Date
July 11, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.737380] ================================================================== [ 14.737709] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.738530] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.738989] [ 14.739098] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.739138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.739150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.739170] Call Trace: [ 14.739183] <TASK> [ 14.739196] dump_stack_lvl+0x73/0xb0 [ 14.739226] print_report+0xd1/0x650 [ 14.739248] ? __virt_addr_valid+0x1db/0x2d0 [ 14.739272] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.739302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.739325] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.739355] kasan_report+0x141/0x180 [ 14.739378] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.739415] kasan_check_range+0x10c/0x1c0 [ 14.739439] __kasan_check_write+0x18/0x20 [ 14.739459] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.739488] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.739520] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.739545] ? trace_hardirqs_on+0x37/0xe0 [ 14.739567] ? kasan_bitops_generic+0x92/0x1c0 [ 14.739595] kasan_bitops_generic+0x121/0x1c0 [ 14.739619] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.739646] ? __pfx_read_tsc+0x10/0x10 [ 14.739666] ? ktime_get_ts64+0x86/0x230 [ 14.739690] kunit_try_run_case+0x1a5/0x480 [ 14.739715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.739738] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.739764] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.739788] ? __kthread_parkme+0x82/0x180 [ 14.739809] ? preempt_count_sub+0x50/0x80 [ 14.739833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.739857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.739882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.739907] kthread+0x337/0x6f0 [ 14.739937] ? trace_preempt_on+0x20/0xc0 [ 14.739959] ? __pfx_kthread+0x10/0x10 [ 14.739980] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.740002] ? calculate_sigpending+0x7b/0xa0 [ 14.740026] ? __pfx_kthread+0x10/0x10 [ 14.740048] ret_from_fork+0x116/0x1d0 [ 14.740066] ? __pfx_kthread+0x10/0x10 [ 14.740087] ret_from_fork_asm+0x1a/0x30 [ 14.740119] </TASK> [ 14.740129] [ 14.748121] Allocated by task 278: [ 14.748250] kasan_save_stack+0x45/0x70 [ 14.748672] kasan_save_track+0x18/0x40 [ 14.748970] kasan_save_alloc_info+0x3b/0x50 [ 14.749193] __kasan_kmalloc+0xb7/0xc0 [ 14.749381] __kmalloc_cache_noprof+0x189/0x420 [ 14.749593] kasan_bitops_generic+0x92/0x1c0 [ 14.749742] kunit_try_run_case+0x1a5/0x480 [ 14.749887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.750071] kthread+0x337/0x6f0 [ 14.750265] ret_from_fork+0x116/0x1d0 [ 14.750447] ret_from_fork_asm+0x1a/0x30 [ 14.750646] [ 14.750739] The buggy address belongs to the object at ffff888102321e80 [ 14.750739] which belongs to the cache kmalloc-16 of size 16 [ 14.751232] The buggy address is located 8 bytes inside of [ 14.751232] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.751583] [ 14.751654] The buggy address belongs to the physical page: [ 14.752048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.752401] flags: 0x200000000000000(node=0|zone=2) [ 14.752626] page_type: f5(slab) [ 14.752827] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.753161] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.753438] page dumped because: kasan: bad access detected [ 14.753661] [ 14.753761] Memory state around the buggy address: [ 14.753972] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.754253] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.754545] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.754812] ^ [ 14.754989] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.755228] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.755543] ================================================================== [ 14.688463] ================================================================== [ 14.688700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.689790] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.690420] [ 14.690596] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.690639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.690651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.690671] Call Trace: [ 14.690685] <TASK> [ 14.690701] dump_stack_lvl+0x73/0xb0 [ 14.690752] print_report+0xd1/0x650 [ 14.690775] ? __virt_addr_valid+0x1db/0x2d0 [ 14.690798] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.690827] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.690850] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.690879] kasan_report+0x141/0x180 [ 14.690901] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.690944] kasan_check_range+0x10c/0x1c0 [ 14.690968] __kasan_check_write+0x18/0x20 [ 14.690987] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.691017] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.691047] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.691071] ? trace_hardirqs_on+0x37/0xe0 [ 14.691093] ? kasan_bitops_generic+0x92/0x1c0 [ 14.691121] kasan_bitops_generic+0x121/0x1c0 [ 14.691145] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.691172] ? __pfx_read_tsc+0x10/0x10 [ 14.691192] ? ktime_get_ts64+0x86/0x230 [ 14.691217] kunit_try_run_case+0x1a5/0x480 [ 14.691242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.691264] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.691288] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.691313] ? __kthread_parkme+0x82/0x180 [ 14.691335] ? preempt_count_sub+0x50/0x80 [ 14.691359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.691383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.691408] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.691434] kthread+0x337/0x6f0 [ 14.691453] ? trace_preempt_on+0x20/0xc0 [ 14.691475] ? __pfx_kthread+0x10/0x10 [ 14.691496] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.691517] ? calculate_sigpending+0x7b/0xa0 [ 14.691541] ? __pfx_kthread+0x10/0x10 [ 14.691562] ret_from_fork+0x116/0x1d0 [ 14.691581] ? __pfx_kthread+0x10/0x10 [ 14.691601] ret_from_fork_asm+0x1a/0x30 [ 14.691633] </TASK> [ 14.691642] [ 14.704755] Allocated by task 278: [ 14.705077] kasan_save_stack+0x45/0x70 [ 14.705436] kasan_save_track+0x18/0x40 [ 14.705780] kasan_save_alloc_info+0x3b/0x50 [ 14.705944] __kasan_kmalloc+0xb7/0xc0 [ 14.706287] __kmalloc_cache_noprof+0x189/0x420 [ 14.706696] kasan_bitops_generic+0x92/0x1c0 [ 14.706967] kunit_try_run_case+0x1a5/0x480 [ 14.707116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.707293] kthread+0x337/0x6f0 [ 14.707413] ret_from_fork+0x116/0x1d0 [ 14.707545] ret_from_fork_asm+0x1a/0x30 [ 14.707683] [ 14.707759] The buggy address belongs to the object at ffff888102321e80 [ 14.707759] which belongs to the cache kmalloc-16 of size 16 [ 14.708506] The buggy address is located 8 bytes inside of [ 14.708506] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.709527] [ 14.709683] The buggy address belongs to the physical page: [ 14.710183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.710877] flags: 0x200000000000000(node=0|zone=2) [ 14.711310] page_type: f5(slab) [ 14.711594] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.712274] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.713042] page dumped because: kasan: bad access detected [ 14.713470] [ 14.713539] Memory state around the buggy address: [ 14.713694] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.713938] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.714154] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.714364] ^ [ 14.714486] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.714703] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.715284] ================================================================== [ 14.756405] ================================================================== [ 14.756759] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.757229] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.757516] [ 14.757622] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.757663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.757675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.757695] Call Trace: [ 14.757709] <TASK> [ 14.757726] dump_stack_lvl+0x73/0xb0 [ 14.757768] print_report+0xd1/0x650 [ 14.757791] ? __virt_addr_valid+0x1db/0x2d0 [ 14.757814] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.757843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.757867] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.757897] kasan_report+0x141/0x180 [ 14.757934] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.757971] kasan_check_range+0x10c/0x1c0 [ 14.757996] __kasan_check_write+0x18/0x20 [ 14.758015] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.758046] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.758077] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.758101] ? trace_hardirqs_on+0x37/0xe0 [ 14.758123] ? kasan_bitops_generic+0x92/0x1c0 [ 14.758151] kasan_bitops_generic+0x121/0x1c0 [ 14.758176] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.758202] ? __pfx_read_tsc+0x10/0x10 [ 14.758222] ? ktime_get_ts64+0x86/0x230 [ 14.758246] kunit_try_run_case+0x1a5/0x480 [ 14.758270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.758293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.758317] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.758341] ? __kthread_parkme+0x82/0x180 [ 14.758362] ? preempt_count_sub+0x50/0x80 [ 14.758387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.758411] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.758437] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.758462] kthread+0x337/0x6f0 [ 14.758481] ? trace_preempt_on+0x20/0xc0 [ 14.758508] ? __pfx_kthread+0x10/0x10 [ 14.758529] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.758551] ? calculate_sigpending+0x7b/0xa0 [ 14.758575] ? __pfx_kthread+0x10/0x10 [ 14.758597] ret_from_fork+0x116/0x1d0 [ 14.758615] ? __pfx_kthread+0x10/0x10 [ 14.758635] ret_from_fork_asm+0x1a/0x30 [ 14.758668] </TASK> [ 14.758677] [ 14.766528] Allocated by task 278: [ 14.766700] kasan_save_stack+0x45/0x70 [ 14.767060] kasan_save_track+0x18/0x40 [ 14.767197] kasan_save_alloc_info+0x3b/0x50 [ 14.767347] __kasan_kmalloc+0xb7/0xc0 [ 14.767480] __kmalloc_cache_noprof+0x189/0x420 [ 14.767634] kasan_bitops_generic+0x92/0x1c0 [ 14.767868] kunit_try_run_case+0x1a5/0x480 [ 14.768088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.768342] kthread+0x337/0x6f0 [ 14.768514] ret_from_fork+0x116/0x1d0 [ 14.768708] ret_from_fork_asm+0x1a/0x30 [ 14.769114] [ 14.769213] The buggy address belongs to the object at ffff888102321e80 [ 14.769213] which belongs to the cache kmalloc-16 of size 16 [ 14.769692] The buggy address is located 8 bytes inside of [ 14.769692] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.770052] [ 14.770121] The buggy address belongs to the physical page: [ 14.770334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.770682] flags: 0x200000000000000(node=0|zone=2) [ 14.771116] page_type: f5(slab) [ 14.771282] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.771585] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.771810] page dumped because: kasan: bad access detected [ 14.771990] [ 14.772057] Memory state around the buggy address: [ 14.772209] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.772621] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.773202] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.773531] ^ [ 14.773715] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.774050] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.774303] ================================================================== [ 14.631405] ================================================================== [ 14.632099] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.632551] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.633183] [ 14.633359] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.633401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.633412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.633431] Call Trace: [ 14.633442] <TASK> [ 14.633457] dump_stack_lvl+0x73/0xb0 [ 14.633485] print_report+0xd1/0x650 [ 14.633507] ? __virt_addr_valid+0x1db/0x2d0 [ 14.633529] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.633558] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.633581] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.633611] kasan_report+0x141/0x180 [ 14.633633] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.633667] kasan_check_range+0x10c/0x1c0 [ 14.633691] __kasan_check_write+0x18/0x20 [ 14.633710] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.633761] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.633792] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.633816] ? trace_hardirqs_on+0x37/0xe0 [ 14.633838] ? kasan_bitops_generic+0x92/0x1c0 [ 14.633866] kasan_bitops_generic+0x121/0x1c0 [ 14.633890] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.633917] ? __pfx_read_tsc+0x10/0x10 [ 14.633946] ? ktime_get_ts64+0x86/0x230 [ 14.633970] kunit_try_run_case+0x1a5/0x480 [ 14.633994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.634016] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.634040] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.634063] ? __kthread_parkme+0x82/0x180 [ 14.634085] ? preempt_count_sub+0x50/0x80 [ 14.634109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.634133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.634157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.634182] kthread+0x337/0x6f0 [ 14.634200] ? trace_preempt_on+0x20/0xc0 [ 14.634223] ? __pfx_kthread+0x10/0x10 [ 14.634242] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.634264] ? calculate_sigpending+0x7b/0xa0 [ 14.634287] ? __pfx_kthread+0x10/0x10 [ 14.634309] ret_from_fork+0x116/0x1d0 [ 14.634326] ? __pfx_kthread+0x10/0x10 [ 14.634347] ret_from_fork_asm+0x1a/0x30 [ 14.634379] </TASK> [ 14.634389] [ 14.647411] Allocated by task 278: [ 14.647610] kasan_save_stack+0x45/0x70 [ 14.647809] kasan_save_track+0x18/0x40 [ 14.648166] kasan_save_alloc_info+0x3b/0x50 [ 14.648547] __kasan_kmalloc+0xb7/0xc0 [ 14.648897] __kmalloc_cache_noprof+0x189/0x420 [ 14.649085] kasan_bitops_generic+0x92/0x1c0 [ 14.649235] kunit_try_run_case+0x1a5/0x480 [ 14.649379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.649554] kthread+0x337/0x6f0 [ 14.649673] ret_from_fork+0x116/0x1d0 [ 14.649964] ret_from_fork_asm+0x1a/0x30 [ 14.650324] [ 14.650475] The buggy address belongs to the object at ffff888102321e80 [ 14.650475] which belongs to the cache kmalloc-16 of size 16 [ 14.651500] The buggy address is located 8 bytes inside of [ 14.651500] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.652521] [ 14.652678] The buggy address belongs to the physical page: [ 14.653188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.653874] flags: 0x200000000000000(node=0|zone=2) [ 14.654307] page_type: f5(slab) [ 