Date
July 19, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.327228] ================================================================== [ 14.327807] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.328231] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.328692] [ 14.328801] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.328844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.328856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.328876] Call Trace: [ 14.328888] <TASK> [ 14.328900] dump_stack_lvl+0x73/0xb0 [ 14.328926] print_report+0xd1/0x610 [ 14.328947] ? __virt_addr_valid+0x1db/0x2d0 [ 14.328974] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.328999] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.329030] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.329056] kasan_report+0x141/0x180 [ 14.329077] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.329108] kasan_check_range+0x10c/0x1c0 [ 14.329130] __kasan_check_write+0x18/0x20 [ 14.329148] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.329174] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.329200] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.329223] ? trace_hardirqs_on+0x37/0xe0 [ 14.329243] ? kasan_bitops_generic+0x92/0x1c0 [ 14.329269] kasan_bitops_generic+0x121/0x1c0 [ 14.329291] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.329315] ? __pfx_read_tsc+0x10/0x10 [ 14.329334] ? ktime_get_ts64+0x86/0x230 [ 14.329358] kunit_try_run_case+0x1a5/0x480 [ 14.329436] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.329458] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.329480] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.329503] ? __kthread_parkme+0x82/0x180 [ 14.329522] ? preempt_count_sub+0x50/0x80 [ 14.329544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.329567] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.329589] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.329612] kthread+0x337/0x6f0 [ 14.329629] ? trace_preempt_on+0x20/0xc0 [ 14.329650] ? __pfx_kthread+0x10/0x10 [ 14.329670] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.329690] ? calculate_sigpending+0x7b/0xa0 [ 14.329712] ? __pfx_kthread+0x10/0x10 [ 14.329733] ret_from_fork+0x116/0x1d0 [ 14.329751] ? __pfx_kthread+0x10/0x10 [ 14.329770] ret_from_fork_asm+0x1a/0x30 [ 14.329800] </TASK> [ 14.329810] [ 14.337987] Allocated by task 278: [ 14.338125] kasan_save_stack+0x45/0x70 [ 14.338381] kasan_save_track+0x18/0x40 [ 14.338676] kasan_save_alloc_info+0x3b/0x50 [ 14.338906] __kasan_kmalloc+0xb7/0xc0 [ 14.339082] __kmalloc_cache_noprof+0x189/0x420 [ 14.339287] kasan_bitops_generic+0x92/0x1c0 [ 14.339433] kunit_try_run_case+0x1a5/0x480 [ 14.339834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.340120] kthread+0x337/0x6f0 [ 14.340282] ret_from_fork+0x116/0x1d0 [ 14.340540] ret_from_fork_asm+0x1a/0x30 [ 14.340690] [ 14.340763] The buggy address belongs to the object at ffff888101df6d60 [ 14.340763] which belongs to the cache kmalloc-16 of size 16 [ 14.341195] The buggy address is located 8 bytes inside of [ 14.341195] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.341713] [ 14.341808] The buggy address belongs to the physical page: [ 14.342111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.342353] flags: 0x200000000000000(node=0|zone=2) [ 14.342514] page_type: f5(slab) [ 14.342732] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.343102] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.343574] page dumped because: kasan: bad access detected [ 14.343843] [ 14.343938] Memory state around the buggy address: [ 14.344152] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.344684] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.344993] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.345300] ^ [ 14.345630] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.345911] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.346200] ================================================================== [ 14.369243] ================================================================== [ 14.369623] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.369958] Read of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.370301] [ 14.370459] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.370502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.370514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.370534] Call Trace: [ 14.370548] <TASK> [ 14.370563] dump_stack_lvl+0x73/0xb0 [ 14.370588] print_report+0xd1/0x610 [ 14.370609] ? __virt_addr_valid+0x1db/0x2d0 [ 14.370629] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.370654] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.370676] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.370701] kasan_report+0x141/0x180 [ 14.370722] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.370753] __asan_report_load8_noabort+0x18/0x20 [ 14.370776] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.370802] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.370830] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.370853] ? trace_hardirqs_on+0x37/0xe0 [ 14.370874] ? kasan_bitops_generic+0x92/0x1c0 [ 14.370900] kasan_bitops_generic+0x121/0x1c0 [ 14.370922] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.370946] ? __pfx_read_tsc+0x10/0x10 [ 14.370965] ? ktime_get_ts64+0x86/0x230 [ 14.370988] kunit_try_run_case+0x1a5/0x480 [ 14.371084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.371106] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.371128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.371150] ? __kthread_parkme+0x82/0x180 [ 14.371170] ? preempt_count_sub+0x50/0x80 [ 14.371192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.371215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.371237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.371259] kthread+0x337/0x6f0 [ 14.371278] ? trace_preempt_on+0x20/0xc0 [ 14.371299] ? __pfx_kthread+0x10/0x10 [ 14.371319] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.371339] ? calculate_sigpending+0x7b/0xa0 [ 14.371361] ? __pfx_kthread+0x10/0x10 [ 14.371398] ret_from_fork+0x116/0x1d0 [ 14.371416] ? __pfx_kthread+0x10/0x10 [ 14.371435] ret_from_fork_asm+0x1a/0x30 [ 14.371465] </TASK> [ 14.371474] [ 14.379125] Allocated by task 278: [ 14.379252] kasan_save_stack+0x45/0x70 [ 14.379506] kasan_save_track+0x18/0x40 [ 14.379709] kasan_save_alloc_info+0x3b/0x50 [ 14.379922] __kasan_kmalloc+0xb7/0xc0 [ 14.380124] __kmalloc_cache_noprof+0x189/0x420 [ 14.380350] kasan_bitops_generic+0x92/0x1c0 [ 14.380585] kunit_try_run_case+0x1a5/0x480 [ 14.380757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.381001] kthread+0x337/0x6f0 [ 14.381142] ret_from_fork+0x116/0x1d0 [ 14.381330] ret_from_fork_asm+0x1a/0x30 [ 14.381722] [ 14.381821] The buggy address belongs to the object at ffff888101df6d60 [ 14.381821] which belongs to the cache kmalloc-16 of size 16 [ 14.382313] The buggy address is located 8 bytes inside of [ 14.382313] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.382938] [ 14.383054] The buggy address belongs to the physical page: [ 14.383273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.383612] flags: 0x200000000000000(node=0|zone=2) [ 14.383774] page_type: f5(slab) [ 14.383892] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.384137] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.384367] page dumped because: kasan: bad access detected [ 14.384650] [ 14.384789] Memory state around the buggy address: [ 14.385030] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.385352] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.385706] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.385951] ^ [ 14.386161] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.386546] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.386887] ================================================================== [ 14.305742] ================================================================== [ 14.306070] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.306460] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.306755] [ 14.306852] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.306892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.306902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.306922] Call Trace: [ 14.306934] <TASK> [ 14.306947] dump_stack_lvl+0x73/0xb0 [ 14.306970] print_report+0xd1/0x610 [ 14.306991] ? __virt_addr_valid+0x1db/0x2d0 [ 14.307023] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.307049] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.307070] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.307096] kasan_report+0x141/0x180 [ 14.307117] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.307147] kasan_check_range+0x10c/0x1c0 [ 14.307169] __kasan_check_write+0x18/0x20 [ 14.307187] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.307213] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.307240] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.307262] ? trace_hardirqs_on+0x37/0xe0 [ 14.307282] ? kasan_bitops_generic+0x92/0x1c0 [ 14.307308] kasan_bitops_generic+0x121/0x1c0 [ 14.307331] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.307354] ? __pfx_read_tsc+0x10/0x10 [ 14.307373] ? ktime_get_ts64+0x86/0x230 [ 14.307395] kunit_try_run_case+0x1a5/0x480 [ 14.307417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.307439] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.307460] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.307482] ? __kthread_parkme+0x82/0x180 [ 14.307501] ? preempt_count_sub+0x50/0x80 [ 14.307523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.307546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.307568] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.307591] kthread+0x337/0x6f0 [ 14.307608] ? trace_preempt_on+0x20/0xc0 [ 14.307629] ? __pfx_kthread+0x10/0x10 [ 14.307649] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.307669] ? calculate_sigpending+0x7b/0xa0 [ 14.307692] ? __pfx_kthread+0x10/0x10 [ 14.307712] ret_from_fork+0x116/0x1d0 [ 14.307729] ? __pfx_kthread+0x10/0x10 [ 