Date
June 17, 2025, 3:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 95.013215] ================================================================== [ 95.014617] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4/0x6d8 [ 95.015866] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.016918] [ 95.017383] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.018609] Hardware name: linux,dummy-virt (DT) [ 95.020120] Call trace: [ 95.020770] dump_backtrace+0x9c/0x128 [ 95.021628] show_stack+0x20/0x38 [ 95.022366] dump_stack_lvl+0x60/0xb0 [ 95.023181] print_report+0xf8/0x5e8 [ 95.023991] kasan_report+0xdc/0x128 [ 95.024805] kasan_check_range+0xe8/0x190 [ 95.025624] __kasan_check_write+0x20/0x30 [ 95.026379] kasan_bitops_modify.constprop.0+0xa4/0x6d8 [ 95.027312] kasan_bitops_generic+0xb4/0x148 [ 95.028183] kunit_try_run_case+0x114/0x298 [ 95.029807] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.031030] kthread+0x18c/0x1a8 [ 95.031752] ret_from_fork+0x10/0x20 [ 95.032482] [ 95.032797] Allocated by task 207: [ 95.033310] kasan_save_stack+0x3c/0x68 [ 95.034304] kasan_set_track+0x2c/0x40 [ 95.035648] kasan_save_alloc_info+0x24/0x38 [ 95.036425] __kasan_kmalloc+0xd4/0xd8 [ 95.037390] kmalloc_trace+0x68/0x130 [ 95.038144] kasan_bitops_generic+0x98/0x148 [ 95.039034] kunit_try_run_case+0x114/0x298 [ 95.039974] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.041016] kthread+0x18c/0x1a8 [ 95.041713] ret_from_fork+0x10/0x20 [ 95.042497] [ 95.042982] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.042982] which belongs to the cache kmalloc-16 of size 16 [ 95.044863] The buggy address is located 8 bytes inside of [ 95.044863] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.047070] [ 95.047783] The buggy address belongs to the physical page: [ 95.048718] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.049961] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.050971] page_type: 0xffffffff() [ 95.051788] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.053190] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.054803] page dumped because: kasan: bad access detected [ 95.055465] [ 95.056106] Memory state around the buggy address: [ 95.058384] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.059224] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.064521] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.065534] ^ [ 95.066499] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.068081] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.069730] ================================================================== [ 95.121926] ================================================================== [ 95.123280] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0x6d8 [ 95.124399] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.125812] [ 95.126353] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.127816] Hardware name: linux,dummy-virt (DT) [ 95.128555] Call trace: [ 95.129012] dump_backtrace+0x9c/0x128 [ 95.130495] show_stack+0x20/0x38 [ 95.131232] dump_stack_lvl+0x60/0xb0 [ 95.132090] print_report+0xf8/0x5e8 [ 95.132937] kasan_report+0xdc/0x128 [ 95.133770] kasan_check_range+0xe8/0x190 [ 95.134603] __kasan_check_write+0x20/0x30 [ 95.135317] kasan_bitops_modify.constprop.0+0x100/0x6d8 [ 95.136511] kasan_bitops_generic+0xb4/0x148 [ 95.137322] kunit_try_run_case+0x114/0x298 [ 95.138296] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.139262] kthread+0x18c/0x1a8 [ 95.139978] ret_from_fork+0x10/0x20 [ 95.140855] [ 95.141245] Allocated by task 207: [ 95.141881] kasan_save_stack+0x3c/0x68 [ 95.142676] kasan_set_track+0x2c/0x40 [ 95.143452] kasan_save_alloc_info+0x24/0x38 [ 95.144319] __kasan_kmalloc+0xd4/0xd8 [ 95.145071] kmalloc_trace+0x68/0x130 [ 95.146007] kasan_bitops_generic+0x98/0x148 [ 95.146513] kunit_try_run_case+0x114/0x298 [ 95.147023] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.148177] kthread+0x18c/0x1a8 [ 95.148909] ret_from_fork+0x10/0x20 [ 95.149646] [ 95.150045] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.150045] which belongs to the cache kmalloc-16 of size 16 [ 95.151576] The buggy address is located 8 bytes inside of [ 95.151576] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.152904] [ 95.153313] The buggy address belongs to the physical page: [ 95.154215] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.156086] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.157224] page_type: 0xffffffff() [ 95.158030] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.159115] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.160836] page dumped because: kasan: bad access detected [ 95.161870] [ 95.162119] Memory state around the buggy address: [ 95.163138] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.164069] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.165227] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.166248] ^ [ 95.167793] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.169149] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.170314] ================================================================== [ 95.427946] ================================================================== [ 95.428622] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0x6d8 [ 95.429386] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.430066] [ 95.430294] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.431168] Hardware name: linux,dummy-virt (DT) [ 95.431591] Call trace: [ 95.431890] dump_backtrace+0x9c/0x128 [ 95.432375] show_stack+0x20/0x38 [ 95.432849] dump_stack_lvl+0x60/0xb0 [ 95.433318] print_report+0xf8/0x5e8 [ 95.433783] kasan_report+0xdc/0x128 [ 95.434239] kasan_check_range+0xe8/0x190 [ 95.434791] __kasan_check_write+0x20/0x30 [ 95.435311] kasan_bitops_modify.constprop.0+0x1dc/0x6d8 [ 95.435957] kasan_bitops_generic+0xb4/0x148 [ 95.436497] kunit_try_run_case+0x114/0x298 [ 95.436988] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.437553] kthread+0x18c/0x1a8 [ 95.437936] ret_from_fork+0x10/0x20 [ 95.438374] [ 95.438558] Allocated by task 207: [ 95.438937] kasan_save_stack+0x3c/0x68 [ 95.439439] kasan_set_track+0x2c/0x40 [ 95.439929] kasan_save_alloc_info+0x24/0x38 [ 95.440521] __kasan_kmalloc+0xd4/0xd8 [ 95.440994] kmalloc_trace+0x68/0x130 [ 95.441483] kasan_bitops_generic+0x98/0x148 [ 95.441945] kunit_try_run_case+0x114/0x298 [ 95.442461] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.443101] kthread+0x18c/0x1a8 [ 95.443488] ret_from_fork+0x10/0x20 [ 95.443991] [ 95.444239] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.444239] which belongs to the cache kmalloc-16 of size 16 [ 95.444989] The buggy address is located 8 bytes inside of [ 95.444989] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.446080] [ 