Date
July 1, 2025, 3:08 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.969556] ================================================================== [ 13.969916] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.970332] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278 [ 13.970879] [ 13.970998] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.971067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.971081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.971108] Call Trace: [ 13.971126] <TASK> [ 13.971144] dump_stack_lvl+0x73/0xb0 [ 13.971176] print_report+0xd1/0x650 [ 13.971199] ? __virt_addr_valid+0x1db/0x2d0 [ 13.971223] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.971252] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.971277] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.971306] kasan_report+0x141/0x180 [ 13.971328] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.971362] kasan_check_range+0x10c/0x1c0 [ 13.971388] __kasan_check_write+0x18/0x20 [ 13.971408] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.971438] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.971468] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.971494] ? trace_hardirqs_on+0x37/0xe0 [ 13.971519] ? kasan_bitops_generic+0x92/0x1c0 [ 13.971546] kasan_bitops_generic+0x121/0x1c0 [ 13.971570] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.971596] ? __pfx_read_tsc+0x10/0x10 [ 13.971617] ? ktime_get_ts64+0x86/0x230 [ 13.971642] kunit_try_run_case+0x1a5/0x480 [ 13.971690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.971713] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.971739] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.971762] ? __kthread_parkme+0x82/0x180 [ 13.971783] ? preempt_count_sub+0x50/0x80 [ 13.971808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.971832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.971857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.971881] kthread+0x337/0x6f0 [ 13.971901] ? trace_preempt_on+0x20/0xc0 [ 13.971923] ? __pfx_kthread+0x10/0x10 [ 13.971943] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.971965] ? calculate_sigpending+0x7b/0xa0 [ 13.971990] ? __pfx_kthread+0x10/0x10 [ 13.972011] ret_from_fork+0x116/0x1d0 [ 13.972040] ? __pfx_kthread+0x10/0x10 [ 13.972060] ret_from_fork_asm+0x1a/0x30 [ 13.972092] </TASK> [ 13.972103] [ 13.980556] Allocated by task 278: [ 13.980858] kasan_save_stack+0x45/0x70 [ 13.981054] kasan_save_track+0x18/0x40 [ 13.981230] kasan_save_alloc_info+0x3b/0x50 [ 13.981420] __kasan_kmalloc+0xb7/0xc0 [ 13.981579] __kmalloc_cache_noprof+0x189/0x420 [ 13.981757] kasan_bitops_generic+0x92/0x1c0 [ 13.982016] kunit_try_run_case+0x1a5/0x480 [ 13.982244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.982420] kthread+0x337/0x6f0 [ 13.982660] ret_from_fork+0x116/0x1d0 [ 13.982846] ret_from_fork_asm+0x1a/0x30 [ 13.983056] [ 13.983178] The buggy address belongs to the object at ffff88810191e8e0 [ 13.983178] which belongs to the cache kmalloc-16 of size 16 [ 13.983710] The buggy address is located 8 bytes inside of [ 13.983710] allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9) [ 13.984308] [ 13.984384] The buggy address belongs to the physical page: [ 13.984618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e [ 13.984863] flags: 0x200000000000000(node=0|zone=2) [ 13.985038] page_type: f5(slab) [ 13.985159] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.985393] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.986064] page dumped because: kasan: bad access detected [ 13.986426] [ 13.986495] Memory state around the buggy address: [ 13.986652] ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.986870] ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.987100] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.987316] ^ [ 13.987517] ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.988100] ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.988818] ================================================================== [ 13.901835] ================================================================== [ 13.902189] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.902466] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278 [ 13.902905] [ 13.903112] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.903165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.903179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.903207] Call Trace: [ 13.903227] <TASK> [ 