Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 107.496387] ================================================================== [ 107.497905] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x180/0x68c [ 107.498521] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.499028] [ 107.499225] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.499837] Hardware name: linux,dummy-virt (DT) [ 107.500390] Call trace: [ 107.500773] dump_backtrace+0xe0/0x134 [ 107.501422] show_stack+0x20/0x2c [ 107.501890] dump_stack_lvl+0x88/0xb4 [ 107.502397] print_report+0x158/0x44c [ 107.502863] kasan_report+0xc8/0x180 [ 107.503310] kasan_check_range+0xe4/0x190 [ 107.503801] __kasan_check_write+0x28/0x3c [ 107.504307] kasan_bitops_modify.constprop.0+0x180/0x68c [ 107.504945] kasan_bitops_generic+0xb4/0x140 [ 107.505495] kunit_try_run_case+0x8c/0x124 [ 107.506012] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.506587] kthread+0x15c/0x170 [ 107.507004] ret_from_fork+0x10/0x20 [ 107.507456] [ 107.507672] Allocated by task 249: [ 107.508093] kasan_save_stack+0x3c/0x70 [ 107.508622] kasan_set_track+0x2c/0x40 [ 107.509061] kasan_save_alloc_info+0x24/0x34 [ 107.509554] __kasan_kmalloc+0xd4/0xe0 [ 107.510020] kmalloc_trace+0x8c/0x150 [ 107.510448] kasan_bitops_generic+0x98/0x140 [ 107.510922] kunit_try_run_case+0x8c/0x124 [ 107.511400] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.511985] kthread+0x15c/0x170 [ 107.512400] ret_from_fork+0x10/0x20 [ 107.512873] [ 107.513109] The buggy address belongs to the object at ffff0000c66ab600 [ 107.513109] which belongs to the cache kmalloc-128 of size 128 [ 107.514049] The buggy address is located 8 bytes inside of [ 107.514049] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.514979] [ 107.515231] The buggy address belongs to the physical page: [ 107.515741] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.516506] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.517190] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.517835] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.518453] page dumped because: kasan: bad access detected [ 107.518906] [ 107.519125] Memory state around the buggy address: [ 107.519603] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.520241] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.520894] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.521516] ^ [ 107.521903] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.522538] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.523149] ================================================================== [ 107.413780] ================================================================== [ 107.414335] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xf8/0x68c [ 107.414969] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.415695] [ 107.415911] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.416590] Hardware name: linux,dummy-virt (DT) [ 107.417039] Call trace: [ 107.417342] dump_backtrace+0xe0/0x134 [ 107.417810] show_stack+0x20/0x2c [ 107.418213] dump_stack_lvl+0x88/0xb4 [ 107.418766] print_report+0x158/0x44c [ 107.419218] kasan_report+0xc8/0x180 [ 107.419721] kasan_check_range+0xe4/0x190 [ 107.420414] __kasan_check_write+0x28/0x3c [ 107.421157] kasan_bitops_modify.constprop.0+0xf8/0x68c [ 107.421788] kasan_bitops_generic+0xb4/0x140 [ 107.422315] kunit_try_run_case+0x8c/0x124 [ 107.422879] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.423535] kthread+0x15c/0x170 [ 107.423946] ret_from_fork+0x10/0x20 [ 107.424376] [ 107.424632] Allocated by task 249: [ 107.424967] kasan_save_stack+0x3c/0x70 [ 107.425452] kasan_set_track+0x2c/0x40 [ 107.425913] kasan_save_alloc_info+0x24/0x34 [ 107.426398] __kasan_kmalloc+0xd4/0xe0 [ 107.426812] kmalloc_trace+0x8c/0x150 [ 107.427305] kasan_bitops_generic+0x98/0x140 [ 107.427808] kunit_try_run_case+0x8c/0x124 [ 107.428274] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.428889] kthread+0x15c/0x170 [ 107.429313] ret_from_fork+0x10/0x20 [ 107.429754] [ 107.429981] The buggy address belongs to the object at ffff0000c66ab600 [ 107.429981] which belongs to the cache kmalloc-128 of size 128 [ 107.430934] The buggy address is located 8 bytes inside of [ 107.430934] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.431814] [ 107.432041] The buggy address belongs to the physical page: [ 107.432518] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.433434] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.434093] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.434828] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.435459] page dumped because: kasan: bad access detected [ 107.435900] [ 107.436114] Memory state around the buggy address: [ 107.436640] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.437292] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.437949] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.438552] ^ [ 107.438934] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.439535] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.440143] ================================================================== [ 107.346887] ================================================================== [ 107.348208] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4/0x68c [ 107.349339] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.350297] [ 107.350606] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.351649] Hardware name: linux,dummy-virt (DT) [ 107.352276] Call trace: [ 107.352559] dump_backtrace+0xe0/0x134 [ 107.352944] show_stack+0x20/0x2c [ 107.353283] dump_stack_lvl+0x88/0xb4 [ 107.353952] print_report+0x158/0x44c [ 107.354534] kasan_report+0xc8/0x180 [ 107.355142] kasan_check_range+0xe4/0x190 [ 107.355799] __kasan_check_write+0x28/0x3c [ 107.356469] kasan_bitops_modify.constprop.0+0xa4/0x68c [ 107.357237] kasan_bitops_generic+0xb4/0x140 [ 107.357903] kunit_try_run_case+0x8c/0x124 [ 107.358560] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.359373] kthread+0x15c/0x170 [ 107.359959] ret_from_fork+0x10/0x20 [ 107.360616] [ 107.360945] Allocated by task 249: [ 107.361518] kasan_save_stack+0x3c/0x70 [ 107.362154] kasan_set_track+0x2c/0x40 [ 107.362841] kasan_save_alloc_info+0x24/0x34 [ 107.363434] __kasan_kmalloc+0xd4/0xe0 [ 107.363866] kmalloc_trace+0x8c/0x150 [ 107.364462] kasan_bitops_generic+0x98/0x140 [ 107.365113] kunit_try_run_case+0x8c/0x124 [ 107.365774] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.366572] kthread+0x15c/0x170 [ 107.367137] ret_from_fork+0x10/0x20 [ 107.367724] [ 107.368034] The buggy address belongs to the object at ffff0000c66ab600 [ 107.368034] which belongs to the cache kmalloc-128 of size 128 [ 107.369449] The buggy address is located 8 bytes inside of [ 107.369449] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.370467] [ 107.370754] The buggy address belongs to the physical page: [ 107.371516] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.372636] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.373347] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.373992] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.374916] page dumped because: kasan: bad access detected [ 107.375610] [ 107.375909] Memory state around the buggy address: [ 107.376563] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.377579] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.378561] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.379396] ^ [ 107.379707] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.380208] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.380673] ================================================================== [ 107.554862] ================================================================== [ 107.555427] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x198/0x68c [ 107.556506] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.558024] [ 107.558250] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.558966] Hardware name: linux,dummy-virt (DT) [ 107.559419] Call trace: [ 107.559691] dump_backtrace+0xe0/0x134 [ 107.560152] show_stack+0x20/0x2c [ 107.560542] dump_stack_lvl+0x88/0xb4 [ 107.561033] print_report+0x158/0x44c [ 107.561442] kasan_report+0xc8/0x180 [ 107.561892] kasan_check_range+0xe4/0x190 [ 107.562422] __kasan_check_write+0x28/0x3c [ 107.562924] kasan_bitops_modify.constprop.0+0x198/0x68c [ 107.563455] kasan_bitops_generic+0xb4/0x140 [ 107.563948] kunit_try_run_case+0x8c/0x124 [ 107.564428] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.565094] kthread+0x15c/0x170 [ 107.565548] ret_from_fork+0x10/0x20 [ 107.566008] [ 107.566262] Allocated by task 249: [ 107.566617] kasan_save_stack+0x3c/0x70 [ 107.567105] kasan_set_track+0x2c/0x40 [ 107.567568] kasan_save_alloc_info+0x24/0x34 [ 107.568123] __kasan_kmalloc+0xd4/0xe0 [ 107.568594] kmalloc_trace+0x8c/0x150 [ 107.569039] kasan_bitops_generic+0x98/0x140 [ 107.569516] kunit_try_run_case+0x8c/0x124 [ 107.570001] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.570582] kthread+0x15c/0x170 [ 107.571007] ret_from_fork+0x10/0x20 [ 107.571371] [ 107.571550] The buggy address belongs to the object at ffff0000c66ab600 [ 107.571550] which belongs to the cache kmalloc-128 of size 128 [ 107.572279] The buggy address is located 8 bytes inside of [ 107.572279] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.573861] [ 107.574189] The buggy address belongs to the physical page: [ 107.574919] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.576144] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.577126] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.578096] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.579018] page dumped because: kasan: bad access detected [ 107.579735] [ 107.580034] Memory state around the buggy address: [ 107.580766] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.581768] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.582718] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.583595] ^ [ 107.584124] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.585040] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.585614] ================================================================== [ 107.586491] ================================================================== [ 107.587057] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1c4/0x68c [ 107.587802] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.588501] [ 107.588768] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.589536] Hardware name: linux,dummy-virt (DT) [ 107.590142] Call trace: [ 107.590405] dump_backtrace+0xe0/0x134 [ 107.590866] show_stack+0x20/0x2c [ 107.591324] dump_stack_lvl+0x88/0xb4 [ 107.591817] print_report+0x158/0x44c [ 107.592309] kasan_report+0xc8/0x180 [ 107.592828] kasan_check_range+0xe4/0x190 [ 107.593391] __kasan_check_write+0x28/0x3c [ 107.593954] kasan_bitops_modify.constprop.0+0x1c4/0x68c [ 107.594486] kasan_bitops_generic+0xb4/0x140 [ 107.595020] kunit_try_run_case+0x8c/0x124 [ 107.595559] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.596139] kthread+0x15c/0x170 [ 107.596645] ret_from_fork+0x10/0x20 [ 107.597188] [ 107.597420] Allocated by task 249: [ 107.597823] kasan_save_stack+0x3c/0x70 [ 107.598282] kasan_set_track+0x2c/0x40 [ 107.598825] kasan_save_alloc_info+0x24/0x34 [ 107.599358] __kasan_kmalloc+0xd4/0xe0 [ 107.599800] kmalloc_trace+0x8c/0x150 [ 107.600391] kasan_bitops_generic+0x98/0x140 [ 107.600914] kunit_try_run_case+0x8c/0x124 [ 107.601396] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.601980] kthread+0x15c/0x170 [ 107.602377] ret_from_fork+0x10/0x20 [ 107.602831] [ 107.603060] The buggy address belongs to the object at ffff0000c66ab600 [ 107.603060] which belongs to the cache kmalloc-128 of size 128 [ 107.604055] The buggy address is located 8 bytes inside of [ 107.604055] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.605028] [ 107.605286] The buggy address belongs to the physical page: [ 107.605797] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.606562] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.607362] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.608082] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.608842] page dumped because: kasan: bad access detected [ 107.609397] [ 107.609658] Memory state around the buggy address: [ 