14.307748] ret_from_fork_asm+0x1a/0x30 [ 14.307777] </TASK> [ 14.307786] [ 14.316682] Allocated by task 278: [ 14.316862] kasan_save_stack+0x45/0x70 [ 14.317080] kasan_save_track+0x18/0x40 [ 14.317271] kasan_save_alloc_info+0x3b/0x50 [ 14.317640] __kasan_kmalloc+0xb7/0xc0 [ 14.317834] __kmalloc_cache_noprof+0x189/0x420 [ 14.318075] kasan_bitops_generic+0x92/0x1c0 [ 14.318288] kunit_try_run_case+0x1a5/0x480 [ 14.318521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.318767] kthread+0x337/0x6f0 [ 14.318989] ret_from_fork+0x116/0x1d0 [ 14.319191] ret_from_fork_asm+0x1a/0x30 [ 14.319441] [ 14.319615] The buggy address belongs to the object at ffff888101df6d60 [ 14.319615] which belongs to the cache kmalloc-16 of size 16 [ 14.320078] The buggy address is located 8 bytes inside of [ 14.320078] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.320698] [ 14.320778] The buggy address belongs to the physical page: [ 14.321031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.321344] flags: 0x200000000000000(node=0|zone=2) [ 14.321625] page_type: f5(slab) [ 14.321766] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.322088] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.322330] page dumped because: kasan: bad access detected [ 14.322758] [ 14.322871] Memory state around the buggy address: [ 14.323125] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.325051] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.325357] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.325571] ^ [ 14.325769] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.325982] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.326756] ================================================================== [ 14.265514] ================================================================== [ 14.266206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.266658] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.267107] [ 14.267203] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.267244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.267256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.267276] Call Trace: [ 14.267289] <TASK> [ 14.267304] dump_stack_lvl+0x73/0xb0 [ 14.267331] print_report+0xd1/0x610 [ 14.267352] ? __virt_addr_valid+0x1db/0x2d0 [ 14.267583] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.267610] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.267632] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.267658] kasan_report+0x141/0x180 [ 14.267678] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.267709] kasan_check_range+0x10c/0x1c0 [ 14.267731] __kasan_check_write+0x18/0x20 [ 14.267749] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.267775] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.267802] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.267824] ? trace_hardirqs_on+0x37/0xe0 [ 14.267846] ? kasan_bitops_generic+0x92/0x1c0 [ 14.267873] kasan_bitops_generic+0x121/0x1c0 [ 14.267895] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.267918] ? __pfx_read_tsc+0x10/0x10 [ 14.267939] ? ktime_get_ts64+0x86/0x230 [ 14.267962] kunit_try_run_case+0x1a5/0x480 [ 14.267984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.268019] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.268041] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.268063] ? __kthread_parkme+0x82/0x180 [ 14.268081] ? preempt_count_sub+0x50/0x80 [ 14.268103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.268126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.268148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.268170] kthread+0x337/0x6f0 [ 14.268189] ? trace_preempt_on+0x20/0xc0 [ 14.268209] ? __pfx_kthread+0x10/0x10 [ 14.268229] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.268249] ? calculate_sigpending+0x7b/0xa0 [ 14.268272] ? __pfx_kthread+0x10/0x10 [ 14.268292] ret_from_fork+0x116/0x1d0 [ 14.268310] ? __pfx_kthread+0x10/0x10 [ 14.268328] ret_from_fork_asm+0x1a/0x30 [ 14.268358] </TASK> [ 14.268367] [ 14.277371] Allocated by task 278: [ 14.277508] kasan_save_stack+0x45/0x70 [ 14.277651] kasan_save_track+0x18/0x40 [ 14.277786] kasan_save_alloc_info+0x3b/0x50 [ 14.278000] __kasan_kmalloc+0xb7/0xc0 [ 14.278251] __kmalloc_cache_noprof+0x189/0x420 [ 14.278559] kasan_bitops_generic+0x92/0x1c0 [ 14.278766] kunit_try_run_case+0x1a5/0x480 [ 14.278932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.279116] kthread+0x337/0x6f0 [ 14.279237] ret_from_fork+0x116/0x1d0 [ 14.279459] ret_from_fork_asm+0x1a/0x30 [ 14.279667] [ 14.279763] The buggy address belongs to the object at ffff888101df6d60 [ 14.279763] which belongs to the cache kmalloc-16 of size 16 [ 14.280313] The buggy address is located 8 bytes inside of [ 14.280313] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.281157] [ 14.281265] The buggy address belongs to the physical page: [ 14.281593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.281840] flags: 0x200000000000000(node=0|zone=2) [ 14.282001] page_type: f5(slab) [ 