Date
July 1, 2025, 11:08 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.737309] ================================================================== [ 13.737592] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.738091] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.738435] [ 13.738529] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.738592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.738604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.738624] Call Trace: [ 13.738641] <TASK> [ 13.738656] dump_stack_lvl+0x73/0xb0 [ 13.738684] print_report+0xd1/0x650 [ 13.738706] ? __virt_addr_valid+0x1db/0x2d0 [ 13.738729] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.738755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.738776] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.738802] kasan_report+0x141/0x180 [ 13.738823] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.738854] kasan_check_range+0x10c/0x1c0 [ 13.738876] __kasan_check_write+0x18/0x20 [ 13.738895] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.738985] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.739014] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.739038] ? trace_hardirqs_on+0x37/0xe0 [ 13.739061] ? kasan_bitops_generic+0x92/0x1c0 [ 13.739086] kasan_bitops_generic+0x121/0x1c0 [ 13.739109] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.739132] ? __pfx_read_tsc+0x10/0x10 [ 13.739153] ? ktime_get_ts64+0x86/0x230 [ 13.739175] kunit_try_run_case+0x1a5/0x480 [ 13.739199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.739220] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.739244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.739266] ? __kthread_parkme+0x82/0x180 [ 13.739285] ? preempt_count_sub+0x50/0x80 [ 13.739309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.739332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.739355] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.739386] kthread+0x337/0x6f0 [ 13.739406] ? trace_preempt_on+0x20/0xc0 [ 13.739426] ? __pfx_kthread+0x10/0x10 [ 13.739446] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.739466] ? calculate_sigpending+0x7b/0xa0 [ 13.739489] ? __pfx_kthread+0x10/0x10 [ 13.739509] ret_from_fork+0x116/0x1d0 [ 13.739527] ? __pfx_kthread+0x10/0x10 [ 13.739546] ret_from_fork_asm+0x1a/0x30 [ 13.739594] </TASK> [ 13.739604] [ 13.750498] Allocated by task 278: [ 13.750699] kasan_save_stack+0x45/0x70 [ 13.750970] kasan_save_track+0x18/0x40 [ 13.751120] kasan_save_alloc_info+0x3b/0x50 [ 13.751271] __kasan_kmalloc+0xb7/0xc0 [ 13.751426] __kmalloc_cache_noprof+0x189/0x420 [ 13.751676] kasan_bitops_generic+0x92/0x1c0 [ 13.751885] kunit_try_run_case+0x1a5/0x480 [ 13.752283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.752538] kthread+0x337/0x6f0 [ 13.752683] ret_from_fork+0x116/0x1d0 [ 13.752872] ret_from_fork_asm+0x1a/0x30 [ 13.753111] [ 13.753211] The buggy address belongs to the object at ffff888102531780 [ 13.753211] which belongs to the cache kmalloc-16 of size 16 [ 13.753727] The buggy address is located 8 bytes inside of [ 13.753727] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.754212] [ 13.754288] The buggy address belongs to the physical page: [ 13.754525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.754897] flags: 0x200000000000000(node=0|zone=2) [ 13.755199] page_type: f5(slab) [ 13.755382] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.755673] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.756204] page dumped because: kasan: bad access detected [ 13.756433] [ 13.756526] Memory state around the buggy address: [ 13.756705] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.757041] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.757338] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.757642] ^ [ 13.757791] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.758077] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.758358] ================================================================== [ 13.697531] ================================================================== [ 13.697879] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.698309] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.698638] [ 13.698750] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.698793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.698805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.698825] Call Trace: [ 13.698840] <TASK> [ 13.698855] dump_stack_lvl+0x73/0xb0 [ 13.698882] print_report+0xd1/0x650 [ 13.698970] ? __virt_addr_valid+0x1db/0x2d0 [ 13.698997] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.699023] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.699044] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.699070] kasan_report+0x141/0x180 [ 13.699092] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.699123] kasan_check_range+0x10c/0x1c0 [ 13.699145] __kasan_check_write+0x18/0x20 [ 13.699163] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.699190] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.699217] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.699241] ? trace_hardirqs_on+0x37/0xe0 [ 13.699262] ? kasan_bitops_generic+0x92/0x1c0 [ 13.699288] kasan_bitops_generic+0x121/0x1c0 [ 13.699311] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.699334] ? __pfx_read_tsc+0x10/0x10 [ 13.699355] ? ktime_get_ts64+0x86/0x230 [ 13.699388] kunit_try_run_case+0x1a5/0x480 [ 13.699411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.699432] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.699456] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.699477] ? __kthread_parkme+0x82/0x180 [ 13.699497] ? preempt_count_sub+0x50/0x80 [ 13.699521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.699544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.699566] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.699589] kthread+0x337/0x6f0 [ 13.699625] ? trace_preempt_on+0x20/0xc0 [ 13.699647] ? __pfx_kthread+0x10/0x10 [ 13.699667] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.699687] ? calculate_sigpending+0x7b/0xa0 [ 13.699711] ? __pfx_kthread+0x10/0x10 [ 13.699732] ret_from_fork+0x116/0x1d0 [ 13.699750] ? __pfx_kthread+0x10/0x10 [ 13.699770] ret_from_fork_asm+0x1a/0x30 [ 13.699799] </TASK> [ 13.699811] [ 13.708630] Allocated by task 278: [ 13.708855] kasan_save_stack+0x45/0x70 [ 13.709136] kasan_save_track+0x18/0x40 [ 13.709338] kasan_save_alloc_info+0x3b/0x50 [ 13.709561] __kasan_kmalloc+0xb7/0xc0 [ 13.709736] __kmalloc_cache_noprof+0x189/0x420 [ 13.710059] kasan_bitops_generic+0x92/0x1c0 [ 13.710239] kunit_try_run_case+0x1a5/0x480 [ 13.710437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.710696] kthread+0x337/0x6f0 [ 13.710828] ret_from_fork+0x116/0x1d0 [ 13.711028] ret_from_fork_asm+0x1a/0x30 [ 13.711175] [ 13.711246] The buggy address belongs to the object at ffff888102531780 [ 13.711246] which belongs to the cache kmalloc-16 of size 16 [ 13.711777] The buggy address is located 8 bytes inside of [ 13.711777] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.712501] [ 13.712582] The buggy address belongs to the physical page: [ 13.712764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.713034] flags: 0x200000000000000(node=0|zone=2) [ 13.713273] page_type: f5(slab) [ 13.713449] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.713803] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.714142] page dumped because: kasan: bad access detected [ 13.714479] [ 13.714611] Memory state around the buggy address: [ 13.714798] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.715153] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.715438] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.715746] ^ [ 13.716184] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.716477] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.716774] ================================================================== [ 13.717324] ================================================================== [ 13.717595] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.718111] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.718369] [ 13.718491] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.718533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.718545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.718568] Call Trace: [ 13.718585] <TASK> [ 13.718601] dump_stack_lvl+0x73/0xb0 [ 13.718652] print_report+0xd1/0x650 [ 13.718674] ? __virt_addr_valid+0x1db/0x2d0 [ 13.718697] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.718724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.718745] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.718771] kasan_report+0x141/0x180 [ 13.718793] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.718823] kasan_check_range+0x10c/0x1c0 [ 13.718848] __kasan_check_write+0x18/0x20 [ 13.718868] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.718896] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.718996] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.719021] ? trace_hardirqs_on+0x37/0xe0 [ 13.719044] ? kasan_bitops_generic+0x92/0x1c0 [ 13.719071] kasan_bitops_generic+0x121/0x1c0 [ 13.719095] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.719120] ? __pfx_read_tsc+0x10/0x10 [ 13.719140] ? ktime_get_ts64+0x86/0x230 [ 13.719165] kunit_try_run_case+0x1a5/0x480 [ 13.719187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.719209] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.719233] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.719255] ? __kthread_parkme+0x82/0x180 [ 13.719274] ? preempt_count_sub+0x50/0x80 [ 13.719298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.719321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.719342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.719364] kthread+0x337/0x6f0 [ 13.719393] ? trace_preempt_on+0x20/0xc0 [ 13.719414] ? __pfx_kthread+0x10/0x10 [ 13.719435] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.719454] ? calculate_sigpending+0x7b/0xa0 [ 13.719477] ? __pfx_kthread+0x10/0x10 [ 13.719498] ret_from_fork+0x116/0x1d0 [ 