107.610139] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.610792] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.611403] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.612023] ^ [ 107.612443] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.613221] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.613855] ================================================================== [ 107.441226] ================================================================== [ 107.441822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x124/0x68c [ 107.442604] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.443250] [ 107.443471] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.444124] Hardware name: linux,dummy-virt (DT) [ 107.444619] Call trace: [ 107.444910] dump_backtrace+0xe0/0x134 [ 107.445342] show_stack+0x20/0x2c [ 107.445753] dump_stack_lvl+0x88/0xb4 [ 107.446215] print_report+0x158/0x44c [ 107.446646] kasan_report+0xc8/0x180 [ 107.447073] __asan_load8+0x80/0xac [ 107.447530] kasan_bitops_modify.constprop.0+0x124/0x68c [ 107.448055] kasan_bitops_generic+0xb4/0x140 [ 107.448511] kunit_try_run_case+0x8c/0x124 [ 107.449005] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.449674] kthread+0x15c/0x170 [ 107.450148] ret_from_fork+0x10/0x20 [ 107.450553] [ 107.450809] Allocated by task 249: [ 107.451146] kasan_save_stack+0x3c/0x70 [ 107.451589] kasan_set_track+0x2c/0x40 [ 107.452068] kasan_save_alloc_info+0x24/0x34 [ 107.452586] __kasan_kmalloc+0xd4/0xe0 [ 107.453172] kmalloc_trace+0x8c/0x150 [ 107.453638] kasan_bitops_generic+0x98/0x140 [ 107.454178] kunit_try_run_case+0x8c/0x124 [ 107.454643] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.455207] kthread+0x15c/0x170 [ 107.455635] ret_from_fork+0x10/0x20 [ 107.456066] [ 107.456287] The buggy address belongs to the object at ffff0000c66ab600 [ 107.456287] which belongs to the cache kmalloc-128 of size 128 [ 107.457342] The buggy address is located 8 bytes inside of [ 107.457342] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.458285] [ 107.458518] The buggy address belongs to the physical page: [ 107.458939] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.459678] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.460419] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.461228] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.461891] page dumped because: kasan: bad access detected [ 107.462428] [ 107.462644] Memory state around the buggy address: [ 107.463127] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.463739] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.464352] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.465067] ^ [ 107.465416] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.466187] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.466701] ================================================================== [ 107.614791] ================================================================== [ 107.615407] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1f0/0x68c [ 107.616233] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.618162] [ 107.618381] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.618963] Hardware name: linux,dummy-virt (DT) [ 107.619304] Call trace: [ 107.619539] dump_backtrace+0xe0/0x134 [ 107.620443] show_stack+0x20/0x2c [ 107.620891] dump_stack_lvl+0x88/0xb4 [ 107.621630] print_report+0x158/0x44c [ 107.622130] kasan_report+0xc8/0x180 [ 107.622675] __asan_load8+0x80/0xac [ 107.623126] kasan_bitops_modify.constprop.0+0x1f0/0x68c [ 107.623701] kasan_bitops_generic+0xb4/0x140 [ 107.624195] kunit_try_run_case+0x8c/0x124 [ 107.624677] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.625256] kthread+0x15c/0x170 [ 107.625704] ret_from_fork+0x10/0x20 [ 107.626178] [ 107.626414] Allocated by task 249: [ 107.626787] kasan_save_stack+0x3c/0x70 [ 107.627277] kasan_set_track+0x2c/0x40 [ 107.627710] kasan_save_alloc_info+0x24/0x34 [ 107.628188] __kasan_kmalloc+0xd4/0xe0 [ 107.629376] kmalloc_trace+0x8c/0x150 [ 107.629906] kasan_bitops_generic+0x98/0x140 [ 107.630308] kunit_try_run_case+0x8c/0x124 [ 107.630712] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.631214] kthread+0x15c/0x170 [ 107.631567] ret_from_fork+0x10/0x20 [ 107.632130] [ 107.632406] The buggy address belongs to the object at ffff0000c66ab600 [ 107.632406] which belongs to the cache kmalloc-128 of size 128 [ 107.633789] The buggy address is located 8 bytes inside of [ 107.633789] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.635099] [ 107.635383] The buggy address belongs to the physical page: [ 107.636055] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.637245] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.638315] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.639388] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.640443] page dumped because: kasan: bad access detected [ 107.641148] [ 107.641453] Memory state around the buggy address: [ 107.642096] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.643006] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.643906] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.644818] ^ [ 107.645431] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.646454] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.647371] ================================================================== [ 107.382258] ================================================================== [ 107.383141] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xcc/0x68c [ 107.384205] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.385237] [ 107.385531] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.386673] Hardware name: linux,dummy-virt (DT) [ 107.387285] Call trace: [ 107.387689] dump_backtrace+0xe0/0x134 [ 107.388575] show_stack+0x20/0x2c [ 107.389114] dump_stack_lvl+0x88/0xb4 [ 107.389720] print_report+0x158/0x44c [ 107.390285] kasan_report+0xc8/0x180 [ 107.390864] __asan_load8+0x80/0xac [ 107.391424] kasan_bitops_modify.constprop.0+0xcc/0x68c [ 107.392167] kasan_bitops_generic+0xb4/0x140 [ 107.392894] kunit_try_run_case+0x8c/0x124 [ 107.393643] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.394346] kthread+0x15c/0x170 [ 107.394707] ret_from_fork+0x10/0x20 [ 107.395153] [ 107.395350] Allocated by task 249: [ 107.395662] kasan_save_stack+0x3c/0x70 [ 107.396116] kasan_set_track+0x2c/0x40 [ 107.396584] kasan_save_alloc_info+0x24/0x34 [ 107.397053] __kasan_kmalloc+0xd4/0xe0 [ 107.397481] kmalloc_trace+0x8c/0x150 [ 107.397906] kasan_bitops_generic+0x98/0x140 [ 107.398365] kunit_try_run_case+0x8c/0x124 [ 107.398848] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.399428] kthread+0x15c/0x170 [ 107.399852] ret_from_fork+0x10/0x20 [ 107.400287] [ 107.400489] The buggy address belongs to the object at ffff0000c66ab600 [ 107.400489] which belongs to the cache kmalloc-128 of size 128 [ 107.402615] The buggy address is located 8 bytes inside of [ 107.402615] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.403339] [ 107.403528] The buggy address belongs to the physical page: [ 107.403914] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.404512] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.405684] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.406233] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.406705] page dumped because: kasan: bad access detected [ 107.407081] [ 107.407263] Memory state around the buggy address: [ 107.407617] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.408855] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.410205] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.410919] ^ [ 107.411371] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.412093] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.412788] ================================================================== [ 107.467606] ================================================================== [ 107.468262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x150/0x68c [ 107.469124] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.469824] [ 107.470105] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.470800] Hardware name: linux,dummy-virt (DT) [ 107.471245] Call trace: [ 107.471525] dump_backtrace+0xe0/0x134 [ 107.472370] show_stack+0x20/0x2c [ 107.472969] dump_stack_lvl+0x88/0xb4 [ 107.473570] print_report+0x158/0x44c [ 107.474058] kasan_report+0xc8/0x180 [ 107.474583] kasan_check_range+0xe4/0x190 [ 107.475145] __kasan_check_write+0x28/0x3c [ 107.475670] kasan_bitops_modify.constprop.0+0x150/0x68c [ 107.476214] kasan_bitops_generic+0xb4/0x140 [ 107.476696] kunit_try_run_case+0x8c/0x124 [ 107.477142] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.477691] kthread+0x15c/0x170 [ 107.478091] ret_from_fork+0x10/0x20 [ 107.478531] [ 107.478762] Allocated by task 249: [ 107.479096] kasan_save_stack+0x3c/0x70 [ 107.479555] kasan_set_track+0x2c/0x40 [ 107.480010] kasan_save_alloc_info+0x24/0x34 [ 107.480471] __kasan_kmalloc+0xd4/0xe0 [ 107.480904] kmalloc_trace+0x8c/0x150 [ 107.481337] kasan_bitops_generic+0x98/0x140 [ 107.481862] kunit_try_run_case+0x8c/0x124 [ 107.482388] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.483134] kthread+0x15c/0x170 [ 107.483555] ret_from_fork+0x10/0x20 [ 107.484067] [ 107.484585] The buggy address belongs to the object at ffff0000c66ab600 [ 107.484585] which belongs to the cache kmalloc-128 of size 128 [ 107.485731] The buggy address is located 8 bytes inside of [ 107.485731] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.486544] [ 107.486789] The buggy address belongs to the physical page: [ 107.487299] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.488061] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.488829] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.489567] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.490358] page dumped because: kasan: bad access detected [ 107.490732] [ 107.491028] Memory state around the buggy address: [ 107.491683] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.492359] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.493089] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.493700] ^ [ 107.494080] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.494707] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.495314] ================================================================== [ 107.525597] ================================================================== [ 107.526564] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x188/0x68c [ 107.527673] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.528555] [ 107.528768] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.529330] Hardware name: linux,dummy-virt (DT) [ 107.529670] Call trace: [ 107.529909] dump_backtrace+0xe0/0x134 [ 107.530278] show_stack+0x20/0x2c [ 107.530614] dump_stack_lvl+0x88/0xb4 [ 107.531037] print_report+0x158/0x44c [ 107.531546] kasan_report+0xc8/0x180 [ 107.532035] __asan_load8+0x80/0xac [ 107.532548] kasan_bitops_modify.constprop.0+0x188/0x68c [ 107.533183] kasan_bitops_generic+0xb4/0x140 [ 107.533573] kunit_try_run_case+0x8c/0x124 [ 107.534046] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.534740] kthread+0x15c/0x170 [ 107.535298] ret_from_fork+0x10/0x20 [ 107.535785] [ 107.536300] Allocated by task 249: [ 107.536661] kasan_save_stack+0x3c/0x70 [ 107.537096] kasan_set_track+0x2c/0x40 [ 107.537536] kasan_save_alloc_info+0x24/0x34 [ 107.538020] __kasan_kmalloc+0xd4/0xe0 [ 107.538490] kmalloc_trace+0x8c/0x150 [ 107.538935] kasan_bitops_generic+0x98/0x140 [ 107.539359] kunit_try_run_case+0x8c/0x124 [ 107.539839] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.540585] kthread+0x15c/0x170 [ 107.541003] ret_from_fork+0x10/0x20 [ 107.541434] [ 107.541629] The buggy address belongs to the object at ffff0000c66ab600 [ 107.541629] which belongs to the cache kmalloc-128 of size 128 [ 107.542583] The buggy address is located 8 bytes inside of [ 107.542583] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.544248] [ 107.544458] The buggy address belongs to the physical page: [ 107.544857] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.546001] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.546777] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.547439] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.548077] page dumped because: kasan: bad access detected [ 107.548596] [ 107.548799] Memory state around the buggy address: [ 107.549210] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.549840] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.550618] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.551316] ^ [ 107.551978] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.552661] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.553789] ==================================================================
