Date
July 18, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.431201] ================================================================== [ 14.431657] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.432004] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.432292] [ 14.432434] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.432478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.432489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.432508] Call Trace: [ 14.432524] <TASK> [ 14.432537] dump_stack_lvl+0x73/0xb0 [ 14.432564] print_report+0xd1/0x610 [ 14.432584] ? __virt_addr_valid+0x1db/0x2d0 [ 14.432606] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.432672] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.432694] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.432722] kasan_report+0x141/0x180 [ 14.432744] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.432777] kasan_check_range+0x10c/0x1c0 [ 14.432800] __kasan_check_write+0x18/0x20 [ 14.432818] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.432846] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.432876] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.432898] ? trace_hardirqs_on+0x37/0xe0 [ 14.432920] ? kasan_bitops_generic+0x92/0x1c0 [ 14.432947] kasan_bitops_generic+0x121/0x1c0 [ 14.432978] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.433003] ? __pfx_read_tsc+0x10/0x10 [ 14.433071] ? ktime_get_ts64+0x86/0x230 [ 14.433094] kunit_try_run_case+0x1a5/0x480 [ 14.433118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.433140] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.433165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.433188] ? __kthread_parkme+0x82/0x180 [ 14.433208] ? preempt_count_sub+0x50/0x80 [ 14.433231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.433255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.433279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.433314] kthread+0x337/0x6f0 [ 14.433333] ? trace_preempt_on+0x20/0xc0 [ 14.433355] ? __pfx_kthread+0x10/0x10 [ 14.433375] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.433396] ? calculate_sigpending+0x7b/0xa0 [ 14.433419] ? __pfx_kthread+0x10/0x10 [ 14.433440] ret_from_fork+0x116/0x1d0 [ 14.433458] ? __pfx_kthread+0x10/0x10 [ 14.433478] ret_from_fork_asm+0x1a/0x30 [ 14.433507] </TASK> [ 14.433517] [ 14.443484] Allocated by task 280: [ 14.443696] kasan_save_stack+0x45/0x70 [ 14.443903] kasan_save_track+0x18/0x40 [ 14.444206] kasan_save_alloc_info+0x3b/0x50 [ 14.444433] __kasan_kmalloc+0xb7/0xc0 [ 14.444569] __kmalloc_cache_noprof+0x189/0x420 [ 14.444725] kasan_bitops_generic+0x92/0x1c0 [ 14.444874] kunit_try_run_case+0x1a5/0x480 [ 14.445055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.445317] kthread+0x337/0x6f0 [ 14.445483] ret_from_fork+0x116/0x1d0 [ 14.445670] ret_from_fork_asm+0x1a/0x30 [ 14.445864] [ 14.445960] The buggy address belongs to the object at ffff8881025c7500 [ 14.445960] which belongs to the cache kmalloc-16 of size 16 [ 14.446618] The buggy address is located 8 bytes inside of [ 14.446618] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.446982] [ 14.447179] The buggy address belongs to the physical page: [ 14.447538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.447906] flags: 0x200000000000000(node=0|zone=2) [ 14.448560] page_type: f5(slab) [ 14.448831] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.449291] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.449668] page dumped because: kasan: bad access detected [ 14.449843] [ 14.449913] Memory state around the buggy address: [ 14.450068] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.450404] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.450789] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.451395] ^ [ 14.451712] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.451978] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.452333] ================================================================== [ 14.408398] ================================================================== [ 14.408790] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.409346] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.409688] [ 14.409793] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.409833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.409845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.409897] Call Trace: [ 14.409909] <TASK> [ 14.409922] dump_stack_lvl+0x73/0xb0 [ 14.409950] print_report+0xd1/0x610 [ 14.409971] ? __virt_addr_valid+0x1db/0x2d0 [ 14.409993] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.410100] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.410126] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.410155] kasan_report+0x141/0x180 [ 14.410177] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.410246] kasan_check_range+0x10c/0x1c0 [ 14.410270] __kasan_check_write+0x18/0x20 [ 14.410289] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.410329] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.410358] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.410382] ? trace_hardirqs_on+0x37/0xe0 [ 14.410403] ? kasan_bitops_generic+0x92/0x1c0 [ 14.410430] kasan_bitops_generic+0x121/0x1c0 [ 14.410453] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.410478] ? __pfx_read_tsc+0x10/0x10 [ 14.410497] ? ktime_get_ts64+0x86/0x230 [ 14.410520] kunit_try_run_case+0x1a5/0x480 [ 14.410575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.410598] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.410621] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.410645] ? __kthread_parkme+0x82/0x180 [ 14.410665] ? preempt_count_sub+0x50/0x80 [ 14.410714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.410760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.410806] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.410832] kthread+0x337/0x6f0 [ 14.410850] ? trace_preempt_on+0x20/0xc0 [ 14.410897] ? __pfx_kthread+0x10/0x10 [ 14.410934] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.410955] ? calculate_sigpending+0x7b/0xa0 [ 14.410979] ? __pfx_kthread+0x10/0x10 [ 14.411000] ret_from_fork+0x116/0x1d0 [ 14.411018] ? __pfx_kthread+0x10/0x10 [ 14.411084] ret_from_fork_asm+0x1a/0x30 [ 14.411113] </TASK> [ 14.411124] [ 14.421366] Allocated by task 280: [ 14.421631] kasan_save_stack+0x45/0x70 [ 14.421855] kasan_save_track+0x18/0x40 [ 14.422120] kasan_save_alloc_info+0x3b/0x50 [ 14.422279] __kasan_kmalloc+0xb7/0xc0 [ 14.422479] __kmalloc_cache_noprof+0x189/0x420 [ 14.422783] kasan_bitops_generic+0x92/0x1c0 [ 14.423242] kunit_try_run_case+0x1a5/0x480 [ 14.423437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.423675] kthread+0x337/0x6f0 [ 14.423845] ret_from_fork+0x116/0x1d0 [ 14.424084] ret_from_fork_asm+0x1a/0x30 [ 14.424279] [ 14.424386] The buggy address belongs to the object at ffff8881025c7500 [ 14.424386] which belongs to the cache kmalloc-16 of size 16 [ 14.425037] The buggy address is located 8 bytes inside of [ 14.425037] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.425780] [ 14.425913] The buggy address belongs to the physical page: [ 14.426199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.426647] flags: 0x200000000000000(node=0|zone=2) [ 14.426863] page_type: f5(slab) [ 14.427082] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.427469] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.427796] page dumped because: kasan: bad access detected [ 14.428045] [ 14.428338] Memory state around the buggy address: [ 14.428575] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.428851] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.429128] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.429575] ^ [ 14.429874] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.430313] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.430658] ================================================================== [ 14.499831] ================================================================== [ 14.500462] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.500986] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.501369] [ 14.501458] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.501501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.501513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.501533] Call Trace: [ 14.501548] <TASK> [ 14.501562] dump_stack_lvl+0x73/0xb0 [ 14.501630] print_report+0xd1/0x610 [ 14.501677] ? __virt_addr_valid+0x1db/0x2d0 [ 14.501700] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.501729] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.501752] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.501779] kasan_report+0x141/0x180 [ 14.501801] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.501835] kasan_check_range+0x10c/0x1c0 [ 14.501858] __kasan_check_write+0x18/0x20 [ 14.501877] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.501906] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.501967] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.502014] ? trace_hardirqs_on+0x37/0xe0 [ 14.502051] ? kasan_bitops_generic+0x92/0x1c0 [ 14.502079] kasan_bitops_generic+0x121/0x1c0 [ 14.502101] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.502126] ? __pfx_read_tsc+0x10/0x10 [ 14.502145] ? ktime_get_ts64+0x86/0x230 [ 14.502168] kunit_try_run_case+0x1a5/0x480 [ 14.502192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.502214] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.502237] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.502261] ? __kthread_parkme+0x82/0x180 [ 14.502281] ? preempt_count_sub+0x50/0x80 [ 14.502315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.502338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.502361] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.502385] kthread+0x337/0x6f0 [ 14.502406] ? trace_preempt_on+0x20/0xc0 [ 14.502427] ? __pfx_kthread+0x10/0x10 [ 14.502447] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.502468] ? calculate_sigpending+0x7b/0xa0 [ 14.502574] ? __pfx_kthread+0x10/0x10 [ 14.502596] ret_from_fork+0x116/0x1d0 [ 