Date
June 17, 2025, 3:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 95.585819] ================================================================== [ 95.587227] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8 [ 95.588058] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.590587] [ 95.590902] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.591666] Hardware name: linux,dummy-virt (DT) [ 95.592175] Call trace: [ 95.592506] dump_backtrace+0x9c/0x128 [ 95.593006] show_stack+0x20/0x38 [ 95.593838] dump_stack_lvl+0x60/0xb0 [ 95.594310] print_report+0xf8/0x5e8 [ 95.595000] kasan_report+0xdc/0x128 [ 95.595526] __asan_load8+0x9c/0xc0 [ 95.597063] kasan_bitops_test_and_modify.constprop.0+0x108/0x7b8 [ 95.597937] kasan_bitops_generic+0xc0/0x148 [ 95.598568] kunit_try_run_case+0x114/0x298 [ 95.599179] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.599853] kthread+0x18c/0x1a8 [ 95.600462] ret_from_fork+0x10/0x20 [ 95.601035] [ 95.601380] Allocated by task 207: [ 95.601909] kasan_save_stack+0x3c/0x68 [ 95.602478] kasan_set_track+0x2c/0x40 [ 95.603066] kasan_save_alloc_info+0x24/0x38 [ 95.603669] __kasan_kmalloc+0xd4/0xd8 [ 95.604079] kmalloc_trace+0x68/0x130 [ 95.604525] kasan_bitops_generic+0x98/0x148 [ 95.605277] kunit_try_run_case+0x114/0x298 [ 95.605723] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.606345] kthread+0x18c/0x1a8 [ 95.606812] ret_from_fork+0x10/0x20 [ 95.607310] [ 95.607553] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.607553] which belongs to the cache kmalloc-16 of size 16 [ 95.608651] The buggy address is located 8 bytes inside of [ 95.608651] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.609668] [ 95.609926] The buggy address belongs to the physical page: [ 95.610428] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.611454] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.612056] page_type: 0xffffffff() [ 95.612493] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.613366] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.614043] page dumped because: kasan: bad access detected [ 95.614544] [ 95.614759] Memory state around the buggy address: [ 95.615238] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.615924] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.616609] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.617228] ^ [ 95.617754] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.618422] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.619058] ================================================================== [ 95.738311] ================================================================== [ 95.739104] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8 [ 95.739981] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.740704] [ 95.740978] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.741809] Hardware name: linux,dummy-virt (DT) [ 95.742271] Call trace: [ 95.742593] dump_backtrace+0x9c/0x128 [ 95.743059] show_stack+0x20/0x38 [ 95.743504] dump_stack_lvl+0x60/0xb0 [ 95.743968] print_report+0xf8/0x5e8 [ 95.744430] kasan_report+0xdc/0x128 [ 95.744922] __asan_load8+0x9c/0xc0 [ 95.745381] kasan_bitops_test_and_modify.constprop.0+0x200/0x7b8 [ 95.746100] kasan_bitops_generic+0xc0/0x148 [ 95.746579] kunit_try_run_case+0x114/0x298 [ 95.748282] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.748881] kthread+0x18c/0x1a8 [ 95.749366] ret_from_fork+0x10/0x20 [ 95.749792] [ 95.750018] Allocated by task 207: [ 95.750333] kasan_save_stack+0x3c/0x68 [ 95.750859] kasan_set_track+0x2c/0x40 [ 95.751293] kasan_save_alloc_info+0x24/0x38 [ 95.751758] __kasan_kmalloc+0xd4/0xd8 [ 95.752240] kmalloc_trace+0x68/0x130 [ 95.752706] kasan_bitops_generic+0x98/0x148 [ 95.753191] kunit_try_run_case+0x114/0x298 [ 95.753688] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.754249] kthread+0x18c/0x1a8 [ 95.754616] ret_from_fork+0x10/0x20 [ 95.755049] [ 95.755254] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.755254] which belongs to the cache kmalloc-16 of size 16 [ 95.756227] The buggy address is located 8 bytes inside of [ 95.756227] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.757129] [ 95.757384] The buggy address belongs to the physical page: [ 95.757872] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.758641] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.759266] page_type: 0xffffffff() [ 95.759709] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.760436] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.761100] page dumped because: kasan: bad access detected [ 95.761603] [ 95.761819] Memory state around the buggy address: [ 95.762267] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.762922] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.763408] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.764088] ^ [ 95.764751] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.765481] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.766119] ================================================================== [ 95.522077] ================================================================== [ 95.522712] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8 [ 95.523644] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.524506] [ 95.524838] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.525572] Hardware name: linux,dummy-virt (DT) [ 95.526165] Call trace: [ 95.526490] dump_backtrace+0x9c/0x128 [ 95.527044] show_stack+0x20/0x38 [ 95.527738] dump_stack_lvl+0x60/0xb0 [ 95.528377] print_report+0xf8/0x5e8 [ 95.528895] kasan_report+0xdc/0x128 [ 95.529401] __asan_load8+0x9c/0xc0 [ 95.529898] kasan_bitops_test_and_modify.constprop.0+0xd0/0x7b8 [ 95.530598] kasan_bitops_generic+0xc0/0x148 [ 95.531354] kunit_try_run_case+0x114/0x298 [ 95.531907] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.532591] kthread+0x18c/0x1a8 [ 95.533050] ret_from_fork+0x10/0x20 [ 95.533478] [ 95.533722] Allocated by task 207: [ 95.534103] kasan_save_stack+0x3c/0x68 [ 95.534584] kasan_set_track+0x2c/0x40 [ 95.535092] kasan_save_alloc_info+0x24/0x38 [ 95.535581] __kasan_kmalloc+0xd4/0xd8 [ 95.536086] kmalloc_trace+0x68/0x130 [ 95.536784] kasan_bitops_generic+0x98/0x148 [ 95.537246] kunit_try_run_case+0x114/0x298 [ 95.537814] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.538326] kthread+0x18c/0x1a8 [ 95.538766] ret_from_fork+0x10/0x20 [ 95.541196] [ 95.541502] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.541502] which belongs to the cache kmalloc-16 of size 16 [ 95.542730] The buggy address is located 8 bytes inside of [ 95.542730] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.543712] [ 95.544022] The buggy address belongs to the physical page: [ 95.544560] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.545581] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.546338] page_type: 0xffffffff() [ 95.546808] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.547444] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.548539] page dumped because: kasan: bad access detected [ 95.549083] [ 95.549337] Memory state around the buggy address: [ 95.549944] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.550569] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.551336] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.552003] ^ [ 95.552600] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.553312] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.554014] ================================================================== [ 95.680700] ================================================================== [ 95.681439] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8 [ 95.682357] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.683196] [ 