Date
July 1, 2025, 12:10 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.706815] ================================================================== [ 13.707255] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.707636] Read of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.708049] [ 13.708175] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.708240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.708252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.708272] Call Trace: [ 13.708287] <TASK> [ 13.708301] dump_stack_lvl+0x73/0xb0 [ 13.708329] print_report+0xd1/0x650 [ 13.708352] ? __virt_addr_valid+0x1db/0x2d0 [ 13.708374] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.708420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.708442] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.708468] kasan_report+0x141/0x180 [ 13.708489] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.708521] kasan_check_range+0x10c/0x1c0 [ 13.708544] __kasan_check_read+0x15/0x20 [ 13.708563] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.708589] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.708616] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.708662] ? finish_task_switch.isra.0+0x156/0x700 [ 13.708684] ? kasan_bitops_generic+0x92/0x1c0 [ 13.708710] kasan_bitops_generic+0x121/0x1c0 [ 13.708734] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.708757] ? __pfx_read_tsc+0x10/0x10 [ 13.708777] ? ktime_get_ts64+0x86/0x230 [ 13.708800] kunit_try_run_case+0x1a5/0x480 [ 13.708823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.708844] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.708867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.708890] ? __kthread_parkme+0x82/0x180 [ 13.708910] ? preempt_count_sub+0x50/0x80 [ 13.708932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.708956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.708979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.709002] kthread+0x337/0x6f0 [ 13.709021] ? trace_preempt_on+0x20/0xc0 [ 13.709055] ? __pfx_kthread+0x10/0x10 [ 13.709075] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.709095] ? calculate_sigpending+0x7b/0xa0 [ 13.709118] ? __pfx_kthread+0x10/0x10 [ 13.709158] ret_from_fork+0x116/0x1d0 [ 13.709177] ? __pfx_kthread+0x10/0x10 [ 13.709197] ret_from_fork_asm+0x1a/0x30 [ 13.709227] </TASK> [ 13.709237] [ 13.717124] Allocated by task 278: [ 13.717322] kasan_save_stack+0x45/0x70 [ 13.717487] kasan_save_track+0x18/0x40 [ 13.717627] kasan_save_alloc_info+0x3b/0x50 [ 13.717782] __kasan_kmalloc+0xb7/0xc0 [ 13.717978] __kmalloc_cache_noprof+0x189/0x420 [ 13.718232] kasan_bitops_generic+0x92/0x1c0 [ 13.718460] kunit_try_run_case+0x1a5/0x480 [ 13.718667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.718858] kthread+0x337/0x6f0 [ 13.718980] ret_from_fork+0x116/0x1d0 [ 13.719204] ret_from_fork_asm+0x1a/0x30 [ 13.719421] [ 13.719515] The buggy address belongs to the object at ffff8881027a1100 [ 13.719515] which belongs to the cache kmalloc-16 of size 16 [ 13.719883] The buggy address is located 8 bytes inside of [ 13.719883] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.720344] [ 13.720463] The buggy address belongs to the physical page: [ 13.720731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.721149] flags: 0x200000000000000(node=0|zone=2) [ 13.721384] page_type: f5(slab) [ 13.721567] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.721801] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.722085] page dumped because: kasan: bad access detected [ 13.722358] [ 13.722474] Memory state around the buggy address: [ 13.722701] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.723000] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.723270] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.723537] ^ [ 13.723709] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.724059] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.724374] ================================================================== [ 13.621375] ================================================================== [ 13.621721] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.622129] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.622444] [ 13.622552] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.622593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.622605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.622625] Call Trace: [ 13.622639] <TASK> [ 13.622652] dump_stack_lvl+0x73/0xb0 [ 13.622677] print_report+0xd1/0x650 [ 13.622699] ? __virt_addr_valid+0x1db/0x2d0 [ 13.622721] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.622747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.622769] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.622797] kasan_report+0x141/0x180 [ 13.622817] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.622848] kasan_check_range+0x10c/0x1c0 [ 13.622871] __kasan_check_write+0x18/0x20 [ 13.622889] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.622915] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.622942] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.622965] ? finish_task_switch.isra.0+0x156/0x700 [ 13.622987] ? kasan_bitops_generic+0x92/0x1c0 [ 13.623014] kasan_bitops_generic+0x121/0x1c0 [ 13.623436] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.623467] ? __pfx_read_tsc+0x10/0x10 [ 13.623489] ? ktime_get_ts64+0x86/0x230 [ 13.623512] kunit_try_run_case+0x1a5/0x480 [ 13.623536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.623557] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.623579] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.623602] ? __kthread_parkme+0x82/0x180 [ 13.623620] ? preempt_count_sub+0x50/0x80 [ 13.623642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.623665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.623688] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.623710] kthread+0x337/0x6f0 [ 13.623729] ? trace_preempt_on+0x20/0xc0 [ 13.623752] ? __pfx_kthread+0x10/0x10 [ 13.623771] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.623792] ? calculate_sigpending+0x7b/0xa0 [ 13.623814] ? __pfx_kthread+0x10/0x10 [ 13.623835] ret_from_fork+0x116/0x1d0 [ 13.623854] ? __pfx_kthread+0x10/0x10 [ 13.623876] ret_from_fork_asm+0x1a/0x30 [ 13.623905] </TASK> [ 13.623915] [ 13.631567] Allocated by task 278: [ 13.631747] kasan_save_stack+0x45/0x70 [ 13.631950] kasan_save_track+0x18/0x40 [ 13.632183] kasan_save_alloc_info+0x3b/0x50 [ 13.632366] __kasan_kmalloc+0xb7/0xc0 [ 13.632547] __kmalloc_cache_noprof+0x189/0x420 [ 13.632740] kasan_bitops_generic+0x92/0x1c0 [ 13.632933] kunit_try_run_case+0x1a5/0x480 [ 13.633123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.633367] kthread+0x337/0x6f0 [ 13.633506] ret_from_fork+0x116/0x1d0 [ 13.633670] ret_from_fork_asm+0x1a/0x30 [ 13.633850] [ 13.633926] The buggy address belongs to the object at ffff8881027a1100 [ 13.633926] which belongs to the cache kmalloc-16 of size 16 [ 13.634446] The buggy address is located 8 bytes inside of [ 13.634446] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.634823] [ 13.634893] The buggy address belongs to the physical page: [ 13.635082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.635346] flags: 0x200000000000000(node=0|zone=2) [ 13.635574] page_type: f5(slab) [ 13.635736] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.636072] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.636429] page dumped because: kasan: bad access detected [ 13.636679] [ 13.636763] Memory state around the buggy address: [ 13.636915] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.637158] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.637374] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.637671] ^ [ 13.637845] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.638205] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.638525] ================================================================== [ 13.585783] ================================================================== [ 13.586435] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.586835] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.587155] [ 13.587267] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.587308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.587320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.587340] Call Trace: [ 13.587352] <TASK> [ 13.587366] dump_stack_lvl+0x73/0xb0 [ 13.587391] print_report+0xd1/0x650 [ 13.587413] ? __virt_addr_valid+0x1db/0x2d0 [ 13.587434] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.587460] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.587482] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.587508] kasan_report+0x141/0x180 [ 13.587529] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.587560] kasan_check_range+0x10c/0x1c0 [ 13.587583] __kasan_check_write+0x18/0x20 [ 13.587602] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.587628] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.587654] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.587679] ? finish_task_switch.isra.0+0x156/0x700 [ 13.587700] ? kasan_bitops_generic+0x92/0x1c0 [ 13.587727] kasan_bitops_generic+0x121/0x1c0 [ 13.587750] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.587774] ? __pfx_read_tsc+0x10/0x10 [ 13.587794] ? ktime_get_ts64+0x86/0x230 [ 13.587817] kunit_try_run_case+0x1a5/0x480 [ 13.587839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.587861] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.587884] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.587906] ? __kthread_parkme+0x82/0x180 [ 13.587926] ? preempt_count_sub+0x50/0x80 [ 13.587948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.587971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.587994] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.588017] kthread+0x337/0x6f0 [ 13.588046] ? trace_preempt_on+0x20/0xc0 [ 13.588068] ? __pfx_kthread+0x10/0x10 [ 13.588088] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.588108] ? calculate_sigpending+0x7b/0xa0 [ 13.588150] ? __pfx_kthread+0x10/0x10 [ 13.588173] ret_from_fork+0x116/0x1d0 [ 