+0x4c/0x80 [ 77.256568] kasan_save_alloc_info+0x28/0x34 [ 77.257094] __kasan_kmalloc+0x88/0xa0 [ 77.257544] kmalloc_trace+0x54/0x68 [ 77.258006] kasan_bitops_generic+0x4c/0xb8c [ 77.258466] kunit_try_run_case+0x80/0x184 [ 77.258940] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.259501] kthread+0x16c/0x21c [ 77.259949] ret_from_fork+0x10/0x20 [ 77.260358] [ 77.260575] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.260575] which belongs to the cache kmalloc-128 of size 128 [ 77.261665] The buggy address is located 8 bytes inside of [ 77.261665] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.262542] [ 77.262765] The buggy address belongs to the physical page: [ 77.263196] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.264044] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.264882] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.265557] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.266200] page dumped because: kasan: bad access detected [ 77.266678] [ 77.266874] Memory state around the buggy address: [ 77.267340] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.267988] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.268630] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.269239] ^ [ 77.269605] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.270227] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.271352] ================================================================== [ 77.387870] ================================================================== [ 77.388406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3fc/0xb8c [ 77.389226] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.389839] [ 77.390078] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.390951] Hardware name: linux,dummy-virt (DT) [ 77.391365] Call trace: [ 77.391649] dump_backtrace+0xf8/0x118 [ 77.392141] show_stack+0x18/0x24 [ 77.392567] __dump_stack+0x28/0x38 [ 77.393131] dump_stack_lvl+0x54/0x6c [ 77.393542] print_address_description+0x7c/0x1ec [ 77.394091] print_report+0x50/0x68 [ 77.394568] kasan_report+0xac/0x100 [ 77.395010] __asan_load8+0xa8/0xac [ 77.395431] kasan_bitops_generic+0x3fc/0xb8c [ 77.395928] kunit_try_run_case+0x80/0x184 [ 77.396388] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.397107] kthread+0x16c/0x21c [ 77.397549] ret_from_fork+0x10/0x20 [ 77.397978] [ 77.398184] Allocated by task 165: [ 77.398521] kasan_set_track+0x4c/0x80 [ 77.398969] kasan_save_alloc_info+0x28/0x34 [ 77.399426] __kasan_kmalloc+0x88/0xa0 [ 77.399894] kmalloc_trace+0x54/0x68 [ 77.400338] kasan_bitops_generic+0x4c/0xb8c [ 77.401035] kunit_try_run_case+0x80/0x184 [ 77.401501] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.402089] kthread+0x16c/0x21c [ 77.402557] ret_from_fork+0x10/0x20 [ 77.403135] [ 77.403411] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.403411] which belongs to the cache kmalloc-128 of size 128 [ 77.404261] The buggy address is located 8 bytes inside of [ 77.404261] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.405617] [ 77.405910] The buggy address belongs to the physical page: [ 77.406577] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.407694] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.408634] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.410022] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.410813] page dumped because: kasan: bad access detected [ 77.411183] [ 77.411366] Memory state around the buggy address: [ 77.411715] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.412321] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.413160] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.413921] ^ [ 77.414279] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.414924] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.415507] ================================================================== [ 77.189507] ================================================================== [ 77.190106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x24c/0xb8c [ 77.190879] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.191499] [ 77.191720] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.192460] Hardware name: linux,dummy-virt (DT) [ 77.193197] Call trace: [ 77.193474] dump_backtrace+0xf8/0x118 [ 77.193962] show_stack+0x18/0x24 [ 77.194392] __dump_stack+0x28/0x38 [ 77.194812] dump_stack_lvl+0x54/0x6c [ 77.195231] print_address_description+0x7c/0x1ec [ 77.195772] print_report+0x50/0x68 [ 77.196216] kasan_report+0xac/0x100 [ 77.196832] __asan_load8+0xa8/0xac [ 77.197237] kasan_bitops_generic+0x24c/0xb8c [ 77.197707] kunit_try_run_case+0x80/0x184 [ 77.198176] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.198742] kthread+0x16c/0x21c [ 77.199229] ret_from_fork+0x10/0x20 [ 77.199673] [ 77.199897] Allocated by task 165: [ 77.200246] kasan_set_track+0x4c/0x80 [ 77.200949] kasan_save_alloc_info+0x28/0x34 [ 77.201451] __kasan_kmalloc+0x88/0xa0 [ 77.201908] kmalloc_trace+0x54/0x68 [ 77.202321] kasan_bitops_generic+0x4c/0xb8c [ 77.202813] kunit_try_run_case+0x80/0x184 [ 77.203290] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.203884] kthread+0x16c/0x21c [ 77.204294] ret_from_fork+0x10/0x20 [ 77.204875] [ 77.205073] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.205073] which belongs to the cache kmalloc-128 of size 128 [ 77.206023] The buggy address is located 8 bytes inside of [ 77.206023] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.206922] [ 77.207154] The buggy address belongs to the physical page: [ 77.207614] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.208414] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.209376] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.210063] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.210686] page dumped because: kasan: bad access detected [ 77.211163] [ 77.211358] Memory state around the buggy address: [ 77.211828] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.212477] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.213774] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.214352] ^ [ 77.214728] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.215376] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.216007] ================================================================== [ 77.416309] ================================================================== [ 77.417005] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x458/0xb8c [ 77.417713] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.418321] [ 77.418558] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.419467] Hardware name: linux,dummy-virt (DT) [ 77.419895] Call trace: [ 77.420159] dump_backtrace+0xf8/0x118 [ 77.420831] show_stack+0x18/0x24 [ 77.421302] __dump_stack+0x28/0x38 [ 77.421739] dump_stack_lvl+0x54/0x6c [ 77.422180] print_address_description+0x7c/0x1ec [ 77.422714] print_report+0x50/0x68 [ 77.423156] kasan_report+0xac/0x100 [ 77.423627] kasan_check_range+0x260/0x2a0 [ 77.424107] __kasan_check_write+0x2c/0x3c [ 77.424554] kasan_bitops_generic+0x458/0xb8c [ 77.425074] kunit_try_run_case+0x80/0x184 [ 77.425527] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.426150] kthread+0x16c/0x21c [ 77.426565] ret_from_fork+0x10/0x20 [ 77.427022] [ 77.427215] Allocated by task 165: [ 77.427549] kasan_set_track+0x4c/0x80 [ 77.428152] kasan_save_alloc_info+0x28/0x34 [ 77.428645] __kasan_kmalloc+0x88/0xa0 [ 77.429290] kmalloc_trace+0x54/0x68 [ 77.429726] kasan_bitops_generic+0x4c/0xb8c [ 77.430220] kunit_try_run_case+0x80/0x184 [ 77.430671] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.431258] kthread+0x16c/0x21c [ 77.431664] ret_from_fork+0x10/0x20 [ 77.432108] [ 77.432316] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.432316] which belongs to the cache kmalloc-128 of size 128 [ 77.433413] The buggy address is located 8 bytes inside of [ 77.433413] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.434335] [ 77.434560] The buggy address belongs to the physical page: [ 77.435042] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.435804] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.436481] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.437196] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.437822] page