Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 183.164023] ================================================================== [ 183.165445] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x130/0x6d8 [ 183.167142] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.169137] [ 183.169832] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.171748] Hardware name: linux,dummy-virt (DT) [ 183.172896] Call trace: [ 183.173623] dump_backtrace+0x9c/0x128 [ 183.174737] show_stack+0x20/0x38 [ 183.176070] dump_stack_lvl+0x60/0xb0 [ 183.177781] print_report+0xf8/0x5d8 [ 183.178843] kasan_report+0xc8/0x118 [ 183.180033] __asan_load8+0x9c/0xc0 [ 183.181213] kasan_bitops_modify.constprop.0+0x130/0x6d8 [ 183.183432] kasan_bitops_generic+0xb4/0x148 [ 183.184707] kunit_try_run_case+0xf8/0x260 [ 183.185924] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.187437] kthread+0x18c/0x1a8 [ 183.188393] ret_from_fork+0x10/0x20 [ 183.190227] [ 183.190891] Allocated by task 206: [ 183.192042] kasan_save_stack+0x3c/0x68 [ 183.193294] kasan_set_track+0x2c/0x40 [ 183.194440] kasan_save_alloc_info+0x24/0x38 [ 183.195729] __kasan_kmalloc+0xd4/0xd8 [ 183.196846] kmalloc_trace+0x68/0x130 [ 183.197869] kasan_bitops_generic+0x98/0x148 [ 183.198918] kunit_try_run_case+0xf8/0x260 [ 183.199954] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.201802] kthread+0x18c/0x1a8 [ 183.202774] ret_from_fork+0x10/0x20 [ 183.203883] [ 183.204386] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.204386] which belongs to the cache kmalloc-16 of size 16 [ 183.207710] The buggy address is located 8 bytes inside of [ 183.207710] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.210228] [ 183.210842] The buggy address belongs to the physical page: [ 183.212137] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.214129] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.216084] page_type: 0xffffffff() [ 183.217275] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.219101] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.220680] page dumped because: kasan: bad access detected [ 183.221985] [ 183.222509] Memory state around the buggy address: [ 183.224109] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.225969] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.227599] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.229291] ^ [ 183.230751] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.232351] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.234261] ================================================================== [ 183.096213] ================================================================== [ 183.097708] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0x6d8 [ 183.099458] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.101152] [ 183.101825] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.103626] Hardware name: linux,dummy-virt (DT) [ 183.104707] Call trace: [ 183.105416] dump_backtrace+0x9c/0x128 [ 183.106488] show_stack+0x20/0x38 [ 183.107465] dump_stack_lvl+0x60/0xb0 [ 183.108621] print_report+0xf8/0x5d8 [ 183.109741] kasan_report+0xc8/0x118 [ 183.110849] kasan_check_range+0xe8/0x190 [ 183.112048] __kasan_check_write+0x20/0x30 [ 183.113830] kasan_bitops_modify.constprop.0+0x100/0x6d8 [ 183.115016] kasan_bitops_generic+0xb4/0x148 [ 183.116372] kunit_try_run_case+0xf8/0x260 [ 183.117619] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.119072] kthread+0x18c/0x1a8 [ 183.120016] ret_from_fork+0x10/0x20 [ 183.121085] [ 183.121592] Allocated by task 206: [ 183.122497] kasan_save_stack+0x3c/0x68 [ 183.123667] kasan_set_track+0x2c/0x40 [ 183.124779] kasan_save_alloc_info+0x24/0x38 [ 183.126058] __kasan_kmalloc+0xd4/0xd8 [ 183.127201] kmalloc_trace+0x68/0x130 [ 183.128250] kasan_bitops_generic+0x98/0x148 [ 183.129440] kunit_try_run_case+0xf8/0x260 [ 183.130648] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.132076] kthread+0x18c/0x1a8 [ 183.133037] ret_from_fork+0x10/0x20 [ 183.134118] [ 183.134667] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.134667] which belongs to the cache kmalloc-16 of size 16 [ 183.136995] The buggy address is located 8 bytes inside of [ 183.136995] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.139424] [ 183.139937] The buggy address belongs to the physical page: [ 183.141171] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.143105] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.144652] page_type: 0xffffffff() [ 183.145606] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.147308] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.148929] page dumped because: kasan: bad access detected [ 183.150147] [ 183.150677] Memory state around the buggy address: [ 183.151871] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.153451] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.155060] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.156614] ^ [ 183.157927] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.159488] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.161018] ================================================================== [ 