Date
July 4, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.398793] ================================================================== [ 14.399626] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.400535] Read of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.401324] [ 14.401535] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.401585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.401599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.401622] Call Trace: [ 14.401643] <TASK> [ 14.401664] dump_stack_lvl+0x73/0xb0 [ 14.401697] print_report+0xd1/0x650 [ 14.401721] ? __virt_addr_valid+0x1db/0x2d0 [ 14.401743] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.401770] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.401792] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.401820] kasan_report+0x141/0x180 [ 14.401842] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.401872] kasan_check_range+0x10c/0x1c0 [ 14.401895] __kasan_check_read+0x15/0x20 [ 14.401914] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.401941] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.401968] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.401992] ? trace_hardirqs_on+0x37/0xe0 [ 14.402015] ? kasan_bitops_generic+0x92/0x1c0 [ 14.402041] kasan_bitops_generic+0x121/0x1c0 [ 14.402064] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.402088] ? __pfx_read_tsc+0x10/0x10 [ 14.402109] ? ktime_get_ts64+0x86/0x230 [ 14.402132] kunit_try_run_case+0x1a5/0x480 [ 14.402157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.402177] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.402202] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.402234] ? __kthread_parkme+0x82/0x180 [ 14.402269] ? preempt_count_sub+0x50/0x80 [ 14.402292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.402315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.402348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.402370] kthread+0x337/0x6f0 [ 14.402390] ? trace_preempt_on+0x20/0xc0 [ 14.402411] ? __pfx_kthread+0x10/0x10 [ 14.402431] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.402452] ? calculate_sigpending+0x7b/0xa0 [ 14.402475] ? __pfx_kthread+0x10/0x10 [ 14.402495] ret_from_fork+0x116/0x1d0 [ 14.402513] ? __pfx_kthread+0x10/0x10 [ 14.402533] ret_from_fork_asm+0x1a/0x30 [ 14.402563] </TASK> [ 14.402574] [ 14.414274] Allocated by task 278: [ 14.414582] kasan_save_stack+0x45/0x70 [ 14.414787] kasan_save_track+0x18/0x40 [ 14.415028] kasan_save_alloc_info+0x3b/0x50 [ 14.415183] __kasan_kmalloc+0xb7/0xc0 [ 14.415382] __kmalloc_cache_noprof+0x189/0x420 [ 14.415772] kasan_bitops_generic+0x92/0x1c0 [ 14.415954] kunit_try_run_case+0x1a5/0x480 [ 14.416102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.416467] kthread+0x337/0x6f0 [ 14.416649] ret_from_fork+0x116/0x1d0 [ 14.416902] ret_from_fork_asm+0x1a/0x30 [ 14.417079] [ 14.417155] The buggy address belongs to the object at ffff88810298e120 [ 14.417155] which belongs to the cache kmalloc-16 of size 16 [ 14.417812] The buggy address is located 8 bytes inside of [ 14.417812] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.418178] [ 14.418286] The buggy address belongs to the physical page: [ 14.418623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.418993] flags: 0x200000000000000(node=0|zone=2) [ 14.419242] page_type: f5(slab) [ 14.419410] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.419747] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.419978] page dumped because: kasan: bad access detected [ 14.420199] [ 14.420326] Memory state around the buggy address: [ 14.420799] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.421176] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.421550] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.421818] ^ [ 14.422086] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.422488] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.422723] ================================================================== [ 14.262741] ================================================================== [ 14.263893] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.264300] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.264611] [ 14.264705] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.264754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.264767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.264801] Call Trace: [ 14.264821] <TASK> [ 14.264841] dump_stack_lvl+0x73/0xb0 [ 14.264872] print_report+0xd1/0x650 [ 14.264895] ? __virt_addr_valid+0x1db/0x2d0 [ 14.264919] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.264945] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.264966] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.264992] kasan_report+0x141/0x180 [ 14.265013] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.265043] kasan_check_range+0x10c/0x1c0 [ 14.265066] __kasan_check_write+0x18/0x20 [ 14.265085] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.265111] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.265136] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.265161] ? trace_hardirqs_on+0x37/0xe0 [ 14.265183] ? kasan_bitops_generic+0x92/0x1c0 [ 14.265209] kasan_bitops_generic+0x121/0x1c0 [ 14.265244] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.265279] ? __pfx_read_tsc+0x10/0x10 [ 14.265300] ? ktime_get_ts64+0x86/0x230 [ 14.265323] kunit_try_run_case+0x1a5/0x480 [ 14.265348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.265369] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.265392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.265414] ? __kthread_parkme+0x82/0x180 [ 14.265434] ? preempt_count_sub+0x50/0x80 [ 