Date
July 3, 2025, 6:13 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.657081] ================================================================== [ 13.659014] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.659886] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279 [ 13.660983] [ 13.661260] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.661327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.661339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.661361] Call Trace: [ 13.661376] <TASK> [ 13.661390] dump_stack_lvl+0x73/0xb0 [ 13.661421] print_report+0xd1/0x650 [ 13.661443] ? __virt_addr_valid+0x1db/0x2d0 [ 13.661466] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.661492] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.661513] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.661540] kasan_report+0x141/0x180 [ 13.661561] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.661591] kasan_check_range+0x10c/0x1c0 [ 13.661614] __kasan_check_write+0x18/0x20 [ 13.661633] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.661659] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.661686] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.661710] ? trace_hardirqs_on+0x37/0xe0 [ 13.661737] ? kasan_bitops_generic+0x92/0x1c0 [ 13.661764] kasan_bitops_generic+0x121/0x1c0 [ 13.661787] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.661811] ? __pfx_read_tsc+0x10/0x10 [ 13.661834] ? ktime_get_ts64+0x86/0x230 [ 13.661858] kunit_try_run_case+0x1a5/0x480 [ 13.661881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.661902] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.661925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.661947] ? __kthread_parkme+0x82/0x180 [ 13.661967] ? preempt_count_sub+0x50/0x80 [ 13.661990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.662013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.662036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.662058] kthread+0x337/0x6f0 [ 13.662078] ? trace_preempt_on+0x20/0xc0 [ 13.662121] ? __pfx_kthread+0x10/0x10 [ 13.662209] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.662234] ? calculate_sigpending+0x7b/0xa0 [ 13.662257] ? __pfx_kthread+0x10/0x10 [ 13.662278] ret_from_fork+0x116/0x1d0 [ 13.662297] ? __pfx_kthread+0x10/0x10 [ 13.662317] ret_from_fork_asm+0x1a/0x30 [ 13.662364] </TASK> [ 13.662375] [ 13.681859] Allocated by task 279: [ 13.682466] kasan_save_stack+0x45/0x70 [ 13.682765] kasan_save_track+0x18/0x40 [ 13.682912] kasan_save_alloc_info+0x3b/0x50 [ 13.683061] __kasan_kmalloc+0xb7/0xc0 [ 13.683265] __kmalloc_cache_noprof+0x189/0x420 [ 13.683419] kasan_bitops_generic+0x92/0x1c0 [ 13.683564] kunit_try_run_case+0x1a5/0x480 [ 13.683705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.684236] kthread+0x337/0x6f0 [ 13.684375] ret_from_fork+0x116/0x1d0 [ 13.684509] ret_from_fork_asm+0x1a/0x30 [ 13.684648] [ 13.684721] The buggy address belongs to the object at ffff888101745ee0 [ 13.684721] which belongs to the cache kmalloc-16 of size 16 [ 13.685065] The buggy address is located 8 bytes inside of [ 13.685065] allocated 9-byte region [ffff888101745ee0, ffff888101745ee9) [ 13.687067] [ 13.687752] The buggy address belongs to the physical page: [ 13.688319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745 [ 13.688810] flags: 0x200000000000000(node=0|zone=2) [ 13.689690] page_type: f5(slab) [ 13.690224] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.690756] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.690989] page dumped because: kasan: bad access detected [ 13.691179] [ 13.691843] Memory state around the buggy address: [ 13.692491] ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc [ 13.693390] ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.694351] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.694580] ^ [ 13.694785] ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.695004] ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.695605] ================================================================== [ 13.759279] ================================================================== [ 13.759567] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.759849] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279 [ 13.760075] [ 13.760268] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.760313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.760352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.760388] Call Trace: [ 