13.588190] ? __pfx_kthread+0x10/0x10 [ 13.588210] ret_from_fork_asm+0x1a/0x30 [ 13.588239] </TASK> [ 13.588250] [ 13.595833] Allocated by task 278: [ 13.596011] kasan_save_stack+0x45/0x70 [ 13.596247] kasan_save_track+0x18/0x40 [ 13.596441] kasan_save_alloc_info+0x3b/0x50 [ 13.596660] __kasan_kmalloc+0xb7/0xc0 [ 13.596834] __kmalloc_cache_noprof+0x189/0x420 [ 13.597044] kasan_bitops_generic+0x92/0x1c0 [ 13.597271] kunit_try_run_case+0x1a5/0x480 [ 13.597445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.597689] kthread+0x337/0x6f0 [ 13.597838] ret_from_fork+0x116/0x1d0 [ 13.598001] ret_from_fork_asm+0x1a/0x30 [ 13.598220] [ 13.598299] The buggy address belongs to the object at ffff8881027a1100 [ 13.598299] which belongs to the cache kmalloc-16 of size 16 [ 13.598757] The buggy address is located 8 bytes inside of [ 13.598757] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.599260] [ 13.599356] The buggy address belongs to the physical page: [ 13.599582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.599849] flags: 0x200000000000000(node=0|zone=2) [ 13.600084] page_type: f5(slab) [ 13.600259] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.600524] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.600750] page dumped because: kasan: bad access detected [ 13.600920] [ 13.600989] Memory state around the buggy address: [ 13.601202] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.601535] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.601851] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.602196] ^ [ 13.602374] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.602623] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.602837] ================================================================== [ 13.603639] ================================================================== [ 13.603989] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.604461] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.604799] [ 13.604903] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.604945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.604957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.604978] Call Trace: [ 13.604992] <TASK> [ 13.605008] dump_stack_lvl+0x73/0xb0 [ 13.605043] print_report+0xd1/0x650 [ 13.605065] ? __virt_addr_valid+0x1db/0x2d0 [ 13.605087] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.605113] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.605155] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.605184] kasan_report+0x141/0x180 [ 13.605205] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.605236] kasan_check_range+0x10c/0x1c0 [ 13.605260] __kasan_check_write+0x18/0x20 [ 13.605278] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.605305] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.605333] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.605357] ? finish_task_switch.isra.0+0x156/0x700 [ 13.605378] ? kasan_bitops_generic+0x92/0x1c0 [ 13.605404] kasan_bitops_generic+0x121/0x1c0 [ 13.605427] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.605451] ? __pfx_read_tsc+0x10/0x10 [ 13.605472] ? ktime_get_ts64+0x86/0x230 [ 13.605494] kunit_try_run_case+0x1a5/0x480 [ 13.605518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.605539] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.605560] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.605583] ? __kthread_parkme+0x82/0x180 [ 13.605601] ? preempt_count_sub+0x50/0x80 [ 13.605623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.605648] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.605670] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.605693] kthread+0x337/0x6f0 [ 13.605713] ? trace_preempt_on+0x20/0xc0 [ 13.605734] ? __pfx_kthread+0x10/0x10 [ 13.605755] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.605775] ? calculate_sigpending+0x7b/0xa0 [ 13.605799] ? __pfx_kthread+0x10/0x10 [ 13.605820] ret_from_fork+0x116/0x1d0 [ 13.605838] ? __pfx_kthread+0x10/0x10 [ 13.605859] ret_from_fork_asm+0x1a/0x30 [ 13.605890] </TASK> [ 13.605900] [ 13.613558] Allocated by task 278: [ 13.613687] kasan_save_stack+0x45/0x70 [ 13.613894] kasan_save_track+0x18/0x40 [ 13.614100] kasan_save_alloc_info+0x3b/0x50 [ 13.614333] __kasan_kmalloc+0xb7/0xc0 [ 13.614522] __kmalloc_cache_noprof+0x189/0x420 [ 13.614742] kasan_bitops_generic+0x92/0x1c0 [ 13.614955] kunit_try_run_case+0x1a5/0x480 [ 13.615176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.615352] kthread+0x337/0x6f0 [ 13.615472] ret_from_fork+0x116/0x1d0 [ 13.615603] ret_from_fork_asm+0x1a/0x30 [ 13.615787] [ 13.615879] The buggy address belongs to the object at ffff8881027a1100 [ 13.615879] which belongs to the cache kmalloc-16 of size 16 [ 13.616426] The buggy address is located 8 bytes inside of [ 13.616426] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.616802] [ 13.616897] The buggy address belongs to the physical page: [ 13.617186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.617495] flags: 0x200000000000000(node=0|zone=2) [ 13.617657] page_type: f5(slab) [ 