Date
July 8, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.733090] ================================================================== [ 14.734028] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.734501] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279 [ 14.734789] [ 14.734873] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.734915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.734926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.734946] Call Trace: [ 14.734962] <TASK> [ 14.734977] dump_stack_lvl+0x73/0xb0 [ 14.735007] print_report+0xd1/0x650 [ 14.735030] ? __virt_addr_valid+0x1db/0x2d0 [ 14.735054] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.735084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.735108] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.735160] kasan_report+0x141/0x180 [ 14.735182] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.735217] kasan_check_range+0x10c/0x1c0 [ 14.735241] __kasan_check_write+0x18/0x20 [ 14.735260] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.735306] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.735350] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.735389] ? trace_hardirqs_on+0x37/0xe0 [ 14.735411] ? kasan_bitops_generic+0x92/0x1c0 [ 14.735439] kasan_bitops_generic+0x121/0x1c0 [ 14.735463] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.735487] ? trace_hardirqs_on+0x37/0xe0 [ 14.735519] ? __pfx_read_tsc+0x10/0x10 [ 14.735540] ? ktime_get_ts64+0x86/0x230 [ 14.735562] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.735589] kunit_try_run_case+0x1a5/0x480 [ 14.735625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.735651] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.735697] ? __kthread_parkme+0x82/0x180 [ 14.735717] ? preempt_count_sub+0x50/0x80 [ 14.735742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.735766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.735791] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.735817] kthread+0x337/0x6f0 [ 14.735898] ? trace_preempt_on+0x20/0xc0 [ 14.735921] ? __pfx_kthread+0x10/0x10 [ 14.735942] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.735964] ? calculate_sigpending+0x7b/0xa0 [ 14.735988] ? __pfx_kthread+0x10/0x10 [ 14.736010] ret_from_fork+0x116/0x1d0 [ 14.736066] ? __pfx_kthread+0x10/0x10 [ 14.736090] ret_from_fork_asm+0x1a/0x30 [ 14.736123] </TASK> [ 14.736133] [ 14.744471] Allocated by task 279: [ 14.744717] kasan_save_stack+0x45/0x70 [ 14.744910] kasan_save_track+0x18/0x40 [ 14.745104] kasan_save_alloc_info+0x3b/0x50 [ 14.745279] __kasan_kmalloc+0xb7/0xc0 [ 14.745468] __kmalloc_cache_noprof+0x189/0x420 [ 14.745725] kasan_bitops_generic+0x92/0x1c0 [ 14.745910] kunit_try_run_case+0x1a5/0x480 [ 14.746050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.746230] kthread+0x337/0x6f0 [ 14.746387] ret_from_fork+0x116/0x1d0 [ 14.746564] ret_from_fork_asm+0x1a/0x30 [ 14.746763] [ 14.746884] The buggy address belongs to the object at ffff8881026260e0 [ 14.746884] which belongs to the cache kmalloc-16 of size 16 [ 14.747359] The buggy address is located 8 bytes inside of [ 14.747359] allocated 9-byte region [ffff8881026260e0, ffff8881026260e9) [ 14.747827] [ 14.748013] The buggy address belongs to the physical page: [ 14.748289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626 [ 14.748659] flags: 0x200000000000000(node=0|zone=2) [ 14.748938] page_type: f5(slab) [ 14.749154] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.749527] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.750061] page dumped because: kasan: bad access detected [ 14.750306] [ 14.750393] Memory state around the buggy address: [ 14.750754] ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.750974] ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.751179] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.751380] ^ [ 14.751751] ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.752073] ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.752418] ================================================================== [ 14.860694] ================================================================== [ 14.861154] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.861661] Read of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279 [ 14.862003] [ 14.862108] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.862150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.862162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.862182] Call Trace: [ 