14.502615] ? __pfx_kthread+0x10/0x10 [ 14.502635] ret_from_fork_asm+0x1a/0x30 [ 14.502666] </TASK> [ 14.502676] [ 14.512935] Allocated by task 280: [ 14.513194] kasan_save_stack+0x45/0x70 [ 14.513496] kasan_save_track+0x18/0x40 [ 14.513777] kasan_save_alloc_info+0x3b/0x50 [ 14.514015] __kasan_kmalloc+0xb7/0xc0 [ 14.514345] __kmalloc_cache_noprof+0x189/0x420 [ 14.514609] kasan_bitops_generic+0x92/0x1c0 [ 14.514817] kunit_try_run_case+0x1a5/0x480 [ 14.515015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.515296] kthread+0x337/0x6f0 [ 14.515450] ret_from_fork+0x116/0x1d0 [ 14.515856] ret_from_fork_asm+0x1a/0x30 [ 14.516080] [ 14.516173] The buggy address belongs to the object at ffff8881025c7500 [ 14.516173] which belongs to the cache kmalloc-16 of size 16 [ 14.516738] The buggy address is located 8 bytes inside of [ 14.516738] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.517340] [ 14.517410] The buggy address belongs to the physical page: [ 14.517793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.518419] flags: 0x200000000000000(node=0|zone=2) [ 14.518692] page_type: f5(slab) [ 14.518888] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.519325] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.519659] page dumped because: kasan: bad access detected [ 14.519900] [ 14.519991] Memory state around the buggy address: [ 14.520235] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.520702] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.521160] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.521509] ^ [ 14.521700] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.521989] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.522366] ================================================================== [ 14.452853] ================================================================== [ 14.453335] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.453937] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.454384] [ 14.454529] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.454572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.454584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.454604] Call Trace: [ 14.454620] <TASK> [ 14.454635] dump_stack_lvl+0x73/0xb0 [ 14.454662] print_report+0xd1/0x610 [ 14.454720] ? __virt_addr_valid+0x1db/0x2d0 [ 14.454741] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.454770] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.454792] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.454850] kasan_report+0x141/0x180 [ 14.454871] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.454904] kasan_check_range+0x10c/0x1c0 [ 14.454928] __kasan_check_write+0x18/0x20 [ 14.454947] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.455004] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.455034] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.455057] ? trace_hardirqs_on+0x37/0xe0 [ 14.455131] ? kasan_bitops_generic+0x92/0x1c0 [ 14.455197] kasan_bitops_generic+0x121/0x1c0 [ 14.455220] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.455244] ? __pfx_read_tsc+0x10/0x10 [ 14.455265] ? ktime_get_ts64+0x86/0x230 [ 14.455288] kunit_try_run_case+0x1a5/0x480 [ 14.455356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.455377] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.455402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.455425] ? __kthread_parkme+0x82/0x180 [ 14.455444] ? preempt_count_sub+0x50/0x80 [ 14.455501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.455524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.455547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.455581] kthread+0x337/0x6f0 [ 14.455600] ? trace_preempt_on+0x20/0xc0 [ 14.455650] ? __pfx_kthread+0x10/0x10 [ 14.455670] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.455691] ? calculate_sigpending+0x7b/0xa0 [ 14.455715] ? __pfx_kthread+0x10/0x10 [ 14.455736] ret_from_fork+0x116/0x1d0 [ 14.455754] ? __pfx_kthread+0x10/0x10 [ 14.455774] ret_from_fork_asm+0x1a/0x30 [ 14.455804] </TASK> [ 14.455813] [ 14.466323] Allocated by task 280: [ 14.466577] kasan_save_stack+0x45/0x70 [ 14.466790] kasan_save_track+0x18/0x40 [ 14.466979] kasan_save_alloc_info+0x3b/0x50 [ 14.467205] __kasan_kmalloc+0xb7/0xc0 [ 14.467448] __kmalloc_cache_noprof+0x189/0x420 [ 14.467804] kasan_bitops_generic+0x92/0x1c0 [ 14.468106] kunit_try_run_case+0x1a5/0x480 [ 14.468339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.468603] kthread+0x337/0x6f0 [ 14.468813] ret_from_fork+0x116/0x1d0 [ 14.469005] ret_from_fork_asm+0x1a/0x30 [ 14.469389] [ 14.469465] The buggy address belongs to the object at ffff8881025c7500 [ 14.469465] which belongs to the cache kmalloc-16 of size 16 [ 14.469826] The buggy address is located 8 bytes inside of [ 14.469826] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.470207] [ 14.470401] The buggy address belongs to the physical page: [ 14.470890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.471351] flags: 0x200000000000000(node=0|zone=2) [ 14.471519] page_type: f5(slab) [ 