13.617776] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.618009] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.618321] page dumped because: kasan: bad access detected [ 13.618578] [ 13.618672] Memory state around the buggy address: [ 13.618904] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.619271] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.619588] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.619913] ^ [ 13.620096] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.620408] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.620684] ================================================================== [ 13.565961] ================================================================== [ 13.566538] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.566821] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.567153] [ 13.567262] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.567303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.567314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.567334] Call Trace: [ 13.567347] <TASK> [ 13.567361] dump_stack_lvl+0x73/0xb0 [ 13.567386] print_report+0xd1/0x650 [ 13.567407] ? __virt_addr_valid+0x1db/0x2d0 [ 13.567429] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.567455] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.567477] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.567504] kasan_report+0x141/0x180 [ 13.567524] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.567555] kasan_check_range+0x10c/0x1c0 [ 13.567578] __kasan_check_write+0x18/0x20 [ 13.567597] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.567623] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.567650] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.567674] ? finish_task_switch.isra.0+0x156/0x700 [ 13.567695] ? kasan_bitops_generic+0x92/0x1c0 [ 13.567721] kasan_bitops_generic+0x121/0x1c0 [ 13.567744] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.567767] ? __pfx_read_tsc+0x10/0x10 [ 13.567788] ? ktime_get_ts64+0x86/0x230 [ 13.567809] kunit_try_run_case+0x1a5/0x480 [ 13.567831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.567853] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.567875] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.567897] ? __kthread_parkme+0x82/0x180 [ 13.567917] ? preempt_count_sub+0x50/0x80 [ 13.567939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.567963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.567985] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.568008] kthread+0x337/0x6f0 [ 13.568037] ? trace_preempt_on+0x20/0xc0 [ 13.568059] ? __pfx_kthread+0x10/0x10 [ 13.568079] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.568100] ? calculate_sigpending+0x7b/0xa0 [ 13.568123] ? __pfx_kthread+0x10/0x10 [ 13.568163] ret_from_fork+0x116/0x1d0 [ 13.568181] ? __pfx_kthread+0x10/0x10 [ 13.568201] ret_from_fork_asm+0x1a/0x30 [ 13.568230] </TASK> [ 13.568241] [ 13.575937] Allocated by task 278: [ 13.576362] kasan_save_stack+0x45/0x70 [ 13.577098] kasan_save_track+0x18/0x40 [ 13.577309] kasan_save_alloc_info+0x3b/0x50 [ 13.577520] __kasan_kmalloc+0xb7/0xc0 [ 13.577709] __kmalloc_cache_noprof+0x189/0x420 [ 13.577932] kasan_bitops_generic+0x92/0x1c0 [ 13.578412] kunit_try_run_case+0x1a5/0x480 [ 13.578807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.579257] kthread+0x337/0x6f0 [ 13.579559] ret_from_fork+0x116/0x1d0 [ 13.579850] ret_from_fork_asm+0x1a/0x30 [ 13.580250] [ 13.580505] The buggy address belongs to the object at ffff8881027a1100 [ 13.580505] which belongs to the cache kmalloc-16 of size 16 [ 13.580998] The buggy address is located 8 bytes inside of [ 13.580998] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.581483] [ 13.581563] The buggy address belongs to the physical page: [ 13.581808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.582093] flags: 0x200000000000000(node=0|zone=2) [ 13.582357] page_type: f5(slab) [ 13.582531] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.582816] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.583153] page dumped because: kasan: bad access detected [ 13.583346] [ 13.583438] Memory state around the buggy address: [ 13.583646] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.583925] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.584241] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.584521] ^ [ 13.584673] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.584966] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.585288] ================================================================== [ 13.679574] ================================================================== [ 13.679889] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.680960] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.681487] [ 13.681739] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.681917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.681933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.681955] Call Trace: [ 13.681978] <TASK> [ 13.681993] dump_stack_lvl+0x73/0xb0 [ 13.682024] print_report+0xd1/0x650 [ 13.682057] ? __virt_addr_valid+0x1db/0x2d0 [ 13.682078] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.682103] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.682126] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.682155] kasan_report+0x141/0x180 [ 13.682178] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.682209] kasan_check_range+0x10c/0x1c0 [ 13.682231] __kasan_check_write+0x18/0x20 [ 13.682250] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.682276] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.682303] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.682326] ? finish_task_switch.isra.0+0x156/0x700 [ 13.682347] ? kasan_bitops_generic+0x92/0x1c0 [ 13.682373] kasan_bitops_generic+0x121/0x1c0 [ 13.682395] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.682419] ? __pfx_read_tsc+0x10/0x10 [ 13.682439] ? ktime_get_ts64+0x86/0x230 [ 13.682461] kunit_try_run_case+0x1a5/0x480 [ 13.682484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.682505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.682527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.682549] ? __kthread_parkme+0x82/0x180 [ 13.682568] ? preempt_count_sub+0x50/0x80 [ 13.682590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.682613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.682636] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.682659] kthread+0x337/0x6f0 [ 13.682677] ? trace_preempt_on+0x20/0xc0 [ 13.682700] ? __pfx_kthread+0x10/0x10 [ 13.682720] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.682740] ? calculate_sigpending+0x7b/0xa0 [ 13.682763] ? __pfx_kthread+0x10/0x10 [ 13.682785] ret_from_fork+0x116/0x1d0 [ 13.682802] ? __pfx_kthread+0x10/0x10 [ 13.682822] ret_from_fork_asm+0x1a/0x30 [ 13.682851] </TASK> [ 13.682863] [ 13.695562] Allocated by task 278: [ 13.695886] kasan_save_stack+0x45/0x70 [ 13.696326] kasan_save_track+0x18/0x40 [ 13.696709] kasan_save_alloc_info+0x3b/0x50 [ 13.697018] __kasan_kmalloc+0xb7/0xc0 [ 13.697381] __kmalloc_cache_noprof+0x189/0x420 [ 13.697728] kasan_bitops_generic+0x92/0x1c0 [ 13.698057] kunit_try_run_case+0x1a5/0x480 [ 13.698301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.698543] kthread+0x337/0x6f0 [ 13.698707] ret_from_fork+0x116/0x1d0 [ 13.698885] ret_from_fork_asm+0x1a/0x30 [ 13.699085] [ 13.699530] The buggy address belongs to the object at ffff8881027a1100 [ 13.699530] which belongs to the cache kmalloc-16 of size 16 [ 13.700605] The buggy address is located 8 bytes inside of [ 13.700605] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.701641] [ 13.701721] The buggy address belongs to the physical page: [ 13.701889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.702136] flags: 0x200000000000000(node=0|zone=2) [ 13.702723] page_type: f5(slab) [ 13.702865] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.703121] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.703357] page dumped because: kasan: bad access detected [ 13.703531] [ 13.703604] Memory state around the buggy address: [ 13.703758] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.703971] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.704277] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.704591] ^ [ 13.704812] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.705182] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.705524] ================================================================== [ 13.725324] ================================================================== [ 13.725635] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.725957] Read of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.726365] [ 13.726474] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.726514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.726548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.726566] Call Trace: [ 13.726579] <TASK> [ 13.726594] dump_stack_lvl+0x73/0xb0 [ 13.726620] print_report+0xd1/0x650 [ 13.726641] ? __virt_addr_valid+0x1db/0x2d0 [ 13.726662] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.726687] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.726728] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.726754] kasan_report+0x141/0x180 [ 13.726777] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.726808] __asan_report_load8_noabort+0x18/0x20 [ 13.726831] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.726857] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.726885] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.726923] ? finish_task_switch.isra.0+0x156/0x700 [ 13.726944] ? kasan_bitops_generic+0x92/0x1c0 [ 13.726971] kasan_bitops_generic+0x121/0x1c0 [ 13.726993] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.727019] ? __pfx_read_tsc+0x10/0x10 [ 13.727049] ? ktime_get_ts64+0x86/0x230 [ 13.727076] kunit_try_run_case+0x1a5/0x480 [ 13.727098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.727120] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.727163] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.727205] ? __kthread_parkme+0x82/0x180 [ 