dumped because: kasan: bad access detected [ 77.438291] [ 77.438486] Memory state around the buggy address: [ 77.439445] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.440092] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.440775] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.441479] ^ [ 77.441868] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.442494] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.443136] ================================================================== [ 77.161489] ================================================================== [ 77.162034] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x244/0xb8c [ 77.163119] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.163784] [ 77.163999] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.165137] Hardware name: linux,dummy-virt (DT) [ 77.165544] Call trace: [ 77.165812] dump_backtrace+0xf8/0x118 [ 77.166346] show_stack+0x18/0x24 [ 77.166791] __dump_stack+0x28/0x38 [ 77.167202] dump_stack_lvl+0x54/0x6c [ 77.167622] print_address_description+0x7c/0x1ec [ 77.168166] print_report+0x50/0x68 [ 77.168781] kasan_report+0xac/0x100 [ 77.169239] kasan_check_range+0x260/0x2a0 [ 77.169739] __kasan_check_write+0x2c/0x3c [ 77.170185] kasan_bitops_generic+0x244/0xb8c [ 77.170666] kunit_try_run_case+0x80/0x184 [ 77.171149] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.171718] kthread+0x16c/0x21c [ 77.172132] ret_from_fork+0x10/0x20 [ 77.172566] [ 77.172792] Allocated by task 165: [ 77.173140] kasan_set_track+0x4c/0x80 [ 77.173629] kasan_save_alloc_info+0x28/0x34 [ 77.174168] __kasan_kmalloc+0x88/0xa0 [ 77.174610] kmalloc_trace+0x54/0x68 [ 77.175225] kasan_bitops_generic+0x4c/0xb8c [ 77.175691] kunit_try_run_case+0x80/0x184 [ 77.176170] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.176934] kthread+0x16c/0x21c [ 77.177354] ret_from_fork+0x10/0x20 [ 77.177809] [ 77.178034] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.178034] which belongs to the cache kmalloc-128 of size 128 [ 77.179004] The buggy address is located 8 bytes inside of [ 77.179004] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.179877] [ 77.180111] The buggy address belongs to the physical page: [ 77.180569] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.181367] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.182062] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.182738] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.183497] page dumped because: kasan: bad access detected [ 77.183989] [ 77.184180] Memory state around the buggy address: [ 77.184615] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.185737] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.186377] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.186980] ^ [ 77.187353] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.187980] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.188691] ================================================================== [ 77.106406] ================================================================== [ 77.107224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19c/0xb8c [ 77.107916] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.108499] [ 77.108959] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.109741] Hardware name: linux,dummy-virt (DT) [ 77.110166] Call trace: [ 77.110438] dump_backtrace+0xf8/0x118 [ 77.110917] show_stack+0x18/0x24 [ 77.111342] __dump_stack+0x28/0x38 [ 77.111801] dump_stack_lvl+0x54/0x6c [ 77.112220] print_address_description+0x7c/0x1ec [ 77.112942] print_report+0x50/0x68 [ 77.113437] kasan_report+0xac/0x100 [ 77.113933] __asan_load8+0xa8/0xac [ 77.114358] kasan_bitops_generic+0x19c/0xb8c [ 77.114836] kunit_try_run_case+0x80/0x184 [ 77.115306] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.115881] kthread+0x16c/0x21c [ 77.116307] ret_from_fork+0x10/0x20 [ 77.116931] [ 77.117138] Allocated by task 165: [ 77.117463] kasan_set_track+0x4c/0x80 [ 77.117930] kasan_save_alloc_info+0x28/0x34 [ 77.118374] __kasan_kmalloc+0x88/0xa0 [ 77.118887] kmalloc_trace+0x54/0x68 [ 77.119304] kasan_bitops_generic+0x4c/0xb8c [ 77.119767] kunit_try_run_case+0x80/0x184 [ 77.120238] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.120952] kthread+0x16c/0x21c [ 77.121374] ret_from_fork+0x10/0x20 [ 77.121824] [ 77.122060] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.122060] which belongs to the cache kmalloc-128 of size 128 [ 77.122988] The buggy address is located 8 bytes inside of [ 77.122988] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.123915] [ 77.124135] The buggy address belongs to the physical page: [ 77.124597] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.125376] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.126054] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.126725] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.127494] page dumped because: kasan: bad access detected [ 77.127989] [ 77.128203] Memory state around the buggy address: [ 77.128638] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.129785] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.130419] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.131034] ^ [ 77.131409] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.132034] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.132802] ================================================================== [ 77.272130] ================================================================== [ 77.272675] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2fc/0xb8c [ 77.273589] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.274213] [ 77.274438] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.275174] Hardware name: linux,dummy-virt (DT) [ 77.275608] Call trace: [ 77.275898] dump_backtrace+0xf8/0x118 [ 77.276394] show_stack+0x18/0x24 [ 77.276980] __dump_stack+0x28/0x38 [ 77.277407] dump_stack_lvl+0x54/0x6c [ 77.277841] print_address_description+0x7c/0x1ec [ 77.278375] print_report+0x50/0x68 [ 77.278818] kasan_report+0xac/0x100 [ 77.279256] __asan_load8+0xa8/0xac [ 77.279676] kasan_bitops_generic+0x2fc/0xb8c [ 77.280159] kunit_try_run_case+0x80/0x184 [ 77.280779] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.281381] kthread+0x16c/0x21c [ 77.281795] ret_from_fork+0x10/0x20 [ 77.282234] [ 77.282430] Allocated by task 165: [ 77.282796] kasan_set_track+0x4c/0x80 [ 77.283286] kasan_save_alloc_info+0x28/0x34 [ 77.283731] __kasan_kmalloc+0x88/0xa0 [ 77.284229] kmalloc_trace+0x54/0x68 [ 77.284825] kasan_bitops_generic+0x4c/0xb8c [ 77.285302] kunit_try_run_case+0x80/0x184 [ 77.285773] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.286343] kthread+0x16c/0x21c [ 77.286753] ret_from_fork+0x10/0x20 [ 77.287203] [ 77.287407] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.287407] which belongs to the cache kmalloc-128 of size 128 [ 77.288379] The buggy address is located 8 bytes inside of [ 77.288379] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.289952] [ 77.290191] The buggy address belongs to the physical page: [ 77.290630] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.291460] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.292127] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.293050] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.293644] page dumped because: kasan: bad access detected [ 77.294097] [ 77.294291] Memory state around the buggy address: [ 77.294717] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.295368] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.296003] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.296601] ^ [ 77.296955] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.297588] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.298203] ==================================================================
