Date
July 17, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.635924] ================================================================== [ 14.636290] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.636674] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.636920] [ 14.637005] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.637047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.637068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.637089] Call Trace: [ 14.637106] <TASK> [ 14.637121] dump_stack_lvl+0x73/0xb0 [ 14.637148] print_report+0xd1/0x610 [ 14.637170] ? __virt_addr_valid+0x1db/0x2d0 [ 14.637192] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.637219] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.637242] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.637271] kasan_report+0x141/0x180 [ 14.637292] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.637326] kasan_check_range+0x10c/0x1c0 [ 14.637349] __kasan_check_write+0x18/0x20 [ 14.637368] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.637396] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.637425] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.637448] ? trace_hardirqs_on+0x37/0xe0 [ 14.637470] ? kasan_bitops_generic+0x92/0x1c0 [ 14.637498] kasan_bitops_generic+0x121/0x1c0 [ 14.637521] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.637545] ? __pfx_read_tsc+0x10/0x10 [ 14.637566] ? ktime_get_ts64+0x86/0x230 [ 14.637610] kunit_try_run_case+0x1a5/0x480 [ 14.637635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.637656] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.637680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.637703] ? __kthread_parkme+0x82/0x180 [ 14.637723] ? preempt_count_sub+0x50/0x80 [ 14.637749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.637773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.637797] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.637820] kthread+0x337/0x6f0 [ 14.637839] ? trace_preempt_on+0x20/0xc0 [ 14.637861] ? __pfx_kthread+0x10/0x10 [ 14.637881] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.637902] ? calculate_sigpending+0x7b/0xa0 [ 14.637926] ? __pfx_kthread+0x10/0x10 [ 14.637948] ret_from_fork+0x116/0x1d0 [ 14.637966] ? __pfx_kthread+0x10/0x10 [ 14.637986] ret_from_fork_asm+0x1a/0x30 [ 14.638019] </TASK> [ 14.638029] [ 14.646136] Allocated by task 278: [ 14.646286] kasan_save_stack+0x45/0x70 [ 14.646469] kasan_save_track+0x18/0x40 [ 14.646631] kasan_save_alloc_info+0x3b/0x50 [ 14.646782] __kasan_kmalloc+0xb7/0xc0 [ 14.646912] __kmalloc_cache_noprof+0x189/0x420 [ 14.647145] kasan_bitops_generic+0x92/0x1c0 [ 14.647362] kunit_try_run_case+0x1a5/0x480 [ 14.647595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.647866] kthread+0x337/0x6f0 [ 14.648043] ret_from_fork+0x116/0x1d0 [ 14.648192] ret_from_fork_asm+0x1a/0x30 [ 14.648393] [ 14.648481] The buggy address belongs to the object at ffff8881025ee360 [ 14.648481] which belongs to the cache kmalloc-16 of size 16 [ 14.648982] The buggy address is located 8 bytes inside of [ 14.648982] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.649459] [ 14.649556] The buggy address belongs to the physical page: [ 14.649799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.650134] flags: 0x200000000000000(node=0|zone=2) [ 14.650357] page_type: f5(slab) [ 14.650511] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.650838] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.651136] page dumped because: kasan: bad access detected [ 14.651309] [ 14.651377] Memory state around the buggy address: [ 14.651534] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.651774] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.652035] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.652352] ^ [ 14.652665] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.652983] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.653307] ================================================================== [ 14.580241] ================================================================== [ 14.580602] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.581136] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.581424] [ 14.581508] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.581551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.581562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.581583] Call Trace: [ 14.581598] <TASK> [ 14.581613] dump_stack_lvl+0x73/0xb0 [ 14.581641] print_report+0xd1/0x610 [ 14.581663] ? __virt_addr_valid+0x1db/0x2d0 [ 14.581685] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.581714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.581737] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.581765] kasan_report+0x141/0x180 [ 14.581788] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.581821] kasan_check_range+0x10c/0x1c0 [ 14.581845] __kasan_check_write+0x18/0x20 [ 14.581863] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.581891] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.581922] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.581945] ? trace_hardirqs_on+0x37/0xe0 [ 14.581967] ? kasan_bitops_generic+0x92/0x1c0 [ 14.581995] kasan_bitops_generic+0x121/0x1c0 [ 14.582019] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.582068] ? __pfx_read_tsc+0x10/0x10 [ 14.582088] ? ktime_get_ts64+0x86/0x230 [ 14.582113] kunit_try_run_case+0x1a5/0x480 [ 14.582138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.582160] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.582184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.582213] ? __kthread_parkme+0x82/0x180 [ 14.582232] ? preempt_count_sub+0x50/0x80 [ 14.582256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.582280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.582303] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.582328] kthread+0x337/0x6f0 [ 14.582347] ? trace_preempt_on+0x20/0xc0 [ 14.582369] ? __pfx_kthread+0x10/0x10 [ 14.582389] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.582410] ? calculate_sigpending+0x7b/0xa0 [ 14.582434] ? __pfx_kthread+0x10/0x10 [ 14.582455] ret_from_fork+0x116/0x1d0 [ 14.582473] ? __pfx_kthread+0x10/0x10 [ 14.582493] ret_from_fork_asm+0x1a/0x30 [ 14.582526] </TASK> [ 14.582537] [ 14.591082] Allocated by task 278: [ 14.591225] kasan_save_stack+0x45/0x70 [ 14.591370] kasan_save_track+0x18/0x40 [ 14.591528] kasan_save_alloc_info+0x3b/0x50 [ 14.591936] __kasan_kmalloc+0xb7/0xc0 [ 14.592124] __kmalloc_cache_noprof+0x189/0x420 [ 14.592320] kasan_bitops_generic+0x92/0x1c0 [ 14.592471] kunit_try_run_case+0x1a5/0x480 [ 14.592646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.592916] kthread+0x337/0x6f0 [ 14.593093] ret_from_fork+0x116/0x1d0 [ 14.593227] ret_from_fork_asm+0x1a/0x30 [ 14.593368] [ 14.593452] The buggy address belongs to the object at ffff8881025ee360 [ 14.593452] which belongs to the cache kmalloc-16 of size 16 [ 14.594253] The buggy address is located 8 bytes inside of [ 14.594253] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.594655] [ 14.594751] The buggy address belongs to the physical page: [ 14.595005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.595362] flags: 0x200000000000000(node=0|zone=2) [ 14.595578] page_type: f5(slab) [ 14.595751] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.596088] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.596377] page dumped because: kasan: bad access detected [ 14.596580] [ 14.596648] Memory state around the buggy address: [ 14.596804] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.597025] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.597347] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.597662] ^ [ 14.597958] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.598270] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.598486] ================================================================== [ 14.561443] ================================================================== [ 14.561843] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.562359] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.562785] [ 14.562902] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.563110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.563123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.563143] Call Trace: [ 14.563159] <TASK> [ 14.563175] dump_stack_lvl+0x73/0xb0 [ 14.563205] print_report+0xd1/0x610 [ 14.563228] ? __virt_addr_valid+0x1db/0x2d0 [ 14.563251] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.563279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.563301] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.563329] kasan_report+0x141/0x180 [ 14.563351] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.563384] kasan_check_range+0x10c/0x1c0 [ 14.563408] __kasan_check_write+0x18/0x20 [ 14.563427] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.563455] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.563484] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.563508] ? trace_hardirqs_on+0x37/0xe0 [ 14.563530] ? kasan_bitops_generic+0x92/0x1c0 [ 14.563558] kasan_bitops_generic+0x121/0x1c0 [ 14.563581] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.563607] ? __pfx_read_tsc+0x10/0x10 [ 14.563627] ? ktime_get_ts64+0x86/0x230 [ 14.563654] kunit_try_run_case+0x1a5/0x480 [ 14.563682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.563706] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.563730] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.563754] ? __kthread_parkme+0x82/0x180 [ 14.563774] ? preempt_count_sub+0x50/0x80 [ 14.563799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.563823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.563847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.563871] kthread+0x337/0x6f0 [ 14.563890] ? trace_preempt_on+0x20/0xc0 [ 14.563911] ? __pfx_kthread+0x10/0x10 [ 14.563930] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.563952] ? calculate_sigpending+0x7b/0xa0 [ 14.563976] ? __pfx_kthread+0x10/0x10 [ 14.563997] ret_from_fork+0x116/0x1d0 [ 14.564015] ? __pfx_kthread+0x10/0x10 [ 14.564035] ret_from_fork_asm+0x1a/0x30 [ 14.564078] </TASK> [ 14.564087] [ 14.572025] Allocated by task 278: [ 14.572219] kasan_save_stack+0x45/0x70 [ 14.572413] kasan_save_track+0x18/0x40 [ 14.572579] kasan_save_alloc_info+0x3b/0x50 [ 14.572729] __kasan_kmalloc+0xb7/0xc0 [ 14.572861] __kmalloc_cache_noprof+0x189/0x420 [ 14.573015] kasan_bitops_generic+0x92/0x1c0 [ 14.573253] kunit_try_run_case+0x1a5/0x480 [ 14.573461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.573997] kthread+0x337/0x6f0 [ 14.574171] ret_from_fork+0x116/0x1d0 [ 14.574361] ret_from_fork_asm+0x1a/0x30 [ 14.574530] [ 14.574623] The buggy address belongs to the object at ffff8881025ee360 [ 14.574623] which belongs to the cache kmalloc-16 of size 16 [ 14.575100] The buggy address is located 8 bytes inside of [ 14.575100] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.575453] [ 14.575525] The buggy address belongs to the physical page: [ 14.575780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.576141] flags: 0x200000000000000(node=0|zone=2) [ 14.576378] page_type: f5(slab) [ 14.576554] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.576910] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.577189] page dumped because: kasan: bad access detected [ 14.577362] [ 14.577430] Memory state around the buggy address: [ 14.577644] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.578000] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.578361] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.578722] ^ [ 14.578947] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.579172] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.579398] ================================================================== [ 14.519088] ================================================================== [ 14.519398] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.519853] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.520607] [ 14.520724] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.520769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.520780] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.520802] Call Trace: [ 14.520820] <TASK> [ 14.520838] dump_stack_lvl+0x73/0xb0 [ 14.520867] print_report+0xd1/0x610 [ 14.520889] ? __virt_addr_valid+0x1db/0x2d0 [ 14.520912] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.520939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.520961] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.520990] kasan_report+0x141/0x180 [ 14.521011] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.521045] kasan_check_range+0x10c/0x1c0 [ 14.521081] __kasan_check_write+0x18/0x20 [ 14.521099] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.521127] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.521156] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.521181] ? trace_hardirqs_on+0x37/0xe0 [ 14.521204] ? kasan_bitops_generic+0x92/0x1c0 [ 14.521231] kasan_bitops_generic+0x121/0x1c0 [ 14.521254] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.521278] ? __pfx_read_tsc+0x10/0x10 [ 14.521298] ? ktime_get_ts64+0x86/0x230 [ 14.521322] kunit_try_run_case+0x1a5/0x480 [ 14.521347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.521369] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.521393] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.521416] ? __kthread_parkme+0x82/0x180 [ 14.521436] ? preempt_count_sub+0x50/0x80 [ 14.521461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.521484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.521508] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.521531] kthread+0x337/0x6f0 [ 14.521549] ? trace_preempt_on+0x20/0xc0 [ 14.521580] ? __pfx_kthread+0x10/0x10 [ 14.521659] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.521681] ? calculate_sigpending+0x7b/0xa0 [ 14.521706] ? __pfx_kthread+0x10/0x10 [ 14.521727] ret_from_fork+0x116/0x1d0 [ 14.521745] ? __pfx_kthread+0x10/0x10 [ 14.521764] ret_from_fork_asm+0x1a/0x30 [ 14.521796] </TASK> [ 14.521805] [ 14.531419] Allocated by task 278: [ 14.531562] kasan_save_stack+0x45/0x70 [ 14.532001] kasan_save_track+0x18/0x40 [ 14.532274] kasan_save_alloc_info+0x3b/0x50 [ 14.532454] __kasan_kmalloc+0xb7/0xc0 [ 14.532771] __kmalloc_cache_noprof+0x189/0x420 [ 14.532977] kasan_bitops_generic+0x92/0x1c0 [ 14.533193] kunit_try_run_case+0x1a5/0x480 [ 14.533383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.533614] kthread+0x337/0x6f0 [ 14.534007] ret_from_fork+0x116/0x1d0 [ 14.534166] ret_from_fork_asm+0x1a/0x30 [ 14.534439] [ 14.534603] The buggy address belongs to the object at ffff8881025ee360 [ 14.534603] which belongs to the cache kmalloc-16 of size 16 [ 14.535223] The buggy address is located 8 bytes inside of [ 14.535223] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.535924] [ 14.536006] The buggy address belongs to the physical page: [ 14.536252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.536832] flags: 0x200000000000000(node=0|zone=2) [ 14.537064] page_type: f5(slab) [ 