Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 107.866979] ================================================================== [ 107.867550] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0x770 [ 107.868419] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.869112] [ 107.869331] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.870085] Hardware name: linux,dummy-virt (DT) [ 107.870481] Call trace: [ 107.870785] dump_backtrace+0xe0/0x134 [ 107.871200] show_stack+0x20/0x2c [ 107.871590] dump_stack_lvl+0x88/0xb4 [ 107.872071] print_report+0x158/0x44c [ 107.872477] kasan_report+0xc8/0x180 [ 107.872907] __asan_load8+0x80/0xac [ 107.873310] kasan_bitops_test_and_modify.constprop.0+0x1e4/0x770 [ 107.873927] kasan_bitops_generic+0xc0/0x140 [ 107.874370] kunit_try_run_case+0x8c/0x124 [ 107.874881] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.875435] kthread+0x15c/0x170 [ 107.875842] ret_from_fork+0x10/0x20 [ 107.876290] [ 107.876492] Allocated by task 249: [ 107.876840] kasan_save_stack+0x3c/0x70 [ 107.877328] kasan_set_track+0x2c/0x40 [ 107.877729] kasan_save_alloc_info+0x24/0x34 [ 107.878218] __kasan_kmalloc+0xd4/0xe0 [ 107.878619] kmalloc_trace+0x8c/0x150 [ 107.879057] kasan_bitops_generic+0x98/0x140 [ 107.879522] kunit_try_run_case+0x8c/0x124 [ 107.880008] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.880579] kthread+0x15c/0x170 [ 107.881016] ret_from_fork+0x10/0x20 [ 107.881450] [ 107.881686] The buggy address belongs to the object at ffff0000c66ab600 [ 107.881686] which belongs to the cache kmalloc-128 of size 128 [ 107.882635] The buggy address is located 8 bytes inside of [ 107.882635] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.883550] [ 107.883787] The buggy address belongs to the physical page: [ 107.884265] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.885056] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.885736] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.886396] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.887035] page dumped because: kasan: bad access detected [ 107.887512] [ 107.887715] Memory state around the buggy address: [ 107.888146] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.888803] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.889413] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.890010] ^ [ 107.890375] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.890999] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.891601] ================================================================== [ 107.812051] ================================================================== [ 107.812918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x190/0x770 [ 107.813711] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.814305] [ 107.814513] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.815192] Hardware name: linux,dummy-virt (DT) [ 107.815619] Call trace: [ 107.815897] dump_backtrace+0xe0/0x134 [ 107.816357] show_stack+0x20/0x2c [ 107.816795] dump_stack_lvl+0x88/0xb4 [ 107.817231] print_report+0x158/0x44c [ 107.817641] kasan_report+0xc8/0x180 [ 107.818089] kasan_check_range+0xe4/0x190 [ 107.818522] __kasan_check_write+0x28/0x3c [ 107.819034] kasan_bitops_test_and_modify.constprop.0+0x190/0x770 [ 107.819605] kasan_bitops_generic+0xc0/0x140 [ 107.820066] kunit_try_run_case+0x8c/0x124 [ 107.821226] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.821765] kthread+0x15c/0x170 [ 107.822386] ret_from_fork+0x10/0x20 [ 107.822853] [ 107.823054] Allocated by task 249: [ 107.823372] kasan_save_stack+0x3c/0x70 [ 107.823862] kasan_set_track+0x2c/0x40 [ 107.824350] kasan_save_alloc_info+0x24/0x34 [ 107.824897] __kasan_kmalloc+0xd4/0xe0 [ 107.825378] kmalloc_trace+0x8c/0x150 [ 107.825805] kasan_bitops_generic+0x98/0x140 [ 107.826282] kunit_try_run_case+0x8c/0x124 [ 107.826758] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.827330] kthread+0x15c/0x170 [ 107.827820] ret_from_fork+0x10/0x20 [ 107.828233] [ 107.828469] The buggy address belongs to the object at ffff0000c66ab600 [ 107.828469] which belongs to the cache kmalloc-128 of size 128 [ 107.829546] The buggy address is located 8 bytes inside of [ 107.829546] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.830606] [ 107.830922] The buggy address belongs to the physical page: [ 107.831495] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.832379] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.833235] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.833983] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.834585] page dumped because: kasan: bad access detected [ 107.835158] [ 107.835355] Memory state around the buggy address: [ 107.836004] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.836606] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.837309] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.837996] ^ [ 107.838447] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.839150] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.839817] ================================================================== [ 107.683027] ================================================================== [ 107.683543] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xcc/0x770 [ 107.684482] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.685111] [ 107.685361] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.686047] Hardware name: linux,dummy-virt (DT) [ 107.686516] Call trace: [ 107.686799] dump_backtrace+0xe0/0x134 [ 107.687213] show_stack+0x20/0x2c [ 107.687607] dump_stack_lvl+0x88/0xb4 [ 107.688115] print_report+0x158/0x44c [ 107.688527] kasan_report+0xc8/0x180 [ 107.688968] __asan_load8+0x80/0xac [ 107.689382] kasan_bitops_test_and_modify.constprop.0+0xcc/0x770 [ 107.689997] kasan_bitops_generic+0xc0/0x140 [ 107.690454] kunit_try_run_case+0x8c/0x124 [ 107.690905] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.691499] kthread+0x15c/0x170 [ 107.691912] ret_from_fork+0x10/0x20 [ 107.692313] [ 107.692515] Allocated by task 249: [ 107.692851] kasan_save_stack+0x3c/0x70 [ 107.693277] kasan_set_track+0x2c/0x40 [ 107.693714] kasan_save_alloc_info+0x24/0x34 [ 107.694194] __kasan_kmalloc+0xd4/0xe0 [ 107.694635] kmalloc_trace+0x8c/0x150 [ 107.695080] kasan_bitops_generic+0x98/0x140 [ 107.695536] kunit_try_run_case+0x8c/0x124 [ 107.695993] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.696583] kthread+0x15c/0x170 [ 107.697026] ret_from_fork+0x10/0x20 [ 107.697415] [ 107.697614] The buggy address belongs to the object at ffff0000c66ab600 [ 107.697614] which belongs to the cache kmalloc-128 of size 128 [ 107.698541] The buggy address is located 8 bytes inside of [ 107.698541] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.699425] [ 107.699651] The buggy address belongs to the physical page: [ 107.700133] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.700894] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.701580] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.702222] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.702820] page dumped because: kasan: bad access detected [ 107.703289] [ 107.703503] Memory state around the buggy address: [ 107.703916] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.704552] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.705178] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.705774] ^ [ 107.706132] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.706762] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.707342] ================================================================== [ 107.708564] ================================================================== [ 107.709170] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf8/0x770 [ 107.710042] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.710637] [ 107.710860] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.711588] Hardware name: linux,dummy-virt (DT) [ 107.712023] Call trace: [ 107.712288] dump_backtrace+0xe0/0x134 [ 107.712718] show_stack+0x20/0x2c [ 107.713123] dump_stack_lvl+0x88/0xb4 [ 107.713584] print_report+0x158/0x44c [ 107.714019] kasan_report+0xc8/0x180 [ 107.714456] kasan_check_range+0xe4/0x190 [ 107.714911] __kasan_check_write+0x28/0x3c [ 107.715386] kasan_bitops_test_and_modify.constprop.0+0xf8/0x770 [ 107.715987] kasan_bitops_generic+0xc0/0x140 [ 107.716474] kunit_try_run_case+0x8c/0x124 [ 107.716978] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.717715] kthread+0x15c/0x170 [ 107.718175] ret_from_fork+0x10/0x20 [ 107.718621] [ 107.718818] Allocated by task 249: [ 107.719453] kasan_save_stack+0x3c/0x70 [ 107.720015] kasan_set_track+0x2c/0x40 [ 107.720561] kasan_save_alloc_info+0x24/0x34 [ 107.721176] __kasan_kmalloc+0xd4/0xe0 [ 107.721721] kmalloc_trace+0x8c/0x150 [ 107.722261] kasan_bitops_generic+0x98/0x140 [ 107.722833] kunit_try_run_case+0x8c/0x124 [ 107.723449] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.724125] kthread+0x15c/0x170 [ 107.724637] ret_from_fork+0x10/0x20 [ 107.725096] [ 107.725301] The buggy address belongs to the object at ffff0000c66ab600 [ 107.725301] which belongs to the cache kmalloc-128 of size 128 [ 107.726225] The buggy address is located 8 bytes inside of [ 107.726225] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.727136] [ 107.727339] The buggy address belongs to the physical page: [ 107.727811] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.728568] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.729209] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.729877] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.730484] page dumped because: kasan: bad access detected [ 107.730970] [ 107.731166] Memory state around the buggy address: [ 107.731634] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.732267] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.732892] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.733478] ^ [ 107.733842] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.734463] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.735058] ================================================================== [ 107.892590] ================================================================== [ 107.893142] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x210/0x770 [ 107.893963] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.894590] [ 107.894817] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.895513] Hardware name: linux,dummy-virt (DT) [ 107.895931] Call trace: [ 107.896209] dump_backtrace+0xe0/0x134 [ 107.896695] show_stack+0x20/0x2c [ 107.897142] dump_stack_lvl+0x88/0xb4 [ 107.897621] print_report+0x158/0x44c [ 107.898054] kasan_report+0xc8/0x180 [ 107.898488] kasan_check_range+0xe4/0x190 [ 107.898945] __kasan_check_write+0x28/0x3c [ 107.899425] kasan_bitops_test_and_modify.constprop.0+0x210/0x770 [ 107.900011] kasan_bitops_generic+0xc0/0x140 [ 107.900452] kunit_try_run_case+0x8c/0x124 [ 107.900910] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.901484] kthread+0x15c/0x170 [ 107.901943] ret_from_fork+0x10/0x20 [ 107.902346] [ 107.902558] Allocated by task 249: [ 107.902897] kasan_save_stack+0x3c/0x70 [ 107.903346] kasan_set_track+0x2c/0x40 [ 107.903806] kasan_save_alloc_info+0x24/0x34 [ 107.904281] __kasan_kmalloc+0xd4/0xe0 [ 107.904726] kmalloc_trace+0x8c/0x150 [ 107.905157] kasan_bitops_generic+0x98/0x140 [ 107.905630] kunit_try_run_case+0x8c/0x124 [ 107.906133] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.906757] kthread+0x15c/0x170 [ 107.907153] ret_from_fork+0x10/0x20 [ 107.907579] [ 107.907798] The buggy address belongs to the object at ffff0000c66ab600 [ 107.907798] which belongs to the cache kmalloc-128 of size 128 [ 107.908753] The buggy address is located 8 bytes inside of [ 107.908753] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.909671] [ 107.909917] The buggy address belongs to the physical page: [ 107.910392] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.911169] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.911831] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.912510] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.913158] page dumped because: kasan: bad access detected [ 107.913641] [ 107.913862] Memory state around the buggy address: [ 107.914308] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.914934] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.915581] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.916182] ^ [ 107.916561] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.917210] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.917812] ================================================================== [ 107.761057] ================================================================== [ 107.761660] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x138/0x770 [ 107.762481] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.763080] [ 107.763316] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.764043] Hardware name: linux,dummy-virt (DT) [ 107.764509] Call trace: [ 107.764789] dump_backtrace+0xe0/0x134 [ 107.765216] show_stack+0x20/0x2c [ 107.765653] dump_stack_lvl+0x88/0xb4 [ 107.766158] print_report+0x158/0x44c [ 107.766573] kasan_report+0xc8/0x180 [ 107.766998] kasan_check_range+0xe4/0x190 [ 107.767442] __kasan_check_write+0x28/0x3c [ 107.767909] kasan_bitops_test_and_modify.constprop.0+0x138/0x770 [ 107.768481] kasan_bitops_generic+0xc0/0x140 [ 107.768946] kunit_try_run_case+0x8c/0x124 [ 107.769398] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.769994] kthread+0x15c/0x170 [ 107.770382] ret_from_fork+0x10/0x20 [ 107.770810] [ 107.771011] Allocated by task 249: [ 107.771341] kasan_save_stack+0x3c/0x70 [ 107.771813] kasan_set_track+0x2c/0x40 [ 107.772244] kasan_save_alloc_info+0x24/0x34 [ 107.772736] __kasan_kmalloc+0xd4/0xe0 [ 107.773180] kmalloc_trace+0x8c/0x150 [ 107.773605] kasan_bitops_generic+0x98/0x140 [ 107.774031] kunit_try_run_case+0x8c/0x124 [ 107.774487] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.775053] kthread+0x15c/0x170 [ 107.775445] ret_from_fork+0x10/0x20 [ 107.775879] [ 107.776077] The buggy address belongs to the object at ffff0000c66ab600 [ 107.776077] which belongs to the cache kmalloc-128 of size 128 [ 107.777019] The buggy address is located 8 bytes inside of [ 107.777019] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.777907] [ 107.778135] The buggy address belongs to the physical page: [ 107.778598] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.779358] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.780012] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.780659] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.781276] page dumped because: kasan: bad access detected [ 107.781759] [ 107.781948] Memory state around the buggy address: [ 107.782414] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.783036] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.783635] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.784214] ^ [ 107.784572] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.785204] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.785800] ================================================================== [ 107.786854] ================================================================== [ 107.787452] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x164/0x770 [ 107.788324] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.788988] [ 107.789232] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.789938] Hardware name: linux,dummy-virt (DT) [ 107.790327] Call trace: [ 107.790596] dump_backtrace+0xe0/0x134 [ 107.791074] show_stack+0x20/0x2c [ 107.791459] dump_stack_lvl+0x88/0xb4 [ 107.791908] print_report+0x158/0x44c [ 107.792332] kasan_report+0xc8/0x180 [ 107.792777] __asan_load8+0x80/0xac [ 107.793178] kasan_bitops_test_and_modify.constprop.0+0x164/0x770 [ 107.793757] kasan_bitops_generic+0xc0/0x140 [ 107.794227] kunit_try_run_case+0x8c/0x124 [ 107.794665] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.795223] kthread+0x15c/0x170 [ 107.795610] ret_from_fork+0x10/0x20 [ 107.796045] [ 107.796270] Allocated by task 249: [ 107.796619] kasan_save_stack+0x3c/0x70 [ 107.797100] kasan_set_track+0x2c/0x40 [ 107.797524] kasan_save_alloc_info+0x24/0x34 [ 107.797988] __kasan_kmalloc+0xd4/0xe0 [ 107.798436] kmalloc_trace+0x8c/0x150 [ 107.798876] kasan_bitops_generic+0x98/0x140 [ 107.799345] kunit_try_run_case+0x8c/0x124 [ 107.799832] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.800380] kthread+0x15c/0x170 [ 107.800825] ret_from_fork+0x10/0x20 [ 107.801250] [ 107.801457] The buggy address belongs to the object at ffff0000c66ab600 [ 107.801457] which belongs to the cache kmalloc-128 of size 128 [ 107.802413] The buggy address is located 8 bytes inside of [ 107.802413] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.803266] [ 107.803497] The buggy address belongs to the physical page: [ 107.803974] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.804758] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.805394] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.806028] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.806649] page dumped because: kasan: bad access detected [ 107.807125] [ 107.807313] Memory state around the buggy address: [ 107.807753] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.808387] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.809004] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.809576] ^ [ 107.809943] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.810568] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.811144] ================================================================== [ 107.841132] ================================================================== [ 107.841692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1bc/0x770 [ 107.842589] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.843353] [ 107.843565] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.844350] Hardware name: linux,dummy-virt (DT) [ 107.844831] Call trace: [ 107.845101] dump_backtrace+0xe0/0x134 [ 107.845539] show_stack+0x20/0x2c [ 107.845942] dump_stack_lvl+0x88/0xb4 [ 107.846381] print_report+0x158/0x44c [ 107.846801] kasan_report+0xc8/0x180 [ 107.847191] __asan_load8+0x80/0xac [ 107.847594] kasan_bitops_test_and_modify.constprop.0+0x1bc/0x770 [ 107.848193] kasan_bitops_generic+0xc0/0x140 [ 107.848657] kunit_try_run_case+0x8c/0x124 [ 107.849154] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.849718] kthread+0x15c/0x170 [ 107.850135] ret_from_fork+0x10/0x20 [ 107.850573] [ 107.850788] Allocated by task 249: [ 107.851113] kasan_save_stack+0x3c/0x70 [ 107.851572] kasan_set_track+0x2c/0x40 [ 107.851981] kasan_save_alloc_info+0x24/0x34 [ 107.852474] __kasan_kmalloc+0xd4/0xe0 [ 107.852922] kmalloc_trace+0x8c/0x150 [ 107.853349] kasan_bitops_generic+0x98/0x140 [ 107.853818] kunit_try_run_case+0x8c/0x124 [ 107.854326] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.854877] kthread+0x15c/0x170 [ 107.855234] ret_from_fork+0x10/0x20 [ 107.855594] [ 107.855930] The buggy address belongs to the object at ffff0000c66ab600 [ 107.855930] which belongs to the cache kmalloc-128 of size 128 [ 107.856899] The buggy address is located 8 bytes inside of [ 107.856899] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.857820] [ 107.858070] The buggy address belongs to the physical page: [ 107.858554] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.859334] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.860006] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.860668] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.861307] page dumped because: kasan: bad access detected [ 107.861787] [ 107.861985] Memory state around the buggy address: [ 107.862424] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.863068] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.863682] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.864286] ^ [ 107.864645] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.865297] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.865897] ================================================================== [ 107.735898] ================================================================== [ 107.736455] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x100/0x770 [ 107.737262] Read of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.737930] [ 107.738154] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.738801] Hardware name: linux,dummy-virt (DT) [ 107.739238] Call trace: [ 107.739518] dump_backtrace+0xe0/0x134 [ 107.739986] show_stack+0x20/0x2c [ 107.740386] dump_stack_lvl+0x88/0xb4 [ 107.740884] print_report+0x158/0x44c [ 107.741327] kasan_report+0xc8/0x180 [ 107.741733] __asan_load8+0x80/0xac [ 107.742162] kasan_bitops_test_and_modify.constprop.0+0x100/0x770 [ 107.742737] kasan_bitops_generic+0xc0/0x140 [ 107.743214] kunit_try_run_case+0x8c/0x124 [ 107.743664] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.744223] kthread+0x15c/0x170 [ 107.744606] ret_from_fork+0x10/0x20 [ 107.745013] [ 107.745227] Allocated by task 249: [ 107.745571] kasan_save_stack+0x3c/0x70 [ 107.746053] kasan_set_track+0x2c/0x40 [ 107.746462] kasan_save_alloc_info+0x24/0x34 [ 107.746969] __kasan_kmalloc+0xd4/0xe0 [ 107.747403] kmalloc_trace+0x8c/0x150 [ 107.747848] kasan_bitops_generic+0x98/0x140 [ 107.748313] kunit_try_run_case+0x8c/0x124 [ 107.748759] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.749300] kthread+0x15c/0x170 [ 107.749713] ret_from_fork+0x10/0x20 [ 107.750133] [ 107.750328] The buggy address belongs to the object at ffff0000c66ab600 [ 107.750328] which belongs to the cache kmalloc-128 of size 128 [ 107.751255] The buggy address is located 8 bytes inside of [ 107.751255] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.752143] [ 107.752348] The buggy address belongs to the physical page: [ 107.752823] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.753588] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.754264] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.754925] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.755547] page dumped because: kasan: bad access detected [ 107.756025] [ 107.756251] Memory state around the buggy address: [ 107.756714] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.757317] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.757965] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.758555] ^ [ 107.758915] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.759535] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.760135] ================================================================== [ 107.648637] ================================================================== [ 107.649534] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa4/0x770 [ 107.650626] Write of size 8 at addr ffff0000c66ab608 by task kunit_try_catch/249 [ 107.651134] [ 107.651332] CPU: 1 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.652045] Hardware name: linux,dummy-virt (DT) [ 107.652681] Call trace: [ 107.653072] dump_backtrace+0xe0/0x134 [ 107.653700] show_stack+0x20/0x2c [ 107.654249] dump_stack_lvl+0x88/0xb4 [ 107.655058] print_report+0x158/0x44c [ 107.655647] kasan_report+0xc8/0x180 [ 107.656252] kasan_check_range+0xe4/0x190 [ 107.656887] __kasan_check_write+0x28/0x3c [ 107.657538] kasan_bitops_test_and_modify.constprop.0+0xa4/0x770 [ 107.658356] kasan_bitops_generic+0xc0/0x140 [ 107.658986] kunit_try_run_case+0x8c/0x124 [ 107.659622] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.660434] kthread+0x15c/0x170 [ 107.661036] ret_from_fork+0x10/0x20 [ 107.661629] [ 107.661959] Allocated by task 249: [ 107.662453] kasan_save_stack+0x3c/0x70 [ 107.663099] kasan_set_track+0x2c/0x40 [ 107.663530] kasan_save_alloc_info+0x24/0x34 [ 107.663958] __kasan_kmalloc+0xd4/0xe0 [ 107.664337] kmalloc_trace+0x8c/0x150 [ 107.664700] kasan_bitops_generic+0x98/0x140 [ 107.665324] kunit_try_run_case+0x8c/0x124 [ 107.665958] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.666726] kthread+0x15c/0x170 [ 107.667281] ret_from_fork+0x10/0x20 [ 107.667877] [ 107.668151] The buggy address belongs to the object at ffff0000c66ab600 [ 107.668151] which belongs to the cache kmalloc-128 of size 128 [ 107.669759] The buggy address is located 8 bytes inside of [ 107.669759] 128-byte region [ffff0000c66ab600, ffff0000c66ab680) [ 107.671236] [ 107.671524] The buggy address belongs to the physical page: [ 107.672288] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.673401] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.674348] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.675316] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.676235] page dumped because: kasan: bad access detected [ 107.677001] [ 107.677205] Memory state around the buggy address: [ 107.677859] ffff0000c66ab500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 107.678814] ffff0000c66ab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.679781] >ffff0000c66ab600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.680622] ^ [ 107.680944] ffff0000c66ab680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.681432] ffff0000c66ab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.681946] ==================================================================