13.760402] <TASK> [ 13.760416] dump_stack_lvl+0x73/0xb0 [ 13.760458] print_report+0xd1/0x650 [ 13.760482] ? __virt_addr_valid+0x1db/0x2d0 [ 13.760503] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.760529] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.760551] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.760578] kasan_report+0x141/0x180 [ 13.760600] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.760631] kasan_check_range+0x10c/0x1c0 [ 13.760653] __kasan_check_write+0x18/0x20 [ 13.760672] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.760699] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.760725] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.760749] ? trace_hardirqs_on+0x37/0xe0 [ 13.760775] ? kasan_bitops_generic+0x92/0x1c0 [ 13.760802] kasan_bitops_generic+0x121/0x1c0 [ 13.760824] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.760868] ? __pfx_read_tsc+0x10/0x10 [ 13.760888] ? ktime_get_ts64+0x86/0x230 [ 13.760912] kunit_try_run_case+0x1a5/0x480 [ 13.760934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.760956] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.760979] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.761000] ? __kthread_parkme+0x82/0x180 [ 13.761019] ? preempt_count_sub+0x50/0x80 [ 13.761059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.761082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.761119] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.761142] kthread+0x337/0x6f0 [ 13.761176] ? trace_preempt_on+0x20/0xc0 [ 13.761203] ? __pfx_kthread+0x10/0x10 [ 13.761223] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.761243] ? calculate_sigpending+0x7b/0xa0 [ 13.761266] ? __pfx_kthread+0x10/0x10 [ 13.761287] ret_from_fork+0x116/0x1d0 [ 13.761305] ? __pfx_kthread+0x10/0x10 [ 13.761325] ret_from_fork_asm+0x1a/0x30 [ 13.761355] </TASK> [ 13.761366] [ 13.774013] Allocated by task 279: [ 13.774294] kasan_save_stack+0x45/0x70 [ 13.774737] kasan_save_track+0x18/0x40 [ 13.774936] kasan_save_alloc_info+0x3b/0x50 [ 13.775093] __kasan_kmalloc+0xb7/0xc0 [ 13.775289] __kmalloc_cache_noprof+0x189/0x420 [ 13.775495] kasan_bitops_generic+0x92/0x1c0 [ 13.775808] kunit_try_run_case+0x1a5/0x480 [ 13.775989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.776232] kthread+0x337/0x6f0 [ 13.776494] ret_from_fork+0x116/0x1d0 [ 13.776673] ret_from_fork_asm+0x1a/0x30 [ 13.776876] [ 13.776962] The buggy address belongs to the object at ffff888101745ee0 [ 13.776962] which belongs to the cache kmalloc-16 of size 16 [ 13.778756] The buggy address is located 8 bytes inside of [ 13.778756] allocated 9-byte region [ffff888101745ee0, ffff888101745ee9) [ 13.779565] [ 13.779652] The buggy address belongs to the physical page: [ 13.779832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745 [ 13.780076] flags: 0x200000000000000(node=0|zone=2) [ 13.780255] page_type: f5(slab) [ 13.780386] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.780621] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.780851] page dumped because: kasan: bad access detected [ 13.781026] [ 13.782135] Memory state around the buggy address: [ 13.783192] ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc [ 13.784898] ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.785887] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.786638] ^ [ 13.786855] ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.787076] ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.787342] ================================================================== [ 13.789215] ================================================================== [ 13.789950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.790380] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279 [ 13.791115] [ 13.791360] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.791408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.791420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.791441] Call Trace: [ 13.791455] <TASK> [ 13.791469] dump_stack_lvl+0x73/0xb0 [ 13.791495] print_report+0xd1/0x650 [ 13.791518] ? __virt_addr_valid+0x1db/0x2d0 [ 13.791540] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.791567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.791588] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.791614] kasan_report+0x141/0x180 [ 13.791635] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.791667] kasan_check_range+0x10c/0x1c0 [ 13.791690] __kasan_check_write+0x18/0x20 [ 13.791709] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.791735] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.791764] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.791788] ? trace_hardirqs_on+0x37/0xe0 [ 13.791814] ? kasan_bitops_generic+0x92/0x1c0 [ 13.791842] kasan_bitops_generic+0x121/0x1c0 [ 13.791864] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.791889] ? __pfx_read_tsc+0x10/0x10 [ 13.791909] ? ktime_get_ts64+0x86/0x230 [ 13.791931] kunit_try_run_case+0x1a5/0x480 [ 13.791953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.791974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.791996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.792018] ? __kthread_parkme+0x82/0x180 [ 13.792037] ? preempt_count_sub+0x50/0x80 [ 13.792059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.792082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.792120] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.792142] kthread+0x337/0x6f0 [ 13.792161] ? trace_preempt_on+0x20/0xc0 [ 13.792187] ? __pfx_kthread+0x10/0x10 [ 13.792206] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.792226] ? calculate_sigpending+0x7b/0xa0 [ 13.792249] ? __pfx_kthread+0x10/0x10 [ 13.792269] ret_from_fork+0x116/0x1d0 [ 13.792286] ? __pfx_kthread+0x10/0x10 [ 13.792307] ret_from_fork_asm+0x1a/0x30 [ 13.792344] </TASK> [ 13.792355] [ 13.804848] Allocated by task 279: [ 13.804987] kasan_save_stack+0x45/0x70 [ 13.805152] kasan_save_track+0x18/0x40 [ 13.805290] kasan_save_alloc_info+0x3b/0x50 [ 13.805474] __kasan_kmalloc+0xb7/0xc0 [ 13.805660] __kmalloc_cache_noprof+0x189/0x420 [ 13.805869] kasan_bitops_generic+0x92/0x1c0 [ 13.806021] kunit_try_run_case+0x1a5/0x480 [ 13.806242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.806535] kthread+0x337/0x6f0 [ 13.806696] ret_from_fork+0x116/0x1d0 [ 13.806830] ret_from_fork_asm+0x1a/0x30 [ 13.807026] [ 13.807135] The buggy address belongs to the object at ffff888101745ee0 [ 13.807135] which belongs to the cache kmalloc-16 of size 16 [ 13.807665] The buggy address is located 8 bytes inside of [ 13.807665] allocated 9-byte region [ffff888101745ee0, ffff888101745ee9) [ 13.808032] [ 13.808129] The buggy address belongs to the physical page: [ 13.808379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745 [ 13.808869] flags: 0x200000000000000(node=0|zone=2) [ 13.809039] page_type: f5(slab) [ 13.809176] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.809733] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.810150] page dumped because: kasan: bad access detected [ 13.810379] [ 13.810456] Memory state around the buggy address: [ 13.810674] ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc [ 13.810929] ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.811267] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.811573] ^ [ 13.811867] ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.812132] ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.812526] ================================================================== [ 13.813118] ================================================================== [ 13.813516] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.813908] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279 [ 13.814211] [ 13.814315] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.814356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.814368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.814389] Call Trace: [ 13.814404] <TASK> [ 13.814419] dump_stack_lvl+0x73/0xb0 [ 13.814444] print_report+0xd1/0x650 [ 13.814466] ? __virt_addr_valid+0x1db/0x2d0 [ 13.814488] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.814513] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.814535] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.814562] kasan_report+0x141/0x180 [ 13.814584] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.814614] kasan_check_range+0x10c/0x1c0 [ 13.814637] __kasan_check_write+0x18/0x20 [ 13.814654] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.814681] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.814707] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.814731] ? trace_hardirqs_on+0x37/0xe0 [ 13.814756] ? kasan_bitops_generic+0x92/0x1c0 [ 13.814783] kasan_bitops_generic+0x121/0x1c0 [ 13.814807] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.814830] ? __pfx_read_tsc+0x10/0x10 [ 13.814851] ? ktime_get_ts64+0x86/0x230 [ 13.814875] kunit_try_run_case+0x1a5/0x480 [ 13.814897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.814918] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.814940] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.814961] ? __kthread_parkme+0x82/0x180 [ 13.814981] ? preempt_count_sub+0x50/0x80 [ 13.815003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.815025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.815047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.815069] kthread+0x337/0x6f0 [ 13.815087] ? trace_preempt_on+0x20/0xc0 [ 13.815125] ? __pfx_kthread+0x10/0x10 [ 13.815147] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.815169] ? calculate_sigpending+0x7b/0xa0 [ 13.815192] ? __pfx_kthread+0x10/0x10 [ 13.815217] ret_from_fork+0x116/0x1d0 [ 13.815234] ? __pfx_kthread+0x10/0x10 [ 13.815255] ret_from_fork_asm+0x1a/0x30 [ 13.815285] </TASK> [ 13.815296] [ 13.823196] Allocated by task 279: [ 13.823399] kasan_save_stack+0x45/0x70 [ 13.823544] kasan_save_track+0x18/0x40 [ 13.823680] kasan_save_alloc_info+0x3b/0x50 [ 13.823884] __kasan_kmalloc+0xb7/0xc0 [ 13.824073] __kmalloc_cache_noprof+0x189/0x420 [ 13.824308] kasan_bitops_generic+0x92/0x1c0 [ 13.824528] kunit_try_run_case+0x1a5/0x480 [ 13.824727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.824960] kthread+0x337/0x6f0 [ 13.825115] ret_from_fork+0x116/0x1d0 [ 13.825287] ret_from_fork_asm+0x1a/0x30 [ 13.825560] [ 13.825636] The buggy address belongs to the object at ffff888101745ee0 [ 13.825636] which belongs to the cache kmalloc-16 of size 16 [ 13.826107] The buggy address is located 8 bytes inside of [ 13.826107] allocated 9-byte region [ffff888101745ee0, ffff888101745ee9) [ 13.826537] [ 13.826636] The buggy address belongs to the physical page: [ 13.826878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745 [ 13.827126] flags: 0x200000000000000(node=0|zone=2) [ 13.827416] page_type: f5(slab) [ 13.827587] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.827929] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.828246] page dumped because: kasan: bad access detected [ 13.828493] [ 13.828581] Memory state around the buggy address: [ 13.828773] ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc [ 13.829048] ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.829303] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.829683] ^ [ 13.829913] ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.830210] ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.830518] ================================================================== [ 13.727838] ================================================================== [ 13.728076] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.729365] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279 [ 13.729951] [ 13.730270] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.730339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.730352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.730373] Call Trace: [ 13.730390] <TASK> [ 13.730404] dump_stack_lvl+0x73/0xb0 [ 13.730432] print_report+0xd1/0x650 [ 13.730455] ? __virt_addr_valid+0x1db/0x2d0 [ 13.730477] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.730502] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.730526] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.730554] kasan_report+0x141/0x180 [ 13.730576] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.730607] kasan_check_range+0x10c/0x1c0 [ 13.730630] __kasan_check_write+0x18/0x20 [ 13.730648] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.730674] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.730701] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.730726] ? trace_hardirqs_on+0x37/0xe0 [ 13.730752] ? kasan_bitops_generic+0x92/0x1c0 [ 13.730778] kasan_bitops_generic+0x121/0x1c0 [ 13.730800] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.730824] ? __pfx_read_tsc+0x10/0x10 [ 13.730845] ? ktime_get_ts64+0x86/0x230 [ 13.730868] kunit_try_run_case+0x1a5/0x480 [ 13.730891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.730913] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.730934] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.730956] ? __kthread_parkme+0x82/0x180 [ 13.730975] ? preempt_count_sub+0x50/0x80 [ 13.730999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.731022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.731045] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.731067] kthread+0x337/0x6f0 [ 