14.537201] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.537587] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.537951] page dumped because: kasan: bad access detected [ 14.538189] [ 14.538277] Memory state around the buggy address: [ 14.538465] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.538780] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.539099] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.539478] ^ [ 14.539705] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.539993] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.540259] ================================================================== [ 14.671656] ================================================================== [ 14.672044] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.672460] Read of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.672826] [ 14.672940] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.672981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.672993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.673014] Call Trace: [ 14.673028] <TASK> [ 14.673043] dump_stack_lvl+0x73/0xb0 [ 14.673080] print_report+0xd1/0x610 [ 14.673103] ? __virt_addr_valid+0x1db/0x2d0 [ 14.673125] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.673152] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.673175] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.673206] kasan_report+0x141/0x180 [ 14.673228] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.673263] __asan_report_load8_noabort+0x18/0x20 [ 14.673287] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.673316] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.673344] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.673368] ? trace_hardirqs_on+0x37/0xe0 [ 14.673390] ? kasan_bitops_generic+0x92/0x1c0 [ 14.673418] kasan_bitops_generic+0x121/0x1c0 [ 14.673441] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.673466] ? __pfx_read_tsc+0x10/0x10 [ 14.673486] ? ktime_get_ts64+0x86/0x230 [ 14.673510] kunit_try_run_case+0x1a5/0x480 [ 14.673535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.673559] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.673610] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.673634] ? __kthread_parkme+0x82/0x180 [ 14.673653] ? preempt_count_sub+0x50/0x80 [ 14.673678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.673701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.673725] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.673749] kthread+0x337/0x6f0 [ 14.673767] ? trace_preempt_on+0x20/0xc0 [ 14.673789] ? __pfx_kthread+0x10/0x10 [ 14.673809] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.673830] ? calculate_sigpending+0x7b/0xa0 [ 14.673854] ? __pfx_kthread+0x10/0x10 [ 14.673875] ret_from_fork+0x116/0x1d0 [ 14.673893] ? __pfx_kthread+0x10/0x10 [ 14.673912] ret_from_fork_asm+0x1a/0x30 [ 14.673945] </TASK> [ 14.673955] [ 14.681516] Allocated by task 278: [ 14.681666] kasan_save_stack+0x45/0x70 [ 14.681812] kasan_save_track+0x18/0x40 [ 14.682007] kasan_save_alloc_info+0x3b/0x50 [ 14.682228] __kasan_kmalloc+0xb7/0xc0 [ 14.682413] __kmalloc_cache_noprof+0x189/0x420 [ 14.682659] kasan_bitops_generic+0x92/0x1c0 [ 14.682872] kunit_try_run_case+0x1a5/0x480 [ 14.683086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.683341] kthread+0x337/0x6f0 [ 14.683511] ret_from_fork+0x116/0x1d0 [ 14.683704] ret_from_fork_asm+0x1a/0x30 [ 14.683844] [ 14.683914] The buggy address belongs to the object at ffff8881025ee360 [ 14.683914] which belongs to the cache kmalloc-16 of size 16 [ 14.684279] The buggy address is located 8 bytes inside of [ 14.684279] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.684824] [ 14.684922] The buggy address belongs to the physical page: [ 14.685180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.685440] flags: 0x200000000000000(node=0|zone=2) [ 14.685629] page_type: f5(slab) [ 14.685750] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.686067] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.686413] page dumped because: kasan: bad access detected [ 14.686695] [ 14.686789] Memory state around the buggy address: [ 14.687021] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.687354] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.687670] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.687958] ^ [ 14.688226] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.688462] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.688700] ================================================================== [ 14.653943] ================================================================== [ 14.654207] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.654592] Read of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.654949] [ 14.655066] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.655107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.655119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.655140] Call Trace: [ 14.655156] <TASK> [ 14.655172] dump_stack_lvl+0x73/0xb0 [ 14.655200] print_report+0xd1/0x610 [ 14.655221] ? __virt_addr_valid+0x1db/0x2d0 [ 14.655244] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.655271] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.655293] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.655322] kasan_report+0x141/0x180 [ 14.655343] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.655377] kasan_check_range+0x10c/0x1c0 [ 14.655400] __kasan_check_read+0x15/0x20 [ 14.655418] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.655446] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.655475] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.655499] ? trace_hardirqs_on+0x37/0xe0 [ 14.655521] ? kasan_bitops_generic+0x92/0x1c0 [ 14.655548] kasan_bitops_generic+0x121/0x1c0 [ 14.655591] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.655616] ? __pfx_read_tsc+0x10/0x10 [ 14.655636] ? ktime_get_ts64+0x86/0x230 [ 14.655659] kunit_try_run_case+0x1a5/0x480 [ 14.655684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.655705] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.655729] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.655753] ? __kthread_parkme+0x82/0x180 [ 14.655772] ? preempt_count_sub+0x50/0x80 [ 14.655795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.655820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.655844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.655868] kthread+0x337/0x6f0 [ 14.655886] ? trace_preempt_on+0x20/0xc0 [ 14.655908] ? __pfx_kthread+0x10/0x10 [ 14.655928] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.655949] ? calculate_sigpending+0x7b/0xa0 [ 14.655972] ? __pfx_kthread+0x10/0x10 [ 14.655993] ret_from_fork+0x116/0x1d0 [ 14.656011] ? __pfx_kthread+0x10/0x10 [ 14.656031] ret_from_fork_asm+0x1a/0x30 [ 14.656071] </TASK> [ 14.656080] [ 14.664067] Allocated by task 278: [ 14.664221] kasan_save_stack+0x45/0x70 [ 14.664426] kasan_save_track+0x18/0x40 [ 14.664613] kasan_save_alloc_info+0x3b/0x50 [ 14.664796] __kasan_kmalloc+0xb7/0xc0 [ 14.664976] __kmalloc_cache_noprof+0x189/0x420 [ 14.665176] kasan_bitops_generic+0x92/0x1c0 [ 14.665375] kunit_try_run_case+0x1a5/0x480 [ 14.665551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.665746] kthread+0x337/0x6f0 [ 14.665867] ret_from_fork+0x116/0x1d0 [ 14.665999] ret_from_fork_asm+0x1a/0x30 [ 14.666149] [ 14.666225] The buggy address belongs to the object at ffff8881025ee360 [ 14.666225] which belongs to the cache kmalloc-16 of size 16 [ 14.666602] The buggy address is located 8 bytes inside of [ 14.666602] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.667111] [ 14.667207] The buggy address belongs to the physical page: [ 14.667456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.667832] flags: 0x200000000000000(node=0|zone=2) [ 14.668073] page_type: f5(slab) [ 14.668241] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.668498] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.668750] page dumped because: kasan: bad access detected [ 14.668922] [ 14.668990] Memory state around the buggy address: [ 14.669154] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.669372] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.669699] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.670024] ^ [ 14.670329] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.670677] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.670994] ================================================================== [ 14.599188] ================================================================== [ 14.599553] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.600106] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.600436] [ 14.600545] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.600587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.600598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.600618] Call Trace: [ 14.600637] <TASK> [ 14.600654] dump_stack_lvl+0x73/0xb0 [ 14.600682] print_report+0xd1/0x610 [ 14.600703] ? __virt_addr_valid+0x1db/0x2d0 [ 14.600725] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.600753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.600776] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.600806] kasan_report+0x141/0x180 [ 14.600828] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.600861] kasan_check_range+0x10c/0x1c0 [ 14.600885] __kasan_check_write+0x18/0x20 [ 14.600904] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.600933] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.600962] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.600985] ? trace_hardirqs_on+0x37/0xe0 [ 14.601007] ? kasan_bitops_generic+0x92/0x1c0 [ 14.601035] kasan_bitops_generic+0x121/0x1c0 [ 14.601071] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.601096] ? __pfx_read_tsc+0x10/0x10 [ 14.601117] ? ktime_get_ts64+0x86/0x230 [ 14.601141] kunit_try_run_case+0x1a5/0x480 [ 14.601165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.601187] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.601211] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.601234] ? __kthread_parkme+0x82/0x180 [ 