95.446324] The buggy address belongs to the physical page: [ 95.446810] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.447671] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.448308] page_type: 0xffffffff() [ 95.448772] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.449535] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.450211] page dumped because: kasan: bad access detected [ 95.450678] [ 95.450912] Memory state around the buggy address: [ 95.451428] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.452148] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.452845] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.453518] ^ [ 95.454027] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.454704] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.455321] ================================================================== [ 95.172911] ================================================================== [ 95.173825] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x130/0x6d8 [ 95.175372] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.176396] [ 95.177344] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.178658] Hardware name: linux,dummy-virt (DT) [ 95.179514] Call trace: [ 95.180021] dump_backtrace+0x9c/0x128 [ 95.180954] show_stack+0x20/0x38 [ 95.181744] dump_stack_lvl+0x60/0xb0 [ 95.182537] print_report+0xf8/0x5e8 [ 95.183467] kasan_report+0xdc/0x128 [ 95.184739] __asan_load8+0x9c/0xc0 [ 95.185872] kasan_bitops_modify.constprop.0+0x130/0x6d8 [ 95.186824] kasan_bitops_generic+0xb4/0x148 [ 95.187636] kunit_try_run_case+0x114/0x298 [ 95.188556] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.189626] kthread+0x18c/0x1a8 [ 95.190388] ret_from_fork+0x10/0x20 [ 95.191214] [ 95.191584] Allocated by task 207: [ 95.192720] kasan_save_stack+0x3c/0x68 [ 95.193750] kasan_set_track+0x2c/0x40 [ 95.194631] kasan_save_alloc_info+0x24/0x38 [ 95.195571] __kasan_kmalloc+0xd4/0xd8 [ 95.196464] kmalloc_trace+0x68/0x130 [ 95.197317] kasan_bitops_generic+0x98/0x148 [ 95.198093] kunit_try_run_case+0x114/0x298 [ 95.198755] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.200243] kthread+0x18c/0x1a8 [ 95.201661] ret_from_fork+0x10/0x20 [ 95.202555] [ 95.203041] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.203041] which belongs to the cache kmalloc-16 of size 16 [ 95.204785] The buggy address is located 8 bytes inside of [ 95.204785] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.206360] [ 95.207607] The buggy address belongs to the physical page: [ 95.208377] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.209712] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.210866] page_type: 0xffffffff() [ 95.211604] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.212864] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.213975] page dumped because: kasan: bad access detected [ 95.215627] [ 95.216040] Memory state around the buggy address: [ 95.216760] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.217911] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.218993] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.220078] ^ [ 95.221054] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.222142] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.222943] ================================================================== [ 95.072750] ================================================================== [ 95.073703] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xd0/0x6d8 [ 95.075502] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.076455] [ 95.076855] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.078368] Hardware name: linux,dummy-virt (DT) [ 95.079168] Call trace: [ 95.079691] dump_backtrace+0x9c/0x128 [ 95.080487] show_stack+0x20/0x38 [ 95.081235] dump_stack_lvl+0x60/0xb0 [ 95.082005] print_report+0xf8/0x5e8 [ 95.083643] kasan_report+0xdc/0x128 [ 95.084633] __asan_load8+0x9c/0xc0 [ 95.085454] kasan_bitops_modify.constprop.0+0xd0/0x6d8 [ 95.086445] kasan_bitops_generic+0xb4/0x148 [ 95.087346] kunit_try_run_case+0x114/0x298 [ 95.088253] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.089560] kthread+0x18c/0x1a8 [ 95.090288] ret_from_fork+0x10/0x20 [ 95.091280] [ 95.091586] Allocated by task 207: [ 95.092047] kasan_save_stack+0x3c/0x68 [ 95.092612] kasan_set_track+0x2c/0x40 [ 95.093139] kasan_save_alloc_info+0x24/0x38 [ 95.093737] __kasan_kmalloc+0xd4/0xd8 [ 95.095264] kmalloc_trace+0x68/0x130 [ 95.096127] kasan_bitops_generic+0x98/0x148 [ 95.096954] kunit_try_run_case+0x114/0x298 [ 95.097698] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.099058] kthread+0x18c/0x1a8 [ 95.099620] ret_from_fork+0x10/0x20 [ 95.100149] [ 95.100429] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.100429] which belongs to the cache kmalloc-16 of size 16 [ 95.102424] The buggy address is located 8 bytes inside of [ 95.102424] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.104184] [ 95.104577] The buggy address belongs to the physical page: [ 95.105311] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.106935] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.108215] page_type: 0xffffffff() [ 95.109063] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.110267] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.111563] page dumped because: kasan: bad access detected [ 95.112793] [ 95.113153] Memory state around the buggy address: [ 95.113562] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.114040] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.115164] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.116255] ^ [ 95.117290] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.118297] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.119236] ================================================================== [ 95.276928] ================================================================== [ 95.278233] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x194/0x6d8 [ 95.279711] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.281182] [ 95.281629] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.283172] Hardware name: linux,dummy-virt (DT) [ 95.284089] Call trace: [ 95.284729] dump_backtrace+0x9c/0x128 [ 95.285570] show_stack+0x20/0x38 [ 95.286346] dump_stack_lvl+0x60/0xb0 [ 95.287283] print_report+0xf8/0x5e8 [ 95.288209] kasan_report+0xdc/0x128 [ 95.289118] kasan_check_range+0xe8/0x190 [ 95.290003] __kasan_check_write+0x20/0x30 [ 95.290852] kasan_bitops_modify.constprop.0+0x194/0x6d8 [ 95.292018] kasan_bitops_generic+0xb4/0x148 [ 95.292997] kunit_try_run_case+0x114/0x298 [ 95.293934] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.294940] kthread+0x18c/0x1a8 [ 95.295838] ret_from_fork+0x10/0x20 [ 95.296805] [ 95.297243] Allocated