14.862196] <TASK> [ 14.862214] dump_stack_lvl+0x73/0xb0 [ 14.862242] print_report+0xd1/0x650 [ 14.862265] ? __virt_addr_valid+0x1db/0x2d0 [ 14.862288] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.862329] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.862361] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.862390] kasan_report+0x141/0x180 [ 14.862412] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.862447] kasan_check_range+0x10c/0x1c0 [ 14.862471] __kasan_check_read+0x15/0x20 [ 14.862490] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.862529] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.862560] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.862584] ? trace_hardirqs_on+0x37/0xe0 [ 14.862617] ? kasan_bitops_generic+0x92/0x1c0 [ 14.862645] kasan_bitops_generic+0x121/0x1c0 [ 14.862669] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.862694] ? trace_hardirqs_on+0x37/0xe0 [ 14.862717] ? __pfx_read_tsc+0x10/0x10 [ 14.862738] ? ktime_get_ts64+0x86/0x230 [ 14.862761] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.862788] kunit_try_run_case+0x1a5/0x480 [ 14.862812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.862837] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.862863] ? __kthread_parkme+0x82/0x180 [ 14.862883] ? preempt_count_sub+0x50/0x80 [ 14.862907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.862931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.862956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.862981] kthread+0x337/0x6f0 [ 14.863000] ? trace_preempt_on+0x20/0xc0 [ 14.863022] ? __pfx_kthread+0x10/0x10 [ 14.863043] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.863064] ? calculate_sigpending+0x7b/0xa0 [ 14.863089] ? __pfx_kthread+0x10/0x10 [ 14.863112] ret_from_fork+0x116/0x1d0 [ 14.863130] ? __pfx_kthread+0x10/0x10 [ 14.863150] ret_from_fork_asm+0x1a/0x30 [ 14.863182] </TASK> [ 14.863192] [ 14.871048] Allocated by task 279: [ 14.871222] kasan_save_stack+0x45/0x70 [ 14.871416] kasan_save_track+0x18/0x40 [ 14.871611] kasan_save_alloc_info+0x3b/0x50 [ 14.871821] __kasan_kmalloc+0xb7/0xc0 [ 14.872005] __kmalloc_cache_noprof+0x189/0x420 [ 14.872222] kasan_bitops_generic+0x92/0x1c0 [ 14.872430] kunit_try_run_case+0x1a5/0x480 [ 14.872786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.872962] kthread+0x337/0x6f0 [ 14.873081] ret_from_fork+0x116/0x1d0 [ 14.873211] ret_from_fork_asm+0x1a/0x30 [ 14.873366] [ 14.873461] The buggy address belongs to the object at ffff8881026260e0 [ 14.873461] which belongs to the cache kmalloc-16 of size 16 [ 14.874508] The buggy address is located 8 bytes inside of [ 14.874508] allocated 9-byte region [ffff8881026260e0, ffff8881026260e9) [ 14.874994] [ 14.875083] The buggy address belongs to the physical page: [ 14.875302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626 [ 14.876315] flags: 0x200000000000000(node=0|zone=2) [ 14.876750] page_type: f5(slab) [ 14.876895] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.877126] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.877388] page dumped because: kasan: bad access detected [ 14.877827] [ 14.877923] Memory state around the buggy address: [ 14.878145] ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.878425] ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.878853] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.879063] ^ [ 14.879256] ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.879820] ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.880061] ================================================================== [ 14.842409] ================================================================== [ 14.842712] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.843143] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279 [ 14.843591] [ 14.843691] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.843734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.843746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.843766] Call Trace: [ 14.843782] <TASK> [ 14.843797] dump_stack_lvl+0x73/0xb0 [ 14.843826] print_report+0xd1/0x650 [ 14.843851] ? __virt_addr_valid+0x1db/0x2d0 [ 14.843888] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.843918] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.843942] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.843972] kasan_report+0x141/0x180 [ 14.843995] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.844029] kasan_check_range+0x10c/0x1c0 [ 14.844053] __kasan_check_write+0x18/0x20 [ 14.844072] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.844101] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.844132] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.844157] ? trace_hardirqs_on+0x37/0xe0 [ 14.844180] ? kasan_bitops_generic+0x92/0x1c0 [ 14.844208] kasan_bitops_generic+0x121/0x1c0 [ 14.844232] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.844256] ? trace_hardirqs_on+0x37/0xe0 [ 14.844277] ? __pfx_read_tsc+0x10/0x10 [ 14.844298] ? ktime_get_ts64+0x86/0x230 [ 14.844320] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.844347] kunit_try_run_case+0x1a5/0x480 [ 14.844372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844396] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.844422] ? __kthread_parkme+0x82/0x180 [ 14.844442] ? preempt_count_sub+0x50/0x80 [ 14.844467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.844516] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.844550] kthread+0x337/0x6f0 [ 14.844568] ? trace_preempt_on+0x20/0xc0 [ 14.844590] ? __pfx_kthread+0x10/0x10 [ 14.844621] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.844642] ? calculate_sigpending+0x7b/0xa0 [ 14.844666] ? __pfx_kthread+0x10/0x10 [ 14.844687] ret_from_fork+0x116/0x1d0 [ 14.844706] ? __pfx_kthread+0x10/0x10 [ 14.844726] ret_from_fork_asm+0x1a/0x30 [ 14.844758] </TASK> [ 14.844768] [ 14.852942] Allocated by task 279: [ 14.853072] kasan_save_stack+0x45/0x70 [ 14.853214] kasan_save_track+0x18/0x40 [ 14.853406] kasan_save_alloc_info+0x3b/0x50 [ 14.853690] __kasan_kmalloc+0xb7/0xc0 [ 14.854039] __kmalloc_cache_noprof+0x189/0x420 [ 14.854197] kasan_bitops_generic+0x92/0x1c0 [ 14.854345] kunit_try_run_case+0x1a5/0x480 [ 14.854571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.854838] kthread+0x337/0x6f0 [ 14.855010] ret_from_fork+0x116/0x1d0 [ 14.855202] ret_from_fork_asm+0x1a/0x30 [ 14.855398] [ 14.855481] The buggy address belongs to the object at ffff8881026260e0 [ 14.855481] which belongs to the cache kmalloc-16 of size 16 [ 14.855924] The buggy address is located 8 bytes inside of [ 14.855924] allocated 9-byte region [ffff8881026260e0, ffff8881026260e9) [ 14.856452] [ 14.856543] The buggy address belongs to the physical page: [ 14.856749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626 [ 14.857096] flags: 0x200000000000000(node=0|zone=2) [ 14.857301] page_type: f5(slab) [ 14.857461] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.857778] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.858120] page dumped because: kasan: bad access detected [ 14.858296] [ 14.858370] Memory state around the buggy address: [ 14.858525] ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.858751] ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.859024] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.859347] ^ [ 14.859816] ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.860051] ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.860262] ================================================================== [ 14.772204] ================================================================== [ 14.772537] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.772965] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279 [ 14.773283] [ 14.773388] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.773430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.773441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.773460] Call Trace: [ 14.773475] <TASK> [ 14.773489] dump_stack_lvl+0x73/0xb0 [ 14.773517] print_report+0xd1/0x650 [ 14.773539] ? __virt_addr_valid+0x1db/0x2d0 [ 14.773562] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.773592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.773626] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.773655] kasan_report+0x141/0x180 [ 14.773676] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.773714] kasan_check_range+0x10c/0x1c0 [ 14.773738] __kasan_check_write+0x18/0x20 [ 14.773757] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.773787] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.773845] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.773869] ? trace_hardirqs_on+0x37/0xe0 [ 14.773910] ? kasan_bitops_generic+0x92/0x1c0 [ 14.773938] kasan_bitops_generic+0x121/0x1c0 [ 14.773962] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.773985] ? trace_hardirqs_on+0x37/0xe0 [ 14.774007] ? __pfx_read_tsc+0x10/0x10 [ 14.774028] ? ktime_get_ts64+0x86/0x230 [ 