14.282134] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.282637] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.282978] page dumped because: kasan: bad access detected [ 14.283242] [ 14.283336] Memory state around the buggy address: [ 14.283848] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.284170] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.284515] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.284804] ^ [ 14.285026] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.285241] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.285480] ================================================================== [ 14.238255] ================================================================== [ 14.238761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.239177] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.239916] [ 14.240130] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.240174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.240185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.240206] Call Trace: [ 14.240218] <TASK> [ 14.240232] dump_stack_lvl+0x73/0xb0 [ 14.240260] print_report+0xd1/0x610 [ 14.240370] ? __virt_addr_valid+0x1db/0x2d0 [ 14.240397] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.240424] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.240454] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.240481] kasan_report+0x141/0x180 [ 14.240502] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.240533] kasan_check_range+0x10c/0x1c0 [ 14.240555] __kasan_check_write+0x18/0x20 [ 14.240574] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.240600] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.240627] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.240648] ? trace_hardirqs_on+0x37/0xe0 [ 14.240669] ? kasan_bitops_generic+0x92/0x1c0 [ 14.240695] kasan_bitops_generic+0x121/0x1c0 [ 14.240717] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.240741] ? __pfx_read_tsc+0x10/0x10 [ 14.240760] ? ktime_get_ts64+0x86/0x230 [ 14.240782] kunit_try_run_case+0x1a5/0x480 [ 14.240805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.240829] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.240852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.240874] ? __kthread_parkme+0x82/0x180 [ 14.240893] ? preempt_count_sub+0x50/0x80 [ 14.240915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.240938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.240961] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.240990] kthread+0x337/0x6f0 [ 14.241021] ? trace_preempt_on+0x20/0xc0 [ 14.241042] ? __pfx_kthread+0x10/0x10 [ 14.241062] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.241082] ? calculate_sigpending+0x7b/0xa0 [ 14.241106] ? __pfx_kthread+0x10/0x10 [ 14.241127] ret_from_fork+0x116/0x1d0 [ 14.241144] ? __pfx_kthread+0x10/0x10 [ 14.241164] ret_from_fork_asm+0x1a/0x30 [ 14.241193] </TASK> [ 14.241202] [ 14.253349] Allocated by task 278: [ 14.253750] kasan_save_stack+0x45/0x70 [ 14.253948] kasan_save_track+0x18/0x40 [ 14.254235] kasan_save_alloc_info+0x3b/0x50 [ 14.254812] __kasan_kmalloc+0xb7/0xc0 [ 14.255016] __kmalloc_cache_noprof+0x189/0x420 [ 14.255209] kasan_bitops_generic+0x92/0x1c0 [ 14.255623] kunit_try_run_case+0x1a5/0x480 [ 14.255847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.256088] kthread+0x337/0x6f0 [ 14.256248] ret_from_fork+0x116/0x1d0 [ 14.256742] ret_from_fork_asm+0x1a/0x30 [ 14.256944] [ 14.257038] The buggy address belongs to the object at ffff888101df6d60 [ 14.257038] which belongs to the cache kmalloc-16 of size 16 [ 14.257886] The buggy address is located 8 bytes inside of [ 14.257886] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.258795] [ 14.258900] The buggy address belongs to the physical page: [ 14.259157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.259676] flags: 0x200000000000000(node=0|zone=2) [ 14.259917] page_type: f5(slab) [ 14.260061] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.260681] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.261114] page dumped because: kasan: bad access detected [ 14.261472] [ 14.261589] Memory state around the buggy address: [ 14.262017] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.262521] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.262907] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.263240] ^ [ 14.263677] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.264094] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.264793] ================================================================== [ 14.177939] ================================================================== [ 14.178199] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.179127] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.179726] [ 14.179839] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.179882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.179894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.179915] Call Trace: [ 14.179927] <TASK> [ 14.179941] dump_stack_lvl+0x73/0xb0 [ 14.179968] print_report+0xd1/0x610 [ 14.179989] ? __virt_addr_valid+0x1db/0x2d0 [ 14.180021] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.180046] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.180068] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.180094] kasan_report+0x141/0x180 [ 14.180116] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.180146] kasan_check_range+0x10c/0x1c0 [ 14.180169] __kasan_check_write+0x18/0x20 [ 14.180187] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.180212] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.180239] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.180262] ? trace_hardirqs_on+0x37/0xe0 [ 14.180281] ? kasan_bitops_generic+0x92/0x1c0 [ 14.180307] kasan_bitops_generic+0x121/0x1c0 [ 14.180329] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.180353] ? __pfx_read_tsc+0x10/0x10 [ 14.180372] ? ktime_get_ts64+0x86/0x230 [ 14.180395] kunit_try_run_case+0x1a5/0x480 [ 14.180417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.180439] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.180461] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.180483] ? __kthread_parkme+0x82/0x180 [ 14.180502] ? preempt_count_sub+0x50/0x80 [ 14.180524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.180547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.180632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.180658] kthread+0x337/0x6f0 [ 14.180677] ? trace_preempt_on+0x20/0xc0 [ 14.180698] ? __pfx_kthread+0x10/0x10 [ 14.180717] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.180738] ? calculate_sigpending+0x7b/0xa0 [ 14.180761] ? __pfx_kthread+0x10/0x10 [ 14.180782] ret_from_fork+0x116/0x1d0 [ 14.180801] ? __pfx_kthread+0x10/0x10 [ 14.180821] ret_from_fork_asm+0x1a/0x30 [ 14.180850] </TASK> [ 14.180859] [ 14.195276] Allocated by task 278: [ 14.195861] kasan_save_stack+0x45/0x70 [ 14.196050] kasan_save_track+0x18/0x40 [ 14.196231] kasan_save_alloc_info+0x3b/0x50 [ 14.196660] __kasan_kmalloc+0xb7/0xc0 [ 14.196857] __kmalloc_cache_noprof+0x189/0x420 [ 14.197086] kasan_bitops_generic+0x92/0x1c0 [ 14.197280] kunit_try_run_case+0x1a5/0x480 [ 14.197937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.198398] kthread+0x337/0x6f0 [ 14.198672] ret_from_fork+0x116/0x1d0 [ 14.198859] ret_from_fork_asm+0x1a/0x30 [ 14.199051] [ 14.199142] The buggy address belongs to the object at ffff888101df6d60 [ 14.199142] which belongs to the cache kmalloc-16 of size 16 [ 14.200504] The buggy address is located 8 bytes inside of [ 14.200504] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.201417] [ 14.201667] The buggy address belongs to the physical page: [ 14.202054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.202608] flags: 0x200000000000000(node=0|zone=2) [ 14.202845] page_type: f5(slab) [ 14.203013] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.203327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.204195] page dumped because: kasan: bad access detected [ 14.204389] [ 14.204462] Memory state around the buggy address: [ 14.204618] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.204833] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.205073] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.205283] ^ [ 14.205582] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.205912] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.207015] ================================================================== [ 14.208227] ================================================================== [ 14.209392] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.210679] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.211554] [ 14.211908] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.211957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.211969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.211989] Call Trace: [ 14.212013] <TASK> [ 14.212026] dump_stack_lvl+0x73/0xb0 [ 14.212189] print_report+0xd1/0x610 [ 14.212220] ? __virt_addr_valid+0x1db/0x2d0 [ 14.212243] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.212268] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.212289] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.212316] kasan_report+0x141/0x180 [ 14.212336] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.212367] kasan_check_range+0x10c/0x1c0 [ 14.212413] __kasan_check_write+0x18/0x20 [ 14.212432] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.212458] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.212484] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.212507] ? trace_hardirqs_on+0x37/0xe0 [ 14.212529] ? kasan_bitops_generic+0x92/0x1c0 [ 14.212555] kasan_bitops_generic+0x121/0x1c0 [ 14.212578] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.212602] ? __pfx_read_tsc+0x10/0x10 [ 14.212622] ? ktime_get_ts64+0x86/0x230 [ 14.212644] kunit_try_run_case+0x1a5/0x480 [ 14.212668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.212689] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.212712] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.212734] ? __kthread_parkme+0x82/0x180 [ 14.212753] ? preempt_count_sub+0x50/0x80 [ 14.212775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.212798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.212820] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.212860] kthread+0x337/0x6f0 [ 14.212891] ? trace_preempt_on+0x20/0xc0 [ 14.212912] ? __pfx_kthread+0x10/0x10 [ 14.212932] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.212952] ? calculate_sigpending+0x7b/0xa0 [ 14.212978] ? __pfx_kthread+0x10/0x10 [ 14.212999] ret_from_fork+0x116/0x1d0 [ 14.213027] ? __pfx_kthread+0x10/0x10 [ 14.213046] ret_from_fork_asm+0x1a/0x30 [ 14.213076] </TASK> [ 14.213086] [ 14.226098] Allocated by task 278: [ 14.226293] kasan_save_stack+0x45/0x70 [ 14.226697] kasan_save_track+0x18/0x40 [ 14.227084] kasan_save_alloc_info+0x3b/0x50 [ 14.227448] __kasan_kmalloc+0xb7/0xc0 [ 14.227801] __kmalloc_cache_noprof+0x189/0x420 [ 14.228128] kasan_bitops_generic+0x92/0x1c0 [ 14.228517] kunit_try_run_case+0x1a5/0x480 [ 14.228837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.229179] kthread+0x337/0x6f0 [ 14.229357] ret_from_fork+0x116/0x1d0 [ 14.229842] ret_from_fork_asm+0x1a/0x30 [ 14.229993] [ 14.230218] The buggy address belongs to the object at ffff888101df6d60 [ 14.230218] which belongs to the cache kmalloc-16 of size 16 [ 14.230876] The buggy address is located 8 bytes inside of [ 14.230876] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.231383] [ 14.231725] The buggy address belongs to the physical page: [ 14.231971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.232450] flags: 0x200000000000000(node=0|zone=2) [ 14.232818] page_type: f5(slab) [ 14.232952] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.233486] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.233885] page dumped because: kasan: bad access detected [ 14.234212] [ 14.234316] Memory state around the buggy address: [ 14.234832] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.235226] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.235729] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.236052] ^ [ 14.236334] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.237066] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.237592] ================================================================== [ 14.346769] ================================================================== [ 14.347076] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.347512] Read of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.347815] [ 14.347916] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.347955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.347966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.347986] Call Trace: [ 14.347999] <TASK> [ 14.348024] dump_stack_lvl+0x73/0xb0 [ 14.348050] print_report+0xd1/0x610 [ 14.348071] ? __virt_addr_valid+0x1db/0x2d0 [ 14.348091] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.348118] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.348139] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.348165] kasan_report+0x141/0x180 [ 14.348186] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.348217] kasan_check_range+0x10c/0x1c0 [ 14.348238] __kasan_check_read+0x15/0x20 [ 14.348257] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.348283] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.348309] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.348332] ? trace_hardirqs_on+0x37/0xe0 [ 14.348351] ? kasan_bitops_generic+0x92/0x1c0 [ 14.348378] kasan_bitops_generic+0x121/0x1c0 [ 14.348401] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.348436] ? __pfx_read_tsc+0x10/0x10 [ 14.348456] ? ktime_get_ts64+0x86/0x230 [ 14.348478] kunit_try_run_case+0x1a5/0x480 [ 14.348500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.348522] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.348544] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.348566] ? __kthread_parkme+0x82/0x180 [ 14.348585] ? preempt_count_sub+0x50/0x80 [ 14.348607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.348630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.348652] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.348675] kthread+0x337/0x6f0 [ 14.348693] ? trace_preempt_on+0x20/0xc0 [ 14.348714] ? __pfx_kthread+0x10/0x10 [ 14.348734] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.348754] ? calculate_sigpending+0x7b/0xa0 [ 14.348776] ? __pfx_kthread+0x10/0x10 [ 14.348796] ret_from_fork+0x116/0x1d0 [ 14.348814] ? __pfx_kthread+0x10/0x10 [ 14.348834] ret_from_fork_asm+0x1a/0x30 [ 14.348864] </TASK> [ 14.348872] [ 14.357215] Allocated by task 278: [ 14.357401] kasan_save_stack+0x45/0x70 [ 14.357618] kasan_save_track+0x18/0x40 [ 14.357753] kasan_save_alloc_info+0x3b/0x50 [ 14.357900] __kasan_kmalloc+0xb7/0xc0 [ 14.358042] __kmalloc_cache_noprof+0x189/0x420 [ 14.358197] kasan_bitops_generic+0x92/0x1c0 [ 14.358345] kunit_try_run_case+0x1a5/0x480 [ 14.358549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.359360] kthread+0x337/0x6f0 [ 14.359549] ret_from_fork+0x116/0x1d0 [ 14.359736] ret_from_fork_asm+0x1a/0x30 [ 