Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 51.296935] ================================================================== [ 51.297678] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0 [ 51.298885] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224 [ 51.299627] [ 51.299919] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 51.301148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 51.302152] Call Trace: [ 51.302513] <TASK> [ 51.302849] dump_stack_lvl+0x4e/0x90 [ 51.303542] print_report+0xd2/0x660 [ 51.304347] ? __virt_addr_valid+0x156/0x1e0 [ 51.305021] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.305905] kasan_report+0xff/0x140 [ 51.306485] ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0 [ 51.307456] ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0 [ 51.308394] kasan_check_range+0x10c/0x1c0 [ 51.309087] __kasan_check_write+0x18/0x20 [ 51.309684] kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0 [ 51.310509] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 51.311427] ? kasan_set_track+0x29/0x40 [ 51.312138] ? kasan_save_alloc_info+0x22/0x30 [ 51.312851] ? __kasan_kmalloc+0xb7/0xc0 [ 51.313562] kasan_bitops_generic+0xb4/0x130 [ 51.314368] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.315174] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.316561] ? kunit_try_run_case+0x11b/0x290 [ 51.317144] kunit_try_run_case+0x126/0x290 [ 51.317842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.318522] ? __kasan_check_write+0x18/0x20 [ 51.319518] ? trace_preempt_on+0x20/0xa0 [ 51.320357] ? __kthread_parkme+0x4f/0xd0 [ 51.321353] ? preempt_count_sub+0x50/0x80 [ 51.321859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.322601] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.323483] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.324373] kthread+0x19e/0x1e0 [ 51.324838] ? __pfx_kthread+0x10/0x10 [ 51.325335] ret_from_fork+0x41/0x70 [ 51.325815] ? __pfx_kthread+0x10/0x10 [ 51.326253] ret_from_fork_asm+0x1b/0x30 [ 51.326772] </TASK> [ 51.327113] [ 51.327393] Allocated by task 224: [ 51.327867] kasan_save_stack+0x3c/0x60 [ 51.329191] kasan_set_track+0x29/0x40 [ 51.329653] kasan_save_alloc_info+0x22/0x30 [ 51.330185] __kasan_kmalloc+0xb7/0xc0 [ 51.330754] kmalloc_trace+0x4c/0xb0 [ 51.331294] kasan_bitops_generic+0x8e/0x130 [ 51.331822] kunit_try_run_case+0x126/0x290 [ 51.333098] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.333941] kthread+0x19e/0x1e0 [ 51.334359] ret_from_fork+0x41/0x70 [ 51.334767] ret_from_fork_asm+0x1b/0x30 [ 51.335673] [ 51.335953] The buggy address belongs to the object at ffff888101a813e0 [ 51.335953] which belongs to the cache kmalloc-16 of size 16 [ 51.337999] The buggy address is located 8 bytes inside of [ 51.337999] allocated 9-byte region [ffff888101a813e0, ffff888101a813e9) [ 51.339130] [ 51.339370] The buggy address belongs to the physical page: [ 51.339908] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81 [ 51.341553] flags: 0x200000000000800(slab|node=0|zone=2) [ 51.342266] page_type: 0xffffffff() [ 51.343172] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 51.344013] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 51.344349] page dumped because: kasan: bad access detected [ 51.344593] [ 51.344716] Memory state around the buggy address: [ 51.345219] ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 51.346541] ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 51.347301] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc [ 51.348803] ^ [ 51.349532] ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.350944] ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.351971] ================================================================== [ 51.570716] ================================================================== [ 51.571977] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0 [ 51.573033] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224 [ 51.574143] [ 51.574390] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 51.575342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 51.576336] Call Trace: [ 51.576690] <TASK> [ 51.577057] dump_stack_lvl+0x4e/0x90 [ 51.577517] print_report+0xd2/0x660 [ 51.578220] ? __virt_addr_valid+0x156/0x1e0 [ 51.578895] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.579765] kasan_report+0xff/0x140 [ 51.580385] ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0 [ 51.581227] ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0 [ 51.582079] kasan_check_range+0x10c/0x1c0 [ 51.582770] __kasan_check_write+0x18/0x20 [ 51.583404] kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0 [ 51.584275] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 51.585114] ? kasan_set_track+0x29/0x40 [ 51.585675] ? kasan_save_alloc_info+0x22/0x30 [ 51.586347] ? __kasan_kmalloc+0xb7/0xc0 [ 51.586990] kasan_bitops_generic+0xb4/0x130 [ 51.587701] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.588369] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.589081] ? kunit_try_run_case+0x11b/0x290 [ 51.589817] kunit_try_run_case+0x126/0x290 [ 51.590445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.591126] ? __kasan_check_write+0x18/0x20 [ 51.591798] ? trace_preempt_on+0x20/0xa0 [ 51.592364] ? __kthread_parkme+0x4f/0xd0 [ 51.593075] ? preempt_count_sub+0x50/0x80 [ 51.593781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.594505] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.595311] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.596101] kthread+0x19e/0x1e0 [ 51.596681] ? __pfx_kthread+0x10/0x10 [ 51.597289] ret_from_fork+0x41/0x70 [ 51.597879] ? __pfx_kthread+0x10/0x10 [ 51.598542] ret_from_fork_asm+0x1b/0x30 [ 51.599130] </TASK> [ 51.599555] [ 51.599841] Allocated by task 224: [ 51.600285] kasan_save_stack+0x3c/0x60 [ 51.600939] kasan_set_track+0x29/0x40 [ 51.601481] kasan_save_alloc_info+0x22/0x30 [ 51.602211] __kasan_kmalloc+0xb7/0xc0 [ 51.602749] kmalloc_trace+0x4c/0xb0 [ 51.603346] kasan_bitops_generic+0x8e/0x130 [ 51.604024] kunit_try_run_case+0x126/0x290 [ 51.604641] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.605416] kthread+0x19e/0x1e0 [ 51.606029] ret_from_fork+0x41/0x70 [ 51.606665] ret_from_fork_asm+0x1b/0x30 [ 51.607279] [ 51.607557] The buggy address belongs to the object at ffff888101a813e0 [ 51.607557] which belongs to the cache kmalloc-16 of size 16 [ 51.608715] The buggy address is located 8 bytes inside of [ 51.608715] allocated 9-byte region [ffff888101a813e0, ffff888101a813e9) [ 51.609936] [ 51.610262] The buggy address belongs to the physical page: [ 51.610808] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81 [ 51.611671] flags: 0x200000000000800(slab|node=0|zone=2) [ 51.612277] page_type: 0xffffffff() [ 51.612697] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 51.613663] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 51.614468] page dumped because: kasan: bad access detected [ 51.615140] [ 51.615429] Memory state around the buggy address: [ 51.616006] ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 51.616749] ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 51.617620] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc [ 51.618309] ^ [ 51.619110] ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.619898] ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.620747] ================================================================== [ 51.407423] ================================================================== [ 51.408226] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0 [ 51.409291] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224 [ 51.410328] [ 51.410630] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 51.411578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 51.413288] Call Trace: [ 51.414412] <TASK> [ 51.414981] dump_stack_lvl+0x4e/0x90 [ 51.415664] print_report+0xd2/0x660 [ 51.416360] ? __virt_addr_valid+0x156/0x1e0 [ 51.417666] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.418388] kasan_report+0xff/0x140 [ 51.419018] ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0 [ 51.419947] ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0 [ 51.420635] kasan_check_range+0x10c/0x1c0 [ 51.421426] __kasan_check_write+0x18/0x20 [ 51.422190] kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0 [ 51.423243] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 51.424340] ? kasan_set_track+0x29/0x40 [ 51.424976] ? kasan_save_alloc_info+0x22/0x30 [ 51.426000] ? __kasan_kmalloc+0xb7/0xc0 [ 51.426508] kasan_bitops_generic+0xb4/0x130 [ 51.427394] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.428031] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.428603] ? kunit_try_run_case+0x11b/0x290 [ 51.429753] kunit_try_run_case+0x126/0x290 [ 51.430285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.430968] ? __kasan_check_write+0x18/0x20 [ 51.431550] ? trace_preempt_on+0x20/0xa0 [ 51.432075] ? __kthread_parkme+0x4f/0xd0 [ 51.432603] ? preempt_count_sub+0x50/0x80 [ 51.433880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.434640] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.435476] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.436137] kthread+0x19e/0x1e0 [ 51.436634] ? __pfx_kthread+0x10/0x10 [ 51.437500] ret_from_fork+0x41/0x70 [ 51.437936] ? __pfx_kthread+0x10/0x10 [ 51.438679] ret_from_fork_asm+0x1b/0x30 [ 51.439430] </TASK> [ 51.439795] [ 51.440100] Allocated by task 224: [ 51.440516] kasan_save_stack+0x3c/0x60 [ 51.441594] kasan_set_track+0x29/0x40 [ 51.442576] kasan_save_alloc_info+0x22/0x30 [ 51.443190] __kasan_kmalloc+0xb7/0xc0 [ 51.443529] kmalloc_trace+0x4c/0xb0 [ 51.444114] kasan_bitops_generic+0x8e/0x130 [ 51.444757] kunit_try_run_case+0x126/0x290 [ 51.445285] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.446330] kthread+0x19e/0x1e0 [ 51.447152] ret_from_fork+0x41/0x70 [ 51.447723] ret_from_fork_asm+0x1b/0x30 [ 51.448298] [ 51.448541] The buggy address belongs to the object at ffff888101a813e0 [ 51.448541] which belongs to the cache kmalloc-16 of size 16 [ 51.449680] The buggy address is located 8 bytes inside of [ 51.449680] allocated 9-byte region [ffff888101a813e0, ffff888101a813e9) [ 51.451321] [ 51.451530] The buggy address belongs to the physical page: [ 51.452443] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81 [ 51.453567] flags: 0x200000000000800(slab|node=0|zone=2) [ 51.454279] page_type: 0xffffffff() [ 51.454926] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 51.456112] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 51.456818] page dumped because: kasan: bad access detected [ 51.457292] [ 51.457561] Memory state around the buggy address: [ 51.458969] ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 51.459703] ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 51.460446] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc [ 51.461579] ^ [ 51.462631] ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.463439] ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.464060] ================================================================== [ 51.182862] ================================================================== [ 51.184452] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0 [ 51.185303] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224 [ 51.185638] [ 51.185895] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 51.187373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 51.188300] Call Trace: [ 51.188695] <TASK> [ 51.189422] dump_stack_lvl+0x4e/0x90 [ 51.189962] print_report+0xd2/0x660 [ 51.190401] ? __virt_addr_valid+0x156/0x1e0 [ 51.191281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.192110] kasan_report+0xff/0x140 [ 51.192919] ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0 [ 51.193987] ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0 [ 51.194960] kasan_check_range+0x10c/0x1c0 [ 51.195548] __kasan_check_write+0x18/0x20 [ 51.196258] kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0 [ 51.197446] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 51.198495] ? kasan_set_track+0x29/0x40 [ 51.199149] ? kasan_save_alloc_info+0x22/0x30 [ 51.199694] ? __kasan_kmalloc+0xb7/0xc0 [ 51.201031] kasan_bitops_generic+0xb4/0x130 [ 51.201784] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.202532] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.203182] ? kunit_try_run_case+0x11b/0x290 [ 51.203749] kunit_try_run_case+0x126/0x290 [ 51.205177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.205934] ? __kasan_check_write+0x18/0x20 [ 51.206665] ? trace_preempt_on+0x20/0xa0 [ 51.207397] ? __kthread_parkme+0x4f/0xd0 [ 51.208393] ? preempt_count_sub+0x50/0x80 [ 51.208908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.210008] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.210752] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.211505] kthread+0x19e/0x1e0 [ 51.212088] ? __pfx_kthread+0x10/0x10 [ 51.212657] ret_from_fork+0x41/0x70 [ 51.213540] ? __pfx_kthread+0x10/0x10 [ 51.213993] ret_from_fork_asm+0x1b/0x30 [ 51.214860] </TASK> [ 51.215282] [ 51.215609] Allocated by task 224: [ 51.216175] kasan_save_stack+0x3c/0x60 [ 51.216839] kasan_set_track+0x29/0x40 [ 51.217258] kasan_save_alloc_info+0x22/0x30 [ 51.218195] __kasan_kmalloc+0xb7/0xc0 [ 51.219297] kmalloc_trace+0x4c/0xb0 [ 51.220040] kasan_bitops_generic+0x8e/0x130 [ 51.220674] kunit_try_run_case+0x126/0x290 [ 51.221283] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.221884] kthread+0x19e/0x1e0 [ 51.222600] ret_from_fork+0x41/0x70 [ 51.223125] ret_from_fork_asm+0x1b/0x30 [ 51.223664] [ 51.223926] The buggy address belongs to the object at ffff888101a813e0 [ 51.223926] which belongs to the cache kmalloc-16 of size 16 [ 51.225423] The buggy address is located 8 bytes inside of [ 51.225423] allocated 9-byte region [ffff888101a813e0, ffff888101a813e9) [ 