[ 74.882452] ================================================================== [ 74.882994] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x148/0x684 [ 74.884043] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.884604] [ 74.884859] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.885620] Hardware name: linux,dummy-virt (DT) [ 74.886246] Call trace: [ 74.886630] dump_backtrace.part.0+0xdc/0xf0 [ 74.887519] show_stack+0x18/0x30 [ 74.887945] dump_stack_lvl+0x64/0x80 [ 74.888355] print_report+0x158/0x438 [ 74.888823] kasan_report+0xb4/0xf4 [ 74.889197] kasan_check_range+0xe4/0x190 [ 74.889674] __kasan_check_write+0x28/0x3c [ 74.890161] kasan_bitops_modify.constprop.0+0x148/0x684 [ 74.891351] kasan_bitops_generic+0xac/0x13c [ 74.891863] kunit_try_run_case+0x84/0x120 [ 74.892364] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.892952] kthread+0x180/0x190 [ 74.893339] ret_from_fork+0x10/0x20 [ 74.893737] [ 74.893978] Allocated by task 165: [ 74.894656] kasan_save_stack+0x3c/0x70 [ 74.895099] kasan_set_track+0x2c/0x40 [ 74.895510] kasan_save_alloc_info+0x24/0x34 [ 74.896033] __kasan_kmalloc+0xb8/0xc0 [ 74.896423] kmalloc_trace+0x58/0x6c [ 74.896868] kasan_bitops_generic+0x90/0x13c [ 74.897359] kunit_try_run_case+0x84/0x120 [ 74.897992] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.898572] kthread+0x180/0x190 [ 74.899403] ret_from_fork+0x10/0x20 [ 74.899842] [ 74.900044] The buggy address belongs to the object at ffff0000c5840b00 [ 74.900044] which belongs to the cache kmalloc-128 of size 128 [ 74.901000] The buggy address is located 8 bytes inside of [ 74.901000] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.902152] [ 74.902368] The buggy address belongs to the physical page: [ 74.902953] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.903738] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.904423] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.905105] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.905733] page dumped because: kasan: bad access detected [ 74.906762] [ 74.906976] Memory state around the buggy address: [ 74.907421] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.908060] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.908660] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.909256] ^ [ 74.909641] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.910272] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.911169] ================================================================== [ 74.851621] ================================================================== [ 74.852081] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x11c/0x684 [ 74.852873] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.853500] [ 74.853692] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.854739] Hardware name: linux,dummy-virt (DT) [ 74.855326] Call trace: [ 74.855727] dump_backtrace.part.0+0xdc/0xf0 [ 74.856417] show_stack+0x18/0x30 [ 74.857032] dump_stack_lvl+0x64/0x80 [ 74.857447] print_report+0x158/0x438 [ 74.857900] kasan_report+0xb4/0xf4 [ 74.858365] __asan_load8+0x80/0xac [ 74.858852] kasan_bitops_modify.constprop.0+0x11c/0x684 [ 74.859454] kasan_bitops_generic+0xac/0x13c [ 74.860048] kunit_try_run_case+0x84/0x120 [ 74.860606] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.861299] kthread+0x180/0x190 [ 74.861947] ret_from_fork+0x10/0x20 [ 74.862623] [ 74.862919] Allocated by task 165: [ 74.863405] kasan_save_stack+0x3c/0x70 [ 74.863879] kasan_set_track+0x2c/0x40 [ 74.864212] kasan_save_alloc_info+0x24/0x34 [ 74.864882] __kasan_kmalloc+0xb8/0xc0 [ 74.865466] kmalloc_trace+0x58/0x6c [ 74.866228] kasan_bitops_generic+0x90/0x13c [ 74.867332] kunit_try_run_case+0x84/0x120 [ 74.867983] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.868773] kthread+0x180/0x190 [ 74.869287] ret_from_fork+0x10/0x20 [ 74.869725] [ 74.870057] The buggy address belongs to the object at ffff0000c5840b00 [ 74.870057] which belongs to the cache kmalloc-128 of size 128 [ 74.871074] The buggy address is located 8 bytes inside of [ 74.871074] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.872017] [ 74.872255] The buggy address belongs to the physical page: [ 74.872738] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.873527] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.874352] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.874991] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.875592] page dumped because: kasan: bad access detected [ 74.876055] [ 74.876265] Memory state around the buggy address: [ 74.877159] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.877808] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.878737] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.879293] ^ [ 74.879685] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.880353] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.880967] ================================================================== [ 74.912145] ================================================================== [ 74.912935] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x178/0x684 [ 74.913903] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.915053] [ 74.915287] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.916010] Hardware name: linux,dummy-virt (DT) [ 74.916445] Call trace: [ 74.916756] dump_backtrace.part.0+0xdc/0xf0 [ 74.917311] show_stack+0x18/0x30 [ 74.917764] dump_stack_lvl+0x64/0x80 [ 74.918211] print_report+0x158/0x438 [ 74.918955] kasan_report+0xb4/0xf4 [ 74.919366] kasan_check_range+0xe4/0x190 [ 74.919842] __kasan_check_write+0x28/0x3c [ 74.920330] kasan_bitops_modify.constprop.0+0x178/0x684 [ 74.920912] kasan_bitops_generic+0xac/0x13c [ 74.921434] kunit_try_run_case+0x84/0x120 [ 74.922139] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.922708] kthread+0x180/0x190 [ 74.923579] ret_from_fork+0x10/0x20 [ 74.924015] [ 74.924236] Allocated by task 165: [ 74.924555] kasan_save_stack+0x3c/0x70 [ 74.924992] kasan_set_track+0x2c/0x40 [ 74.925417] kasan_save_alloc_info+0x24/0x34 [ 74.926059] __kasan_kmalloc+0xb8/0xc0 [ 74.926762] kmalloc_trace+0x58/0x6c [ 74.927224] kasan_bitops_generic+0x90/0x13c [ 74.927739] kunit_try_run_case+0x84/0x120 [ 74.928259] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.928812] kthread+0x180/0x190 [ 74.929200] ret_from_fork+0x10/0x20 [ 74.929595] [ 74.930361] The buggy address belongs to the object at ffff0000c5840b00 [ 74.930361] which belongs to the cache kmalloc-128 of size 128 [ 74.931317] The buggy address is located 8 bytes inside of [ 74.931317] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.932219] [ 74.932425] The buggy address belongs to the physical page: [ 74.932907] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.933672] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.934350] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.935026] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.935653] page dumped because: kasan: bad access detected [ 74.936123] [ 74.936299] Memory state around the buggy address: [ 74.936758] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.937347] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.938661] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.939239] ^ [ 74.939621] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.940197] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.940802] ================================================================== [ 74.746964] ================================================================== [ 74.747776] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x684 [ 74.748602] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.749187] [ 74.749415] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.750191] Hardware name: linux,dummy-virt (DT) [ 74.750648] Call trace: [ 74.751089] dump_backtrace.part.0+0xdc/0xf0 [ 74.751579] show_stack+0x18/0x30 [ 74.752140] dump_stack_lvl+0x64/0x80 [ 74.752508] print_report+0x158/0x438 [ 74.752884] kasan_report+0xb4/0xf4 [ 74.753209] kasan_check_range+0xe4/0x190 [ 74.753587] __kasan_check_write+0x28/0x3c [ 74.753964] kasan_bitops_modify.constprop.0+0x9c/0x684 [ 74.754748] kasan_bitops_generic+0xac/0x13c [ 74.755699] kunit_try_run_case+0x84/0x120 [ 74.756596] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.757565] kthread+0x180/0x190 [ 74.758339] ret_from_fork+0x10/0x20 [ 74.759094] [ 74.759497] Allocated by task 165: [ 74.760137] kasan_save_stack+0x3c/0x70 [ 74.760963] kasan_set_track+0x2c/0x40 [ 74.761610] kasan_save_alloc_info+0x24/0x34 [ 74.762573] __kasan_kmalloc+0xb8/0xc0 [ 74.763484] kmalloc_trace+0x58/0x6c [ 74.764151] kasan_bitops_generic+0x90/0x13c [ 74.764990] kunit_try_run_case+0x84/0x120 [ 74.765864] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.766861] kthread+0x180/0x190 [ 74.767582] ret_from_fork+0x10/0x20 [ 74.768378] [ 74.768711] The buggy address belongs to the object at ffff0000c5840b00 [ 74.768711] which belongs to the cache kmalloc-128 of size 128 [ 74.770521] The buggy address is located 8 bytes inside of [ 74.770521] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.772341] [ 74.772789] The buggy address belongs to the physical page: [ 74.773663] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.775218] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.776316] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.777501] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.778765] page dumped because: kasan: bad access detected [ 74.779718] [ 74.780123] Memory state around the buggy address: [ 74.780794] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.781286] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.781925] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.782478] ^ [ 74.782829] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.783430] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.784015] ================================================================== [ 74.784867] ================================================================== [ 74.785383] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xc4/0x684 [ 74.786355] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.786968] [ 74.787186] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.787890] Hardware name: linux,dummy-virt (DT) [ 74.788308] Call trace: [ 74.788968] dump_backtrace.part.0+0xdc/0xf0 [ 74.789500] show_stack+0x18/0x30 [ 74.790199] dump_stack_lvl+0x64/0x80 [ 74.790654] print_report+0x158/0x438 [ 74.791068] kasan_report+0xb4/0xf4 [ 74.791460] __asan_load8+0x80/0xac [ 74.791872] kasan_bitops_modify.constprop.0+0xc4/0x684 [ 74.792459] kasan_bitops_generic+0xac/0x13c [ 74.792910] kunit_try_run_case+0x84/0x120 [ 74.793356] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.794408] kthread+0x180/0x190 [ 74.794784] ret_from_fork+0x10/0x20 [ 74.795243] [ 74.795460] Allocated by task 165: [ 74.795799] kasan_save_stack+0x3c/0x70 [ 74.796225] kasan_set_track+0x2c/0x40 [ 74.796662] kasan_save_alloc_info+0x24/0x34 [ 74.797128] __kasan_kmalloc+0xb8/0xc0 [ 74.797550] kmalloc_trace+0x58/0x6c [ 74.798219] kasan_bitops_generic+0x90/0x13c [ 74.798755] kunit_try_run_case+0x84/0x120 [ 74.799212] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.799777] kthread+0x180/0x190 [ 74.800129] ret_from_fork+0x10/0x20 [ 74.800560] [ 74.800761] The buggy address belongs to the object at ffff0000c5840b00 [ 74.800761] which belongs to the cache kmalloc-128 of size 128 [ 74.801682] The buggy address is located 8 bytes inside of [ 74.801682] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.803111] [ 74.803290] The buggy address belongs to the physical page: [ 74.803761] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.804516] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.805149] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.806119] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.806723] page dumped because: kasan: bad access detected [ 74.807182] [ 74.807363] Memory state around the buggy address: [ 