13.731085] ? trace_preempt_on+0x20/0xc0 [ 13.731351] ? __pfx_kthread+0x10/0x10 [ 13.731374] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.731396] ? calculate_sigpending+0x7b/0xa0 [ 13.731419] ? __pfx_kthread+0x10/0x10 [ 13.731440] ret_from_fork+0x116/0x1d0 [ 13.731458] ? __pfx_kthread+0x10/0x10 [ 13.731479] ret_from_fork_asm+0x1a/0x30 [ 13.731511] </TASK> [ 13.731522] [ 13.743720] Allocated by task 279: [ 13.744265] kasan_save_stack+0x45/0x70 [ 13.744599] kasan_save_track+0x18/0x40 [ 13.744892] kasan_save_alloc_info+0x3b/0x50 [ 13.745382] __kasan_kmalloc+0xb7/0xc0 [ 13.745592] __kmalloc_cache_noprof+0x189/0x420 [ 13.746040] kasan_bitops_generic+0x92/0x1c0 [ 13.746463] kunit_try_run_case+0x1a5/0x480 [ 13.746763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.747124] kthread+0x337/0x6f0 [ 13.747529] ret_from_fork+0x116/0x1d0 [ 13.747731] ret_from_fork_asm+0x1a/0x30 [ 13.747907] [ 13.748005] The buggy address belongs to the object at ffff888101745ee0 [ 13.748005] which belongs to the cache kmalloc-16 of size 16 [ 13.748540] The buggy address is located 8 bytes inside of [ 13.748540] allocated 9-byte region [ffff888101745ee0, ffff888101745ee9) [ 13.749016] [ 13.749740] The buggy address belongs to the physical page: [ 13.750229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745 [ 13.750736] flags: 0x200000000000000(node=0|zone=2) [ 13.751091] page_type: f5(slab) [ 13.751498] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.751939] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.752672] page dumped because: kasan: bad access detected [ 13.753042] [ 13.753464] Memory state around the buggy address: [ 13.753688] ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc [ 13.754002] ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.754623] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.755105] ^ [ 13.755612] ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.756030] ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.756531] ================================================================== [ 13.848828] ================================================================== [ 13.849294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.849689] Read of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279 [ 13.849941] [ 13.850041] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.850081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.850092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.850126] Call Trace: [ 13.850139] <TASK> [ 13.850152] dump_stack_lvl+0x73/0xb0 [ 13.850177] print_report+0xd1/0x650 [ 13.850198] ? __virt_addr_valid+0x1db/0x2d0 [ 13.850219] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.850245] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.850265] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.850292] kasan_report+0x141/0x180 [ 13.850313] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.850343] __asan_report_load8_noabort+0x18/0x20 [ 13.850367] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.850393] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.850420] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.850442] ? trace_hardirqs_on+0x37/0xe0 [ 13.850468] ? kasan_bitops_generic+0x92/0x1c0 [ 13.850494] kasan_bitops_generic+0x121/0x1c0 [ 13.850516] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.850540] ? __pfx_read_tsc+0x10/0x10 [ 13.850559] ? ktime_get_ts64+0x86/0x230 [ 13.850581] kunit_try_run_case+0x1a5/0x480 [ 13.850605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.850626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.850649] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.850671] ? __kthread_parkme+0x82/0x180 [ 13.850690] ? preempt_count_sub+0x50/0x80 [ 13.850712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.850735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.850757] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.850779] kthread+0x337/0x6f0 [ 13.850797] ? trace_preempt_on+0x20/0xc0 [ 13.850822] ? __pfx_kthread+0x10/0x10 [ 13.850842] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.850862] ? calculate_sigpending+0x7b/0xa0 [ 13.850884] ? __pfx_kthread+0x10/0x10 [ 13.850905] ret_from_fork+0x116/0x1d0 [ 13.850923] ? __pfx_kthread+0x10/0x10 [ 13.850942] ret_from_fork_asm+0x1a/0x30 [ 13.850971] </TASK> [ 13.850981] [ 13.858595] Allocated by task 279: [ 13.858772] kasan_save_stack+0x45/0x70 [ 13.858969] kasan_save_track+0x18/0x40 [ 13.859169] kasan_save_alloc_info+0x3b/0x50 [ 