Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x86 |
[ 47.042863] ================================================================== [ 47.050101] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.059055] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 47.066454] [ 47.067955] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 47.067963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.067964] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 47.067968] Call Trace: [ 47.067969] <TASK> [ 47.067971] dump_stack_lvl+0x73/0xb0 [ 47.067974] print_report+0xd1/0x650 [ 47.067978] ? __virt_addr_valid+0x1db/0x2d0 [ 47.067982] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.067986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 47.067990] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.067994] kasan_report+0x141/0x180 [ 47.067999] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.068004] kasan_check_range+0x10c/0x1c0 [ 47.068008] __kasan_check_write+0x18/0x20 [ 47.068012] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.068016] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 47.068021] ? __kmalloc_cache_noprof+0x189/0x420 [ 47.068024] ? trace_hardirqs_on+0x37/0xe0 [ 47.068028] ? kasan_bitops_generic+0x92/0x1c0 [ 47.068033] kasan_bitops_generic+0x121/0x1c0 [ 47.068036] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 47.068040] ? ktime_get_ts64+0x83/0x230 [ 47.068044] kunit_try_run_case+0x1a2/0x480 [ 47.068049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.068053] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 47.068057] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 47.068062] ? __kthread_parkme+0x82/0x180 [ 47.068066] ? preempt_count_sub+0x50/0x80 [ 47.068071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.068075] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.068079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 47.068083] kthread+0x334/0x6f0 [ 47.068087] ? trace_preempt_on+0x20/0xc0 [ 47.068091] ? __pfx_kthread+0x10/0x10 [ 47.068095] ? _raw_spin_unlock_irq+0x47/0x80 [ 47.068100] ? calculate_sigpending+0x7b/0xa0 [ 47.068103] ? __pfx_kthread+0x10/0x10 [ 47.068108] ret_from_fork+0x3e/0x80 [ 47.068112] ? __pfx_kthread+0x10/0x10 [ 47.068116] ret_from_fork_asm+0x1a/0x30 [ 47.068122] </TASK> [ 47.068123] [ 47.262874] Allocated by task 304: [ 47.266281] kasan_save_stack+0x45/0x70 [ 47.270119] kasan_save_track+0x18/0x40 [ 47.273960] kasan_save_alloc_info+0x3b/0x50 [ 47.278232] __kasan_kmalloc+0xb7/0xc0 [ 47.281984] __kmalloc_cache_noprof+0x189/0x420 [ 47.286518] kasan_bitops_generic+0x92/0x1c0 [ 47.290789] kunit_try_run_case+0x1a2/0x480 [ 47.294976] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.300382] kthread+0x334/0x6f0 [ 47.303617] ret_from_fork+0x3e/0x80 [ 47.307195] ret_from_fork_asm+0x1a/0x30 [ 47.311121] [ 47.312621] The buggy address belongs to the object at ffff888104ed9160 [ 47.312621] which belongs to the cache kmalloc-16 of size 16 [ 47.324960] The buggy address is located 8 bytes inside of [ 47.324960] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 47.337206] [ 47.338710] The buggy address belongs to the physical page: [ 47.344304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 47.352312] flags: 0x200000000000000(node=0|zone=2) [ 47.357189] page_type: f5(slab) [ 47.360337] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 47.368075] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.375814] page dumped because: kasan: bad access detected [ 47.381387] [ 47.382885] Memory state around the buggy address: [ 47.387709] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 47.394951] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 47.402178] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 47.409395] ^ [ 47.416007] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.423229] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.430456] ================================================================== [ 49.017530] ================================================================== [ 49.024763] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.033744] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 49.041142] [ 49.042642] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 49.042650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.042652] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 49.042655] Call Trace: [ 