14.774051] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.774077] kunit_try_run_case+0x1a5/0x480 [ 14.774101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.774126] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.774151] ? __kthread_parkme+0x82/0x180 [ 14.774171] ? preempt_count_sub+0x50/0x80 [ 14.774196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.774238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.774262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.774288] kthread+0x337/0x6f0 [ 14.774306] ? trace_preempt_on+0x20/0xc0 [ 14.774328] ? __pfx_kthread+0x10/0x10 [ 14.774350] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.774373] ? calculate_sigpending+0x7b/0xa0 [ 14.774397] ? __pfx_kthread+0x10/0x10 [ 14.774438] ret_from_fork+0x116/0x1d0 [ 14.774456] ? __pfx_kthread+0x10/0x10 [ 14.774477] ret_from_fork_asm+0x1a/0x30 [ 14.774509] </TASK> [ 14.774518] [ 14.783026] Allocated by task 279: [ 14.783267] kasan_save_stack+0x45/0x70 [ 14.783483] kasan_save_track+0x18/0x40 [ 14.783692] kasan_save_alloc_info+0x3b/0x50 [ 14.784118] __kasan_kmalloc+0xb7/0xc0 [ 14.784302] __kmalloc_cache_noprof+0x189/0x420 [ 14.784521] kasan_bitops_generic+0x92/0x1c0 [ 14.784738] kunit_try_run_case+0x1a5/0x480 [ 14.784942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.785188] kthread+0x337/0x6f0 [ 14.785351] ret_from_fork+0x116/0x1d0 [ 14.785556] ret_from_fork_asm+0x1a/0x30 [ 14.785761] [ 14.785857] The buggy address belongs to the object at ffff8881026260e0 [ 14.785857] which belongs to the cache kmalloc-16 of size 16 [ 14.786339] The buggy address is located 8 bytes inside of [ 14.786339] allocated 9-byte region [ffff8881026260e0, ffff8881026260e9) [ 14.786944] [ 14.787015] The buggy address belongs to the physical page: [ 14.787201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626 [ 14.787614] flags: 0x200000000000000(node=0|zone=2) [ 14.787843] page_type: f5(slab) [ 14.788007] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.788323] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.788659] page dumped because: kasan: bad access detected [ 14.788926] [ 14.788999] Memory state around the buggy address: [ 14.789215] ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.789507] ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.789797] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.790095] ^ [ 14.790362] ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.790673] ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.790969] ================================================================== [ 14.753428] ================================================================== [ 14.753803] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.754070] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279 [ 14.754352] [ 14.754484] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.754527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.754539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.754559] Call Trace: [ 14.754575] <TASK> [ 14.754590] dump_stack_lvl+0x73/0xb0 [ 14.754630] print_report+0xd1/0x650 [ 14.754652] ? __virt_addr_valid+0x1db/0x2d0 [ 14.754674] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.754703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.754725] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.754755] kasan_report+0x141/0x180 [ 14.754797] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.754831] kasan_check_range+0x10c/0x1c0 [ 14.754854] __kasan_check_write+0x18/0x20 [ 14.754874] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.754902] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.754933] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.754974] ? trace_hardirqs_on+0x37/0xe0 [ 14.754996] ? kasan_bitops_generic+0x92/0x1c0 [ 14.755024] kasan_bitops_generic+0x121/0x1c0 [ 14.755048] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.755071] ? trace_hardirqs_on+0x37/0xe0 [ 14.755093] ? __pfx_read_tsc+0x10/0x10 [ 14.755130] ? ktime_get_ts64+0x86/0x230 [ 14.755152] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.755179] kunit_try_run_case+0x1a5/0x480 [ 14.755203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.755228] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.755253] ? __kthread_parkme+0x82/0x180 [ 14.755273] ? preempt_count_sub+0x50/0x80 [ 14.755316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.755341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.755378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.755417] kthread+0x337/0x6f0 [ 14.755449] ? trace_preempt_on+0x20/0xc0 [ 14.755484] ? __pfx_kthread+0x10/0x10 [ 14.755518] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.755552] ? calculate_sigpending+0x7b/0xa0 [ 14.755589] ? __pfx_kthread+0x10/0x10 [ 14.755634] ret_from_fork+0x116/0x1d0 [ 14.755666] ? __pfx_kthread+0x10/0x10 [ 14.755686] ret_from_fork_asm+0x1a/0x30 [ 14.755718] </TASK> [ 14.755729] [ 14.763769] Allocated by task 279: [ 14.763893] kasan_save_stack+0x45/0x70 [ 14.764031] kasan_save_track+0x18/0x40 [ 14.764161] kasan_save_alloc_info+0x3b/0x50 [ 14.764305] __kasan_kmalloc+0xb7/0xc0 [ 14.764433] __kmalloc_cache_noprof+0x189/0x420 [ 14.764664] kasan_bitops_generic+0x92/0x1c0 [ 14.764898] kunit_try_run_case+0x1a5/0x480 [ 14.765145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.765394] kthread+0x337/0x6f0 [ 14.765641] ret_from_fork+0x116/0x1d0 [ 14.765849] ret_from_fork_asm+0x1a/0x30 [ 14.766060] [ 14.766154] The buggy address belongs to the object at ffff8881026260e0 [ 14.766154] which belongs to the cache kmalloc-16 of size 16 [ 14.766680] The buggy address is located 8 bytes inside of [ 14.766680] allocated 9-byte region [ffff8881026260e0, ffff8881026260e9) [ 14.767092] [ 14.767181] The buggy address belongs to the physical page: [ 14.767442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626 [ 14.767835] flags: 0x200000000000000(node=0|zone=2) [ 14.768063] page_type: f5(slab) [ 14.768233] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.768559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.768869] page dumped because: kasan: bad access detected [ 14.769105] [ 14.769186] Memory state around the buggy address: [ 14.769399] ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.769722] ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.770044] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.770313] ^ [ 14.770657] ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.770959] ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.771286] ================================================================== [ 14.813709] ================================================================== [ 14.814490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.815304] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279 [ 14.815782] [ 14.815875] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.815921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.815933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.815954] Call Trace: [ 14.815972] <TASK> [ 14.815988] dump_stack_lvl+0x73/0xb0 [ 14.816019] print_report+0xd1/0x650 [ 14.816042] ? __virt_addr_valid+0x1db/0x2d0 [ 14.816066] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.816095] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.816118] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.816147] kasan_report+0x141/0x180 [ 14.816169] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.816203] kasan_check_range+0x10c/0x1c0 [ 14.816227] __kasan_check_write+0x18/0x20 [ 14.816247] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.816276] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.816306] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.816331] ? trace_hardirqs_on+0x37/0xe0 [ 14.816354] ? kasan_bitops_generic+0x92/0x1c0 [ 14.816382] kasan_bitops_generic+0x121/0x1c0 [ 14.816406] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.816429] ? trace_hardirqs_on+0x37/0xe0 [ 14.816451] ? __pfx_read_tsc+0x10/0x10 [ 14.816472] ? ktime_get_ts64+0x86/0x230 [ 14.816494] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.816554] kunit_try_run_case+0x1a5/0x480 [ 14.816579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.816636] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.816663] ? __kthread_parkme+0x82/0x180 [ 14.816684] ? preempt_count_sub+0x50/0x80 [ 14.816708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.816733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.816758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.816783] kthread+0x337/0x6f0 [ 14.816802] ? trace_preempt_on+0x20/0xc0 [ 14.816824] ? __pfx_kthread+0x10/0x10 [ 14.816845] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.816898] ? calculate_sigpending+0x7b/0xa0 [ 14.816923] ? __pfx_kthread+0x10/0x10 [ 14.816955] ret_from_fork+0x116/0x1d0 [ 14.816973] ? __pfx_kthread+0x10/0x10 [ 14.816993] ret_from_fork_asm+0x1a/0x30 [ 14.817026] </TASK> [ 14.817036] [ 14.831110] Allocated by task 279: [ 14.831623] kasan_save_stack+0x45/0x70 [ 14.832172] kasan_save_track+0x18/0x40 [ 14.832720] kasan_save_alloc_info+0x3b/0x50 [ 14.833152] __kasan_kmalloc+0xb7/0xc0 [ 14.833423] __kmalloc_cache_noprof+0x189/0x420 [ 14.833910] kasan_bitops_generic+0x92/0x1c0 [ 14.834427] kunit_try_run_case+0x1a5/0x480 [ 14.834889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.835110] kthread+0x337/0x6f0 [ 14.835642] ret_from_fork+0x116/0x1d0 [ 14.836096] ret_from_fork_asm+0x1a/0x30 [ 14.836241] [ 14.836313] The buggy address belongs to the object at ffff8881026260e0 [ 14.836313] which belongs to the cache kmalloc-16 of size 16 [ 14.836733] The buggy address is located 8 bytes inside of [ 14.836733] allocated 9-byte region [ffff8881026260e0, ffff8881026260e9) [ 14.837364] [ 14.837467] The buggy address belongs to the physical page: [ 14.838046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626 [ 14.838428] flags: 0x200000000000000(node=0|zone=2) [ 14.838666] page_type: f5(slab) [ 14.838880] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.839162] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.839468] page dumped because: kasan: bad access detected [ 14.839715] [ 14.839810] Memory state around the buggy address: [ 14.839979] ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.840278] ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.840558] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.840877] ^ [ 14.841112] ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.841406] ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.841662] ================================================================== [ 14.880513] ================================================================== [ 14.880875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.881254] Read of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279 [ 14.881541] [ 14.881662] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.881708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.881719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.881739] Call Trace: [ 14.881751] <TASK> [ 14.881767] dump_stack_lvl+0x73/0xb0 [ 14.881796] print_report+0xd1/0x650 [ 14.881819] ? __virt_addr_valid+0x1db/0x2d0 [ 14.881841] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.881870] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.881893] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.881923] kasan_report+0x141/0x180 [ 14.881945] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.881979] __asan_report_load8_noabort+0x18/0x20 [ 14.882005] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.882034] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.882065] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.882090] ? trace_hardirqs_on+0x37/0xe0 [ 14.882112] ? kasan_bitops_generic+0x92/0x1c0 [ 14.882140] kasan_bitops_generic+0x121/0x1c0 [ 14.882164] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.882188] ? trace_hardirqs_on+0x37/0xe0 [ 14.882210] ? __pfx_read_tsc+0x10/0x10 [ 14.882231] ? ktime_get_ts64+0x86/0x230 [ 14.882253] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.882280] kunit_try_run_case+0x1a5/0x480 [ 14.882304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.882329] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.882354] ? __kthread_parkme+0x82/0x180 [ 14.882375] ? preempt_count_sub+0x50/0x80 [ 14.882398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.882423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.882448] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.882473] kthread+0x337/0x6f0 [ 14.882492] ? trace_preempt_on+0x20/0xc0 [ 14.882515] ? __pfx_kthread+0x10/0x10 [ 14.882535] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.882557] ? calculate_sigpending+0x7b/0xa0 [ 14.882582] ? __pfx_kthread+0x10/0x10 [ 14.882612] ret_from_fork+0x116/0x1d0 [ 14.882631] ? __pfx_kthread+0x10/0x10 [ 14.882651] ret_from_fork_asm+0x1a/0x30 [ 14.882683] </TASK> [ 14.882703] [ 14.890702] Allocated by task 279: [ 14.890836] kasan_save_stack+0x45/0x70 [ 14.891034] kasan_save_track+0x18/0x40 [ 14.891239] kasan_save_alloc_info+0x3b/0x50 [ 14.891456] __kasan_kmalloc+0xb7/0xc0 [ 14.891659] __kmalloc_cache_noprof+0x189/0x420 [ 14.891891] kasan_bitops_generic+0x92/0x1c0 [ 14.892108] kunit_try_run_case+0x1a5/0x480 [ 14.892316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.892573] kthread+0x337/0x6f0 [ 14.892700] ret_from_fork+0x116/0x1d0 [ 14.892831] ret_from_fork_asm+0x1a/0x30 [ 14.892968] [ 14.893059] The buggy address belongs to the object at ffff8881026260e0 [ 14.893059] which belongs to the cache kmalloc-16 of size 16 [ 14.893654] The