[ 76.226381] ================================================================== [ 76.226950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x14c/0xb68 [ 76.227648] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.229982] [ 76.230215] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.231035] Hardware name: linux,dummy-virt (DT) [ 76.231500] Call trace: [ 76.231966] dump_backtrace+0xf4/0x114 [ 76.233723] show_stack+0x18/0x24 [ 76.234159] __dump_stack+0x28/0x38 [ 76.234640] dump_stack_lvl+0x50/0x68 [ 76.235132] print_address_description+0x7c/0x1ec [ 76.236033] print_report+0x50/0x68 [ 76.236662] kasan_report+0xac/0xfc [ 76.237836] kasan_check_range+0x258/0x290 [ 76.239275] __kasan_check_write+0x2c/0x3c [ 76.240297] kasan_bitops_generic+0x14c/0xb68 [ 76.241015] kunit_try_run_case+0x80/0x184 [ 76.241685] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.242514] kthread+0x16c/0x21c [ 76.243120] ret_from_fork+0x10/0x20 [ 76.243715] [ 76.244304] Allocated by task 165: [ 76.244830] kasan_set_track+0x4c/0x80 [ 76.245435] kasan_save_alloc_info+0x28/0x34 [ 76.245973] __kasan_kmalloc+0x88/0xa0 [ 76.246606] kmalloc_trace+0x54/0x68 [ 76.247209] kasan_bitops_generic+0x4c/0xb68 [ 76.248377] kunit_try_run_case+0x80/0x184 [ 76.249068] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.249731] kthread+0x16c/0x21c [ 76.250128] ret_from_fork+0x10/0x20 [ 76.250500] [ 76.250684] The buggy address belongs to the object at ffff0000c58a7700 [ 76.250684] which belongs to the cache kmalloc-128 of size 128 [ 76.251431] The buggy address is located 8 bytes inside of [ 76.251431] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.253102] [ 76.253404] The buggy address belongs to the physical page: [ 76.254087] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.255220] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.256661] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.257665] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.258590] page dumped because: kasan: bad access detected [ 76.259277] [ 76.259547] Memory state around the buggy address: [ 76.260479] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.261403] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.262294] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.263157] ^ [ 76.264144] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.265072] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.265942] ================================================================== [ 76.599169] ================================================================== [ 76.599811] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x458/0xb68 [ 76.600523] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.601092] [ 76.601345] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.602084] Hardware name: linux,dummy-virt (DT) [ 76.602527] Call trace: [ 76.602815] dump_backtrace+0xf4/0x114 [ 76.603319] show_stack+0x18/0x24 [ 76.603784] __dump_stack+0x28/0x38 [ 76.604189] dump_stack_lvl+0x50/0x68 [ 76.604639] print_address_description+0x7c/0x1ec [ 76.605204] print_report+0x50/0x68 [ 76.605647] kasan_report+0xac/0xfc [ 76.606093] kasan_check_range+0x258/0x290 [ 76.606575] __kasan_check_write+0x2c/0x3c [ 76.607022] kasan_bitops_generic+0x458/0xb68 [ 76.607509] kunit_try_run_case+0x80/0x184 [ 76.607984] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.608570] kthread+0x16c/0x21c [ 76.608986] ret_from_fork+0x10/0x20 [ 76.609445] [ 76.609639] Allocated by task 165: [ 76.609990] kasan_set_track+0x4c/0x80 [ 76.610475] kasan_save_alloc_info+0x28/0x34 [ 76.610962] __kasan_kmalloc+0x88/0xa0 [ 76.611410] kmalloc_trace+0x54/0x68 [ 76.611832] kasan_bitops_generic+0x4c/0xb68 [ 76.612315] kunit_try_run_case+0x80/0x184 [ 76.612783] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.613394] kthread+0x16c/0x21c [ 76.613854] ret_from_fork+0x10/0x20 [ 76.614251] [ 76.614467] The buggy address belongs to the object at ffff0000c58a7700 [ 76.614467] which belongs to the cache kmalloc-128 of size 128 [ 76.615423] The buggy address is located 8 bytes inside of [ 76.615423] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.616342] [ 76.616570] The buggy address belongs to the physical page: [ 76.617066] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.617835] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.618525] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.619243] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.619848] page dumped because: kasan: bad access detected [ 76.620324] [ 76.620520] Memory state around the buggy address: [ 76.620954] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.621582] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.622217] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.623021] ^ [ 76.623437] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.624101] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.624745] ================================================================== [ 76.300665] ================================================================== [ 76.301584] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xb68 [ 76.302625] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.303624] [ 76.304011] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.305372] Hardware name: linux,dummy-virt (DT) [ 76.306122] Call trace: [ 76.306551] dump_backtrace+0xf4/0x114 [ 76.307138] show_stack+0x18/0x24 [ 76.307534] __dump_stack+0x28/0x38 [ 76.308238] dump_stack_lvl+0x50/0x68 [ 76.308914] print_address_description+0x7c/0x1ec [ 76.309720] print_report+0x50/0x68 [ 76.310387] kasan_report+0xac/0xfc [ 76.311029] kasan_check_range+0x258/0x290 [ 76.311808] __kasan_check_write+0x2c/0x3c [ 76.312551] kasan_bitops_generic+0x1f0/0xb68 [ 76.313272] kunit_try_run_case+0x80/0x184 [ 76.313962] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.314499] kthread+0x16c/0x21c [ 76.314895] ret_from_fork+0x10/0x20 [ 76.315276] [ 76.315457] Allocated by task 165: [ 76.315784] kasan_set_track+0x4c/0x80 [ 76.316216] kasan_save_alloc_info+0x28/0x34 [ 76.316991] __kasan_kmalloc+0x88/0xa0 [ 76.317670] kmalloc_trace+0x54/0x68 [ 76.318275] kasan_bitops_generic+0x4c/0xb68 [ 76.318950] kunit_try_run_case+0x80/0x184 [ 76.319609] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.320571] kthread+0x16c/0x21c [ 76.321163] ret_from_fork+0x10/0x20 [ 76.321763] [ 76.322042] The buggy address belongs to the object at ffff0000c58a7700 [ 76.322042] which belongs to the cache kmalloc-128 of size 128 [ 76.323151] The buggy address is located 8 bytes inside of [ 76.323151] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.324522] [ 76.324978] The buggy address belongs to the physical page: [ 76.325594] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.326237] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.326826] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.327810] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.328939] page dumped because: kasan: bad access detected [ 76.329789] [ 76.330079] Memory state around the buggy address: [ 76.330857] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.331769] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.332824] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.333684] ^ [ 76.334208] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.335103] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.335772] ================================================================== [ 76.198020] ================================================================== [ 76.198547] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xf8/0xb68 [ 76.199288] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.200354] [ 76.200589] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.201357] Hardware name: linux,dummy-virt (DT) [ 76.201793] Call trace: [ 76.202054] dump_backtrace+0xf4/0x114 [ 76.202509] show_stack+0x18/0x24 [ 76.202938] __dump_stack+0x28/0x38 [ 76.203377] dump_stack_lvl+0x50/0x68 [ 76.204095] print_address_description+0x7c/0x1ec [ 76.204633] print_report+0x50/0x68 [ 76.205085] kasan_report+0xac/0xfc [ 76.205559] __asan_load8+0xa8/0xac [ 76.205993] kasan_bitops_generic+0xf8/0xb68 [ 76.206503] kunit_try_run_case+0x80/0x184 [ 76.207023] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.207598] kthread+0x16c/0x21c [ 76.208074] ret_from_fork+0x10/0x20 [ 76.208513] [ 76.208727] Allocated by task 165: [ 