49.042656] <TASK> [ 49.042658] dump_stack_lvl+0x73/0xb0 [ 49.042662] print_report+0xd1/0x650 [ 49.042685] ? __virt_addr_valid+0x1db/0x2d0 [ 49.042689] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.042694] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.042698] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.042703] kasan_report+0x141/0x180 [ 49.042720] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.042725] kasan_check_range+0x10c/0x1c0 [ 49.042742] __kasan_check_write+0x18/0x20 [ 49.042745] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.042750] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 49.042754] ? __kmalloc_cache_noprof+0x189/0x420 [ 49.042758] ? trace_hardirqs_on+0x37/0xe0 [ 49.042762] ? kasan_bitops_generic+0x92/0x1c0 [ 49.042766] kasan_bitops_generic+0x121/0x1c0 [ 49.042769] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 49.042773] ? ktime_get_ts64+0x83/0x230 [ 49.042778] kunit_try_run_case+0x1a2/0x480 [ 49.042782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.042786] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 49.042791] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 49.042795] ? __kthread_parkme+0x82/0x180 [ 49.042799] ? preempt_count_sub+0x50/0x80 [ 49.042804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.042808] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.042812] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.042816] kthread+0x334/0x6f0 [ 49.042820] ? trace_preempt_on+0x20/0xc0 [ 49.042824] ? __pfx_kthread+0x10/0x10 [ 49.042829] ? _raw_spin_unlock_irq+0x47/0x80 [ 49.042833] ? calculate_sigpending+0x7b/0xa0 [ 49.042836] ? __pfx_kthread+0x10/0x10 [ 49.042841] ret_from_fork+0x3e/0x80 [ 49.042845] ? __pfx_kthread+0x10/0x10 [ 49.042849] ret_from_fork_asm+0x1a/0x30 [ 49.042855] </TASK> [ 49.042856] [ 49.237656] Allocated by task 304: [ 49.241089] kasan_save_stack+0x45/0x70 [ 49.244927] kasan_save_track+0x18/0x40 [ 49.248768] kasan_save_alloc_info+0x3b/0x50 [ 49.253040] __kasan_kmalloc+0xb7/0xc0 [ 49.256794] __kmalloc_cache_noprof+0x189/0x420 [ 49.261326] kasan_bitops_generic+0x92/0x1c0 [ 49.265597] kunit_try_run_case+0x1a2/0x480 [ 49.269782] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.275184] kthread+0x334/0x6f0 [ 49.278423] ret_from_fork+0x3e/0x80 [ 49.282002] ret_from_fork_asm+0x1a/0x30 [ 49.285930] [ 49.287429] The buggy address belongs to the object at ffff888104ed9160 [ 49.287429] which belongs to the cache kmalloc-16 of size 16 [ 49.299768] The buggy address is located 8 bytes inside of [ 49.299768] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 49.312023] [ 49.313521] The buggy address belongs to the physical page: [ 49.319095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 49.327101] flags: 0x200000000000000(node=0|zone=2) [ 49.331981] page_type: f5(slab) [ 49.335127] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 49.342866] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 49.350606] page dumped because: kasan: bad access detected [ 49.356178] [ 49.357700] Memory state around the buggy address: [ 49.362538] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 49.369759] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 49.376985] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 49.384203] ^ [ 49.390817] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.398034] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.405256] ================================================================== [ 47.832694] ================================================================== [ 47.839961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 47.848915] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 47.856308] [ 47.857808] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 47.857815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.857817] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 47.857821] Call Trace: [ 47.857822] <TASK> [ 47.857824] dump_stack_lvl+0x73/0xb0 [ 47.857827] print_report+0xd1/0x650 [ 47.857832] ? __virt_addr_valid+0x1db/0x2d0 [ 47.857835] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 47.857839] ? kasan_complete_mode_report_info+0x2a/0x200 [ 47.857844] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 47.857848] kasan_report+0x141/0x180 [ 47.857852] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 47.857857] kasan_check_range+0x10c/0x1c0 [ 47.857862] __kasan_check_write+0x18/0x20 [ 47.857866] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 47.857870] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 47.857874] ? __kmalloc_cache_noprof+0x189/0x420 [ 47.857878] ? trace_hardirqs_on+0x37/0xe0 [ 47.857882] ? kasan_bitops_generic+0x92/0x1c0 [ 47.857886] kasan_bitops_generic+0x121/0x1c0 [ 47.857890] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 47.857893] ? ktime_get_ts64+0x83/0x230 [ 47.857898] kunit_try_run_case+0x1a2/0x480 [ 47.857902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.857906] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 47.857911] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 47.857915] ? __kthread_parkme+0x82/0x180 [ 47.857919] ? preempt_count_sub+0x50/0x80 [ 47.857924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.857928] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.857932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 47.857936] kthread+0x334/0x6f0 [ 47.857940] ? trace_preempt_on+0x20/0xc0 [ 47.857944] ? __pfx_kthread+0x10/0x10 [ 47.857948] ? _raw_spin_unlock_irq+0x47/0x80 [ 47.857952] ? calculate_sigpending+0x7b/0xa0 [ 47.857956] ? __pfx_kthread+0x10/0x10 [ 47.857961] ret_from_fork+0x3e/0x80 [ 47.857965] ? __pfx_kthread+0x10/0x10 [ 47.857969] ret_from_fork_asm+0x1a/0x30 [ 47.857974] </TASK> [ 47.857976] [ 48.052779] Allocated by task 304: [ 48.056187] kasan_save_stack+0x45/0x70 [ 48.060023] kasan_save_track+0x18/0x40 [ 48.063864] kasan_save_alloc_info+0x3b/0x50 [ 48.068137] __kasan_kmalloc+0xb7/0xc0 [ 48.071890] __kmalloc_cache_noprof+0x189/0x420 [ 48.076421] kasan_bitops_generic+0x92/0x1c0 [ 48.080702] kunit_try_run_case+0x1a2/0x480 [ 48.084941] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.090347] kthread+0x334/0x6f0 [ 48.093581] ret_from_fork+0x3e/0x80 [ 48.097158] ret_from_fork_asm+0x1a/0x30 [ 48.101085] [ 48.102583] The buggy address belongs to the object at ffff888104ed9160 [ 48.102583] which belongs to the cache kmalloc-16 of size 16 [ 48.114918] The buggy address is located 8 bytes inside of [ 48.114918] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 48.127170] [ 48.128662] The buggy address belongs to the physical page: [ 48.134260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 48.142259] flags: 0x200000000000000(node=0|zone=2) [ 48.147138] page_type: f5(slab) [ 48.150285] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 48.158034] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 48.165778] page dumped because: kasan: bad access detected [ 48.171351] [ 48.172849] Memory state around the buggy address: [ 48.177645] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 48.184872] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 48.192090] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 48.199310] ^ [ 48.205923] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.213148] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.220369] ================================================================== [ 48.622437] ================================================================== [ 48.629706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.638706] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 48.646124] [ 48.647625] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 48.647632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.647634] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 48.647637] Call Trace: [ 48.647639] <TASK> [ 48.647640] dump_stack_lvl+0x73/0xb0 [ 48.647644] print_report+0xd1/0x650 [ 48.647648] ? __virt_addr_valid+0x1db/0x2d0 [ 48.647652] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.647656] ? kasan_complete_mode_report_info+0x2a/0x200 [ 48.647660] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.647684] kasan_report+0x141/0x180 [ 48.647688] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.647694] kasan_check_range+0x10c/0x1c0 [ 48.647699] __kasan_check_write+0x18/0x20 [ 48.647703] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.647720] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 48.647725] ? __kmalloc_cache_noprof+0x189/0x420 [ 48.647728] ? trace_hardirqs_on+0x37/0xe0 [ 48.647745] ? kasan_bitops_generic+0x92/0x1c0 [ 48.647749] kasan_bitops_generic+0x121/0x1c0 [ 48.647752] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 48.647756] ? ktime_get_ts64+0x83/0x230 [ 48.647761] kunit_try_run_case+0x1a2/0x480 [ 