by task 207: [ 95.297736] kasan_save_stack+0x3c/0x68 [ 95.298656] kasan_set_track+0x2c/0x40 [ 95.299776] kasan_save_alloc_info+0x24/0x38 [ 95.300870] __kasan_kmalloc+0xd4/0xd8 [ 95.301690] kmalloc_trace+0x68/0x130 [ 95.302483] kasan_bitops_generic+0x98/0x148 [ 95.303404] kunit_try_run_case+0x114/0x298 [ 95.304510] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.305582] kthread+0x18c/0x1a8 [ 95.306354] ret_from_fork+0x10/0x20 [ 95.307231] [ 95.307815] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.307815] which belongs to the cache kmalloc-16 of size 16 [ 95.309548] The buggy address is located 8 bytes inside of [ 95.309548] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.311274] [ 95.311833] The buggy address belongs to the physical page: [ 95.312792] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.314027] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.315054] page_type: 0xffffffff() [ 95.315660] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.319027] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.319984] page dumped because: kasan: bad access detected [ 95.321436] [ 95.322142] Memory state around the buggy address: [ 95.323663] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.326211] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.329362] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.330916] ^ [ 95.331822] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.332936] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.333914] ================================================================== [ 95.457068] ================================================================== [ 95.457593] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x20c/0x6d8 [ 95.458480] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.459190] [ 95.459455] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.460353] Hardware name: linux,dummy-virt (DT) [ 95.460795] Call trace: [ 95.461077] dump_backtrace+0x9c/0x128 [ 95.461562] show_stack+0x20/0x38 [ 95.462003] dump_stack_lvl+0x60/0xb0 [ 95.462407] print_report+0xf8/0x5e8 [ 95.462952] kasan_report+0xdc/0x128 [ 95.463397] __asan_load8+0x9c/0xc0 [ 95.463885] kasan_bitops_modify.constprop.0+0x20c/0x6d8 [ 95.464555] kasan_bitops_generic+0xb4/0x148 [ 95.464982] kunit_try_run_case+0x114/0x298 [ 95.466548] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.467264] kthread+0x18c/0x1a8 [ 95.467702] ret_from_fork+0x10/0x20 [ 95.468192] [ 95.468403] Allocated by task 207: [ 95.468774] kasan_save_stack+0x3c/0x68 [ 95.469305] kasan_set_track+0x2c/0x40 [ 95.469763] kasan_save_alloc_info+0x24/0x38 [ 95.470245] __kasan_kmalloc+0xd4/0xd8 [ 95.470702] kmalloc_trace+0x68/0x130 [ 95.471436] kasan_bitops_generic+0x98/0x148 [ 95.472375] kunit_try_run_case+0x114/0x298 [ 95.472934] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.473505] kthread+0x18c/0x1a8 [ 95.473874] ret_from_fork+0x10/0x20 [ 95.474308] [ 95.474563] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.474563] which belongs to the cache kmalloc-16 of size 16 [ 95.475504] The buggy address is located 8 bytes inside of [ 95.475504] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.476531] [ 95.476808] The buggy address belongs to the physical page: [ 95.477366] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.478221] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.479100] page_type: 0xffffffff() [ 95.479789] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.481237] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.481997] page dumped because: kasan: bad access detected [ 95.482598] [ 95.482840] Memory state around the buggy address: [ 95.483362] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.484110] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.484814] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.485535] ^ [ 95.486136] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.486838] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.488885] ================================================================== [ 95.337761] ================================================================== [ 95.338641] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x6d8 [ 95.339739] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.340706] [ 95.341419] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.342598] Hardware name: linux,dummy-virt (DT) [ 95.343237] Call trace: [ 95.343787] dump_backtrace+0x9c/0x128 [ 95.344588] show_stack+0x20/0x38 [ 95.345277] dump_stack_lvl+0x60/0xb0 [ 95.346938] print_report+0xf8/0x5e8 [ 95.347755] kasan_report+0xdc/0x128 [ 95.348588] __asan_load8+0x9c/0xc0 [ 95.349444] kasan_bitops_modify.constprop.0+0x19c/0x6d8 [ 95.350496] kasan_bitops_generic+0xb4/0x148 [ 95.351337] kunit_try_run_case+0x114/0x298 [ 95.352221] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.354041] kthread+0x18c/0x1a8 [ 95.354712] ret_from_fork+0x10/0x20 [ 95.355419] [ 95.355752] Allocated by task 207: [ 95.356297] kasan_save_stack+0x3c/0x68 [ 95.357139] kasan_set_track+0x2c/0x40 [ 95.357769] kasan_save_alloc_info+0x24/0x38 [ 95.358580] __kasan_kmalloc+0xd4/0xd8 [ 95.359363] kmalloc_trace+0x68/0x130 [ 95.360086] kasan_bitops_generic+0x98/0x148 [ 95.361582] kunit_try_run_case+0x114/0x298 [ 95.362636] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.363668] kthread+0x18c/0x1a8 [ 95.364238] ret_from_fork+0x10/0x20 [ 95.365093] [ 95.365498] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.365498] which belongs to the cache kmalloc-16 of size 16 [ 95.367135] The buggy address is located 8 bytes inside of [ 95.367135] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.368795] [ 95.369530] The buggy address belongs to the physical page: [ 95.370457] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.371842] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.372923] page_type: 0xffffffff() [ 95.373781] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.374938] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.376207] page dumped because: kasan: bad access detected [ 95.377140] [ 95.377854] Memory state around the buggy address: [ 95.378523] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.379406] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.380883] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.381868] ^ [ 95.382818] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.383701] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.384696] ================================================================== [ 95.224436] ================================================================== [ 95.225723] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x160/0x6d8 [ 95.227634] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.228721] [ 