13.903245] dump_stack_lvl+0x73/0xb0 [ 13.903276] print_report+0xd1/0x650 [ 13.903298] ? __virt_addr_valid+0x1db/0x2d0 [ 13.903322] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.903352] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.903376] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.903405] kasan_report+0x141/0x180 [ 13.903427] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.903461] kasan_check_range+0x10c/0x1c0 [ 13.903486] __kasan_check_write+0x18/0x20 [ 13.903505] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.903534] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.903564] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.903590] ? trace_hardirqs_on+0x37/0xe0 [ 13.903614] ? kasan_bitops_generic+0x92/0x1c0 [ 13.903655] kasan_bitops_generic+0x121/0x1c0 [ 13.903679] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.903705] ? __pfx_read_tsc+0x10/0x10 [ 13.903726] ? ktime_get_ts64+0x86/0x230 [ 13.903751] kunit_try_run_case+0x1a5/0x480 [ 13.903775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.903799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.903825] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.903849] ? __kthread_parkme+0x82/0x180 [ 13.903870] ? preempt_count_sub+0x50/0x80 [ 13.903894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.903918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.903942] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.903968] kthread+0x337/0x6f0 [ 13.903986] ? trace_preempt_on+0x20/0xc0 [ 13.904008] ? __pfx_kthread+0x10/0x10 [ 13.904040] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.904063] ? calculate_sigpending+0x7b/0xa0 [ 13.904087] ? __pfx_kthread+0x10/0x10 [ 13.904108] ret_from_fork+0x116/0x1d0 [ 13.904127] ? __pfx_kthread+0x10/0x10 [ 13.904154] ret_from_fork_asm+0x1a/0x30 [ 13.904185] </TASK> [ 13.904196] [ 13.913285] Allocated by task 278: [ 13.913460] kasan_save_stack+0x45/0x70 [ 13.913685] kasan_save_track+0x18/0x40 [ 13.913881] kasan_save_alloc_info+0x3b/0x50 [ 13.914091] __kasan_kmalloc+0xb7/0xc0 [ 13.914267] __kmalloc_cache_noprof+0x189/0x420 [ 13.914454] kasan_bitops_generic+0x92/0x1c0 [ 13.914747] kunit_try_run_case+0x1a5/0x480 [ 13.914964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.915225] kthread+0x337/0x6f0 [ 13.915384] ret_from_fork+0x116/0x1d0 [ 13.915534] ret_from_fork_asm+0x1a/0x30 [ 13.915813] [ 13.915908] The buggy address belongs to the object at ffff88810191e8e0 [ 13.915908] which belongs to the cache kmalloc-16 of size 16 [ 13.916371] The buggy address is located 8 bytes inside of [ 13.916371] allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9) [ 13.916729] [ 13.916802] The buggy address belongs to the physical page: [ 13.916978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e [ 13.917694] flags: 0x200000000000000(node=0|zone=2) [ 13.917987] page_type: f5(slab) [ 13.918761] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.919133] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.919373] page dumped because: kasan: bad access detected [ 13.919549] [ 13.919621] Memory state around the buggy address: [ 13.920320] ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.921071] ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.921376] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.922126] ^ [ 13.922579] ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.923190] ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.923879] ================================================================== [ 13.842076] ================================================================== [ 13.842379] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.842789] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278 [ 13.843228] [ 13.843341] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.843391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.843403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.843429] Call Trace: [ 13.843447] <TASK> [ 13.843463] dump_stack_lvl+0x73/0xb0 [ 13.843490] print_report+0xd1/0x650 [ 13.843514] ? __virt_addr_valid+0x1db/0x2d0 [ 13.843537] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.843566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.843590] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.843620] kasan_report+0x141/0x180 [ 13.843641] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.843675] kasan_check_range+0x10c/0x1c0 [ 13.843698] __kasan_check_write+0x18/0x20 [ 