[ 75.168600] ================================================================== [ 75.169128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x130/0x760 [ 75.170032] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.171317] [ 75.171563] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.172257] Hardware name: linux,dummy-virt (DT) [ 75.172670] Call trace: [ 75.172925] dump_backtrace.part.0+0xdc/0xf0 [ 75.173418] show_stack+0x18/0x30 [ 75.173826] dump_stack_lvl+0x64/0x80 [ 75.174218] print_report+0x158/0x438 [ 75.174679] kasan_report+0xb4/0xf4 [ 75.175060] kasan_check_range+0xe4/0x190 [ 75.175512] __kasan_check_write+0x28/0x3c [ 75.175967] kasan_bitops_test_and_modify.constprop.0+0x130/0x760 [ 75.176561] kasan_bitops_generic+0xb8/0x13c [ 75.177037] kunit_try_run_case+0x84/0x120 [ 75.177497] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.178011] kthread+0x180/0x190 [ 75.178379] ret_from_fork+0x10/0x20 [ 75.178792] [ 75.178993] Allocated by task 165: [ 75.179323] kasan_save_stack+0x3c/0x70 [ 75.179760] kasan_set_track+0x2c/0x40 [ 75.180180] kasan_save_alloc_info+0x24/0x34 [ 75.180665] __kasan_kmalloc+0xb8/0xc0 [ 75.181055] kmalloc_trace+0x58/0x6c [ 75.181474] kasan_bitops_generic+0x90/0x13c [ 75.181914] kunit_try_run_case+0x84/0x120 [ 75.182354] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.182901] kthread+0x180/0x190 [ 75.183251] ret_from_fork+0x10/0x20 [ 75.183704] [ 75.183881] The buggy address belongs to the object at ffff0000c5840b00 [ 75.183881] which belongs to the cache kmalloc-128 of size 128 [ 75.184796] The buggy address is located 8 bytes inside of [ 75.184796] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.185666] [ 75.185854] The buggy address belongs to the physical page: [ 75.186310] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.187084] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.187744] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.188378] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.188982] page dumped because: kasan: bad access detected [ 75.189430] [ 75.189618] Memory state around the buggy address: [ 75.190015] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.190633] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.191219] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.191809] ^ [ 75.192158] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.192775] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.193344] ================================================================== [ 75.219513] ================================================================== [ 75.220040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x188/0x760 [ 75.220882] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.221502] [ 75.221714] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.222450] Hardware name: linux,dummy-virt (DT) [ 75.222880] Call trace: [ 75.223100] dump_backtrace.part.0+0xdc/0xf0 [ 75.223648] show_stack+0x18/0x30 [ 75.224062] dump_stack_lvl+0x64/0x80 [ 75.224519] print_report+0x158/0x438 [ 75.224984] kasan_report+0xb4/0xf4 [ 75.225401] kasan_check_range+0xe4/0x190 [ 75.225886] __kasan_check_write+0x28/0x3c [ 75.226332] kasan_bitops_test_and_modify.constprop.0+0x188/0x760 [ 75.226948] kasan_bitops_generic+0xb8/0x13c [ 75.227435] kunit_try_run_case+0x84/0x120 [ 75.227910] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.228472] kthread+0x180/0x190 [ 75.228847] ret_from_fork+0x10/0x20 [ 75.229262] [ 75.229477] Allocated by task 165: [ 75.229772] kasan_save_stack+0x3c/0x70 [ 75.230216] kasan_set_track+0x2c/0x40 [ 75.230642] kasan_save_alloc_info+0x24/0x34 [ 75.231101] __kasan_kmalloc+0xb8/0xc0 [ 75.231515] kmalloc_trace+0x58/0x6c [ 75.231929] kasan_bitops_generic+0x90/0x13c [ 75.232381] kunit_try_run_case+0x84/0x120 [ 75.232843] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.233389] kthread+0x180/0x190 [ 75.233769] ret_from_fork+0x10/0x20 [ 75.234176] [ 75.234358] The buggy address belongs to the object at ffff0000c5840b00 [ 75.234358] which belongs to the cache kmalloc-128 of size 128 [ 75.235284] The buggy address is located 8 bytes inside of [ 75.235284] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.236152] [ 75.236338] The buggy address belongs to the physical page: [ 75.236820] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.237588] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.238232] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.238870] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.239483] page dumped because: kasan: bad access detected [ 75.239946] [ 75.240138] Memory state around the buggy address: [ 75.240567] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.241154] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.241745] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.242317] ^ [ 75.242653] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.243265] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.243882] ================================================================== [ 75.245017] ================================================================== [ 75.245597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1b4/0x760 [ 75.246451] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.246989] [ 75.247224] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.247928] Hardware name: linux,dummy-virt (DT) [ 75.248341] Call trace: [ 75.248599] dump_backtrace.part.0+0xdc/0xf0 [ 75.249154] show_stack+0x18/0x30 [ 75.249582] dump_stack_lvl+0x64/0x80 [ 75.249963] print_report+0x158/0x438 [ 75.250401] kasan_report+0xb4/0xf4 [ 75.250794] __asan_load8+0x80/0xac [ 75.251184] kasan_bitops_test_and_modify.constprop.0+0x1b4/0x760 [ 75.251771] kasan_bitops_generic+0xb8/0x13c [ 75.252224] kunit_try_run_case+0x84/0x120 [ 75.252692] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.253218] kthread+0x180/0x190 [ 75.253611] ret_from_fork+0x10/0x20 [ 75.254017] [ 75.254190] Allocated by task 165: [ 75.254553] kasan_save_stack+0x3c/0x70 [ 75.254973] kasan_set_track+0x2c/0x40 [ 75.255361] kasan_save_alloc_info+0x24/0x34 [ 75.255826] __kasan_kmalloc+0xb8/0xc0 [ 75.256210] kmalloc_trace+0x58/0x6c [ 75.256626] kasan_bitops_generic+0x90/0x13c [ 75.257107] kunit_try_run_case+0x84/0x120 [ 75.257550] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.258064] kthread+0x180/0x190 [ 75.258438] ret_from_fork+0x10/0x20 [ 75.258837] [ 75.259022] The buggy address belongs to the object at ffff0000c5840b00 [ 75.259022] which belongs to the cache kmalloc-128 of size 128 [ 75.259915] The buggy address is located 8 bytes inside of [ 75.259915] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.260767] [ 75.260962] The buggy address belongs to the physical page: [ 75.261402] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.262122] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.262771] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.263374] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.263987] page dumped because: kasan: bad access detected [ 75.264439] [ 75.264624] Memory state around the buggy address: [ 75.265034] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.265637] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.266189] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.266786] ^ [ 75.267127] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.267759] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.268333] ================================================================== [ 75.293915] ================================================================== [ 75.294496] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x208/0x760 [ 75.295271] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.295889] [ 75.296080] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.296751] Hardware name: linux,dummy-virt (DT) [ 75.297169] Call trace: [ 75.297450] dump_backtrace.part.0+0xdc/0xf0 [ 75.297991] show_stack+0x18/0x30 [ 75.298440] dump_stack_lvl+0x64/0x80 [ 75.298867] print_report+0x158/0x438 [ 75.299283] kasan_report+0xb4/0xf4 [ 75.299681] kasan_check_range+0xe4/0x190 [ 75.300116] __kasan_check_write+0x28/0x3c [ 75.300566] kasan_bitops_test_and_modify.constprop.0+0x208/0x760 [ 75.301162] kasan_bitops_generic+0xb8/0x13c [ 75.301656] kunit_try_run_case+0x84/0x120 [ 75.302080] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.302626] kthread+0x180/0x190 [ 75.302999] ret_from_fork+0x10/0x20 [ 75.303405] [ 75.303598] Allocated by task 165: [ 75.303937] kasan_save_stack+0x3c/0x70 [ 75.304354] kasan_set_track+0x2c/0x40 [ 75.304771] kasan_save_alloc_info+0x24/0x34 [ 75.305227] __kasan_kmalloc+0xb8/0xc0 [ 75.305643] kmalloc_trace+0x58/0x6c [ 75.306044] kasan_bitops_generic+0x90/0x13c [ 75.306505] kunit_try_run_case+0x84/0x120 [ 75.306948] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.307471] kthread+0x180/0x190 [ 75.307852] ret_from_fork+0x10/0x20 [ 75.308258] [ 75.308468] The buggy address belongs to the object at ffff0000c5840b00 [ 75.308468] which belongs to the cache kmalloc-128 of size 128 [ 75.309361] The buggy address is located 8 bytes inside of [ 75.309361] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.310228] [ 75.310462] The buggy address belongs to the physical page: [ 75.310890] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.311658] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.312311] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.312963] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.313580] page dumped because: kasan: bad access detected [ 75.314034] [ 75.314229] Memory state around the buggy address: [ 75.314675] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.315235] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.315862] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.316444] ^ [ 75.316796] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.317412] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.317976] ================================================================== [ 75.140836] ================================================================== [ 75.141361] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf8/0x760 [ 75.142266] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.142955] [ 75.143185] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.143935] Hardware name: linux,dummy-virt (DT) [ 75.144344] Call trace: [ 75.144607] dump_backtrace.part.0+0xdc/0xf0 [ 75.145117] show_stack+0x18/0x30 [ 75.145588] dump_stack_lvl+0x64/0x80 [ 75.146797] print_report+0x158/0x438 [ 75.147219] kasan_report+0xb4/0xf4 [ 75.147644] __asan_load8+0x80/0xac [ 75.148042] kasan_bitops_test_and_modify.constprop.0+0xf8/0x760 [ 75.148694] kasan_bitops_generic+0xb8/0x13c [ 75.149170] kunit_try_run_case+0x84/0x120 [ 75.149634] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.150359] kthread+0x180/0x190 [ 75.150756] ret_from_fork+0x10/0x20 [ 75.151147] [ 75.151317] Allocated by task 165: [ 75.151674] kasan_save_stack+0x3c/0x70 [ 75.152076] kasan_set_track+0x2c/0x40 [ 75.152609] kasan_save_alloc_info+0x24/0x34 [ 75.153090] __kasan_kmalloc+0xb8/0xc0 [ 75.153501] kmalloc_trace+0x58/0x6c [ 75.154457] kasan_bitops_generic+0x90/0x13c [ 75.154960] kunit_try_run_case+0x84/0x120 [ 75.155421] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.155948] kthread+0x180/0x190 [ 75.156327] ret_from_fork+0x10/0x20 [ 75.156732] [ 75.156927] The buggy address belongs to the object at ffff0000c5840b00 [ 75.156927] which belongs to the cache kmalloc-128 of size 128 [ 75.158154] The buggy address is located 8 bytes inside of [ 75.158154] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.159040] [ 75.159245] The buggy address belongs to the physical page: [ 75.159688] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.160451] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.161116] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.162371] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.162973] page dumped because: kasan: bad access detected [ 75.163470] [ 75.163663] Memory state around the buggy address: [ 75.164060] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.164657] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.165269] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.166156] ^ [ 75.166517] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.167080] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.167696] ================================================================== [ 75.053567] ================================================================== [ 75.054173] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x760 [ 75.055269] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.055839] [ 75.056072] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.056749] Hardware name: linux,dummy-virt (DT) [ 75.057134] Call trace: [ 75.057388] dump_backtrace.part.0+0xdc/0xf0 [ 75.058469] show_stack+0x18/0x30 [ 75.058906] dump_stack_lvl+0x64/0x80 [ 75.059289] print_report+0x158/0x438 [ 75.059743] kasan_report+0xb4/0xf4 [ 75.060141] kasan_check_range+0xe4/0x190 [ 75.060605] __kasan_check_write+0x28/0x3c [ 75.061063] kasan_bitops_test_and_modify.constprop.0+0x9c/0x760 [ 75.061652] kasan_bitops_generic+0xb8/0x13c [ 75.062146] kunit_try_run_case+0x84/0x120 [ 75.062591] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.063155] kthread+0x180/0x190 [ 75.063890] ret_from_fork+0x10/0x20 [ 75.064297] [ 75.064512] Allocated by task 165: [ 75.064869] kasan_save_stack+0x3c/0x70 [ 75.065279] kasan_set_track+0x2c/0x40 [ 75.065685] kasan_save_alloc_info+0x24/0x34 [ 75.066416] __kasan_kmalloc+0xb8/0xc0 [ 75.066841] kmalloc_trace+0x58/0x6c [ 75.067261] kasan_bitops_generic+0x90/0x13c [ 75.067693] kunit_try_run_case+0x84/0x120 [ 75.068190] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.068815] kthread+0x180/0x190 [ 75.069176] ret_from_fork+0x10/0x20 [ 75.069605] [ 75.069823] The buggy address belongs to the object at ffff0000c5840b00 [ 75.069823] which belongs to the cache kmalloc-128 of size 128 [ 75.071154] The buggy address is located 8 bytes inside of [ 75.071154] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.072115] [ 75.072335] The buggy address belongs to the physical page: [ 75.072805] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.073558] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.074901] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.075560] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.076218] page dumped because: kasan: bad access detected [ 75.076688] [ 75.076859] Memory state