183.312666] ================================================================== [ 183.314481] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x194/0x6d8 [ 183.316861] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.318537] [ 183.319134] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.321400] Hardware name: linux,dummy-virt (DT) [ 183.322543] Call trace: [ 183.324022] dump_backtrace+0x9c/0x128 [ 183.325148] show_stack+0x20/0x38 [ 183.326169] dump_stack_lvl+0x60/0xb0 [ 183.327319] print_report+0xf8/0x5d8 [ 183.328428] kasan_report+0xc8/0x118 [ 183.329545] kasan_check_range+0xe8/0x190 [ 183.330869] __kasan_check_write+0x20/0x30 [ 183.332595] kasan_bitops_modify.constprop.0+0x194/0x6d8 [ 183.334075] kasan_bitops_generic+0xb4/0x148 [ 183.335275] kunit_try_run_case+0xf8/0x260 [ 183.336472] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.338936] kthread+0x18c/0x1a8 [ 183.339963] ret_from_fork+0x10/0x20 [ 183.341079] [ 183.341593] Allocated by task 206: [ 183.342547] kasan_save_stack+0x3c/0x68 [ 183.343705] kasan_set_track+0x2c/0x40 [ 183.344837] kasan_save_alloc_info+0x24/0x38 [ 183.346310] __kasan_kmalloc+0xd4/0xd8 [ 183.347637] kmalloc_trace+0x68/0x130 [ 183.348877] kasan_bitops_generic+0x98/0x148 [ 183.350483] kunit_try_run_case+0xf8/0x260 [ 183.351941] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.353625] kthread+0x18c/0x1a8 [ 183.354731] ret_from_fork+0x10/0x20 [ 183.356083] [ 183.356796] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.356796] which belongs to the cache kmalloc-16 of size 16 [ 183.359386] The buggy address is located 8 bytes inside of [ 183.359386] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.362116] [ 183.362657] The buggy address belongs to the physical page: [ 183.363992] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.366099] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.367734] page_type: 0xffffffff() [ 183.368629] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.370611] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.372235] page dumped because: kasan: bad access detected [ 183.373248] [ 183.373725] Memory state around the buggy address: [ 183.374616] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.376717] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.378732] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.380378] ^ [ 183.381827] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.383604] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.385445] ================================================================== [ 183.527186] ================================================================== [ 183.528627] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0x6d8 [ 183.530392] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.532136] [ 183.532710] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.534499] Hardware name: linux,dummy-virt (DT) [ 183.535617] Call trace: [ 183.536302] dump_backtrace+0x9c/0x128 [ 183.537368] show_stack+0x20/0x38 [ 183.538360] dump_stack_lvl+0x60/0xb0 [ 183.539510] print_report+0xf8/0x5d8 [ 183.540643] kasan_report+0xc8/0x118 [ 183.541805] kasan_check_range+0xe8/0x190 [ 183.543029] __kasan_check_write+0x20/0x30 [ 183.544150] kasan_bitops_modify.constprop.0+0x1dc/0x6d8 [ 183.545976] kasan_bitops_generic+0xb4/0x148 [ 183.546995] kunit_try_run_case+0xf8/0x260 [ 183.548642] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.550162] kthread+0x18c/0x1a8 [ 183.551006] ret_from_fork+0x10/0x20 [ 183.552104] [ 183.552634] Allocated by task 206: [ 183.553518] kasan_save_stack+0x3c/0x68 [ 183.554681] kasan_set_track+0x2c/0x40 [ 183.555794] kasan_save_alloc_info+0x24/0x38 [ 183.557048] __kasan_kmalloc+0xd4/0xd8 [ 183.558182] kmalloc_trace+0x68/0x130 [ 183.559219] kasan_bitops_generic+0x98/0x148 [ 183.560406] kunit_try_run_case+0xf8/0x260 [ 183.561589] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.563016] kthread+0x18c/0x1a8 [ 183.563954] ret_from_fork+0x10/0x20 [ 183.565042] [ 183.565655] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.565655] which belongs to the cache kmalloc-16 of size 16 [ 183.567978] The buggy address is located 8 bytes inside of [ 183.567978] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.570399] [ 183.570969] The buggy address belongs to the physical page: [ 183.572198] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.574114] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.575649] page_type: 0xffffffff() [ 183.576623] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.578319] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.579920] page dumped because: kasan: bad access detected [ 183.581176] [ 183.581740] Memory state around the buggy address: [ 183.582893] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.584468] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.586065] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.587559] ^ [ 183.588880] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.590461] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.591955] ================================================================== [ 