13.843718] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.843748] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.843779] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.843805] ? trace_hardirqs_on+0x37/0xe0 [ 13.843827] ? kasan_bitops_generic+0x92/0x1c0 [ 13.843855] kasan_bitops_generic+0x121/0x1c0 [ 13.843879] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.843904] ? __pfx_read_tsc+0x10/0x10 [ 13.844018] ? ktime_get_ts64+0x86/0x230 [ 13.844061] kunit_try_run_case+0x1a5/0x480 [ 13.844086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.844110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.844134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.844166] ? __kthread_parkme+0x82/0x180 [ 13.844187] ? preempt_count_sub+0x50/0x80 [ 13.844211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.844235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.844260] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.844284] kthread+0x337/0x6f0 [ 13.844304] ? trace_preempt_on+0x20/0xc0 [ 13.844326] ? __pfx_kthread+0x10/0x10 [ 13.844346] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.844368] ? calculate_sigpending+0x7b/0xa0 [ 13.844392] ? __pfx_kthread+0x10/0x10 [ 13.844413] ret_from_fork+0x116/0x1d0 [ 13.844432] ? __pfx_kthread+0x10/0x10 [ 13.844453] ret_from_fork_asm+0x1a/0x30 [ 13.844484] </TASK> [ 13.844495] [ 13.853190] Allocated by task 278: [ 13.853326] kasan_save_stack+0x45/0x70 [ 13.853769] kasan_save_track+0x18/0x40 [ 13.854077] kasan_save_alloc_info+0x3b/0x50 [ 13.854375] __kasan_kmalloc+0xb7/0xc0 [ 13.854528] __kmalloc_cache_noprof+0x189/0x420 [ 13.855042] kasan_bitops_generic+0x92/0x1c0 [ 13.855273] kunit_try_run_case+0x1a5/0x480 [ 13.855436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.855624] kthread+0x337/0x6f0 [ 13.855974] ret_from_fork+0x116/0x1d0 [ 13.856192] ret_from_fork_asm+0x1a/0x30 [ 13.856392] [ 13.856479] The buggy address belongs to the object at ffff88810191e8e0 [ 13.856479] which belongs to the cache kmalloc-16 of size 16 [ 13.857048] The buggy address is located 8 bytes inside of [ 13.857048] allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9) [ 13.857532] [ 13.857628] The buggy address belongs to the physical page: [ 13.857903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e [ 13.858158] flags: 0x200000000000000(node=0|zone=2) [ 13.858328] page_type: f5(slab) [ 13.858497] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.858837] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.859200] page dumped because: kasan: bad access detected [ 13.859453] [ 13.859542] Memory state around the buggy address: [ 13.859985] ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.860296] ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.860582] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.860968] ^ [ 13.861204] ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.861522] ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.861901] ================================================================== [ 13.924453] ================================================================== [ 13.924705] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.925199] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278 [ 13.925493] [ 13.925612] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.925677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.925691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.925720] Call Trace: [ 13.925741] <TASK> [ 13.925762] dump_stack_lvl+0x73/0xb0 [ 13.925791] print_report+0xd1/0x650 [ 13.925815] ? __virt_addr_valid+0x1db/0x2d0 [ 13.925840] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.925873] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.925898] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.925926] kasan_report+0x141/0x180 [ 13.925948] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.925985] kasan_check_range+0x10c/0x1c0 [ 13.926008] __kasan_check_write+0x18/0x20 [ 13.926040] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.926069] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.926101] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.926128] ? trace_hardirqs_on+0x37/0xe0 [ 13.926152] ? kasan_bitops_generic+0x92/0x1c0 [ 13.926180] kasan_bitops_generic+0x121/0x1c0 [ 13.926204] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.926229] ? __pfx_read_tsc+0x10/0x10 [ 13.926251] ? ktime_get_ts64+0x86/0x230 [ 13.926276] kunit_try_run_case+0x1a5/0x480 [ 