76.209081] kasan_set_track+0x4c/0x80 [ 76.209593] kasan_save_alloc_info+0x28/0x34 [ 76.210532] __kasan_kmalloc+0x88/0xa0 [ 76.211009] kmalloc_trace+0x54/0x68 [ 76.211463] kasan_bitops_generic+0x4c/0xb68 [ 76.212199] kunit_try_run_case+0x80/0x184 [ 76.212685] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.213264] kthread+0x16c/0x21c [ 76.213687] ret_from_fork+0x10/0x20 [ 76.214155] [ 76.214347] The buggy address belongs to the object at ffff0000c58a7700 [ 76.214347] which belongs to the cache kmalloc-128 of size 128 [ 76.215329] The buggy address is located 8 bytes inside of [ 76.215329] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.216734] [ 76.216971] The buggy address belongs to the physical page: [ 76.217461] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.218259] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.218939] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.219601] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.220235] page dumped because: kasan: bad access detected [ 76.220706] [ 76.221175] Memory state around the buggy address: [ 76.221629] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.222260] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.222871] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.223474] ^ [ 76.224359] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.224980] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.225595] ================================================================== [ 76.168971] ================================================================== [ 76.169844] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xa8/0xb68 [ 76.170520] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.171157] [ 76.171364] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.172253] Hardware name: linux,dummy-virt (DT) [ 76.172751] Call trace: [ 76.173057] dump_backtrace+0xf4/0x114 [ 76.173634] show_stack+0x18/0x24 [ 76.174129] __dump_stack+0x28/0x38 [ 76.174569] dump_stack_lvl+0x50/0x68 [ 76.175030] print_address_description+0x7c/0x1ec [ 76.175590] print_report+0x50/0x68 [ 76.176083] kasan_report+0xac/0xfc [ 76.176804] kasan_check_range+0x258/0x290 [ 76.177335] __kasan_check_write+0x2c/0x3c [ 76.177831] kasan_bitops_generic+0xa8/0xb68 [ 76.178341] kunit_try_run_case+0x80/0x184 [ 76.178829] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.179396] kthread+0x16c/0x21c [ 76.179821] ret_from_fork+0x10/0x20 [ 76.180272] [ 76.180520] Allocated by task 165: [ 76.180909] kasan_set_track+0x4c/0x80 [ 76.181372] kasan_save_alloc_info+0x28/0x34 [ 76.181903] __kasan_kmalloc+0x88/0xa0 [ 76.182362] kmalloc_trace+0x54/0x68 [ 76.182778] kasan_bitops_generic+0x4c/0xb68 [ 76.183291] kunit_try_run_case+0x80/0x184 [ 76.184255] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.184868] kthread+0x16c/0x21c [ 76.185292] ret_from_fork+0x10/0x20 [ 76.185757] [ 76.185950] The buggy address belongs to the object at ffff0000c58a7700 [ 76.185950] which belongs to the cache kmalloc-128 of size 128 [ 76.186924] The buggy address is located 8 bytes inside of [ 76.186924] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.187887] [ 76.188081] The buggy address belongs to the physical page: [ 76.188558] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.189359] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.190351] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.191040] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.191675] page dumped because: kasan: bad access detected [ 76.192619] [ 76.192860] Memory state around the buggy address: [ 76.193277] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.193964] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.194589] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.195196] ^ [ 76.195554] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.196430] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.197033] ================================================================== [ 76.518665] ================================================================== [ 76.519235] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3a0/0xb68 [ 76.520542] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.521184] [ 76.521409] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.522183] Hardware name: linux,dummy-virt (DT) [ 76.522611] Call trace: [ 76.522891] dump_backtrace+0xf4/0x114 [ 76.523388] show_stack+0x18/0x24 [ 76.523848] __dump_stack+0x28/0x38 [ 76.524297] dump_stack_lvl+0x50/0x68 [ 76.524721] print_address_description+0x7c/0x1ec [ 76.525314] print_report+0x50/0x68 [ 76.525773] kasan_report+0xac/0xfc [ 76.526228] __asan_load8+0xa8/0xac [ 76.526640] kasan_bitops_generic+0x3a0/0xb68 [ 76.527158] kunit_try_run_case+0x80/0x184 [ 76.527677] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.528271] kthread+0x16c/0x21c [ 76.528683] ret_from_fork+0x10/0x20 [ 76.529141] [ 76.529346] Allocated by task 165: [ 76.529677] kasan_set_track+0x4c/0x80 [ 76.530709] kasan_save_alloc_info+0x28/0x34 [ 76.531181] __kasan_kmalloc+0x88/0xa0 [ 76.531628] kmalloc_trace+0x54/0x68 [ 76.532070] kasan_bitops_generic+0x4c/0xb68 [ 76.532584] kunit_try_run_case+0x80/0x184 [ 76.533051] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.533624] kthread+0x16c/0x21c [ 76.534063] ret_from_fork+0x10/0x20 [ 76.534508] [ 76.534713] The buggy address belongs to the object at ffff0000c58a7700 [ 76.534713] which belongs to the cache kmalloc-128 of size 128 [ 76.535644] The buggy address is located 8 bytes inside of [ 76.535644] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.537121] [ 76.537382] The buggy address belongs to the physical page: [ 76.537896] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.538712] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.539413] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.540137] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.540763] page dumped because: kasan: bad access detected [ 76.541251] [ 76.541441] Memory state around the buggy address: [ 76.541883] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.542533] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.543159] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.544325] ^ [ 76.544713] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.545342] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.545949] ================================================================== [ 76.737504] ================================================================== [ 76.738068] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x5f4/0xb68 [ 76.738761] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.739388] [ 76.739632] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.740472] Hardware name: linux,dummy-virt (DT) [ 76.740930] Call trace: [ 76.741200] dump_backtrace+0xf4/0x114 [ 76.741690] show_stack+0x18/0x24 [ 76.742155] __dump_stack+0x28/0x38 [ 76.742609] dump_stack_lvl+0x50/0x68 [ 76.743079] print_address_description+0x7c/0x1ec [ 76.743625] print_report+0x50/0x68 [ 76.744083] kasan_report+0xac/0xfc [ 76.744526] kasan_check_range+0x258/0x290 [ 76.745026] __kasan_check_write+0x2c/0x3c [ 76.745486] kasan_bitops_generic+0x5f4/0xb68 [ 76.746019] kunit_try_run_case+0x80/0x184 [ 76.746498] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.747086] kthread+0x16c/0x21c [ 76.747507] ret_from_fork+0x10/0x20 [ 76.747961] [ 76.748163] Allocated by task 165: [ 76.749979] kasan_set_track+0x4c/0x80 [ 76.750445] kasan_save_alloc_info+0x28/0x34 [ 76.751021] __kasan_kmalloc+0x88/0xa0 [ 76.751575] kmalloc_trace+0x54/0x68 [ 76.752535] kasan_bitops_generic+0x4c/0xb68 [ 76.753428] kunit_try_run_case+0x80/0x184 [ 76.754142] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.755113] kthread+0x16c/0x21c [ 76.755853] ret_from_fork+0x10/0x20 [ 76.756612] [ 76.757055] The buggy address belongs to the object at ffff0000c58a7700 [ 76.757055] which belongs to the cache kmalloc-128 of size 128 [ 76.758620] The buggy address is located 8 bytes inside of [ 76.758620] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.760370] [ 76.760764] The buggy address belongs to the physical page: [ 