13.859456] __kasan_kmalloc+0xb7/0xc0 [ 13.859643] __kmalloc_cache_noprof+0x189/0x420 [ 13.859867] kasan_bitops_generic+0x92/0x1c0 [ 13.860077] kunit_try_run_case+0x1a5/0x480 [ 13.860296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.860806] kthread+0x337/0x6f0 [ 13.860968] ret_from_fork+0x116/0x1d0 [ 13.861132] ret_from_fork_asm+0x1a/0x30 [ 13.861298] [ 13.861462] The buggy address belongs to the object at ffff888101745ee0 [ 13.861462] which belongs to the cache kmalloc-16 of size 16 [ 13.861921] The buggy address is located 8 bytes inside of [ 13.861921] allocated 9-byte region [ffff888101745ee0, ffff888101745ee9) [ 13.862448] [ 13.862524] The buggy address belongs to the physical page: [ 13.862699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745 [ 13.862939] flags: 0x200000000000000(node=0|zone=2) [ 13.863121] page_type: f5(slab) [ 13.863248] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.863570] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.863908] page dumped because: kasan: bad access detected [ 13.864172] [ 13.864267] Memory state around the buggy address: [ 13.864492] ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc [ 13.865075] ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.865371] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.865670] ^ [ 13.865944] ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.866243] ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.866530] ================================================================== [ 13.629919] ================================================================== [ 13.630298] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.630706] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279 [ 13.631021] [ 13.631137] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.631178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.631189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.631215] Call Trace: [ 13.631229] <TASK> [ 13.631378] dump_stack_lvl+0x73/0xb0 [ 13.631410] print_report+0xd1/0x650 [ 13.631433] ? __virt_addr_valid+0x1db/0x2d0 [ 13.631455] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.631481] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.631503] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.631531] kasan_report+0x141/0x180 [ 13.631554] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.631589] kasan_check_range+0x10c/0x1c0 [ 13.631612] __kasan_check_write+0x18/0x20 [ 13.631630] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.631658] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.631687] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.631712] ? trace_hardirqs_on+0x37/0xe0 [ 13.631738] ? kasan_bitops_generic+0x92/0x1c0 [ 13.631765] kasan_bitops_generic+0x121/0x1c0 [ 13.631789] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.631814] ? __pfx_read_tsc+0x10/0x10 [ 13.631834] ? ktime_get_ts64+0x86/0x230 [ 13.631857] kunit_try_run_case+0x1a5/0x480 [ 13.631879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.631901] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.631924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.631945] ? __kthread_parkme+0x82/0x180 [ 13.631965] ? preempt_count_sub+0x50/0x80 [ 13.631987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.632010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.632032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.632054] kthread+0x337/0x6f0 [ 13.632072] ? trace_preempt_on+0x20/0xc0 [ 13.632118] ? __pfx_kthread+0x10/0x10 [ 13.632139] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.632159] ? calculate_sigpending+0x7b/0xa0 [ 13.632182] ? __pfx_kthread+0x10/0x10 [ 13.632203] ret_from_fork+0x116/0x1d0 [ 13.632221] ? __pfx_kthread+0x10/0x10 [ 13.632241] ret_from_fork_asm+0x1a/0x30 [ 13.632271] </TASK> [ 13.632281] [ 13.642836] Allocated by task 279: [ 13.643019] kasan_save_stack+0x45/0x70 [ 13.643573] kasan_save_track+0x18/0x40 [ 13.643765] kasan_save_alloc_info+0x3b/0x50 [ 13.643981] __kasan_kmalloc+0xb7/0xc0 [ 13.644229] __kmalloc_cache_noprof+0x189/0x420 [ 13.644454] kasan_bitops_generic+0x92/0x1c0 [ 13.644633] kunit_try_run_case+0x1a5/0x480 [ 13.644782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.644959] kthread+0x337/0x6f0 [ 13.645139] ret_from_fork+0x116/0x1d0 [ 13.645381] ret_from_fork_asm+0x1a/0x30 [ 13.645994] [ 13.647801] The buggy address belongs to the object at ffff888101745ee0 [ 13.647801] which belongs to the cache kmalloc-16 of size 16 [ 13.648310] The