13.926301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.926323] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.926348] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.926373] ? __kthread_parkme+0x82/0x180 [ 13.926394] ? preempt_count_sub+0x50/0x80 [ 13.926418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.926443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.926467] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.926492] kthread+0x337/0x6f0 [ 13.926510] ? trace_preempt_on+0x20/0xc0 [ 13.926533] ? __pfx_kthread+0x10/0x10 [ 13.926553] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.926574] ? calculate_sigpending+0x7b/0xa0 [ 13.926598] ? __pfx_kthread+0x10/0x10 [ 13.926620] ret_from_fork+0x116/0x1d0 [ 13.926638] ? __pfx_kthread+0x10/0x10 [ 13.927010] ret_from_fork_asm+0x1a/0x30 [ 13.927068] </TASK> [ 13.927081] [ 13.935430] Allocated by task 278: [ 13.935605] kasan_save_stack+0x45/0x70 [ 13.935778] kasan_save_track+0x18/0x40 [ 13.935969] kasan_save_alloc_info+0x3b/0x50 [ 13.936176] __kasan_kmalloc+0xb7/0xc0 [ 13.936373] __kmalloc_cache_noprof+0x189/0x420 [ 13.936554] kasan_bitops_generic+0x92/0x1c0 [ 13.936886] kunit_try_run_case+0x1a5/0x480 [ 13.937117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.937332] kthread+0x337/0x6f0 [ 13.937502] ret_from_fork+0x116/0x1d0 [ 13.937866] ret_from_fork_asm+0x1a/0x30 [ 13.938074] [ 13.938159] The buggy address belongs to the object at ffff88810191e8e0 [ 13.938159] which belongs to the cache kmalloc-16 of size 16 [ 13.938554] The buggy address is located 8 bytes inside of [ 13.938554] allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9) [ 13.938945] [ 13.939146] The buggy address belongs to the physical page: [ 13.939688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e [ 13.940121] flags: 0x200000000000000(node=0|zone=2) [ 13.940343] page_type: f5(slab) [ 13.940466] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.940909] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.941476] page dumped because: kasan: bad access detected [ 13.941912] [ 13.941989] Memory state around the buggy address: [ 13.942165] ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.942499] ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.942790] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.943007] ^ [ 13.943316] ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.943637] ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.943974] ================================================================== [ 13.989367] ================================================================== [ 13.989713] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.990106] Read of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278 [ 13.990551] [ 13.990667] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.990719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.990731] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.990759] Call Trace: [ 13.990777] <TASK> [ 13.990793] dump_stack_lvl+0x73/0xb0 [ 13.990822] print_report+0xd1/0x650 [ 13.990845] ? __virt_addr_valid+0x1db/0x2d0 [ 13.990869] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.990899] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.990923] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.990953] kasan_report+0x141/0x180 [ 13.990974] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.991008] kasan_check_range+0x10c/0x1c0 [ 13.991045] __kasan_check_read+0x15/0x20 [ 13.991064] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.991093] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.991123] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.991150] ? trace_hardirqs_on+0x37/0xe0 [ 13.991174] ? kasan_bitops_generic+0x92/0x1c0 [ 13.991202] kasan_bitops_generic+0x121/0x1c0 [ 13.991226] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.991254] ? __pfx_read_tsc+0x10/0x10 [ 13.991275] ? ktime_get_ts64+0x86/0x230 [ 13.991301] kunit_try_run_case+0x1a5/0x480 [ 13.991334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.991359] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.991383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.991407] ? __kthread_parkme+0x82/0x180 [ 13.991428] ? preempt_count_sub+0x50/0x80 [ 13.991452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.991476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.991502] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.991527] kthread+0x337/0x6f0 [ 13.991546] ? trace_preempt_on+0x20/0xc0 [ 