95.229132] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.230373] Hardware name: linux,dummy-virt (DT) [ 95.231050] Call trace: [ 95.231471] dump_backtrace+0x9c/0x128 [ 95.232374] show_stack+0x20/0x38 [ 95.233663] dump_stack_lvl+0x60/0xb0 [ 95.234459] print_report+0xf8/0x5e8 [ 95.235277] kasan_report+0xdc/0x128 [ 95.236122] kasan_check_range+0xe8/0x190 [ 95.237017] __kasan_check_write+0x20/0x30 [ 95.237833] kasan_bitops_modify.constprop.0+0x160/0x6d8 [ 95.238892] kasan_bitops_generic+0xb4/0x148 [ 95.239888] kunit_try_run_case+0x114/0x298 [ 95.241103] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.242111] kthread+0x18c/0x1a8 [ 95.242832] ret_from_fork+0x10/0x20 [ 95.243533] [ 95.243798] Allocated by task 207: [ 95.244213] kasan_save_stack+0x3c/0x68 [ 95.245098] kasan_set_track+0x2c/0x40 [ 95.246045] kasan_save_alloc_info+0x24/0x38 [ 95.246933] __kasan_kmalloc+0xd4/0xd8 [ 95.247749] kmalloc_trace+0x68/0x130 [ 95.248602] kasan_bitops_generic+0x98/0x148 [ 95.249640] kunit_try_run_case+0x114/0x298 [ 95.250595] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.251781] kthread+0x18c/0x1a8 [ 95.252639] ret_from_fork+0x10/0x20 [ 95.253548] [ 95.253988] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.253988] which belongs to the cache kmalloc-16 of size 16 [ 95.255597] The buggy address is located 8 bytes inside of [ 95.255597] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.257971] [ 95.258437] The buggy address belongs to the physical page: [ 95.259422] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.260770] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.261902] page_type: 0xffffffff() [ 95.262805] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.264038] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.265299] page dumped because: kasan: bad access detected [ 95.266086] [ 95.266567] Memory state around the buggy address: [ 95.267486] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.268601] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.269992] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.270962] ^ [ 95.271882] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.273062] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.274311] ================================================================== [ 95.387209] ================================================================== [ 95.389235] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1ac/0x6d8 [ 95.390473] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.391401] [ 95.391967] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.393208] Hardware name: linux,dummy-virt (DT) [ 95.393990] Call trace: [ 95.394450] dump_backtrace+0x9c/0x128 [ 95.395227] show_stack+0x20/0x38 [ 95.395987] dump_stack_lvl+0x60/0xb0 [ 95.396796] print_report+0xf8/0x5e8 [ 95.397548] kasan_report+0xdc/0x128 [ 95.398292] kasan_check_range+0xe8/0x190 [ 95.399051] __kasan_check_write+0x20/0x30 [ 95.399968] kasan_bitops_modify.constprop.0+0x1ac/0x6d8 [ 95.401018] kasan_bitops_generic+0xb4/0x148 [ 95.401910] kunit_try_run_case+0x114/0x298 [ 95.402808] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.403833] kthread+0x18c/0x1a8 [ 95.404516] ret_from_fork+0x10/0x20 [ 95.405321] [ 95.405769] Allocated by task 207: [ 95.406373] kasan_save_stack+0x3c/0x68 [ 95.407148] kasan_set_track+0x2c/0x40 [ 95.407921] kasan_save_alloc_info+0x24/0x38 [ 95.408745] __kasan_kmalloc+0xd4/0xd8 [ 95.409547] kmalloc_trace+0x68/0x130 [ 95.410074] kasan_bitops_generic+0x98/0x148 [ 95.410553] kunit_try_run_case+0x114/0x298 [ 95.411173] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.411696] kthread+0x18c/0x1a8 [ 95.412151] ret_from_fork+0x10/0x20 [ 95.412624] [ 95.412919] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.412919] which belongs to the cache kmalloc-16 of size 16 [ 95.413643] The buggy address is located 8 bytes inside of [ 95.413643] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.414632] [ 95.414883] The buggy address belongs to the physical page: [ 95.415542] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.416472] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.417228] page_type: 0xffffffff() [ 95.417666] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.418464] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.420051] page dumped because: kasan: bad access detected [ 95.420587] [ 95.420819] Memory state around the buggy address: [ 95.421314] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.422002] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.422663] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.423326] ^ [ 95.423930] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.424684] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.425367] ==================================================================
[ 35.744143] ================================================================== [ 35.745293] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x5e0 [ 35.746355] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 35.747005] [ 35.747166] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 35.747944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.749185] Call Trace: [ 35.749643] <TASK> [ 35.750150] dump_stack_lvl+0x4e/0x90 [ 35.750754] print_report+0xd2/0x650 [ 35.751085] ? __virt_addr_valid+0x156/0x1e0 [ 35.751334] ? kasan_bitops_modify.constprop.0+0x9c/0x5e0 [ 35.751979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.752708] ? kasan_bitops_modify.constprop.0+0x9c/0x5e0 [ 35.753346] kasan_report+0x147/0x180 [ 35.753988] ? kasan_bitops_modify.constprop.0+0x9c/0x5e0 [ 35.754734] kasan_check_range+0x10c/0x1c0 [ 35.755260] __kasan_check_write+0x18/0x20 [ 35.756130] kasan_bitops_modify.constprop.0+0x9c/0x5e0 [ 35.756599] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 35.757225] ? kasan_set_track+0x29/0x40 [ 35.757821] ? kasan_save_alloc_info+0x22/0x30 [ 35.758322] ? __kasan_kmalloc+0xb7/0xc0 [ 35.758816] kasan_bitops_generic+0xa9/0x130 [ 35.759084] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 35.759687] ? ktime_get_ts64+0x118/0x140 [ 35.760222] kunit_try_run_case+0x120/0x290 [ 35.760869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.761399] ? __kasan_check_write+0x18/0x20 [ 35.761961] ? trace_preempt_on+0x20/0xa0 [ 35.762493] ? __kthread_parkme+0x4f/0xd0 [ 35.763015] ? preempt_count_sub+0x50/0x80 [ 35.763518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.764276] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.765061] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.765692] kthread+0x19e/0x1e0 [ 35.765917] ? __pfx_kthread+0x10/0x10 [ 35.766142] ret_from_fork+0x41/0x70 [ 35.766357] ? __pfx_kthread+0x10/0x10 [ 35.766894] ret_from_fork_asm+0x1b/0x30 [ 35.767371] </TASK> [ 35.767668] [ 