14.359931] [ 14.360036] The buggy address belongs to the object at ffff888101df6d60 [ 14.360036] which belongs to the cache kmalloc-16 of size 16 [ 14.360546] The buggy address is located 8 bytes inside of [ 14.360546] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.361436] [ 14.361618] The buggy address belongs to the physical page: [ 14.361858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.362174] flags: 0x200000000000000(node=0|zone=2) [ 14.363492] page_type: f5(slab) [ 14.363644] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.363877] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.364117] page dumped because: kasan: bad access detected [ 14.364357] [ 14.365118] Memory state around the buggy address: [ 14.365338] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.366186] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.367420] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.367719] ^ [ 14.367925] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.368171] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.368558] ================================================================== [ 14.285975] ================================================================== [ 14.286732] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.287125] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.287505] [ 14.287603] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.287644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.287655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.287675] Call Trace: [ 14.287687] <TASK> [ 14.287700] dump_stack_lvl+0x73/0xb0 [ 14.287726] print_report+0xd1/0x610 [ 14.287746] ? __virt_addr_valid+0x1db/0x2d0 [ 14.287767] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.287793] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.287814] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.287840] kasan_report+0x141/0x180 [ 14.287860] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.287892] kasan_check_range+0x10c/0x1c0 [ 14.287915] __kasan_check_write+0x18/0x20 [ 14.287933] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.287958] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.287985] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.288021] ? trace_hardirqs_on+0x37/0xe0 [ 14.288042] ? kasan_bitops_generic+0x92/0x1c0 [ 14.288068] kasan_bitops_generic+0x121/0x1c0 [ 14.288090] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.288113] ? __pfx_read_tsc+0x10/0x10 [ 14.288133] ? ktime_get_ts64+0x86/0x230 [ 14.288156] kunit_try_run_case+0x1a5/0x480 [ 14.288178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.288199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.288221] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.288242] ? __kthread_parkme+0x82/0x180 [ 14.288262] ? preempt_count_sub+0x50/0x80 [ 14.288284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.288307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.288329] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.288352] kthread+0x337/0x6f0 [ 14.288370] ? trace_preempt_on+0x20/0xc0 [ 14.288391] ? __pfx_kthread+0x10/0x10 [ 14.288410] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.288492] ? calculate_sigpending+0x7b/0xa0 [ 14.288514] ? __pfx_kthread+0x10/0x10 [ 14.288535] ret_from_fork+0x116/0x1d0 [ 14.288552] ? __pfx_kthread+0x10/0x10 [ 14.288572] ret_from_fork_asm+0x1a/0x30 [ 14.288601] </TASK> [ 14.288612] [ 14.297242] Allocated by task 278: [ 14.297374] kasan_save_stack+0x45/0x70 [ 14.297578] kasan_save_track+0x18/0x40 [ 14.297767] kasan_save_alloc_info+0x3b/0x50 [ 14.298088] __kasan_kmalloc+0xb7/0xc0 [ 14.298235] __kmalloc_cache_noprof+0x189/0x420 [ 14.298492] kasan_bitops_generic+0x92/0x1c0 [ 14.298704] kunit_try_run_case+0x1a5/0x480 [ 14.298914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.299140] kthread+0x337/0x6f0 [ 14.299310] ret_from_fork+0x116/0x1d0 [ 14.299540] ret_from_fork_asm+0x1a/0x30 [ 14.299684] [ 14.299752] The buggy address belongs to the object at ffff888101df6d60 [ 14.299752] which belongs to the cache kmalloc-16 of size 16 [ 14.300116] The buggy address is located 8 bytes inside of [ 14.300116] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.300473] [ 14.300575] The buggy address belongs to the physical page: [ 14.301026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.301377] flags: 0x200000000000000(node=0|zone=2) [ 14.301604] page_type: f5(slab) [ 14.301770] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.302079] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.302301] page dumped because: kasan: bad access detected [ 14.302469] [ 14.302536] Memory state around the buggy address: [ 14.302687] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.303092] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.303419] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.303892] ^ [ 14.304199] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.304916] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.305204] ==================================================================