13.991568] ? __pfx_kthread+0x10/0x10 [ 13.991589] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.991610] ? calculate_sigpending+0x7b/0xa0 [ 13.991647] ? __pfx_kthread+0x10/0x10 [ 13.991669] ret_from_fork+0x116/0x1d0 [ 13.991699] ? __pfx_kthread+0x10/0x10 [ 13.991720] ret_from_fork_asm+0x1a/0x30 [ 13.991751] </TASK> [ 13.991764] [ 14.000184] Allocated by task 278: [ 14.000527] kasan_save_stack+0x45/0x70 [ 14.000788] kasan_save_track+0x18/0x40 [ 14.000934] kasan_save_alloc_info+0x3b/0x50 [ 14.001098] __kasan_kmalloc+0xb7/0xc0 [ 14.001231] __kmalloc_cache_noprof+0x189/0x420 [ 14.001386] kasan_bitops_generic+0x92/0x1c0 [ 14.001537] kunit_try_run_case+0x1a5/0x480 [ 14.001692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.002043] kthread+0x337/0x6f0 [ 14.002225] ret_from_fork+0x116/0x1d0 [ 14.002414] ret_from_fork_asm+0x1a/0x30 [ 14.002677] [ 14.002803] The buggy address belongs to the object at ffff88810191e8e0 [ 14.002803] which belongs to the cache kmalloc-16 of size 16 [ 14.003583] The buggy address is located 8 bytes inside of [ 14.003583] allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9) [ 14.004096] [ 14.004174] The buggy address belongs to the physical page: [ 14.004459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e [ 14.004701] flags: 0x200000000000000(node=0|zone=2) [ 14.004866] page_type: f5(slab) [ 14.004987] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.005230] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.005666] page dumped because: kasan: bad access detected [ 14.005989] [ 14.006095] Memory state around the buggy address: [ 14.006319] ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.006641] ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.006905] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.007131] ^ [ 14.007332] ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.007550] ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.007764] ================================================================== [ 13.944471] ================================================================== [ 13.944957] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.945355] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278 [ 13.945583] [ 13.945869] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.945924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.945937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.945965] Call Trace: [ 13.945981] <TASK> [ 13.945996] dump_stack_lvl+0x73/0xb0 [ 13.946042] print_report+0xd1/0x650 [ 13.946065] ? __virt_addr_valid+0x1db/0x2d0 [ 13.946089] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.946118] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.946141] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.946171] kasan_report+0x141/0x180 [ 13.946193] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.946226] kasan_check_range+0x10c/0x1c0 [ 13.946250] __kasan_check_write+0x18/0x20 [ 13.946270] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.946299] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.946330] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.946356] ? trace_hardirqs_on+0x37/0xe0 [ 13.946378] ? kasan_bitops_generic+0x92/0x1c0 [ 13.946406] kasan_bitops_generic+0x121/0x1c0 [ 13.946430] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.946455] ? __pfx_read_tsc+0x10/0x10 [ 13.946477] ? ktime_get_ts64+0x86/0x230 [ 13.946501] kunit_try_run_case+0x1a5/0x480 [ 13.946526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.946549] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.946574] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.946597] ? __kthread_parkme+0x82/0x180 [ 13.946619] ? preempt_count_sub+0x50/0x80 [ 13.946997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.947036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.947062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.947087] kthread+0x337/0x6f0 [ 13.947107] ? trace_preempt_on+0x20/0xc0 [ 13.947129] ? __pfx_kthread+0x10/0x10 [ 13.947150] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.947171] ? calculate_sigpending+0x7b/0xa0 [ 13.947196] ? __pfx_kthread+0x10/0x10 [ 13.947217] ret_from_fork+0x116/0x1d0 [ 13.947236] ? __pfx_kthread+0x10/0x10 [ 13.947256] ret_from_fork_asm+0x1a/0x30 [ 13.947288] </TASK> [ 13.947298] [ 13.958008] Allocated by task 278: [ 13.958260] kasan_save_stack+0x45/0x70 [ 13.958473] kasan_save_track+0x18/0x40 [ 13.958672] kasan_save_alloc_info+0x3b/0x50 [ 13.959151] __kasan_kmalloc+0xb7/0xc0 [ 13.959354] __kmalloc_cache_noprof+0x189/0x420 [ 13.959582] kasan_bitops_generic+0x92/0x1c0 [ 13.959822] kunit_try_run_case+0x1a5/0x480 [ 13.960344] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.960778] kthread+0x337/0x6f0 [ 13.960968] ret_from_fork+0x116/0x1d0 [ 13.961279] ret_from_fork_asm+0x1a/0x30 [ 13.961592] [ 13.961682] The buggy address belongs to the object at ffff88810191e8e0 [ 13.961682] which belongs to the cache kmalloc-16 of size 16 [ 13.962449] The buggy address is located 8 bytes inside of [ 13.962449] allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9) [ 13.962985] [ 13.963127] The buggy address belongs to the physical page: [ 13.963719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e [ 13.964055] flags: 0x200000000000000(node=0|zone=2) [ 13.964432] page_type: f5(slab) [ 13.964564] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.965249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.965706] page dumped because: kasan: bad access detected [ 13.966037] [ 13.966139] Memory state around the buggy address: [ 13.966368] ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.966904] ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.967297] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.967615] ^ [ 13.968105] ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.968503] ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.968807] ================================================================== [ 13.862391] ================================================================== [ 13.862801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.863161] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278 [ 13.863439] [ 13.863553] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.863603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.863615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.863818] Call Trace: [ 13.863842] <TASK> [ 13.863858] dump_stack_lvl+0x73/0xb0 [ 13.863889] print_report+0xd1/0x650 [ 13.863913] ? __virt_addr_valid+0x1db/0x2d0 [ 13.863938] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.863966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.863989] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.864034] kasan_report+0x141/0x180 [ 13.864057] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.864091] kasan_check_range+0x10c/0x1c0 [ 13.864115] __kasan_check_write+0x18/0x20 [ 13.864135] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.864167] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.864198] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.864223] ? trace_hardirqs_on+0x37/0xe0 [ 13.864246] ? kasan_bitops_generic+0x92/0x1c0 [ 13.864273] kasan_bitops_generic+0x121/0x1c0 [ 13.864297] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.864323] ? __pfx_read_tsc+0x10/0x10 [ 13.864344] ? ktime_get_ts64+0x86/0x230 [ 13.864368] kunit_try_run_case+0x1a5/0x480 [ 13.864392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.864415] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.864440] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.864463] ? __kthread_parkme+0x82/0x180 [ 13.864485] ? preempt_count_sub+0x50/0x80 [ 13.864510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.864534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.864559] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.864584] kthread+0x337/0x6f0 [ 13.864603] ? trace_preempt_on+0x20/0xc0 [ 13.864625] ? __pfx_kthread+0x10/0x10 [ 13.864658] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.864680] ? calculate_sigpending+0x7b/0xa0 [ 13.864704] ? __pfx_kthread+0x10/0x10 [ 13.864726] ret_from_fork+0x116/0x1d0 [ 13.864744] ? __pfx_kthread+0x10/0x10 [ 13.864765] ret_from_fork_asm+0x1a/0x30 [ 13.864795] </TASK> [ 13.864807] [ 13.873533] Allocated by task 278: [ 13.873870] kasan_save_stack+0x45/0x70 [ 13.874093] kasan_save_track+0x18/0x40 [ 13.874296] kasan_save_alloc_info+0x3b/0x50 [ 13.874516] __kasan_kmalloc+0xb7/0xc0 [ 13.874831] __kmalloc_cache_noprof+0x189/0x420 [ 13.875042] kasan_bitops_generic+0x92/0x1c0 [ 13.875192] kunit_try_run_case+0x1a5/0x480 [ 13.875337] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.875511] kthread+0x337/0x6f0 [ 13.875660] ret_from_fork+0x116/0x1d0 [ 13.875848] ret_from_fork_asm+0x1a/0x30 [ 13.876058] [ 13.876154] The buggy address belongs to the object at ffff88810191e8e0 [ 13.876154] which belongs to the cache kmalloc-16 of size 16 [ 13.876669] The buggy address is located 8 bytes