74.807831] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.808421] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.809021] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.809587] ^ [ 74.810480] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.811017] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.811476] ================================================================== [ 74.968739] ================================================================== [ 74.969352] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x190/0x684 [ 74.970715] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.971332] [ 74.971552] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.972280] Hardware name: linux,dummy-virt (DT) [ 74.972695] Call trace: [ 74.972963] dump_backtrace.part.0+0xdc/0xf0 [ 74.973480] show_stack+0x18/0x30 [ 74.974185] dump_stack_lvl+0x64/0x80 [ 74.974635] print_report+0x158/0x438 [ 74.975079] kasan_report+0xb4/0xf4 [ 74.975463] kasan_check_range+0xe4/0x190 [ 74.975922] __kasan_check_write+0x28/0x3c [ 74.976370] kasan_bitops_modify.constprop.0+0x190/0x684 [ 74.976925] kasan_bitops_generic+0xac/0x13c [ 74.977360] kunit_try_run_case+0x84/0x120 [ 74.978305] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.978866] kthread+0x180/0x190 [ 74.979241] ret_from_fork+0x10/0x20 [ 74.979695] [ 74.979874] Allocated by task 165: [ 74.980245] kasan_save_stack+0x3c/0x70 [ 74.980664] kasan_set_track+0x2c/0x40 [ 74.981077] kasan_save_alloc_info+0x24/0x34 [ 74.981562] __kasan_kmalloc+0xb8/0xc0 [ 74.982030] kmalloc_trace+0x58/0x6c [ 74.982466] kasan_bitops_generic+0x90/0x13c [ 74.982914] kunit_try_run_case+0x84/0x120 [ 74.983376] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.983898] kthread+0x180/0x190 [ 74.984273] ret_from_fork+0x10/0x20 [ 74.985324] [ 74.985537] The buggy address belongs to the object at ffff0000c5840b00 [ 74.985537] which belongs to the cache kmalloc-128 of size 128 [ 74.986903] The buggy address is located 8 bytes inside of [ 74.986903] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.987786] [ 74.987977] The buggy address belongs to the physical page: [ 74.988442] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.989166] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.989824] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.990649] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.991248] page dumped because: kasan: bad access detected [ 74.991729] [ 74.991905] Memory state around the buggy address: [ 74.992499] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.993086] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.993676] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.994842] ^ [ 74.995191] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.995830] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.996386] ================================================================== [ 75.026704] ================================================================== [ 75.027281] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e8/0x684 [ 75.028038] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.028582] [ 75.028824] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.029515] Hardware name: linux,dummy-virt (DT) [ 75.030231] Call trace: [ 75.030484] dump_backtrace.part.0+0xdc/0xf0 [ 75.030995] show_stack+0x18/0x30 [ 75.031454] dump_stack_lvl+0x64/0x80 [ 75.031876] print_report+0x158/0x438 [ 75.032277] kasan_report+0xb4/0xf4 [ 75.032676] __asan_load8+0x80/0xac [ 75.033087] kasan_bitops_modify.constprop.0+0x1e8/0x684 [ 75.033668] kasan_bitops_generic+0xac/0x13c [ 75.034165] kunit_try_run_case+0x84/0x120 [ 75.035116] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.035680] kthread+0x180/0x190 [ 75.036057] ret_from_fork+0x10/0x20 [ 75.036492] [ 75.036682] Allocated by task 165: [ 75.037010] kasan_save_stack+0x3c/0x70 [ 75.037420] kasan_set_track+0x2c/0x40 [ 75.038090] kasan_save_alloc_info+0x24/0x34 [ 75.038553] __kasan_kmalloc+0xb8/0xc0 [ 75.038966] kmalloc_trace+0x58/0x6c [ 75.039345] kasan_bitops_generic+0x90/0x13c [ 75.039849] kunit_try_run_case+0x84/0x120 [ 75.040305] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.040903] kthread+0x180/0x190 [ 75.041290] ret_from_fork+0x10/0x20 [ 75.041711] [ 75.042414] The buggy address belongs to the object at ffff0000c5840b00 [ 75.042414] which belongs to the cache kmalloc-128 of size 128 [ 75.043300] The buggy address is located 8 bytes inside of [ 75.043300] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.044179] [ 75.044364] The buggy address belongs to the physical page: [ 75.044820] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.045583] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.046505] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.047160] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.047788] page dumped because: kasan: bad access detected [ 75.048242] [ 75.048437] Memory state around the buggy address: [ 75.048858] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.049455] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.050280] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.050840] ^ [ 75.051172] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.051785] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.052349] ================================================================== [ 74.812696] ================================================================== [ 74.813156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xf0/0x684 [ 74.813897] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.815447] [ 74.815665] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.816211] Hardware name: linux,dummy-virt (DT) [ 74.816544] Call trace: [ 74.816771] dump_backtrace.part.0+0xdc/0xf0 [ 74.817212] show_stack+0x18/0x30 [ 74.818888] dump_stack_lvl+0x64/0x80 [ 74.819446] print_report+0x158/0x438 [ 74.819887] kasan_report+0xb4/0xf4 [ 74.820267] kasan_check_range+0xe4/0x190 [ 74.820992] __kasan_check_write+0x28/0x3c [ 74.821598] kasan_bitops_modify.constprop.0+0xf0/0x684 [ 74.822864] kasan_bitops_generic+0xac/0x13c [ 74.823617] kunit_try_run_case+0x84/0x120 [ 74.824024] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.824584] kthread+0x180/0x190 [ 74.825382] ret_from_fork+0x10/0x20 [ 74.826683] [ 74.827197] Allocated by task 165: [ 74.828073] kasan_save_stack+0x3c/0x70 [ 74.828932] kasan_set_track+0x2c/0x40 [ 74.829530] kasan_save_alloc_info+0x24/0x34 [ 74.830367] __kasan_kmalloc+0xb8/0xc0 [ 74.830962] kmalloc_trace+0x58/0x6c [ 74.831804] kasan_bitops_generic+0x90/0x13c [ 74.832564] kunit_try_run_case+0x84/0x120 [ 74.832971] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.833475] kthread+0x180/0x190 [ 74.834031] ret_from_fork+0x10/0x20 [ 74.834683] [ 74.835111] The buggy address belongs to the object at ffff0000c5840b00 [ 74.835111] which belongs to the cache kmalloc-128 of size 128 [ 74.836811] The buggy address is located 8 bytes inside of [ 74.836811] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.838206] [ 74.838489] The buggy address belongs to the physical page: [ 74.839258] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.840322] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.840867] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.841373] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.842586] page dumped because: kasan: bad access detected [ 74.843616] [ 74.843883] Memory state around the buggy address: [ 74.844749] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.845633] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.846815] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.847677] ^ [ 74.848190] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.849060] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.850487] ================================================================== [ 74.941566] ================================================================== [ 74.942154] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x180/0x684 [ 74.942957] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.943555] [ 74.943774] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.944758] Hardware name: linux,dummy-virt (DT) [ 74.945145] Call trace: [ 74.945420] dump_backtrace.part.0+0xdc/0xf0 [ 74.946390] show_stack+0x18/0x30 [ 74.946852] dump_stack_lvl+0x64/0x80 [ 74.947270] print_report+0x158/0x438 [ 74.947716] kasan_report+0xb4/0xf4 [ 74.948111] __asan_load8+0x80/0xac [ 74.948523] kasan_bitops_modify.constprop.0+0x180/0x684 [ 74.949069] kasan_bitops_generic+0xac/0x13c [ 74.949532] kunit_try_run_case+0x84/0x120 [ 74.950064] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.950606] kthread+0x180/0x190 [ 74.950987] ret_from_fork+0x10/0x20 [ 74.951405] [ 74.951590] Allocated by task 165: [ 74.951912] kasan_save_stack+0x3c/0x70 [ 74.952338] kasan_set_track+0x2c/0x40 [ 74.953028] kasan_save_alloc_info+0x24/0x34 [ 74.953468] __kasan_kmalloc+0xb8/0xc0 [ 74.954390] kmalloc_trace+0x58/0x6c [ 74.954819] kasan_bitops_generic+0x90/0x13c [ 74.955292] kunit_try_run_case+0x84/0x120 [ 74.955760] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.956268] kthread+0x180/0x190 [ 74.956650] ret_from_fork+0x10/0x20 [ 74.957062] [ 74.957244] The buggy address belongs to the object at ffff0000c5840b00 [ 74.957244] which belongs to the cache kmalloc-128 of size 128 [ 74.958536] The buggy address is located 8 bytes inside of [ 74.958536] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.959346] [ 74.959565] The buggy address belongs to the physical page: [ 74.960001] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.960783] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.961439] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.962566] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.963173] page dumped because: kasan: bad access detected [ 74.963642] [ 74.963847] Memory state around the buggy address: [ 74.964257] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.964848] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.965444] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.966181] ^ [ 74.966548] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.967171] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.967747] ================================================================== [ 74.997195] ================================================================== [ 74.997743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1bc/0x684 [ 74.998875] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.999509] [ 74.999722] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.000403] Hardware name: linux,dummy-virt (DT) [ 75.000817] Call trace: [ 75.001110] dump_backtrace.part.0+0xdc/0xf0 [ 75.001615] show_stack+0x18/0x30 [ 75.002627] dump_stack_lvl+0x64/0x80 [ 75.003036] print_report+0x158/0x438 [ 75.003456] kasan_report+0xb4/0xf4 [ 75.003857] kasan_check_range+0xe4/0x190 [ 75.004305] __kasan_check_write+0x28/0x3c [ 75.004756] kasan_bitops_modify.constprop.0+0x1bc/0x684 [ 75.005331] kasan_bitops_generic+0xac/0x13c [ 75.006108] kunit_try_run_case+0x84/0x120 [ 75.006575] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.007094] kthread+0x180/0x190 [ 75.007478] ret_from_fork+0x10/0x20 [ 75.007892] [ 75.008070] Allocated by task 165: [ 75.008405] kasan_save_stack+0x3c/0x70 [ 75.008863] kasan_set_track+0x2c/0x40 [ 75.009268] kasan_save_alloc_info+0x24/0x34 [ 75.009732] __kasan_kmalloc+0xb8/0xc0 [ 75.010133] kmalloc_trace+0x58/0x6c [ 75.011067] kasan_bitops_generic+0x90/0x13c [ 75.011600] kunit_try_run_case+0x84/0x120 [ 75.012058] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.012594] kthread+0x180/0x190 [ 75.012965] ret_from_fork+0x10/0x20 [ 75.013369] [ 75.013564] The buggy address belongs to the object at ffff0000c5840b00 [ 75.013564] which belongs to the cache kmalloc-128 of size 128 [ 75.014941] The buggy address is located 8 bytes inside of [ 75.014941] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.015813] [ 75.016017] The buggy address belongs to the physical page: [ 75.016495] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.017246] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.018066] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.018731] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.019344] page dumped because: kasan: bad access detected [ 75.019806] [ 75.019983] Memory state around the buggy address: [ 75.020859] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.021444] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.022366] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.022934] ^ [ 75.023281] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.023889] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.024487] ==================================================================