13.727226] ? preempt_count_sub+0x50/0x80 [ 13.727248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.727271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.727293] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.727315] kthread+0x337/0x6f0 [ 13.727334] ? trace_preempt_on+0x20/0xc0 [ 13.727356] ? __pfx_kthread+0x10/0x10 [ 13.727376] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.727396] ? calculate_sigpending+0x7b/0xa0 [ 13.727419] ? __pfx_kthread+0x10/0x10 [ 13.727440] ret_from_fork+0x116/0x1d0 [ 13.727457] ? __pfx_kthread+0x10/0x10 [ 13.727477] ret_from_fork_asm+0x1a/0x30 [ 13.727505] </TASK> [ 13.727517] [ 13.735459] Allocated by task 278: [ 13.735613] kasan_save_stack+0x45/0x70 [ 13.735760] kasan_save_track+0x18/0x40 [ 13.735926] kasan_save_alloc_info+0x3b/0x50 [ 13.736175] __kasan_kmalloc+0xb7/0xc0 [ 13.736364] __kmalloc_cache_noprof+0x189/0x420 [ 13.736611] kasan_bitops_generic+0x92/0x1c0 [ 13.736762] kunit_try_run_case+0x1a5/0x480 [ 13.736905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.737211] kthread+0x337/0x6f0 [ 13.737383] ret_from_fork+0x116/0x1d0 [ 13.737570] ret_from_fork_asm+0x1a/0x30 [ 13.737753] [ 13.737865] The buggy address belongs to the object at ffff8881027a1100 [ 13.737865] which belongs to the cache kmalloc-16 of size 16 [ 13.738345] The buggy address is located 8 bytes inside of [ 13.738345] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.738694] [ 13.738782] The buggy address belongs to the physical page: [ 13.739070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.739477] flags: 0x200000000000000(node=0|zone=2) [ 13.739715] page_type: f5(slab) [ 13.739902] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.740273] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.740545] page dumped because: kasan: bad access detected [ 13.740801] [ 13.740921] Memory state around the buggy address: [ 13.741163] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.741473] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.741779] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.742074] ^ [ 13.742245] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.742549] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.742856] ================================================================== [ 13.657292] ================================================================== [ 13.657657] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.658291] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.658595] [ 13.658679] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.658722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.658735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.658754] Call Trace: [ 13.658769] <TASK> [ 13.658783] dump_stack_lvl+0x73/0xb0 [ 13.658809] print_report+0xd1/0x650 [ 13.658830] ? __virt_addr_valid+0x1db/0x2d0 [ 13.658852] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.658878] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.658900] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.658926] kasan_report+0x141/0x180 [ 13.658949] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.658979] kasan_check_range+0x10c/0x1c0 [ 13.659002] __kasan_check_write+0x18/0x20 [ 13.659021] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.659066] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.659093] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.659117] ? finish_task_switch.isra.0+0x156/0x700 [ 13.659159] ? kasan_bitops_generic+0x92/0x1c0 [ 13.659186] kasan_bitops_generic+0x121/0x1c0 [ 13.659209] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.659233] ? __pfx_read_tsc+0x10/0x10 [ 13.659253] ? ktime_get_ts64+0x86/0x230 [ 13.659275] kunit_try_run_case+0x1a5/0x480 [ 13.659297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.659319] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.659341] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.659363] ? __kthread_parkme+0x82/0x180 [ 13.659383] ? preempt_count_sub+0x50/0x80 [ 13.659407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.659430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.659451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.659475] kthread+0x337/0x6f0 [ 13.659494] ? trace_preempt_on+0x20/0xc0 [ 13.659518] ? __pfx_kthread+0x10/0x10 [ 13.659537] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.659558] ? calculate_sigpending+0x7b/0xa0 [ 13.659580] ? __pfx_kthread+0x10/0x10 [ 13.659602] ret_from_fork+0x116/0x1d0 [ 13.659620] ? __pfx_kthread+0x10/0x10 [ 13.659641] ret_from_fork_asm+0x1a/0x30 [ 13.659670] </TASK> [ 13.659680] [ 13.667296] Allocated by task 278: [ 13.667424] kasan_save_stack+0x45/0x70 [ 13.667565] kasan_save_track+0x18/0x40 [ 13.667700] kasan_save_alloc_info+0x3b/0x50 [ 13.667885] __kasan_kmalloc+0xb7/0xc0 [ 13.668075] __kmalloc_cache_noprof+0x189/0x420 [ 13.668322] kasan_bitops_generic+0x92/0x1c0 [ 13.668533] kunit_try_run_case+0x1a5/0x480 [ 13.668737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.668987] kthread+0x337/0x6f0 [ 13.670240] ret_from_fork+0x116/0x1d0 [ 13.670397] ret_from_fork_asm+0x1a/0x30 [ 13.670861] [ 13.671084] The buggy address belongs to the object at ffff8881027a1100 [ 13.671084] which belongs to the cache kmalloc-16 of size 16 [ 13.672095] The buggy address is located 8 bytes inside of [ 13.672095] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.672581] [ 13.672654] The buggy address belongs to the physical page: [ 13.672828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.673420] flags: 0x200000000000000(node=0|zone=2) [ 13.673854] page_type: f5(slab) [ 13.673981] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.674463] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.675248] page dumped because: kasan: bad access detected [ 13.675950] [ 13.676124] Memory state around the buggy address: [ 13.676780] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.677363] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.677583] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.677792] ^ [ 13.677911] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.678472] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.678903] ================================================================== [ 13.639542] ================================================================== [ 13.639890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.640336] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.640624] [ 13.640730] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.640768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.640779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.640799] Call Trace: [ 13.640813] <TASK> [ 13.640827] dump_stack_lvl+0x73/0xb0 [ 13.640853] print_report+0xd1/0x650 [ 13.640874] ? __virt_addr_valid+0x1db/0x2d0 [ 13.640895] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.640921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.640942] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.640968] kasan_report+0x141/0x180 [ 13.640989] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.641020] kasan_check_range+0x10c/0x1c0 [ 13.641053] __kasan_check_write+0x18/0x20 [ 13.641072] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.641098] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.641125] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.641169] ? finish_task_switch.isra.0+0x156/0x700 [ 13.641190] ? kasan_bitops_generic+0x92/0x1c0 [ 13.641216] kasan_bitops_generic+0x121/0x1c0 [ 13.641240] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.641264] ? __pfx_read_tsc+0x10/0x10 [ 13.641285] ? ktime_get_ts64+0x86/0x230 [ 13.641307] kunit_try_run_case+0x1a5/0x480 [ 13.641330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.641351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.641373] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.641394] ? __kthread_parkme+0x82/0x180 [ 13.641413] ? preempt_count_sub+0x50/0x80 [ 13.641435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.641458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.641479] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.641502] kthread+0x337/0x6f0 [ 13.641520] ? trace_preempt_on+0x20/0xc0 [ 13.641541] ? __pfx_kthread+0x10/0x10 [ 13.641562] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.641582] ? calculate_sigpending+0x7b/0xa0 [ 13.641604] ? __pfx_kthread+0x10/0x10 [ 13.641625] ret_from_fork+0x116/0x1d0 [ 13.641643] ? __pfx_kthread+0x10/0x10 [ 13.641662] ret_from_fork_asm+0x1a/0x30 [ 13.641691] </TASK> [ 13.641702] [ 13.649412] Allocated by task 278: [ 13.649549] kasan_save_stack+0x45/0x70 [ 13.649705] kasan_save_track+0x18/0x40 [ 13.649899] kasan_save_alloc_info+0x3b/0x50 [ 13.650125] __kasan_kmalloc+0xb7/0xc0 [ 13.650341] __kmalloc_cache_noprof+0x189/0x420 [ 13.650566] kasan_bitops_generic+0x92/0x1c0 [ 13.650764] kunit_try_run_case+0x1a5/0x480 [ 13.650941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.651194] kthread+0x337/0x6f0 [ 13.651321] ret_from_fork+0x116/0x1d0 [ 13.651503] ret_from_fork_asm+0x1a/0x30 [ 13.651690] [ 13.651773] The buggy address belongs to the object at ffff8881027a1100 [ 13.651773] which belongs to the cache kmalloc-16 of size 16 [ 13.652265] The buggy address is located 8 bytes inside of [ 13.652265] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.652736] [ 13.652819] The buggy address belongs to the physical page: [ 13.653050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.653409] flags: 0x200000000000000(node=0|zone=2) [ 13.653630] page_type: f5(slab) [ 13.653779] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.654089] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.654410] page dumped because: kasan: bad access detected [ 13.654633] [ 13.654719] Memory state around the buggy address: [ 13.654872] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.655104] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.655346] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.655558] ^ [ 13.655735] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.656056] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.656387] ==================================================================