buggy address is located 8 bytes inside of [ 13.648310] allocated 9-byte region [ffff888101745ee0, ffff888101745ee9) [ 13.648667] [ 13.648741] The buggy address belongs to the physical page: [ 13.648917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745 [ 13.650572] flags: 0x200000000000000(node=0|zone=2) [ 13.650748] page_type: f5(slab) [ 13.650873] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.651122] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.651374] page dumped because: kasan: bad access detected [ 13.651553] [ 13.651626] Memory state around the buggy address: [ 13.651785] ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc [ 13.652004] ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.653299] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.653822] ^ [ 13.654029] ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.655386] ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.656687] ================================================================== [ 13.831230] ================================================================== [ 13.831529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.831906] Read of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279 [ 13.832238] [ 13.832360] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.832400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.832410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.832430] Call Trace: [ 13.832442] <TASK> [ 13.832455] dump_stack_lvl+0x73/0xb0 [ 13.832481] print_report+0xd1/0x650 [ 13.832502] ? __virt_addr_valid+0x1db/0x2d0 [ 13.832524] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.832550] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.832571] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.832596] kasan_report+0x141/0x180 [ 13.832618] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.832648] kasan_check_range+0x10c/0x1c0 [ 13.832670] __kasan_check_read+0x15/0x20 [ 13.832689] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.832715] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.832742] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.832765] ? trace_hardirqs_on+0x37/0xe0 [ 13.832792] ? kasan_bitops_generic+0x92/0x1c0 [ 13.832817] kasan_bitops_generic+0x121/0x1c0 [ 13.832840] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.832863] ? __pfx_read_tsc+0x10/0x10 [ 13.832884] ? ktime_get_ts64+0x86/0x230 [ 13.832906] kunit_try_run_case+0x1a5/0x480 [ 13.832929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.832950] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.832973] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.832994] ? __kthread_parkme+0x82/0x180 [ 13.833014] ? preempt_count_sub+0x50/0x80 [ 13.833037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.833060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.833082] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.833117] kthread+0x337/0x6f0 [ 13.833137] ? trace_preempt_on+0x20/0xc0 [ 13.833162] ? __pfx_kthread+0x10/0x10 [ 13.833182] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.833202] ? calculate_sigpending+0x7b/0xa0 [ 13.833225] ? __pfx_kthread+0x10/0x10 [ 13.833246] ret_from_fork+0x116/0x1d0 [ 13.833264] ? __pfx_kthread+0x10/0x10 [ 13.833284] ret_from_fork_asm+0x1a/0x30 [ 13.833313] </TASK> [ 13.833335] [ 13.841108] Allocated by task 279: [ 13.841285] kasan_save_stack+0x45/0x70 [ 13.841490] kasan_save_track+0x18/0x40 [ 13.841676] kasan_save_alloc_info+0x3b/0x50 [ 13.841828] __kasan_kmalloc+0xb7/0xc0 [ 13.841961] __kmalloc_cache_noprof+0x189/0x420 [ 13.842137] kasan_bitops_generic+0x92/0x1c0 [ 13.842345] kunit_try_run_case+0x1a5/0x480 [ 13.842566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.842818] kthread+0x337/0x6f0 [ 13.842984] ret_from_fork+0x116/0x1d0 [ 13.843159] ret_from_fork_asm+0x1a/0x30 [ 13.843371] [ 13.843454] The buggy address belongs to the object at ffff888101745ee0 [ 13.843454] which belongs to the cache kmalloc-16 of size 16 [ 13.843931] The buggy address is located 8 bytes inside of [ 13.843931] allocated 9-byte region [ffff888101745ee0, ffff888101745ee9) [ 13.844419] [ 13.844496] The buggy address belongs to the physical page: [ 13.844717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745 [ 13.845015] flags: 0x200000000000000(node=0|zone=2) [ 13.845230] page_type: f5(slab) [ 13.845425] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.845720] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.846026] page dumped because: kasan: bad access detected [ 13.846256] [ 13.846370] Memory state around the buggy address: [ 13.846565] ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc [ 13.846815] ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.847032] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.847331] ^ [ 13.847658] ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.848117] ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.848376] ================================================================== [ 13.696466] ================================================================== [ 13.697039] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.697741] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279 [ 13.698065] [ 13.698198] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.698243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.698254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.698276] Call Trace: [ 13.698292] <TASK> [ 13.698308] dump_stack_lvl+0x73/0xb0 [ 13.698845] print_report+0xd1/0x650 [ 13.698873] ? __virt_addr_valid+0x1db/0x2d0 [ 13.698898] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.698924] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.698947] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.698973] kasan_report+0x141/0x180 [ 13.698994] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.699025] kasan_check_range+0x10c/0x1c0 [ 13.699048] __kasan_check_write+0x18/0x20 [ 13.699067] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.699112] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.699139] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.699230] ? trace_hardirqs_on+0x37/0xe0 [ 13.699259] ? kasan_bitops_generic+0x92/0x1c0 [ 13.699285] kasan_bitops_generic+0x121/0x1c0 [ 13.699309] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.699332] ? __pfx_read_tsc+0x10/0x10 [ 13.699353] ? ktime_get_ts64+0x86/0x230 [ 13.699376] kunit_try_run_case+0x1a5/0x480 [ 13.699399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.699421] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.699444] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.699466] ? __kthread_parkme+0x82/0x180 [ 13.699486] ? preempt_count_sub+0x50/0x80 [ 13.699508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.699532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.699553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.699575] kthread+0x337/0x6f0 [ 13.699596] ? trace_preempt_on+0x20/0xc0 [ 13.699621] ? __pfx_kthread+0x10/0x10 [ 13.699641] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.699662] ? calculate_sigpending+0x7b/0xa0 [ 13.699685] ? __pfx_kthread+0x10/0x10 [ 13.699706] ret_from_fork+0x116/0x1d0 [ 13.699724] ? __pfx_kthread+0x10/0x10 [ 13.699744] ret_from_fork_asm+0x1a/0x30 [ 13.699773] </TASK> [ 13.699785] [ 13.715009] Allocated by task 279: [ 13.715478] kasan_save_stack+0x45/0x70 [ 13.715656] kasan_save_track+0x18/0x40 [ 13.715853] kasan_save_alloc_info+0x3b/0x50 [ 13.716054] __kasan_kmalloc+0xb7/0xc0 [ 13.716242] __kmalloc_cache_noprof+0x189/0x420 [ 13.716457] kasan_bitops_generic+0x92/0x1c0 [ 13.716655] kunit_try_run_case+0x1a5/0x480 [ 13.716853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.717093] kthread+0x337/0x6f0 [ 13.718070] ret_from_fork+0x116/0x1d0 [ 13.718526] ret_from_fork_asm+0x1a/0x30 [ 13.718728] [ 13.718809] The buggy address belongs to the object at ffff888101745ee0 [ 13.718809] which belongs to the cache kmalloc-16 of size 16 [ 13.719922] The buggy address is located 8 bytes inside of [ 13.719922] allocated 9-byte region [ffff888101745ee0, ffff888101745ee9) [ 13.720806] [ 13.720920] The buggy address belongs to the physical page: [ 13.721407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745 [ 13.721890] flags: 0x200000000000000(node=0|zone=2) [ 13.722133] page_type: f5(slab) [ 13.722578] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.722987] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.723713] page dumped because: kasan: bad access detected [ 13.724079] [ 13.724406] Memory state around the buggy address: [ 13.724647] ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc [ 13.725262] ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.725673] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.726217] ^ [ 13.726693] ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.727001] ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.727347] ==================================================================