[ 66.177015] ================================================================== [ 66.177703] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0xe4/0x6a8 [ 66.178416] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.178961] [ 66.179152] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.179795] Hardware name: linux,dummy-virt (DT) [ 66.180178] Call trace: [ 66.180430] dump_backtrace+0x110/0x120 [ 66.180847] show_stack+0x18/0x28 [ 66.181236] dump_stack_lvl+0x68/0x84 [ 66.181690] print_report+0x158/0x484 [ 66.182218] kasan_report+0x98/0xe0 [ 66.182597] __asan_load8+0x88/0xb0 [ 66.182940] kasan_bitops_modify.constprop.5+0xe4/0x6a8 [ 66.183506] kasan_bitops_generic+0xac/0x128 [ 66.183952] kunit_try_run_case+0x7c/0x120 [ 66.184379] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.184855] kthread+0x1a4/0x1b8 [ 66.185219] ret_from_fork+0x10/0x20 [ 66.185799] [ 66.186000] Allocated by task 163: [ 66.186295] kasan_save_stack+0x2c/0x58 [ 66.186693] kasan_set_track+0x2c/0x40 [ 66.187054] kasan_save_alloc_info+0x24/0x38 [ 66.187487] __kasan_kmalloc+0xa0/0xb8 [ 66.187838] kmalloc_trace+0x50/0x68 [ 66.188208] kasan_bitops_generic+0x90/0x128 [ 66.188686] kunit_try_run_case+0x7c/0x120 [ 66.189091] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.189821] kthread+0x1a4/0x1b8 [ 66.190157] ret_from_fork+0x10/0x20 [ 66.190515] [ 66.190708] The buggy address belongs to the object at ffff0000c586c700 [ 66.190708] which belongs to the cache kmalloc-128 of size 128 [ 66.191554] The buggy address is located 8 bytes inside of [ 66.191554] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.192334] [ 66.192549] The buggy address belongs to the physical page: [ 66.192986] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.193733] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.194947] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.195550] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.196134] page dumped because: kasan: bad access detected [ 66.196548] [ 66.196732] Memory state around the buggy address: [ 66.197113] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.197896] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.198452] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.198988] ^ [ 66.199324] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.199892] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.200438] ================================================================== [ 66.150508] ================================================================== [ 66.151273] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0xb4/0x6a8 [ 66.151975] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.152591] [ 66.152805] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.153536] Hardware name: linux,dummy-virt (DT) [ 66.154068] Call trace: [ 66.154511] dump_backtrace+0x110/0x120 [ 66.154976] show_stack+0x18/0x28 [ 66.155367] dump_stack_lvl+0x68/0x84 [ 66.155797] print_report+0x158/0x484 [ 66.156166] kasan_report+0x98/0xe0 [ 66.156511] kasan_check_range+0x160/0x1d8 [ 66.156853] __kasan_check_write+0x28/0x38 [ 66.157197] kasan_bitops_modify.constprop.5+0xb4/0x6a8 [ 66.157637] kasan_bitops_generic+0xac/0x128 [ 66.158258] kunit_try_run_case+0x7c/0x120 [ 66.158778] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.159325] kthread+0x1a4/0x1b8 [ 66.159716] ret_from_fork+0x10/0x20 [ 66.160083] [ 66.160297] Allocated by task 163: [ 66.160615] kasan_save_stack+0x2c/0x58 [ 66.161012] kasan_set_track+0x2c/0x40 [ 66.161447] kasan_save_alloc_info+0x24/0x38 [ 66.161995] __kasan_kmalloc+0xa0/0xb8 [ 66.162435] kmalloc_trace+0x50/0x68 [ 66.162822] kasan_bitops_generic+0x90/0x128 [ 66.163294] kunit_try_run_case+0x7c/0x120 [ 66.163729] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.164253] kthread+0x1a4/0x1b8 [ 66.164609] ret_from_fork+0x10/0x20 [ 66.164984] [ 66.165205] The buggy address belongs to the object at ffff0000c586c700 [ 66.165205] which belongs to the cache kmalloc-128 of size 128 [ 66.166494] The buggy address is located 8 bytes inside of [ 66.166494] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.167490] [ 66.167821] The buggy address belongs to the physical page: [ 66.168280] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.169049] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.170101] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.170720] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.171292] page dumped because: kasan: bad access detected [ 66.171734] [ 66.171926] Memory state around the buggy address: [ 66.172307] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.172850] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.174081] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.174769] ^ [ 66.175107] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.175672] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.176225] ================================================================== [ 66.201213] ================================================================== [ 66.201774] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x118/0x6a8 [ 66.202553] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.203096] [ 66.203301] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.203969] Hardware name: linux,dummy-virt (DT) [ 66.204601] Call trace: [ 66.204839] dump_backtrace+0x110/0x120 [ 66.205283] show_stack+0x18/0x28 [ 66.205791] dump_stack_lvl+0x68/0x84 [ 66.206196] print_report+0x158/0x484 [ 66.206582] kasan_report+0x98/0xe0 [ 66.206925] kasan_check_range+0x160/0x1d8 [ 66.207353] __kasan_check_write+0x28/0x38 [ 66.207755] kasan_bitops_modify.constprop.5+0x118/0x6a8 [ 66.208242] kasan_bitops_generic+0xac/0x128 [ 66.208690] kunit_try_run_case+0x7c/0x120 [ 66.209111] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.209889] kthread+0x1a4/0x1b8 [ 66.210258] ret_from_fork+0x10/0x20 [ 66.210627] [ 66.210822] Allocated by task 163: [ 66.211101] kasan_save_stack+0x2c/0x58 [ 66.211528] kasan_set_track+0x2c/0x40 [ 66.211854] kasan_save_alloc_info+0x24/0x38 [ 66.212307] __kasan_kmalloc+0xa0/0xb8 [ 66.212673] kmalloc_trace+0x50/0x68 [ 66.213056] kasan_bitops_generic+0x90/0x128 [ 66.213559] kunit_try_run_case+0x7c/0x120 [ 66.213979] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.214648] kthread+0x1a4/0x1b8 [ 66.215004] ret_from_fork+0x10/0x20 [ 66.215385] [ 66.215554] The buggy address belongs to the object at ffff0000c586c700 [ 66.215554] which belongs to the cache kmalloc-128 of size 128 [ 66.216391] The buggy address is located 8 bytes inside of [ 66.216391] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.217195] [ 66.217392] The buggy address belongs to the physical page: [ 66.218083] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.218798] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.219400] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.219972] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.220541] page dumped because: kasan: bad access detected [ 66.220965] [ 66.221152] Memory state around the buggy address: [ 66.222196] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.222750] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.223316] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.223849] ^ [ 66.224155] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.224711] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.225250] ================================================================== [ 66.302065] ================================================================== [ 66.302585] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x1c0/0x6a8 [ 66.303278] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.303814] [ 66.304032] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.304696] Hardware name: linux,dummy-virt (DT) [ 66.305066] Call trace: [ 66.305318] dump_backtrace+0x110/0x120 [ 66.306019] show_stack+0x18/0x28 [ 66.306437] dump_stack_lvl+0x68/0x84 [ 66.306829] print_report+0x158/0x484 [ 66.307195] kasan_report+0x98/0xe0 [ 66.307568] __asan_load8+0x88/0xb0 [ 66.307934] kasan_bitops_modify.constprop.5+0x1c0/0x6a8 [ 66.308450] kasan_bitops_generic+0xac/0x128 [ 66.308890] kunit_try_run_case+0x7c/0x120 [ 66.309314] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.309949] kthread+0x1a4/0x1b8 [ 66.310325] ret_from_fork+0x10/0x20 [ 66.310712] [ 66.310885] Allocated by task 163: [ 66.311184] kasan_save_stack+0x2c/0x58 [ 66.311592] kasan_set_track+0x2c/0x40 [ 66.311959] kasan_save_alloc_info+0x24/0x38 [ 66.312391] __kasan_kmalloc+0xa0/0xb8 [ 66.312727] kmalloc_trace+0x50/0x68 [ 66.313087] kasan_bitops_generic+0x90/0x128 [ 66.313706] kunit_try_run_case+0x7c/0x120 [ 66.314121] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.314653] kthread+0x1a4/0x1b8 [ 66.314994] ret_from_fork+0x10/0x20 [ 66.315374] [ 66.315572] The buggy address belongs to the object at ffff0000c586c700 [ 66.315572] which belongs to the cache kmalloc-128 of size 128 [ 66.316404] The buggy address is located 8 bytes inside of [ 66.316404] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.317208] [ 66.317404] The buggy address belongs to the physical page: [ 66.317863] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.318550] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.319157] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.319880] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.320455] page dumped because: kasan: bad access detected [ 66.320899] [ 66.321090] Memory state around the buggy address: [ 66.321603] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.322186] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.322747] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.323288] ^ [ 66.323594] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.324151] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.324713] ================================================================== [ 66.326063] ================================================================== [ 66.326601] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x1d0/0x6a8 [ 66.327265] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.327824] [ 66.328015] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.328634] Hardware name: linux,dummy-virt (DT) [ 66.329020] Call trace: [ 66.329250] dump_backtrace+0x110/0x120 [ 66.329966] show_stack+0x18/0x28 [ 66.330373] dump_stack_lvl+0x68/0x84 [ 66.330762] print_report+0x158/0x484 [ 66.331134] kasan_report+0x98/0xe0 [ 66.331511] kasan_check_range+0x160/0x1d8 [ 66.331916] __kasan_check_write+0x28/0x38 [ 66.332339] kasan_bitops_modify.constprop.5+0x1d0/0x6a8 [ 66.332818] kasan_bitops_generic+0xac/0x128 [ 66.333291] kunit_try_run_case+0x7c/0x120 [ 66.333713] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.334382] kthread+0x1a4/0x1b8 [ 66.334726] ret_from_fork+0x10/0x20 [ 66.335091] [ 66.335284] Allocated by task 163: [ 66.335591] kasan_save_stack+0x2c/0x58 [ 66.335960] kasan_set_track+0x2c/0x40 [ 66.336326] kasan_save_alloc_info+0x24/0x38 [ 66.336764] __kasan_kmalloc+0xa0/0xb8 [ 66.337119] kmalloc_trace+0x50/0x68 [ 66.337660] kasan_bitops_generic+0x90/0x128 [ 66.338090] kunit_try_run_case+0x7c/0x120 [ 66.338533] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.339075] kthread+0x1a4/0x1b8 [ 66.339413] ret_from_fork+0x10/0x20 [ 66.339787] [ 66.339961] The buggy address belongs to the object at ffff0000c586c700 [ 66.339961] which belongs to the cache kmalloc-128 of size 128 [ 66.340763] The buggy address is located 8 bytes inside of [ 66.340763] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.341733] [ 66.341915] The buggy address belongs to the physical page: [ 66.342354] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.343030] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.343643] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.344253] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.344803] page dumped because: kasan: bad access detected [ 66.345243] [ 66.345434] Memory state around the buggy address: [ 