around the buggy address: [ 75.077290] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.078305] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.078911] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.079348] ^ [ 75.079998] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.081204] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.081666] ================================================================== [ 75.194690] ================================================================== [ 75.195264] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x15c/0x760 [ 75.196085] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.196619] [ 75.196847] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.197563] Hardware name: linux,dummy-virt (DT) [ 75.197961] Call trace: [ 75.198223] dump_backtrace.part.0+0xdc/0xf0 [ 75.198765] show_stack+0x18/0x30 [ 75.199174] dump_stack_lvl+0x64/0x80 [ 75.199608] print_report+0x158/0x438 [ 75.200037] kasan_report+0xb4/0xf4 [ 75.200468] __asan_load8+0x80/0xac [ 75.200872] kasan_bitops_test_and_modify.constprop.0+0x15c/0x760 [ 75.201475] kasan_bitops_generic+0xb8/0x13c [ 75.201953] kunit_try_run_case+0x84/0x120 [ 75.202415] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.202977] kthread+0x180/0x190 [ 75.203356] ret_from_fork+0x10/0x20 [ 75.203778] [ 75.203958] Allocated by task 165: [ 75.204281] kasan_save_stack+0x3c/0x70 [ 75.204698] kasan_set_track+0x2c/0x40 [ 75.205100] kasan_save_alloc_info+0x24/0x34 [ 75.205587] __kasan_kmalloc+0xb8/0xc0 [ 75.205991] kmalloc_trace+0x58/0x6c [ 75.206422] kasan_bitops_generic+0x90/0x13c [ 75.207035] kunit_try_run_case+0x84/0x120 [ 75.207482] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.208050] kthread+0x180/0x190 [ 75.208447] ret_from_fork+0x10/0x20 [ 75.208871] [ 75.209096] The buggy address belongs to the object at ffff0000c5840b00 [ 75.209096] which belongs to the cache kmalloc-128 of size 128 [ 75.210009] The buggy address is located 8 bytes inside of [ 75.210009] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.210900] [ 75.211084] The buggy address belongs to the physical page: [ 75.211566] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.212304] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.212958] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.213621] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.214224] page dumped because: kasan: bad access detected [ 75.214695] [ 75.214890] Memory state around the buggy address: [ 75.215305] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.215920] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.216514] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.217114] ^ [ 75.217463] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.218078] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.218646] ================================================================== [ 75.269352] ================================================================== [ 75.269881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1dc/0x760 [ 75.270698] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.271240] [ 75.271494] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.272209] Hardware name: linux,dummy-virt (DT) [ 75.272644] Call trace: [ 75.272900] dump_backtrace.part.0+0xdc/0xf0 [ 75.273410] show_stack+0x18/0x30 [ 75.273830] dump_stack_lvl+0x64/0x80 [ 75.274240] print_report+0x158/0x438 [ 75.274653] kasan_report+0xb4/0xf4 [ 75.275044] __asan_load8+0x80/0xac [ 75.275445] kasan_bitops_test_and_modify.constprop.0+0x1dc/0x760 [ 75.276029] kasan_bitops_generic+0xb8/0x13c [ 75.276489] kunit_try_run_case+0x84/0x120 [ 75.276958] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.277480] kthread+0x180/0x190 [ 75.277845] ret_from_fork+0x10/0x20 [ 75.278243] [ 75.278433] Allocated by task 165: [ 75.278768] kasan_save_stack+0x3c/0x70 [ 75.279192] kasan_set_track+0x2c/0x40 [ 75.279616] kasan_save_alloc_info+0x24/0x34 [ 75.280069] __kasan_kmalloc+0xb8/0xc0 [ 75.280465] kmalloc_trace+0x58/0x6c [ 75.280878] kasan_bitops_generic+0x90/0x13c [ 75.281357] kunit_try_run_case+0x84/0x120 [ 75.281819] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.282329] kthread+0x180/0x190 [ 75.282719] ret_from_fork+0x10/0x20 [ 75.283125] [ 75.283301] The buggy address belongs to the object at ffff0000c5840b00 [ 75.283301] which belongs to the cache kmalloc-128 of size 128 [ 75.284233] The buggy address is located 8 bytes inside of [ 75.284233] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.285090] [ 75.285293] The buggy address belongs to the physical page: [ 75.285744] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.286486] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.287132] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.287782] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.288374] page dumped because: kasan: bad access detected [ 75.288820] [ 75.289013] Memory state around the buggy address: [ 75.289454] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.290043] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.290626] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.291180] ^ [ 75.291512] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.292116] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.292681] ================================================================== [ 75.082331] ================================================================== [ 75.082925] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xc4/0x760 [ 75.083614] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.086014] [ 75.086293] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.086860] Hardware name: linux,dummy-virt (DT) [ 75.087182] Call trace: [ 75.087410] dump_backtrace.part.0+0xdc/0xf0 [ 75.088017] show_stack+0x18/0x30 [ 75.088577] dump_stack_lvl+0x64/0x80 [ 75.089046] print_report+0x158/0x438 [ 75.089706] kasan_report+0xb4/0xf4 [ 75.090280] __asan_load8+0x80/0xac [ 75.090830] kasan_bitops_test_and_modify.constprop.0+0xc4/0x760 [ 75.091565] kasan_bitops_generic+0xb8/0x13c [ 75.092137] kunit_try_run_case+0x84/0x120 [ 75.092597] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.093140] kthread+0x180/0x190 [ 75.093545] ret_from_fork+0x10/0x20 [ 75.094204] [ 75.094442] Allocated by task 165: [ 75.094898] kasan_save_stack+0x3c/0x70 [ 75.095340] kasan_set_track+0x2c/0x40 [ 75.095796] kasan_save_alloc_info+0x24/0x34 [ 75.096292] __kasan_kmalloc+0xb8/0xc0 [ 75.096729] kmalloc_trace+0x58/0x6c [ 75.097166] kasan_bitops_generic+0x90/0x13c [ 75.097629] kunit_try_run_case+0x84/0x120 [ 75.098637] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.099185] kthread+0x180/0x190 [ 75.099613] ret_from_fork+0x10/0x20 [ 75.100024] [ 75.100246] The buggy address belongs to the object at ffff0000c5840b00 [ 75.100246] which belongs to the cache kmalloc-128 of size 128 [ 75.101245] The buggy address is located 8 bytes inside of [ 75.101245] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.102465] [ 75.102714] The buggy address belongs to the physical page: [ 75.103203] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.104032] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.104725] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.105237] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.106429] page dumped because: kasan: bad access detected [ 75.106935] [ 75.107148] Memory state around the buggy address: [ 75.107609] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.108218] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.108861] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.109474] ^ [ 75.110208] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.110851] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.111458] ================================================================== [ 75.112420] ================================================================== [ 75.112956] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf0/0x760 [ 75.113705] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.114857] [ 75.115052] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.115791] Hardware name: linux,dummy-virt (DT) [ 75.116187] Call trace: [ 75.116441] dump_backtrace.part.0+0xdc/0xf0 [ 75.116963] show_stack+0x18/0x30 [ 75.117348] dump_stack_lvl+0x64/0x80 [ 75.117827] print_report+0x158/0x438 [ 75.118256] kasan_report+0xb4/0xf4 [ 75.119030] kasan_check_range+0xe4/0x190 [ 75.119490] __kasan_check_write+0x28/0x3c [ 75.119960] kasan_bitops_test_and_modify.constprop.0+0xf0/0x760 [ 75.120550] kasan_bitops_generic+0xb8/0x13c [ 75.121006] kunit_try_run_case+0x84/0x120 [ 75.121472] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.122650] kthread+0x180/0x190 [ 75.123052] ret_from_fork+0x10/0x20 [ 75.123494] [ 75.123685] Allocated by task 165: [ 75.124043] kasan_save_stack+0x3c/0x70 [ 75.124478] kasan_set_track+0x2c/0x40 [ 75.124882] kasan_save_alloc_info+0x24/0x34 [ 75.125326] __kasan_kmalloc+0xb8/0xc0 [ 75.125932] kmalloc_trace+0x58/0x6c [ 75.126335] kasan_bitops_generic+0x90/0x13c [ 75.126828] kunit_try_run_case+0x84/0x120 [ 75.127282] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.127857] kthread+0x180/0x190 [ 75.128422] ret_from_fork+0x10/0x20 [ 75.128842] [ 75.129021] The buggy address belongs to the object at ffff0000c5840b00 [ 75.129021] which belongs to the cache kmalloc-128 of size 128 [ 75.130494] The buggy address is located 8 bytes inside of [ 75.130494] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.131372] [ 75.131575] The buggy address belongs to the physical page: [ 75.131992] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.132788] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.133430] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.134344] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.134995] page dumped because: kasan: bad access detected [ 75.135472] [ 75.135675] Memory state around the buggy address: [ 75.136083] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.136705] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.137294] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.138473] ^ [ 75.138842] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.139405] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.140004] ==================================================================
[ 66.475318] ================================================================== [ 66.475841] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x11c/0x780 [ 66.476585] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.477103] [ 66.477321] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.478221] Hardware name: linux,dummy-virt (DT) [ 66.478622] Call trace: [ 66.478844] dump_backtrace+0x110/0x120 [ 66.479312] show_stack+0x18/0x28 [ 66.479722] dump_stack_lvl+0x68/0x84 [ 66.480091] print_report+0x158/0x484 [ 66.480483] kasan_report+0x98/0xe0 [ 66.480847] __asan_load8+0x88/0xb0 [ 66.481204] kasan_bitops_test_and_modify.constprop.4+0x11c/0x780 [ 66.481913] kasan_bitops_generic+0xb8/0x128 [ 66.482372] kunit_try_run_case+0x7c/0x120 [ 66.482802] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.483312] kthread+0x1a4/0x1b8 [ 66.483667] ret_from_fork+0x10/0x20 [ 66.484036] [ 66.484199] Allocated by task 163: [ 66.484532] kasan_save_stack+0x2c/0x58 [ 66.484921] kasan_set_track+0x2c/0x40 [ 66.485322] kasan_save_alloc_info+0x24/0x38 [ 66.485738] __kasan_kmalloc+0xa0/0xb8 [ 66.486103] kmalloc_trace+0x50/0x68 [ 66.486502] kasan_bitops_generic+0x90/0x128 [ 66.486959] kunit_try_run_case+0x7c/0x120 [ 66.487537] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.488044] kthread+0x1a4/0x1b8 [ 66.488409] ret_from_fork+0x10/0x20 [ 66.488766] [ 66.488936] The buggy address belongs to the object at ffff0000c586c700 [ 66.488936] which belongs to the cache kmalloc-128 of size 128 [ 66.490022] The buggy address is located 8 bytes inside of [ 66.490022] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.490844] [ 66.491015] The buggy address belongs to the physical page: [ 66.491445] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.492146] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.492662] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.493328] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.493947] page dumped because: kasan: bad access detected [ 66.494560] [ 66.494762] Memory state around the buggy address: [ 66.495172] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.495748] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.496337] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.496883] ^ [ 66.497193] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.498394] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.498939] ================================================================== [ 66.399977] ================================================================== [ 66.400493] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0xb0/0x780 [ 66.401305] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.402034] [ 66.402261] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.402870] Hardware name: linux,dummy-virt (DT) [ 66.403273] Call trace: [ 66.403492] dump_backtrace+0x110/0x120 [ 66.403920] show_stack+0x18/0x28 [ 66.404340] dump_stack_lvl+0x68/0x84 [ 66.404763] print_report+0x158/0x484 [ 