14.654432] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.654666] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.655239] page dumped because: kasan: bad access detected [ 14.655705] [ 14.655880] Memory state around the buggy address: [ 14.656315] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.656945] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.657242] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.657453] ^ [ 14.657575] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.657902] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.658499] ================================================================== [ 14.716220] ================================================================== [ 14.717179] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.718024] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.718783] [ 14.719006] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.719046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.719057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.719076] Call Trace: [ 14.719091] <TASK> [ 14.719106] dump_stack_lvl+0x73/0xb0 [ 14.719133] print_report+0xd1/0x650 [ 14.719155] ? __virt_addr_valid+0x1db/0x2d0 [ 14.719177] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.719206] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.719229] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.719259] kasan_report+0x141/0x180 [ 14.719281] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.719317] kasan_check_range+0x10c/0x1c0 [ 14.719341] __kasan_check_write+0x18/0x20 [ 14.719360] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.719392] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.719423] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.719447] ? trace_hardirqs_on+0x37/0xe0 [ 14.719469] ? kasan_bitops_generic+0x92/0x1c0 [ 14.719497] kasan_bitops_generic+0x121/0x1c0 [ 14.719521] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.719547] ? __pfx_read_tsc+0x10/0x10 [ 14.719568] ? ktime_get_ts64+0x86/0x230 [ 14.719591] kunit_try_run_case+0x1a5/0x480 [ 14.719615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.719638] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.719661] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.719685] ? __kthread_parkme+0x82/0x180 [ 14.719705] ? preempt_count_sub+0x50/0x80 [ 14.719729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.719767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.719792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.719818] kthread+0x337/0x6f0 [ 14.719837] ? trace_preempt_on+0x20/0xc0 [ 14.719859] ? __pfx_kthread+0x10/0x10 [ 14.719880] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.719901] ? calculate_sigpending+0x7b/0xa0 [ 14.719936] ? __pfx_kthread+0x10/0x10 [ 14.719958] ret_from_fork+0x116/0x1d0 [ 14.719976] ? __pfx_kthread+0x10/0x10 [ 14.719997] ret_from_fork_asm+0x1a/0x30 [ 14.720029] </TASK> [ 14.720039] [ 14.729772] Allocated by task 278: [ 14.729959] kasan_save_stack+0x45/0x70 [ 14.730157] kasan_save_track+0x18/0x40 [ 14.730352] kasan_save_alloc_info+0x3b/0x50 [ 14.730543] __kasan_kmalloc+0xb7/0xc0 [ 14.730733] __kmalloc_cache_noprof+0x189/0x420 [ 14.730942] kasan_bitops_generic+0x92/0x1c0 [ 14.731127] kunit_try_run_case+0x1a5/0x480 [ 14.731331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.731565] kthread+0x337/0x6f0 [ 14.731728] ret_from_fork+0x116/0x1d0 [ 14.731885] ret_from_fork_asm+0x1a/0x30 [ 14.732079] [ 14.732159] The buggy address belongs to the object at ffff888102321e80 [ 14.732159] which belongs to the cache kmalloc-16 of size 16 [ 14.732632] The buggy address is located 8 bytes inside of [ 14.732632] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.733092] [ 14.733219] The buggy address belongs to the physical page: [ 14.733410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.733680] flags: 0x200000000000000(node=0|zone=2) [ 14.733905] page_type: f5(slab) [ 14.734080] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.734387] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.734765] page dumped because: kasan: bad access detected [ 14.735028] [ 14.735116] Memory state around the buggy address: [ 14.735303] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.735517] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.735731] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.735975] ^ [ 14.736153] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.736467] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.736811] ================================================================== [ 14.794010] ================================================================== [ 14.794299] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.794579] Read of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.794827] [ 14.794947] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.794991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.795003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.795022] Call Trace: [ 14.795036] <TASK> [ 14.795051] dump_stack_lvl+0x73/0xb0 [ 14.795078] print_report+0xd1/0x650 [ 14.795099] ? __virt_addr_valid+0x1db/0x2d0 [ 14.795121] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.795150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.795174] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.795204] kasan_report+0x141/0x180 [ 14.795239] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.795274] __asan_report_load8_noabort+0x18/0x20 [ 14.795299] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.795329] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.795360] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.795384] ? trace_hardirqs_on+0x37/0xe0 [ 14.795405] ? kasan_bitops_generic+0x92/0x1c0 [ 14.795434] kasan_bitops_generic+0x121/0x1c0 [ 14.795457] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.795484] ? __pfx_read_tsc+0x10/0x10 [ 14.795506] ? ktime_get_ts64+0x86/0x230 [ 14.795530] kunit_try_run_case+0x1a5/0x480 [ 14.795554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.795577] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.795601] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.795625] ? __kthread_parkme+0x82/0x180 [ 14.795645] ? preempt_count_sub+0x50/0x80 [ 14.795669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.795694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.795719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.795745] kthread+0x337/0x6f0 [ 14.795773] ? trace_preempt_on+0x20/0xc0 [ 14.795795] ? __pfx_kthread+0x10/0x10 [ 14.795815] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.795837] ? calculate_sigpending+0x7b/0xa0 [ 14.795860] ? __pfx_kthread+0x10/0x10 [ 14.795881] ret_from_fork+0x116/0x1d0 [ 14.795900] ? __pfx_kthread+0x10/0x10 [ 14.795930] ret_from_fork_asm+0x1a/0x30 [ 14.795961] </TASK> [ 14.795970] [ 14.804095] Allocated by task 278: [ 14.804224] kasan_save_stack+0x45/0x70 [ 14.804364] kasan_save_track+0x18/0x40 [ 14.804498] kasan_save_alloc_info+0x3b/0x50 [ 14.804646] __kasan_kmalloc+0xb7/0xc0 [ 14.804777] __kmalloc_cache_noprof+0x189/0x420 [ 14.804942] kasan_bitops_generic+0x92/0x1c0 [ 14.805159] kunit_try_run_case+0x1a5/0x480 [ 14.805365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.805624] kthread+0x337/0x6f0 [ 14.805792] ret_from_fork+0x116/0x1d0 [ 14.805989] ret_from_fork_asm+0x1a/0x30 [ 14.806339] [ 14.806413] The buggy address belongs to the object at ffff888102321e80 [ 14.806413] which belongs to the cache kmalloc-16 of size 16 [ 14.806933] The buggy address is located 8 bytes inside of [ 14.806933] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.807381] [ 14.807457] The buggy address belongs to the physical page: [ 14.807675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.808041] flags: 0x200000000000000(node=0|zone=2) [ 14.808244] page_type: f5(slab) [ 14.808407] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.808658] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.809245] page dumped because: kasan: bad access detected [ 14.809481] [ 14.809549] Memory state around the buggy address: [ 14.809701] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.810050] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.810359] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.810609] ^ [ 14.810732] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.810960] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.811176] ================================================================== [ 14.659679] ================================================================== [ 14.660522] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.661328] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.661982] [ 14.662151] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.662192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.662203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.662222] Call Trace: [ 14.662235] <TASK> [ 14.662248] dump_stack_lvl+0x73/0xb0 [ 14.662276] print_report+0xd1/0x650 [ 14.662298] ? __virt_addr_valid+0x1db/0x2d0 [ 14.662321] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.662350] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.662373] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.662404] kasan_report+0x141/0x180 [ 14.662426] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.662462] kasan_check_range+0x10c/0x1c0 [ 14.662486] __kasan_check_write+0x18/0x20 [ 14.662511] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.662540] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.662570] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.662595] ? trace_hardirqs_on+0x37/0xe0 [ 14.662617] ? kasan_bitops_generic+0x92/0x1c0 [ 14.662645] kasan_bitops_generic+0x121/0x1c0 [ 14.662669] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.662694] ? __pfx_read_tsc+0x10/0x10 [ 14.662715] ? ktime_get_ts64+0x86/0x230 [ 14.662748] kunit_try_run_case+0x1a5/0x480 [ 14.662772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.662796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.662820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.662844] ? __kthread_parkme+0x82/0x180 [ 14.662864] ? preempt_count_sub+0x50/0x80 [ 14.662888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.662913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.662961] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.662986] kthread+0x337/0x6f0 [ 14.663005] ? trace_preempt_on+0x20/0xc0 [ 14.663028] ? __pfx_kthread+0x10/0x10 [ 14.663048] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.663069] ? calculate_sigpending+0x7b/0xa0 [ 14.663094] ? __pfx_kthread+0x10/0x10 [ 14.663115] ret_from_fork+0x116/0x1d0 [ 14.663133] ? __pfx_kthread+0x10/0x10 [ 14.663153] ret_from_fork_asm+0x1a/0x30 [ 14.663184] </TASK> [ 14.663193] [ 14.676029] Allocated by task 278: [ 14.676160] kasan_save_stack+0x45/0x70 [ 14.676303] kasan_save_track+0x18/0x40 [ 14.676437] kasan_save_alloc_info+0x3b/0x50 [ 14.676586] __kasan_kmalloc+0xb7/0xc0 [ 14.676717] __kmalloc_cache_noprof+0x189/0x420 [ 14.677135] kasan_bitops_generic+0x92/0x1c0 [ 14.677505] kunit_try_run_case+0x1a5/0x480 [ 14.677892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.678359] kthread+0x337/0x6f0 [ 14.678658] ret_from_fork+0x116/0x1d0 [ 14.679041] ret_from_fork_asm+0x1a/0x30 [ 14.679387] [ 14.679541] The buggy address belongs to the object at ffff888102321e80 [ 14.679541] which belongs to the cache kmalloc-16 of size 16 [ 14.680569] The buggy address is located 8 bytes inside of [ 14.680569] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.681535] [ 14.681608] The buggy address belongs to the physical page: [ 14.681883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.682537] flags: 0x200000000000000(node=0|zone=2) [ 14.683007] page_type: f5(slab) [ 14.683244] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.683476] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.683701] page dumped because: kasan: bad access detected [ 14.683878] [ 14.684007] Memory state around the buggy address: [ 14.684407] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.685022] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.685634] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.686248] ^ [ 14.686559] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.687186] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.687799] ================================================================== [ 14.602245] ================================================================== [ 14.603020] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.603544] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.603843] [ 14.604025] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.604068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.604080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.604100] Call Trace: [ 14.604116] <TASK> [ 14.604131] dump_stack_lvl+0x73/0xb0 [ 14.604159] print_report+0xd1/0x650 [ 14.604181] ? __virt_addr_valid+0x1db/0x2d0 [ 14.604204] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.604232] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.604257] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.604286] kasan_report+0x141/0x180 [ 14.604308] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.604343] kasan_check_range+0x10c/0x1c0 [ 14.604367] __kasan_check_write+0x18/0x20 [ 14.604386] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.604416] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.604447] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.604471] ? trace_hardirqs_on+0x37/0xe0 [ 14.604493] ? kasan_bitops_generic+0x92/0x1c0 [ 14.604521] kasan_bitops_generic+0x121/0x1c0 [ 14.604545] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.604571] ? __pfx_read_tsc+0x10/0x10 [ 14.604592] ? ktime_get_ts64+0x86/0x230 [ 14.604616] kunit_try_run_case+0x1a5/0x480 [ 14.604639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.604662] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.604686] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.604711] ? __kthread_parkme+0x82/0x180 [ 14.604752] ? preempt_count_sub+0x50/0x80 [ 14.604778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.604802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.604827] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.604852] kthread+0x337/0x6f0 [ 14.604872] ? trace_preempt_on+0x20/0xc0 [ 14.604894] ? __pfx_kthread+0x10/0x10 [ 14.604914] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.604946] ? calculate_sigpending+0x7b/0xa0 [ 14.604970] ? __pfx_kthread+0x10/0x10 [ 14.604992] ret_from_fork+0x116/0x1d0 [ 14.605010] ? __pfx_kthread+0x10/0x10 [ 14.605030] ret_from_fork_asm+0x1a/0x30 [ 14.605062] </TASK> [ 14.605072] [ 14.618411] Allocated by task 278: [ 14.618554] kasan_save_stack+0x45/0x70 [ 14.618704] kasan_save_track+0x18/0x40 [ 14.619070] kasan_save_alloc_info+0x3b/0x50 [ 14.619450] __kasan_kmalloc+0xb7/0xc0 [ 14.619803] __kmalloc_cache_noprof+0x189/0x420 [ 14.620209] kasan_bitops_generic+0x92/0x1c0 [ 14.620597] kunit_try_run_case+0x1a5/0x480 [ 14.621071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.621533] kthread+0x337/0x6f0 [ 14.621855] ret_from_fork+0x116/0x1d0 [ 14.622091] ret_from_fork_asm+0x1a/0x30 [ 14.622232] [ 