inside of [ 13.876669] allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9) [ 13.877224] [ 13.877336] The buggy address belongs to the physical page: [ 13.877596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e [ 13.878044] flags: 0x200000000000000(node=0|zone=2) [ 13.878286] page_type: f5(slab) [ 13.878465] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.879007] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.879258] page dumped because: kasan: bad access detected [ 13.879433] [ 13.879518] Memory state around the buggy address: [ 13.879737] ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.880132] ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.880440] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.880699] ^ [ 13.881002] ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.881314] ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.881584] ================================================================== [ 13.882057] ================================================================== [ 13.882505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.883006] Write of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278 [ 13.883316] [ 13.883400] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.883449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.883462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.883490] Call Trace: [ 13.883506] <TASK> [ 13.883520] dump_stack_lvl+0x73/0xb0 [ 13.883549] print_report+0xd1/0x650 [ 13.883572] ? __virt_addr_valid+0x1db/0x2d0 [ 13.883595] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.883799] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.883827] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.883856] kasan_report+0x141/0x180 [ 13.883879] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.883913] kasan_check_range+0x10c/0x1c0 [ 13.883937] __kasan_check_write+0x18/0x20 [ 13.883956] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.883985] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.884016] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.884058] ? trace_hardirqs_on+0x37/0xe0 [ 13.884082] ? kasan_bitops_generic+0x92/0x1c0 [ 13.884109] kasan_bitops_generic+0x121/0x1c0 [ 13.884133] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.884161] ? __pfx_read_tsc+0x10/0x10 [ 13.884184] ? ktime_get_ts64+0x86/0x230 [ 13.884208] kunit_try_run_case+0x1a5/0x480 [ 13.884233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.884255] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.884280] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.884304] ? __kthread_parkme+0x82/0x180 [ 13.884324] ? preempt_count_sub+0x50/0x80 [ 13.884348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.884372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.884396] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.884422] kthread+0x337/0x6f0 [ 13.884440] ? trace_preempt_on+0x20/0xc0 [ 13.884462] ? __pfx_kthread+0x10/0x10 [ 13.884483] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.884504] ? calculate_sigpending+0x7b/0xa0 [ 13.884528] ? __pfx_kthread+0x10/0x10 [ 13.884550] ret_from_fork+0x116/0x1d0 [ 13.884569] ? __pfx_kthread+0x10/0x10 [ 13.884590] ret_from_fork_asm+0x1a/0x30 [ 13.884621] </TASK> [ 13.884632] [ 13.893394] Allocated by task 278: [ 13.893539] kasan_save_stack+0x45/0x70 [ 13.893766] kasan_save_track+0x18/0x40 [ 13.893985] kasan_save_alloc_info+0x3b/0x50 [ 13.894227] __kasan_kmalloc+0xb7/0xc0 [ 13.894419] __kmalloc_cache_noprof+0x189/0x420 [ 13.894631] kasan_bitops_generic+0x92/0x1c0 [ 13.894906] kunit_try_run_case+0x1a5/0x480 [ 13.895114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.895343] kthread+0x337/0x6f0 [ 13.895494] ret_from_fork+0x116/0x1d0 [ 13.895849] ret_from_fork_asm+0x1a/0x30 [ 13.896014] [ 13.896119] The buggy address belongs to the object at ffff88810191e8e0 [ 13.896119] which belongs to the cache kmalloc-16 of size 16 [ 13.896592] The buggy address is located 8 bytes inside of [ 13.896592] allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9) [ 13.897098] [ 13.897195] The buggy address belongs to the physical page: [ 13.897404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e [ 13.897838] flags: 0x200000000000000(node=0|zone=2) [ 13.898117] page_type: f5(slab) [ 13.898288] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.898586] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.898928] page dumped because: kasan: bad access detected [ 13.899120] [ 