35.768294] Allocated by task 222: [ 35.769004] kasan_save_stack+0x44/0x70 [ 35.769567] kasan_set_track+0x29/0x40 [ 35.770017] kasan_save_alloc_info+0x22/0x30 [ 35.770584] __kasan_kmalloc+0xb7/0xc0 [ 35.771093] kmalloc_trace+0x4c/0xb0 [ 35.771921] kasan_bitops_generic+0x8e/0x130 [ 35.772417] kunit_try_run_case+0x120/0x290 [ 35.772697] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.773461] kthread+0x19e/0x1e0 [ 35.773890] ret_from_fork+0x41/0x70 [ 35.774096] ret_from_fork_asm+0x1b/0x30 [ 35.774303] [ 35.774425] The buggy address belongs to the object at ffff8881024a3ac0 [ 35.774425] which belongs to the cache kmalloc-16 of size 16 [ 35.775375] The buggy address is located 8 bytes inside of [ 35.775375] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 35.776478] [ 35.776719] The buggy address belongs to the physical page: [ 35.777057] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 35.777659] flags: 0x200000000000800(slab|node=0|zone=2) [ 35.778004] page_type: 0xffffffff() [ 35.778236] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 35.778788] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 35.779258] page dumped because: kasan: bad access detected [ 35.779924] [ 35.780062] Memory state around the buggy address: [ 35.780314] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 35.780904] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 35.781258] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.781751] ^ [ 35.782059] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.782462] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.783025] ================================================================== [ 35.783820] ================================================================== [ 35.784250] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xda/0x5e0 [ 35.785219] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 35.785926] [ 35.786072] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 35.786618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.787166] Call Trace: [ 35.787437] <TASK> [ 35.787626] dump_stack_lvl+0x4e/0x90 [ 35.787953] print_report+0xd2/0x650 [ 35.788196] ? __virt_addr_valid+0x156/0x1e0 [ 35.788885] ? kasan_bitops_modify.constprop.0+0xda/0x5e0 [ 35.789237] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.789557] ? kasan_bitops_modify.constprop.0+0xda/0x5e0 [ 35.790093] kasan_report+0x147/0x180 [ 35.790370] ? kasan_bitops_modify.constprop.0+0xda/0x5e0 [ 35.790711] kasan_check_range+0x10c/0x1c0 [ 35.791117] __kasan_check_write+0x18/0x20 [ 35.791463] kasan_bitops_modify.constprop.0+0xda/0x5e0 [ 35.791811] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 35.792165] ? kasan_set_track+0x29/0x40 [ 35.792432] ? kasan_save_alloc_info+0x22/0x30 [ 35.792719] ? __kasan_kmalloc+0xb7/0xc0 [ 35.793291] kasan_bitops_generic+0xa9/0x130 [ 35.793755] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 35.794101] ? ktime_get_ts64+0x118/0x140 [ 35.794463] kunit_try_run_case+0x120/0x290 [ 35.794767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.795120] ? __kasan_check_write+0x18/0x20 [ 35.795474] ? trace_preempt_on+0x20/0xa0 [ 35.795771] ? __kthread_parkme+0x4f/0xd0 [ 35.796028] ? preempt_count_sub+0x50/0x80 [ 35.796639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.796988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.797351] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.798006] kthread+0x19e/0x1e0 [ 35.798262] ? __pfx_kthread+0x10/0x10 [ 35.798518] ret_from_fork+0x41/0x70 [ 35.798965] ? __pfx_kthread+0x10/0x10 [ 35.799201] ret_from_fork_asm+0x1b/0x30 [ 35.799500] </TASK> [ 35.799818] [ 35.799962] Allocated by task 222: [ 35.800152] kasan_save_stack+0x44/0x70 [ 35.800425] kasan_set_track+0x29/0x40 [ 35.801191] kasan_save_alloc_info+0x22/0x30 [ 35.801505] __kasan_kmalloc+0xb7/0xc0 [ 35.801946] kmalloc_trace+0x4c/0xb0 [ 35.802189] kasan_bitops_generic+0x8e/0x130 [ 35.802521] kunit_try_run_case+0x120/0x290 [ 35.802833] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.803173] kthread+0x19e/0x1e0 [ 35.803504] ret_from_fork+0x41/0x70 [ 35.803732] ret_from_fork_asm+0x1b/0x30 [ 35.804081] [ 35.804186] The buggy address belongs to the object at ffff8881024a3ac0 [ 35.804186] which belongs to the cache kmalloc-16 of size 16 [ 35.805235] The buggy address is located 8 bytes inside of [ 35.805235] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 35.806068] [ 35.806205] The buggy address belongs to the physical page: [ 35.806491] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 35.807119] flags: 0x200000000000800(slab|node=0|zone=2) [ 35.807407] page_type: 0xffffffff() [ 35.807672] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 35.808188] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 35.808926] page dumped because: kasan: bad access detected [ 35.809232] [ 35.809358] Memory state around the buggy address: [ 35.809873] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 35.810256] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 35.810884] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.811255] ^ [ 35.811769] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.812166] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.812559] ================================================================== [ 35.871623] ================================================================== [ 35.872088] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x5e0 [ 35.873588] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 35.874030] [ 35.874204] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 35.874683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.875177] Call Trace: [ 35.875359] <TASK> [ 35.875514] dump_stack_lvl+0x4e/0x90 [ 35.875855] print_report+0xd2/0x650 [ 35.876102] ? __virt_addr_valid+0x156/0x1e0 [ 35.876415] ? kasan_bitops_modify.constprop.0+0x19c/0x5e0 [ 35.877016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.877425] ? kasan_bitops_modify.constprop.0+0x19c/0x5e0 [ 35.877836] kasan_report+0x147/0x180 [ 35.878105] ? kasan_bitops_modify.constprop.0+0x19c/0x5e0 [ 35.878486] kasan_check_range+0x10c/0x1c0 [ 35.878774] __kasan_check_write+0x18/0x20 [ 35.879060] kasan_bitops_modify.constprop.0+0x19c/0x5e0 [ 35.879393] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 35.879707] ? kasan_set_track+0x29/0x40 [ 35.880026] ? kasan_save_alloc_info+0x22/0x30 [ 35.880361] ? __kasan_kmalloc+0xb7/0xc0 [ 35.880671] kasan_bitops_generic+0xa9/0x130 [ 35.880993] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 35.881323] ? ktime_get_ts64+0x118/0x140 [ 35.881624] kunit_try_run_case+0x120/0x290 [ 35.881960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.882248] ? __kasan_check_write+0x18/0x20 [ 35.882545] ? trace_preempt_on+0x20/0xa0 [ 