13.719515] ? __pfx_kthread+0x10/0x10 [ 13.719534] ret_from_fork_asm+0x1a/0x30 [ 13.719564] </TASK> [ 13.719575] [ 13.728506] Allocated by task 278: [ 13.728644] kasan_save_stack+0x45/0x70 [ 13.728825] kasan_save_track+0x18/0x40 [ 13.729105] kasan_save_alloc_info+0x3b/0x50 [ 13.729332] __kasan_kmalloc+0xb7/0xc0 [ 13.729490] __kmalloc_cache_noprof+0x189/0x420 [ 13.729675] kasan_bitops_generic+0x92/0x1c0 [ 13.729827] kunit_try_run_case+0x1a5/0x480 [ 13.730110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.730386] kthread+0x337/0x6f0 [ 13.730562] ret_from_fork+0x116/0x1d0 [ 13.730773] ret_from_fork_asm+0x1a/0x30 [ 13.731047] [ 13.731145] The buggy address belongs to the object at ffff888102531780 [ 13.731145] which belongs to the cache kmalloc-16 of size 16 [ 13.731672] The buggy address is located 8 bytes inside of [ 13.731672] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.732451] [ 13.732578] The buggy address belongs to the physical page: [ 13.732838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.733232] flags: 0x200000000000000(node=0|zone=2) [ 13.733459] page_type: f5(slab) [ 13.733634] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.734061] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.734358] page dumped because: kasan: bad access detected [ 13.734577] [ 13.734698] Memory state around the buggy address: [ 13.734901] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.735264] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.735507] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.735735] ^ [ 13.735905] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.736222] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.736762] ================================================================== [ 13.855543] ================================================================== [ 13.856055] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.856775] Read of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.857467] [ 13.857708] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.857754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.857765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.857792] Call Trace: [ 13.857808] <TASK> [ 13.857824] dump_stack_lvl+0x73/0xb0 [ 13.857853] print_report+0xd1/0x650 [ 13.857875] ? __virt_addr_valid+0x1db/0x2d0 [ 13.857897] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.857922] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.857944] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.857970] kasan_report+0x141/0x180 [ 13.857991] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.858021] __asan_report_load8_noabort+0x18/0x20 [ 13.858045] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.858071] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.858098] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.858122] ? trace_hardirqs_on+0x37/0xe0 [ 13.858144] ? kasan_bitops_generic+0x92/0x1c0 [ 13.858171] kasan_bitops_generic+0x121/0x1c0 [ 13.858193] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.858217] ? __pfx_read_tsc+0x10/0x10 [ 13.858239] ? ktime_get_ts64+0x86/0x230 [ 13.858262] kunit_try_run_case+0x1a5/0x480 [ 13.858287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.858307] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.858331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.858353] ? __kthread_parkme+0x82/0x180 [ 13.858386] ? preempt_count_sub+0x50/0x80 [ 13.858409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.858432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.858455] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.858477] kthread+0x337/0x6f0 [ 13.858497] ? trace_preempt_on+0x20/0xc0 [ 13.858518] ? __pfx_kthread+0x10/0x10 [ 13.858538] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.858560] ? calculate_sigpending+0x7b/0xa0 [ 13.858594] ? __pfx_kthread+0x10/0x10 [ 13.858614] ret_from_fork+0x116/0x1d0 [ 13.858633] ? __pfx_kthread+0x10/0x10 [ 13.858652] ret_from_fork_asm+0x1a/0x30 [ 13.858682] </TASK> [ 13.858693] [ 13.873727] Allocated by task 278: [ 13.874103] kasan_save_stack+0x45/0x70 [ 13.874569] kasan_save_track+0x18/0x40 [ 13.874952] kasan_save_alloc_info+0x3b/0x50 [ 13.875292] __kasan_kmalloc+0xb7/0xc0 [ 13.875449] __kmalloc_cache_noprof+0x189/0x420 [ 13.875623] kasan_bitops_generic+0x92/0x1c0 [ 13.876000] kunit_try_run_case+0x1a5/0x480 [ 13.876543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.877058] kthread+0x337/0x6f0 [ 13.877428] ret_from_fork+0x116/0x1d0 [ 13.877906] ret_from_fork_asm+0x1a/0x30 [ 13.878336] [ 13.878517] The buggy address belongs to the object at ffff888102531780 [ 13.878517] which belongs to the cache kmalloc-16 of size 16 [ 13.879410] The buggy address is located 8 bytes inside of [ 13.879410] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.880167] [ 13.880446] The buggy address belongs to the physical page: [ 13.880986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.881699] flags: 0x200000000000000(node=0|zone=2) [ 13.882151] page_type: f5(slab) [ 