Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 184.276433] ================================================================== [ 184.279238] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8 [ 184.281120] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 184.282764] [ 184.283348] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 184.285148] Hardware name: linux,dummy-virt (DT) [ 184.286285] Call trace: [ 184.286997] dump_backtrace+0x9c/0x128 [ 184.288070] show_stack+0x20/0x38 [ 184.289061] dump_stack_lvl+0x60/0xb0 [ 184.290263] print_report+0xf8/0x5d8 [ 184.291359] kasan_report+0xc8/0x118 [ 184.292449] kasan_check_range+0xe8/0x190 [ 184.293672] __kasan_check_write+0x20/0x30 [ 184.294833] kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8 [ 184.296390] kasan_bitops_generic+0xc0/0x148 [ 184.297612] kunit_try_run_case+0xf8/0x260 [ 184.298836] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 184.300273] kthread+0x18c/0x1a8 [ 184.301238] ret_from_fork+0x10/0x20 [ 184.302324] [ 184.302829] Allocated by task 206: [ 184.303722] kasan_save_stack+0x3c/0x68 [ 184.304946] kasan_set_track+0x2c/0x40 [ 184.306108] kasan_save_alloc_info+0x24/0x38 [ 184.307375] __kasan_kmalloc+0xd4/0xd8 [ 184.308521] kmalloc_trace+0x68/0x130 [ 184.309590] kasan_bitops_generic+0x98/0x148 [ 184.310800] kunit_try_run_case+0xf8/0x260 [ 184.312005] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 184.313450] kthread+0x18c/0x1a8 [ 184.314424] ret_from_fork+0x10/0x20 [ 184.315482] [ 184.316041] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 184.316041] which belongs to the cache kmalloc-16 of size 16 [ 184.318393] The buggy address is located 8 bytes inside of [ 184.318393] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 184.320786] [ 184.321341] The buggy address belongs to the physical page: [ 184.322627] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 184.324516] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 184.326128] page_type: 0xffffffff() [ 184.327161] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 184.328874] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 184.330471] page dumped because: kasan: bad access detected [ 184.331692] [ 184.332225] Memory state around the buggy address: [ 184.333398] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 184.335018] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 184.336636] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 184.338197] ^ [ 184.339538] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 184.341132] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 184.342656] ================================================================== [ 183.662389] ================================================================== [ 183.663952] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8 [ 183.665890] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.667316] [ 183.667891] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.669779] Hardware name: linux,dummy-virt (DT) [ 183.670954] Call trace: [ 183.671709] dump_backtrace+0x9c/0x128 [ 183.672837] show_stack+0x20/0x38 [ 183.673822] dump_stack_lvl+0x60/0xb0 [ 183.674973] print_report+0xf8/0x5d8 [ 183.676061] kasan_report+0xc8/0x118 [ 183.677168] kasan_check_range+0xe8/0x190 [ 183.678388] __kasan_check_write+0x20/0x30 [ 183.679470] kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8 [ 183.680966] kasan_bitops_generic+0xc0/0x148 [ 183.682167] kunit_try_run_case+0xf8/0x260 [ 183.683351] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.684783] kthread+0x18c/0x1a8 [ 183.685776] ret_from_fork+0x10/0x20 [ 183.686863] [ 183.687359] Allocated by task 206: [ 183.688276] kasan_save_stack+0x3c/0x68 [ 183.689429] kasan_set_track+0x2c/0x40 [ 183.690542] kasan_save_alloc_info+0x24/0x38 [ 183.691805] __kasan_kmalloc+0xd4/0xd8 [ 183.692987] kmalloc_trace+0x68/0x130 [ 183.694076] kasan_bitops_generic+0x98/0x148 [ 183.695251] kunit_try_run_case+0xf8/0x260 [ 183.696449] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.697953] kthread+0x18c/0x1a8 [ 183.698893] ret_from_fork+0x10/0x20 [ 183.699988] [ 183.700522] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.700522] which belongs to the cache kmalloc-16 of size 16 [ 183.702841] The buggy address is located 8 bytes inside of [ 183.702841] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.705181] [ 183.705766] The buggy address belongs to the physical page: [ 183.707102] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.709025] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.710553] page_type: 0xffffffff() [ 183.711594] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.713263] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.714894] page dumped because: kasan: bad access detected [ 183.716076] [ 183.716596] Memory state around the buggy address: [ 183.717834] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.719455] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.721046] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.722546] ^ [ 183.723838] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.725400] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.726928] ================================================================== [ 