66.405131] kasan_report+0x98/0xe0 [ 66.405650] kasan_check_range+0x160/0x1d8 [ 66.406051] __kasan_check_write+0x28/0x38 [ 66.406480] kasan_bitops_test_and_modify.constprop.4+0xb0/0x780 [ 66.407008] kasan_bitops_generic+0xb8/0x128 [ 66.407450] kunit_try_run_case+0x7c/0x120 [ 66.407863] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.408382] kthread+0x1a4/0x1b8 [ 66.408721] ret_from_fork+0x10/0x20 [ 66.409086] [ 66.409290] Allocated by task 163: [ 66.409734] kasan_save_stack+0x2c/0x58 [ 66.410145] kasan_set_track+0x2c/0x40 [ 66.410529] kasan_save_alloc_info+0x24/0x38 [ 66.410955] __kasan_kmalloc+0xa0/0xb8 [ 66.411319] kmalloc_trace+0x50/0x68 [ 66.411699] kasan_bitops_generic+0x90/0x128 [ 66.412138] kunit_try_run_case+0x7c/0x120 [ 66.412563] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.413083] kthread+0x1a4/0x1b8 [ 66.413568] ret_from_fork+0x10/0x20 [ 66.413943] [ 66.414125] The buggy address belongs to the object at ffff0000c586c700 [ 66.414125] which belongs to the cache kmalloc-128 of size 128 [ 66.414980] The buggy address is located 8 bytes inside of [ 66.414980] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.415805] [ 66.415979] The buggy address belongs to the physical page: [ 66.416394] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.417096] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.418353] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.418864] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.419323] page dumped because: kasan: bad access detected [ 66.419880] [ 66.420146] Memory state around the buggy address: [ 66.420551] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.421154] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.421732] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.422428] ^ [ 66.422706] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.423134] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.423655] ================================================================== [ 66.450616] ================================================================== [ 66.451112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x114/0x780 [ 66.451869] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.452460] [ 66.452642] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.453220] Hardware name: linux,dummy-virt (DT) [ 66.453813] Call trace: [ 66.454072] dump_backtrace+0x110/0x120 [ 66.454501] show_stack+0x18/0x28 [ 66.454910] dump_stack_lvl+0x68/0x84 [ 66.455319] print_report+0x158/0x484 [ 66.455697] kasan_report+0x98/0xe0 [ 66.456048] kasan_check_range+0x160/0x1d8 [ 66.456487] __kasan_check_write+0x28/0x38 [ 66.456933] kasan_bitops_test_and_modify.constprop.4+0x114/0x780 [ 66.457547] kasan_bitops_generic+0xb8/0x128 [ 66.457998] kunit_try_run_case+0x7c/0x120 [ 66.458577] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.459093] kthread+0x1a4/0x1b8 [ 66.459481] ret_from_fork+0x10/0x20 [ 66.459849] [ 66.460040] Allocated by task 163: [ 66.460337] kasan_save_stack+0x2c/0x58 [ 66.460694] kasan_set_track+0x2c/0x40 [ 66.461078] kasan_save_alloc_info+0x24/0x38 [ 66.461678] __kasan_kmalloc+0xa0/0xb8 [ 66.462039] kmalloc_trace+0x50/0x68 [ 66.462431] kasan_bitops_generic+0x90/0x128 [ 66.462866] kunit_try_run_case+0x7c/0x120 [ 66.463276] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.463807] kthread+0x1a4/0x1b8 [ 66.464147] ret_from_fork+0x10/0x20 [ 66.464512] [ 66.464694] The buggy address belongs to the object at ffff0000c586c700 [ 66.464694] which belongs to the cache kmalloc-128 of size 128 [ 66.465526] The buggy address is located 8 bytes inside of [ 66.465526] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.466314] [ 66.466505] The buggy address belongs to the physical page: [ 66.466967] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.467808] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.468434] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.469017] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.470257] page dumped because: kasan: bad access detected [ 66.470669] [ 66.470851] Memory state around the buggy address: [ 66.471219] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.471814] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.472371] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.472881] ^ [ 66.473198] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.474020] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.474573] ================================================================== [ 66.524923] ================================================================== [ 66.525495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x190/0x780 [ 66.526480] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.527050] [ 66.527244] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.527912] Hardware name: linux,dummy-virt (DT) [ 66.528278] Call trace: [ 66.528550] dump_backtrace+0x110/0x120 [ 66.528985] show_stack+0x18/0x28 [ 66.529411] dump_stack_lvl+0x68/0x84 [ 66.529832] print_report+0x158/0x484 [ 66.530189] kasan_report+0x98/0xe0 [ 66.530718] __asan_load8+0x88/0xb0 [ 66.531076] kasan_bitops_test_and_modify.constprop.4+0x190/0x780 [ 66.531619] kasan_bitops_generic+0xb8/0x128 [ 66.532071] kunit_try_run_case+0x7c/0x120 [ 66.532507] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.533019] kthread+0x1a4/0x1b8 [ 66.533378] ret_from_fork+0x10/0x20 [ 66.533894] [ 66.534083] Allocated by task 163: [ 66.534395] kasan_save_stack+0x2c/0x58 [ 66.534788] kasan_set_track+0x2c/0x40 [ 66.535152] kasan_save_alloc_info+0x24/0x38 [ 66.535597] __kasan_kmalloc+0xa0/0xb8 [ 66.535969] kmalloc_trace+0x50/0x68 [ 66.536333] kasan_bitops_generic+0x90/0x128 [ 66.536785] kunit_try_run_case+0x7c/0x120 [ 66.537198] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.537867] kthread+0x1a4/0x1b8 [ 66.538243] ret_from_fork+0x10/0x20 [ 66.538621] [ 66.538794] The buggy address belongs to the object at ffff0000c586c700 [ 66.538794] which belongs to the cache kmalloc-128 of size 128 [ 66.539664] The buggy address is located 8 bytes inside of [ 66.539664] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.540479] [ 66.540668] The buggy address belongs to the physical page: [ 66.541124] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.542003] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.542622] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.543381] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.543930] page dumped because: kasan: bad access detected [ 66.544366] [ 66.544556] Memory state around the buggy address: [ 66.544926] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.546118] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.546671] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.547215] ^ [ 66.547544] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.548108] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.548624] ================================================================== [ 66.575100] ================================================================== [ 66.575789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x1f8/0x780 [ 66.576962] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.577734] [ 66.578050] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.579005] Hardware name: linux,dummy-virt (DT) [ 66.579462] Call trace: [ 66.579691] dump_backtrace+0x110/0x120 [ 66.580182] show_stack+0x18/0x28 [ 66.580575] dump_stack_lvl+0x68/0x84 [ 66.581004] print_report+0x158/0x484 [ 66.581396] kasan_report+0x98/0xe0 [ 66.581769] __asan_load8+0x88/0xb0 [ 66.582138] kasan_bitops_test_and_modify.constprop.4+0x1f8/0x780 [ 66.582694] kasan_bitops_generic+0xb8/0x128 [ 66.583165] kunit_try_run_case+0x7c/0x120 [ 66.583582] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.584070] kthread+0x1a4/0x1b8 [ 66.584441] ret_from_fork+0x10/0x20 [ 66.584825] [ 66.585006] Allocated by task 163: [ 66.585344] kasan_save_stack+0x2c/0x58 [ 66.585728] kasan_set_track+0x2c/0x40 [ 66.586091] kasan_save_alloc_info+0x24/0x38 [ 66.586516] __kasan_kmalloc+0xa0/0xb8 [ 66.586894] kmalloc_trace+0x50/0x68 [ 66.587264] kasan_bitops_generic+0x90/0x128 [ 66.587709] kunit_try_run_case+0x7c/0x120 [ 66.588126] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.588654] kthread+0x1a4/0x1b8 [ 66.588992] ret_from_fork+0x10/0x20 [ 66.589360] [ 66.589529] The buggy address belongs to the object at ffff0000c586c700 [ 66.589529] which belongs to the cache kmalloc-128 of size 128 [ 66.590413] The buggy address is located 8 bytes inside of [ 66.590413] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.591205] [ 66.591392] The buggy address belongs to the physical page: [ 66.591816] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.592520] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.593135] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.593711] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.594285] page dumped because: kasan: bad access detected [ 66.594715] [ 66.594900] Memory state around the buggy address: [ 66.595310] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.595879] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.596424] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.596951] ^ [ 66.597277] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.597832] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.598379] ================================================================== [ 66.499737] ================================================================== [ 66.500276] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x15c/0x780 [ 66.501052] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.501847] [ 66.502060] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.502809] Hardware name: linux,dummy-virt (DT) [ 66.503158] Call trace: [ 66.503429] dump_backtrace+0x110/0x120 [ 66.503876] show_stack+0x18/0x28 [ 66.504279] dump_stack_lvl+0x68/0x84 [ 66.504675] print_report+0x158/0x484 [ 66.505051] kasan_report+0x98/0xe0 [ 66.505592] kasan_check_range+0x160/0x1d8 [ 66.505987] __kasan_check_write+0x28/0x38 [ 66.506426] kasan_bitops_test_and_modify.constprop.4+0x15c/0x780 [ 66.506966] kasan_bitops_generic+0xb8/0x128 [ 66.507418] kunit_try_run_case+0x7c/0x120 [ 66.507817] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.508328] kthread+0x1a4/0x1b8 [ 66.508659] ret_from_fork+0x10/0x20 [ 66.509039] [ 66.509203] Allocated by task 163: [ 66.509721] kasan_save_stack+0x2c/0x58 [ 66.510129] kasan_set_track+0x2c/0x40 [ 66.510502] kasan_save_alloc_info+0x24/0x38 [ 66.510923] __kasan_kmalloc+0xa0/0xb8 [ 66.511286] kmalloc_trace+0x50/0x68 [ 66.511656] kasan_bitops_generic+0x90/0x128 [ 66.512099] kunit_try_run_case+0x7c/0x120 [ 66.512520] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.513031] kthread+0x1a4/0x1b8 [ 66.513378] ret_from_fork+0x10/0x20 [ 66.513738] [ 66.513930] The buggy address belongs to the object at ffff0000c586c700 [ 66.513930] which belongs to the cache kmalloc-128 of size 128 [ 66.514765] The buggy address is located 8 bytes inside of [ 66.514765] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.515793] [ 66.515976] The buggy address belongs to the physical page: [ 66.516416] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.517124] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.518408] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.519020] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.519680] page dumped because: kasan: bad access detected [ 66.520144] [ 66.520367] Memory state around the buggy address: [ 66.520741] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.521350] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.521917] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.522606] ^ [ 66.522953] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.523532] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.524058] ================================================================== [ 66.425361] ================================================================== [ 66.425969] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0xe0/0x780 [ 66.426592] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.427031] [ 66.427200] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.427721] Hardware name: linux,dummy-virt (DT) [ 66.428021] Call trace: [ 66.428224] dump_backtrace+0x110/0x120 [ 66.428946] show_stack+0x18/0x28 [ 66.429446] dump_stack_lvl+0x68/0x84 [ 66.429902] print_report+0x158/0x484 [ 66.430505] kasan_report+0x98/0xe0 [ 66.430922] __asan_load8+0x88/0xb0 [ 66.431355] kasan_bitops_test_and_modify.constprop.4+0xe0/0x780 [ 66.431990] kasan_bitops_generic+0xb8/0x128 [ 66.432514] kunit_try_run_case+0x7c/0x120 [ 66.432970] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.433730] kthread+0x1a4/0x1b8 [ 66.434135] ret_from_fork+0x10/0x20 [ 66.434561] [ 66.434767] Allocated by task 163: [ 66.435139] kasan_save_stack+0x2c/0x58 [ 66.435533] kasan_set_track+0x2c/0x40 [ 66.435953] kasan_save_alloc_info+0x24/0x38 [ 66.436389] __kasan_kmalloc+0xa0/0xb8 [ 66.436795] kmalloc_trace+0x50/0x68 [ 66.437164] kasan_bitops_generic+0x90/0x128 [ 66.437754] kunit_try_run_case+0x7c/0x120 [ 66.438215] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.438759] kthread+0x1a4/0x1b8 [ 66.439100] ret_from_fork+0x10/0x20 [ 66.439486] [ 66.439668] The buggy address belongs to the