35.883813] ? __kthread_parkme+0x4f/0xd0 [ 35.884129] ? preempt_count_sub+0x50/0x80 [ 35.884431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.884750] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.885141] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.885473] kthread+0x19e/0x1e0 [ 35.885685] ? __pfx_kthread+0x10/0x10 [ 35.885987] ret_from_fork+0x41/0x70 [ 35.886218] ? __pfx_kthread+0x10/0x10 [ 35.886484] ret_from_fork_asm+0x1b/0x30 [ 35.886770] </TASK> [ 35.886922] [ 35.887048] Allocated by task 222: [ 35.887251] kasan_save_stack+0x44/0x70 [ 35.887523] kasan_set_track+0x29/0x40 [ 35.888438] kasan_save_alloc_info+0x22/0x30 [ 35.888780] __kasan_kmalloc+0xb7/0xc0 [ 35.889043] kmalloc_trace+0x4c/0xb0 [ 35.889275] kasan_bitops_generic+0x8e/0x130 [ 35.889694] kunit_try_run_case+0x120/0x290 [ 35.889991] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.890314] kthread+0x19e/0x1e0 [ 35.890638] ret_from_fork+0x41/0x70 [ 35.890994] ret_from_fork_asm+0x1b/0x30 [ 35.891249] [ 35.891374] The buggy address belongs to the object at ffff8881024a3ac0 [ 35.891374] which belongs to the cache kmalloc-16 of size 16 [ 35.892166] The buggy address is located 8 bytes inside of [ 35.892166] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 35.893486] [ 35.893608] The buggy address belongs to the physical page: [ 35.894091] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 35.894606] flags: 0x200000000000800(slab|node=0|zone=2) [ 35.894936] page_type: 0xffffffff() [ 35.895201] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 35.895635] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 35.896052] page dumped because: kasan: bad access detected [ 35.897024] [ 35.897160] Memory state around the buggy address: [ 35.897405] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 35.897727] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 35.898352] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.898943] ^ [ 35.899309] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.899778] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.900200] ================================================================== [ 35.929731] ================================================================== [ 35.930147] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x21c/0x5e0 [ 35.930730] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 35.931306] [ 35.931578] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 35.932083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.933141] Call Trace: [ 35.933346] <TASK> [ 35.933504] dump_stack_lvl+0x4e/0x90 [ 35.933783] print_report+0xd2/0x650 [ 35.934085] ? __virt_addr_valid+0x156/0x1e0 [ 35.934372] ? kasan_bitops_modify.constprop.0+0x21c/0x5e0 [ 35.934665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.935072] ? kasan_bitops_modify.constprop.0+0x21c/0x5e0 [ 35.935368] kasan_report+0x147/0x180 [ 35.935633] ? kasan_bitops_modify.constprop.0+0x21c/0x5e0 [ 35.935976] kasan_check_range+0x10c/0x1c0 [ 35.936285] __kasan_check_write+0x18/0x20 [ 35.936797] kasan_bitops_modify.constprop.0+0x21c/0x5e0 [ 35.937687] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 35.938190] ? kasan_set_track+0x29/0x40 [ 35.938566] ? kasan_save_alloc_info+0x22/0x30 [ 35.938988] ? __kasan_kmalloc+0xb7/0xc0 [ 35.939364] kasan_bitops_generic+0xa9/0x130 [ 35.939752] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 35.940204] ? ktime_get_ts64+0x118/0x140 [ 35.940604] kunit_try_run_case+0x120/0x290 [ 35.941008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.941321] ? __kasan_check_write+0x18/0x20 [ 35.941609] ? trace_preempt_on+0x20/0xa0 [ 35.942575] ? __kthread_parkme+0x4f/0xd0 [ 35.942872] ? preempt_count_sub+0x50/0x80 [ 35.943743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.944513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.945483] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.946379] kthread+0x19e/0x1e0 [ 35.946600] ? __pfx_kthread+0x10/0x10 [ 35.946840] ret_from_fork+0x41/0x70 [ 35.947363] ? __pfx_kthread+0x10/0x10 [ 35.947898] ret_from_fork_asm+0x1b/0x30 [ 35.948412] </TASK> [ 35.948711] [ 35.948950] Allocated by task 222: [ 35.949361] kasan_save_stack+0x44/0x70 [ 35.949934] kasan_set_track+0x29/0x40 [ 35.950404] kasan_save_alloc_info+0x22/0x30 [ 35.950781] __kasan_kmalloc+0xb7/0xc0 [ 35.951341] kmalloc_trace+0x4c/0xb0 [ 35.951842] kasan_bitops_generic+0x8e/0x130 [ 35.952359] kunit_try_run_case+0x120/0x290 [ 35.952658] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.953212] kthread+0x19e/0x1e0 [ 35.953642] ret_from_fork+0x41/0x70 [ 35.954150] ret_from_fork_asm+0x1b/0x30 [ 35.954497] [ 35.954758] The buggy address belongs to the object at ffff8881024a3ac0 [ 35.954758] which belongs to the cache kmalloc-16 of size 16 [ 35.955975] The buggy address is located 8 bytes inside of [ 35.955975] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 35.956669] [ 35.956793] The buggy address belongs to the physical page: [ 35.957050] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 35.957451] flags: 0x200000000000800(slab|node=0|zone=2) [ 35.957709] page_type: 0xffffffff() [ 35.958117] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 35.958939] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 35.959799] page dumped because: kasan: bad access detected [ 35.960414] [ 35.960635] Memory state around the buggy address: [ 35.961125] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 35.962046] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 35.962895] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.963652] ^ [ 35.964233] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.965071] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.965853] ================================================================== [ 35.843488] ================================================================== [ 35.844291] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x15a/0x5e0 [ 35.845079] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 35.845478] [ 35.845667] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 35.846141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.846627] Call Trace: [ 35.846839] <TASK> [ 35.847020] dump_stack_lvl+0x4e/0x90 [ 35.847321] print_report+0xd2/0x650 [ 35.848072] ? __virt_addr_valid+0x156/0x1e0 [ 35.848387] ? kasan_bitops_modify.constprop.0+0x15a/0x5e0 [ 35.848749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.849093] ? kasan_bitops_modify.constprop.0+0x15a/0x5e0 [ 35.849429] kasan_report+0x147/0x180 [ 35.849690] ? kasan_bitops_modify.constprop.0+0x15a/0x5e0 [ 35.850033] kasan_check_range+0x10c/0x1c0 [ 35.850333] __kasan_check_write+0x18/0x20 [ 35.850614] kasan_bitops_modify.constprop.0+0x15a/0x5e0 [ 35.850954] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 