14.471639] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.471870] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.472434] page dumped because: kasan: bad access detected [ 14.472759] [ 14.472911] Memory state around the buggy address: [ 14.473264] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.473927] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.474184] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.474587] ^ [ 14.474769] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.475245] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.475632] ================================================================== [ 14.610137] ================================================================== [ 14.610465] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.611298] Read of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.611945] [ 14.612065] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.612111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.612122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.612143] Call Trace: [ 14.612158] <TASK> [ 14.612174] dump_stack_lvl+0x73/0xb0 [ 14.612203] print_report+0xd1/0x610 [ 14.612225] ? __virt_addr_valid+0x1db/0x2d0 [ 14.612246] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.612274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.612297] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.612338] kasan_report+0x141/0x180 [ 14.612359] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.612391] __asan_report_load8_noabort+0x18/0x20 [ 14.612415] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.612444] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.612473] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.612497] ? trace_hardirqs_on+0x37/0xe0 [ 14.612518] ? kasan_bitops_generic+0x92/0x1c0 [ 14.612545] kasan_bitops_generic+0x121/0x1c0 [ 14.612569] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.612593] ? __pfx_read_tsc+0x10/0x10 [ 14.612614] ? ktime_get_ts64+0x86/0x230 [ 14.612636] kunit_try_run_case+0x1a5/0x480 [ 14.612660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.612681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.612706] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.612728] ? __kthread_parkme+0x82/0x180 [ 14.612748] ? preempt_count_sub+0x50/0x80 [ 14.612772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.612795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.612819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.612843] kthread+0x337/0x6f0 [ 14.612862] ? trace_preempt_on+0x20/0xc0 [ 14.612883] ? __pfx_kthread+0x10/0x10 [ 14.612903] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.612924] ? calculate_sigpending+0x7b/0xa0 [ 14.612948] ? __pfx_kthread+0x10/0x10 [ 14.612976] ret_from_fork+0x116/0x1d0 [ 14.612994] ? __pfx_kthread+0x10/0x10 [ 14.613013] ret_from_fork_asm+0x1a/0x30 [ 14.613043] </TASK> [ 14.613053] [ 14.624821] Allocated by task 280: [ 14.625173] kasan_save_stack+0x45/0x70 [ 14.625394] kasan_save_track+0x18/0x40 [ 14.625763] kasan_save_alloc_info+0x3b/0x50 [ 14.626072] __kasan_kmalloc+0xb7/0xc0 [ 14.626362] __kmalloc_cache_noprof+0x189/0x420 [ 14.626740] kasan_bitops_generic+0x92/0x1c0 [ 14.627030] kunit_try_run_case+0x1a5/0x480 [ 14.627320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.627513] kthread+0x337/0x6f0 [ 14.627918] ret_from_fork+0x116/0x1d0 [ 14.628098] ret_from_fork_asm+0x1a/0x30 [ 14.628387] [ 14.628663] The buggy address belongs to the object at ffff8881025c7500 [ 14.628663] which belongs to the cache kmalloc-16 of size 16 [ 14.629152] The buggy address is located 8 bytes inside of [ 14.629152] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.629987] [ 14.630084] The buggy address belongs to the physical page: [ 14.630292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.630814] flags: 0x200000000000000(node=0|zone=2) [ 14.631148] page_type: f5(slab) [ 14.631427] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.631951] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.632384] page dumped because: kasan: bad access detected [ 14.632743] [ 14.632942] Memory state around the buggy address: [ 14.633144] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.633483] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.634022] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.634419] ^ [ 14.634783] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.635135] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.635560] ================================================================== [ 14.583939] ================================================================== [ 14.584267] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.584802] Read of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.585390] [ 14.585655] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.585804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.585818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.585839] Call Trace: [ 14.585855] <TASK> [ 14.585869] dump_stack_lvl+0x73/0xb0 [ 14.585900] print_report+0xd1/0x610 [ 14.585922] ? __virt_addr_valid+0x1db/0x2d0 [ 14.585944] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.585971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.585993] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.586022] kasan_report+0x141/0x180 [ 14.586043] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.586076] kasan_check_range+0x10c/0x1c0 [ 14.586098] __kasan_check_read+0x15/0x20 [ 14.586117] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.586144] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.586173] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.586197] ? trace_hardirqs_on+0x37/0xe0 [ 14.586217] ? kasan_bitops_generic+0x92/0x1c0 [ 14.586244] kasan_bitops_generic+0x121/0x1c0 [ 14.586267] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.586291] ? __pfx_read_tsc+0x10/0x10 [ 14.586324] ? ktime_get_ts64+0x86/0x230 [ 14.586346] kunit_try_run_case+0x1a5/0x480 [ 14.586369] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.586391] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.586414] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.586438] ? __kthread_parkme+0x82/0x180 [ 14.586457] ? preempt_count_sub+0x50/0x80 [ 14.586481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.586504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.586527] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.586551] kthread+0x337/0x6f0 [ 14.586570] ? trace_preempt_on+0x20/0xc0 [ 14.586591] ? __pfx_kthread+0x10/0x10 [ 14.586611] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.586632] ? calculate_sigpending+0x7b/0xa0 [ 14.586656] ? __pfx_kthread+0x10/0x10 [ 14.586678] ret_from_fork+0x116/0x1d0 [ 14.586696] ? __pfx_kthread+0x10/0x10 [ 14.586716] ret_from_fork_asm+0x1a/0x30 [ 14.586746] </TASK> [ 14.586755] [ 14.598342] Allocated by task 280: [ 14.598645] kasan_save_stack+0x45/0x70 [ 14.598910] kasan_save_track+0x18/0x40 [ 14.599074] kasan_save_alloc_info+0x3b/0x50 [ 14.599281] __kasan_kmalloc+0xb7/0xc0 [ 14.599463] __kmalloc_cache_noprof+0x189/0x420 [ 14.599656] kasan_bitops_generic+0x92/0x1c0 [ 14.599847] kunit_try_run_case+0x1a5/0x480 [ 14.600037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.600274] kthread+0x337/0x6f0 [ 14.600871] ret_from_fork+0x116/0x1d0 [ 14.601027] ret_from_fork_asm+0x1a/0x30 [ 14.601406] [ 14.601505] The buggy address belongs to the object at ffff8881025c7500 [ 14.601505] which belongs to the cache kmalloc-16 of size 16 [ 14.602262] The buggy address is located 8 bytes inside of [ 14.602262] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.603000] [ 14.603103] The buggy address belongs to the physical page: [ 14.603380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.603962] flags: 0x200000000000000(node=0|zone=2) [ 14.604271] page_type: f5(slab) [ 14.604453] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.604960] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.605390] page dumped because: kasan: bad access detected [ 14.605731] [ 14.605982] Memory state around the buggy address: [ 14.606191] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.606609] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.607022] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.607433] ^ [ 14.607742] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.608058] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.608376] ================================================================== [ 14.557089] ================================================================== [ 14.557366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.558583] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.559200] [ 14.559317] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.559365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.559376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.559397] Call Trace: [ 14.559409] <TASK> [ 14.559424] dump_stack_lvl+0x73/0xb0 [ 14.559454] print_report+0xd1/0x610 [ 14.559482] ? __virt_addr_valid+0x1db/0x2d0 [ 14.559504] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.559531] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.559554] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.559582] kasan_report+0x141/0x180 [ 14.559603] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.559635] kasan_check_range+0x10c/0x1c0 [ 14.559658] __kasan_check_write+0x18/0x20 [ 14.559677] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.559706] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.559735] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.559757] ? trace_hardirqs_on+0x37/0xe0 [ 14.559778] ? kasan_bitops_generic+0x92/0x1c0 [ 14.559805] kasan_bitops_generic+0x121/0x1c0 [ 14.559829] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.559853] ? __pfx_read_tsc+0x10/0x10 [ 14.559873] ? ktime_get_ts64+0x86/0x230 [ 14.559896] kunit_try_run_case+0x1a5/0x480 [ 14.559918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559940] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.559963] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.559987] ? __kthread_parkme+0x82/0x180 [ 