183.388352] ================================================================== [ 183.389972] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x6d8 [ 183.392168] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.394104] [ 183.394777] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.396639] Hardware name: linux,dummy-virt (DT) [ 183.397817] Call trace: [ 183.398595] dump_backtrace+0x9c/0x128 [ 183.399694] show_stack+0x20/0x38 [ 183.400717] dump_stack_lvl+0x60/0xb0 [ 183.401950] print_report+0xf8/0x5d8 [ 183.403067] kasan_report+0xc8/0x118 [ 183.404207] __asan_load8+0x9c/0xc0 [ 183.405330] kasan_bitops_modify.constprop.0+0x19c/0x6d8 [ 183.406761] kasan_bitops_generic+0xb4/0x148 [ 183.407970] kunit_try_run_case+0xf8/0x260 [ 183.409166] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.410645] kthread+0x18c/0x1a8 [ 183.411618] ret_from_fork+0x10/0x20 [ 183.412708] [ 183.413251] Allocated by task 206: [ 183.414213] kasan_save_stack+0x3c/0x68 [ 183.415363] kasan_set_track+0x2c/0x40 [ 183.416489] kasan_save_alloc_info+0x24/0x38 [ 183.417766] __kasan_kmalloc+0xd4/0xd8 [ 183.418917] kmalloc_trace+0x68/0x130 [ 183.419985] kasan_bitops_generic+0x98/0x148 [ 183.421208] kunit_try_run_case+0xf8/0x260 [ 183.422407] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.423875] kthread+0x18c/0x1a8 [ 183.424834] ret_from_fork+0x10/0x20 [ 183.425947] [ 183.426448] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.426448] which belongs to the cache kmalloc-16 of size 16 [ 183.428808] The buggy address is located 8 bytes inside of [ 183.428808] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.431254] [ 183.431690] The buggy address belongs to the physical page: [ 183.433117] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.435115] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.436670] page_type: 0xffffffff() [ 183.437654] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.439332] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.441032] page dumped because: kasan: bad access detected [ 183.442265] [ 183.442769] Memory state around the buggy address: [ 183.444095] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.445821] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.447386] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.449389] ^ [ 183.450835] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.452439] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.453963] ================================================================== [ 182.958338] ================================================================== [ 182.960134] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4/0x6d8 [ 182.962060] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 182.963722] [ 182.964296] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 182.966142] Hardware name: linux,dummy-virt (DT) [ 182.967265] Call trace: [ 182.968021] dump_backtrace+0x9c/0x128 [ 182.969086] show_stack+0x20/0x38 [ 182.970083] dump_stack_lvl+0x60/0xb0 [ 182.971248] print_report+0xf8/0x5d8 [ 182.972358] kasan_report+0xc8/0x118 [ 182.973470] kasan_check_range+0xe8/0x190 [ 182.974708] __kasan_check_write+0x20/0x30 [ 182.975830] kasan_bitops_modify.constprop.0+0xa4/0x6d8 [ 182.977184] kasan_bitops_generic+0xb4/0x148 [ 182.978384] kunit_try_run_case+0xf8/0x260 [ 182.979594] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 182.981024] kthread+0x18c/0x1a8 [ 182.982009] ret_from_fork+0x10/0x20 [ 182.983089] [ 182.983608] Allocated by task 206: [ 182.984500] kasan_save_stack+0x3c/0x68 [ 182.985668] kasan_set_track+0x2c/0x40 [ 182.986801] kasan_save_alloc_info+0x24/0x38 [ 182.988071] __kasan_kmalloc+0xd4/0xd8 [ 182.989189] kmalloc_trace+0x68/0x130 [ 182.990300] kasan_bitops_generic+0x98/0x148 [ 182.991450] kunit_try_run_case+0xf8/0x260 [ 182.992735] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 182.994241] kthread+0x18c/0x1a8 [ 182.995248] ret_from_fork+0x10/0x20 [ 182.996352] [ 182.996982] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 182.996982] which belongs to the cache kmalloc-16 of size 16 [ 182.999527] The buggy address is located 8 bytes inside of [ 182.999527] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.002051] [ 183.002645] The buggy address belongs to the physical page: [ 183.003983] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.005964] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.007496] page_type: 0xffffffff() [ 183.008539] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.010161] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.011503] page dumped because: kasan: bad access detected [ 183.012867] [ 183.013388] Memory state around the buggy address: [ 183.014598] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.016202] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.017848] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.019395] ^ [ 183.020724] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.022310] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.023861] ================================================================== [ 