Date
June 23, 2025, 1:39 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 20.955503] ================================================================== [ 20.956541] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 20.957419] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.957913] [ 20.958180] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.958444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.958487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.958541] Call Trace: [ 20.958722] <TASK> [ 20.958776] dump_stack_lvl+0x73/0xb0 [ 20.958847] print_report+0xd1/0x650 [ 20.958917] ? __virt_addr_valid+0x1db/0x2d0 [ 20.958988] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 20.959062] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.959136] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 20.959212] kasan_report+0x141/0x180 [ 20.959299] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 20.959424] kasan_check_range+0x10c/0x1c0 [ 20.959504] __kasan_check_write+0x18/0x20 [ 20.959573] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 20.959666] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.959748] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.960219] ? trace_hardirqs_on+0x37/0xe0 [ 20.960300] ? kasan_bitops_generic+0x92/0x1c0 [ 20.960379] kasan_bitops_generic+0x121/0x1c0 [ 20.960442] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.960478] ? __pfx_read_tsc+0x10/0x10 [ 20.960506] ? ktime_get_ts64+0x86/0x230 [ 20.960541] kunit_try_run_case+0x1a5/0x480 [ 20.960576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.960676] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.960754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.960791] ? __kthread_parkme+0x82/0x180 [ 20.960827] ? preempt_count_sub+0x50/0x80 [ 20.960863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.960900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.960935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.960970] kthread+0x337/0x6f0 [ 20.960994] ? trace_preempt_on+0x20/0xc0 [ 20.961026] ? __pfx_kthread+0x10/0x10 [ 20.961051] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.961083] ? calculate_sigpending+0x7b/0xa0 [ 20.961114] ? __pfx_kthread+0x10/0x10 [ 20.961140] ret_from_fork+0x41/0x80 [ 20.961170] ? __pfx_kthread+0x10/0x10 [ 20.961196] ret_from_fork_asm+0x1a/0x30 [ 20.961277] </TASK> [ 20.961294] [ 20.984629] Allocated by task 282: [ 20.985499] kasan_save_stack+0x45/0x70 [ 20.986431] kasan_save_track+0x18/0x40 [ 20.986854] kasan_save_alloc_info+0x3b/0x50 [ 20.987905] __kasan_kmalloc+0xb7/0xc0 [ 20.988648] __kmalloc_cache_noprof+0x189/0x420 [ 20.989040] kasan_bitops_generic+0x92/0x1c0 [ 20.989974] kunit_try_run_case+0x1a5/0x480 [ 20.990805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.991517] kthread+0x337/0x6f0 [ 20.992154] ret_from_fork+0x41/0x80 [ 20.992709] ret_from_fork_asm+0x1a/0x30 [ 20.993396] [ 20.993591] The buggy address belongs to the object at ffff8881025ebc60 [ 20.993591] which belongs to the cache kmalloc-16 of size 16 [ 20.995899] The buggy address is located 8 bytes inside of [ 20.995899] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.997087] [ 20.997362] The buggy address belongs to the physical page: [ 20.998029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.998880] flags: 0x200000000000000(node=0|zone=2) [ 20.999451] page_type: f5(slab) [ 20.999824] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.000894] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.001988] page dumped because: kasan: bad access detected [ 21.002199] [ 21.002626] Memory state around the buggy address: [ 21.003455] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 21.003940] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.004734] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.005615] ^ [ 21.006371] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.007086] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.007681] ================================================================== [ 21.106984] ================================================================== [ 21.107589] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.108391] Read of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 21.108933] [ 21.109186] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.109344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.109375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.109427] Call Trace: [ 21.109475] <TASK> [ 21.109509] dump_stack_lvl+0x73/0xb0 [ 21.109575] print_report+0xd1/0x650 [ 21.109677] ? __virt_addr_valid+0x1db/0x2d0 [ 21.109748] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.109831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.109910] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.109992] kasan_report+0x141/0x180 [ 21.110071] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.110162] __asan_report_load8_noabort+0x18/0x20 [ 21.110279] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.110364] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.110446] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.110517] ? trace_hardirqs_on+0x37/0xe0 [ 21.110595] ? kasan_bitops_generic+0x92/0x1c0 [ 21.110698] kasan_bitops_generic+0x121/0x1c0 [ 21.110772] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.110848] ? __pfx_read_tsc+0x10/0x10 [ 21.110914] ? ktime_get_ts64+0x86/0x230 [ 21.110994] kunit_try_run_case+0x1a5/0x480 [ 21.111069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.111140] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.111255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.111337] ? __kthread_parkme+0x82/0x180 [ 21.111410] ? preempt_count_sub+0x50/0x80 [ 21.111487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.111562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.111655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.111728] kthread+0x337/0x6f0 [ 21.111757] ? trace_preempt_on+0x20/0xc0 [ 21.111793] ? __pfx_kthread+0x10/0x10 [ 21.111818] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.111850] ? calculate_sigpending+0x7b/0xa0 [ 21.111882] ? __pfx_kthread+0x10/0x10 [ 21.111910] ret_from_fork+0x41/0x80 [ 21.111941] ? __pfx_kthread+0x10/0x10 [ 21.111966] ret_from_fork_asm+0x1a/0x30 [ 21.112009] </TASK> [ 21.112023] [ 21.130673] Allocated by task 282: [ 21.131048] kasan_save_stack+0x45/0x70 [ 21.131650] kasan_save_track+0x18/0x40 [ 21.132008] kasan_save_alloc_info+0x3b/0x50 [ 21.132672] __kasan_kmalloc+0xb7/0xc0 [ 21.133035] __kmalloc_cache_noprof+0x189/0x420 [ 21.133645] kasan_bitops_generic+0x92/0x1c0 [ 21.134078] kunit_try_run_case+0x1a5/0x480 [ 21.134565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.135104] kthread+0x337/0x6f0 [ 21.135505] ret_from_fork+0x41/0x80 [ 21.136065] ret_from_fork_asm+0x1a/0x30 [ 21.136525] [ 21.136731] The buggy address belongs to the object at ffff8881025ebc60 [ 21.136731] which belongs to the cache kmalloc-16 of size 16 [ 21.137830] The buggy address is located 8 bytes inside of [ 21.137830] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 21.138824] [ 21.139054] The buggy address belongs to the physical page: [ 21.139692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 21.140451] flags: 0x200000000000000(node=0|zone=2) [ 21.140869] page_type: f5(slab) [ 21.141354] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.142055] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.142702] page dumped because: kasan: bad access detected [ 21.143194] [ 21.143574] Memory state around the buggy address: [ 21.144044] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 21.144649] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.145276] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.145965] ^ [ 21.146567] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.147297] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.147917] ================================================================== [ 20.903999] ================================================================== [ 20.904628] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 20.906117] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.907426] [ 20.907666] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.907830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.907869] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.908049] Call Trace: [ 20.908095] <TASK> [ 20.908139] dump_stack_lvl+0x73/0xb0 [ 20.908217] print_report+0xd1/0x650 [ 20.908290] ? __virt_addr_valid+0x1db/0x2d0 [ 20.908355] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 20.908394] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.908429] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 20.908464] kasan_report+0x141/0x180 [ 20.908497] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 20.908537] kasan_check_range+0x10c/0x1c0 [ 20.908566] __kasan_check_write+0x18/0x20 [ 20.908594] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 20.908688] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.908768] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.908840] ? trace_hardirqs_on+0x37/0xe0 [ 20.908913] ? kasan_bitops_generic+0x92/0x1c0 [ 20.908995] kasan_bitops_generic+0x121/0x1c0 [ 20.909032] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.909063] ? __pfx_read_tsc+0x10/0x10 [ 20.909091] ? ktime_get_ts64+0x86/0x230 [ 20.909125] kunit_try_run_case+0x1a5/0x480 [ 20.909161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.909193] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.909267] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.909308] ? __kthread_parkme+0x82/0x180 [ 20.909340] ? preempt_count_sub+0x50/0x80 [ 20.909376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.909409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.909443] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.909475] kthread+0x337/0x6f0 [ 20.909498] ? trace_preempt_on+0x20/0xc0 [ 20.909530] ? __pfx_kthread+0x10/0x10 [ 20.909553] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.909583] ? calculate_sigpending+0x7b/0xa0 [ 20.909654] ? __pfx_kthread+0x10/0x10 [ 20.909728] ret_from_fork+0x41/0x80 [ 20.909781] ? __pfx_kthread+0x10/0x10 [ 20.909808] ret_from_fork_asm+0x1a/0x30 [ 20.909849] </TASK> [ 20.909864] [ 20.933788] Allocated by task 282: [ 20.934141] kasan_save_stack+0x45/0x70 [ 20.934854] kasan_save_track+0x18/0x40 [ 20.935321] kasan_save_alloc_info+0x3b/0x50 [ 20.935669] __kasan_kmalloc+0xb7/0xc0 [ 20.936253] __kmalloc_cache_noprof+0x189/0x420 [ 20.937119] kasan_bitops_generic+0x92/0x1c0 [ 20.938129] kunit_try_run_case+0x1a5/0x480 [ 20.938555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.939531] kthread+0x337/0x6f0 [ 20.940260] ret_from_fork+0x41/0x80 [ 20.940548] ret_from_fork_asm+0x1a/0x30 [ 20.941039] [ 20.941394] The buggy address belongs to the object at ffff8881025ebc60 [ 20.941394] which belongs to the cache kmalloc-16 of size 16 [ 20.942475] The buggy address is located 8 bytes inside of [ 20.942475] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.943427] [ 20.944119] The buggy address belongs to the physical page: [ 20.944566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.945382] flags: 0x200000000000000(node=0|zone=2) [ 20.946100] page_type: f5(slab) [ 20.946569] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.947513] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.948292] page dumped because: kasan: bad access detected [ 20.949212] [ 20.949449] Memory state around the buggy address: [ 20.950053] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.950875] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.951574] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.952596] ^ [ 20.953229] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.953813] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.954478] ================================================================== [ 20.849272] ================================================================== [ 20.850444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 20.851584] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.852397] [ 20.853105] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.853314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.853353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.853410] Call Trace: [ 20.853446] <TASK> [ 20.853491] dump_stack_lvl+0x73/0xb0 [ 20.853567] print_report+0xd1/0x650 [ 20.853818] ? __virt_addr_valid+0x1db/0x2d0 [ 20.853922] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 20.854000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.854073] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 20.854150] kasan_report+0x141/0x180 [ 20.854262] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 20.854357] kasan_check_range+0x10c/0x1c0 [ 20.854426] __kasan_check_write+0x18/0x20 [ 20.854478] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 20.854516] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.854551] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.854581] ? trace_hardirqs_on+0x37/0xe0 [ 20.854694] ? kasan_bitops_generic+0x92/0x1c0 [ 20.854766] kasan_bitops_generic+0x121/0x1c0 [ 20.854800] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.854833] ? __pfx_read_tsc+0x10/0x10 [ 20.854860] ? ktime_get_ts64+0x86/0x230 [ 20.854897] kunit_try_run_case+0x1a5/0x480 [ 20.854934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.854967] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.855000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.855034] ? __kthread_parkme+0x82/0x180 [ 20.855066] ? preempt_count_sub+0x50/0x80 [ 20.855101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.855136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.855171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.855205] kthread+0x337/0x6f0 [ 20.855272] ? trace_preempt_on+0x20/0xc0 [ 20.855308] ? __pfx_kthread+0x10/0x10 [ 20.855333] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.855364] ? calculate_sigpending+0x7b/0xa0 [ 20.855393] ? __pfx_kthread+0x10/0x10 [ 20.855417] ret_from_fork+0x41/0x80 [ 20.855447] ? __pfx_kthread+0x10/0x10 [ 20.855471] ret_from_fork_asm+0x1a/0x30 [ 20.855511] </TASK> [ 20.855524] [ 20.880279] Allocated by task 282: [ 20.881085] kasan_save_stack+0x45/0x70 [ 20.881572] kasan_save_track+0x18/0x40 [ 20.882079] kasan_save_alloc_info+0x3b/0x50 [ 20.883129] __kasan_kmalloc+0xb7/0xc0 [ 20.883674] __kmalloc_cache_noprof+0x189/0x420 [ 20.884139] kasan_bitops_generic+0x92/0x1c0 [ 20.885160] kunit_try_run_case+0x1a5/0x480 [ 20.886178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.886895] kthread+0x337/0x6f0 [ 20.887274] ret_from_fork+0x41/0x80 [ 20.887625] ret_from_fork_asm+0x1a/0x30 [ 20.888054] [ 20.888267] The buggy address belongs to the object at ffff8881025ebc60 [ 20.888267] which belongs to the cache kmalloc-16 of size 16 [ 20.889457] The buggy address is located 8 bytes inside of [ 20.889457] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.890983] [ 20.891280] The buggy address belongs to the physical page: [ 20.891956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.892786] flags: 0x200000000000000(node=0|zone=2) [ 20.893304] page_type: f5(slab) [ 