Date
July 8, 2025, 4:38 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.560702] ================================================================== [ 13.561261] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.561698] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.561940] [ 13.562084] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.562131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.562155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.562179] Call Trace: [ 13.562198] <TASK> [ 13.562229] dump_stack_lvl+0x73/0xb0 [ 13.562256] print_report+0xd1/0x650 [ 13.562280] ? __virt_addr_valid+0x1db/0x2d0 [ 13.562315] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.562340] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.562363] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.562400] kasan_report+0x141/0x180 [ 13.562423] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.562453] kasan_check_range+0x10c/0x1c0 [ 13.562485] __kasan_check_write+0x18/0x20 [ 13.562531] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.562556] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.562593] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.562615] ? trace_hardirqs_on+0x37/0xe0 [ 13.562648] ? kasan_bitops_generic+0x92/0x1c0 [ 13.562674] kasan_bitops_generic+0x121/0x1c0 [ 13.562708] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.562731] ? trace_hardirqs_on+0x37/0xe0 [ 13.562754] ? __pfx_read_tsc+0x10/0x10 [ 13.562775] ? ktime_get_ts64+0x86/0x230 [ 13.562798] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.562823] kunit_try_run_case+0x1a5/0x480 [ 13.562847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.562868] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.562904] ? __kthread_parkme+0x82/0x180 [ 13.562927] ? preempt_count_sub+0x50/0x80 [ 13.562952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.562983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.563007] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.563032] kthread+0x337/0x6f0 [ 13.563060] ? trace_preempt_on+0x20/0xc0 [ 13.563083] ? __pfx_kthread+0x10/0x10 [ 13.563102] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.563126] ? calculate_sigpending+0x7b/0xa0 [ 13.563157] ? __pfx_kthread+0x10/0x10 [ 13.563176] ret_from_fork+0x41/0x80 [ 13.563198] ? __pfx_kthread+0x10/0x10 [ 13.563227] ret_from_fork_asm+0x1a/0x30 [ 13.563257] </TASK> [ 13.563269] [ 13.571836] Allocated by task 281: [ 13.572021] kasan_save_stack+0x45/0x70 [ 13.572253] kasan_save_track+0x18/0x40 [ 13.572460] kasan_save_alloc_info+0x3b/0x50 [ 13.572675] __kasan_kmalloc+0xb7/0xc0 [ 13.572836] __kmalloc_cache_noprof+0x189/0x420 [ 13.573083] kasan_bitops_generic+0x92/0x1c0 [ 13.573298] kunit_try_run_case+0x1a5/0x480 [ 13.573460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.573667] kthread+0x337/0x6f0 [ 13.573791] ret_from_fork+0x41/0x80 [ 13.573958] ret_from_fork_asm+0x1a/0x30 [ 13.574174] [ 13.574288] The buggy address belongs to the object at ffff888102171600 [ 13.574288] which belongs to the cache kmalloc-16 of size 16 [ 13.574819] The buggy address is located 8 bytes inside of [ 13.574819] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.575205] [ 13.575308] The buggy address belongs to the physical page: [ 13.575569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.575991] flags: 0x200000000000000(node=0|zone=2) [ 13.576227] page_type: f5(slab) [ 13.576415] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.576769] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.577067] page dumped because: kasan: bad access detected [ 13.577339] [ 13.577422] Memory state around the buggy address: [ 13.577672] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.578016] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.578287] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.578523] ^ [ 13.578666] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.579022] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.579341] ================================================================== [ 13.700390] ================================================================== [ 13.701205] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.701547] Read of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.701926] [ 13.702036] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.702079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.702092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.702137] Call Trace: [ 13.702152] <TASK> [ 13.702167] dump_stack_lvl+0x73/0xb0 [ 13.702193] print_report+0xd1/0x650 [ 13.702216] ? __virt_addr_valid+0x1db/0x2d0 [ 13.702237] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.702261] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.702284] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.702309] kasan_report+0x141/0x180 [ 13.702354] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.702382] kasan_check_range+0x10c/0x1c0 [ 13.702404] __kasan_check_read+0x15/0x20 [ 13.702424] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.702449] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.702474] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.702513] ? trace_hardirqs_on+0x37/0xe0 [ 13.702536] ? kasan_bitops_generic+0x92/0x1c0 [ 13.702561] kasan_bitops_generic+0x121/0x1c0 [ 13.702581] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.702613] ? trace_hardirqs_on+0x37/0xe0 [ 13.702636] ? __pfx_read_tsc+0x10/0x10 [ 13.702656] ? ktime_get_ts64+0x86/0x230 [ 13.702677] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.702702] kunit_try_run_case+0x1a5/0x480 [ 13.702723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.702744] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.702769] ? __kthread_parkme+0x82/0x180 [ 13.702791] ? preempt_count_sub+0x50/0x80 [ 13.702816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.702837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.702861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.702917] kthread+0x337/0x6f0 [ 13.702934] ? trace_preempt_on+0x20/0xc0 [ 13.702957] ? __pfx_kthread+0x10/0x10 [ 13.702975] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.702998] ? calculate_sigpending+0x7b/0xa0 [ 13.703020] ? __pfx_kthread+0x10/0x10 [ 13.703039] ret_from_fork+0x41/0x80 [ 13.703059] ? __pfx_kthread+0x10/0x10 [ 13.703077] ret_from_fork_asm+0x1a/0x30 [ 13.703127] </TASK> [ 13.703138] [ 13.714506] Allocated by task 281: [ 13.714899] kasan_save_stack+0x45/0x70 [ 13.715059] kasan_save_track+0x18/0x40 [ 13.715200] kasan_save_alloc_info+0x3b/0x50 [ 13.715349] __kasan_kmalloc+0xb7/0xc0 [ 13.715490] __kmalloc_cache_noprof+0x189/0x420 [ 13.715684] kasan_bitops_generic+0x92/0x1c0 [ 13.716048] kunit_try_run_case+0x1a5/0x480 [ 13.716282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.716921] kthread+0x337/0x6f0 [ 13.717105] ret_from_fork+0x41/0x80 [ 13.717245] ret_from_fork_asm+0x1a/0x30 [ 13.717606] [ 13.717711] The buggy address belongs to the object at ffff888102171600 [ 13.717711] which belongs to the cache kmalloc-16 of size 16 [ 13.718294] The buggy address is located 8 bytes inside of [ 13.718294] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.719083] [ 13.719183] The buggy address belongs to the physical page: [ 13.719383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.719939] flags: 0x200000000000000(node=0|zone=2) [ 13.720241] page_type: f5(slab) [ 13.720444] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.720857] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.721162] page dumped because: kasan: bad access detected [ 13.721380] [ 13.721455] Memory state around the buggy address: [ 13.721684] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.722228] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.722582] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.722977] ^ [ 13.723114] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.723593] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.723976] ================================================================== [ 13.724587] ================================================================== [ 13.725270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.725714] Read of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.726024] [ 13.726133] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.726177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.726190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.726212] Call Trace: [ 13.726227] <TASK> [ 13.726241] dump_stack_lvl+0x73/0xb0 [ 13.726267] print_report+0xd1/0x650 [ 13.726292] ? __virt_addr_valid+0x1db/0x2d0 [ 13.726314] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.726340] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.726363] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.726388] kasan_report+0x141/0x180 [ 13.726412] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.726441] __asan_report_load8_noabort+0x18/0x20 [ 13.726464] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.726489] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.726515] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.726537] ? trace_hardirqs_on+0x37/0xe0 [ 13.726559] ? kasan_bitops_generic+0x92/0x1c0 [ 13.726584] kasan_bitops_generic+0x121/0x1c0 [ 13.726605] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.726626] ? trace_hardirqs_on+0x37/0xe0 [ 13.726649] ? __pfx_read_tsc+0x10/0x10 [ 13.726669] ? ktime_get_ts64+0x86/0x230 [ 13.726692] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.726715] kunit_try_run_case+0x1a5/0x480 [ 13.726739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.726760] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.726786] ? __kthread_parkme+0x82/0x180 [ 13.726808] ? preempt_count_sub+0x50/0x80 [ 13.726833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.726855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.726892] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.726916] kthread+0x337/0x6f0 [ 13.726934] ? trace_preempt_on+0x20/0xc0 [ 13.726957] ? __pfx_kthread+0x10/0x10 [ 13.726976] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.726998] ? calculate_sigpending+0x7b/0xa0 [ 13.727020] ? __pfx_kthread+0x10/0x10 [ 13.727039] ret_from_fork+0x41/0x80 [ 