183.729680] ================================================================== [ 183.731098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8 [ 183.733001] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.734675] [ 183.735321] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.737230] Hardware name: linux,dummy-virt (DT) [ 183.738303] Call trace: [ 183.739040] dump_backtrace+0x9c/0x128 [ 183.740133] show_stack+0x20/0x38 [ 183.741124] dump_stack_lvl+0x60/0xb0 [ 183.742278] print_report+0xf8/0x5d8 [ 183.743375] kasan_report+0xc8/0x118 [ 183.744486] __asan_load8+0x9c/0xc0 [ 183.745604] kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8 [ 183.747118] kasan_bitops_generic+0xc0/0x148 [ 183.748307] kunit_try_run_case+0xf8/0x260 [ 183.749499] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.750971] kthread+0x18c/0x1a8 [ 183.751899] ret_from_fork+0x10/0x20 [ 183.753061] [ 183.754134] Allocated by task 206: [ 183.755245] kasan_save_stack+0x3c/0x68 [ 183.756674] kasan_set_track+0x2c/0x40 [ 183.757853] kasan_save_alloc_info+0x24/0x38 [ 183.759132] __kasan_kmalloc+0xd4/0xd8 [ 183.760279] kmalloc_trace+0x68/0x130 [ 183.761349] kasan_bitops_generic+0x98/0x148 [ 183.762531] kunit_try_run_case+0xf8/0x260 [ 183.763756] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.765187] kthread+0x18c/0x1a8 [ 183.766165] ret_from_fork+0x10/0x20 [ 183.767244] [ 183.767772] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.767772] which belongs to the cache kmalloc-16 of size 16 [ 183.770172] The buggy address is located 8 bytes inside of [ 183.770172] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.772520] [ 183.773274] The buggy address belongs to the physical page: [ 183.774566] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.776537] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.778103] page_type: 0xffffffff() [ 183.779178] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.780903] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.782522] page dumped because: kasan: bad access detected [ 183.783790] [ 183.784317] Memory state around the buggy address: [ 183.785544] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.787155] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.788782] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.790311] ^ [ 183.791660] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.793244] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.794760] ================================================================== [ 184.207913] ================================================================== [ 184.209548] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8 [ 184.211437] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 184.213059] [ 184.213753] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 184.215551] Hardware name: linux,dummy-virt (DT) [ 184.216663] Call trace: [ 184.217382] dump_backtrace+0x9c/0x128 [ 184.218482] show_stack+0x20/0x38 [ 184.219448] dump_stack_lvl+0x60/0xb0 [ 184.220515] print_report+0xf8/0x5d8 [ 184.221498] kasan_report+0xc8/0x118 [ 184.222918] __asan_load8+0x9c/0xc0 [ 184.224137] kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8 [ 184.225775] kasan_bitops_generic+0xc0/0x148 [ 184.227064] kunit_try_run_case+0xf8/0x260 [ 184.228306] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 184.229828] kthread+0x18c/0x1a8 [ 184.230821] ret_from_fork+0x10/0x20 [ 184.231938] [ 184.232972] Allocated by task 206: [ 184.234001] kasan_save_stack+0x3c/0x68 [ 184.235248] kasan_set_track+0x2c/0x40 [ 184.236399] kasan_save_alloc_info+0x24/0x38 [ 184.237687] __kasan_kmalloc+0xd4/0xd8 [ 184.238857] kmalloc_trace+0x68/0x130 [ 184.239932] kasan_bitops_generic+0x98/0x148 [ 184.241146] kunit_try_run_case+0xf8/0x260 [ 184.242371] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 184.243843] kthread+0x18c/0x1a8 [ 184.244771] ret_from_fork+0x10/0x20 [ 184.245868] [ 184.246413] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 184.246413] which belongs to the cache kmalloc-16 of size 16 [ 184.248765] The buggy address is located 8 bytes inside of [ 184.248765] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 184.251183] [ 184.251806] The buggy address belongs to the physical page: [ 184.253116] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 184.255159] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 184.256359] page_type: 0xffffffff() [ 184.257315] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 184.259110] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 184.260748] page dumped because: kasan: bad access detected [ 184.262027] [ 184.262606] Memory state around the buggy address: [ 184.263791] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 184.265429] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 184.267046] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 184.268541] ^ [ 184.269882] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 184.271472] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 184.273012] ================================================================== [ 183.934158] ================================================================== [ 