48.647765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.647769] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 48.647773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 48.647778] ? __kthread_parkme+0x82/0x180 [ 48.647782] ? preempt_count_sub+0x50/0x80 [ 48.647786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.647791] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.647794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 48.647798] kthread+0x334/0x6f0 [ 48.647802] ? trace_preempt_on+0x20/0xc0 [ 48.647807] ? __pfx_kthread+0x10/0x10 [ 48.647811] ? _raw_spin_unlock_irq+0x47/0x80 [ 48.647815] ? calculate_sigpending+0x7b/0xa0 [ 48.647818] ? __pfx_kthread+0x10/0x10 [ 48.647823] ret_from_fork+0x3e/0x80 [ 48.647827] ? __pfx_kthread+0x10/0x10 [ 48.647831] ret_from_fork_asm+0x1a/0x30 [ 48.647836] </TASK> [ 48.647838] [ 48.842743] Allocated by task 304: [ 48.846149] kasan_save_stack+0x45/0x70 [ 48.849989] kasan_save_track+0x18/0x40 [ 48.853830] kasan_save_alloc_info+0x3b/0x50 [ 48.858102] __kasan_kmalloc+0xb7/0xc0 [ 48.861854] __kmalloc_cache_noprof+0x189/0x420 [ 48.866385] kasan_bitops_generic+0x92/0x1c0 [ 48.870657] kunit_try_run_case+0x1a2/0x480 [ 48.874880] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.880288] kthread+0x334/0x6f0 [ 48.883520] ret_from_fork+0x3e/0x80 [ 48.887100] ret_from_fork_asm+0x1a/0x30 [ 48.891025] [ 48.892525] The buggy address belongs to the object at ffff888104ed9160 [ 48.892525] which belongs to the cache kmalloc-16 of size 16 [ 48.904863] The buggy address is located 8 bytes inside of [ 48.904863] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 48.917120] [ 48.918618] The buggy address belongs to the physical page: [ 48.924191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 48.932198] flags: 0x200000000000000(node=0|zone=2) [ 48.937076] page_type: f5(slab) [ 48.940222] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 48.947963] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 48.955701] page dumped because: kasan: bad access detected [ 48.961300] [ 48.962798] Memory state around the buggy address: [ 48.967592] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 48.974811] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 48.982036] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 48.989257] ^ [ 48.995870] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.003087] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.010308] ================================================================== [ 46.648053] ================================================================== [ 46.655285] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.664243] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 46.671637] [ 46.673138] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 46.673145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.673147] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 46.673151] Call Trace: [ 46.673152] <TASK> [ 46.673154] dump_stack_lvl+0x73/0xb0 [ 46.673157] print_report+0xd1/0x650 [ 46.673161] ? __virt_addr_valid+0x1db/0x2d0 [ 46.673165] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.673169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 46.673173] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.673178] kasan_report+0x141/0x180 [ 46.673182] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.673187] kasan_check_range+0x10c/0x1c0 [ 46.673192] __kasan_check_write+0x18/0x20 [ 46.673195] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.673199] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 46.673204] ? __kmalloc_cache_noprof+0x189/0x420 [ 46.673207] ? trace_hardirqs_on+0x37/0xe0 [ 46.673212] ? kasan_bitops_generic+0x92/0x1c0 [ 46.673216] kasan_bitops_generic+0x121/0x1c0 [ 46.673219] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 46.673223] ? ktime_get_ts64+0x83/0x230 [ 46.673228] kunit_try_run_case+0x1a2/0x480 [ 46.673232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.673236] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 46.673241] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 46.673245] ? __kthread_parkme+0x82/0x180 [ 46.673249] ? preempt_count_sub+0x50/0x80 [ 46.673254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.673258] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.673262] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 46.673266] kthread+0x334/0x6f0 [ 46.673270] ? trace_preempt_on+0x20/0xc0 [ 46.673274] ? __pfx_kthread+0x10/0x10 [ 46.673278] ? _raw_spin_unlock_irq+0x47/0x80 [ 46.673283] ? calculate_sigpending+0x7b/0xa0 [ 46.673286] ? __pfx_kthread+0x10/0x10 [ 46.673291] ret_from_fork+0x3e/0x80 [ 46.673294] ? __pfx_kthread+0x10/0x10 [ 46.673299] ret_from_fork_asm+0x1a/0x30 [ 46.673304] </TASK> [ 46.673306] [ 46.868154] Allocated by task 304: [ 46.871560] kasan_save_stack+0x45/0x70 [ 46.875399] kasan_save_track+0x18/0x40 [ 46.879236] kasan_save_alloc_info+0x3b/0x50 [ 46.883510] __kasan_kmalloc+0xb7/0xc0 [ 46.887262] __kmalloc_cache_noprof+0x189/0x420 [ 46.891794] kasan_bitops_generic+0x92/0x1c0 [ 46.896067] kunit_try_run_case+0x1a2/0x480 [ 46.900253] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.905651] kthread+0x334/0x6f0 [ 46.908884] ret_from_fork+0x3e/0x80 [ 46.912464] ret_from_fork_asm+0x1a/0x30 [ 46.916389] [ 46.917887] The buggy address belongs to the object at ffff888104ed9160 [ 46.917887] which belongs to the cache kmalloc-16 of size 16 [ 46.930222] The buggy address is located 8 bytes inside of [ 46.930222] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 46.942475] [ 46.943973] The buggy address belongs to the physical page: [ 46.949547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 46.957547] flags: 0x200000000000000(node=0|zone=2) [ 46.962426] page_type: f5(slab) [ 46.965573] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 46.973318] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.981059] page dumped because: kasan: bad access detected [ 46.986629] [ 46.988130] Memory state around the buggy address: [ 46.992921] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 47.000142] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 47.007368] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 47.014588] ^ [ 47.021199] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.028417] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.035639] ================================================================== [ 48.227592] ================================================================== [ 48.234808] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.243768] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 48.251169] [ 48.252668] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 48.252695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.252697] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 48.252701] Call Trace: [ 48.252702] <TASK> [ 48.252704] dump_stack_lvl+0x73/0xb0 [ 48.252708] print_report+0xd1/0x650 [ 48.252712] ? __virt_addr_valid+0x1db/0x2d0 [ 48.252728] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.252733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 48.252737] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.252741] kasan_report+0x141/0x180 [ 48.252746] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.252751] kasan_check_range+0x10c/0x1c0 [ 48.252756] __kasan_check_write+0x18/0x20 [ 48.252760] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.252764] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 48.252768] ? __kmalloc_cache_noprof+0x189/0x420 [ 48.252772] ? trace_hardirqs_on+0x37/0xe0 [ 48.252776] ? kasan_bitops_generic+0x92/0x1c0 [ 48.252781] kasan_bitops_generic+0x121/0x1c0 [ 48.252784] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 48.252788] ? ktime_get_ts64+0x83/0x230 [ 48.252793] kunit_try_run_case+0x1a2/0x480 [ 48.252797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.252801] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 48.252806] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 48.252811] ? __kthread_parkme+0x82/0x180 [ 48.252815] ? preempt_count_sub+0x50/0x80 [ 48.252820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.252824] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.252828] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 48.252832] kthread+0x334/0x6f0 [ 48.252836] ? trace_preempt_on+0x20/0xc0 [ 48.252841] ? __pfx_kthread+0x10/0x10 [ 48.252845] ? _raw_spin_unlock_irq+0x47/0x80 [ 48.252849] ? calculate_sigpending+0x7b/0xa0 [ 48.252853] ? __pfx_kthread+0x10/0x10 [ 48.252858] ret_from_fork+0x3e/0x80 [ 48.252862] ? __pfx_kthread+0x10/0x10 [ 48.252866] ret_from_fork_asm+0x1a/0x30 [ 48.252872] </TASK> [ 48.252873] [ 48.447624] Allocated by task 304: [ 48.451028] kasan_save_stack+0x45/0x70 [ 48.454870] kasan_save_track+0x18/0x40 [ 48.458734] kasan_save_alloc_info+0x3b/0x50 [ 