20.894103] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.894887] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.895742] page dumped because: kasan: bad access detected [ 20.896375] [ 20.896985] Memory state around the buggy address: [ 20.897273] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.898440] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.899274] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.900032] ^ [ 20.900774] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.901400] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.902339] ================================================================== [ 20.802430] ================================================================== [ 20.803428] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 20.804709] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.805535] [ 20.805984] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.806105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.806139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.806194] Call Trace: [ 20.806241] <TASK> [ 20.806285] dump_stack_lvl+0x73/0xb0 [ 20.806391] print_report+0xd1/0x650 [ 20.806476] ? __virt_addr_valid+0x1db/0x2d0 [ 20.806576] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 20.806889] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.806982] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 20.807061] kasan_report+0x141/0x180 [ 20.807102] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 20.807147] kasan_check_range+0x10c/0x1c0 [ 20.807178] __kasan_check_write+0x18/0x20 [ 20.807207] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 20.807243] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.807282] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.807312] ? trace_hardirqs_on+0x37/0xe0 [ 20.807386] ? kasan_bitops_generic+0x92/0x1c0 [ 20.807424] kasan_bitops_generic+0x121/0x1c0 [ 20.807454] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.807486] ? __pfx_read_tsc+0x10/0x10 [ 20.807514] ? ktime_get_ts64+0x86/0x230 [ 20.807550] kunit_try_run_case+0x1a5/0x480 [ 20.807587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.807670] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.807745] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.807784] ? __kthread_parkme+0x82/0x180 [ 20.807817] ? preempt_count_sub+0x50/0x80 [ 20.807854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.807890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.807924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.807960] kthread+0x337/0x6f0 [ 20.807984] ? trace_preempt_on+0x20/0xc0 [ 20.808018] ? __pfx_kthread+0x10/0x10 [ 20.808044] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.808076] ? calculate_sigpending+0x7b/0xa0 [ 20.808108] ? __pfx_kthread+0x10/0x10 [ 20.808135] ret_from_fork+0x41/0x80 [ 20.808168] ? __pfx_kthread+0x10/0x10 [ 20.808192] ret_from_fork_asm+0x1a/0x30 [ 20.808268] </TASK> [ 20.808287] [ 20.829148] Allocated by task 282: [ 20.829499] kasan_save_stack+0x45/0x70 [ 20.830048] kasan_save_track+0x18/0x40 [ 20.830627] kasan_save_alloc_info+0x3b/0x50 [ 20.831428] __kasan_kmalloc+0xb7/0xc0 [ 20.831802] __kmalloc_cache_noprof+0x189/0x420 [ 20.832360] kasan_bitops_generic+0x92/0x1c0 [ 20.832885] kunit_try_run_case+0x1a5/0x480 [ 20.833358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.834057] kthread+0x337/0x6f0 [ 20.834471] ret_from_fork+0x41/0x80 [ 20.835175] ret_from_fork_asm+0x1a/0x30 [ 20.835763] [ 20.836008] The buggy address belongs to the object at ffff8881025ebc60 [ 20.836008] which belongs to the cache kmalloc-16 of size 16 [ 20.836905] The buggy address is located 8 bytes inside of [ 20.836905] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.837702] [ 20.837988] The buggy address belongs to the physical page: [ 20.838470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.839326] flags: 0x200000000000000(node=0|zone=2) [ 20.840206] page_type: f5(slab) [ 20.840667] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.841528] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.842377] page dumped because: kasan: bad access detected [ 20.842785] [ 20.843015] Memory state around the buggy address: [ 20.843649] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.845252] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.845763] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.846005] ^ [ 20.846224] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.846457] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.847018] ================================================================== [ 20.751097] ================================================================== [ 20.751743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 20.752498] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.753701] [ 20.753939] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.754140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.754179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.754297] Call Trace: [ 20.754380] <TASK> [ 20.754429] dump_stack_lvl+0x73/0xb0 [ 20.754505] print_report+0xd1/0x650 [ 20.754576] ? __virt_addr_valid+0x1db/0x2d0 [ 20.754666] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 20.754749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.754826] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 20.754902] kasan_report+0x141/0x180 [ 20.754978] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 20.755068] kasan_check_range+0x10c/0x1c0 [ 20.755136] __kasan_check_write+0x18/0x20 [ 20.755204] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 20.755287] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.755367] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.755437] ? trace_hardirqs_on+0x37/0xe0 [ 20.755510] ? kasan_bitops_generic+0x92/0x1c0 [ 20.755587] kasan_bitops_generic+0x121/0x1c0 [ 20.755675] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.755757] ? __pfx_read_tsc+0x10/0x10 [ 20.755825] ? ktime_get_ts64+0x86/0x230 [ 20.755903] kunit_try_run_case+0x1a5/0x480 [ 20.755979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.756041] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.756080] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.756118] ? __kthread_parkme+0x82/0x180 [ 20.756151] ? preempt_count_sub+0x50/0x80 [ 20.756189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.756262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.756303] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.756340] kthread+0x337/0x6f0 [ 20.756365] ? trace_preempt_on+0x20/0xc0 [ 20.756399] ? __pfx_kthread+0x10/0x10 [ 20.756425] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.756457] ? calculate_sigpending+0x7b/0xa0 [ 20.756490] ? __pfx_kthread+0x10/0x10 [ 20.756518] ret_from_fork+0x41/0x80 [ 20.756548] ? __pfx_kthread+0x10/0x10 [ 20.756574] ret_from_fork_asm+0x1a/0x30 [ 20.756701] </TASK> [ 20.756747] [ 20.778878] Allocated by task 282: [ 20.779545] kasan_save_stack+0x45/0x70 [ 20.779991] kasan_save_track+0x18/0x40 [ 20.780858] kasan_save_alloc_info+0x3b/0x50 [ 20.781438] __kasan_kmalloc+0xb7/0xc0 [ 20.781770] __kmalloc_cache_noprof+0x189/0x420 [ 20.782105] kasan_bitops_generic+0x92/0x1c0 [ 20.782970] kunit_try_run_case+0x1a5/0x480 [ 20.784072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.785058] kthread+0x337/0x6f0 [ 20.785411] ret_from_fork+0x41/0x80 [ 20.785853] ret_from_fork_asm+0x1a/0x30 [ 20.786531] [ 20.786957] The buggy address belongs to the object at ffff8881025ebc60 [ 20.786957] which belongs to the cache kmalloc-16 of size 16 [ 20.788433] The buggy address is located 8 bytes inside of [ 20.788433] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.789641] [ 20.790165] The buggy address belongs to the physical page: [ 20.790698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.792001] flags: 0x200000000000000(node=0|zone=2) [ 20.792856] page_type: f5(slab) [ 20.793180] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.794033] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.794923] page dumped because: kasan: bad access detected [ 20.795470] [ 20.795729] Memory state around the buggy address: [ 20.796582] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.797182] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.797797] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.798708] ^ [ 20.799729] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.800388] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.801370] ================================================================== [ 21.062033] ================================================================== [ 21.062899] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.063799] Read of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 21.064532] [ 21.064925] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.065045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.065079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.065137] Call Trace: [ 21.065176] <TASK> [ 21.065235] dump_stack_lvl+0x73/0xb0 [ 21.065313] print_report+0xd1/0x650 [ 21.065387] ? __virt_addr_valid+0x1db/0x2d0 [ 21.065462] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.065539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.065630] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.065709] kasan_report+0x141/0x180 [ 21.065797] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.065886] kasan_check_range+0x10c/0x1c0 [ 21.065948] __kasan_check_read+0x15/0x20 [ 21.065980] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.066017] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.066055] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.066086] ? trace_hardirqs_on+0x37/0xe0 [ 21.066120] ? kasan_bitops_generic+0x92/0x1c0 [ 21.066152] kasan_bitops_generic+0x121/0x1c0 [ 21.066181] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.066219] ? __pfx_read_tsc+0x10/0x10 [ 21.066273] ? ktime_get_ts64+0x86/0x230 [ 21.066311] kunit_try_run_case+0x1a5/0x480 [ 21.066348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.066382] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.066416] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.066452] ? __kthread_parkme+0x82/0x180 [ 