14.622302] The buggy address belongs to the object at ffff888102321e80 [ 14.622302] which belongs to the cache kmalloc-16 of size 16 [ 14.622656] The buggy address is located 8 bytes inside of [ 14.622656] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.623576] [ 14.623750] The buggy address belongs to the physical page: [ 14.624220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.624899] flags: 0x200000000000000(node=0|zone=2) [ 14.625339] page_type: f5(slab) [ 14.625633] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.626284] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.626940] page dumped because: kasan: bad access detected [ 14.627200] [ 14.627268] Memory state around the buggy address: [ 14.627424] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.627637] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.628101] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.628706] ^ [ 14.629046] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.629642] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.630254] ================================================================== [ 14.775136] ================================================================== [ 14.775489] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.775850] Read of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.776273] [ 14.776390] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.776431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.776442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.776461] Call Trace: [ 14.776474] <TASK> [ 14.776487] dump_stack_lvl+0x73/0xb0 [ 14.776517] print_report+0xd1/0x650 [ 14.776539] ? __virt_addr_valid+0x1db/0x2d0 [ 14.776562] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.776592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.776616] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.776646] kasan_report+0x141/0x180 [ 14.776667] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.776702] kasan_check_range+0x10c/0x1c0 [ 14.776726] __kasan_check_read+0x15/0x20 [ 14.776745] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.776775] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.776805] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.776829] ? trace_hardirqs_on+0x37/0xe0 [ 14.776851] ? kasan_bitops_generic+0x92/0x1c0 [ 14.776879] kasan_bitops_generic+0x121/0x1c0 [ 14.776903] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.776941] ? __pfx_read_tsc+0x10/0x10 [ 14.776961] ? ktime_get_ts64+0x86/0x230 [ 14.776985] kunit_try_run_case+0x1a5/0x480 [ 14.777019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.777044] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.777068] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.777093] ? __kthread_parkme+0x82/0x180 [ 14.777113] ? preempt_count_sub+0x50/0x80 [ 14.777137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.777162] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.777187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.777212] kthread+0x337/0x6f0 [ 14.777230] ? trace_preempt_on+0x20/0xc0 [ 14.777253] ? __pfx_kthread+0x10/0x10 [ 14.777273] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.777296] ? calculate_sigpending+0x7b/0xa0 [ 14.777319] ? __pfx_kthread+0x10/0x10 [ 14.777340] ret_from_fork+0x116/0x1d0 [ 14.777358] ? __pfx_kthread+0x10/0x10 [ 14.777378] ret_from_fork_asm+0x1a/0x30 [ 14.777410] </TASK> [ 14.777419] [ 14.785701] Allocated by task 278: [ 14.785881] kasan_save_stack+0x45/0x70 [ 14.786095] kasan_save_track+0x18/0x40 [ 14.786289] kasan_save_alloc_info+0x3b/0x50 [ 14.786498] __kasan_kmalloc+0xb7/0xc0 [ 14.786728] __kmalloc_cache_noprof+0x189/0x420 [ 14.786891] kasan_bitops_generic+0x92/0x1c0 [ 14.787196] kunit_try_run_case+0x1a5/0x480 [ 14.787390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.787593] kthread+0x337/0x6f0 [ 14.787714] ret_from_fork+0x116/0x1d0 [ 14.787845] ret_from_fork_asm+0x1a/0x30 [ 14.787995] [ 14.788064] The buggy address belongs to the object at ffff888102321e80 [ 14.788064] which belongs to the cache kmalloc-16 of size 16 [ 14.788584] The buggy address is located 8 bytes inside of [ 14.788584] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.789230] [ 14.789303] The buggy address belongs to the physical page: [ 14.789472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.789784] flags: 0x200000000000000(node=0|zone=2) [ 14.790029] page_type: f5(slab) [ 14.790200] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.790529] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.790828] page dumped because: kasan: bad access detected [ 14.791080] [ 14.791167] Memory state around the buggy address: [ 14.791361] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.791613] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.792013] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.792309] ^ [ 14.792428] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.792641] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.793219] ==================================================================