183.935458] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8 [ 183.937373] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.939225] [ 183.939821] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.941633] Hardware name: linux,dummy-virt (DT) [ 183.942762] Call trace: [ 183.943471] dump_backtrace+0x9c/0x128 [ 183.944551] show_stack+0x20/0x38 [ 183.945548] dump_stack_lvl+0x60/0xb0 [ 183.946741] print_report+0xf8/0x5d8 [ 183.947870] kasan_report+0xc8/0x118 [ 183.948977] kasan_check_range+0xe8/0x190 [ 183.950196] __kasan_check_write+0x20/0x30 [ 183.951319] kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8 [ 183.952911] kasan_bitops_generic+0xc0/0x148 [ 183.954123] kunit_try_run_case+0xf8/0x260 [ 183.955359] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.956828] kthread+0x18c/0x1a8 [ 183.957815] ret_from_fork+0x10/0x20 [ 183.958909] [ 183.959390] Allocated by task 206: [ 183.960206] kasan_save_stack+0x3c/0x68 [ 183.961370] kasan_set_track+0x2c/0x40 [ 183.962354] kasan_save_alloc_info+0x24/0x38 [ 183.963900] __kasan_kmalloc+0xd4/0xd8 [ 183.965469] kmalloc_trace+0x68/0x130 [ 183.966600] kasan_bitops_generic+0x98/0x148 [ 183.967857] kunit_try_run_case+0xf8/0x260 [ 183.969124] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.970624] kthread+0x18c/0x1a8 [ 183.971602] ret_from_fork+0x10/0x20 [ 183.972713] [ 183.973236] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.973236] which belongs to the cache kmalloc-16 of size 16 [ 183.975673] The buggy address is located 8 bytes inside of [ 183.975673] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.978075] [ 183.978695] The buggy address belongs to the physical page: [ 183.979987] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.981980] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.983504] page_type: 0xffffffff() [ 183.984532] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.986287] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.987907] page dumped because: kasan: bad access detected [ 183.989179] [ 183.989728] Memory state around the buggy address: [ 183.990967] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.992598] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.994216] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.995787] ^ [ 183.997095] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.998799] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 184.000332] ================================================================== [ 184.070999] ================================================================== [ 184.072869] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8 [ 184.074872] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 184.076725] [ 184.077458] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 184.079292] Hardware name: linux,dummy-virt (DT) [ 184.080440] Call trace: [ 184.081241] dump_backtrace+0x9c/0x128 [ 184.082372] show_stack+0x20/0x38 [ 184.083409] dump_stack_lvl+0x60/0xb0 [ 184.084609] print_report+0xf8/0x5d8 [ 184.085788] kasan_report+0xc8/0x118 [ 184.086974] kasan_check_range+0xe8/0x190 [ 184.088236] __kasan_check_write+0x20/0x30 [ 184.089412] kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8 [ 184.090987] kasan_bitops_generic+0xc0/0x148 [ 184.092252] kunit_try_run_case+0xf8/0x260 [ 184.093484] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 184.094994] kthread+0x18c/0x1a8 [ 184.095989] ret_from_fork+0x10/0x20 [ 184.097071] [ 184.097560] Allocated by task 206: [ 184.098546] kasan_save_stack+0x3c/0x68 [ 184.099719] kasan_set_track+0x2c/0x40 [ 184.100850] kasan_save_alloc_info+0x24/0x38 [ 184.102110] __kasan_kmalloc+0xd4/0xd8 [ 184.103251] kmalloc_trace+0x68/0x130 [ 184.104294] kasan_bitops_generic+0x98/0x148 [ 184.105483] kunit_try_run_case+0xf8/0x260 [ 184.106709] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 184.108142] kthread+0x18c/0x1a8 [ 184.109136] ret_from_fork+0x10/0x20 [ 184.110186] [ 184.110754] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 184.110754] which belongs to the cache kmalloc-16 of size 16 [ 184.113080] The buggy address is located 8 bytes inside of [ 184.113080] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 184.115549] [ 184.116102] The buggy address belongs to the physical page: [ 184.117339] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 184.119279] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 184.120814] page_type: 0xffffffff() [ 184.121890] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 184.123597] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 184.125191] page dumped because: kasan: bad access detected [ 184.126480] [ 184.127038] Memory state around the buggy address: [ 184.128240] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 184.129867] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 184.131445] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 184.133001] ^ [ 184.134291] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 184.135897] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 184.137414] ================================================================== [ 183.866462] ================================================================== [ 