14.601255] ? preempt_count_sub+0x50/0x80 [ 14.601279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.601303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.601327] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.601351] kthread+0x337/0x6f0 [ 14.601370] ? trace_preempt_on+0x20/0xc0 [ 14.601392] ? __pfx_kthread+0x10/0x10 [ 14.601412] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.601433] ? calculate_sigpending+0x7b/0xa0 [ 14.601457] ? __pfx_kthread+0x10/0x10 [ 14.601478] ret_from_fork+0x116/0x1d0 [ 14.601496] ? __pfx_kthread+0x10/0x10 [ 14.601516] ret_from_fork_asm+0x1a/0x30 [ 14.601548] </TASK> [ 14.601558] [ 14.609583] Allocated by task 278: [ 14.609774] kasan_save_stack+0x45/0x70 [ 14.609983] kasan_save_track+0x18/0x40 [ 14.610141] kasan_save_alloc_info+0x3b/0x50 [ 14.610360] __kasan_kmalloc+0xb7/0xc0 [ 14.610521] __kmalloc_cache_noprof+0x189/0x420 [ 14.610756] kasan_bitops_generic+0x92/0x1c0 [ 14.610919] kunit_try_run_case+0x1a5/0x480 [ 14.611140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.611349] kthread+0x337/0x6f0 [ 14.611516] ret_from_fork+0x116/0x1d0 [ 14.611706] ret_from_fork_asm+0x1a/0x30 [ 14.611899] [ 14.611988] The buggy address belongs to the object at ffff8881025ee360 [ 14.611988] which belongs to the cache kmalloc-16 of size 16 [ 14.612417] The buggy address is located 8 bytes inside of [ 14.612417] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.612865] [ 14.612963] The buggy address belongs to the physical page: [ 14.613225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.613552] flags: 0x200000000000000(node=0|zone=2) [ 14.613750] page_type: f5(slab) [ 14.613919] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.614217] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.614550] page dumped because: kasan: bad access detected [ 14.614814] [ 14.614894] Memory state around the buggy address: [ 14.615076] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.615292] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.615507] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.615796] ^ [ 14.616095] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.616480] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.616914] ================================================================== [ 14.617368] ================================================================== [ 14.617605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.617999] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.618359] [ 14.618469] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.618511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.618522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.618544] Call Trace: [ 14.618559] <TASK> [ 14.618573] dump_stack_lvl+0x73/0xb0 [ 14.618600] print_report+0xd1/0x610 [ 14.618620] ? __virt_addr_valid+0x1db/0x2d0 [ 14.618641] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.618667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.618689] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.618715] kasan_report+0x141/0x180 [ 14.618736] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.618769] kasan_check_range+0x10c/0x1c0 [ 14.618790] __kasan_check_write+0x18/0x20 [ 14.618808] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.618835] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.618863] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.618889] ? trace_hardirqs_on+0x37/0xe0 [ 14.618910] ? kasan_bitops_generic+0x92/0x1c0 [ 14.618937] kasan_bitops_generic+0x121/0x1c0 [ 14.618959] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.618983] ? __pfx_read_tsc+0x10/0x10 [ 14.619003] ? ktime_get_ts64+0x86/0x230 [ 14.619026] kunit_try_run_case+0x1a5/0x480 [ 14.619206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.619237] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.619263] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.619286] ? __kthread_parkme+0x82/0x180 [ 14.619306] ? preempt_count_sub+0x50/0x80 [ 14.619331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.619355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.619378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.619402] kthread+0x337/0x6f0 [ 14.619421] ? trace_preempt_on+0x20/0xc0 [ 14.619443] ? __pfx_kthread+0x10/0x10 [ 14.619463] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.619485] ? calculate_sigpending+0x7b/0xa0 [ 14.619509] ? __pfx_kthread+0x10/0x10 [ 14.619530] ret_from_fork+0x116/0x1d0 [ 14.619548] ? __pfx_kthread+0x10/0x10 [ 14.619589] ret_from_fork_asm+0x1a/0x30 [ 14.619623] </TASK> [ 14.619632] [ 14.627466] Allocated by task 278: [ 14.627657] kasan_save_stack+0x45/0x70 [ 14.627801] kasan_save_track+0x18/0x40 [ 14.627937] kasan_save_alloc_info+0x3b/0x50 [ 14.628096] __kasan_kmalloc+0xb7/0xc0 [ 14.628230] __kmalloc_cache_noprof+0x189/0x420 [ 14.628386] kasan_bitops_generic+0x92/0x1c0 [ 14.628535] kunit_try_run_case+0x1a5/0x480 [ 14.628697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.628949] kthread+0x337/0x6f0 [ 14.629126] ret_from_fork+0x116/0x1d0 [ 14.629311] ret_from_fork_asm+0x1a/0x30 [ 