66.345875] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.346422] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.346972] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.347523] ^ [ 66.347827] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.348550] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.349086] ================================================================== [ 66.250309] ================================================================== [ 66.250845] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x180/0x6a8 [ 66.251490] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.252128] [ 66.252309] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.252964] Hardware name: linux,dummy-virt (DT) [ 66.253367] Call trace: [ 66.253638] dump_backtrace+0x110/0x120 [ 66.254071] show_stack+0x18/0x28 [ 66.254518] dump_stack_lvl+0x68/0x84 [ 66.254905] print_report+0x158/0x484 [ 66.255285] kasan_report+0x98/0xe0 [ 66.255750] kasan_check_range+0x160/0x1d8 [ 66.256158] __kasan_check_write+0x28/0x38 [ 66.256584] kasan_bitops_modify.constprop.5+0x180/0x6a8 [ 66.257080] kasan_bitops_generic+0xac/0x128 [ 66.257704] kunit_try_run_case+0x7c/0x120 [ 66.258114] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.258638] kthread+0x1a4/0x1b8 [ 66.259011] ret_from_fork+0x10/0x20 [ 66.259424] [ 66.259607] Allocated by task 163: [ 66.259932] kasan_save_stack+0x2c/0x58 [ 66.260322] kasan_set_track+0x2c/0x40 [ 66.260691] kasan_save_alloc_info+0x24/0x38 [ 66.261106] __kasan_kmalloc+0xa0/0xb8 [ 66.261628] kmalloc_trace+0x50/0x68 [ 66.261992] kasan_bitops_generic+0x90/0x128 [ 66.262454] kunit_try_run_case+0x7c/0x120 [ 66.262907] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.263446] kthread+0x1a4/0x1b8 [ 66.263783] ret_from_fork+0x10/0x20 [ 66.264152] [ 66.264329] The buggy address belongs to the object at ffff0000c586c700 [ 66.264329] which belongs to the cache kmalloc-128 of size 128 [ 66.265172] The buggy address is located 8 bytes inside of [ 66.265172] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.266172] [ 66.266412] The buggy address belongs to the physical page: [ 66.266822] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.267543] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.268171] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.268788] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.269349] page dumped because: kasan: bad access detected [ 66.270301] [ 66.270488] Memory state around the buggy address: [ 66.270915] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.271486] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.272003] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.272537] ^ [ 66.272859] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.273407] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.273966] ================================================================== [ 66.375093] ================================================================== [ 66.375601] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x238/0x6a8 [ 66.376373] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.376961] [ 66.377187] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.378399] Hardware name: linux,dummy-virt (DT) [ 66.378784] Call trace: [ 66.379006] dump_backtrace+0x110/0x120 [ 66.379515] show_stack+0x18/0x28 [ 66.379887] dump_stack_lvl+0x68/0x84 [ 66.380337] print_report+0x158/0x484 [ 66.380704] kasan_report+0x98/0xe0 [ 66.381064] __asan_load8+0x88/0xb0 [ 66.381465] kasan_bitops_modify.constprop.5+0x238/0x6a8 [ 66.382011] kasan_bitops_generic+0xac/0x128 [ 66.382465] kunit_try_run_case+0x7c/0x120 [ 66.382928] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.383471] kthread+0x1a4/0x1b8 [ 66.383808] ret_from_fork+0x10/0x20 [ 66.384199] [ 66.384410] Allocated by task 163: [ 66.384723] kasan_save_stack+0x2c/0x58 [ 66.385079] kasan_set_track+0x2c/0x40 [ 66.385555] kasan_save_alloc_info+0x24/0x38 [ 66.385988] __kasan_kmalloc+0xa0/0xb8 [ 66.386358] kmalloc_trace+0x50/0x68 [ 66.386718] kasan_bitops_generic+0x90/0x128 [ 66.387162] kunit_try_run_case+0x7c/0x120 [ 66.387744] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.388299] kthread+0x1a4/0x1b8 [ 66.388645] ret_from_fork+0x10/0x20 [ 66.389007] [ 66.389186] The buggy address belongs to the object at ffff0000c586c700 [ 66.389186] which belongs to the cache kmalloc-128 of size 128 [ 66.390223] The buggy address is located 8 bytes inside of [ 66.390223] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.391086] [ 66.391261] The buggy address belongs to the physical page: [ 66.391738] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.392415] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.393012] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.393825] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.394410] page dumped because: kasan: bad access detected [ 66.394828] [ 66.395007] Memory state around the buggy address: [ 66.395402] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.395931] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.396522] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.397040] ^ [ 66.397344] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.397926] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.399103] ================================================================== [ 66.226244] ================================================================== [ 66.226752] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x14c/0x6a8 [ 66.227485] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.228045] [ 66.228252] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.228928] Hardware name: linux,dummy-virt (DT) [ 66.229338] Call trace: [ 66.229611] dump_backtrace+0x110/0x120 [ 66.230223] show_stack+0x18/0x28 [ 66.230616] dump_stack_lvl+0x68/0x84 [ 66.230986] print_report+0x158/0x484 [ 66.231342] kasan_report+0x98/0xe0 [ 66.231692] __asan_load8+0x88/0xb0 [ 66.232045] kasan_bitops_modify.constprop.5+0x14c/0x6a8 [ 66.232651] kasan_bitops_generic+0xac/0x128 [ 66.233098] kunit_try_run_case+0x7c/0x120 [ 66.233699] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.234194] kthread+0x1a4/0x1b8 [ 66.234552] ret_from_fork+0x10/0x20 [ 66.234935] [ 66.235101] Allocated by task 163: [ 66.235447] kasan_save_stack+0x2c/0x58 [ 66.235826] kasan_set_track+0x2c/0x40 [ 66.236190] kasan_save_alloc_info+0x24/0x38 [ 66.236624] __kasan_kmalloc+0xa0/0xb8 [ 66.236983] kmalloc_trace+0x50/0x68 [ 66.237368] kasan_bitops_generic+0x90/0x128 [ 66.237810] kunit_try_run_case+0x7c/0x120 [ 66.238224] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.238716] kthread+0x1a4/0x1b8 [ 66.239045] ret_from_fork+0x10/0x20 [ 66.239565] [ 66.239758] The buggy address belongs to the object at ffff0000c586c700 [ 66.239758] which belongs to the cache kmalloc-128 of size 128 [ 66.240597] The buggy address is located 8 bytes inside of [ 66.240597] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.241399] [ 66.241568] The buggy address belongs to the physical page: [ 66.242139] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.242868] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.243474] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.244074] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.244634] page dumped because: kasan: bad access detected [ 66.245039] [ 66.245224] Memory state around the buggy address: [ 66.245832] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.246432] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.246985] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.247508] ^ [ 66.247841] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.248413] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.248945] ================================================================== [ 66.350431] ================================================================== [ 66.350944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x204/0x6a8 [ 66.351668] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.352223] [ 66.352446] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.353039] Hardware name: linux,dummy-virt (DT) [ 66.353455] Call trace: [ 66.353692] dump_backtrace+0x110/0x120 [ 66.354173] show_stack+0x18/0x28 [ 66.354587] dump_stack_lvl+0x68/0x84 [ 66.354993] print_report+0x158/0x484 [ 66.355503] kasan_report+0x98/0xe0 [ 66.355863] kasan_check_range+0x160/0x1d8 [ 66.356276] __kasan_check_write+0x28/0x38 [ 66.356699] kasan_bitops_modify.constprop.5+0x204/0x6a8 [ 66.357218] kasan_bitops_generic+0xac/0x128 [ 66.357911] kunit_try_run_case+0x7c/0x120 [ 66.358360] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.358869] kthread+0x1a4/0x1b8 [ 66.359209] ret_from_fork+0x10/0x20 [ 66.359577] [ 66.359740] Allocated by task 163: [ 66.360078] kasan_save_stack+0x2c/0x58 [ 66.360453] kasan_set_track+0x2c/0x40 [ 66.360816] kasan_save_alloc_info+0x24/0x38 [ 66.361245] __kasan_kmalloc+0xa0/0xb8 [ 66.361753] kmalloc_trace+0x50/0x68 [ 66.362116] kasan_bitops_generic+0x90/0x128 [ 66.362529] kunit_try_run_case+0x7c/0x120 [ 66.362952] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.363487] kthread+0x1a4/0x1b8 [ 66.363841] ret_from_fork+0x10/0x20 [ 66.364211] [ 66.364410] The buggy address belongs to the object at ffff0000c586c700 [ 66.364410] which belongs to the cache kmalloc-128 of size 128 [ 66.365253] The buggy address is located 8 bytes inside of [ 66.365253] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.366205] [ 66.366397] The buggy address belongs to the physical page: [ 66.366848] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.367546] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.368144] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.368780] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.369358] page dumped because: kasan: bad access detected [ 66.370341] [ 66.370534] Memory state around the buggy address: [ 66.370938] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.371513] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.372059] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.372588] ^ [ 66.372892] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.373634] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.374176] ================================================================== [ 66.276390] ================================================================== [ 66.276846] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.5+0x1b8/0x6a8 [ 66.277632] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.278210] [ 66.278406] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.279423] Hardware name: linux,dummy-virt (DT) [ 66.279922] Call trace: [ 66.280290] dump_backtrace+0x110/0x120 [ 66.280804] show_stack+0x18/0x28 [ 66.281302] dump_stack_lvl+0x68/0x84 [ 66.281846] print_report+0x158/0x484 [ 66.282331] kasan_report+0x98/0xe0 [ 66.282750] kasan_check_range+0x160/0x1d8 [ 66.283278] __kasan_check_write+0x28/0x38 [ 66.283661] kasan_bitops_modify.constprop.5+0x1b8/0x6a8 [ 66.284173] kasan_bitops_generic+0xac/0x128 [ 66.284628] kunit_try_run_case+0x7c/0x120 [ 66.285070] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.285603] kthread+0x1a4/0x1b8 [ 66.286009] ret_from_fork+0x10/0x20 [ 66.286426] [ 66.286585] Allocated by task 163: [ 66.286915] kasan_save_stack+0x2c/0x58 [ 66.287368] kasan_set_track+0x2c/0x40 [ 66.287753] kasan_save_alloc_info+0x24/0x38 [ 66.288165] __kasan_kmalloc+0xa0/0xb8 [ 66.288539] kmalloc_trace+0x50/0x68 [ 66.288910] kasan_bitops_generic+0x90/0x128 [ 66.289369] kunit_try_run_case+0x7c/0x120 [ 66.289894] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.290431] kthread+0x1a4/0x1b8 [ 66.290762] ret_from_fork+0x10/0x20 [ 66.291128] [ 66.291325] The buggy address belongs to the object at ffff0000c586c700 [ 66.291325] which belongs to the cache kmalloc-128 of size 128 [ 66.292159] The buggy address is located 8 bytes inside of [ 66.292159] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.292948] [ 66.293156] The buggy address belongs to the physical page: [ 66.293788] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.294474] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.295123] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.295713] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.296293] page dumped because: kasan: bad access detected [ 66.296744] [ 66.296933] Memory state around the buggy address: [ 66.297310] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.298575] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.299121] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.299681] ^ [ 66.299988] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.300569] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.301089] ==================================================================