183.237797] ================================================================== [ 183.239232] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x160/0x6d8 [ 183.240972] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.243201] [ 183.243747] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.246200] Hardware name: linux,dummy-virt (DT) [ 183.247704] Call trace: [ 183.248330] dump_backtrace+0x9c/0x128 [ 183.249741] show_stack+0x20/0x38 [ 183.250536] dump_stack_lvl+0x60/0xb0 [ 183.252026] print_report+0xf8/0x5d8 [ 183.253166] kasan_report+0xc8/0x118 [ 183.254316] kasan_check_range+0xe8/0x190 [ 183.255515] __kasan_check_write+0x20/0x30 [ 183.256668] kasan_bitops_modify.constprop.0+0x160/0x6d8 [ 183.258114] kasan_bitops_generic+0xb4/0x148 [ 183.259327] kunit_try_run_case+0xf8/0x260 [ 183.260444] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.262457] kthread+0x18c/0x1a8 [ 183.263490] ret_from_fork+0x10/0x20 [ 183.264609] [ 183.265923] Allocated by task 206: [ 183.266702] kasan_save_stack+0x3c/0x68 [ 183.268074] kasan_set_track+0x2c/0x40 [ 183.269255] kasan_save_alloc_info+0x24/0x38 [ 183.270561] __kasan_kmalloc+0xd4/0xd8 [ 183.271741] kmalloc_trace+0x68/0x130 [ 183.272826] kasan_bitops_generic+0x98/0x148 [ 183.273856] kunit_try_run_case+0xf8/0x260 [ 183.275603] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.277047] kthread+0x18c/0x1a8 [ 183.278034] ret_from_fork+0x10/0x20 [ 183.279121] [ 183.279663] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.279663] which belongs to the cache kmalloc-16 of size 16 [ 183.282722] The buggy address is located 8 bytes inside of [ 183.282722] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.285735] [ 183.286293] The buggy address belongs to the physical page: [ 183.287548] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.289674] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.291283] page_type: 0xffffffff() [ 183.292994] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.294748] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.296302] page dumped because: kasan: bad access detected [ 183.297827] [ 183.298292] Memory state around the buggy address: [ 183.299191] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.300815] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.302392] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.303932] ^ [ 183.305626] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.308131] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.310090] ================================================================== [ 183.027822] ================================================================== [ 183.029399] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xd0/0x6d8 [ 183.031268] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.033184] [ 183.033728] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.035313] Hardware name: linux,dummy-virt (DT) [ 183.036716] Call trace: [ 183.037531] dump_backtrace+0x9c/0x128 [ 183.038674] show_stack+0x20/0x38 [ 183.039682] dump_stack_lvl+0x60/0xb0 [ 183.040865] print_report+0xf8/0x5d8 [ 183.041995] kasan_report+0xc8/0x118 [ 183.043122] __asan_load8+0x9c/0xc0 [ 183.044232] kasan_bitops_modify.constprop.0+0xd0/0x6d8 [ 183.045619] kasan_bitops_generic+0xb4/0x148 [ 183.046842] kunit_try_run_case+0xf8/0x260 [ 183.048023] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.049473] kthread+0x18c/0x1a8 [ 183.050441] ret_from_fork+0x10/0x20 [ 183.051558] [ 183.052081] Allocated by task 206: [ 183.053013] kasan_save_stack+0x3c/0x68 [ 183.054163] kasan_set_track+0x2c/0x40 [ 183.055286] kasan_save_alloc_info+0x24/0x38 [ 183.056542] __kasan_kmalloc+0xd4/0xd8 [ 183.057675] kmalloc_trace+0x68/0x130 [ 183.058738] kasan_bitops_generic+0x98/0x148 [ 183.059914] kunit_try_run_case+0xf8/0x260 [ 183.061119] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.062594] kthread+0x18c/0x1a8 [ 183.063533] ret_from_fork+0x10/0x20 [ 183.064624] [ 183.065133] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.065133] which belongs to the cache kmalloc-16 of size 16 [ 183.067563] The buggy address is located 8 bytes inside of [ 183.067563] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.069954] [ 183.070554] The buggy address belongs to the physical page: [ 183.071873] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.073848] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.075446] page_type: 0xffffffff() [ 183.076498] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.078229] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.079819] page dumped because: kasan: bad access detected [ 183.081096] [ 183.081651] Memory state around the buggy address: [ 183.082883] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.084454] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.086046] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.087563] ^ [ 183.088870] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.090453] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.091961] ================================================================== [ 