13.899192] Memory state around the buggy address: [ 13.899350] ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.899569] ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.899870] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.900223] ^ [ 13.900520] ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.901063] ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.901354] ================================================================== [ 14.008130] ================================================================== [ 14.008490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.009245] Read of size 8 at addr ffff88810191e8e8 by task kunit_try_catch/278 [ 14.009580] [ 14.009735] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.009791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.009804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.009833] Call Trace: [ 14.009852] <TASK> [ 14.009870] dump_stack_lvl+0x73/0xb0 [ 14.009908] print_report+0xd1/0x650 [ 14.009930] ? __virt_addr_valid+0x1db/0x2d0 [ 14.009955] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.009985] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.010009] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.010051] kasan_report+0x141/0x180 [ 14.010073] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.010107] __asan_report_load8_noabort+0x18/0x20 [ 14.010132] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.010161] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.010192] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.010217] ? trace_hardirqs_on+0x37/0xe0 [ 14.010241] ? kasan_bitops_generic+0x92/0x1c0 [ 14.010268] kasan_bitops_generic+0x121/0x1c0 [ 14.010293] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.010318] ? __pfx_read_tsc+0x10/0x10 [ 14.010340] ? ktime_get_ts64+0x86/0x230 [ 14.010364] kunit_try_run_case+0x1a5/0x480 [ 14.010389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.010411] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.010437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.010462] ? __kthread_parkme+0x82/0x180 [ 14.010483] ? preempt_count_sub+0x50/0x80 [ 14.010508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.010532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.010556] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.010582] kthread+0x337/0x6f0 [ 14.010600] ? trace_preempt_on+0x20/0xc0 [ 14.010625] ? __pfx_kthread+0x10/0x10 [ 14.010657] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.010680] ? calculate_sigpending+0x7b/0xa0 [ 14.010705] ? __pfx_kthread+0x10/0x10 [ 14.010726] ret_from_fork+0x116/0x1d0 [ 14.010745] ? __pfx_kthread+0x10/0x10 [ 14.010766] ret_from_fork_asm+0x1a/0x30 [ 14.010797] </TASK> [ 14.010810] [ 14.023059] Allocated by task 278: [ 14.023425] kasan_save_stack+0x45/0x70 [ 14.023659] kasan_save_track+0x18/0x40 [ 14.024073] kasan_save_alloc_info+0x3b/0x50 [ 14.024344] __kasan_kmalloc+0xb7/0xc0 [ 14.024719] __kmalloc_cache_noprof+0x189/0x420 [ 14.024935] kasan_bitops_generic+0x92/0x1c0 [ 14.025153] kunit_try_run_case+0x1a5/0x480 [ 14.025345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.025580] kthread+0x337/0x6f0 [ 14.026069] ret_from_fork+0x116/0x1d0 [ 14.026285] ret_from_fork_asm+0x1a/0x30 [ 14.026467] [ 14.026568] The buggy address belongs to the object at ffff88810191e8e0 [ 14.026568] which belongs to the cache kmalloc-16 of size 16 [ 14.027343] The buggy address is located 8 bytes inside of [ 14.027343] allocated 9-byte region [ffff88810191e8e0, ffff88810191e8e9) [ 14.028201] [ 14.028386] The buggy address belongs to the physical page: [ 14.028595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10191e [ 14.029174] flags: 0x200000000000000(node=0|zone=2) [ 14.029409] page_type: f5(slab) [ 14.029559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.030048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.030402] page dumped because: kasan: bad access detected [ 14.030697] [ 14.030921] Memory state around the buggy address: [ 14.031180] ffff88810191e780: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.031706] ffff88810191e800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.031994] >ffff88810191e880: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.032446] ^ [ 14.032820] ffff88810191e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.033156] ffff88810191e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.033565] ==================================================================