76.761347] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.762449] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.763556] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.764704] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.765659] page dumped because: kasan: bad access detected [ 76.766556] [ 76.766958] Memory state around the buggy address: [ 76.767609] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.768679] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.769757] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.770388] ^ [ 76.770723] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.771248] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.771717] ================================================================== [ 76.625792] ================================================================== [ 76.626370] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4a8/0xb68 [ 76.627081] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.627674] [ 76.627887] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.628664] Hardware name: linux,dummy-virt (DT) [ 76.629133] Call trace: [ 76.629424] dump_backtrace+0xf4/0x114 [ 76.629929] show_stack+0x18/0x24 [ 76.630393] __dump_stack+0x28/0x38 [ 76.630832] dump_stack_lvl+0x50/0x68 [ 76.631264] print_address_description+0x7c/0x1ec [ 76.631853] print_report+0x50/0x68 [ 76.632295] kasan_report+0xac/0xfc [ 76.632752] __asan_load8+0xa8/0xac [ 76.633183] kasan_bitops_generic+0x4a8/0xb68 [ 76.633692] kunit_try_run_case+0x80/0x184 [ 76.634189] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.634766] kthread+0x16c/0x21c [ 76.635184] ret_from_fork+0x10/0x20 [ 76.635623] [ 76.635844] Allocated by task 165: [ 76.636212] kasan_set_track+0x4c/0x80 [ 76.636731] kasan_save_alloc_info+0x28/0x34 [ 76.637207] __kasan_kmalloc+0x88/0xa0 [ 76.637666] kmalloc_trace+0x54/0x68 [ 76.638098] kasan_bitops_generic+0x4c/0xb68 [ 76.638576] kunit_try_run_case+0x80/0x184 [ 76.639065] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.639644] kthread+0x16c/0x21c [ 76.640099] ret_from_fork+0x10/0x20 [ 76.640503] [ 76.640724] The buggy address belongs to the object at ffff0000c58a7700 [ 76.640724] which belongs to the cache kmalloc-128 of size 128 [ 76.641649] The buggy address is located 8 bytes inside of [ 76.641649] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.642559] [ 76.642774] The buggy address belongs to the physical page: [ 76.643254] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.644016] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.644720] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.645447] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.646058] page dumped because: kasan: bad access detected [ 76.646543] [ 76.646783] Memory state around the buggy address: [ 76.647234] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.647895] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.648531] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.649140] ^ [ 76.649548] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.650185] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.650805] ================================================================== [ 76.337148] ================================================================== [ 76.337633] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x244/0xb68 [ 76.338237] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.338774] [ 76.339066] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.340174] Hardware name: linux,dummy-virt (DT) [ 76.340858] Call trace: [ 76.341363] dump_backtrace+0xf4/0x114 [ 76.342029] show_stack+0x18/0x24 [ 76.342616] __dump_stack+0x28/0x38 [ 76.343211] dump_stack_lvl+0x50/0x68 [ 76.343821] print_address_description+0x7c/0x1ec [ 76.344585] print_report+0x50/0x68 [ 76.345207] kasan_report+0xac/0xfc [ 76.345830] kasan_check_range+0x258/0x290 [ 76.346509] __kasan_check_write+0x2c/0x3c [ 76.347151] kasan_bitops_generic+0x244/0xb68 [ 76.347842] kunit_try_run_case+0x80/0x184 [ 76.348508] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.349312] kthread+0x16c/0x21c [ 76.349901] ret_from_fork+0x10/0x20 [ 76.350475] [ 76.350758] Allocated by task 165: [ 76.351249] kasan_set_track+0x4c/0x80 [ 76.351888] kasan_save_alloc_info+0x28/0x34 [ 76.352544] __kasan_kmalloc+0x88/0xa0 [ 76.353182] kmalloc_trace+0x54/0x68 [ 76.353795] kasan_bitops_generic+0x4c/0xb68 [ 76.354463] kunit_try_run_case+0x80/0x184 [ 76.355129] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.355951] kthread+0x16c/0x21c [ 76.356525] ret_from_fork+0x10/0x20 [ 76.357038] [ 76.357223] The buggy address belongs to the object at ffff0000c58a7700 [ 76.357223] which belongs to the cache kmalloc-128 of size 128 [ 76.357982] The buggy address is located 8 bytes inside of [ 76.357982] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.358951] [ 76.359141] The buggy address belongs to the physical page: [ 76.359646] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.360435] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.361139] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.361800] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.362390] page dumped because: kasan: bad access detected [ 76.362863] [ 76.363052] Memory state around the buggy address: [ 76.363502] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.364161] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.364832] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.365428] ^ [ 76.365810] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.366449] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.367018] ================================================================== [ 76.368319] ================================================================== [ 76.368856] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x24c/0xb68 [ 76.369558] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.370157] [ 76.370374] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.371122] Hardware name: linux,dummy-virt (DT) [ 76.371589] Call trace: [ 76.371872] dump_backtrace+0xf4/0x114 [ 76.372383] show_stack+0x18/0x24 [ 76.372826] __dump_stack+0x28/0x38 [ 76.373236] dump_stack_lvl+0x50/0x68 [ 76.373692] print_address_description+0x7c/0x1ec [ 76.374232] print_report+0x50/0x68 [ 76.374705] kasan_report+0xac/0xfc [ 76.375195] __asan_load8+0xa8/0xac [ 76.375611] kasan_bitops_generic+0x24c/0xb68 [ 76.376164] kunit_try_run_case+0x80/0x184 [ 76.376614] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.377182] kthread+0x16c/0x21c [ 76.377599] ret_from_fork+0x10/0x20 [ 76.378050] [ 76.378247] Allocated by task 165: [ 76.378578] kasan_set_track+0x4c/0x80 [ 76.379113] kasan_save_alloc_info+0x28/0x34 [ 76.379573] __kasan_kmalloc+0x88/0xa0 [ 76.380023] kmalloc_trace+0x54/0x68 [ 76.380429] kasan_bitops_generic+0x4c/0xb68 [ 76.380942] kunit_try_run_case+0x80/0x184 [ 76.381422] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.382002] kthread+0x16c/0x21c [ 76.382422] ret_from_fork+0x10/0x20 [ 76.382859] [ 76.383057] The buggy address belongs to the object at ffff0000c58a7700 [ 76.383057] which belongs to the cache kmalloc-128 of size 128 [ 76.383990] The buggy address is located 8 bytes inside of [ 76.383990] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.384899] [ 76.385115] The buggy address belongs to the physical page: [ 76.385565] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.386372] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.387081] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.387730] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.388328] page dumped because: kasan: bad access detected [ 76.388798] [ 76.389014] Memory state around the buggy address: [ 76.389432] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.390082] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.390712] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.391306] ^ [ 76.391687] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.392335] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.392937] ================================================================== [ 76.711007] ================================================================== [ 