object at ffff0000c586c700 [ 66.439668] which belongs to the cache kmalloc-128 of size 128 [ 66.440496] The buggy address is located 8 bytes inside of [ 66.440496] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.441329] [ 66.441550] The buggy address belongs to the physical page: [ 66.442124] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.442814] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.443458] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.444056] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.444630] page dumped because: kasan: bad access detected [ 66.445048] [ 66.445399] Memory state around the buggy address: [ 66.446388] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.446955] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.447515] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.448036] ^ [ 66.448364] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.448916] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.449436] ================================================================== [ 66.622488] ================================================================== [ 66.622974] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x25c/0x780 [ 66.623788] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.624362] [ 66.624557] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.625186] Hardware name: linux,dummy-virt (DT) [ 66.625619] Call trace: [ 66.625884] dump_backtrace+0x110/0x120 [ 66.626347] show_stack+0x18/0x28 [ 66.626744] dump_stack_lvl+0x68/0x84 [ 66.627147] print_report+0x158/0x484 [ 66.627543] kasan_report+0x98/0xe0 [ 66.627903] kasan_check_range+0x160/0x1d8 [ 66.628336] __kasan_check_write+0x28/0x38 [ 66.628751] kasan_bitops_test_and_modify.constprop.4+0x25c/0x780 [ 66.629317] kasan_bitops_generic+0xb8/0x128 [ 66.629739] kunit_try_run_case+0x7c/0x120 [ 66.630163] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.630663] kthread+0x1a4/0x1b8 [ 66.631002] ret_from_fork+0x10/0x20 [ 66.631392] [ 66.631575] Allocated by task 163: [ 66.631901] kasan_save_stack+0x2c/0x58 [ 66.632271] kasan_set_track+0x2c/0x40 [ 66.632634] kasan_save_alloc_info+0x24/0x38 [ 66.633071] __kasan_kmalloc+0xa0/0xb8 [ 66.633471] kmalloc_trace+0x50/0x68 [ 66.633857] kasan_bitops_generic+0x90/0x128 [ 66.634342] kunit_try_run_case+0x7c/0x120 [ 66.634763] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.635286] kthread+0x1a4/0x1b8 [ 66.635635] ret_from_fork+0x10/0x20 [ 66.636006] [ 66.636182] The buggy address belongs to the object at ffff0000c586c700 [ 66.636182] which belongs to the cache kmalloc-128 of size 128 [ 66.637050] The buggy address is located 8 bytes inside of [ 66.637050] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.637826] [ 66.638027] The buggy address belongs to the physical page: [ 66.638456] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.639156] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.639767] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.640362] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.640920] page dumped because: kasan: bad access detected [ 66.641367] [ 66.641558] Memory state around the buggy address: [ 66.641955] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.642497] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.643060] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.643622] ^ [ 66.643948] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.644510] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.645027] ================================================================== [ 66.549382] ================================================================== [ 66.550194] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x1c4/0x780 [ 66.550995] Write of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.551562] [ 66.551780] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.552436] Hardware name: linux,dummy-virt (DT) [ 66.552801] Call trace: [ 66.553011] dump_backtrace+0x110/0x120 [ 66.553666] show_stack+0x18/0x28 [ 66.554067] dump_stack_lvl+0x68/0x84 [ 66.554494] print_report+0x158/0x484 [ 66.554878] kasan_report+0x98/0xe0 [ 66.555225] kasan_check_range+0x160/0x1d8 [ 66.555643] __kasan_check_write+0x28/0x38 [ 66.556044] kasan_bitops_test_and_modify.constprop.4+0x1c4/0x780 [ 66.556604] kasan_bitops_generic+0xb8/0x128 [ 66.557052] kunit_try_run_case+0x7c/0x120 [ 66.557523] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.558050] kthread+0x1a4/0x1b8 [ 66.558411] ret_from_fork+0x10/0x20 [ 66.558793] [ 66.558991] Allocated by task 163: [ 66.559455] kasan_save_stack+0x2c/0x58 [ 66.559855] kasan_set_track+0x2c/0x40 [ 66.560237] kasan_save_alloc_info+0x24/0x38 [ 66.560658] __kasan_kmalloc+0xa0/0xb8 [ 66.561018] kmalloc_trace+0x50/0x68 [ 66.561409] kasan_bitops_generic+0x90/0x128 [ 66.561990] kunit_try_run_case+0x7c/0x120 [ 66.562438] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.562916] kthread+0x1a4/0x1b8 [ 66.563283] ret_from_fork+0x10/0x20 [ 66.563658] [ 66.563832] The buggy address belongs to the object at ffff0000c586c700 [ 66.563832] which belongs to the cache kmalloc-128 of size 128 [ 66.564739] The buggy address is located 8 bytes inside of [ 66.564739] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.566142] [ 66.566367] The buggy address belongs to the physical page: [ 66.566774] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.567490] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.568101] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.568736] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.569331] page dumped because: kasan: bad access detected [ 66.569961] [ 66.570160] Memory state around the buggy address: [ 66.570571] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.571127] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.571767] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.572324] ^ [ 66.572625] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.573245] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.574011] ================================================================== [ 66.599327] ================================================================== [ 66.599836] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.4+0x228/0x780 [ 66.600607] Read of size 8 at addr ffff0000c586c708 by task kunit_try_catch/163 [ 66.601166] [ 66.601570] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.602329] Hardware name: linux,dummy-virt (DT) [ 66.602710] Call trace: [ 66.602960] dump_backtrace+0x110/0x120 [ 66.603429] show_stack+0x18/0x28 [ 66.603810] dump_stack_lvl+0x68/0x84 [ 66.604256] print_report+0x158/0x484 [ 66.604614] kasan_report+0x98/0xe0 [ 66.604982] __asan_load8+0x88/0xb0 [ 66.605372] kasan_bitops_test_and_modify.constprop.4+0x228/0x780 [ 66.605906] kasan_bitops_generic+0xb8/0x128 [ 66.606372] kunit_try_run_case+0x7c/0x120 [ 66.606794] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.607281] kthread+0x1a4/0x1b8 [ 66.607631] ret_from_fork+0x10/0x20 [ 66.608005] [ 66.608170] Allocated by task 163: [ 66.608506] kasan_save_stack+0x2c/0x58 [ 66.608900] kasan_set_track+0x2c/0x40 [ 66.609301] kasan_save_alloc_info+0x24/0x38 [ 66.609719] __kasan_kmalloc+0xa0/0xb8 [ 66.610090] kmalloc_trace+0x50/0x68 [ 66.610457] kasan_bitops_generic+0x90/0x128 [ 66.610906] kunit_try_run_case+0x7c/0x120 [ 66.611328] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.611811] kthread+0x1a4/0x1b8 [ 66.612159] ret_from_fork+0x10/0x20 [ 66.612537] [ 66.612722] The buggy address belongs to the object at ffff0000c586c700 [ 66.612722] which belongs to the cache kmalloc-128 of size 128 [ 66.613582] The buggy address is located 8 bytes inside of [ 66.613582] 128-byte region [ffff0000c586c700, ffff0000c586c780) [ 66.614380] [ 66.614553] The buggy address belongs to the physical page: [ 66.614982] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c [ 66.615671] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.616269] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.616904] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.617481] page dumped because: kasan: bad access detected [ 66.617908] [ 66.618094] Memory state around the buggy address: [ 66.618515] ffff0000c586c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.619065] ffff0000c586c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.619673] >ffff0000c586c700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.620213] ^ [ 66.620545] ffff0000c586c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.621106] ffff0000c586c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.621663] ==================================================================
[ 32.549101] ================================================================== [ 32.549719] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23d/0x670 [ 32.550146] Read of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.550500] [ 32.550618] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.551002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.551680] Call Trace: [ 32.551853] <TASK> [ 32.552003] dump_stack_lvl+0x49/0x62 [ 32.552307] print_report+0x189/0x492 [ 32.552650] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.552946] ? kasan_bitops_test_and_modify.constprop.0+0x23d/0x670 [ 32.553570] kasan_report+0x10c/0x190 [ 32.553885] ? kasan_bitops_test_and_modify.constprop.0+0x23d/0x670 [ 32.554269] kasan_check_range+0x10b/0x1c0 [ 32.554605] __kasan_check_read+0x11/0x20 [ 32.554854] kasan_bitops_test_and_modify.constprop.0+0x23d/0x670 [ 32.555193] ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0 [ 32.555616] ? kasan_set_track+0x25/0x40 [ 32.555871] ? kasan_save_alloc_info+0x1e/0x30 [ 32.556146] ? __kasan_kmalloc+0xb6/0xc0 [ 32.556540] kasan_bitops_generic+0xac/0x120 [ 32.556796] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.557153] ? kasan_test_init+0x13e/0x1b0 [ 32.557676] kunit_try_run_case+0x8f/0xd0 [ 32.557902] ? kunit_catch_run_case+0x80/0x80 [ 32.558194] ? kunit_try_catch_throw+0x40/0x40 [ 32.558617] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.558952] kthread+0x17b/0x1b0 [ 32.559190] ? kthread_complete_and_exit+0x30/0x30 [ 32.559608] ret_from_fork+0x22/0x30 [ 32.559891] </TASK> [ 32.560010] [ 32.560121] Allocated by task 269: [ 32.560443] kasan_save_stack+0x41/0x70 [ 32.560696] kasan_set_track+0x25/0x40 [ 32.560920] kasan_save_alloc_info+0x1e/0x30 [ 32.561190] __kasan_kmalloc+0xb6/0xc0 [ 32.561736] kmalloc_trace+0x48/0xb0 [ 32.562008] kasan_bitops_generic+0x86/0x120 [ 32.562307] kunit_try_run_case+0x8f/0xd0 [ 32.562669] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.563016] kthread+0x17b/0x1b0 [ 32.563230] ret_from_fork+0x22/0x30 [ 32.563550] [ 32.563665] The buggy address belongs to the object at ffff888102f54b60 [ 32.563665] which belongs to the cache kmalloc-16 of size 16 [ 32.564238] The buggy address is located 8 bytes inside of [ 32.564238] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.564890] [ 32.565024] The buggy address belongs to the physical page: [ 32.565323] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.566068] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.566522] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.566891] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.567259] page dumped because: kasan: bad access detected [ 32.567649] [ 32.567776] Memory state around the buggy address: [ 32.568022] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.568514] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.568877] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.569239] ^ [ 32.569991] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.570401] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.570781] ================================================================== [ 32.592845] ================================================================== [ 32.593220] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x288/0x670 [ 32.593807] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.594196] [ 32.594552] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.594982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.595595] Call Trace: [ 32.595788] <TASK> [ 32.595949] dump_stack_lvl+0x49/0x62 [ 32.596186] print_report+0x189/0x492 [ 32.596557] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.596846] ? kasan_bitops_test_and_modify.constprop.0+0x288/0x670 [ 32.597246] kasan_report+0x10c/0x190 [ 32.597601] ? kasan_bitops_test_and_modify.constprop.0+0x288/0x670 [ 32.597963] kasan_check_range+0x10b/0x1c0 [ 32.598236] __kasan_check_write+0x14/0x20 [ 32.598701] kasan_bitops_test_and_modify.constprop.0+0x288/0x670 [ 32.599058] ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0 [ 32.599544] ? kasan_set_track+0x25/0x40 [ 32.599794] ? kasan_save_alloc_info+0x1e/0x30 [ 32.600072] ? __kasan_kmalloc+0xb6/0xc0 [ 32.600411] kasan_bitops_generic+0xac/0x120 [ 32.600691] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.601053] ? kasan_test_init+0x13e/0x1b0 [ 32.601486] kunit_try_run_case+0x8f/0xd0 [ 32.601736] ? kunit_catch_run_case+0x80/0x80 [ 32.602006] ? kunit_try_catch_throw+0x40/0x40 [ 32.602324] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.602792] kthread+0x17b/0x1b0 [ 32.603126] ? kthread_complete_and_exit+0x30/0x30 [ 32.603601] ret_from_fork+0x22/0x30 [ 