95.683426] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.684190] Hardware name: linux,dummy-virt (DT) [ 95.684694] Call trace: [ 95.685022] dump_backtrace+0x9c/0x128 [ 95.685542] show_stack+0x20/0x38 [ 95.685990] dump_stack_lvl+0x60/0xb0 [ 95.686481] print_report+0xf8/0x5e8 [ 95.686961] kasan_report+0xdc/0x128 [ 95.687430] kasan_check_range+0xe8/0x190 [ 95.687958] __kasan_check_write+0x20/0x30 [ 95.688446] kasan_bitops_test_and_modify.constprop.0+0x1a4/0x7b8 [ 95.689058] kasan_bitops_generic+0xc0/0x148 [ 95.689657] kunit_try_run_case+0x114/0x298 [ 95.690282] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.690807] kthread+0x18c/0x1a8 [ 95.691211] ret_from_fork+0x10/0x20 [ 95.691698] [ 95.691956] Allocated by task 207: [ 95.692418] kasan_save_stack+0x3c/0x68 [ 95.692974] kasan_set_track+0x2c/0x40 [ 95.693430] kasan_save_alloc_info+0x24/0x38 [ 95.693973] __kasan_kmalloc+0xd4/0xd8 [ 95.694452] kmalloc_trace+0x68/0x130 [ 95.694907] kasan_bitops_generic+0x98/0x148 [ 95.695407] kunit_try_run_case+0x114/0x298 [ 95.695972] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.696654] kthread+0x18c/0x1a8 [ 95.697063] ret_from_fork+0x10/0x20 [ 95.697496] [ 95.697748] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.697748] which belongs to the cache kmalloc-16 of size 16 [ 95.698762] The buggy address is located 8 bytes inside of [ 95.698762] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.699781] [ 95.700066] The buggy address belongs to the physical page: [ 95.700651] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.701506] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.702151] page_type: 0xffffffff() [ 95.702578] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.703359] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.704107] page dumped because: kasan: bad access detected [ 95.704646] [ 95.704872] Memory state around the buggy address: [ 95.705369] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.706099] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.706563] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.707012] ^ [ 95.707680] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.708445] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.709150] ================================================================== [ 95.710337] ================================================================== [ 95.710945] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8 [ 95.711764] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.712363] [ 95.712650] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.713418] Hardware name: linux,dummy-virt (DT) [ 95.713857] Call trace: [ 95.714164] dump_backtrace+0x9c/0x128 [ 95.714611] show_stack+0x20/0x38 [ 95.715007] dump_stack_lvl+0x60/0xb0 [ 95.715458] print_report+0xf8/0x5e8 [ 95.715935] kasan_report+0xdc/0x128 [ 95.716397] __asan_load8+0x9c/0xc0 [ 95.716885] kasan_bitops_test_and_modify.constprop.0+0x1d4/0x7b8 [ 95.717577] kasan_bitops_generic+0xc0/0x148 [ 95.718059] kunit_try_run_case+0x114/0x298 [ 95.718565] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.719018] kthread+0x18c/0x1a8 [ 95.719323] ret_from_fork+0x10/0x20 [ 95.719862] [ 95.720139] Allocated by task 207: [ 95.720538] kasan_save_stack+0x3c/0x68 [ 95.721009] kasan_set_track+0x2c/0x40 [ 95.721444] kasan_save_alloc_info+0x24/0x38 [ 95.721906] __kasan_kmalloc+0xd4/0xd8 [ 95.722359] kmalloc_trace+0x68/0x130 [ 95.722778] kasan_bitops_generic+0x98/0x148 [ 95.723275] kunit_try_run_case+0x114/0x298 [ 95.723817] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.724492] kthread+0x18c/0x1a8 [ 95.724911] ret_from_fork+0x10/0x20 [ 95.725369] [ 95.725595] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.725595] which belongs to the cache kmalloc-16 of size 16 [ 95.726628] The buggy address is located 8 bytes inside of [ 95.726628] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.727554] [ 95.727833] The buggy address belongs to the physical page: [ 95.728269] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.729267] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.729910] page_type: 0xffffffff() [ 95.730340] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.730888] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.731541] page dumped because: kasan: bad access detected [ 95.732154] [ 95.732444] Memory state around the buggy address: [ 95.732981] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.733715] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.734403] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.735068] ^ [ 95.735559] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.736389] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.737124] ================================================================== [ 95.620992] ================================================================== [ 95.621774] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8 [ 95.622398] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.622912] [ 95.623209] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.624428] Hardware name: linux,dummy-virt (DT) [ 95.624903] Call trace: [ 95.625266] dump_backtrace+0x9c/0x128 [ 95.625767] show_stack+0x20/0x38 [ 95.626179] dump_stack_lvl+0x60/0xb0 [ 95.626624] print_report+0xf8/0x5e8 [ 95.627025] kasan_report+0xdc/0x128 [ 95.627458] kasan_check_range+0xe8/0x190 [ 95.627993] __kasan_check_write+0x20/0x30 [ 95.628479] kasan_bitops_test_and_modify.constprop.0+0x144/0x7b8 [ 95.629153] kasan_bitops_generic+0xc0/0x148 [ 95.629569] kunit_try_run_case+0x114/0x298 [ 95.630065] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.630698] kthread+0x18c/0x1a8 [ 95.631077] ret_from_fork+0x10/0x20 [ 95.631512] [ 95.631760] Allocated by task 207: [ 95.632169] kasan_save_stack+0x3c/0x68 [ 95.632688] kasan_set_track+0x2c/0x40 [ 95.633184] kasan_save_alloc_info+0x24/0x38 [ 95.633681] __kasan_kmalloc+0xd4/0xd8 [ 95.634193] kmalloc_trace+0x68/0x130 [ 95.634661] kasan_bitops_generic+0x98/0x148 [ 95.635108] kunit_try_run_case+0x114/0x298 [ 95.635776] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.636470] kthread+0x18c/0x1a8 [ 95.636961] ret_from_fork+0x10/0x20 [ 95.637443] [ 95.637695] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.637695] which belongs to the cache kmalloc-16 of size 16 [ 95.638730] The buggy address is located 8 bytes inside of [ 95.638730] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.639703] [ 95.639952] The buggy address belongs to the physical page: [ 95.640555] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.641436] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.642121] page_type: 0xffffffff() [ 95.642620] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.643534] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.644182] page dumped because: kasan: bad access detected [ 95.645309] [ 95.645561] Memory state around the buggy address: [ 95.645913] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.646384] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.647071] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.647727] ^ [ 95.648325] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.649038] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.649645] ================================================================== [ 95.767345] ================================================================== [ 95.768016] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8 [ 95.768971] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.769790] [ 95.770033] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.770704] Hardware name: linux,dummy-virt (DT) [ 95.771472] Call trace: [ 95.771803] dump_backtrace+0x9c/0x128 [ 95.772293] show_stack+0x20/0x38 [ 95.772780] dump_stack_lvl+0x60/0xb0 [ 95.773300] print_report+0xf8/0x5e8 [ 95.773779] kasan_report+0xdc/0x128 [ 95.774265] kasan_check_range+0xe8/0x190 [ 95.774826] __kasan_check_write+0x20/0x30 [ 95.775321] kasan_bitops_test_and_modify.constprop.0+0x230/0x7b8 [ 95.775879] kasan_bitops_generic+0xc0/0x148 [ 95.777061] kunit_try_run_case+0x114/0x298 [ 95.777926] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.778879] kthread+0x18c/0x1a8 [ 95.779584] ret_from_fork+0x10/0x20 [ 95.780349] [ 95.780729] Allocated by task 207: [ 95.781401] kasan_save_stack+0x3c/0x68 [ 95.782185] kasan_set_track+0x2c/0x40 [ 95.782979] kasan_save_alloc_info+0x24/0x38 [ 95.783776] __kasan_kmalloc+0xd4/0xd8 [ 95.784651] kmalloc_trace+0x68/0x130 [ 95.785431] kasan_bitops_generic+0x98/0x148 [ 95.786281] kunit_try_run_case+0x114/0x298 [ 95.787135] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.788223] kthread+0x18c/0x1a8 [ 95.788959] ret_from_fork+0x10/0x20 [ 95.789753] [ 95.790101] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.790101] which belongs to the cache kmalloc-16 of size 16 [ 95.791856] The buggy address is located 8 bytes inside of [ 95.791856] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.793603] [ 95.794049] The buggy address belongs to the physical page: [ 95.794945] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.796284] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.797417] page_type: 0xffffffff() [ 95.798164] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.799266] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.800435] page dumped because: kasan: bad access detected [ 95.801328] [ 95.801753] Memory state around the buggy address: [ 95.802551] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.803564] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.804667] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.805710] ^ [ 95.806656] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.807710] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.808824] ================================================================== [ 95.651189] ================================================================== [ 95.651962] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8 [ 95.652840] Read of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.653547] [ 95.653830] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.654647] Hardware name: linux,dummy-virt (DT) [ 95.655206] Call trace: [ 95.655480] dump_backtrace+0x9c/0x128 [ 95.656029] show_stack+0x20/0x38 [ 95.656527] dump_stack_lvl+0x60/0xb0 [ 95.656940] print_report+0xf8/0x5e8 [ 95.657400] kasan_report+0xdc/0x128 [ 95.657973] __asan_load8+0x9c/0xc0 [ 95.658451] kasan_bitops_test_and_modify.constprop.0+0x174/0x7b8 [ 95.659115] kasan_bitops_generic+0xc0/0x148 [ 95.659610] kunit_try_run_case+0x114/0x298 [ 95.660170] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.660848] kthread+0x18c/0x1a8 [ 95.661305] ret_from_fork+0x10/0x20 [ 95.661772] [ 95.662026] Allocated by task 207: [ 95.662408] kasan_save_stack+0x3c/0x68 [ 95.662931] kasan_set_track+0x2c/0x40 [ 95.663450] kasan_save_alloc_info+0x24/0x38 [ 95.663947] __kasan_kmalloc+0xd4/0xd8 [ 95.664456] kmalloc_trace+0x68/0x130 [ 95.664908] kasan_bitops_generic+0x98/0x148 [ 95.665365] kunit_try_run_case+0x114/0x298 [ 95.665908] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.666565] kthread+0x18c/0x1a8 [ 95.666997] ret_from_fork+0x10/0x20 [ 95.667457] [ 95.667691] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.667691] which belongs to the cache kmalloc-16 of size 16 [ 95.668836] The buggy address is located 8 bytes inside of [ 95.668836] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.669858] [ 95.670106] The buggy address belongs to the physical page: [ 95.670647] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.671498] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.672178] page_type: 0xffffffff() [ 95.672682] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.673437] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.674125] page dumped because: kasan: bad access detected [ 95.674684] [ 95.674918] Memory state around the buggy address: [ 95.675416] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.676072] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.676726] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.677365] ^ [ 95.677944] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.678621] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.679258] ================================================================== [ 95.490341] ================================================================== [ 95.491242] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8 [ 95.492193] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.493040] [ 95.493329] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.494151] Hardware name: linux,dummy-virt (DT) [ 95.494666] Call trace: [ 95.494959] dump_backtrace+0x9c/0x128 [ 95.495472] show_stack+0x20/0x38 [ 95.495916] dump_stack_lvl+0x60/0xb0 [ 95.496399] print_report+0xf8/0x5e8 [ 95.497984] kasan_report+0xdc/0x128 [ 95.498465] kasan_check_range+0xe8/0x190 [ 95.498891] __kasan_check_write+0x20/0x30 [ 95.499268] kasan_bitops_test_and_modify.constprop.0+0xa4/0x7b8 [ 95.499990] kasan_bitops_generic+0xc0/0x148 [ 95.500520] kunit_try_run_case+0x114/0x298 [ 95.501081] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.501569] kthread+0x18c/0x1a8 [ 95.501949] ret_from_fork+0x10/0x20 [ 95.502320] [ 95.502589] Allocated by task 207: [ 95.503283] kasan_save_stack+0x3c/0x68 [ 95.503773] kasan_set_track+0x2c/0x40 [ 95.504322] kasan_save_alloc_info+0x24/0x38 [ 95.504831] __kasan_kmalloc+0xd4/0xd8 [ 95.505488] kmalloc_trace+0x68/0x130 [ 95.506108] kasan_bitops_generic+0x98/0x148 [ 95.506712] kunit_try_run_case+0x114/0x298 [ 95.507221] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.507835] kthread+0x18c/0x1a8 [ 95.508257] ret_from_fork+0x10/0x20 [ 95.508758] [ 95.508989] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.508989] which belongs to the cache kmalloc-16 of size 16 [ 95.509895] The buggy address is located 8 bytes inside of [ 95.509895] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.510854] [ 95.511106] The buggy address belongs to the physical page: [ 95.511625] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.512665] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.513592] page_type: 0xffffffff() [ 95.514089] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.514830] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.515507] page dumped because: kasan: bad access detected [ 95.515952] [ 95.516243] Memory state around the buggy address: [ 95.516907] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.517597] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.518266] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.518986] ^ [ 95.519370] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.520650] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.521185] ================================================================== [ 95.555224] ================================================================== [ 95.555948] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8 [ 95.556893] Write of size 8 at addr ffff0000c5adb6c8 by task kunit_try_catch/207 [ 95.557816] [ 95.558037] CPU: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 95.558606] Hardware name: linux,dummy-virt (DT) [ 95.559159] Call trace: [ 95.559598] dump_backtrace+0x9c/0x128 [ 95.560194] show_stack+0x20/0x38 [ 95.560718] dump_stack_lvl+0x60/0xb0 [ 95.561243] print_report+0xf8/0x5e8 [ 95.561839] kasan_report+0xdc/0x128 [ 95.562382] kasan_check_range+0xe8/0x190 [ 95.563081] __kasan_check_write+0x20/0x30 [ 95.563545] kasan_bitops_test_and_modify.constprop.0+0x100/0x7b8 [ 95.564086] kasan_bitops_generic+0xc0/0x148 [ 95.564516] kunit_try_run_case+0x114/0x298 [ 95.565321] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.566015] kthread+0x18c/0x1a8 [ 95.566477] ret_from_fork+0x10/0x20 [ 95.566935] [ 95.567135] Allocated by task 207: [ 95.567471] kasan_save_stack+0x3c/0x68 [ 95.567963] kasan_set_track+0x2c/0x40 [ 95.568445] kasan_save_alloc_info+0x24/0x38 [ 95.568947] __kasan_kmalloc+0xd4/0xd8 [ 95.569442] kmalloc_trace+0x68/0x130 [ 95.569895] kasan_bitops_generic+0x98/0x148 [ 95.570374] kunit_try_run_case+0x114/0x298 [ 95.571174] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 95.571696] kthread+0x18c/0x1a8 [ 95.572279] ret_from_fork+0x10/0x20 [ 95.572729] [ 95.573019] The buggy address belongs to the object at ffff0000c5adb6c0 [ 95.573019] which belongs to the cache kmalloc-16 of size 16 [ 95.574095] The buggy address is located 8 bytes inside of [ 95.574095] allocated 9-byte region [ffff0000c5adb6c0, ffff0000c5adb6c9) [ 95.575059] [ 95.575342] The buggy address belongs to the physical page: [ 95.575942] page:00000000aabf8573 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105adb [ 95.576826] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 95.577499] page_type: 0xffffffff() [ 95.577944] raw: 0bfffc0000000800 ffff0000c00013c0 dead000000000122 0000000000000000 [ 95.578900] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 95.579743] page dumped because: kasan: bad access detected [ 95.580186] [ 95.580697] Memory state around the buggy address: [ 95.581070] ffff0000c5adb580: 00 01 fc fc 00 01 fc fc fa fb fc fc 00 01 fc fc [ 95.581674] ffff0000c5adb600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 95.582107] >ffff0000c5adb680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 95.582606] ^ [ 95.583264] ffff0000c5adb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.583897] ffff0000c5adb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 95.584558] ==================================================================
[ 36.033624] ================================================================== [ 36.034160] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0 [ 36.034728] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 36.035633] [ 36.035818] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 36.036306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 36.036849] Call Trace: [ 36.037109] <TASK> [ 36.037314] dump_stack_lvl+0x4e/0x90 [ 36.037574] print_report+0xd2/0x650 [ 36.037902] ? __virt_addr_valid+0x156/0x1e0 [ 36.038211] ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0 [ 36.038986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.039344] ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0 [ 36.039988] kasan_report+0x147/0x180 [ 36.040289] ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0 [ 36.040742] kasan_check_range+0x10c/0x1c0 [ 36.041043] __kasan_check_write+0x18/0x20 [ 36.041297] kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0 [ 36.041651] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 36.042056] ? kasan_set_track+0x29/0x40 [ 36.042299] ? kasan_save_alloc_info+0x22/0x30 [ 36.042594] ? __kasan_kmalloc+0xb7/0xc0 [ 36.042829] kasan_bitops_generic+0xb4/0x130 [ 36.043125] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 36.043468] ? ktime_get_ts64+0x118/0x140 [ 36.044220] kunit_try_run_case+0x120/0x290 [ 36.044535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.044820] ? __kasan_check_write+0x18/0x20 [ 36.045137] ? trace_preempt_on+0x20/0xa0 [ 36.045397] ? __kthread_parkme+0x4f/0xd0 [ 36.045657] ? preempt_count_sub+0x50/0x80 [ 36.045961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.046253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.046595] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.046943] kthread+0x19e/0x1e0 [ 36.047235] ? __pfx_kthread+0x10/0x10 [ 36.047897] ret_from_fork+0x41/0x70 [ 36.048147] ? __pfx_kthread+0x10/0x10 [ 36.048441] ret_from_fork_asm+0x1b/0x30 [ 36.048709] </TASK> [ 36.048888] [ 36.049082] Allocated by task 222: [ 36.049307] kasan_save_stack+0x44/0x70 [ 36.049576] kasan_set_track+0x29/0x40 [ 36.049825] kasan_save_alloc_info+0x22/0x30 [ 36.050110] __kasan_kmalloc+0xb7/0xc0 [ 36.050344] kmalloc_trace+0x4c/0xb0 [ 36.050576] kasan_bitops_generic+0x8e/0x130 [ 36.050914] kunit_try_run_case+0x120/0x290 [ 36.051185] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.051480] kthread+0x19e/0x1e0 [ 36.052117] ret_from_fork+0x41/0x70 [ 36.052451] ret_from_fork_asm+0x1b/0x30 [ 36.052689] [ 36.052798] The buggy address belongs to the object at ffff8881024a3ac0 [ 36.052798] which belongs to the cache kmalloc-16 of size 16 [ 36.053506] The buggy address is located 8 bytes inside of [ 36.053506] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 36.054226] [ 36.054333] The buggy address belongs to the physical page: [ 36.054614] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 36.055233] flags: 0x200000000000800(slab|node=0|zone=2) [ 36.055602] page_type: 0xffffffff() [ 36.055921] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 36.056792] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 36.057239] page dumped because: kasan: bad access detected [ 36.057531] [ 36.057634] Memory state around the buggy address: [ 36.058032] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 36.058404] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 36.058813] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 36.059185] ^ [ 36.059468] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.059984] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.061013] ================================================================== [ 36.168189] ================================================================== [ 36.168546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0 [ 36.169443] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 36.169983] [ 36.170103] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 36.170565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 36.171048] Call Trace: [ 36.171241] <TASK> [ 36.171415] dump_stack_lvl+0x4e/0x90 [ 36.171667] print_report+0xd2/0x650 [ 36.171950] ? __virt_addr_valid+0x156/0x1e0 [ 36.172290] ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0 [ 36.172671] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.172988] ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0 [ 36.173578] kasan_report+0x147/0x180 [ 36.173788] ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0 [ 36.174219] kasan_check_range+0x10c/0x1c0 [ 36.174494] __kasan_check_write+0x18/0x20 [ 36.174796] kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0 [ 36.175174] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 36.175582] ? kasan_set_track+0x29/0x40 [ 36.175844] ? kasan_save_alloc_info+0x22/0x30 [ 36.176166] ? __kasan_kmalloc+0xb7/0xc0 [ 36.176413] kasan_bitops_generic+0xb4/0x130 [ 36.176706] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 36.177057] ? ktime_get_ts64+0x118/0x140 [ 36.177307] kunit_try_run_case+0x120/0x290 [ 36.177607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.177890] ? __kasan_check_write+0x18/0x20 [ 36.178178] ? trace_preempt_on+0x20/0xa0 [ 36.178422] ? __kthread_parkme+0x4f/0xd0 [ 36.178693] ? preempt_count_sub+0x50/0x80 [ 36.178978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.179269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.179626] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.179995] kthread+0x19e/0x1e0 [ 36.180208] ? __pfx_kthread+0x10/0x10 [ 36.180475] ret_from_fork+0x41/0x70 [ 36.180709] ? __pfx_kthread+0x10/0x10 [ 36.181025] ret_from_fork_asm+0x1b/0x30 [ 36.181274] </TASK> [ 36.181418] [ 36.181545] Allocated by task 222: [ 36.181779] kasan_save_stack+0x44/0x70 [ 36.182064] kasan_set_track+0x29/0x40 [ 36.182345] kasan_save_alloc_info+0x22/0x30 [ 36.182567] __kasan_kmalloc+0xb7/0xc0 [ 36.182816] kmalloc_trace+0x4c/0xb0 [ 36.183157] kasan_bitops_generic+0x8e/0x130 [ 36.183396] kunit_try_run_case+0x120/0x290 [ 36.183668] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.184029] kthread+0x19e/0x1e0 [ 36.184436] ret_from_fork+0x41/0x70 [ 36.184659] ret_from_fork_asm+0x1b/0x30 [ 36.184938] [ 36.185063] The buggy address belongs to the object at ffff8881024a3ac0 [ 36.185063] which belongs to the cache kmalloc-16 of size 16 [ 36.185677] The buggy address is located 8 bytes inside of [ 36.185677] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 36.186298] [ 36.186437] The buggy address belongs to the physical page: [ 36.186808] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 36.187302] flags: 0x200000000000800(slab|node=0|zone=2) [ 36.187668] page_type: 0xffffffff() [ 36.187942] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 36.188365] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 36.188752] page dumped because: kasan: bad access detected [ 36.189097] [ 36.189208] Memory state around the buggy address: [ 36.189460] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 36.189904] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 36.190340] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 36.190692] ^ [ 36.191092] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.191482] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.191869] ================================================================== [ 36.144325] ================================================================== [ 36.144805] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0 [ 36.145269] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 36.145742] [ 36.145882] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 36.146384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 36.146903] Call Trace: [ 36.147083] <TASK> [ 36.147257] dump_stack_lvl+0x4e/0x90 [ 36.147496] print_report+0xd2/0x650 [ 36.147769] ? __virt_addr_valid+0x156/0x1e0 [ 36.148052] ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0 [ 36.148412] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.148747] ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0 [ 36.149116] kasan_report+0x147/0x180 [ 36.149381] ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0 [ 36.149740] kasan_check_range+0x10c/0x1c0 [ 36.150056] __kasan_check_write+0x18/0x20 [ 36.150316] kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0 [ 36.150706] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 36.151148] ? kasan_set_track+0x29/0x40 [ 36.151392] ? kasan_save_alloc_info+0x22/0x30 [ 36.151673] ? __kasan_kmalloc+0xb7/0xc0 [ 36.151982] kasan_bitops_generic+0xb4/0x130 [ 36.152243] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 36.152553] ? ktime_get_ts64+0x118/0x140 [ 36.152885] kunit_try_run_case+0x120/0x290 [ 36.153146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.153421] ? __kasan_check_write+0x18/0x20 [ 36.153715] ? trace_preempt_on+0x20/0xa0 [ 36.153995] ? __kthread_parkme+0x4f/0xd0 [ 36.154234] ? preempt_count_sub+0x50/0x80 [ 36.154522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.154832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.155205] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.155536] kthread+0x19e/0x1e0 [ 36.155766] ? __pfx_kthread+0x10/0x10 [ 36.156054] ret_from_fork+0x41/0x70 [ 36.156328] ? __pfx_kthread+0x10/0x10 [ 36.156572] ret_from_fork_asm+0x1b/0x30 [ 36.156837] </TASK> [ 36.157005] [ 36.157103] Allocated by task 222: [ 36.157328] kasan_save_stack+0x44/0x70 [ 36.157585] kasan_set_track+0x29/0x40 [ 36.157894] kasan_save_alloc_info+0x22/0x30 [ 36.158150] __kasan_kmalloc+0xb7/0xc0 [ 36.158408] kmalloc_trace+0x4c/0xb0 [ 36.158651] kasan_bitops_generic+0x8e/0x130 [ 36.158916] kunit_try_run_case+0x120/0x290 [ 36.159211] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.159483] kthread+0x19e/0x1e0 [ 36.159738] ret_from_fork+0x41/0x70 [ 36.160011] ret_from_fork_asm+0x1b/0x30 [ 36.160251] [ 36.160351] The buggy address belongs to the object at ffff8881024a3ac0 [ 36.160351] which belongs to the cache kmalloc-16 of size 16 [ 36.161011] The buggy address is located 8 bytes inside of [ 36.161011] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 36.161660] [ 36.161799] The buggy address belongs to the physical page: [ 36.162123] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 36.162544] flags: 0x200000000000800(slab|node=0|zone=2) [ 36.162914] page_type: 0xffffffff() [ 36.163201] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 36.163587] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 36.164133] page dumped because: kasan: bad access detected [ 36.164430] [ 36.164550] Memory state around the buggy address: [ 36.164934] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 36.165368] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 36.165749] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 36.166126] ^ [ 36.166412] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.166829] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.167253] ================================================================== [ 36.088568] ================================================================== [ 36.089224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0 [ 36.090003] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 36.090413] [ 36.090582] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 36.091134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 36.091606] Call Trace: [ 36.091811] <TASK> [ 36.092058] dump_stack_lvl+0x4e/0x90 [ 36.092365] print_report+0xd2/0x650 [ 36.092653] ? __virt_addr_valid+0x156/0x1e0 [ 36.092975] ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0 [ 36.093375] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.093774] ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0 [ 36.094171] kasan_report+0x147/0x180 [ 36.094454] ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0 [ 36.094967] kasan_check_range+0x10c/0x1c0 [ 36.095258] __kasan_check_write+0x18/0x20 [ 36.095539] kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0 [ 36.096024] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 36.096424] ? kasan_set_track+0x29/0x40 [ 36.096707] ? kasan_save_alloc_info+0x22/0x30 [ 36.097053] ? __kasan_kmalloc+0xb7/0xc0 [ 36.097332] kasan_bitops_generic+0xb4/0x130 [ 36.097601] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 36.098006] ? ktime_get_ts64+0x118/0x140 [ 36.098302] kunit_try_run_case+0x120/0x290 [ 36.098601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.099018] ? __kasan_check_write+0x18/0x20 [ 36.099286] ? trace_preempt_on+0x20/0xa0 [ 36.099562] ? __kthread_parkme+0x4f/0xd0 [ 36.099842] ? preempt_count_sub+0x50/0x80 [ 36.100128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.100459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.100847] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.101229] kthread+0x19e/0x1e0 [ 36.101470] ? __pfx_kthread+0x10/0x10 [ 36.101778] ret_from_fork+0x41/0x70 [ 36.102035] ? __pfx_kthread+0x10/0x10 [ 36.102325] ret_from_fork_asm+0x1b/0x30 [ 36.102621] </TASK> [ 36.102810] [ 36.102983] Allocated by task 222: [ 36.103159] kasan_save_stack+0x44/0x70 [ 36.103451] kasan_set_track+0x29/0x40 [ 36.103736] kasan_save_alloc_info+0x22/0x30 [ 36.104089] __kasan_kmalloc+0xb7/0xc0 [ 36.105046] kmalloc_trace+0x4c/0xb0 [ 36.105542] kasan_bitops_generic+0x8e/0x130 [ 36.105809] kunit_try_run_case+0x120/0x290 [ 36.106056] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.106320] kthread+0x19e/0x1e0 [ 36.106511] ret_from_fork+0x41/0x70 [ 36.106701] ret_from_fork_asm+0x1b/0x30 [ 36.107504] [ 36.107806] The buggy address belongs to the object at ffff8881024a3ac0 [ 36.107806] which belongs to the cache kmalloc-16 of size 16 [ 36.108643] The buggy address is located 8 bytes inside of [ 36.108643] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 36.109178] [ 36.109289] The buggy address belongs to the physical page: [ 36.109550] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 36.110339] flags: 0x200000000000800(slab|node=0|zone=2) [ 36.110950] page_type: 0xffffffff() [ 36.111352] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 36.112227] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 36.113122] page dumped because: kasan: bad access detected [ 36.113675] [ 36.113906] Memory state around the buggy address: [ 36.114395] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 36.115167] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 36.115919] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 36.116442] ^ [ 36.116695] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.117041] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.117345] ================================================================== [ 36.242622] ================================================================== [ 36.243200] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0 [ 36.243921] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 36.244315] [ 36.244468] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 36.244961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 36.245503] Call Trace: [ 36.245662] <TASK> [ 36.245843] dump_stack_lvl+0x4e/0x90 [ 36.246107] print_report+0xd2/0x650 [ 36.246372] ? __virt_addr_valid+0x156/0x1e0 [ 36.246648] ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0 [ 36.247066] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.247433] ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0 [ 36.247838] kasan_report+0x147/0x180 [ 36.248062] ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0 [ 36.248484] kasan_check_range+0x10c/0x1c0 [ 36.248795] __kasan_check_write+0x18/0x20 [ 36.249029] kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0 [ 36.249405] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 36.249794] ? kasan_set_track+0x29/0x40 [ 36.250139] ? kasan_save_alloc_info+0x22/0x30 [ 36.250465] ? __kasan_kmalloc+0xb7/0xc0 [ 36.250739] kasan_bitops_generic+0xb4/0x130 [ 36.251032] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 36.251361] ? ktime_get_ts64+0x118/0x140 [ 36.251612] kunit_try_run_case+0x120/0x290 [ 36.251890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.252236] ? __kasan_check_write+0x18/0x20 [ 36.252488] ? trace_preempt_on+0x20/0xa0 [ 36.252786] ? __kthread_parkme+0x4f/0xd0 [ 36.253039] ? preempt_count_sub+0x50/0x80 [ 36.253323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.253615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.253995] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.254324] kthread+0x19e/0x1e0 [ 36.254571] ? __pfx_kthread+0x10/0x10 [ 36.254869] ret_from_fork+0x41/0x70 [ 36.255065] ? __pfx_kthread+0x10/0x10 [ 36.255342] ret_from_fork_asm+0x1b/0x30 [ 36.255683] </TASK> [ 36.255897] [ 36.256015] Allocated by task 222: [ 36.256200] kasan_save_stack+0x44/0x70 [ 36.256483] kasan_set_track+0x29/0x40 [ 36.256701] kasan_save_alloc_info+0x22/0x30 [ 36.257003] __kasan_kmalloc+0xb7/0xc0 [ 36.257230] kmalloc_trace+0x4c/0xb0 [ 36.257463] kasan_bitops_generic+0x8e/0x130 [ 36.257685] kunit_try_run_case+0x120/0x290 [ 36.258118] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.258430] kthread+0x19e/0x1e0 [ 36.258650] ret_from_fork+0x41/0x70 [ 36.258952] ret_from_fork_asm+0x1b/0x30 [ 36.259226] [ 36.259345] The buggy address belongs to the object at ffff8881024a3ac0 [ 36.259345] which belongs to the cache kmalloc-16 of size 16 [ 36.260073] The buggy address is located 8 bytes inside of [ 36.260073] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 36.260643] [ 36.260769] The buggy address belongs to the physical page: [ 36.261125] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 36.261640] flags: 0x200000000000800(slab|node=0|zone=2) [ 36.262040] page_type: 0xffffffff() [ 36.262246] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 36.262684] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 36.263122] page dumped because: kasan: bad access detected [ 36.263422] [ 36.263541] Memory state around the buggy address: [ 36.263827] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 36.264211] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 36.264554] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 36.265030] ^ [ 36.265299] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.265715] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.266098] ================================================================== [ 36.192943] ================================================================== [ 36.193388] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0 [ 36.193980] Read of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 36.194407] [ 36.194550] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 36.195047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 36.195534] Call Trace: [ 36.195710] <TASK> [ 36.195896] dump_stack_lvl+0x4e/0x90 [ 36.196181] print_report+0xd2/0x650 [ 36.196415] ? __virt_addr_valid+0x156/0x1e0 [ 36.196670] ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0 [ 36.197065] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.197427] ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0 [ 36.197796] kasan_report+0x147/0x180 [ 36.198073] ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0 [ 36.198441] kasan_check_range+0x10c/0x1c0 [ 36.198699] __kasan_check_read+0x15/0x20 [ 36.199733] kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0 [ 36.200242] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 36.200645] ? kasan_set_track+0x29/0x40 [ 36.200959] ? kasan_save_alloc_info+0x22/0x30 [ 36.201238] ? __kasan_kmalloc+0xb7/0xc0 [ 36.201472] kasan_bitops_generic+0xb4/0x130 [ 36.201758] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 36.202147] ? ktime_get_ts64+0x118/0x140 [ 36.202418] kunit_try_run_case+0x120/0x290 [ 36.202689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.203016] ? __kasan_check_write+0x18/0x20 [ 36.203278] ? trace_preempt_on+0x20/0xa0 [ 36.203545] ? __kthread_parkme+0x4f/0xd0 [ 36.203882] ? preempt_count_sub+0x50/0x80 [ 36.204202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.204493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.204842] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.205150] kthread+0x19e/0x1e0 [ 36.205394] ? __pfx_kthread+0x10/0x10 [ 36.205650] ret_from_fork+0x41/0x70 [ 36.205940] ? __pfx_kthread+0x10/0x10 [ 36.206267] ret_from_fork_asm+0x1b/0x30 [ 36.206567] </TASK> [ 36.206712] [ 36.206849] Allocated by task 222: [ 36.207054] kasan_save_stack+0x44/0x70 [ 36.207298] kasan_set_track+0x29/0x40 [ 36.207543] kasan_save_alloc_info+0x22/0x30 [ 36.207870] __kasan_kmalloc+0xb7/0xc0 [ 36.208109] kmalloc_trace+0x4c/0xb0 [ 36.208364] kasan_bitops_generic+0x8e/0x130 [ 36.208662] kunit_try_run_case+0x120/0x290 [ 36.209594] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.209968] kthread+0x19e/0x1e0 [ 36.210212] ret_from_fork+0x41/0x70 [ 36.210430] ret_from_fork_asm+0x1b/0x30 [ 36.210669] [ 36.210804] The buggy address belongs to the object at ffff8881024a3ac0 [ 36.210804] which belongs to the cache kmalloc-16 of size 16 [ 36.211637] The buggy address is located 8 bytes inside of [ 36.211637] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 36.212304] [ 36.212436] The buggy address belongs to the physical page: [ 36.212730] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 