13.727060] ? __pfx_kthread+0x10/0x10 [ 13.727078] ret_from_fork_asm+0x1a/0x30 [ 13.727108] </TASK> [ 13.727119] [ 13.735180] Allocated by task 281: [ 13.735352] kasan_save_stack+0x45/0x70 [ 13.735556] kasan_save_track+0x18/0x40 [ 13.735742] kasan_save_alloc_info+0x3b/0x50 [ 13.735937] __kasan_kmalloc+0xb7/0xc0 [ 13.736107] __kmalloc_cache_noprof+0x189/0x420 [ 13.736331] kasan_bitops_generic+0x92/0x1c0 [ 13.736520] kunit_try_run_case+0x1a5/0x480 [ 13.736693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.736934] kthread+0x337/0x6f0 [ 13.737076] ret_from_fork+0x41/0x80 [ 13.737262] ret_from_fork_asm+0x1a/0x30 [ 13.737459] [ 13.737562] The buggy address belongs to the object at ffff888102171600 [ 13.737562] which belongs to the cache kmalloc-16 of size 16 [ 13.738031] The buggy address is located 8 bytes inside of [ 13.738031] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.738524] [ 13.738617] The buggy address belongs to the physical page: [ 13.738791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.739131] flags: 0x200000000000000(node=0|zone=2) [ 13.739374] page_type: f5(slab) [ 13.739556] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.739813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.740132] page dumped because: kasan: bad access detected [ 13.740390] [ 13.740486] Memory state around the buggy address: [ 13.740715] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.740989] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.741272] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.741611] ^ [ 13.741766] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.742063] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.742278] ================================================================== [ 13.540572] ================================================================== [ 13.541006] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.541340] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.542090] [ 13.542234] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.542283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.542308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.542332] Call Trace: [ 13.542351] <TASK> [ 13.542370] dump_stack_lvl+0x73/0xb0 [ 13.542407] print_report+0xd1/0x650 [ 13.542432] ? __virt_addr_valid+0x1db/0x2d0 [ 13.542456] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.542493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.542538] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.542572] kasan_report+0x141/0x180 [ 13.542596] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.542626] kasan_check_range+0x10c/0x1c0 [ 13.542658] __kasan_check_write+0x18/0x20 [ 13.542679] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.542703] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.542730] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.542752] ? trace_hardirqs_on+0x37/0xe0 [ 13.542776] ? kasan_bitops_generic+0x92/0x1c0 [ 13.542801] kasan_bitops_generic+0x121/0x1c0 [ 13.542821] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.542843] ? trace_hardirqs_on+0x37/0xe0 [ 13.542865] ? __pfx_read_tsc+0x10/0x10 [ 13.542895] ? ktime_get_ts64+0x86/0x230 [ 13.542918] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.542952] kunit_try_run_case+0x1a5/0x480 [ 13.542975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.542996] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.543032] ? __kthread_parkme+0x82/0x180 [ 13.543055] ? preempt_count_sub+0x50/0x80 [ 13.543081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.543110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.543135] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.543159] kthread+0x337/0x6f0 [ 13.543187] ? trace_preempt_on+0x20/0xc0 [ 13.543211] ? __pfx_kthread+0x10/0x10 [ 13.543229] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.543252] ? calculate_sigpending+0x7b/0xa0 [ 13.543275] ? __pfx_kthread+0x10/0x10 [ 13.543293] ret_from_fork+0x41/0x80 [ 13.543314] ? __pfx_kthread+0x10/0x10 [ 13.543333] ret_from_fork_asm+0x1a/0x30 [ 13.543364] </TASK> [ 13.543376] [ 13.551892] Allocated by task 281: [ 13.552031] kasan_save_stack+0x45/0x70 [ 13.552244] kasan_save_track+0x18/0x40 [ 13.552445] kasan_save_alloc_info+0x3b/0x50 [ 13.552706] __kasan_kmalloc+0xb7/0xc0 [ 13.552908] __kmalloc_cache_noprof+0x189/0x420 [ 13.553109] kasan_bitops_generic+0x92/0x1c0 [ 13.553325] kunit_try_run_case+0x1a5/0x480 [ 13.553566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.553819] kthread+0x337/0x6f0 [ 13.553995] ret_from_fork+0x41/0x80 [ 13.554184] ret_from_fork_asm+0x1a/0x30 [ 13.554376] [ 13.554477] The buggy address belongs to the object at ffff888102171600 [ 13.554477] which belongs to the cache kmalloc-16 of size 16 [ 13.555001] The buggy address is located 8 bytes inside of [ 13.555001] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.555356] [ 13.555433] The buggy address belongs to the physical page: [ 13.555720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.556091] flags: 0x200000000000000(node=0|zone=2) [ 13.556336] page_type: f5(slab) [ 