76.711548] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x59c/0xb68 [ 76.712435] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.713069] [ 76.713313] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.714064] Hardware name: linux,dummy-virt (DT) [ 76.714514] Call trace: [ 76.714805] dump_backtrace+0xf4/0x114 [ 76.715312] show_stack+0x18/0x24 [ 76.715824] __dump_stack+0x28/0x38 [ 76.716250] dump_stack_lvl+0x50/0x68 [ 76.716680] print_address_description+0x7c/0x1ec [ 76.717241] print_report+0x50/0x68 [ 76.717697] kasan_report+0xac/0xfc [ 76.718167] __asan_load8+0xa8/0xac [ 76.718590] kasan_bitops_generic+0x59c/0xb68 [ 76.719075] kunit_try_run_case+0x80/0x184 [ 76.719593] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.720182] kthread+0x16c/0x21c [ 76.720627] ret_from_fork+0x10/0x20 [ 76.721122] [ 76.721314] Allocated by task 165: [ 76.721688] kasan_set_track+0x4c/0x80 [ 76.722158] kasan_save_alloc_info+0x28/0x34 [ 76.722638] __kasan_kmalloc+0x88/0xa0 [ 76.723105] kmalloc_trace+0x54/0x68 [ 76.723536] kasan_bitops_generic+0x4c/0xb68 [ 76.724073] kunit_try_run_case+0x80/0x184 [ 76.724617] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.725204] kthread+0x16c/0x21c [ 76.725664] ret_from_fork+0x10/0x20 [ 76.726092] [ 76.726314] The buggy address belongs to the object at ffff0000c58a7700 [ 76.726314] which belongs to the cache kmalloc-128 of size 128 [ 76.727237] The buggy address is located 8 bytes inside of [ 76.727237] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.728151] [ 76.728382] The buggy address belongs to the physical page: [ 76.728866] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.729661] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.730330] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.731017] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.731638] page dumped because: kasan: bad access detected [ 76.732136] [ 76.732344] Memory state around the buggy address: [ 76.732791] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.733426] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.734069] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.734671] ^ [ 76.735047] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.735691] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.736320] ================================================================== [ 76.449509] ================================================================== [ 76.450141] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2fc/0xb68 [ 76.450916] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.451505] [ 76.452456] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.453140] Hardware name: linux,dummy-virt (DT) [ 76.453507] Call trace: [ 76.453760] dump_backtrace+0xf4/0x114 [ 76.454381] show_stack+0x18/0x24 [ 76.454900] __dump_stack+0x28/0x38 [ 76.455349] dump_stack_lvl+0x50/0x68 [ 76.455847] print_address_description+0x7c/0x1ec [ 76.456485] print_report+0x50/0x68 [ 76.456984] kasan_report+0xac/0xfc [ 76.457536] __asan_load8+0xa8/0xac [ 76.457997] kasan_bitops_generic+0x2fc/0xb68 [ 76.458513] kunit_try_run_case+0x80/0x184 [ 76.459073] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.459654] kthread+0x16c/0x21c [ 76.460099] ret_from_fork+0x10/0x20 [ 76.460525] [ 76.460756] Allocated by task 165: [ 76.461132] kasan_set_track+0x4c/0x80 [ 76.461615] kasan_save_alloc_info+0x28/0x34 [ 76.462127] __kasan_kmalloc+0x88/0xa0 [ 76.462596] kmalloc_trace+0x54/0x68 [ 76.463045] kasan_bitops_generic+0x4c/0xb68 [ 76.463507] kunit_try_run_case+0x80/0x184 [ 76.464547] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.465191] kthread+0x16c/0x21c [ 76.465602] ret_from_fork+0x10/0x20 [ 76.466079] [ 76.466273] The buggy address belongs to the object at ffff0000c58a7700 [ 76.466273] which belongs to the cache kmalloc-128 of size 128 [ 76.467222] The buggy address is located 8 bytes inside of [ 76.467222] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.468128] [ 76.468359] The buggy address belongs to the physical page: [ 76.468875] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.469673] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.470371] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.471013] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.471505] page dumped because: kasan: bad access detected [ 76.472840] [ 76.473125] Memory state around the buggy address: [ 76.473772] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.474667] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.475568] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.476478] ^ [ 76.476998] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.477914] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.478778] ================================================================== [ 76.267061] ================================================================== [ 76.268249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19c/0xb68 [ 76.268945] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.269855] [ 76.270122] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.270716] Hardware name: linux,dummy-virt (DT) [ 76.271137] Call trace: [ 76.271416] dump_backtrace+0xf4/0x114 [ 76.272109] show_stack+0x18/0x24 [ 76.272530] __dump_stack+0x28/0x38 [ 76.273055] dump_stack_lvl+0x50/0x68 [ 76.273548] print_address_description+0x7c/0x1ec [ 76.274120] print_report+0x50/0x68 [ 76.274569] kasan_report+0xac/0xfc [ 76.275054] __asan_load8+0xa8/0xac [ 76.275415] kasan_bitops_generic+0x19c/0xb68 [ 76.276125] kunit_try_run_case+0x80/0x184 [ 76.276817] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.277438] kthread+0x16c/0x21c [ 76.277844] ret_from_fork+0x10/0x20 [ 76.278224] [ 76.278407] Allocated by task 165: [ 76.278699] kasan_set_track+0x4c/0x80 [ 76.279348] kasan_save_alloc_info+0x28/0x34 [ 76.280081] __kasan_kmalloc+0x88/0xa0 [ 76.280872] kmalloc_trace+0x54/0x68 [ 76.281499] kasan_bitops_generic+0x4c/0xb68 [ 76.282180] kunit_try_run_case+0x80/0x184 [ 76.282852] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.283678] kthread+0x16c/0x21c [ 76.284431] ret_from_fork+0x10/0x20 [ 76.285056] [ 76.285343] The buggy address belongs to the object at ffff0000c58a7700 [ 76.285343] which belongs to the cache kmalloc-128 of size 128 [ 76.286770] The buggy address is located 8 bytes inside of [ 76.286770] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.288207] [ 76.288542] The buggy address belongs to the physical page: [ 76.289296] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.290458] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.291442] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.292514] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.293370] page dumped because: kasan: bad access detected [ 76.293762] [ 76.293946] Memory state around the buggy address: [ 76.294302] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.294801] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.295687] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.296987] ^ [ 76.297638] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.298566] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.299455] ================================================================== [ 76.678180] ================================================================== [ 76.678775] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x54c/0xb68 [ 76.679439] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.680143] [ 76.680451] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.681549] Hardware name: linux,dummy-virt (DT) [ 76.682180] Call trace: [ 76.682566] dump_backtrace+0xf4/0x114 [ 76.683227] show_stack+0x18/0x24 [ 76.683839] __dump_stack+0x28/0x38 [ 76.684427] dump_stack_lvl+0x50/0x68 [ 76.685092] print_address_description+0x7c/0x1ec [ 76.685872] print_report+0x50/0x68 [ 76.686494] kasan_report+0xac/0xfc [ 76.687125] __asan_load8+0xa8/0xac [ 76.687687] kasan_bitops_generic+0x54c/0xb68 [ 76.688378] kunit_try_run_case+0x80/0x184 [ 76.689060] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.689893] kthread+0x16c/0x21c [ 76.690474] ret_from_fork+0x10/0x20 [ 76.690978] [ 76.691170] Allocated by task 165: [ 