48.463007] __kasan_kmalloc+0xb7/0xc0 [ 48.466758] __kmalloc_cache_noprof+0x189/0x420 [ 48.471291] kasan_bitops_generic+0x92/0x1c0 [ 48.475565] kunit_try_run_case+0x1a2/0x480 [ 48.479749] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.485150] kthread+0x334/0x6f0 [ 48.488389] ret_from_fork+0x3e/0x80 [ 48.491968] ret_from_fork_asm+0x1a/0x30 [ 48.495893] [ 48.497386] The buggy address belongs to the object at ffff888104ed9160 [ 48.497386] which belongs to the cache kmalloc-16 of size 16 [ 48.509735] The buggy address is located 8 bytes inside of [ 48.509735] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 48.521989] [ 48.523489] The buggy address belongs to the physical page: [ 48.529061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 48.537067] flags: 0x200000000000000(node=0|zone=2) [ 48.541948] page_type: f5(slab) [ 48.545094] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 48.552831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 48.560571] page dumped because: kasan: bad access detected [ 48.566143] [ 48.567641] Memory state around the buggy address: [ 48.572436] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 48.579655] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 48.586909] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 48.594128] ^ [ 48.600764] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.607986] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.615211] ================================================================== [ 49.412479] ================================================================== [ 49.419761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.428737] Read of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 49.436044] [ 49.437547] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 49.437555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.437557] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 49.437560] Call Trace: [ 49.437562] <TASK> [ 49.437563] dump_stack_lvl+0x73/0xb0 [ 49.437567] print_report+0xd1/0x650 [ 49.437571] ? __virt_addr_valid+0x1db/0x2d0 [ 49.437574] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.437579] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.437583] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.437587] kasan_report+0x141/0x180 [ 49.437592] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.437597] kasan_check_range+0x10c/0x1c0 [ 49.437602] __kasan_check_read+0x15/0x20 [ 49.437605] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.437610] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 49.437614] ? __kmalloc_cache_noprof+0x189/0x420 [ 49.437618] ? trace_hardirqs_on+0x37/0xe0 [ 49.437622] ? kasan_bitops_generic+0x92/0x1c0 [ 49.437626] kasan_bitops_generic+0x121/0x1c0 [ 49.437630] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 49.437634] ? ktime_get_ts64+0x83/0x230 [ 49.437639] kunit_try_run_case+0x1a2/0x480 [ 49.437643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.437647] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 49.437652] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 49.437657] ? __kthread_parkme+0x82/0x180 [ 49.437661] ? preempt_count_sub+0x50/0x80 [ 49.437665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.437689] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.437693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.437698] kthread+0x334/0x6f0 [ 49.437702] ? trace_preempt_on+0x20/0xc0 [ 49.437706] ? __pfx_kthread+0x10/0x10 [ 49.437711] ? _raw_spin_unlock_irq+0x47/0x80 [ 49.437715] ? calculate_sigpending+0x7b/0xa0 [ 49.437733] ? __pfx_kthread+0x10/0x10 [ 49.437738] ret_from_fork+0x3e/0x80 [ 49.437742] ? __pfx_kthread+0x10/0x10 [ 49.437746] ret_from_fork_asm+0x1a/0x30 [ 49.437752] </TASK> [ 49.437753] [ 49.632465] Allocated by task 304: [ 49.635874] kasan_save_stack+0x45/0x70 [ 49.639760] kasan_save_track+0x18/0x40 [ 49.643604] kasan_save_alloc_info+0x3b/0x50 [ 49.647876] __kasan_kmalloc+0xb7/0xc0 [ 49.651629] __kmalloc_cache_noprof+0x189/0x420 [ 49.656168] kasan_bitops_generic+0x92/0x1c0 [ 49.660441] kunit_try_run_case+0x1a2/0x480 [ 49.664626] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.670027] kthread+0x334/0x6f0 [ 49.673258] ret_from_fork+0x3e/0x80 [ 49.676839] ret_from_fork_asm+0x1a/0x30 [ 49.680772] [ 49.682272] The buggy address belongs to the object at ffff888104ed9160 [ 49.682272] which belongs to the cache kmalloc-16 of size 16 [ 49.694614] The