183.867992] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8 [ 183.869946] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.871598] [ 183.872275] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.874118] Hardware name: linux,dummy-virt (DT) [ 183.875227] Call trace: [ 183.875947] dump_backtrace+0x9c/0x128 [ 183.877032] show_stack+0x20/0x38 [ 183.878094] dump_stack_lvl+0x60/0xb0 [ 183.879283] print_report+0xf8/0x5d8 [ 183.880410] kasan_report+0xc8/0x118 [ 183.881543] __asan_load8+0x9c/0xc0 [ 183.882709] kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8 [ 183.884244] kasan_bitops_generic+0xc0/0x148 [ 183.885273] kunit_try_run_case+0xf8/0x260 [ 183.886985] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.888530] kthread+0x18c/0x1a8 [ 183.889530] ret_from_fork+0x10/0x20 [ 183.890688] [ 183.891298] Allocated by task 206: [ 183.892210] kasan_save_stack+0x3c/0x68 [ 183.893419] kasan_set_track+0x2c/0x40 [ 183.894545] kasan_save_alloc_info+0x24/0x38 [ 183.895843] __kasan_kmalloc+0xd4/0xd8 [ 183.896972] kmalloc_trace+0x68/0x130 [ 183.898080] kasan_bitops_generic+0x98/0x148 [ 183.899303] kunit_try_run_case+0xf8/0x260 [ 183.900506] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.901973] kthread+0x18c/0x1a8 [ 183.902968] ret_from_fork+0x10/0x20 [ 183.904038] [ 183.904548] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.904548] which belongs to the cache kmalloc-16 of size 16 [ 183.906979] The buggy address is located 8 bytes inside of [ 183.906979] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.909436] [ 183.910025] The buggy address belongs to the physical page: [ 183.911324] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.913259] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.914874] page_type: 0xffffffff() [ 183.915927] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.917621] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.919251] page dumped because: kasan: bad access detected [ 183.920524] [ 183.921045] Memory state around the buggy address: [ 183.922298] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.923886] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.925480] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.927060] ^ [ 183.928395] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.929988] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.931501] ================================================================== [ 183.797517] ================================================================== [ 183.799420] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8 [ 183.801261] Write of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 183.803090] [ 183.803651] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 183.805439] Hardware name: linux,dummy-virt (DT) [ 183.806548] Call trace: [ 183.807271] dump_backtrace+0x9c/0x128 [ 183.808325] show_stack+0x20/0x38 [ 183.809332] dump_stack_lvl+0x60/0xb0 [ 183.810500] print_report+0xf8/0x5d8 [ 183.811640] kasan_report+0xc8/0x118 [ 183.812750] kasan_check_range+0xe8/0x190 [ 183.813988] __kasan_check_write+0x20/0x30 [ 183.815130] kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8 [ 183.816687] kasan_bitops_generic+0xc0/0x148 [ 183.817914] kunit_try_run_case+0xf8/0x260 [ 183.819100] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.820536] kthread+0x18c/0x1a8 [ 183.821526] ret_from_fork+0x10/0x20 [ 183.822602] [ 183.823112] Allocated by task 206: [ 183.824014] kasan_save_stack+0x3c/0x68 [ 183.825156] kasan_set_track+0x2c/0x40 [ 183.826310] kasan_save_alloc_info+0x24/0x38 [ 183.827565] __kasan_kmalloc+0xd4/0xd8 [ 183.828705] kmalloc_trace+0x68/0x130 [ 183.829788] kasan_bitops_generic+0x98/0x148 [ 183.831061] kunit_try_run_case+0xf8/0x260 [ 183.832262] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 183.833730] kthread+0x18c/0x1a8 [ 183.834665] ret_from_fork+0x10/0x20 [ 183.835754] [ 183.836265] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 183.836265] which belongs to the cache kmalloc-16 of size 16 [ 183.838598] The buggy address is located 8 bytes inside of [ 183.838598] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 183.840990] [ 183.841620] The buggy address belongs to the physical page: [ 183.842910] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 183.844850] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 183.846407] page_type: 0xffffffff() [ 183.847440] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 183.849155] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 183.850788] page dumped because: kasan: bad access detected [ 183.852038] [ 183.852601] Memory state around the buggy address: [ 183.853791] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 183.855367] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 183.857029] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 183.858334] ^ [ 183.860754] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.862268] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 183.863811] ================================================================== [ 184.003183] ================================================================== [ 