[ 32.313841] ================================================================== [ 32.314127] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x180/0x5a0 [ 32.314655] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.315032] [ 32.315155] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.315846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.316271] Call Trace: [ 32.316513] <TASK> [ 32.316645] dump_stack_lvl+0x49/0x62 [ 32.316850] print_report+0x189/0x492 [ 32.317073] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.317452] ? kasan_bitops_modify.constprop.0+0x180/0x5a0 [ 32.317792] kasan_report+0x10c/0x190 [ 32.318036] ? kasan_bitops_modify.constprop.0+0x180/0x5a0 [ 32.318412] kasan_check_range+0x10b/0x1c0 [ 32.318621] __kasan_check_write+0x14/0x20 [ 32.318864] kasan_bitops_modify.constprop.0+0x180/0x5a0 [ 32.319094] ? kasan_test_exit+0xe0/0xe0 [ 32.319335] ? kasan_set_track+0x25/0x40 [ 32.319620] ? kasan_save_alloc_info+0x1e/0x30 [ 32.319826] ? __kasan_kmalloc+0xb6/0xc0 [ 32.320084] kasan_bitops_generic+0xa1/0x120 [ 32.320343] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.320846] ? kasan_test_init+0x13e/0x1b0 [ 32.321133] kunit_try_run_case+0x8f/0xd0 [ 32.321413] ? kunit_catch_run_case+0x80/0x80 [ 32.321716] ? kunit_try_catch_throw+0x40/0x40 [ 32.322072] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.322482] kthread+0x17b/0x1b0 [ 32.322691] ? kthread_complete_and_exit+0x30/0x30 [ 32.322968] ret_from_fork+0x22/0x30 [ 32.323216] </TASK> [ 32.323371] [ 32.323553] Allocated by task 269: [ 32.323760] kasan_save_stack+0x41/0x70 [ 32.323974] kasan_set_track+0x25/0x40 [ 32.324231] kasan_save_alloc_info+0x1e/0x30 [ 32.324434] __kasan_kmalloc+0xb6/0xc0 [ 32.324685] kmalloc_trace+0x48/0xb0 [ 32.324891] kasan_bitops_generic+0x86/0x120 [ 32.325096] kunit_try_run_case+0x8f/0xd0 [ 32.325417] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.325702] kthread+0x17b/0x1b0 [ 32.325869] ret_from_fork+0x22/0x30 [ 32.326079] [ 32.326414] The buggy address belongs to the object at ffff888102f54b60 [ 32.326414] which belongs to the cache kmalloc-16 of size 16 [ 32.327202] The buggy address is located 8 bytes inside of [ 32.327202] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.327934] [ 32.328059] The buggy address belongs to the physical page: [ 32.328363] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.328722] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.329130] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.329533] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.330115] page dumped because: kasan: bad access detected [ 32.330355] [ 32.330466] Memory state around the buggy address: [ 32.330732] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.331196] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.331585] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.331921] ^ [ 32.332209] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.332581] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.333064] ================================================================== [ 32.274579] ================================================================== [ 32.274953] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x10e/0x5a0 [ 32.275426] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.275712] [ 32.275806] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.276184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.276635] Call Trace: [ 32.276754] <TASK> [ 32.276860] dump_stack_lvl+0x49/0x62 [ 32.277051] print_report+0x189/0x492 [ 32.277502] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.277797] ? kasan_bitops_modify.constprop.0+0x10e/0x5a0 [ 32.278108] kasan_report+0x10c/0x190 [ 32.278444] ? kasan_bitops_modify.constprop.0+0x10e/0x5a0 [ 32.278742] kasan_check_range+0x10b/0x1c0 [ 32.278935] __kasan_check_write+0x14/0x20 [ 32.279115] kasan_bitops_modify.constprop.0+0x10e/0x5a0 [ 32.279341] ? kasan_test_exit+0xe0/0xe0 [ 32.279555] ? kasan_set_track+0x25/0x40 [ 32.279817] ? kasan_save_alloc_info+0x1e/0x30 [ 32.280100] ? __kasan_kmalloc+0xb6/0xc0 [ 32.280446] kasan_bitops_generic+0xa1/0x120 [ 32.280643] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.280904] ? kasan_test_init+0x13e/0x1b0 [ 32.281278] kunit_try_run_case+0x8f/0xd0 [ 32.281525] ? kunit_catch_run_case+0x80/0x80 [ 32.281984] ? kunit_try_catch_throw+0x40/0x40 [ 32.282258] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.282623] kthread+0x17b/0x1b0 [ 32.282841] ? kthread_complete_and_exit+0x30/0x30 [ 32.283098] ret_from_fork+0x22/0x30 [ 32.283356] </TASK> [ 32.283501] [ 32.283595] Allocated by task 269: [ 32.283739] kasan_save_stack+0x41/0x70 [ 32.283921] kasan_set_track+0x25/0x40 [ 32.284100] kasan_save_alloc_info+0x1e/0x30 [ 32.284435] __kasan_kmalloc+0xb6/0xc0 [ 32.284750] kmalloc_trace+0x48/0xb0 [ 32.285094] kasan_bitops_generic+0x86/0x120 [ 32.285354] kunit_try_run_case+0x8f/0xd0 [ 32.285535] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.285944] kthread+0x17b/0x1b0 [ 32.286151] ret_from_fork+0x22/0x30 [ 32.286364] [ 32.286479] The buggy address belongs to the object at ffff888102f54b60 [ 32.286479] which belongs to the cache kmalloc-16 of size 16 [ 32.286925] The buggy address is located 8 bytes inside of [ 32.286925] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.287782] [ 32.287892] The buggy address belongs to the physical page: [ 32.288141] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.288588] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.288811] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.289076] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.289745] page dumped because: kasan: bad access detected [ 32.290264] [ 32.290386] Memory state around the buggy address: [ 32.290606] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.290858] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.291294] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.291985] ^ [ 32.292332] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.292607] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.293047] ================================================================== [ 32.353125] ================================================================== [ 32.353557] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1f2/0x5a0 [ 32.353928] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.354349] [ 32.354458] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.355071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.355608] Call Trace: [ 32.355775] <TASK> [ 32.355902] dump_stack_lvl+0x49/0x62 [ 32.356141] print_report+0x189/0x492 [ 32.356429] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.356794] ? kasan_bitops_modify.constprop.0+0x1f2/0x5a0 [ 32.357078] kasan_report+0x10c/0x190 [ 32.357365] ? kasan_bitops_modify.constprop.0+0x1f2/0x5a0 [ 32.357646] kasan_check_range+0x10b/0x1c0 [ 32.357867] __kasan_check_write+0x14/0x20 [ 32.358115] kasan_bitops_modify.constprop.0+0x1f2/0x5a0 [ 32.358365] ? kasan_test_exit+0xe0/0xe0 [ 32.358632] ? kasan_set_track+0x25/0x40 [ 32.359142] ? kasan_save_alloc_info+0x1e/0x30 [ 32.359575] ? __kasan_kmalloc+0xb6/0xc0 [ 32.359847] kasan_bitops_generic+0xa1/0x120 [ 32.360054] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.360396] ? kasan_test_init+0x13e/0x1b0 [ 32.360746] kunit_try_run_case+0x8f/0xd0 [ 32.361016] ? kunit_catch_run_case+0x80/0x80 [ 32.361338] ? kunit_try_catch_throw+0x40/0x40 [ 32.361857] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.362150] kthread+0x17b/0x1b0 [ 32.362621] ? kthread_complete_and_exit+0x30/0x30 [ 32.362874] ret_from_fork+0x22/0x30 [ 32.363125] </TASK> [ 32.363327] [ 32.363525] Allocated by task 269: [ 32.363680] kasan_save_stack+0x41/0x70 [ 32.363928] kasan_set_track+0x25/0x40 [ 32.364170] kasan_save_alloc_info+0x1e/0x30 [ 32.364510] __kasan_kmalloc+0xb6/0xc0 [ 32.364742] kmalloc_trace+0x48/0xb0 [ 32.364965] kasan_bitops_generic+0x86/0x120 [ 32.365216] kunit_try_run_case+0x8f/0xd0 [ 32.365550] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.365789] kthread+0x17b/0x1b0 [ 32.365997] ret_from_fork+0x22/0x30 [ 32.366232] [ 32.366591] The buggy address belongs to the object at ffff888102f54b60 [ 32.366591] which belongs to the cache kmalloc-16 of size 16 [ 32.367093] The buggy address is located 8 bytes inside of [ 32.367093] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.367682] [ 32.367775] The buggy address belongs to the physical page: [ 32.368012] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.368479] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.368846] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.369239] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.369713] page dumped because: kasan: bad access detected [ 32.369994] [ 32.370083] Memory state around the buggy address: [ 32.370321] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.370897] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.371272] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.371754] ^ [ 32.372059] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.372388] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.372767] ================================================================== [ 32.333462] ================================================================== [ 32.333838] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1b7/0x5a0 [ 32.334251] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.334819] [ 32.334954] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.335502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.335836] Call Trace: [ 32.336002] <TASK> [ 32.336152] dump_stack_lvl+0x49/0x62 [ 32.336557] print_report+0x189/0x492 [ 32.336801] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.337063] ? kasan_bitops_modify.constprop.0+0x1b7/0x5a0 [ 32.337370] kasan_report+0x10c/0x190 [ 32.337706] ? kasan_bitops_modify.constprop.0+0x1b7/0x5a0 [ 32.338005] kasan_check_range+0x10b/0x1c0 [ 32.338276] __kasan_check_write+0x14/0x20 [ 32.338478] kasan_bitops_modify.constprop.0+0x1b7/0x5a0 [ 32.339035] ? kasan_test_exit+0xe0/0xe0 [ 32.339264] ? kasan_set_track+0x25/0x40 [ 32.339691] ? kasan_save_alloc_info+0x1e/0x30 [ 32.339955] ? __kasan_kmalloc+0xb6/0xc0 [ 32.340222] kasan_bitops_generic+0xa1/0x120 [ 32.340577] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.340902] ? kasan_test_init+0x13e/0x1b0 [ 32.341115] kunit_try_run_case+0x8f/0xd0 [ 32.341455] ? kunit_catch_run_case+0x80/0x80 [ 32.341683] ? kunit_try_catch_throw+0x40/0x40 [ 32.341939] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.342197] kthread+0x17b/0x1b0 [ 32.342655] ? kthread_complete_and_exit+0x30/0x30 [ 32.342911] ret_from_fork+0x22/0x30 [ 32.343151] </TASK> [ 32.343322] [ 32.343423] Allocated by task 269: [ 32.343669] kasan_save_stack+0x41/0x70 [ 32.343880] kasan_set_track+0x25/0x40 [ 32.344117] kasan_save_alloc_info+0x1e/0x30 [ 32.344406] __kasan_kmalloc+0xb6/0xc0 [ 32.344582] kmalloc_trace+0x48/0xb0 [ 32.344817] kasan_bitops_generic+0x86/0x120 [ 32.345073] kunit_try_run_case+0x8f/0xd0 [ 32.345312] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.345536] kthread+0x17b/0x1b0 [ 32.345738] ret_from_fork+0x22/0x30 [ 32.346178] [ 32.346299] The buggy address belongs to the object at ffff888102f54b60 [ 32.346299] which belongs to the cache kmalloc-16 of size 16 [ 32.347052] The buggy address is located 8 bytes inside of [ 32.347052] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.347702] [ 32.347819] The buggy address belongs to the physical page: [ 32.348031] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.348514] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.348817] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.349187] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.349692] page dumped because: kasan: bad access detected [ 32.349949] [ 32.350059] Memory state around the buggy address: [ 32.350346] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.350921] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.351241] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.351660] ^ [ 