51.226603] [ 51.227328] The buggy address belongs to the physical page: [ 51.228297] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81 [ 51.229264] flags: 0x200000000000800(slab|node=0|zone=2) [ 51.229844] page_type: 0xffffffff() [ 51.230602] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 51.231622] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 51.232757] page dumped because: kasan: bad access detected [ 51.233513] [ 51.233941] Memory state around the buggy address: [ 51.234662] ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 51.235450] ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 51.236708] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc [ 51.237610] ^ [ 51.238370] ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.238960] ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.239346] ================================================================== [ 51.069489] ================================================================== [ 51.070127] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0 [ 51.071201] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224 [ 51.072769] [ 51.073108] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 51.073921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 51.074921] Call Trace: [ 51.075642] <TASK> [ 51.076331] dump_stack_lvl+0x4e/0x90 [ 51.077253] print_report+0xd2/0x660 [ 51.077704] ? __virt_addr_valid+0x156/0x1e0 [ 51.078272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.079298] kasan_report+0xff/0x140 [ 51.079683] ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0 [ 51.080825] ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0 [ 51.081527] kasan_check_range+0x10c/0x1c0 [ 51.082194] __kasan_check_write+0x18/0x20 [ 51.082791] kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0 [ 51.084156] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 51.085073] ? kasan_set_track+0x29/0x40 [ 51.085571] ? kasan_save_alloc_info+0x22/0x30 [ 51.086248] ? __kasan_kmalloc+0xb7/0xc0 [ 51.086817] kasan_bitops_generic+0xb4/0x130 [ 51.088054] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.088654] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.089291] ? kunit_try_run_case+0x11b/0x290 [ 51.089943] kunit_try_run_case+0x126/0x290 [ 51.090531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.091403] ? __kasan_check_write+0x18/0x20 [ 51.092566] ? trace_preempt_on+0x20/0xa0 [ 51.093140] ? __kthread_parkme+0x4f/0xd0 [ 51.093698] ? preempt_count_sub+0x50/0x80 [ 51.094311] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.095100] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.095672] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.096579] kthread+0x19e/0x1e0 [ 51.097192] ? __pfx_kthread+0x10/0x10 [ 51.097844] ret_from_fork+0x41/0x70 [ 51.098432] ? __pfx_kthread+0x10/0x10 [ 51.099012] ret_from_fork_asm+0x1b/0x30 [ 51.100232] </TASK> [ 51.100558] [ 51.100875] Allocated by task 224: [ 51.101246] kasan_save_stack+0x3c/0x60 [ 51.101650] kasan_set_track+0x29/0x40 [ 51.102201] kasan_save_alloc_info+0x22/0x30 [ 51.102651] __kasan_kmalloc+0xb7/0xc0 [ 51.104050] kmalloc_trace+0x4c/0xb0 [ 51.104639] kasan_bitops_generic+0x8e/0x130 [ 51.105289] kunit_try_run_case+0x126/0x290 [ 51.105870] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.106491] kthread+0x19e/0x1e0 [ 51.107032] ret_from_fork+0x41/0x70 [ 51.107512] ret_from_fork_asm+0x1b/0x30 [ 51.108682] [ 51.109026] The buggy address belongs to the object at ffff888101a813e0 [ 51.109026] which belongs to the cache kmalloc-16 of size 16 [ 51.110095] The buggy address is located 8 bytes inside of [ 51.110095] allocated 9-byte region [ffff888101a813e0, ffff888101a813e9) [ 51.111320] [ 51.111639] The buggy address belongs to the physical page: [ 51.112538] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81 [ 51.114183] flags: 0x200000000000800(slab|node=0|zone=2) [ 51.114834] page_type: 0xffffffff() [ 51.115375] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 51.116654] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 51.117465] page dumped because: kasan: bad access detected [ 51.118121] [ 51.118398] Memory state around the buggy address: [ 51.118996] ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 51.119681] ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 51.120444] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc [ 51.121573] ^ [ 51.122572] ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.123650] ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.124200] ================================================================== [ 