13.882393] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.882647] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.883494] page dumped because: kasan: bad access detected [ 13.884103] [ 13.884274] Memory state around the buggy address: [ 13.884741] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.885121] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.885832] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.886567] ^ [ 13.886734] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.887218] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.887886] ================================================================== [ 13.677796] ================================================================== [ 13.678245] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.678686] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.679085] [ 13.679202] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.679246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.679257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.679278] Call Trace: [ 13.679291] <TASK> [ 13.679306] dump_stack_lvl+0x73/0xb0 [ 13.679335] print_report+0xd1/0x650 [ 13.679356] ? __virt_addr_valid+0x1db/0x2d0 [ 13.679389] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.679414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.679436] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.679462] kasan_report+0x141/0x180 [ 13.679482] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.679513] kasan_check_range+0x10c/0x1c0 [ 13.679536] __kasan_check_write+0x18/0x20 [ 13.679554] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.679580] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.679627] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.679651] ? trace_hardirqs_on+0x37/0xe0 [ 13.679674] ? kasan_bitops_generic+0x92/0x1c0 [ 13.679699] kasan_bitops_generic+0x121/0x1c0 [ 13.679722] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.679747] ? __pfx_read_tsc+0x10/0x10 [ 13.679767] ? ktime_get_ts64+0x86/0x230 [ 13.679791] kunit_try_run_case+0x1a5/0x480 [ 13.679814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.679835] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.679858] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.679880] ? __kthread_parkme+0x82/0x180 [ 13.679900] ? preempt_count_sub+0x50/0x80 [ 13.680174] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.680200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.680223] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.680246] kthread+0x337/0x6f0 [ 13.680265] ? trace_preempt_on+0x20/0xc0 [ 13.680285] ? __pfx_kthread+0x10/0x10 [ 13.680306] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.680327] ? calculate_sigpending+0x7b/0xa0 [ 13.680350] ? __pfx_kthread+0x10/0x10 [ 13.680370] ret_from_fork+0x116/0x1d0 [ 13.680406] ? __pfx_kthread+0x10/0x10 [ 13.680426] ret_from_fork_asm+0x1a/0x30 [ 13.680456] </TASK> [ 13.680468] [ 13.689023] Allocated by task 278: [ 13.689205] kasan_save_stack+0x45/0x70 [ 13.689416] kasan_save_track+0x18/0x40 [ 13.689626] kasan_save_alloc_info+0x3b/0x50 [ 13.689833] __kasan_kmalloc+0xb7/0xc0 [ 13.690023] __kmalloc_cache_noprof+0x189/0x420 [ 13.690242] kasan_bitops_generic+0x92/0x1c0 [ 13.690547] kunit_try_run_case+0x1a5/0x480 [ 13.690741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.691020] kthread+0x337/0x6f0 [ 13.691187] ret_from_fork+0x116/0x1d0 [ 13.691318] ret_from_fork_asm+0x1a/0x30 [ 13.691467] [ 13.691537] The buggy address belongs to the object at ffff888102531780 [ 13.691537] which belongs to the cache kmalloc-16 of size 16 [ 13.692244] The buggy address is located 8 bytes inside of [ 13.692244] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.692831] [ 13.693011] The buggy address belongs to the physical page: [ 13.693248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.693504] flags: 0x200000000000000(node=0|zone=2) [ 13.693736] page_type: f5(slab) [ 13.693903] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.694303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.694643] page dumped because: kasan: bad access detected [ 13.694870] [ 13.694976] Memory state around the buggy address: [ 13.695157] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.695454] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.695740] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.695951] ^ [ 13.696072] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.696634] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.697037] ================================================================== [ 13.780913] ================================================================== [ 13.781228] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.781729] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.782084] [ 13.782174] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.782216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.782229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.782248] Call Trace: [ 13.782262] <TASK> [ 13.782275] dump_stack_lvl+0x73/0xb0 [ 13.782303] print_report+0xd1/0x650 [ 13.782326] ? __virt_addr_valid+0x1db/0x2d0 [ 13.782347] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.782384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.782406] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.782433] kasan_report+0x141/0x180 [ 13.782454] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.782484] kasan_check_range+0x10c/0x1c0 [ 13.782506] __kasan_check_write+0x18/0x20 [ 13.782524] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.782551] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.782579] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.782623] ? trace_hardirqs_on+0x37/0xe0 [ 13.782645] ? kasan_bitops_generic+0x92/0x1c0 [ 13.782671] kasan_bitops_generic+0x121/0x1c0 [ 13.782693] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.782717] ? __pfx_read_tsc+0x10/0x10 [ 13.782737] ? ktime_get_ts64+0x86/0x230 [ 13.782761] kunit_try_run_case+0x1a5/0x480 [ 13.782785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.782807] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.782830] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.782852] ? __kthread_parkme+0x82/0x180 [ 13.782871] ? preempt_count_sub+0x50/0x80 [ 13.782894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.783164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.783192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.783216] kthread+0x337/0x6f0 [ 13.783235] ? trace_preempt_on+0x20/0xc0 [ 13.783257] ? __pfx_kthread+0x10/0x10 [ 13.783277] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.783298] ? calculate_sigpending+0x7b/0xa0 [ 13.783321] ? __pfx_kthread+0x10/0x10 [ 13.783341] ret_from_fork+0x116/0x1d0 [ 13.783359] ? __pfx_kthread+0x10/0x10 [ 13.783391] ret_from_fork_asm+0x1a/0x30 [ 13.783421] </TASK> [ 13.783432] [ 13.792036] Allocated by task 278: [ 13.792221] kasan_save_stack+0x45/0x70 [ 13.792438] kasan_save_track+0x18/0x40 [ 13.792644] kasan_save_alloc_info+0x3b/0x50 [ 13.792816] __kasan_kmalloc+0xb7/0xc0 [ 13.793073] __kmalloc_cache_noprof+0x189/0x420 [ 13.793235] kasan_bitops_generic+0x92/0x1c0 [ 13.793394] kunit_try_run_case+0x1a5/0x480 [ 13.793542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.793812] kthread+0x337/0x6f0 [ 13.793996] ret_from_fork+0x116/0x1d0 [ 13.794180] ret_from_fork_asm+0x1a/0x30 [ 13.794380] [ 13.794476] The buggy address belongs to the object at ffff888102531780 [ 13.794476] which belongs to the cache kmalloc-16 of size 16 [ 13.794967] The buggy address is located 8 bytes inside of [ 13.794967] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.795326] [ 13.795707] The buggy address belongs to the physical page: [ 13.796039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.796411] flags: 0x200000000000000(node=0|zone=2) [ 13.796653] page_type: f5(slab) [ 13.796812] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.797208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.797506] page dumped because: kasan: bad access detected [ 13.797760] [ 13.797836] Memory state around the buggy address: [ 13.798071] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.798360] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.798713] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.799237] ^ [ 13.799432] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.799707] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.800062] ================================================================== [ 13.800599] ================================================================== [ 13.800883] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.801355] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.801701] [ 13.801799] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.801842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.801854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.801875] Call Trace: [ 13.801891] <TASK> [ 13.801974] dump_stack_lvl+0x73/0xb0 [ 13.802008] print_report+0xd1/0x650 [ 13.802029] ? __virt_addr_valid+0x1db/0x2d0 [ 13.802051] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.802077] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.802098] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.802126] kasan_report+0x141/0x180 [ 13.802147] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.802177] kasan_check_range+0x10c/0x1c0 [ 13.802200] __kasan_check_write+0x18/0x20 [ 13.802220] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.802245] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.802272] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.802295] ? trace_hardirqs_on+0x37/0xe0 [ 13.802318] ? kasan_bitops_generic+0x92/0x1c0 [ 13.802344] kasan_bitops_generic+0x121/0x1c0 [ 13.802367] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.802405] ? __pfx_read_tsc+0x10/0x10 [ 13.802425] ? ktime_get_ts64+0x86/0x230 [ 13.802449] kunit_try_run_case+0x1a5/0x480 [ 13.802472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.802493] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.802517] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.802538] ? __kthread_parkme+0x82/0x180 [ 