32.603861] </TASK> [ 32.603990] [ 32.604109] Allocated by task 269: [ 32.604419] kasan_save_stack+0x41/0x70 [ 32.604670] kasan_set_track+0x25/0x40 [ 32.604906] kasan_save_alloc_info+0x1e/0x30 [ 32.605168] __kasan_kmalloc+0xb6/0xc0 [ 32.605416] kmalloc_trace+0x48/0xb0 [ 32.605743] kasan_bitops_generic+0x86/0x120 [ 32.606008] kunit_try_run_case+0x8f/0xd0 [ 32.606276] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.606829] kthread+0x17b/0x1b0 [ 32.607080] ret_from_fork+0x22/0x30 [ 32.607322] [ 32.607598] The buggy address belongs to the object at ffff888102f54b60 [ 32.607598] which belongs to the cache kmalloc-16 of size 16 [ 32.608135] The buggy address is located 8 bytes inside of [ 32.608135] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.608789] [ 32.608942] The buggy address belongs to the physical page: [ 32.609244] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.609789] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.610105] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.610714] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.611094] page dumped because: kasan: bad access detected [ 32.611523] [ 32.611622] Memory state around the buggy address: [ 32.611901] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.612303] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.612754] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.613092] ^ [ 32.613569] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.613945] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.614323] ================================================================== [ 32.571299] ================================================================== [ 32.571706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x245/0x670 [ 32.572197] Read of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.572651] [ 32.572804] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.573189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.573846] Call Trace: [ 32.574129] <TASK> [ 32.574285] dump_stack_lvl+0x49/0x62 [ 32.574513] print_report+0x189/0x492 [ 32.574751] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.575178] ? kasan_bitops_test_and_modify.constprop.0+0x245/0x670 [ 32.575637] kasan_report+0x10c/0x190 [ 32.575910] ? kasan_bitops_test_and_modify.constprop.0+0x245/0x670 [ 32.576452] __asan_load8+0x7e/0xb0 [ 32.576690] kasan_bitops_test_and_modify.constprop.0+0x245/0x670 [ 32.577044] ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0 [ 32.577392] ? kasan_set_track+0x25/0x40 [ 32.577926] ? kasan_save_alloc_info+0x1e/0x30 [ 32.578252] ? __kasan_kmalloc+0xb6/0xc0 [ 32.578534] kasan_bitops_generic+0xac/0x120 [ 32.578869] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.579258] ? kasan_test_init+0x13e/0x1b0 [ 32.579607] kunit_try_run_case+0x8f/0xd0 [ 32.579878] ? kunit_catch_run_case+0x80/0x80 [ 32.580130] ? kunit_try_catch_throw+0x40/0x40 [ 32.580467] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.580770] kthread+0x17b/0x1b0 [ 32.580955] ? kthread_complete_and_exit+0x30/0x30 [ 32.581209] ret_from_fork+0x22/0x30 [ 32.581458] </TASK> [ 32.581596] [ 32.581696] Allocated by task 269: [ 32.581895] kasan_save_stack+0x41/0x70 [ 32.582106] kasan_set_track+0x25/0x40 [ 32.582851] kasan_save_alloc_info+0x1e/0x30 [ 32.583094] __kasan_kmalloc+0xb6/0xc0 [ 32.583523] kmalloc_trace+0x48/0xb0 [ 32.583722] kasan_bitops_generic+0x86/0x120 [ 32.583963] kunit_try_run_case+0x8f/0xd0 [ 32.584239] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.584657] kthread+0x17b/0x1b0 [ 32.584870] ret_from_fork+0x22/0x30 [ 32.585095] [ 32.585234] The buggy address belongs to the object at ffff888102f54b60 [ 32.585234] which belongs to the cache kmalloc-16 of size 16 [ 32.585926] The buggy address is located 8 bytes inside of [ 32.585926] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.586722] [ 32.586853] The buggy address belongs to the physical page: [ 32.587125] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.587729] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.588047] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.588572] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.588954] page dumped because: kasan: bad access detected [ 32.589244] [ 32.589437] Memory state around the buggy address: [ 32.589718] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.590081] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.590655] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.591007] ^ [ 32.591372] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.591865] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.592235] ================================================================== [ 32.501282] ================================================================== [ 32.502274] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1c6/0x670 [ 32.503035] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.503665] [ 32.503874] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.504761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.505710] Call Trace: [ 32.505848] <TASK> [ 32.505961] dump_stack_lvl+0x49/0x62 [ 32.506154] print_report+0x189/0x492 [ 32.506413] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.506811] ? kasan_bitops_test_and_modify.constprop.0+0x1c6/0x670 [ 32.507133] kasan_report+0x10c/0x190 [ 32.507518] ? kasan_bitops_test_and_modify.constprop.0+0x1c6/0x670 [ 32.507902] kasan_check_range+0x10b/0x1c0 [ 32.508150] __kasan_check_write+0x14/0x20 [ 32.508418] kasan_bitops_test_and_modify.constprop.0+0x1c6/0x670 [ 32.508854] ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0 [ 32.509185] ? kasan_set_track+0x25/0x40 [ 32.509711] ? kasan_save_alloc_info+0x1e/0x30 [ 32.509969] ? __kasan_kmalloc+0xb6/0xc0 [ 32.510288] kasan_bitops_generic+0xac/0x120 [ 32.510646] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.511001] ? kasan_test_init+0x13e/0x1b0 [ 32.511284] kunit_try_run_case+0x8f/0xd0 [ 32.511633] ? kunit_catch_run_case+0x80/0x80 [ 32.511893] ? kunit_try_catch_throw+0x40/0x40 [ 32.512155] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.512602] kthread+0x17b/0x1b0 [ 32.512815] ? kthread_complete_and_exit+0x30/0x30 [ 32.513083] ret_from_fork+0x22/0x30 [ 32.513586] </TASK> [ 32.513768] [ 32.513873] Allocated by task 269: [ 32.514018] kasan_save_stack+0x41/0x70 [ 32.514327] kasan_set_track+0x25/0x40 [ 32.514664] kasan_save_alloc_info+0x1e/0x30 [ 32.514919] __kasan_kmalloc+0xb6/0xc0 [ 32.515146] kmalloc_trace+0x48/0xb0 [ 32.515530] kasan_bitops_generic+0x86/0x120 [ 32.515788] kunit_try_run_case+0x8f/0xd0 [ 32.516050] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.516482] kthread+0x17b/0x1b0 [ 32.516677] ret_from_fork+0x22/0x30 [ 32.516919] [ 32.517020] The buggy address belongs to the object at ffff888102f54b60 [ 32.517020] which belongs to the cache kmalloc-16 of size 16 [ 32.517851] The buggy address is located 8 bytes inside of [ 32.517851] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.518355] [ 32.518470] The buggy address belongs to the physical page: [ 32.518700] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.519143] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.519732] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.520145] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.520671] page dumped because: kasan: bad access detected [ 32.520881] [ 32.520978] Memory state around the buggy address: [ 32.521179] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.522147] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.522936] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.523701] ^ [ 32.524433] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.525098] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.526011] ================================================================== [ 32.413279] ================================================================== [ 32.413726] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd8/0x670 [ 32.414185] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.414624] [ 32.414755] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.415101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.415466] Call Trace: [ 32.415647] <TASK> [ 32.415796] dump_stack_lvl+0x49/0x62 [ 32.416041] print_report+0x189/0x492 [ 32.416578] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.416869] ? kasan_bitops_test_and_modify.constprop.0+0xd8/0x670 [ 32.417187] kasan_report+0x10c/0x190 [ 32.417594] ? kasan_bitops_test_and_modify.constprop.0+0xd8/0x670 [ 32.417916] kasan_check_range+0x10b/0x1c0 [ 32.418148] __kasan_check_write+0x14/0x20 [ 32.418396] kasan_bitops_test_and_modify.constprop.0+0xd8/0x670 [ 32.418925] ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0 [ 32.419195] ? kasan_set_track+0x25/0x40 [ 32.419500] ? kasan_save_alloc_info+0x1e/0x30 [ 32.419727] ? __kasan_kmalloc+0xb6/0xc0 [ 32.419978] kasan_bitops_generic+0xac/0x120 [ 32.420216] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.420624] ? kasan_test_init+0x13e/0x1b0 [ 32.420862] kunit_try_run_case+0x8f/0xd0 [ 32.421073] ? kunit_catch_run_case+0x80/0x80 [ 32.421637] ? kunit_try_catch_throw+0x40/0x40 [ 32.421881] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.422206] kthread+0x17b/0x1b0 [ 32.422528] ? kthread_complete_and_exit+0x30/0x30 [ 32.422774] ret_from_fork+0x22/0x30 [ 32.423016] </TASK> [ 32.423132] [ 32.423234] Allocated by task 269: [ 32.423429] kasan_save_stack+0x41/0x70 [ 32.423734] kasan_set_track+0x25/0x40 [ 32.423963] kasan_save_alloc_info+0x1e/0x30 [ 32.424205] __kasan_kmalloc+0xb6/0xc0 [ 32.424439] kmalloc_trace+0x48/0xb0 [ 32.424641] kasan_bitops_generic+0x86/0x120 [ 32.424892] kunit_try_run_case+0x8f/0xd0 [ 32.425127] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.425715] kthread+0x17b/0x1b0 [ 32.425928] ret_from_fork+0x22/0x30 [ 32.426110] [ 32.426235] The buggy address belongs to the object at ffff888102f54b60 [ 32.426235] which belongs to the cache kmalloc-16 of size 16 [ 32.426902] The buggy address is located 8 bytes inside of [ 32.426902] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.427417] [ 32.427567] The buggy address belongs to the physical page: [ 32.427859] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.428290] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.428680] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.429068] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.429386] page dumped because: kasan: bad access detected [ 32.429659] [ 32.429768] Memory state around the buggy address: [ 32.430001] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.430641] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.430937] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.431422] ^ [ 32.431743] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.432043] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.432537] ================================================================== [ 32.393095] ================================================================== [ 32.393479] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x670 [ 32.393988] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.394362] [ 32.394745] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.395120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.395484] Call Trace: [ 32.395614] <TASK> [ 32.395841] dump_stack_lvl+0x49/0x62 [ 32.396101] print_report+0x189/0x492 [ 32.396472] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.396777] ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x670 [ 32.397124] kasan_report+0x10c/0x190 [ 32.397418] ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x670 [ 32.397758] kasan_check_range+0x10b/0x1c0 [ 32.398001] __kasan_check_write+0x14/0x20 [ 32.398218] kasan_bitops_test_and_modify.constprop.0+0x9c/0x670 [ 32.398832] ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0 [ 32.399089] ? kasan_set_track+0x25/0x40 [ 32.399455] ? kasan_save_alloc_info+0x1e/0x30 [ 32.399734] ? __kasan_kmalloc+0xb6/0xc0 [ 32.399945] kasan_bitops_generic+0xac/0x120 [ 32.400219] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.400638] ? kasan_test_init+0x13e/0x1b0 [ 32.400897] kunit_try_run_case+0x8f/0xd0 [ 32.401142] ? kunit_catch_run_case+0x80/0x80 [ 32.401442] ? kunit_try_catch_throw+0x40/0x40 [ 32.401661] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.401986] kthread+0x17b/0x1b0 [ 32.402200] ? kthread_complete_and_exit+0x30/0x30 [ 32.402456] ret_from_fork+0x22/0x30 [ 32.402776] </TASK> [ 32.402896] [ 32.402986] Allocated by task 269: [ 32.403192] kasan_save_stack+0x41/0x70 [ 32.403440] kasan_set_track+0x25/0x40 [ 32.403648] kasan_save_alloc_info+0x1e/0x30 [ 32.403885] __kasan_kmalloc+0xb6/0xc0 [ 32.404063] kmalloc_trace+0x48/0xb0 [ 32.404712] kasan_bitops_generic+0x86/0x120 [ 32.404977] kunit_try_run_case+0x8f/0xd0 [ 32.405196] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.405634] kthread+0x17b/0x1b0 [ 32.405819] ret_from_fork+0x22/0x30 [ 32.406008] [ 32.406115] The buggy address belongs to the object at ffff888102f54b60 [ 32.406115] which belongs to the cache kmalloc-16 of size 16 [ 32.406787] The buggy address is located 8 bytes inside of [ 32.406787] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.407236] [ 32.407351] The buggy address belongs to the physical page: [ 