51.352998] ================================================================== [ 51.353615] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0 [ 51.355134] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224 [ 51.356067] [ 51.356967] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 51.357767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 51.358554] Call Trace: [ 51.359016] <TASK> [ 51.359424] dump_stack_lvl+0x4e/0x90 [ 51.360045] print_report+0xd2/0x660 [ 51.360653] ? __virt_addr_valid+0x156/0x1e0 [ 51.361253] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.362073] kasan_report+0xff/0x140 [ 51.362622] ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0 [ 51.363434] ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0 [ 51.364157] kasan_check_range+0x10c/0x1c0 [ 51.364768] __kasan_check_write+0x18/0x20 [ 51.365385] kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0 [ 51.366410] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 51.367353] ? kasan_set_track+0x29/0x40 [ 51.368527] ? kasan_save_alloc_info+0x22/0x30 [ 51.369027] ? __kasan_kmalloc+0xb7/0xc0 [ 51.369667] kasan_bitops_generic+0xb4/0x130 [ 51.370399] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.371399] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.371888] ? kunit_try_run_case+0x11b/0x290 [ 51.372516] kunit_try_run_case+0x126/0x290 [ 51.373341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.374066] ? __kasan_check_write+0x18/0x20 [ 51.374875] ? trace_preempt_on+0x20/0xa0 [ 51.375438] ? __kthread_parkme+0x4f/0xd0 [ 51.376579] ? preempt_count_sub+0x50/0x80 [ 51.377032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.377488] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.378252] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.378972] kthread+0x19e/0x1e0 [ 51.379447] ? __pfx_kthread+0x10/0x10 [ 51.380056] ret_from_fork+0x41/0x70 [ 51.380504] ? __pfx_kthread+0x10/0x10 [ 51.381103] ret_from_fork_asm+0x1b/0x30 [ 51.381624] </TASK> [ 51.382722] [ 51.382980] Allocated by task 224: [ 51.383345] kasan_save_stack+0x3c/0x60 [ 51.383939] kasan_set_track+0x29/0x40 [ 51.384355] kasan_save_alloc_info+0x22/0x30 [ 51.385004] __kasan_kmalloc+0xb7/0xc0 [ 51.385412] kmalloc_trace+0x4c/0xb0 [ 51.386659] kasan_bitops_generic+0x8e/0x130 [ 51.387169] kunit_try_run_case+0x126/0x290 [ 51.387655] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.388386] kthread+0x19e/0x1e0 [ 51.389016] ret_from_fork+0x41/0x70 [ 51.390048] ret_from_fork_asm+0x1b/0x30 [ 51.390902] [ 51.391187] The buggy address belongs to the object at ffff888101a813e0 [ 51.391187] which belongs to the cache kmalloc-16 of size 16 [ 51.392253] The buggy address is located 8 bytes inside of [ 51.392253] allocated 9-byte region [ffff888101a813e0, ffff888101a813e9) [ 51.393528] [ 51.393893] The buggy address belongs to the physical page: [ 51.395286] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81 [ 51.396213] flags: 0x200000000000800(slab|node=0|zone=2) [ 51.396791] page_type: 0xffffffff() [ 51.397332] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 51.398182] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 51.399658] page dumped because: kasan: bad access detected [ 51.400205] [ 51.400455] Memory state around the buggy address: [ 51.401089] ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 51.401863] ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 51.402637] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc [ 51.403801] ^ [ 51.404842] ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.405625] ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.406467] ================================================================== [ 51.465683] ================================================================== [ 51.467257] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0 [ 51.468207] Read of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224 [ 51.469543] [ 51.469699] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 51.470816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 51.471942] Call Trace: [ 51.472780] <TASK> [ 51.473089] dump_stack_lvl+0x4e/0x90 [ 51.473561] print_report+0xd2/0x660 [ 51.474051] ? __virt_addr_valid+0x156/0x1e0 [ 51.474766] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.475587] kasan_report+0xff/0x140 [ 51.476693] ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0 [ 51.477459] ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0 [ 51.478315] kasan_check_range+0x10c/0x1c0 [ 51.478957] __kasan_check_read+0x15/0x20 [ 51.479513] kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0 [ 51.480694] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 