32.351967] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.352377] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.352686] ================================================================== [ 32.373526] ================================================================== [ 32.373833] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x229/0x5a0 [ 32.374286] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.374650] [ 32.374773] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.375102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.375594] Call Trace: [ 32.375742] <TASK> [ 32.375856] dump_stack_lvl+0x49/0x62 [ 32.376127] print_report+0x189/0x492 [ 32.376704] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.377009] ? kasan_bitops_modify.constprop.0+0x229/0x5a0 [ 32.377439] kasan_report+0x10c/0x190 [ 32.377670] ? kasan_bitops_modify.constprop.0+0x229/0x5a0 [ 32.377945] kasan_check_range+0x10b/0x1c0 [ 32.378214] __kasan_check_write+0x14/0x20 [ 32.378540] kasan_bitops_modify.constprop.0+0x229/0x5a0 [ 32.378784] ? kasan_test_exit+0xe0/0xe0 [ 32.379032] ? kasan_set_track+0x25/0x40 [ 32.379316] ? kasan_save_alloc_info+0x1e/0x30 [ 32.379549] ? __kasan_kmalloc+0xb6/0xc0 [ 32.379785] kasan_bitops_generic+0xa1/0x120 [ 32.380011] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.380345] ? kasan_test_init+0x13e/0x1b0 [ 32.380960] kunit_try_run_case+0x8f/0xd0 [ 32.381240] ? kunit_catch_run_case+0x80/0x80 [ 32.381595] ? kunit_try_catch_throw+0x40/0x40 [ 32.381865] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.382194] kthread+0x17b/0x1b0 [ 32.382482] ? kthread_complete_and_exit+0x30/0x30 [ 32.382721] ret_from_fork+0x22/0x30 [ 32.382962] </TASK> [ 32.383102] [ 32.383204] Allocated by task 269: [ 32.383379] kasan_save_stack+0x41/0x70 [ 32.383663] kasan_set_track+0x25/0x40 [ 32.383860] kasan_save_alloc_info+0x1e/0x30 [ 32.384109] __kasan_kmalloc+0xb6/0xc0 [ 32.384363] kmalloc_trace+0x48/0xb0 [ 32.384542] kasan_bitops_generic+0x86/0x120 [ 32.384777] kunit_try_run_case+0x8f/0xd0 [ 32.385006] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.385263] kthread+0x17b/0x1b0 [ 32.385463] ret_from_fork+0x22/0x30 [ 32.385765] [ 32.385857] The buggy address belongs to the object at ffff888102f54b60 [ 32.385857] which belongs to the cache kmalloc-16 of size 16 [ 32.386736] The buggy address is located 8 bytes inside of [ 32.386736] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.387256] [ 32.387455] The buggy address belongs to the physical page: [ 32.387675] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.388068] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.388396] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.388975] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.389383] page dumped because: kasan: bad access detected [ 32.389694] [ 32.389805] Memory state around the buggy address: [ 32.390038] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.390610] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.390923] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.391310] ^ [ 32.391700] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.392029] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.392599] ================================================================== [ 32.255953] ================================================================== [ 32.256326] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xd3/0x5a0 [ 32.256814] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.257175] [ 32.257340] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.257697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.258103] Call Trace: [ 32.258248] <TASK> [ 32.258436] dump_stack_lvl+0x49/0x62 [ 32.258675] print_report+0x189/0x492 [ 32.258921] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.259223] ? kasan_bitops_modify.constprop.0+0xd3/0x5a0 [ 32.259655] kasan_report+0x10c/0x190 [ 32.259875] ? kasan_bitops_modify.constprop.0+0xd3/0x5a0 [ 32.260188] kasan_check_range+0x10b/0x1c0 [ 32.260407] __kasan_check_write+0x14/0x20 [ 32.260701] kasan_bitops_modify.constprop.0+0xd3/0x5a0 [ 32.261024] ? kasan_test_exit+0xe0/0xe0 [ 32.261307] ? kasan_set_track+0x25/0x40 [ 32.261642] ? kasan_save_alloc_info+0x1e/0x30 [ 32.261860] ? __kasan_kmalloc+0xb6/0xc0 [ 32.262125] kasan_bitops_generic+0xa1/0x120 [ 32.262369] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.262652] ? kasan_test_init+0x13e/0x1b0 [ 32.262920] kunit_try_run_case+0x8f/0xd0 [ 32.263127] ? kunit_catch_run_case+0x80/0x80 [ 32.263555] ? kunit_try_catch_throw+0x40/0x40 [ 32.263810] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.264121] kthread+0x17b/0x1b0 [ 32.264289] ? kthread_complete_and_exit+0x30/0x30 [ 32.264604] ret_from_fork+0x22/0x30 [ 32.264965] </TASK> [ 32.265082] [ 32.265199] Allocated by task 269: [ 32.265556] kasan_save_stack+0x41/0x70 [ 32.265791] kasan_set_track+0x25/0x40 [ 32.266027] kasan_save_alloc_info+0x1e/0x30 [ 32.266256] __kasan_kmalloc+0xb6/0xc0 [ 32.266532] kmalloc_trace+0x48/0xb0 [ 32.266708] kasan_bitops_generic+0x86/0x120 [ 32.266915] kunit_try_run_case+0x8f/0xd0 [ 32.267151] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.267464] kthread+0x17b/0x1b0 [ 32.267616] ret_from_fork+0x22/0x30 [ 32.267781] [ 32.267888] The buggy address belongs to the object at ffff888102f54b60 [ 32.267888] which belongs to the cache kmalloc-16 of size 16 [ 32.268473] The buggy address is located 8 bytes inside of [ 32.268473] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.269241] [ 32.269367] The buggy address belongs to the physical page: [ 32.269620] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.270103] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.270496] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.270861] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.271125] page dumped because: kasan: bad access detected [ 32.271451] [ 32.271557] Memory state around the buggy address: [ 32.271775] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.272157] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.272630] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.272981] ^ [ 32.273304] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.273581] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.274008] ================================================================== [ 32.294032] ================================================================== [ 32.294353] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x145/0x5a0 [ 32.294840] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.295178] [ 32.295361] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.295839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.296182] Call Trace: [ 32.296313] <TASK> [ 32.296427] dump_stack_lvl+0x49/0x62 [ 32.296751] print_report+0x189/0x492 [ 32.297008] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.297328] ? kasan_bitops_modify.constprop.0+0x145/0x5a0 [ 32.297807] kasan_report+0x10c/0x190 [ 32.298065] ? kasan_bitops_modify.constprop.0+0x145/0x5a0 [ 32.298440] kasan_check_range+0x10b/0x1c0 [ 32.298647] __kasan_check_write+0x14/0x20 [ 32.298834] kasan_bitops_modify.constprop.0+0x145/0x5a0 [ 32.299130] ? kasan_test_exit+0xe0/0xe0 [ 32.299382] ? kasan_set_track+0x25/0x40 [ 32.299736] ? kasan_save_alloc_info+0x1e/0x30 [ 32.300328] ? __kasan_kmalloc+0xb6/0xc0 [ 32.300639] kasan_bitops_generic+0xa1/0x120 [ 32.300908] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.301229] ? kasan_test_init+0x13e/0x1b0 [ 32.301553] kunit_try_run_case+0x8f/0xd0 [ 32.301755] ? kunit_catch_run_case+0x80/0x80 [ 32.301975] ? kunit_try_catch_throw+0x40/0x40 [ 32.302247] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.302661] kthread+0x17b/0x1b0 [ 32.302872] ? kthread_complete_and_exit+0x30/0x30 [ 32.303140] ret_from_fork+0x22/0x30 [ 32.303341] </TASK> [ 32.303727] [ 32.303855] Allocated by task 269: [ 32.304051] kasan_save_stack+0x41/0x70 [ 32.304333] kasan_set_track+0x25/0x40 [ 32.304676] kasan_save_alloc_info+0x1e/0x30 [ 32.304921] __kasan_kmalloc+0xb6/0xc0 [ 32.305103] kmalloc_trace+0x48/0xb0 [ 32.305282] kasan_bitops_generic+0x86/0x120 [ 32.305531] kunit_try_run_case+0x8f/0xd0 [ 32.305767] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.306333] kthread+0x17b/0x1b0 [ 32.306566] ret_from_fork+0x22/0x30 [ 32.306742] [ 32.306853] The buggy address belongs to the object at ffff888102f54b60 [ 32.306853] which belongs to the cache kmalloc-16 of size 16 [ 32.307776] The buggy address is located 8 bytes inside of [ 32.307776] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.308267] [ 32.308506] The buggy address belongs to the physical page: [ 32.308736] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.309173] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.309411] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.309943] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.310264] page dumped because: kasan: bad access detected [ 32.310622] [ 32.310787] Memory state around the buggy address: [ 32.311005] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.311602] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.311929] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.312223] ^ [ 32.312598] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.312939] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.313311] ================================================================== [ 32.227592] ================================================================== [ 32.230201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x5a0 [ 32.230964] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.232506] [ 32.233105] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.234538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.234940] Call Trace: [ 32.235108] <TASK> [ 32.235249] dump_stack_lvl+0x49/0x62 [ 32.235824] print_report+0x189/0x492 [ 32.236031] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.236567] ? kasan_bitops_modify.constprop.0+0x9c/0x5a0 [ 32.236856] kasan_report+0x10c/0x190 [ 32.237125] ? kasan_bitops_modify.constprop.0+0x9c/0x5a0 [ 32.237576] kasan_check_range+0x10b/0x1c0 [ 32.237816] __kasan_check_write+0x14/0x20 [ 32.238048] kasan_bitops_modify.constprop.0+0x9c/0x5a0 [ 32.238357] ? kasan_test_exit+0xe0/0xe0 [ 32.238587] ? kasan_set_track+0x25/0x40 [ 32.238924] ? kasan_save_alloc_info+0x1e/0x30 [ 32.239185] ? __kasan_kmalloc+0xb6/0xc0 [ 32.239771] kasan_bitops_generic+0xa1/0x120 [ 32.240140] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.240636] ? kasan_test_init+0x13e/0x1b0 [ 32.241122] kunit_try_run_case+0x8f/0xd0 [ 32.241489] ? kunit_catch_run_case+0x80/0x80 [ 32.241716] ? kunit_try_catch_throw+0x40/0x40 [ 32.242254] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.242654] kthread+0x17b/0x1b0 [ 32.243070] ? kthread_complete_and_exit+0x30/0x30 [ 32.243757] ret_from_fork+0x22/0x30 [ 32.244218] </TASK> [ 32.244612] [ 32.244712] Allocated by task 269: [ 32.244858] kasan_save_stack+0x41/0x70 [ 32.245053] kasan_set_track+0x25/0x40 [ 32.245257] kasan_save_alloc_info+0x1e/0x30 [ 32.245522] __kasan_kmalloc+0xb6/0xc0 [ 32.245829] kmalloc_trace+0x48/0xb0 [ 32.245997] kasan_bitops_generic+0x86/0x120 [ 32.246254] kunit_try_run_case+0x8f/0xd0 [ 32.246932] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.247364] kthread+0x17b/0x1b0 [ 32.247686] ret_from_fork+0x22/0x30 [ 32.248013] [ 32.248114] The buggy address belongs to the object at ffff888102f54b60 [ 32.248114] which belongs to the cache kmalloc-16 of size 16 [ 32.249031] The buggy address is located 8 bytes inside of [ 32.249031] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.249803] [ 32.249903] The buggy address belongs to the physical page: [ 32.250356] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.250875] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.251336] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.251817] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.252276] page dumped because: kasan: bad access detected [ 32.252685] [ 32.252800] Memory state around the buggy address: [ 32.253072] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.253366] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.253794] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.254198] ^ [ 32.254496] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.254869] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.255186] ==================================================================