14.265458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.265481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.265502] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.265524] kthread+0x337/0x6f0 [ 14.265543] ? trace_preempt_on+0x20/0xc0 [ 14.265564] ? __pfx_kthread+0x10/0x10 [ 14.265583] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.265603] ? calculate_sigpending+0x7b/0xa0 [ 14.265627] ? __pfx_kthread+0x10/0x10 [ 14.265647] ret_from_fork+0x116/0x1d0 [ 14.265665] ? __pfx_kthread+0x10/0x10 [ 14.265684] ret_from_fork_asm+0x1a/0x30 [ 14.265715] </TASK> [ 14.265727] [ 14.274811] Allocated by task 278: [ 14.274997] kasan_save_stack+0x45/0x70 [ 14.275210] kasan_save_track+0x18/0x40 [ 14.275391] kasan_save_alloc_info+0x3b/0x50 [ 14.275540] __kasan_kmalloc+0xb7/0xc0 [ 14.275672] __kmalloc_cache_noprof+0x189/0x420 [ 14.276023] kasan_bitops_generic+0x92/0x1c0 [ 14.276242] kunit_try_run_case+0x1a5/0x480 [ 14.276465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.276643] kthread+0x337/0x6f0 [ 14.276770] ret_from_fork+0x116/0x1d0 [ 14.276933] ret_from_fork_asm+0x1a/0x30 [ 14.277135] [ 14.277242] The buggy address belongs to the object at ffff88810298e120 [ 14.277242] which belongs to the cache kmalloc-16 of size 16 [ 14.277770] The buggy address is located 8 bytes inside of [ 14.277770] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.278247] [ 14.278356] The buggy address belongs to the physical page: [ 14.278592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.278918] flags: 0x200000000000000(node=0|zone=2) [ 14.279118] page_type: f5(slab) [ 14.279261] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.279612] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.279947] page dumped because: kasan: bad access detected [ 14.280150] [ 14.280251] Memory state around the buggy address: [ 14.280438] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.280734] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.281023] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.281391] ^ [ 14.281582] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.281819] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.282033] ================================================================== [ 14.368746] ================================================================== [ 14.369048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.370093] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.370428] [ 14.370548] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.370599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.370611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.370633] Call Trace: [ 14.370653] <TASK> [ 14.370673] dump_stack_lvl+0x73/0xb0 [ 14.370706] print_report+0xd1/0x650 [ 14.370729] ? __virt_addr_valid+0x1db/0x2d0 [ 14.370752] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.370778] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.370800] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.370826] kasan_report+0x141/0x180 [ 14.370847] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.370877] kasan_check_range+0x10c/0x1c0 [ 14.370900] __kasan_check_write+0x18/0x20 [ 14.370919] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.370949] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.370976] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.371000] ? trace_hardirqs_on+0x37/0xe0 [ 14.371021] ? kasan_bitops_generic+0x92/0x1c0 [ 14.371048] kasan_bitops_generic+0x121/0x1c0 [ 14.371071] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.371094] ? __pfx_read_tsc+0x10/0x10 [ 14.371115] ? ktime_get_ts64+0x86/0x230 [ 14.371137] kunit_try_run_case+0x1a5/0x480 [ 14.371161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.371183] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.371205] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.371242] ? __kthread_parkme+0x82/0x180 [ 14.371263] ? preempt_count_sub+0x50/0x80 [ 14.371286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.371308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.371329] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.371352] kthread+0x337/0x6f0 [ 14.371370] ? trace_preempt_on+0x20/0xc0 [ 14.371390] ? __pfx_kthread+0x10/0x10 [ 14.371410] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.371430] ? calculate_sigpending+0x7b/0xa0 [ 14.371453] ? __pfx_kthread+0x10/0x10 [ 14.371473] ret_from_fork+0x116/0x1d0 [ 14.371491] ? __pfx_kthread+0x10/0x10 [ 14.371511] ret_from_fork_asm+0x1a/0x30 [ 14.371542] </TASK> [ 14.371554] [ 14.384294] Allocated by task 278: [ 14.384659] kasan_save_stack+0x45/0x70 [ 14.385037] kasan_save_track+0x18/0x40 [ 14.385421] kasan_save_alloc_info+0x3b/0x50 [ 14.385797] __kasan_kmalloc+0xb7/0xc0 [ 14.386131] __kmalloc_cache_noprof+0x189/0x420 [ 14.386569] kasan_bitops_generic+0x92/0x1c0 [ 14.386944] kunit_try_run_case+0x1a5/0x480 [ 14.387361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.387816] kthread+0x337/0x6f0 [ 14.388103] ret_from_fork+0x116/0x1d0 [ 14.388338] ret_from_fork_asm+0x1a/0x30 [ 14.388706] [ 14.388873] The buggy address belongs to the object at ffff88810298e120 [ 14.388873] which belongs to the cache kmalloc-16 of size 16 [ 14.389682] The buggy address is located 8 bytes inside of [ 14.389682] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.390612] [ 14.390696] The buggy address belongs to the physical page: [ 14.390871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.391118] flags: 0x200000000000000(node=0|zone=2) [ 14.391489] page_type: f5(slab) [ 14.391844] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.392687] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.393429] page dumped because: kasan: bad access detected [ 14.393938] [ 14.394104] Memory state around the buggy address: [ 