14.629504] [ 14.629622] The buggy address belongs to the object at ffff8881025ee360 [ 14.629622] which belongs to the cache kmalloc-16 of size 16 [ 14.630156] The buggy address is located 8 bytes inside of [ 14.630156] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.630711] [ 14.630805] The buggy address belongs to the physical page: [ 14.631061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.631344] flags: 0x200000000000000(node=0|zone=2) [ 14.631508] page_type: f5(slab) [ 14.631652] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.631888] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.632241] page dumped because: kasan: bad access detected [ 14.632497] [ 14.632618] Memory state around the buggy address: [ 14.632846] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.633180] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.633498] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.633834] ^ [ 14.634101] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.634382] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.634712] ================================================================== [ 14.541004] ================================================================== [ 14.541371] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.541752] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.542134] [ 14.542254] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.542297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.542308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.542330] Call Trace: [ 14.542341] <TASK> [ 14.542357] dump_stack_lvl+0x73/0xb0 [ 14.542385] print_report+0xd1/0x610 [ 14.542407] ? __virt_addr_valid+0x1db/0x2d0 [ 14.542429] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.542457] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.542480] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.542508] kasan_report+0x141/0x180 [ 14.542529] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.542563] kasan_check_range+0x10c/0x1c0 [ 14.542586] __kasan_check_write+0x18/0x20 [ 14.542605] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.542633] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.542662] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.542686] ? trace_hardirqs_on+0x37/0xe0 [ 14.542709] ? kasan_bitops_generic+0x92/0x1c0 [ 14.542736] kasan_bitops_generic+0x121/0x1c0 [ 14.542759] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.542784] ? __pfx_read_tsc+0x10/0x10 [ 14.542804] ? ktime_get_ts64+0x86/0x230 [ 14.542828] kunit_try_run_case+0x1a5/0x480 [ 14.542853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.542874] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.542898] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.542922] ? __kthread_parkme+0x82/0x180 [ 14.542941] ? preempt_count_sub+0x50/0x80 [ 14.542965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.542990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.543013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.543037] kthread+0x337/0x6f0 [ 14.543066] ? trace_preempt_on+0x20/0xc0 [ 14.543088] ? __pfx_kthread+0x10/0x10 [ 14.543107] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.543128] ? calculate_sigpending+0x7b/0xa0 [ 14.543151] ? __pfx_kthread+0x10/0x10 [ 14.543172] ret_from_fork+0x116/0x1d0 [ 14.543190] ? __pfx_kthread+0x10/0x10 [ 14.543210] ret_from_fork_asm+0x1a/0x30 [ 14.543242] </TASK> [ 14.543251] [ 14.551384] Allocated by task 278: [ 14.551569] kasan_save_stack+0x45/0x70 [ 14.551866] kasan_save_track+0x18/0x40 [ 14.552015] kasan_save_alloc_info+0x3b/0x50 [ 14.552234] __kasan_kmalloc+0xb7/0xc0 [ 14.552409] __kmalloc_cache_noprof+0x189/0x420 [ 14.552593] kasan_bitops_generic+0x92/0x1c0 [ 14.552741] kunit_try_run_case+0x1a5/0x480 [ 14.552887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.553133] kthread+0x337/0x6f0 [ 14.553299] ret_from_fork+0x116/0x1d0 [ 14.553497] ret_from_fork_asm+0x1a/0x30 [ 14.553839] [ 14.553928] The buggy address belongs to the object at ffff8881025ee360 [ 14.553928] which belongs to the cache kmalloc-16 of size 16 [ 14.554396] The buggy address is located 8 bytes inside of [ 14.554396] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.554900] [ 14.554995] The buggy address belongs to the physical page: [ 14.555202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.555444] flags: 0x200000000000000(node=0|zone=2) [ 14.555677] page_type: f5(slab) [ 14.555847] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.556209] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.556552] page dumped because: kasan: bad access detected [ 14.557335] [ 14.557604] Memory state around the buggy address: [ 14.557779] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.557999] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.558852] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.559170] ^ [ 14.559448] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.559999] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.560306] ==================================================================