51.481537] ? kasan_set_track+0x29/0x40 [ 51.482108] ? kasan_save_alloc_info+0x22/0x30 [ 51.482761] ? __kasan_kmalloc+0xb7/0xc0 [ 51.483347] kasan_bitops_generic+0xb4/0x130 [ 51.484365] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.485377] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.486186] ? kunit_try_run_case+0x11b/0x290 [ 51.486824] kunit_try_run_case+0x126/0x290 [ 51.487320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.488297] ? __kasan_check_write+0x18/0x20 [ 51.489022] ? trace_preempt_on+0x20/0xa0 [ 51.489546] ? __kthread_parkme+0x4f/0xd0 [ 51.490200] ? preempt_count_sub+0x50/0x80 [ 51.490902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.491579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.492324] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.493113] kthread+0x19e/0x1e0 [ 51.493586] ? __pfx_kthread+0x10/0x10 [ 51.494061] ret_from_fork+0x41/0x70 [ 51.494624] ? __pfx_kthread+0x10/0x10 [ 51.495258] ret_from_fork_asm+0x1b/0x30 [ 51.495949] </TASK> [ 51.496267] [ 51.496520] Allocated by task 224: [ 51.497024] kasan_save_stack+0x3c/0x60 [ 51.497403] kasan_set_track+0x29/0x40 [ 51.498014] kasan_save_alloc_info+0x22/0x30 [ 51.498659] __kasan_kmalloc+0xb7/0xc0 [ 51.499283] kmalloc_trace+0x4c/0xb0 [ 51.499913] kasan_bitops_generic+0x8e/0x130 [ 51.500486] kunit_try_run_case+0x126/0x290 [ 51.501051] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.501832] kthread+0x19e/0x1e0 [ 51.502394] ret_from_fork+0x41/0x70 [ 51.503007] ret_from_fork_asm+0x1b/0x30 [ 51.503611] [ 51.503943] The buggy address belongs to the object at ffff888101a813e0 [ 51.503943] which belongs to the cache kmalloc-16 of size 16 [ 51.505105] The buggy address is located 8 bytes inside of [ 51.505105] allocated 9-byte region [ffff888101a813e0, ffff888101a813e9) [ 51.506186] [ 51.506470] The buggy address belongs to the physical page: [ 51.507175] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81 [ 51.508351] flags: 0x200000000000800(slab|node=0|zone=2) [ 51.508951] page_type: 0xffffffff() [ 51.509458] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 51.510272] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 51.511143] page dumped because: kasan: bad access detected [ 51.511628] [ 51.511962] Memory state around the buggy address: [ 51.512568] ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 51.513872] ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 51.515197] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc [ 51.515904] ^ [ 51.516851] ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.517696] ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.518578] ================================================================== [ 51.125646] ================================================================== [ 51.126881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0 [ 51.128233] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224 [ 51.129400] [ 51.129626] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 51.130516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 51.131814] Call Trace: [ 51.132167] <TASK> [ 51.132480] dump_stack_lvl+0x4e/0x90 [ 51.133725] print_report+0xd2/0x660 [ 51.134295] ? __virt_addr_valid+0x156/0x1e0 [ 51.134936] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.135805] kasan_report+0xff/0x140 [ 51.136408] ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0 [ 51.137812] ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0 [ 51.138675] kasan_check_range+0x10c/0x1c0 [ 51.139364] __kasan_check_write+0x18/0x20 [ 51.140299] kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0 [ 51.141058] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 51.141756] ? kasan_set_track+0x29/0x40 [ 51.142882] ? kasan_save_alloc_info+0x22/0x30 [ 51.143580] ? __kasan_kmalloc+0xb7/0xc0 [ 51.144031] kasan_bitops_generic+0xb4/0x130 [ 51.144641] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.145233] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.146413] ? kunit_try_run_case+0x11b/0x290 [ 51.147153] kunit_try_run_case+0x126/0x290 [ 51.147721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.148301] ? __kasan_check_write+0x18/0x20 [ 51.149421] ? trace_preempt_on+0x20/0xa0 [ 51.149820] ? __kthread_parkme+0x4f/0xd0 [ 51.150960] ? preempt_count_sub+0x50/0x80 [ 51.151877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.152533] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.153228] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.154048] kthread+0x19e/0x1e0 [ 51.154675] ? __pfx_kthread+0x10/0x10 [ 51.155623] ret_from_fork+0x41/0x70 [ 