buggy address is located 8 bytes inside of [ 14.893654] allocated 9-byte region [ffff8881026260e0, ffff8881026260e9) [ 14.894157] [ 14.894248] The buggy address belongs to the physical page: [ 14.894419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626 [ 14.894845] flags: 0x200000000000000(node=0|zone=2) [ 14.895075] page_type: f5(slab) [ 14.895188] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.895405] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.896057] page dumped because: kasan: bad access detected [ 14.896239] [ 14.896306] Memory state around the buggy address: [ 14.896457] ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.897051] ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.897327] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.897673] ^ [ 14.897939] ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.898243] ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.899551] ================================================================== [ 14.791656] ================================================================== [ 14.792171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.792522] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279 [ 14.792815] [ 14.792904] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.792949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.792960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.792983] Call Trace: [ 14.793001] <TASK> [ 14.793019] dump_stack_lvl+0x73/0xb0 [ 14.793049] print_report+0xd1/0x650 [ 14.793071] ? __virt_addr_valid+0x1db/0x2d0 [ 14.793095] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.793124] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.793147] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.793176] kasan_report+0x141/0x180 [ 14.793197] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.793231] kasan_check_range+0x10c/0x1c0 [ 14.793255] __kasan_check_write+0x18/0x20 [ 14.793274] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.793303] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.793334] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.793358] ? trace_hardirqs_on+0x37/0xe0 [ 14.793381] ? kasan_bitops_generic+0x92/0x1c0 [ 14.793409] kasan_bitops_generic+0x121/0x1c0 [ 14.793432] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.793456] ? trace_hardirqs_on+0x37/0xe0 [ 14.793478] ? __pfx_read_tsc+0x10/0x10 [ 14.793499] ? ktime_get_ts64+0x86/0x230 [ 14.793522] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.793549] kunit_try_run_case+0x1a5/0x480 [ 14.793573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.793608] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.793635] ? __kthread_parkme+0x82/0x180 [ 14.793655] ? preempt_count_sub+0x50/0x80 [ 14.793680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.793709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.793733] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.793759] kthread+0x337/0x6f0 [ 14.793778] ? trace_preempt_on+0x20/0xc0 [ 14.793801] ? __pfx_kthread+0x10/0x10 [ 14.793821] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.793842] ? calculate_sigpending+0x7b/0xa0 [ 14.793867] ? __pfx_kthread+0x10/0x10 [ 14.793888] ret_from_fork+0x116/0x1d0 [ 14.793906] ? __pfx_kthread+0x10/0x10 [ 14.793927] ret_from_fork_asm+0x1a/0x30 [ 14.793959] </TASK> [ 14.793970] [ 14.802052] Allocated by task 279: [ 14.802237] kasan_save_stack+0x45/0x70 [ 14.802437] kasan_save_track+0x18/0x40 [ 14.802802] kasan_save_alloc_info+0x3b/0x50 [ 14.803012] __kasan_kmalloc+0xb7/0xc0 [ 14.803197] __kmalloc_cache_noprof+0x189/0x420 [ 14.803418] kasan_bitops_generic+0x92/0x1c0 [ 14.803729] kunit_try_run_case+0x1a5/0x480 [ 14.803891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.804067] kthread+0x337/0x6f0 [ 14.804186] ret_from_fork+0x116/0x1d0 [ 14.804322] ret_from_fork_asm+0x1a/0x30 [ 14.804464] [ 14.805545] The buggy address belongs to the object at ffff8881026260e0 [ 14.805545] which belongs to the cache kmalloc-16 of size 16 [ 14.806120] The buggy address is located 8 bytes inside of [ 14.806120] allocated 9-byte region [ffff8881026260e0, ffff8881026260e9) [ 14.807082] [ 14.807188] The buggy address belongs to the physical page: [ 14.807865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626 [ 14.808475] flags: 0x200000000000000(node=0|zone=2) [ 14.808856] page_type: f5(slab) [ 14.809230] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.809766] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.810169] page dumped because: kasan: bad access detected [ 14.810401] [ 14.810493] Memory state around the buggy address: [ 14.810962] ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.811450] ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.811778] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.812077] ^ [ 14.812353] ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.812875] ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.813110] ================================================================== [ 14.712084] ================================================================== [ 14.712943] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.713801] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279 [ 14.714172] [ 14.714309] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.714355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.714366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.714387] Call Trace: [ 14.714405] <TASK> [ 14.714444] dump_stack_lvl+0x73/0xb0 [ 14.714475] print_report+0xd1/0x650 [ 14.714498] ? __virt_addr_valid+0x1db/0x2d0 [ 14.714522] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.714551] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.714585] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.714625] kasan_report+0x141/0x180 [ 14.714664] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.714699] kasan_check_range+0x10c/0x1c0 [ 14.714722] __kasan_check_write+0x18/0x20 [ 14.714742] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.714770] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.714800] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.714826] ? trace_hardirqs_on+0x37/0xe0 [ 14.714848] ? kasan_bitops_generic+0x92/0x1c0 [ 14.714877] kasan_bitops_generic+0x121/0x1c0 [ 14.714901] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.714925] ? trace_hardirqs_on+0x37/0xe0 [ 14.714946] ? __pfx_read_tsc+0x10/0x10 [ 14.714966] ? ktime_get_ts64+0x86/0x230 [ 14.714988] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.715016] kunit_try_run_case+0x1a5/0x480 [ 14.715041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.715066] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.715091] ? __kthread_parkme+0x82/0x180 [ 14.715112] ? preempt_count_sub+0x50/0x80 [ 14.715136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.715161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.715186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.715210] kthread+0x337/0x6f0 [ 14.715229] ? trace_preempt_on+0x20/0xc0 [ 14.715251] ? __pfx_kthread+0x10/0x10 [ 14.715272] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.715293] ? calculate_sigpending+0x7b/0xa0 [ 14.715318] ? __pfx_kthread+0x10/0x10 [ 14.715338] ret_from_fork+0x116/0x1d0 [ 14.715356] ? __pfx_kthread+0x10/0x10 [ 14.715376] ret_from_fork_asm+0x1a/0x30 [ 14.715408] </TASK> [ 14.715418] [ 14.724317] Allocated by task 279: [ 14.724497] kasan_save_stack+0x45/0x70 [ 14.724702] kasan_save_track+0x18/0x40 [ 14.724892] kasan_save_alloc_info+0x3b/0x50 [ 14.725125] __kasan_kmalloc+0xb7/0xc0 [ 14.725269] __kmalloc_cache_noprof+0x189/0x420 [ 14.725420] kasan_bitops_generic+0x92/0x1c0 [ 14.725562] kunit_try_run_case+0x1a5/0x480 [ 14.725716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.725980] kthread+0x337/0x6f0 [ 14.726150] ret_from_fork+0x116/0x1d0 [ 14.726358] ret_from_fork_asm+0x1a/0x30 [ 14.726680] [ 14.726804] The buggy address belongs to the object at ffff8881026260e0 [ 14.726804] which belongs to the cache kmalloc-16 of size 16 [ 14.727396] The buggy address is located 8 bytes inside of [ 14.727396] allocated 9-byte region [ffff8881026260e0, ffff8881026260e9) [ 14.727962] [ 14.728055] The buggy address belongs to the physical page: [ 14.728296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626 [ 14.728818] flags: 0x200000000000000(node=0|zone=2) [ 14.729050] page_type: f5(slab) [ 14.729190] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.729486] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.729847] page dumped because: kasan: bad access detected [ 14.730042] [ 14.730108] Memory state around the buggy address: [ 14.730255] ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.730459] ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.730673] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.731019] ^ [ 14.731333] ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.731708] ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.732041] ==================================================================