14.560005] ? preempt_count_sub+0x50/0x80 [ 14.560029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.560052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.560075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.560099] kthread+0x337/0x6f0 [ 14.560117] ? trace_preempt_on+0x20/0xc0 [ 14.560139] ? __pfx_kthread+0x10/0x10 [ 14.560158] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.560179] ? calculate_sigpending+0x7b/0xa0 [ 14.560201] ? __pfx_kthread+0x10/0x10 [ 14.560222] ret_from_fork+0x116/0x1d0 [ 14.560241] ? __pfx_kthread+0x10/0x10 [ 14.560261] ret_from_fork_asm+0x1a/0x30 [ 14.560290] </TASK> [ 14.560515] [ 14.572441] Allocated by task 280: [ 14.572773] kasan_save_stack+0x45/0x70 [ 14.573073] kasan_save_track+0x18/0x40 [ 14.573381] kasan_save_alloc_info+0x3b/0x50 [ 14.573875] __kasan_kmalloc+0xb7/0xc0 [ 14.574060] __kmalloc_cache_noprof+0x189/0x420 [ 14.574292] kasan_bitops_generic+0x92/0x1c0 [ 14.574483] kunit_try_run_case+0x1a5/0x480 [ 14.574682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.574949] kthread+0x337/0x6f0 [ 14.575110] ret_from_fork+0x116/0x1d0 [ 14.575286] ret_from_fork_asm+0x1a/0x30 [ 14.575479] [ 14.575557] The buggy address belongs to the object at ffff8881025c7500 [ 14.575557] which belongs to the cache kmalloc-16 of size 16 [ 14.576064] The buggy address is located 8 bytes inside of [ 14.576064] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.577223] [ 14.577524] The buggy address belongs to the physical page: [ 14.577774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.578195] flags: 0x200000000000000(node=0|zone=2) [ 14.578526] page_type: f5(slab) [ 14.578700] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.579022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.579352] page dumped because: kasan: bad access detected [ 14.579849] [ 14.579945] Memory state around the buggy address: [ 14.580281] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.580759] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.581184] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.581673] ^ [ 14.581857] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.582334] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.582888] ================================================================== [ 14.523182] ================================================================== [ 14.523516] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.524130] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.524900] [ 14.525531] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.525580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.525593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.525614] Call Trace: [ 14.525628] <TASK> [ 14.525643] dump_stack_lvl+0x73/0xb0 [ 14.525673] print_report+0xd1/0x610 [ 14.525695] ? __virt_addr_valid+0x1db/0x2d0 [ 14.525717] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.525744] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.525767] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.525795] kasan_report+0x141/0x180 [ 14.525816] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.525849] kasan_check_range+0x10c/0x1c0 [ 14.525873] __kasan_check_write+0x18/0x20 [ 14.525891] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.525920] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.525948] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.525971] ? trace_hardirqs_on+0x37/0xe0 [ 14.525992] ? kasan_bitops_generic+0x92/0x1c0 [ 14.526020] kasan_bitops_generic+0x121/0x1c0 [ 14.526042] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.526066] ? __pfx_read_tsc+0x10/0x10 [ 14.526087] ? ktime_get_ts64+0x86/0x230 [ 14.526109] kunit_try_run_case+0x1a5/0x480 [ 14.526133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.526154] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.526179] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.526202] ? __kthread_parkme+0x82/0x180 [ 14.526221] ? preempt_count_sub+0x50/0x80 [ 14.526244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.526267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.526290] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.526327] kthread+0x337/0x6f0 [ 14.526346] ? trace_preempt_on+0x20/0xc0 [ 14.526367] ? __pfx_kthread+0x10/0x10 [ 14.526387] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.526407] ? calculate_sigpending+0x7b/0xa0 [ 14.526431] ? __pfx_kthread+0x10/0x10 [ 14.526452] ret_from_fork+0x116/0x1d0 [ 14.526469] ? __pfx_kthread+0x10/0x10 [ 14.526787] ret_from_fork_asm+0x1a/0x30 [ 14.526819] </TASK> [ 14.526830] [ 14.543030] Allocated by task 280: [ 14.543403] kasan_save_stack+0x45/0x70 [ 14.543869] kasan_save_track+0x18/0x40 [ 14.544344] kasan_save_alloc_info+0x3b/0x50 [ 14.544817] __kasan_kmalloc+0xb7/0xc0 [ 14.544949] __kmalloc_cache_noprof+0x189/0x420 [ 14.545341] kasan_bitops_generic+0x92/0x1c0 [ 14.545794] kunit_try_run_case+0x1a5/0x480 [ 14.546268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.546938] kthread+0x337/0x6f0 [ 14.547256] ret_from_fork+0x116/0x1d0 [ 14.547675] ret_from_fork_asm+0x1a/0x30 [ 