36.213230] flags: 0x200000000000800(slab|node=0|zone=2) [ 36.213532] page_type: 0xffffffff() [ 36.213748] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 36.214243] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 36.214628] page dumped because: kasan: bad access detected [ 36.214938] [ 36.215055] Memory state around the buggy address: [ 36.215304] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 36.215702] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 36.216142] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 36.216532] ^ [ 36.216879] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.217258] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.217641] ================================================================== [ 36.218454] ================================================================== [ 36.218941] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0 [ 36.219412] Read of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 36.219926] [ 36.220048] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 36.220596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 36.221076] Call Trace: [ 36.221282] <TASK> [ 36.221424] dump_stack_lvl+0x4e/0x90 [ 36.221706] print_report+0xd2/0x650 [ 36.221980] ? __virt_addr_valid+0x156/0x1e0 [ 36.222256] ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0 [ 36.222584] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.223098] ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0 [ 36.223434] kasan_report+0x147/0x180 [ 36.223699] ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0 [ 36.224134] __asan_load8+0x82/0xb0 [ 36.224385] kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0 [ 36.224753] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 36.225184] ? kasan_set_track+0x29/0x40 [ 36.225418] ? kasan_save_alloc_info+0x22/0x30 [ 36.225704] ? __kasan_kmalloc+0xb7/0xc0 [ 36.226023] kasan_bitops_generic+0xb4/0x130 [ 36.226339] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 36.226611] ? ktime_get_ts64+0x118/0x140 [ 36.226984] kunit_try_run_case+0x120/0x290 [ 36.227227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.227555] ? __kasan_check_write+0x18/0x20 [ 36.227828] ? trace_preempt_on+0x20/0xa0 [ 36.228133] ? __kthread_parkme+0x4f/0xd0 [ 36.228406] ? preempt_count_sub+0x50/0x80 [ 36.228723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.229038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.229421] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.229816] kthread+0x19e/0x1e0 [ 36.230047] ? __pfx_kthread+0x10/0x10 [ 36.230319] ret_from_fork+0x41/0x70 [ 36.230555] ? __pfx_kthread+0x10/0x10 [ 36.230829] ret_from_fork_asm+0x1b/0x30 [ 36.231147] </TASK> [ 36.231304] [ 36.231415] Allocated by task 222: [ 36.231605] kasan_save_stack+0x44/0x70 [ 36.231893] kasan_set_track+0x29/0x40 [ 36.232133] kasan_save_alloc_info+0x22/0x30 [ 36.232427] __kasan_kmalloc+0xb7/0xc0 [ 36.232652] kmalloc_trace+0x4c/0xb0 [ 36.232928] kasan_bitops_generic+0x8e/0x130 [ 36.233207] kunit_try_run_case+0x120/0x290 [ 36.233444] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.233925] kthread+0x19e/0x1e0 [ 36.234126] ret_from_fork+0x41/0x70 [ 36.234312] ret_from_fork_asm+0x1b/0x30 [ 36.234576] [ 36.234704] The buggy address belongs to the object at ffff8881024a3ac0 [ 36.234704] which belongs to the cache kmalloc-16 of size 16 [ 36.235404] The buggy address is located 8 bytes inside of [ 36.235404] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 36.236115] [ 36.236240] The buggy address belongs to the physical page: [ 36.236546] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 36.237087] flags: 0x200000000000800(slab|node=0|zone=2) [ 36.237422] page_type: 0xffffffff() [ 36.237658] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 36.238009] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 36.238517] page dumped because: kasan: bad access detected [ 36.238962] [ 36.239063] Memory state around the buggy address: [ 36.239283] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 36.239698] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 36.240113] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 36.240462] ^ [ 36.240842] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.241169] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.241630] ================================================================== [ 36.005925] ================================================================== [ 36.006310] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0 [ 36.007582] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 36.008298] [ 36.008445] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 36.008953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 36.009442] Call Trace: [ 36.009628] <TASK> [ 36.009821] dump_stack_lvl+0x4e/0x90 [ 36.010166] print_report+0xd2/0x650 [ 36.010888] ? __virt_addr_valid+0x156/0x1e0 [ 36.011195] ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0 [ 36.011657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.012035] ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0 [ 36.012432] kasan_report+0x147/0x180 [ 36.012671] ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0 [ 36.013086] kasan_check_range+0x10c/0x1c0 [ 36.013354] __kasan_check_write+0x18/0x20 [ 36.013598] kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0 [ 36.014020] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 36.014870] ? kasan_set_track+0x29/0x40 [ 36.015136] ? kasan_save_alloc_info+0x22/0x30 [ 36.015413] ? __kasan_kmalloc+0xb7/0xc0 [ 36.015685] kasan_bitops_generic+0xb4/0x130 [ 36.015993] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 36.016297] ? ktime_get_ts64+0x118/0x140 [ 36.016561] kunit_try_run_case+0x120/0x290 [ 36.016855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.017205] ? __kasan_check_write+0x18/0x20 [ 36.017479] ? trace_preempt_on+0x20/0xa0 [ 36.017716] ? __kthread_parkme+0x4f/0xd0 [ 36.018024] ? preempt_count_sub+0x50/0x80 [ 36.018295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.019024] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.019459] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.019819] kthread+0x19e/0x1e0 [ 36.020094] ? __pfx_kthread+0x10/0x10 [ 36.020387] ret_from_fork+0x41/0x70 [ 36.020629] ? __pfx_kthread+0x10/0x10 [ 36.020934] ret_from_fork_asm+0x1b/0x30 [ 36.021192] </TASK> [ 36.021355] [ 36.021481] Allocated by task 222: [ 36.021682] kasan_save_stack+0x44/0x70 [ 36.021913] kasan_set_track+0x29/0x40 [ 36.022195] kasan_save_alloc_info+0x22/0x30 [ 36.022879] __kasan_kmalloc+0xb7/0xc0 [ 36.023129] kmalloc_trace+0x4c/0xb0 [ 36.023381] kasan_bitops_generic+0x8e/0x130 [ 36.023679] kunit_try_run_case+0x120/0x290 [ 36.023942] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.024286] kthread+0x19e/0x1e0 [ 36.024497] ret_from_fork+0x41/0x70 [ 36.024724] ret_from_fork_asm+0x1b/0x30 [ 36.025006] [ 36.025130] The buggy address belongs to the object at ffff8881024a3ac0 [ 36.025130] which belongs to the cache kmalloc-16 of size 16 [ 36.025756] The buggy address is located 8 bytes inside of [ 36.025756] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 36.026836] [ 36.027014] The buggy address belongs to the physical page: [ 36.027328] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 36.027897] flags: 0x200000000000800(slab|node=0|zone=2) [ 36.028222] page_type: 0xffffffff() [ 36.028446] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 36.028912] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 36.029338] page dumped because: kasan: bad access detected [ 36.029636] [ 36.029764] Memory state around the buggy address: [ 36.030008] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 36.030915] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 