76.691475] kasan_set_track+0x4c/0x80 [ 76.691918] kasan_save_alloc_info+0x28/0x34 [ 76.692331] __kasan_kmalloc+0x88/0xa0 [ 76.692779] kmalloc_trace+0x54/0x68 [ 76.693376] kasan_bitops_generic+0x4c/0xb68 [ 76.694075] kunit_try_run_case+0x80/0x184 [ 76.694736] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.695557] kthread+0x16c/0x21c [ 76.696188] ret_from_fork+0x10/0x20 [ 76.696787] [ 76.697066] The buggy address belongs to the object at ffff0000c58a7700 [ 76.697066] which belongs to the cache kmalloc-128 of size 128 [ 76.698484] The buggy address is located 8 bytes inside of [ 76.698484] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.699840] [ 76.700125] The buggy address belongs to the physical page: [ 76.700807] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.701949] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.702916] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.703906] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.704840] page dumped because: kasan: bad access detected [ 76.705537] [ 76.705833] Memory state around the buggy address: [ 76.706473] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.707385] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.708099] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.708574] ^ [ 76.708918] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.709541] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.710162] ================================================================== [ 76.421500] ================================================================== [ 76.422039] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2ac/0xb68 [ 76.422833] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.423484] [ 76.423688] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.425005] Hardware name: linux,dummy-virt (DT) [ 76.425454] Call trace: [ 76.425770] dump_backtrace+0xf4/0x114 [ 76.426233] show_stack+0x18/0x24 [ 76.426670] __dump_stack+0x28/0x38 [ 76.427123] dump_stack_lvl+0x50/0x68 [ 76.427543] print_address_description+0x7c/0x1ec [ 76.428083] print_report+0x50/0x68 [ 76.428545] kasan_report+0xac/0xfc [ 76.428991] kasan_check_range+0x258/0x290 [ 76.429483] __kasan_check_write+0x2c/0x3c [ 76.429969] kasan_bitops_generic+0x2ac/0xb68 [ 76.430442] kunit_try_run_case+0x80/0x184 [ 76.430911] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.431484] kthread+0x16c/0x21c [ 76.432456] ret_from_fork+0x10/0x20 [ 76.432906] [ 76.433096] Allocated by task 165: [ 76.433465] kasan_set_track+0x4c/0x80 [ 76.433968] kasan_save_alloc_info+0x28/0x34 [ 76.434430] __kasan_kmalloc+0x88/0xa0 [ 76.434894] kmalloc_trace+0x54/0x68 [ 76.435307] kasan_bitops_generic+0x4c/0xb68 [ 76.435779] kunit_try_run_case+0x80/0x184 [ 76.436270] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.436849] kthread+0x16c/0x21c [ 76.437258] ret_from_fork+0x10/0x20 [ 76.437658] [ 76.437878] The buggy address belongs to the object at ffff0000c58a7700 [ 76.437878] which belongs to the cache kmalloc-128 of size 128 [ 76.438831] The buggy address is located 8 bytes inside of [ 76.438831] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.440298] [ 76.440507] The buggy address belongs to the physical page: [ 76.440969] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.441829] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.442520] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.443185] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.443951] page dumped because: kasan: bad access detected [ 76.444440] [ 76.444630] Memory state around the buggy address: [ 76.445088] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.445728] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.446359] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.446974] ^ [ 76.447334] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.448100] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.448707] ================================================================== [ 76.573513] ================================================================== [ 76.574098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3fc/0xb68 [ 76.574789] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.575398] [ 76.575626] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.576569] Hardware name: linux,dummy-virt (DT) [ 76.576987] Call trace: [ 76.577249] dump_backtrace+0xf4/0x114 [ 76.577751] show_stack+0x18/0x24 [ 76.578192] __dump_stack+0x28/0x38 [ 76.578594] dump_stack_lvl+0x50/0x68 [ 76.579051] print_address_description+0x7c/0x1ec [ 76.579578] print_report+0x50/0x68 [ 76.580051] kasan_report+0xac/0xfc [ 76.580494] __asan_load8+0xa8/0xac [ 76.580918] kasan_bitops_generic+0x3fc/0xb68 [ 76.581439] kunit_try_run_case+0x80/0x184 [ 76.581908] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.582496] kthread+0x16c/0x21c [ 76.582908] ret_from_fork+0x10/0x20 [ 76.583319] [ 76.583519] Allocated by task 165: [ 76.583880] kasan_set_track+0x4c/0x80 [ 76.584362] kasan_save_alloc_info+0x28/0x34 [ 76.584839] __kasan_kmalloc+0x88/0xa0 [ 76.585352] kmalloc_trace+0x54/0x68 [ 76.585774] kasan_bitops_generic+0x4c/0xb68 [ 76.586261] kunit_try_run_case+0x80/0x184 [ 76.586720] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.587317] kthread+0x16c/0x21c [ 76.587753] ret_from_fork+0x10/0x20 [ 76.588193] [ 76.588381] The buggy address belongs to the object at ffff0000c58a7700 [ 76.588381] which belongs to the cache kmalloc-128 of size 128 [ 76.589203] The buggy address is located 8 bytes inside of [ 76.589203] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.590143] [ 76.590371] The buggy address belongs to the physical page: [ 76.590827] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.591616] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.592318] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.592985] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.593620] page dumped because: kasan: bad access detected [ 76.594104] [ 76.594304] Memory state around the buggy address: [ 76.594765] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.595359] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.595986] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.596548] ^ [ 76.596938] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.597577] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.598206] ================================================================== [ 76.546834] ================================================================== [ 76.547396] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3f4/0xb68 [ 76.548461] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.549109] [ 76.549380] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.550126] Hardware name: linux,dummy-virt (DT) [ 76.550549] Call trace: [ 76.550806] dump_backtrace+0xf4/0x114 [ 76.551318] show_stack+0x18/0x24 [ 76.551807] __dump_stack+0x28/0x38 [ 76.552304] dump_stack_lvl+0x50/0x68 [ 76.552730] print_address_description+0x7c/0x1ec [ 76.553263] print_report+0x50/0x68 [ 76.553707] kasan_report+0xac/0xfc [ 76.554183] kasan_check_range+0x258/0x290 [ 76.554673] __kasan_check_write+0x2c/0x3c [ 76.555129] kasan_bitops_generic+0x3f4/0xb68 [ 76.555604] kunit_try_run_case+0x80/0x184 [ 76.556086] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.556673] kthread+0x16c/0x21c [ 76.557127] ret_from_fork+0x10/0x20 [ 76.557540] [ 76.557755] Allocated by task 165: [ 76.558095] kasan_set_track+0x4c/0x80 [ 76.558576] kasan_save_alloc_info+0x28/0x34 [ 76.559036] __kasan_kmalloc+0x88/0xa0 [ 76.559490] kmalloc_trace+0x54/0x68 [ 76.559936] kasan_bitops_generic+0x4c/0xb68 [ 76.560446] kunit_try_run_case+0x80/0x184 [ 76.560952] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.561535] kthread+0x16c/0x21c [ 76.561981] ret_from_fork+0x10/0x20 [ 76.562391] [ 76.562588] The buggy address belongs to the object at ffff0000c58a7700 [ 76.562588] which belongs to the cache kmalloc-128 of size 128 [ 76.563561] The buggy address is located 8 bytes inside of [ 76.563561] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.564477] [ 76.564715] The buggy address belongs to the physical page: [ 