35.851749] ? kasan_set_track+0x29/0x40 [ 35.852048] ? kasan_save_alloc_info+0x22/0x30 [ 35.852332] ? __kasan_kmalloc+0xb7/0xc0 [ 35.852616] kasan_bitops_generic+0xa9/0x130 [ 35.853043] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 35.853380] ? ktime_get_ts64+0x118/0x140 [ 35.853642] kunit_try_run_case+0x120/0x290 [ 35.853950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.854227] ? __kasan_check_write+0x18/0x20 [ 35.854528] ? trace_preempt_on+0x20/0xa0 [ 35.854854] ? __kthread_parkme+0x4f/0xd0 [ 35.855169] ? preempt_count_sub+0x50/0x80 [ 35.855854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.856172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.856549] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.856946] kthread+0x19e/0x1e0 [ 35.857155] ? __pfx_kthread+0x10/0x10 [ 35.857447] ret_from_fork+0x41/0x70 [ 35.857732] ? __pfx_kthread+0x10/0x10 [ 35.857985] ret_from_fork_asm+0x1b/0x30 [ 35.858283] </TASK> [ 35.858450] [ 35.858574] Allocated by task 222: [ 35.858753] kasan_save_stack+0x44/0x70 [ 35.859110] kasan_set_track+0x29/0x40 [ 35.859344] kasan_save_alloc_info+0x22/0x30 [ 35.859678] __kasan_kmalloc+0xb7/0xc0 [ 35.859976] kmalloc_trace+0x4c/0xb0 [ 35.860196] kasan_bitops_generic+0x8e/0x130 [ 35.860483] kunit_try_run_case+0x120/0x290 [ 35.861410] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.861737] kthread+0x19e/0x1e0 [ 35.861996] ret_from_fork+0x41/0x70 [ 35.862209] ret_from_fork_asm+0x1b/0x30 [ 35.862453] [ 35.862581] The buggy address belongs to the object at ffff8881024a3ac0 [ 35.862581] which belongs to the cache kmalloc-16 of size 16 [ 35.863358] The buggy address is located 8 bytes inside of [ 35.863358] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 35.864017] [ 35.864160] The buggy address belongs to the physical page: [ 35.864450] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 35.865612] flags: 0x200000000000800(slab|node=0|zone=2) [ 35.865994] page_type: 0xffffffff() [ 35.866247] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 35.866659] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 35.867170] page dumped because: kasan: bad access detected [ 35.867467] [ 35.867590] Memory state around the buggy address: [ 35.867886] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 35.868338] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 35.869356] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.869761] ^ [ 35.870089] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.870479] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.870885] ================================================================== [ 35.901734] ================================================================== [ 35.902163] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1da/0x5e0 [ 35.902800] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 35.903230] [ 35.903377] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 35.903939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.904465] Call Trace: [ 35.904675] <TASK> [ 35.904835] dump_stack_lvl+0x4e/0x90 [ 35.905696] print_report+0xd2/0x650 [ 35.906101] ? __virt_addr_valid+0x156/0x1e0 [ 35.906397] ? kasan_bitops_modify.constprop.0+0x1da/0x5e0 [ 35.906742] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.907135] ? kasan_bitops_modify.constprop.0+0x1da/0x5e0 [ 35.907464] kasan_report+0x147/0x180 [ 35.907740] ? kasan_bitops_modify.constprop.0+0x1da/0x5e0 [ 35.908060] kasan_check_range+0x10c/0x1c0 [ 35.908349] __kasan_check_write+0x18/0x20 [ 35.909091] kasan_bitops_modify.constprop.0+0x1da/0x5e0 [ 35.909431] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 35.909830] ? kasan_set_track+0x29/0x40 [ 35.910086] ? kasan_save_alloc_info+0x22/0x30 [ 35.910381] ? __kasan_kmalloc+0xb7/0xc0 [ 35.910660] kasan_bitops_generic+0xa9/0x130 [ 35.910963] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 35.911323] ? ktime_get_ts64+0x118/0x140 [ 35.911581] kunit_try_run_case+0x120/0x290 [ 35.911857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.912194] ? __kasan_check_write+0x18/0x20 [ 35.913068] ? trace_preempt_on+0x20/0xa0 [ 35.913330] ? __kthread_parkme+0x4f/0xd0 [ 35.913652] ? preempt_count_sub+0x50/0x80 [ 35.913930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.914225] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.914577] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.914943] kthread+0x19e/0x1e0 [ 35.915202] ? __pfx_kthread+0x10/0x10 [ 35.915463] ret_from_fork+0x41/0x70 [ 35.915726] ? __pfx_kthread+0x10/0x10 [ 35.915956] ret_from_fork_asm+0x1b/0x30 [ 35.916265] </TASK> [ 35.917029] [ 35.917146] Allocated by task 222: [ 35.917373] kasan_save_stack+0x44/0x70 [ 35.917665] kasan_set_track+0x29/0x40 [ 35.917931] kasan_save_alloc_info+0x22/0x30 [ 35.918197] __kasan_kmalloc+0xb7/0xc0 [ 35.918453] kmalloc_trace+0x4c/0xb0 [ 35.918664] kasan_bitops_generic+0x8e/0x130 [ 35.918938] kunit_try_run_case+0x120/0x290 [ 35.919239] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.919577] kthread+0x19e/0x1e0 [ 35.919802] ret_from_fork+0x41/0x70 [ 35.920067] ret_from_fork_asm+0x1b/0x30 [ 35.920416] [ 35.921056] The buggy address belongs to the object at ffff8881024a3ac0 [ 35.921056] which belongs to the cache kmalloc-16 of size 16 [ 35.921736] The buggy address is located 8 bytes inside of [ 35.921736] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 35.922381] [ 35.922514] The buggy address belongs to the physical page: [ 35.922872] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 35.923399] flags: 0x200000000000800(slab|node=0|zone=2) [ 35.923704] page_type: 0xffffffff() [ 35.923958] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 35.924890] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 35.925304] page dumped because: kasan: bad access detected [ 35.925637] [ 35.925742] Memory state around the buggy address: [ 35.926075] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 35.926421] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 35.926929] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.927315] ^ [ 35.927614] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.928026] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.929080] ================================================================== [ 35.814272] ================================================================== [ 35.814935] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x11c/0x5e0 [ 35.815503] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 35.815950] [ 35.816079] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 35.816527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.817253] Call Trace: [ 35.817736] <TASK> [ 35.817952] dump_stack_lvl+0x4e/0x90 [ 35.818232] print_report+0xd2/0x650 [ 