184.004913] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8 [ 184.006926] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 184.008634] [ 184.009301] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 184.011132] Hardware name: linux,dummy-virt (DT) [ 184.012209] Call trace: [ 184.012937] dump_backtrace+0x9c/0x128 [ 184.014034] show_stack+0x20/0x38 [ 184.015054] dump_stack_lvl+0x60/0xb0 [ 184.016224] print_report+0xf8/0x5d8 [ 184.017332] kasan_report+0xc8/0x118 [ 184.018458] __asan_load8+0x9c/0xc0 [ 184.019557] kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8 [ 184.021112] kasan_bitops_generic+0xc0/0x148 [ 184.022334] kunit_try_run_case+0xf8/0x260 [ 184.023529] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 184.024996] kthread+0x18c/0x1a8 [ 184.025965] ret_from_fork+0x10/0x20 [ 184.027060] [ 184.027686] Allocated by task 206: [ 184.028634] kasan_save_stack+0x3c/0x68 [ 184.029835] kasan_set_track+0x2c/0x40 [ 184.030962] kasan_save_alloc_info+0x24/0x38 [ 184.032244] __kasan_kmalloc+0xd4/0xd8 [ 184.033383] kmalloc_trace+0x68/0x130 [ 184.034450] kasan_bitops_generic+0x98/0x148 [ 184.035670] kunit_try_run_case+0xf8/0x260 [ 184.036864] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 184.038347] kthread+0x18c/0x1a8 [ 184.039343] ret_from_fork+0x10/0x20 [ 184.040446] [ 184.041033] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 184.041033] which belongs to the cache kmalloc-16 of size 16 [ 184.043344] The buggy address is located 8 bytes inside of [ 184.043344] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 184.045758] [ 184.046395] The buggy address belongs to the physical page: [ 184.047666] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 184.049584] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 184.051149] page_type: 0xffffffff() [ 184.052187] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 184.053918] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 184.055508] page dumped because: kasan: bad access detected [ 184.056795] [ 184.057317] Memory state around the buggy address: [ 184.058540] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 184.060167] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 184.061774] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 184.063294] ^ [ 184.064621] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 184.066150] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 184.068370] ================================================================== [ 184.140309] ================================================================== [ 184.141965] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8 [ 184.143828] Read of size 8 at addr ffff0000c5e9f5c8 by task kunit_try_catch/206 [ 184.145452] [ 184.146066] CPU: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 184.147938] Hardware name: linux,dummy-virt (DT) [ 184.149069] Call trace: [ 184.149836] dump_backtrace+0x9c/0x128 [ 184.150939] show_stack+0x20/0x38 [ 184.151958] dump_stack_lvl+0x60/0xb0 [ 184.153108] print_report+0xf8/0x5d8 [ 184.154276] kasan_report+0xc8/0x118 [ 184.155394] __asan_load8+0x9c/0xc0 [ 184.156533] kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8 [ 184.158131] kasan_bitops_generic+0xc0/0x148 [ 184.159340] kunit_try_run_case+0xf8/0x260 [ 184.160624] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 184.162079] kthread+0x18c/0x1a8 [ 184.163003] ret_from_fork+0x10/0x20 [ 184.164088] [ 184.164657] Allocated by task 206: [ 184.165544] kasan_save_stack+0x3c/0x68 [ 184.166748] kasan_set_track+0x2c/0x40 [ 184.167882] kasan_save_alloc_info+0x24/0x38 [ 184.169240] __kasan_kmalloc+0xd4/0xd8 [ 184.170221] kmalloc_trace+0x68/0x130 [ 184.171507] kasan_bitops_generic+0x98/0x148 [ 184.173019] kunit_try_run_case+0xf8/0x260 [ 184.174285] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 184.175753] kthread+0x18c/0x1a8 [ 184.176732] ret_from_fork+0x10/0x20 [ 184.177852] [ 184.178368] The buggy address belongs to the object at ffff0000c5e9f5c0 [ 184.178368] which belongs to the cache kmalloc-16 of size 16 [ 184.180725] The buggy address is located 8 bytes inside of [ 184.180725] allocated 9-byte region [ffff0000c5e9f5c0, ffff0000c5e9f5c9) [ 184.183160] [ 184.183703] The buggy address belongs to the physical page: [ 184.185041] page:00000000a166c351 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e9f [ 184.187014] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 184.188596] page_type: 0xffffffff() [ 184.189627] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 184.191334] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 184.192990] page dumped because: kasan: bad access detected [ 184.194245] [ 184.194816] Memory state around the buggy address: [ 184.196041] ffff0000c5e9f480: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 02 fc fc [ 184.197618] ffff0000c5e9f500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 184.199198] >ffff0000c5e9f580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 184.200752] ^ [ 184.202089] ffff0000c5e9f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 184.203691] ffff0000c5e9f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 184.205221] ==================================================================