183.458039] ================================================================== [ 183.459432] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1ac/0x6d8 [ 183.461161] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.463145] [ 183.463849] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.465664] Hardware name: linux,dummy-virt (DT) [ 183.466785] Call trace: [ 183.467468] dump_backtrace+0x9c/0x128 [ 183.468607] show_stack+0x20/0x38 [ 183.469641] dump_stack_lvl+0x60/0xb0 [ 183.470858] print_report+0xf8/0x5d8 [ 183.471992] kasan_report+0xc8/0x118 [ 183.473143] kasan_check_range+0xe8/0x190 [ 183.474369] __kasan_check_write+0x20/0x30 [ 183.475519] kasan_bitops_modify.constprop.0+0x1ac/0x6d8 [ 183.476941] kasan_bitops_generic+0xb4/0x148 [ 183.478183] kunit_try_run_case+0xf8/0x260 [ 183.479403] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.480862] kthread+0x18c/0x1a8 [ 183.481896] ret_from_fork+0x10/0x20 [ 183.483040] [ 183.483651] Allocated by task 206: [ 183.484563] kasan_save_stack+0x3c/0x68 [ 183.485766] kasan_set_track+0x2c/0x40 [ 183.486931] kasan_save_alloc_info+0x24/0x38 [ 183.488208] __kasan_kmalloc+0xd4/0xd8 [ 183.489346] kmalloc_trace+0x68/0x130 [ 183.490413] kasan_bitops_generic+0x98/0x148 [ 183.491623] kunit_try_run_case+0xf8/0x260 [ 183.492837] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.494305] kthread+0x18c/0x1a8 [ 183.495277] ret_from_fork+0x10/0x20 [ 183.496329] [ 183.496884] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.496884] which belongs to the cache kmalloc-16 of size 16 [ 183.499120] The buggy address is located 8 bytes inside of [ 183.499120] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.501520] [ 183.502031] The buggy address belongs to the physical page: [ 183.503311] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.505205] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.506764] page_type: 0xffffffff() [ 183.507792] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.509432] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.511033] page dumped because: kasan: bad access detected [ 183.512210] [ 183.512771] Memory state around the buggy address: [ 183.513933] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.515508] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.517087] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.518620] ^ [ 183.519931] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.521493] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.523014] ================================================================== [ 183.594725] ================================================================== [ 183.596201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x20c/0x6d8 [ 183.597943] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.599466] [ 183.600075] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.601963] Hardware name: linux,dummy-virt (DT) [ 183.603068] Call trace: [ 183.603801] dump_backtrace+0x9c/0x128 [ 183.604880] show_stack+0x20/0x38 [ 183.605844] dump_stack_lvl+0x60/0xb0 [ 183.607011] print_report+0xf8/0x5d8 [ 183.608122] kasan_report+0xc8/0x118 [ 183.609228] __asan_load8+0x9c/0xc0 [ 183.610356] kasan_bitops_modify.constprop.0+0x20c/0x6d8 [ 183.611742] kasan_bitops_generic+0xb4/0x148 [ 183.612953] kunit_try_run_case+0xf8/0x260 [ 183.614140] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.615597] kthread+0x18c/0x1a8 [ 183.616550] ret_from_fork+0x10/0x20 [ 183.617641] [ 183.618134] Allocated by task 206: [ 183.619099] kasan_save_stack+0x3c/0x68 [ 183.620264] kasan_set_track+0x2c/0x40 [ 183.621409] kasan_save_alloc_info+0x24/0x38 [ 183.622696] __kasan_kmalloc+0xd4/0xd8 [ 183.623823] kmalloc_trace+0x68/0x130 [ 183.624866] kasan_bitops_generic+0x98/0x148 [ 183.626085] kunit_try_run_case+0xf8/0x260 [ 183.627262] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.628719] kthread+0x18c/0x1a8 [ 183.629661] ret_from_fork+0x10/0x20 [ 183.630749] [ 183.631268] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.631268] which belongs to the cache kmalloc-16 of size 16 [ 183.633598] The buggy address is located 8 bytes inside of [ 183.633598] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.636022] [ 183.636646] The buggy address belongs to the physical page: [ 183.637932] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.639949] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.641480] page_type: 0xffffffff() [ 183.642562] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.644248] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.645878] page dumped because: kasan: bad access detected [ 183.647133] [ 183.647661] Memory state around the buggy address: [ 183.648874] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.650609] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.652115] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.654662] ^ [ 183.656561] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.658172] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.659672] ==================================================================