35.818749] ? __virt_addr_valid+0x156/0x1e0 [ 35.819048] ? kasan_bitops_modify.constprop.0+0x11c/0x5e0 [ 35.819536] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.819969] ? kasan_bitops_modify.constprop.0+0x11c/0x5e0 [ 35.820303] kasan_report+0x147/0x180 [ 35.820535] ? kasan_bitops_modify.constprop.0+0x11c/0x5e0 [ 35.820937] kasan_check_range+0x10c/0x1c0 [ 35.821200] __kasan_check_write+0x18/0x20 [ 35.821454] kasan_bitops_modify.constprop.0+0x11c/0x5e0 [ 35.821793] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 35.822155] ? kasan_set_track+0x29/0x40 [ 35.822387] ? kasan_save_alloc_info+0x22/0x30 [ 35.822692] ? __kasan_kmalloc+0xb7/0xc0 [ 35.823423] kasan_bitops_generic+0xa9/0x130 [ 35.823758] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 35.824082] ? ktime_get_ts64+0x118/0x140 [ 35.824451] kunit_try_run_case+0x120/0x290 [ 35.824764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.825085] ? __kasan_check_write+0x18/0x20 [ 35.825333] ? trace_preempt_on+0x20/0xa0 [ 35.825733] ? __kthread_parkme+0x4f/0xd0 [ 35.826066] ? preempt_count_sub+0x50/0x80 [ 35.826332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.827110] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.827472] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.827972] kthread+0x19e/0x1e0 [ 35.828234] ? __pfx_kthread+0x10/0x10 [ 35.828489] ret_from_fork+0x41/0x70 [ 35.828841] ? __pfx_kthread+0x10/0x10 [ 35.829092] ret_from_fork_asm+0x1b/0x30 [ 35.829475] </TASK> [ 35.829643] [ 35.829747] Allocated by task 222: [ 35.830124] kasan_save_stack+0x44/0x70 [ 35.830837] kasan_set_track+0x29/0x40 [ 35.831113] kasan_save_alloc_info+0x22/0x30 [ 35.831589] __kasan_kmalloc+0xb7/0xc0 [ 35.831818] kmalloc_trace+0x4c/0xb0 [ 35.832079] kasan_bitops_generic+0x8e/0x130 [ 35.832347] kunit_try_run_case+0x120/0x290 [ 35.832713] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.833060] kthread+0x19e/0x1e0 [ 35.833296] ret_from_fork+0x41/0x70 [ 35.833581] ret_from_fork_asm+0x1b/0x30 [ 35.833972] [ 35.834089] The buggy address belongs to the object at ffff8881024a3ac0 [ 35.834089] which belongs to the cache kmalloc-16 of size 16 [ 35.835145] The buggy address is located 8 bytes inside of [ 35.835145] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 35.836005] [ 35.836126] The buggy address belongs to the physical page: [ 35.836410] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 35.837054] flags: 0x200000000000800(slab|node=0|zone=2) [ 35.837368] page_type: 0xffffffff() [ 35.837597] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 35.838044] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 35.838443] page dumped because: kasan: bad access detected [ 35.838754] [ 35.838891] Memory state around the buggy address: [ 35.839182] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 35.839569] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 35.839975] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.840325] ^ [ 35.840679] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.841100] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.841499] ================================================================== [ 35.966876] ================================================================== [ 35.967239] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x25a/0x5e0 [ 35.967631] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 35.968509] [ 35.968723] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 35.969540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.970572] Call Trace: [ 35.970912] <TASK> [ 35.971180] dump_stack_lvl+0x4e/0x90 [ 35.971928] print_report+0xd2/0x650 [ 35.972347] ? __virt_addr_valid+0x156/0x1e0 [ 35.972881] ? kasan_bitops_modify.constprop.0+0x25a/0x5e0 [ 35.973537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.973971] ? kasan_bitops_modify.constprop.0+0x25a/0x5e0 [ 35.974253] kasan_report+0x147/0x180 [ 35.974565] ? kasan_bitops_modify.constprop.0+0x25a/0x5e0 [ 35.974946] kasan_check_range+0x10c/0x1c0 [ 35.975708] __kasan_check_write+0x18/0x20 [ 35.976334] kasan_bitops_modify.constprop.0+0x25a/0x5e0 [ 35.976755] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 35.977381] ? kasan_set_track+0x29/0x40 [ 35.977690] ? kasan_save_alloc_info+0x22/0x30 [ 35.977959] ? __kasan_kmalloc+0xb7/0xc0 [ 35.978181] kasan_bitops_generic+0xa9/0x130 [ 35.979088] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 35.979672] ? ktime_get_ts64+0x118/0x140 [ 35.980155] kunit_try_run_case+0x120/0x290 [ 35.980624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.981148] ? __kasan_check_write+0x18/0x20 [ 35.981604] ? trace_preempt_on+0x20/0xa0 [ 35.982095] ? __kthread_parkme+0x4f/0xd0 [ 35.982938] ? preempt_count_sub+0x50/0x80 [ 35.983312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.983569] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.984105] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.984656] kthread+0x19e/0x1e0 [ 35.985090] ? __pfx_kthread+0x10/0x10 [ 35.985507] ret_from_fork+0x41/0x70 [ 35.985942] ? __pfx_kthread+0x10/0x10 [ 35.986694] ret_from_fork_asm+0x1b/0x30 [ 35.987201] </TASK> [ 35.987465] [ 35.987586] Allocated by task 222: [ 35.987800] kasan_save_stack+0x44/0x70 [ 35.988234] kasan_set_track+0x29/0x40 [ 35.988649] kasan_save_alloc_info+0x22/0x30 [ 35.989039] __kasan_kmalloc+0xb7/0xc0 [ 35.989236] kmalloc_trace+0x4c/0xb0 [ 35.989423] kasan_bitops_generic+0x8e/0x130 [ 35.989643] kunit_try_run_case+0x120/0x290 [ 35.990088] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.991129] kthread+0x19e/0x1e0 [ 35.991562] ret_from_fork+0x41/0x70 [ 35.991990] ret_from_fork_asm+0x1b/0x30 [ 35.992419] [ 35.992607] The buggy address belongs to the object at ffff8881024a3ac0 [ 35.992607] which belongs to the cache kmalloc-16 of size 16 [ 35.993835] The buggy address is located 8 bytes inside of [ 35.993835] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 35.995322] [ 35.995439] The buggy address belongs to the physical page: [ 35.995685] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 35.996645] flags: 0x200000000000800(slab|node=0|zone=2) [ 35.997334] page_type: 0xffffffff() [ 35.997723] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 35.998994] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 35.999640] page dumped because: kasan: bad access detected [ 35.999915] [ 36.000015] Memory state around the buggy address: [ 36.000236] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 36.001501] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 36.002294] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 36.003397] ^ [ 36.003994] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.004688] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.005257] ==================================================================