36.031315] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 36.031735] ^ [ 36.032054] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.032432] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.032809] ================================================================== [ 36.061652] ================================================================== [ 36.062040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0 [ 36.062632] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 36.063202] [ 36.063371] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 36.063779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 36.064309] Call Trace: [ 36.064491] <TASK> [ 36.064663] dump_stack_lvl+0x4e/0x90 [ 36.064962] print_report+0xd2/0x650 [ 36.065201] ? __virt_addr_valid+0x156/0x1e0 [ 36.065519] ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0 [ 36.065929] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.066841] ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0 [ 36.067269] kasan_report+0x147/0x180 [ 36.067530] ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0 [ 36.068020] kasan_check_range+0x10c/0x1c0 [ 36.068315] __kasan_check_write+0x18/0x20 [ 36.068585] kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0 [ 36.068993] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 36.069814] ? kasan_set_track+0x29/0x40 [ 36.070080] ? kasan_save_alloc_info+0x22/0x30 [ 36.070388] ? __kasan_kmalloc+0xb7/0xc0 [ 36.070649] kasan_bitops_generic+0xb4/0x130 [ 36.070984] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 36.071329] ? ktime_get_ts64+0x118/0x140 [ 36.071582] kunit_try_run_case+0x120/0x290 [ 36.071908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.072202] ? __kasan_check_write+0x18/0x20 [ 36.072484] ? trace_preempt_on+0x20/0xa0 [ 36.072760] ? __kthread_parkme+0x4f/0xd0 [ 36.073061] ? preempt_count_sub+0x50/0x80 [ 36.073292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.073988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.074333] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.074663] kthread+0x19e/0x1e0 [ 36.074939] ? __pfx_kthread+0x10/0x10 [ 36.075190] ret_from_fork+0x41/0x70 [ 36.075407] ? __pfx_kthread+0x10/0x10 [ 36.075684] ret_from_fork_asm+0x1b/0x30 [ 36.075976] </TASK> [ 36.076133] [ 36.076249] Allocated by task 222: [ 36.076419] kasan_save_stack+0x44/0x70 [ 36.076688] kasan_set_track+0x29/0x40 [ 36.076935] kasan_save_alloc_info+0x22/0x30 [ 36.077229] __kasan_kmalloc+0xb7/0xc0 [ 36.077902] kmalloc_trace+0x4c/0xb0 [ 36.078162] kasan_bitops_generic+0x8e/0x130 [ 36.078540] kunit_try_run_case+0x120/0x290 [ 36.078889] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.079204] kthread+0x19e/0x1e0 [ 36.079438] ret_from_fork+0x41/0x70 [ 36.079627] ret_from_fork_asm+0x1b/0x30 [ 36.079905] [ 36.080018] The buggy address belongs to the object at ffff8881024a3ac0 [ 36.080018] which belongs to the cache kmalloc-16 of size 16 [ 36.080641] The buggy address is located 8 bytes inside of [ 36.080641] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 36.081283] [ 36.081933] The buggy address belongs to the physical page: [ 36.082255] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 36.082779] flags: 0x200000000000800(slab|node=0|zone=2) [ 36.083128] page_type: 0xffffffff() [ 36.083364] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 36.083771] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 36.084241] page dumped because: kasan: bad access detected [ 36.084526] [ 36.084646] Memory state around the buggy address: [ 36.084918] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 36.085316] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 36.086104] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 36.086491] ^ [ 36.086854] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.087305] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.087702] ================================================================== [ 36.118228] ================================================================== [ 36.118621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0 [ 36.119461] Write of size 8 at addr ffff8881024a3ac8 by task kunit_try_catch/222 [ 36.119937] [ 36.120085] CPU: 1 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 36.120567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 36.121102] Call Trace: [ 36.121265] <TASK> [ 36.121429] dump_stack_lvl+0x4e/0x90 [ 36.121723] print_report+0xd2/0x650 [ 36.121965] ? __virt_addr_valid+0x156/0x1e0 [ 36.122291] ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0 [ 36.122666] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.123021] ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0 [ 36.123444] kasan_report+0x147/0x180 [ 36.123695] ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0 [ 36.124110] kasan_check_range+0x10c/0x1c0 [ 36.124408] __kasan_check_write+0x18/0x20 [ 36.124695] kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0 [ 36.125067] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 36.125481] ? kasan_set_track+0x29/0x40 [ 36.125727] ? kasan_save_alloc_info+0x22/0x30 [ 36.126029] ? __kasan_kmalloc+0xb7/0xc0 [ 36.126255] kasan_bitops_generic+0xb4/0x130 [ 36.126559] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 36.126915] ? ktime_get_ts64+0x118/0x140 [ 36.127184] kunit_try_run_case+0x120/0x290 [ 36.127446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.127744] ? __kasan_check_write+0x18/0x20 [ 36.128148] ? trace_preempt_on+0x20/0xa0 [ 36.128415] ? __kthread_parkme+0x4f/0xd0 [ 36.128764] ? preempt_count_sub+0x50/0x80 [ 36.129205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.129520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.129893] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.130219] kthread+0x19e/0x1e0 [ 36.130439] ? __pfx_kthread+0x10/0x10 [ 36.130677] ret_from_fork+0x41/0x70 [ 36.130927] ? __pfx_kthread+0x10/0x10 [ 36.131227] ret_from_fork_asm+0x1b/0x30 [ 36.131497] </TASK> [ 36.131668] [ 36.131813] Allocated by task 222: [ 36.131998] kasan_save_stack+0x44/0x70 [ 36.132305] kasan_set_track+0x29/0x40 [ 36.132590] kasan_save_alloc_info+0x22/0x30 [ 36.132916] __kasan_kmalloc+0xb7/0xc0 [ 36.133174] kmalloc_trace+0x4c/0xb0 [ 36.133450] kasan_bitops_generic+0x8e/0x130 [ 36.133702] kunit_try_run_case+0x120/0x290 [ 36.133973] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 36.134307] kthread+0x19e/0x1e0 [ 36.134558] ret_from_fork+0x41/0x70 [ 36.134751] ret_from_fork_asm+0x1b/0x30 [ 36.135019] [ 36.135230] The buggy address belongs to the object at ffff8881024a3ac0 [ 36.135230] which belongs to the cache kmalloc-16 of size 16 [ 36.135940] The buggy address is located 8 bytes inside of [ 36.135940] allocated 9-byte region [ffff8881024a3ac0, ffff8881024a3ac9) [ 36.136586] [ 36.136728] The buggy address belongs to the physical page: [ 36.137070] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024a3 [ 36.137531] flags: 0x200000000000800(slab|node=0|zone=2) [ 36.138286] page_type: 0xffffffff() [ 36.138545] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 36.139088] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 36.139604] page dumped because: kasan: bad access detected [ 36.140009] [ 36.140234] Memory state around the buggy address: [ 36.140605] ffff8881024a3980: 00 06 fc fc 00 06 fc fc 00 04 fc fc 00 04 fc fc [ 36.141137] ffff8881024a3a00: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 36.141635] >ffff8881024a3a80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 36.142150] ^ [ 36.142584] ffff8881024a3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.143079] ffff8881024a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.143383] ==================================================================