14.547839] [ 14.548008] The buggy address belongs to the object at ffff8881025c7500 [ 14.548008] which belongs to the cache kmalloc-16 of size 16 [ 14.548960] The buggy address is located 8 bytes inside of [ 14.548960] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.550243] [ 14.550473] The buggy address belongs to the physical page: [ 14.550814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.551697] flags: 0x200000000000000(node=0|zone=2) [ 14.551871] page_type: f5(slab) [ 14.551994] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.552227] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.552908] page dumped because: kasan: bad access detected [ 14.553389] [ 14.553503] Memory state around the buggy address: [ 14.553879] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.554348] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.554894] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.555317] ^ [ 14.555491] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.556038] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.556504] ================================================================== [ 14.476593] ================================================================== [ 14.477229] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.477795] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.478259] [ 14.478385] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.478430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.478441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.478461] Call Trace: [ 14.478473] <TASK> [ 14.478487] dump_stack_lvl+0x73/0xb0 [ 14.478514] print_report+0xd1/0x610 [ 14.478535] ? __virt_addr_valid+0x1db/0x2d0 [ 14.478595] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.478648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.478671] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.478699] kasan_report+0x141/0x180 [ 14.478721] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.478754] kasan_check_range+0x10c/0x1c0 [ 14.478777] __kasan_check_write+0x18/0x20 [ 14.478795] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.478824] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.478853] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.478876] ? trace_hardirqs_on+0x37/0xe0 [ 14.478897] ? kasan_bitops_generic+0x92/0x1c0 [ 14.478924] kasan_bitops_generic+0x121/0x1c0 [ 14.478947] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.478971] ? __pfx_read_tsc+0x10/0x10 [ 14.478991] ? ktime_get_ts64+0x86/0x230 [ 14.479014] kunit_try_run_case+0x1a5/0x480 [ 14.479038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.479060] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.479157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.479181] ? __kthread_parkme+0x82/0x180 [ 14.479200] ? preempt_count_sub+0x50/0x80 [ 14.479224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.479248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.479272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.479296] kthread+0x337/0x6f0 [ 14.479326] ? trace_preempt_on+0x20/0xc0 [ 14.479384] ? __pfx_kthread+0x10/0x10 [ 14.479404] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.479425] ? calculate_sigpending+0x7b/0xa0 [ 14.479448] ? __pfx_kthread+0x10/0x10 [ 14.479469] ret_from_fork+0x116/0x1d0 [ 14.479497] ? __pfx_kthread+0x10/0x10 [ 14.479517] ret_from_fork_asm+0x1a/0x30 [ 14.479579] </TASK> [ 14.479589] [ 14.489757] Allocated by task 280: [ 14.489962] kasan_save_stack+0x45/0x70 [ 14.490228] kasan_save_track+0x18/0x40 [ 14.490437] kasan_save_alloc_info+0x3b/0x50 [ 14.490750] __kasan_kmalloc+0xb7/0xc0 [ 14.490920] __kmalloc_cache_noprof+0x189/0x420 [ 14.491337] kasan_bitops_generic+0x92/0x1c0 [ 14.491573] kunit_try_run_case+0x1a5/0x480 [ 14.491721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.491897] kthread+0x337/0x6f0 [ 14.492064] ret_from_fork+0x116/0x1d0 [ 14.492247] ret_from_fork_asm+0x1a/0x30 [ 14.492522] [ 14.492621] The buggy address belongs to the object at ffff8881025c7500 [ 14.492621] which belongs to the cache kmalloc-16 of size 16 [ 14.493233] The buggy address is located 8 bytes inside of [ 14.493233] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.493885] [ 14.494004] The buggy address belongs to the physical page: [ 14.494194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.494449] flags: 0x200000000000000(node=0|zone=2) [ 14.495089] page_type: f5(slab) [ 14.495428] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.495806] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.496348] page dumped because: kasan: bad access detected [ 14.496678] [ 14.496775] Memory state around the buggy address: [ 14.496961] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.497230] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.497800] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.498206] ^ [ 14.498486] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.498900] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.499221] ==================================================================