buggy address is located 8 bytes inside of [ 49.694614] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 49.706868] [ 49.708367] The buggy address belongs to the physical page: [ 49.713937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 49.721938] flags: 0x200000000000000(node=0|zone=2) [ 49.726816] page_type: f5(slab) [ 49.729963] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 49.737711] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 49.745476] page dumped because: kasan: bad access detected [ 49.751047] [ 49.752548] Memory state around the buggy address: [ 49.757339] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 49.764559] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 49.771787] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 49.779012] ^ [ 49.785628] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.792853] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.800073] ================================================================== [ 49.807298] ================================================================== [ 49.814529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 49.823489] Read of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 49.830802] [ 49.832303] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 49.832310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.832312] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 49.832315] Call Trace: [ 49.832317] <TASK> [ 49.832319] dump_stack_lvl+0x73/0xb0 [ 49.832322] print_report+0xd1/0x650 [ 49.832326] ? __virt_addr_valid+0x1db/0x2d0 [ 49.832330] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 49.832334] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.832338] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 49.832343] kasan_report+0x141/0x180 [ 49.832347] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 49.832352] __asan_report_load8_noabort+0x18/0x20 [ 49.832356] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 49.832360] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 49.832365] ? __kmalloc_cache_noprof+0x189/0x420 [ 49.832368] ? trace_hardirqs_on+0x37/0xe0 [ 49.832372] ? kasan_bitops_generic+0x92/0x1c0 [ 49.832377] kasan_bitops_generic+0x121/0x1c0 [ 49.832380] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 49.832384] ? ktime_get_ts64+0x83/0x230 [ 49.832389] kunit_try_run_case+0x1a2/0x480 [ 49.832393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.832397] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 49.832402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 49.832406] ? __kthread_parkme+0x82/0x180 [ 49.832410] ? preempt_count_sub+0x50/0x80 [ 49.832415] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.832419] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.832423] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.832427] kthread+0x334/0x6f0 [ 49.832431] ? trace_preempt_on+0x20/0xc0 [ 49.832436] ? __pfx_kthread+0x10/0x10 [ 49.832440] ? _raw_spin_unlock_irq+0x47/0x80 [ 49.832444] ? calculate_sigpending+0x7b/0xa0 [ 49.832448] ? __pfx_kthread+0x10/0x10 [ 49.832452] ret_from_fork+0x3e/0x80 [ 49.832456] ? __pfx_kthread+0x10/0x10 [ 49.832461] ret_from_fork_asm+0x1a/0x30 [ 49.832466] </TASK> [ 49.832468] [ 50.023853] Allocated by task 304: [ 50.027259] kasan_save_stack+0x45/0x70 [ 50.031098] kasan_save_track+0x18/0x40 [ 50.034937] kasan_save_alloc_info+0x3b/0x50 [ 50.039210] __kasan_kmalloc+0xb7/0xc0 [ 50.042971] __kmalloc_cache_noprof+0x189/0x420 [ 50.047512] kasan_bitops_generic+0x92/0x1c0 [ 50.051784] kunit_try_run_case+0x1a2/0x480 [ 50.055971] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.061377] kthread+0x334/0x6f0 [ 50.064609] ret_from_fork+0x3e/0x80 [ 50.068189] ret_from_fork_asm+0x1a/0x30 [ 50.072115] [ 50.073614] The buggy address belongs to the object at ffff888104ed9160 [ 50.073614] which belongs to the cache kmalloc-16 of size 16 [ 50.085956] The buggy address is located 8 bytes inside of [ 50.085956] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 50.098209] [ 50.099710] The buggy address belongs to the physical page: [ 50.105323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 50.113323] flags: 0x200000000000000(node=0|zone=2) [ 50.118204] page_type: f5(slab) [ 50.121349] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 50.129098] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 50.136843] page dumped because: kasan: bad access