21.066486] ? preempt_count_sub+0x50/0x80 [ 21.066523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.066558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.066592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.066653] kthread+0x337/0x6f0 [ 21.066679] ? trace_preempt_on+0x20/0xc0 [ 21.066713] ? __pfx_kthread+0x10/0x10 [ 21.066738] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.066769] ? calculate_sigpending+0x7b/0xa0 [ 21.066801] ? __pfx_kthread+0x10/0x10 [ 21.066827] ret_from_fork+0x41/0x80 [ 21.066857] ? __pfx_kthread+0x10/0x10 [ 21.066882] ret_from_fork_asm+0x1a/0x30 [ 21.066925] </TASK> [ 21.066939] [ 21.086963] Allocated by task 282: [ 21.087508] kasan_save_stack+0x45/0x70 [ 21.087848] kasan_save_track+0x18/0x40 [ 21.088397] kasan_save_alloc_info+0x3b/0x50 [ 21.088843] __kasan_kmalloc+0xb7/0xc0 [ 21.089400] __kmalloc_cache_noprof+0x189/0x420 [ 21.089794] kasan_bitops_generic+0x92/0x1c0 [ 21.090185] kunit_try_run_case+0x1a5/0x480 [ 21.090918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.091809] kthread+0x337/0x6f0 [ 21.092460] ret_from_fork+0x41/0x80 [ 21.093440] ret_from_fork_asm+0x1a/0x30 [ 21.094123] [ 21.094335] The buggy address belongs to the object at ffff8881025ebc60 [ 21.094335] which belongs to the cache kmalloc-16 of size 16 [ 21.095228] The buggy address is located 8 bytes inside of [ 21.095228] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 21.096200] [ 21.096375] The buggy address belongs to the physical page: [ 21.096777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 21.098050] flags: 0x200000000000000(node=0|zone=2) [ 21.098313] page_type: f5(slab) [ 21.099105] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.099821] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.100434] page dumped because: kasan: bad access detected [ 21.101129] [ 21.101393] Memory state around the buggy address: [ 21.102097] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 21.102831] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.103587] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.104092] ^ [ 21.104699] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.105207] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.105814] ================================================================== [ 20.707500] ================================================================== [ 20.708311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 20.709511] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.710164] [ 20.710450] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.710573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.710630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.710688] Call Trace: [ 20.710738] <TASK> [ 20.710787] dump_stack_lvl+0x73/0xb0 [ 20.710866] print_report+0xd1/0x650 [ 20.710944] ? __virt_addr_valid+0x1db/0x2d0 [ 20.711020] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 20.711094] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.711172] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 20.711251] kasan_report+0x141/0x180 [ 20.711330] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 20.711420] kasan_check_range+0x10c/0x1c0 [ 20.711497] __kasan_check_write+0x18/0x20 [ 20.711573] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 20.711820] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.711868] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.711898] ? trace_hardirqs_on+0x37/0xe0 [ 20.711933] ? kasan_bitops_generic+0x92/0x1c0 [ 20.711968] kasan_bitops_generic+0x121/0x1c0 [ 20.711995] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.712025] ? __pfx_read_tsc+0x10/0x10 [ 20.712052] ? ktime_get_ts64+0x86/0x230 [ 20.712087] kunit_try_run_case+0x1a5/0x480 [ 20.712122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.712156] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.712190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.712257] ? __kthread_parkme+0x82/0x180 [ 20.712293] ? preempt_count_sub+0x50/0x80 [ 20.712331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.712366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.712400] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.712433] kthread+0x337/0x6f0 [ 20.712457] ? trace_preempt_on+0x20/0xc0 [ 20.712488] ? __pfx_kthread+0x10/0x10 [ 20.712513] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.712544] ? calculate_sigpending+0x7b/0xa0 [ 20.712575] ? __pfx_kthread+0x10/0x10 [ 20.712621] ret_from_fork+0x41/0x80 [ 20.712731] ? __pfx_kthread+0x10/0x10 [ 20.712805] ret_from_fork_asm+0x1a/0x30 [ 20.712906] </TASK> [ 20.712937] [ 20.730901] Allocated by task 282: [ 20.731245] kasan_save_stack+0x45/0x70 [ 20.731781] kasan_save_track+0x18/0x40 [ 20.732144] kasan_save_alloc_info+0x3b/0x50 [ 20.732577] __kasan_kmalloc+0xb7/0xc0 [ 20.733006] __kmalloc_cache_noprof+0x189/0x420 [ 20.733477] kasan_bitops_generic+0x92/0x1c0 [ 20.734386] kunit_try_run_case+0x1a5/0x480 [ 20.734902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.735433] kthread+0x337/0x6f0 [ 20.735957] ret_from_fork+0x41/0x80 [ 20.736382] ret_from_fork_asm+0x1a/0x30 [ 20.736741] [ 20.736919] The buggy address belongs to the object at ffff8881025ebc60 [ 20.736919] which belongs to the cache kmalloc-16 of size 16 [ 20.737893] The buggy address is located 8 bytes inside of [ 20.737893] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.738999] [ 20.739304] The buggy address belongs to the physical page: [ 20.739752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.740820] flags: 0x200000000000000(node=0|zone=2) [ 20.741192] page_type: f5(slab) [ 20.741562] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.742415] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.743153] page dumped because: kasan: bad access detected [ 20.743517] [ 20.743714] Memory state around the buggy address: [ 20.744151] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.745108] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.746045] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.746600] ^ [ 20.747035] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.747974] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.748574] ================================================================== [ 21.008661] ================================================================== [ 21.009162] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.011256] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 21.012365] [ 21.012872] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 21.012996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.013034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.013088] Call Trace: [ 21.013135] <TASK> [ 21.013180] dump_stack_lvl+0x73/0xb0 [ 21.013293] print_report+0xd1/0x650 [ 21.013372] ? __virt_addr_valid+0x1db/0x2d0 [ 21.013445] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.013521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.013972] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.014066] kasan_report+0x141/0x180 [ 21.014146] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.014277] kasan_check_range+0x10c/0x1c0 [ 21.014358] __kasan_check_write+0x18/0x20 [ 21.014433] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.014512] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.014591] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.014687] ? trace_hardirqs_on+0x37/0xe0 [ 21.014764] ? kasan_bitops_generic+0x92/0x1c0 [ 21.014801] kasan_bitops_generic+0x121/0x1c0 [ 21.014832] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.014863] ? __pfx_read_tsc+0x10/0x10 [ 21.014891] ? ktime_get_ts64+0x86/0x230 [ 21.014927] kunit_try_run_case+0x1a5/0x480 [ 21.014963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.014995] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.015029] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.015064] ? __kthread_parkme+0x82/0x180 [ 21.015096] ? preempt_count_sub+0x50/0x80 [ 21.015131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.015167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.015201] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.015263] kthread+0x337/0x6f0 [ 21.015290] ? trace_preempt_on+0x20/0xc0 [ 21.015324] ? __pfx_kthread+0x10/0x10 [ 21.015349] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.015380] ? calculate_sigpending+0x7b/0xa0 [ 21.015411] ? __pfx_kthread+0x10/0x10 [ 21.015437] ret_from_fork+0x41/0x80 [ 21.015469] ? __pfx_kthread+0x10/0x10 [ 21.015495] ret_from_fork_asm+0x1a/0x30 [ 21.015538] </TASK> [ 21.015552] [ 21.040044] Allocated by task 282: [ 21.040479] kasan_save_stack+0x45/0x70 [ 21.041138] kasan_save_track+0x18/0x40 [ 21.041566] kasan_save_alloc_info+0x3b/0x50 [ 21.042399] __kasan_kmalloc+0xb7/0xc0 [ 21.042874] __kmalloc_cache_noprof+0x189/0x420 [ 21.043240] kasan_bitops_generic+0x92/0x1c0 [ 21.043807] kunit_try_run_case+0x1a5/0x480 [ 21.044319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.044990] kthread+0x337/0x6f0 [ 21.045410] ret_from_fork+0x41/0x80 [ 21.046200] ret_from_fork_asm+0x1a/0x30 [ 21.046840] [ 21.047056] The buggy address belongs to the object at ffff8881025ebc60 [ 21.047056] which belongs to the cache kmalloc-16 of size 16 [ 21.048011] The buggy address is located 8 bytes inside of [ 21.048011] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 21.049331] [ 21.049560] The buggy address belongs to the physical page: [ 21.050400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 21.051186] flags: 0x200000000000000(node=0|zone=2) [ 21.051822] page_type: f5(slab) [ 21.052190] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.052986] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.053871] page dumped because: kasan: bad access detected [ 21.054431] [ 21.054651] Memory state around the buggy address: [ 21.055073] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 21.056254] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.057205] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.058158] ^ [ 21.059200] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.059808] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.060623] ==================================================================