32.407868] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.408346] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.408778] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.409130] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.409489] page dumped because: kasan: bad access detected [ 32.410001] [ 32.410115] Memory state around the buggy address: [ 32.410376] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.410757] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.411105] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.411410] ^ [ 32.412007] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.412492] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.412827] ================================================================== [ 32.453380] ================================================================== [ 32.453733] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x14f/0x670 [ 32.454122] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.454579] [ 32.454909] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.455345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.455926] Call Trace: [ 32.456068] <TASK> [ 32.456229] dump_stack_lvl+0x49/0x62 [ 32.456441] print_report+0x189/0x492 [ 32.456775] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.457178] ? kasan_bitops_test_and_modify.constprop.0+0x14f/0x670 [ 32.457462] kasan_report+0x10c/0x190 [ 32.457773] ? kasan_bitops_test_and_modify.constprop.0+0x14f/0x670 [ 32.458111] kasan_check_range+0x10b/0x1c0 [ 32.458536] __kasan_check_write+0x14/0x20 [ 32.458769] kasan_bitops_test_and_modify.constprop.0+0x14f/0x670 [ 32.459114] ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0 [ 32.459631] ? kasan_set_track+0x25/0x40 [ 32.459861] ? kasan_save_alloc_info+0x1e/0x30 [ 32.460123] ? __kasan_kmalloc+0xb6/0xc0 [ 32.460383] kasan_bitops_generic+0xac/0x120 [ 32.460733] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.461079] ? kasan_test_init+0x13e/0x1b0 [ 32.461431] kunit_try_run_case+0x8f/0xd0 [ 32.461681] ? kunit_catch_run_case+0x80/0x80 [ 32.461916] ? kunit_try_catch_throw+0x40/0x40 [ 32.462173] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.462533] kthread+0x17b/0x1b0 [ 32.462993] ? kthread_complete_and_exit+0x30/0x30 [ 32.463300] ret_from_fork+0x22/0x30 [ 32.463528] </TASK> [ 32.463695] [ 32.463784] Allocated by task 269: [ 32.463982] kasan_save_stack+0x41/0x70 [ 32.464241] kasan_set_track+0x25/0x40 [ 32.464443] kasan_save_alloc_info+0x1e/0x30 [ 32.464684] __kasan_kmalloc+0xb6/0xc0 [ 32.464884] kmalloc_trace+0x48/0xb0 [ 32.465100] kasan_bitops_generic+0x86/0x120 [ 32.465708] kunit_try_run_case+0x8f/0xd0 [ 32.465944] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.466287] kthread+0x17b/0x1b0 [ 32.466500] ret_from_fork+0x22/0x30 [ 32.466721] [ 32.466833] The buggy address belongs to the object at ffff888102f54b60 [ 32.466833] which belongs to the cache kmalloc-16 of size 16 [ 32.467690] The buggy address is located 8 bytes inside of [ 32.467690] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.468205] [ 32.468323] The buggy address belongs to the physical page: [ 32.468541] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.469144] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.469491] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.469954] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.470322] page dumped because: kasan: bad access detected [ 32.470584] [ 32.470696] Memory state around the buggy address: [ 32.470925] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.471585] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.471880] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.472249] ^ [ 32.472631] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.472957] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.473332] ================================================================== [ 32.526830] ================================================================== [ 32.527195] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x202/0x670 [ 32.528177] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.528703] [ 32.528810] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.529122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.529860] Call Trace: [ 32.530046] <TASK> [ 32.530199] dump_stack_lvl+0x49/0x62 [ 32.530460] print_report+0x189/0x492 [ 32.530801] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.531125] ? kasan_bitops_test_and_modify.constprop.0+0x202/0x670 [ 32.531587] kasan_report+0x10c/0x190 [ 32.531901] ? kasan_bitops_test_and_modify.constprop.0+0x202/0x670 [ 32.532281] kasan_check_range+0x10b/0x1c0 [ 32.532621] __kasan_check_write+0x14/0x20 [ 32.532882] kasan_bitops_test_and_modify.constprop.0+0x202/0x670 [ 32.533242] ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0 [ 32.533801] ? kasan_set_track+0x25/0x40 [ 32.534043] ? kasan_save_alloc_info+0x1e/0x30 [ 32.534414] ? __kasan_kmalloc+0xb6/0xc0 [ 32.534686] kasan_bitops_generic+0xac/0x120 [ 32.534921] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.535406] ? kasan_test_init+0x13e/0x1b0 [ 32.535691] kunit_try_run_case+0x8f/0xd0 [ 32.535949] ? kunit_catch_run_case+0x80/0x80 [ 32.536243] ? kunit_try_catch_throw+0x40/0x40 [ 32.536642] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.536975] kthread+0x17b/0x1b0 [ 32.537190] ? kthread_complete_and_exit+0x30/0x30 [ 32.537760] ret_from_fork+0x22/0x30 [ 32.538026] </TASK> [ 32.538190] [ 32.538439] Allocated by task 269: [ 32.538646] kasan_save_stack+0x41/0x70 [ 32.538917] kasan_set_track+0x25/0x40 [ 32.539145] kasan_save_alloc_info+0x1e/0x30 [ 32.539525] __kasan_kmalloc+0xb6/0xc0 [ 32.539777] kmalloc_trace+0x48/0xb0 [ 32.540014] kasan_bitops_generic+0x86/0x120 [ 32.540270] kunit_try_run_case+0x8f/0xd0 [ 32.540606] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.540919] kthread+0x17b/0x1b0 [ 32.541148] ret_from_fork+0x22/0x30 [ 32.541648] [ 32.541748] The buggy address belongs to the object at ffff888102f54b60 [ 32.541748] which belongs to the cache kmalloc-16 of size 16 [ 32.542406] The buggy address is located 8 bytes inside of [ 32.542406] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.543014] [ 32.543132] The buggy address belongs to the physical page: [ 32.543522] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.543992] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.544473] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.544859] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.545256] page dumped because: kasan: bad access detected [ 32.545787] [ 32.545895] Memory state around the buggy address: [ 32.546147] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.546666] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.547028] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.547500] ^ [ 32.547817] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.548179] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.548647] ================================================================== [ 32.433018] ================================================================== [ 32.433401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x113/0x670 [ 32.433834] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.434171] [ 32.434283] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.434741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.435082] Call Trace: [ 32.435633] <TASK> [ 32.435795] dump_stack_lvl+0x49/0x62 [ 32.436045] print_report+0x189/0x492 [ 32.436324] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.436642] ? kasan_bitops_test_and_modify.constprop.0+0x113/0x670 [ 32.436998] kasan_report+0x10c/0x190 [ 32.437219] ? kasan_bitops_test_and_modify.constprop.0+0x113/0x670 [ 32.437665] kasan_check_range+0x10b/0x1c0 [ 32.437863] __kasan_check_write+0x14/0x20 [ 32.438108] kasan_bitops_test_and_modify.constprop.0+0x113/0x670 [ 32.438625] ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0 [ 32.438954] ? kasan_set_track+0x25/0x40 [ 32.439206] ? kasan_save_alloc_info+0x1e/0x30 [ 32.439562] ? __kasan_kmalloc+0xb6/0xc0 [ 32.439789] kasan_bitops_generic+0xac/0x120 [ 32.440041] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.440365] ? kasan_test_init+0x13e/0x1b0 [ 32.440568] kunit_try_run_case+0x8f/0xd0 [ 32.440833] ? kunit_catch_run_case+0x80/0x80 [ 32.441080] ? kunit_try_catch_throw+0x40/0x40 [ 32.441476] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.441773] kthread+0x17b/0x1b0 [ 32.441986] ? kthread_complete_and_exit+0x30/0x30 [ 32.442214] ret_from_fork+0x22/0x30 [ 32.442766] </TASK> [ 32.442932] [ 32.443035] Allocated by task 269: [ 32.443198] kasan_save_stack+0x41/0x70 [ 32.443626] kasan_set_track+0x25/0x40 [ 32.443847] kasan_save_alloc_info+0x1e/0x30 [ 32.444090] __kasan_kmalloc+0xb6/0xc0 [ 32.444359] kmalloc_trace+0x48/0xb0 [ 32.444544] kasan_bitops_generic+0x86/0x120 [ 32.444900] kunit_try_run_case+0x8f/0xd0 [ 32.445117] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.445398] kthread+0x17b/0x1b0 [ 32.445674] ret_from_fork+0x22/0x30 [ 32.445902] [ 32.446011] The buggy address belongs to the object at ffff888102f54b60 [ 32.446011] which belongs to the cache kmalloc-16 of size 16 [ 32.446551] The buggy address is located 8 bytes inside of [ 32.446551] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.447830] [ 32.447953] The buggy address belongs to the physical page: [ 32.448233] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.448689] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.449101] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.449464] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.449828] page dumped because: kasan: bad access detected [ 32.450112] [ 32.450232] Memory state around the buggy address: [ 32.450739] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.451078] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.451574] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.451900] ^ [ 32.452201] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.452497] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.452860] ================================================================== [ 32.473775] ================================================================== [ 32.474116] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x18b/0x670 [ 32.474709] Write of size 8 at addr ffff888102f54b68 by task kunit_try_catch/269 [ 32.475058] [ 32.475172] CPU: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.475885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.476417] Call Trace: [ 32.476556] <TASK> [ 32.476709] dump_stack_lvl+0x49/0x62 [ 32.476971] print_report+0x189/0x492 [ 32.477189] ? kasan_complete_mode_report_info+0x3c/0x200 [ 32.477501] ? kasan_bitops_test_and_modify.constprop.0+0x18b/0x670 [ 32.477969] kasan_report+0x10c/0x190 [ 32.478227] ? kasan_bitops_test_and_modify.constprop.0+0x18b/0x670 [ 32.478643] kasan_check_range+0x10b/0x1c0 [ 32.478907] __kasan_check_write+0x14/0x20 [ 32.479116] kasan_bitops_test_and_modify.constprop.0+0x18b/0x670 [ 32.479416] ? kasan_bitops_modify.constprop.0+0x5a0/0x5a0 [ 32.479994] ? kasan_set_track+0x25/0x40 [ 32.480219] ? kasan_save_alloc_info+0x1e/0x30 [ 32.480492] ? __kasan_kmalloc+0xb6/0xc0 [ 32.480792] kasan_bitops_generic+0xac/0x120 [ 32.481081] ? kasan_bitops_test_and_modify.constprop.0+0x670/0x670 [ 32.481555] ? kasan_test_init+0x13e/0x1b0 [ 32.481815] kunit_try_run_case+0x8f/0xd0 [ 32.482064] ? kunit_catch_run_case+0x80/0x80 [ 32.482329] ? kunit_try_catch_throw+0x40/0x40 [ 32.482539] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.483052] kthread+0x17b/0x1b0 [ 32.483289] ? kthread_complete_and_exit+0x30/0x30 [ 32.483505] ret_from_fork+0x22/0x30 [ 32.483696] </TASK> [ 32.483825] [ 32.483941] Allocated by task 269: [ 32.484111] kasan_save_stack+0x41/0x70 [ 32.485796] kasan_set_track+0x25/0x40 [ 32.486278] kasan_save_alloc_info+0x1e/0x30 [ 32.486854] __kasan_kmalloc+0xb6/0xc0 [ 32.487054] kmalloc_trace+0x48/0xb0 [ 32.487236] kasan_bitops_generic+0x86/0x120 [ 32.487442] kunit_try_run_case+0x8f/0xd0 [ 32.487631] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.487860] kthread+0x17b/0x1b0 [ 32.488013] ret_from_fork+0x22/0x30 [ 32.488837] [ 32.489039] The buggy address belongs to the object at ffff888102f54b60 [ 32.489039] which belongs to the cache kmalloc-16 of size 16 [ 32.490500] The buggy address is located 8 bytes inside of [ 32.490500] 16-byte region [ffff888102f54b60, ffff888102f54b70) [ 32.491708] [ 32.491952] The buggy address belongs to the physical page: [ 32.492646] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54 [ 32.493537] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.494296] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0 [ 32.495269] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 32.495770] page dumped because: kasan: bad access detected [ 32.495985] [ 32.496077] Memory state around the buggy address: [ 32.496329] ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 32.497038] ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.497810] >ffff888102f54b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.498553] ^ [ 32.499296] ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.499949] ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.500243] ==================================================================