13.556530] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.556922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.557287] page dumped because: kasan: bad access detected [ 13.557463] [ 13.557561] Memory state around the buggy address: [ 13.557721] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.558009] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.558364] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.558757] ^ [ 13.558948] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.559300] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.559629] ================================================================== [ 13.677648] ================================================================== [ 13.678069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.678438] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.678752] [ 13.678841] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.678897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.678922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.678945] Call Trace: [ 13.678960] <TASK> [ 13.678988] dump_stack_lvl+0x73/0xb0 [ 13.679015] print_report+0xd1/0x650 [ 13.679038] ? __virt_addr_valid+0x1db/0x2d0 [ 13.679060] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.679084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.679108] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.679133] kasan_report+0x141/0x180 [ 13.679158] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.679186] kasan_check_range+0x10c/0x1c0 [ 13.679209] __kasan_check_write+0x18/0x20 [ 13.679229] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.679254] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.679279] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.679309] ? trace_hardirqs_on+0x37/0xe0 [ 13.679332] ? kasan_bitops_generic+0x92/0x1c0 [ 13.679356] kasan_bitops_generic+0x121/0x1c0 [ 13.679396] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.679416] ? trace_hardirqs_on+0x37/0xe0 [ 13.679438] ? __pfx_read_tsc+0x10/0x10 [ 13.679469] ? ktime_get_ts64+0x86/0x230 [ 13.679492] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.679526] kunit_try_run_case+0x1a5/0x480 [ 13.679548] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.679569] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.679602] ? __kthread_parkme+0x82/0x180 [ 13.679624] ? preempt_count_sub+0x50/0x80 [ 13.679650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.679671] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.679695] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.679719] kthread+0x337/0x6f0 [ 13.679737] ? trace_preempt_on+0x20/0xc0 [ 13.679769] ? __pfx_kthread+0x10/0x10 [ 13.679788] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.679811] ? calculate_sigpending+0x7b/0xa0 [ 13.679844] ? __pfx_kthread+0x10/0x10 [ 13.679863] ret_from_fork+0x41/0x80 [ 13.679893] ? __pfx_kthread+0x10/0x10 [ 13.679911] ret_from_fork_asm+0x1a/0x30 [ 13.679942] </TASK> [ 13.679953] [ 13.689101] Allocated by task 281: [ 13.689728] kasan_save_stack+0x45/0x70 [ 13.690235] kasan_save_track+0x18/0x40 [ 13.690532] kasan_save_alloc_info+0x3b/0x50 [ 13.690739] __kasan_kmalloc+0xb7/0xc0 [ 13.691026] __kmalloc_cache_noprof+0x189/0x420 [ 13.691278] kasan_bitops_generic+0x92/0x1c0 [ 13.691554] kunit_try_run_case+0x1a5/0x480 [ 13.691860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.692104] kthread+0x337/0x6f0 [ 13.692388] ret_from_fork+0x41/0x80 [ 13.692724] ret_from_fork_asm+0x1a/0x30 [ 13.692943] [ 13.693033] The buggy address belongs to the object at ffff888102171600 [ 13.693033] which belongs to the cache kmalloc-16 of size 16 [ 13.693729] The buggy address is located 8 bytes inside of [ 13.693729] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.694362] [ 13.694473] The buggy address belongs to the physical page: [ 13.694864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.695339] flags: 0x200000000000000(node=0|zone=2) [ 13.695675] page_type: f5(slab) [ 13.695855] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.696369] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.696927] page dumped because: kasan: bad access detected [ 13.697264] [ 13.697367] Memory state around the buggy address: [ 13.697742] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.698046] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.698412] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.698831] ^ [ 13.699030] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.699443] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.699839] ================================================================== [ 13.604774] ================================================================== [ 13.605118] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.605695] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.606020] [ 13.606129] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.606175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.606188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.606210] Call Trace: [ 13.606226] <TASK> [ 13.606243] dump_stack_lvl+0x73/0xb0 [ 13.606271] print_report+0xd1/0x650 [ 13.606295] ? __virt_addr_valid+0x1db/0x2d0 [ 13.606318] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.606343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.606366] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.606391] kasan_report+0x141/0x180 [ 13.606416] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.606449] kasan_check_range+0x10c/0x1c0 [ 13.606471] __kasan_check_write+0x18/0x20 [ 13.606491] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.606518] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.606543] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.606565] ? trace_hardirqs_on+0x37/0xe0 [ 13.606587] ? kasan_bitops_generic+0x92/0x1c0 [ 13.606612] kasan_bitops_generic+0x121/0x1c0 [ 13.606646] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.606667] ? trace_hardirqs_on+0x37/0xe0 [ 13.606689] ? __pfx_read_tsc+0x10/0x10 [ 13.606710] ? ktime_get_ts64+0x86/0x230 [ 13.606744] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.606769] kunit_try_run_case+0x1a5/0x480 [ 13.606792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.606814] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.606846] ? __kthread_parkme+0x82/0x180 [ 13.606869] ? preempt_count_sub+0x50/0x80 [ 13.606911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.606931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.606955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.606979] kthread+0x337/0x6f0 [ 13.606996] ? trace_preempt_on+0x20/0xc0 [ 13.607020] ? __pfx_kthread+0x10/0x10 [ 13.607038] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.607070] ? calculate_sigpending+0x7b/0xa0 [ 13.607092] ? __pfx_kthread+0x10/0x10 [ 13.607111] ret_from_fork+0x41/0x80 [ 13.607143] ? __pfx_kthread+0x10/0x10 [ 13.607162] ret_from_fork_asm+0x1a/0x30 [ 13.607192] </TASK> [ 13.607203] [ 13.615645] Allocated by task 281: [ 13.615830] kasan_save_stack+0x45/0x70 [ 13.616009] kasan_save_track+0x18/0x40 [ 13.616149] kasan_save_alloc_info+0x3b/0x50 [ 13.616374] __kasan_kmalloc+0xb7/0xc0 [ 13.616634] __kmalloc_cache_noprof+0x189/0x420 [ 13.616897] kasan_bitops_generic+0x92/0x1c0 [ 13.617133] kunit_try_run_case+0x1a5/0x480 [ 13.617279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.617455] kthread+0x337/0x6f0 [ 13.617576] ret_from_fork+0x41/0x80 [ 13.617761] ret_from_fork_asm+0x1a/0x30 [ 13.617968] [ 13.618071] The buggy address belongs to the object at ffff888102171600 [ 13.618071] which belongs to the cache kmalloc-16 of size 16 [ 13.618484] The buggy address is located 8 bytes inside of [ 13.618484] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.619055] [ 13.619167] The buggy address belongs to the physical page: [ 13.619395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.619641] flags: 0x200000000000000(node=0|zone=2) [ 13.620067] page_type: f5(slab) [ 13.620241] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.620612] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.620989] page dumped because: kasan: bad access detected [ 13.621262] [ 13.621334] Memory state around the buggy address: [ 13.621496] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.621837] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.622172] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.622465] ^ [ 13.622694] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.623020] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.623322] ================================================================== [ 13.580634] ================================================================== [ 13.581037] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.581346] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.581636] [ 13.581770] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.581829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.581842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.581885] Call Trace: [ 13.581903] <TASK> [ 13.581921] dump_stack_lvl+0x73/0xb0 [ 13.581960] print_report+0xd1/0x650 [ 13.581985] ? __virt_addr_valid+0x1db/0x2d0 [ 13.582008] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.582044] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.582067] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.582101] kasan_report+0x141/0x180 [ 13.582125] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.582164] kasan_check_range+0x10c/0x1c0 [ 13.582186] __kasan_check_write+0x18/0x20 [ 13.582207] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.582232] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.582267] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.582290] ? trace_hardirqs_on+0x37/0xe0 [ 13.582327] ? kasan_bitops_generic+0x92/0x1c0 [ 13.582352] kasan_bitops_generic+0x121/0x1c0 [ 13.582372] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.582402] ? trace_hardirqs_on+0x37/0xe0 [ 13.582425] ? __pfx_read_tsc+0x10/0x10 [ 13.582445] ? ktime_get_ts64+0x86/0x230 [ 13.582479] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.582522] kunit_try_run_case+0x1a5/0x480 [ 13.582545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.582566] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.582593] ? __kthread_parkme+0x82/0x180 [ 13.582616] ? preempt_count_sub+0x50/0x80 [ 13.582642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.582662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.582687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.582711] kthread+0x337/0x6f0 [ 13.582728] ? trace_preempt_on+0x20/0xc0 [ 13.582751] ? __pfx_kthread+0x10/0x10 [ 13.582770] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.582793] ? calculate_sigpending+0x7b/0xa0 [ 13.582814] ? __pfx_kthread+0x10/0x10 [ 13.582841] ret_from_fork+0x41/0x80 [ 13.582862] ? __pfx_kthread+0x10/0x10 [ 13.582896] ret_from_fork_asm+0x1a/0x30 [ 13.582926] </TASK> [ 13.582938] [ 13.591453] Allocated by task 281: [ 13.591687] kasan_save_stack+0x45/0x70 [ 13.591892] kasan_save_track+0x18/0x40 [ 13.592062] kasan_save_alloc_info+0x3b/0x50 [ 13.592264] __kasan_kmalloc+0xb7/0xc0 [ 13.592440] __kmalloc_cache_noprof+0x189/0x420 [ 13.593548] kasan_bitops_generic+0x92/0x1c0 [ 13.593968] kunit_try_run_case+0x1a5/0x480 [ 13.594178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.594426] kthread+0x337/0x6f0 [ 13.594818] ret_from_fork+0x41/0x80 [ 13.595027] ret_from_fork_asm+0x1a/0x30 [ 13.595219] [ 13.595316] The buggy address belongs to the object at ffff888102171600 [ 13.595316] which belongs to the cache kmalloc-16 of size 16 [ 13.596305] The buggy address is located 8 bytes inside of [ 13.596305] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.597353] [ 13.597618] The buggy address belongs to the physical page: [ 13.598075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.598611] flags: 0x200000000000000(node=0|zone=2) [ 13.598841] page_type: f5(slab) [ 13.599012] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.599327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.600016] page dumped because: kasan: bad access detected [ 13.600478] [ 13.600766] Memory state around the buggy address: [ 13.601012] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.601309] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.601964] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.602410] ^ [ 13.602743] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.603056] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.603356] ================================================================== [ 13.624014] ================================================================== [ 13.624295] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.624776] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.625119] [ 13.625335] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.625379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.625391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.625413] Call Trace: [ 13.625427] <TASK> [ 13.625442] dump_stack_lvl+0x73/0xb0 [ 13.625469] print_report+0xd1/0x650 [ 13.625492] ? __virt_addr_valid+0x1db/0x2d0 [ 13.625522] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.625546] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.625570] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.625595] kasan_report+0x141/0x180 [ 13.625619] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.625661] kasan_check_range+0x10c/0x1c0 [ 13.625683] __kasan_check_write+0x18/0x20 [ 13.625704] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.625742] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.625767] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.625789] ? trace_hardirqs_on+0x37/0xe0 [ 13.625811] ? kasan_bitops_generic+0x92/0x1c0 [ 13.625835] kasan_bitops_generic+0x121/0x1c0 [ 13.625857] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.625886] ? trace_hardirqs_on+0x37/0xe0 [ 13.625908] ? __pfx_read_tsc+0x10/0x10 [ 13.625928] ? ktime_get_ts64+0x86/0x230 [ 13.625951] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.625975] kunit_try_run_case+0x1a5/0x480 [ 13.625997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.626018] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.626043] ? __kthread_parkme+0x82/0x180 [ 13.626065] ? preempt_count_sub+0x50/0x80 [ 13.626102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.626123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.626146] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.626181] kthread+0x337/0x6f0 [ 13.626199] ? trace_preempt_on+0x20/0xc0 [ 13.626221] ? __pfx_kthread+0x10/0x10 [ 13.626240] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.626263] ? calculate_sigpending+0x7b/0xa0 [ 13.626284] ? __pfx_kthread+0x10/0x10 [ 13.626304] ret_from_fork+0x41/0x80 [ 13.626324] ? __pfx_kthread+0x10/0x10 [ 13.626343] ret_from_fork_asm+0x1a/0x30 [ 13.626373] </TASK> [ 13.626383] [ 13.638370] Allocated by task 281: [ 13.638730] kasan_save_stack+0x45/0x70 [ 13.639106] kasan_save_track+0x18/0x40 [ 13.639613] kasan_save_alloc_info+0x3b/0x50 [ 13.639802] __kasan_kmalloc+0xb7/0xc0 [ 13.639947] __kmalloc_cache_noprof+0x189/0x420 [ 13.640712] kasan_bitops_generic+0x92/0x1c0 [ 13.641103] kunit_try_run_case+0x1a5/0x480 [ 13.641351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.641588] kthread+0x337/0x6f0 [ 13.642177] ret_from_fork+0x41/0x80 [ 13.642661] ret_from_fork_asm+0x1a/0x30 [ 13.643033] [ 13.643252] The buggy address belongs to the object at ffff888102171600 [ 13.643252] which belongs to the cache kmalloc-16 of size 16 [ 13.644028] The buggy address is located 8 bytes inside of [ 13.644028] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.645107] [ 13.645188] The buggy address belongs to the physical page: [ 13.645361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.646056] flags: 0x200000000000000(node=0|zone=2) [ 13.646619] page_type: f5(slab) [ 13.647039] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.647811] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.648309] page dumped because: kasan: bad access detected [ 13.648489] [ 13.648813] Memory state around the buggy address: [ 13.649324] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.650058] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.650480] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.651220] ^ [ 13.651604] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.652168] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.652591] ================================================================== [ 13.653660] ================================================================== [ 13.654754] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.655798] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.656427] [ 13.656633] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.656680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.656693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.656716] Call Trace: [ 13.656729] <TASK> [ 13.656745] dump_stack_lvl+0x73/0xb0 [ 13.656770] print_report+0xd1/0x650 [ 13.656794] ? __virt_addr_valid+0x1db/0x2d0 [ 13.656816] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.656841] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.656864] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.656901] kasan_report+0x141/0x180 [ 13.656924] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.656954] kasan_check_range+0x10c/0x1c0 [ 13.656975] __kasan_check_write+0x18/0x20 [ 13.656995] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.657020] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.657046] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.657068] ? trace_hardirqs_on+0x37/0xe0 [ 13.657091] ? kasan_bitops_generic+0x92/0x1c0 [ 13.657116] kasan_bitops_generic+0x121/0x1c0 [ 13.657136] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.657156] ? trace_hardirqs_on+0x37/0xe0 [ 13.657179] ? __pfx_read_tsc+0x10/0x10 [ 13.657199] ? ktime_get_ts64+0x86/0x230 [ 13.657221] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.657245] kunit_try_run_case+0x1a5/0x480 [ 13.657267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.657288] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.657314] ? __kthread_parkme+0x82/0x180 [ 13.657336] ? preempt_count_sub+0x50/0x80 [ 13.657362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.657382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.657406] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.657430] kthread+0x337/0x6f0 [ 13.657447] ? trace_preempt_on+0x20/0xc0 [ 13.657470] ? __pfx_kthread+0x10/0x10 [ 13.657488] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.657525] ? calculate_sigpending+0x7b/0xa0 [ 13.657548] ? __pfx_kthread+0x10/0x10 [ 13.657567] ret_from_fork+0x41/0x80 [ 13.657587] ? __pfx_kthread+0x10/0x10 [ 13.657606] ret_from_fork_asm+0x1a/0x30 [ 13.657636] </TASK> [ 13.657647] [ 13.667676] Allocated by task 281: [ 13.668029] kasan_save_stack+0x45/0x70 [ 13.668367] kasan_save_track+0x18/0x40 [ 13.668585] kasan_save_alloc_info+0x3b/0x50 [ 13.669010] __kasan_kmalloc+0xb7/0xc0 [ 13.669324] __kmalloc_cache_noprof+0x189/0x420 [ 13.669505] kasan_bitops_generic+0x92/0x1c0 [ 13.669721] kunit_try_run_case+0x1a5/0x480 [ 13.669948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.670187] kthread+0x337/0x6f0 [ 13.670345] ret_from_fork+0x41/0x80 [ 13.670514] ret_from_fork_asm+0x1a/0x30 [ 13.670690] [ 13.670784] The buggy address belongs to the object at ffff888102171600 [ 13.670784] which belongs to the cache kmalloc-16 of size 16 [ 13.671890] The buggy address is located 8 bytes inside of [ 13.671890] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.672263] [ 13.672340] The buggy address belongs to the physical page: [ 13.672838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.673369] flags: 0x200000000000000(node=0|zone=2) [ 13.673549] page_type: f5(slab) [ 13.673792] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.674124] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.674430] page dumped because: kasan: bad access detected [ 13.674740] [ 13.674892] Memory state around the buggy address: [ 13.675095] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.675409] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.675769] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.676079] ^ [ 13.676269] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.676634] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.676939] ==================================================================