51.156386] ? __pfx_kthread+0x10/0x10 [ 51.156988] ret_from_fork_asm+0x1b/0x30 [ 51.157771] </TASK> [ 51.158239] [ 51.158442] Allocated by task 224: [ 51.158800] kasan_save_stack+0x3c/0x60 [ 51.159644] kasan_set_track+0x29/0x40 [ 51.160077] kasan_save_alloc_info+0x22/0x30 [ 51.160539] __kasan_kmalloc+0xb7/0xc0 [ 51.161557] kmalloc_trace+0x4c/0xb0 [ 51.162821] kasan_bitops_generic+0x8e/0x130 [ 51.163091] kunit_try_run_case+0x126/0x290 [ 51.163342] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.163631] kthread+0x19e/0x1e0 [ 51.164146] ret_from_fork+0x41/0x70 [ 51.164846] ret_from_fork_asm+0x1b/0x30 [ 51.165513] [ 51.165947] The buggy address belongs to the object at ffff888101a813e0 [ 51.165947] which belongs to the cache kmalloc-16 of size 16 [ 51.167872] The buggy address is located 8 bytes inside of [ 51.167872] allocated 9-byte region [ffff888101a813e0, ffff888101a813e9) [ 51.169382] [ 51.170052] The buggy address belongs to the physical page: [ 51.170631] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81 [ 51.171400] flags: 0x200000000000800(slab|node=0|zone=2) [ 51.171974] page_type: 0xffffffff() [ 51.172509] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 51.173375] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 51.175057] page dumped because: kasan: bad access detected [ 51.175725] [ 51.176046] Memory state around the buggy address: [ 51.176833] ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 51.177832] ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 51.178541] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc [ 51.179468] ^ [ 51.180197] ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.180943] ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.181950] ================================================================== [ 51.520276] ================================================================== [ 51.521661] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0 [ 51.522995] Read of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224 [ 51.523887] [ 51.524192] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 51.525108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 51.526005] Call Trace: [ 51.526432] <TASK> [ 51.526795] dump_stack_lvl+0x4e/0x90 [ 51.527425] print_report+0xd2/0x660 [ 51.528078] ? __virt_addr_valid+0x156/0x1e0 [ 51.528653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.529440] kasan_report+0xff/0x140 [ 51.529986] ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0 [ 51.530880] ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0 [ 51.531538] __asan_load8+0x82/0xb0 [ 51.532149] kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0 [ 51.532901] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 51.533567] ? kasan_set_track+0x29/0x40 [ 51.534166] ? kasan_save_alloc_info+0x22/0x30 [ 51.534762] ? __kasan_kmalloc+0xb7/0xc0 [ 51.535381] kasan_bitops_generic+0xb4/0x130 [ 51.536006] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.536657] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.537302] ? kunit_try_run_case+0x11b/0x290 [ 51.537991] kunit_try_run_case+0x126/0x290 [ 51.538659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.539282] ? __kasan_check_write+0x18/0x20 [ 51.539893] ? trace_preempt_on+0x20/0xa0 [ 51.540447] ? __kthread_parkme+0x4f/0xd0 [ 51.541064] ? preempt_count_sub+0x50/0x80 [ 51.541667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.542270] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.543072] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.543866] kthread+0x19e/0x1e0 [ 51.544351] ? __pfx_kthread+0x10/0x10 [ 51.544972] ret_from_fork+0x41/0x70 [ 51.545519] ? __pfx_kthread+0x10/0x10 [ 51.546162] ret_from_fork_asm+0x1b/0x30 [ 51.546636] </TASK> [ 51.547551] [ 51.547940] Allocated by task 224: [ 51.548254] kasan_save_stack+0x3c/0x60 [ 51.548671] kasan_set_track+0x29/0x40 [ 51.549090] kasan_save_alloc_info+0x22/0x30 [ 51.549547] __kasan_kmalloc+0xb7/0xc0 [ 51.550571] kmalloc_trace+0x4c/0xb0 [ 51.551334] kasan_bitops_generic+0x8e/0x130 [ 51.552124] kunit_try_run_case+0x126/0x290 [ 51.552888] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.553744] kthread+0x19e/0x1e0 [ 51.554419] ret_from_fork+0x41/0x70 [ 51.555148] ret_from_fork_asm+0x1b/0x30 [ 51.555749] [ 51.556056] The buggy address belongs to the object at ffff888101a813e0 [ 51.556056] which belongs to the cache kmalloc-16 of size 16 [ 51.557216] The buggy address is located 8 bytes inside of [ 51.557216] allocated 9-byte region [ffff888101a813e0, ffff888101a813e9) [ 51.558160] [ 51.558512] The buggy address belongs to the physical page: [ 51.559240] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81 [ 51.560198] flags: 0x200000000000800(slab|node=0|zone=2) [ 51.560804] page_type: 0xffffffff() [ 51.561327] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 51.562132] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 51.563006] page dumped because: kasan: bad access detected [ 51.563511] [ 51.563815] Memory state around the buggy address: [ 51.564442] ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 51.565163] ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 51.565884] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc [ 51.566586] ^ [ 51.567382] ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.568133] ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.568915] ================================================================== [ 51.239964] ================================================================== [ 51.240620] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0 [ 51.242084] Write of size 8 at addr ffff888101a813e8 by task kunit_try_catch/224 [ 51.243039] [ 51.243380] CPU: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 51.244545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 51.246459] Call Trace: [ 51.247252] <TASK> [ 51.247585] dump_stack_lvl+0x4e/0x90 [ 51.248097] print_report+0xd2/0x660 [ 51.248653] ? __virt_addr_valid+0x156/0x1e0 [ 51.249980] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.250634] kasan_report+0xff/0x140 [ 51.251405] ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0 [ 51.252303] ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0 [ 51.253794] kasan_check_range+0x10c/0x1c0 [ 51.254325] __kasan_check_write+0x18/0x20 [ 51.254820] kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0 [ 51.255442] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 51.256187] ? kasan_set_track+0x29/0x40 [ 51.256500] ? kasan_save_alloc_info+0x22/0x30 [ 51.256949] ? __kasan_kmalloc+0xb7/0xc0 [ 51.257920] kasan_bitops_generic+0xb4/0x130 [ 51.258520] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.259557] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 51.260325] ? kunit_try_run_case+0x11b/0x290 [ 51.261129] kunit_try_run_case+0x126/0x290 [ 51.261868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.262439] ? __kasan_check_write+0x18/0x20 [ 51.263571] ? trace_preempt_on+0x20/0xa0 [ 51.264029] ? __kthread_parkme+0x4f/0xd0 [ 51.264809] ? preempt_count_sub+0x50/0x80 [ 51.265480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.266779] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.267696] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.268370] kthread+0x19e/0x1e0 [ 51.269110] ? __pfx_kthread+0x10/0x10 [ 51.269370] ret_from_fork+0x41/0x70 [ 51.269610] ? __pfx_kthread+0x10/0x10 [ 51.270057] ret_from_fork_asm+0x1b/0x30 [ 51.270687] </TASK> [ 51.271211] [ 51.271583] Allocated by task 224: [ 51.272109] kasan_save_stack+0x3c/0x60 [ 51.272642] kasan_set_track+0x29/0x40 [ 51.273432] kasan_save_alloc_info+0x22/0x30 [ 51.274159] __kasan_kmalloc+0xb7/0xc0 [ 51.274803] kmalloc_trace+0x4c/0xb0 [ 51.275404] kasan_bitops_generic+0x8e/0x130 [ 51.276655] kunit_try_run_case+0x126/0x290 [ 51.277376] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 51.278237] kthread+0x19e/0x1e0 [ 51.278618] ret_from_fork+0x41/0x70 [ 51.279171] ret_from_fork_asm+0x1b/0x30 [ 51.279919] [ 51.280307] The buggy address belongs to the object at ffff888101a813e0 [ 51.280307] which belongs to the cache kmalloc-16 of size 16 [ 51.282277] The buggy address is located 8 bytes inside of [ 51.282277] allocated 9-byte region [ffff888101a813e0, ffff888101a813e9) [ 51.283625] [ 51.284029] The buggy address belongs to the physical page: [ 51.284635] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a81 [ 51.286000] flags: 0x200000000000800(slab|node=0|zone=2) [ 51.286655] page_type: 0xffffffff() [ 51.287166] raw: 0200000000000800 ffff8881000413c0 dead000000000122 0000000000000000 [ 51.288164] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000 [ 51.288857] page dumped because: kasan: bad access detected [ 51.289473] [ 51.289706] Memory state around the buggy address: [ 51.290294] ffff888101a81280: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 51.291005] ffff888101a81300: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 51.291669] >ffff888101a81380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 01 fc fc [ 51.292449] ^ [ 51.294054] ffff888101a81400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.294990] ffff888101a81480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.295693] ==================================================================