76.565195] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.565965] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.566657] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.567321] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.567957] page dumped because: kasan: bad access detected [ 76.568432] [ 76.568620] Memory state around the buggy address: [ 76.569091] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.569728] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.570335] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.570923] ^ [ 76.571297] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.571932] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.572539] ================================================================== [ 76.479537] ================================================================== [ 76.481011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x350/0xb68 [ 76.482014] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.482938] [ 76.483233] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.484300] Hardware name: linux,dummy-virt (DT) [ 76.484847] Call trace: [ 76.485092] dump_backtrace+0xf4/0x114 [ 76.485535] show_stack+0x18/0x24 [ 76.485952] __dump_stack+0x28/0x38 [ 76.486413] dump_stack_lvl+0x50/0x68 [ 76.486926] print_address_description+0x7c/0x1ec [ 76.487490] print_report+0x50/0x68 [ 76.487992] kasan_report+0xac/0xfc [ 76.489001] kasan_check_range+0x258/0x290 [ 76.489478] __kasan_check_write+0x2c/0x3c [ 76.491158] kasan_bitops_generic+0x350/0xb68 [ 76.491606] kunit_try_run_case+0x80/0x184 [ 76.492057] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.492558] kthread+0x16c/0x21c [ 76.494044] ret_from_fork+0x10/0x20 [ 76.494656] [ 76.495022] Allocated by task 165: [ 76.496454] kasan_set_track+0x4c/0x80 [ 76.497311] kasan_save_alloc_info+0x28/0x34 [ 76.498263] __kasan_kmalloc+0x88/0xa0 [ 76.499091] kmalloc_trace+0x54/0x68 [ 76.499854] kasan_bitops_generic+0x4c/0xb68 [ 76.500687] kunit_try_run_case+0x80/0x184 [ 76.501520] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.502501] kthread+0x16c/0x21c [ 76.503147] ret_from_fork+0x10/0x20 [ 76.503835] [ 76.504178] The buggy address belongs to the object at ffff0000c58a7700 [ 76.504178] which belongs to the cache kmalloc-128 of size 128 [ 76.505962] The buggy address is located 8 bytes inside of [ 76.505962] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.506871] [ 76.507066] The buggy address belongs to the physical page: [ 76.507439] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.508446] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.509418] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.510424] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.511341] page dumped because: kasan: bad access detected [ 76.512102] [ 76.512968] Memory state around the buggy address: [ 76.513624] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.514561] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.515455] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.516328] ^ [ 76.516808] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.517303] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.517806] ================================================================== [ 76.651644] ================================================================== [ 76.652253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4fc/0xb68 [ 76.652983] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.653590] [ 76.653831] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.654577] Hardware name: linux,dummy-virt (DT) [ 76.655050] Call trace: [ 76.655335] dump_backtrace+0xf4/0x114 [ 76.655820] show_stack+0x18/0x24 [ 76.656267] __dump_stack+0x28/0x38 [ 76.656717] dump_stack_lvl+0x50/0x68 [ 76.657199] print_address_description+0x7c/0x1ec [ 76.657746] print_report+0x50/0x68 [ 76.658205] kasan_report+0xac/0xfc [ 76.658662] kasan_check_range+0x258/0x290 [ 76.659159] __kasan_check_write+0x2c/0x3c [ 76.659648] kasan_bitops_generic+0x4fc/0xb68 [ 76.660176] kunit_try_run_case+0x80/0x184 [ 76.660664] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.661253] kthread+0x16c/0x21c [ 76.661679] ret_from_fork+0x10/0x20 [ 76.662142] [ 76.662350] Allocated by task 165: [ 76.662706] kasan_set_track+0x4c/0x80 [ 76.663174] kasan_save_alloc_info+0x28/0x34 [ 76.663619] __kasan_kmalloc+0x88/0xa0 [ 76.664129] kmalloc_trace+0x54/0x68 [ 76.664546] kasan_bitops_generic+0x4c/0xb68 [ 76.665022] kunit_try_run_case+0x80/0x184 [ 76.665489] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.666072] kthread+0x16c/0x21c [ 76.666480] ret_from_fork+0x10/0x20 [ 76.666903] [ 76.667125] The buggy address belongs to the object at ffff0000c58a7700 [ 76.667125] which belongs to the cache kmalloc-128 of size 128 [ 76.668052] The buggy address is located 8 bytes inside of [ 76.668052] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.668926] [ 76.669151] The buggy address belongs to the physical page: [ 76.669623] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.670413] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.671127] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.671849] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.672442] page dumped because: kasan: bad access detected [ 76.672936] [ 76.673136] Memory state around the buggy address: [ 76.673591] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.674243] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.674850] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.675438] ^ [ 76.675814] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.676422] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.677036] ================================================================== [ 76.393959] ================================================================== [ 76.394613] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x260/0xb68 [ 76.395385] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.396174] [ 76.396433] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.397195] Hardware name: linux,dummy-virt (DT) [ 76.397551] Call trace: [ 76.397888] dump_backtrace+0xf4/0x114 [ 76.398449] show_stack+0x18/0x24 [ 76.398899] __dump_stack+0x28/0x38 [ 76.399313] dump_stack_lvl+0x50/0x68 [ 76.399812] print_address_description+0x7c/0x1ec [ 76.400349] print_report+0x50/0x68 [ 76.400890] kasan_report+0xac/0xfc [ 76.401417] kasan_check_range+0x258/0x290 [ 76.401950] __kasan_check_write+0x2c/0x3c [ 76.402399] kasan_bitops_generic+0x260/0xb68 [ 76.402932] kunit_try_run_case+0x80/0x184 [ 76.403409] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.404017] kthread+0x16c/0x21c [ 76.404423] ret_from_fork+0x10/0x20 [ 76.404863] [ 76.405052] Allocated by task 165: [ 76.405414] kasan_set_track+0x4c/0x80 [ 76.405948] kasan_save_alloc_info+0x28/0x34 [ 76.406399] __kasan_kmalloc+0x88/0xa0 [ 76.406906] kmalloc_trace+0x54/0x68 [ 76.407331] kasan_bitops_generic+0x4c/0xb68 [ 76.407889] kunit_try_run_case+0x80/0x184 [ 76.408395] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.408977] kthread+0x16c/0x21c [ 76.409460] ret_from_fork+0x10/0x20 [ 76.409960] [ 76.410194] The buggy address belongs to the object at ffff0000c58a7700 [ 76.410194] which belongs to the cache kmalloc-128 of size 128 [ 76.411123] The buggy address is located 8 bytes inside of [ 76.411123] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.412033] [ 76.412252] The buggy address belongs to the physical page: [ 76.412706] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.413502] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.414186] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.414869] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.415484] page dumped because: kasan: bad access detected [ 76.415970] [ 76.416170] Memory state around the buggy address: [ 76.416748] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.417341] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.417981] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.418580] ^ [ 76.419281] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.419939] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.420546] ==================================================================