detected [ 50.142416] [ 50.143916] Memory state around the buggy address: [ 50.148709] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 50.155954] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 50.163182] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 50.170409] ^ [ 50.177021] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.184238] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.191459] ================================================================== [ 47.437740] ================================================================== [ 47.444963] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.453915] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304 [ 47.461307] [ 47.462808] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 47.462816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.462818] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 47.462822] Call Trace: [ 47.462823] <TASK> [ 47.462825] dump_stack_lvl+0x73/0xb0 [ 47.462828] print_report+0xd1/0x650 [ 47.462833] ? __virt_addr_valid+0x1db/0x2d0 [ 47.462836] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.462841] ? kasan_complete_mode_report_info+0x2a/0x200 [ 47.462845] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.462849] kasan_report+0x141/0x180 [ 47.462854] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.462859] kasan_check_range+0x10c/0x1c0 [ 47.462864] __kasan_check_write+0x18/0x20 [ 47.462868] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.462872] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 47.462877] ? __kmalloc_cache_noprof+0x189/0x420 [ 47.462880] ? trace_hardirqs_on+0x37/0xe0 [ 47.462884] ? kasan_bitops_generic+0x92/0x1c0 [ 47.462889] kasan_bitops_generic+0x121/0x1c0 [ 47.462892] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 47.462896] ? ktime_get_ts64+0x83/0x230 [ 47.462901] kunit_try_run_case+0x1a2/0x480 [ 47.462905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.462910] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 47.462914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 47.462919] ? __kthread_parkme+0x82/0x180 [ 47.462923] ? preempt_count_sub+0x50/0x80 [ 47.462928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.462933] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.462937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 47.462941] kthread+0x334/0x6f0 [ 47.462945] ? trace_preempt_on+0x20/0xc0 [ 47.462949] ? __pfx_kthread+0x10/0x10 [ 47.462954] ? _raw_spin_unlock_irq+0x47/0x80 [ 47.462958] ? calculate_sigpending+0x7b/0xa0 [ 47.462962] ? __pfx_kthread+0x10/0x10 [ 47.462966] ret_from_fork+0x3e/0x80 [ 47.462970] ? __pfx_kthread+0x10/0x10 [ 47.462975] ret_from_fork_asm+0x1a/0x30 [ 47.462981] </TASK> [ 47.462982] [ 47.657789] Allocated by task 304: [ 47.661196] kasan_save_stack+0x45/0x70 [ 47.665044] kasan_save_track+0x18/0x40 [ 47.668890] kasan_save_alloc_info+0x3b/0x50 [ 47.673164] __kasan_kmalloc+0xb7/0xc0 [ 47.676915] __kmalloc_cache_noprof+0x189/0x420 [ 47.681446] kasan_bitops_generic+0x92/0x1c0 [ 47.685762] kunit_try_run_case+0x1a2/0x480 [ 47.689948] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.695348] kthread+0x334/0x6f0 [ 47.698581] ret_from_fork+0x3e/0x80 [ 47.702158] ret_from_fork_asm+0x1a/0x30 [ 47.706086] [ 47.707586] The buggy address belongs to the object at ffff888104ed9160 [ 47.707586] which belongs to the cache kmalloc-16 of size 16 [ 47.719925] The buggy address is located 8 bytes inside of [ 47.719925] allocated 9-byte region [ffff888104ed9160, ffff888104ed9169) [ 47.732173] [ 47.733702] The buggy address belongs to the physical page: [ 47.739320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9 [ 47.747319] flags: 0x200000000000000(node=0|zone=2) [ 47.752198] page_type: f5(slab) [ 47.755345] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 47.763086] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.770830] page dumped because: kasan: bad access detected [ 47.776404] [ 47.777904] Memory state around the buggy address: [ 47.782702] ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc [ 47.789949] ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 47.797167] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 47.804387] ^ [ 47.811001] ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.818221] ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.825447] ==================================================================