13.802558] ? preempt_count_sub+0x50/0x80 [ 13.802581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.802622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.802645] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.802667] kthread+0x337/0x6f0 [ 13.802686] ? trace_preempt_on+0x20/0xc0 [ 13.802707] ? __pfx_kthread+0x10/0x10 [ 13.802728] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.802750] ? calculate_sigpending+0x7b/0xa0 [ 13.802775] ? __pfx_kthread+0x10/0x10 [ 13.802796] ret_from_fork+0x116/0x1d0 [ 13.802813] ? __pfx_kthread+0x10/0x10 [ 13.802833] ret_from_fork_asm+0x1a/0x30 [ 13.802863] </TASK> [ 13.802874] [ 13.811756] Allocated by task 278: [ 13.811897] kasan_save_stack+0x45/0x70 [ 13.812175] kasan_save_track+0x18/0x40 [ 13.812347] kasan_save_alloc_info+0x3b/0x50 [ 13.812535] __kasan_kmalloc+0xb7/0xc0 [ 13.812741] __kmalloc_cache_noprof+0x189/0x420 [ 13.812992] kasan_bitops_generic+0x92/0x1c0 [ 13.813224] kunit_try_run_case+0x1a5/0x480 [ 13.813404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.813652] kthread+0x337/0x6f0 [ 13.813775] ret_from_fork+0x116/0x1d0 [ 13.813907] ret_from_fork_asm+0x1a/0x30 [ 13.814122] [ 13.814200] The buggy address belongs to the object at ffff888102531780 [ 13.814200] which belongs to the cache kmalloc-16 of size 16 [ 13.814768] The buggy address is located 8 bytes inside of [ 13.814768] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.815486] [ 13.815588] The buggy address belongs to the physical page: [ 13.815764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.816208] flags: 0x200000000000000(node=0|zone=2) [ 13.816465] page_type: f5(slab) [ 13.816658] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.817138] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.817460] page dumped because: kasan: bad access detected [ 13.818664] [ 13.818879] Memory state around the buggy address: [ 13.819490] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.819980] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.820243] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.820801] ^ [ 13.821214] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.821667] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.822167] ================================================================== [ 13.822736] ================================================================== [ 13.823524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.823924] Read of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.824244] [ 13.824337] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.824401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.824412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.824433] Call Trace: [ 13.824452] <TASK> [ 13.824472] dump_stack_lvl+0x73/0xb0 [ 13.824503] print_report+0xd1/0x650 [ 13.824526] ? __virt_addr_valid+0x1db/0x2d0 [ 13.824549] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.824575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.824597] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.824623] kasan_report+0x141/0x180 [ 13.824644] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.824674] kasan_check_range+0x10c/0x1c0 [ 13.824697] __kasan_check_read+0x15/0x20 [ 13.824716] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.824742] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.824769] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.824794] ? trace_hardirqs_on+0x37/0xe0 [ 13.824816] ? kasan_bitops_generic+0x92/0x1c0 [ 13.824879] kasan_bitops_generic+0x121/0x1c0 [ 13.824901] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.824926] ? __pfx_read_tsc+0x10/0x10 [ 13.824946] ? ktime_get_ts64+0x86/0x230 [ 13.824971] kunit_try_run_case+0x1a5/0x480 [ 13.824997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.825017] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.825041] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.825063] ? __kthread_parkme+0x82/0x180 [ 13.825084] ? preempt_count_sub+0x50/0x80 [ 13.825107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.825130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.825152] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.825174] kthread+0x337/0x6f0 [ 13.825192] ? trace_preempt_on+0x20/0xc0 [ 13.825213] ? __pfx_kthread+0x10/0x10 [ 13.825233] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.825252] ? calculate_sigpending+0x7b/0xa0 [ 13.825275] ? __pfx_kthread+0x10/0x10 [ 13.825297] ret_from_fork+0x116/0x1d0 [ 13.825314] ? __pfx_kthread+0x10/0x10 [ 13.825334] ret_from_fork_asm+0x1a/0x30 [ 13.825363] </TASK> [ 13.825384] [ 13.840336] Allocated by task 278: [ 13.840512] kasan_save_stack+0x45/0x70 [ 13.840834] kasan_save_track+0x18/0x40 [ 13.841306] kasan_save_alloc_info+0x3b/0x50 [ 13.841776] __kasan_kmalloc+0xb7/0xc0 [ 13.842131] __kmalloc_cache_noprof+0x189/0x420 [ 13.842295] kasan_bitops_generic+0x92/0x1c0 [ 13.842458] kunit_try_run_case+0x1a5/0x480 [ 13.842618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.843080] kthread+0x337/0x6f0 [ 13.843450] ret_from_fork+0x116/0x1d0 [ 13.844040] ret_from_fork_asm+0x1a/0x30 [ 13.844427] [ 13.844590] The buggy address belongs to the object at ffff888102531780 [ 13.844590] which belongs to the cache kmalloc-16 of size 16 [ 13.845837] The buggy address is located 8 bytes inside of [ 13.845837] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.847061] [ 13.847152] The buggy address belongs to the physical page: [ 13.847323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.847584] flags: 0x200000000000000(node=0|zone=2) [ 13.848011] page_type: f5(slab) [ 13.848370] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.849223] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.849980] page dumped because: kasan: bad access detected [ 13.850708] [ 13.850886] Memory state around the buggy address: [ 13.851476] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.851834] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.852607] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.853418] ^ [ 13.853689] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.853901] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.854627] ================================================================== [ 13.760417] ================================================================== [ 13.761177] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.761897] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.762259] [ 13.762389] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.762435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.762447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.762469] Call Trace: [ 13.762482] <TASK> [ 13.762497] dump_stack_lvl+0x73/0xb0 [ 13.762526] print_report+0xd1/0x650 [ 13.762548] ? __virt_addr_valid+0x1db/0x2d0 [ 13.762592] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.762618] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.762640] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.762665] kasan_report+0x141/0x180 [ 13.762687] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.762716] kasan_check_range+0x10c/0x1c0 [ 13.762739] __kasan_check_write+0x18/0x20 [ 13.762758] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.762784] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.762811] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.762835] ? trace_hardirqs_on+0x37/0xe0 [ 13.762858] ? kasan_bitops_generic+0x92/0x1c0 [ 13.762883] kasan_bitops_generic+0x121/0x1c0 [ 13.763071] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.763107] ? __pfx_read_tsc+0x10/0x10 [ 13.763128] ? ktime_get_ts64+0x86/0x230 [ 13.763153] kunit_try_run_case+0x1a5/0x480 [ 13.763178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.763199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.763223] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.763245] ? __kthread_parkme+0x82/0x180 [ 13.763264] ? preempt_count_sub+0x50/0x80 [ 13.763288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.763311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.763333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.763356] kthread+0x337/0x6f0 [ 13.763386] ? trace_preempt_on+0x20/0xc0 [ 13.763408] ? __pfx_kthread+0x10/0x10 [ 13.763429] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.763448] ? calculate_sigpending+0x7b/0xa0 [ 13.763471] ? __pfx_kthread+0x10/0x10 [ 13.763491] ret_from_fork+0x116/0x1d0 [ 13.763509] ? __pfx_kthread+0x10/0x10 [ 13.763528] ret_from_fork_asm+0x1a/0x30 [ 13.763580] </TASK> [ 13.763591] [ 13.772519] Allocated by task 278: [ 13.772688] kasan_save_stack+0x45/0x70 [ 13.772834] kasan_save_track+0x18/0x40 [ 13.773030] kasan_save_alloc_info+0x3b/0x50 [ 13.773243] __kasan_kmalloc+0xb7/0xc0 [ 13.773500] __kmalloc_cache_noprof+0x189/0x420 [ 13.773715] kasan_bitops_generic+0x92/0x1c0 [ 13.774011] kunit_try_run_case+0x1a5/0x480 [ 13.774210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.774466] kthread+0x337/0x6f0 [ 13.774631] ret_from_fork+0x116/0x1d0 [ 13.774793] ret_from_fork_asm+0x1a/0x30 [ 13.775094] [ 13.775171] The buggy address belongs to the object at ffff888102531780 [ 13.775171] which belongs to the cache kmalloc-16 of size 16 [ 13.775724] The buggy address is located 8 bytes inside of [ 13.775724] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.776156] [ 13.776228] The buggy address belongs to the physical page: [ 13.776409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.776762] flags: 0x200000000000000(node=0|zone=2) [ 13.776997] page_type: f5(slab) [ 13.777169] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.777600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.777898] page dumped because: kasan: bad access detected [ 13.778181] [ 13.778270] Memory state around the buggy address: [ 13.778484] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.778744] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.779176] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.779507] ^ [ 13.779705] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.780096] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.780423] ==================================================================