14.394599] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.395232] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.395507] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.396130] ^ [ 14.396561] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.397064] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.397518] ================================================================== [ 14.323799] ================================================================== [ 14.324156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.324809] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.325585] [ 14.325812] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.325868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.325882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.325905] Call Trace: [ 14.326013] <TASK> [ 14.326039] dump_stack_lvl+0x73/0xb0 [ 14.326076] print_report+0xd1/0x650 [ 14.326100] ? __virt_addr_valid+0x1db/0x2d0 [ 14.326124] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.326149] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.326171] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.326197] kasan_report+0x141/0x180 [ 14.326229] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.326274] kasan_check_range+0x10c/0x1c0 [ 14.326297] __kasan_check_write+0x18/0x20 [ 14.326315] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.326341] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.326367] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.326392] ? trace_hardirqs_on+0x37/0xe0 [ 14.326414] ? kasan_bitops_generic+0x92/0x1c0 [ 14.326440] kasan_bitops_generic+0x121/0x1c0 [ 14.326462] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.326485] ? __pfx_read_tsc+0x10/0x10 [ 14.326506] ? ktime_get_ts64+0x86/0x230 [ 14.326529] kunit_try_run_case+0x1a5/0x480 [ 14.326553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.326575] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.326598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.326619] ? __kthread_parkme+0x82/0x180 [ 14.326639] ? preempt_count_sub+0x50/0x80 [ 14.326662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.326685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.326707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.326728] kthread+0x337/0x6f0 [ 14.326747] ? trace_preempt_on+0x20/0xc0 [ 14.326769] ? __pfx_kthread+0x10/0x10 [ 14.326789] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.326808] ? calculate_sigpending+0x7b/0xa0 [ 14.326832] ? __pfx_kthread+0x10/0x10 [ 14.326853] ret_from_fork+0x116/0x1d0 [ 14.326871] ? __pfx_kthread+0x10/0x10 [ 14.326890] ret_from_fork_asm+0x1a/0x30 [ 14.326921] </TASK> [ 14.326933] [ 14.338122] Allocated by task 278: [ 14.338530] kasan_save_stack+0x45/0x70 [ 14.338840] kasan_save_track+0x18/0x40 [ 14.339125] kasan_save_alloc_info+0x3b/0x50 [ 14.339512] __kasan_kmalloc+0xb7/0xc0 [ 14.339789] __kmalloc_cache_noprof+0x189/0x420 [ 14.340057] kasan_bitops_generic+0x92/0x1c0 [ 14.340253] kunit_try_run_case+0x1a5/0x480 [ 14.340627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.340893] kthread+0x337/0x6f0 [ 14.341057] ret_from_fork+0x116/0x1d0 [ 14.341522] ret_from_fork_asm+0x1a/0x30 [ 14.341735] [ 14.341965] The buggy address belongs to the object at ffff88810298e120 [ 14.341965] which belongs to the cache kmalloc-16 of size 16 [ 14.342629] The buggy address is located 8 bytes inside of [ 14.342629] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.343215] [ 14.343388] The buggy address belongs to the physical page: [ 14.343841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.344202] flags: 0x200000000000000(node=0|zone=2) [ 14.344588] page_type: f5(slab) [ 14.344859] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.345272] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.345697] page dumped because: kasan: bad access detected [ 14.346013] [ 14.346095] Memory state around the buggy address: [ 14.346539] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.346931] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.347238] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.347673] ^ [ 14.347972] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.348403] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.348816] ================================================================== [ 14.302401] ================================================================== [ 14.302687] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.303076] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.303525] [ 14.303617] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.303664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.303676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.303699] Call Trace: [ 14.303720] <TASK> [ 14.303740] dump_stack_lvl+0x73/0xb0 [ 14.303772] print_report+0xd1/0x650 [ 14.303795] ? __virt_addr_valid+0x1db/0x2d0 [ 14.303819] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.303845] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.303867] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.303894] kasan_report+0x141/0x180 [ 14.303915] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.303946] kasan_check_range+0x10c/0x1c0 [ 14.303968] __kasan_check_write+0x18/0x20 [ 14.303988] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.304015] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.304042] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.304065] ? trace_hardirqs_on+0x37/0xe0 [ 14.304087] ? kasan_bitops_generic+0x92/0x1c0 [ 14.304112] kasan_bitops_generic+0x121/0x1c0 [ 14.304140] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.304165] ? __pfx_read_tsc+0x10/0x10 [ 14.304186] ? ktime_get_ts64+0x86/0x230 [ 14.304210] kunit_try_run_case+0x1a5/0x480 [ 14.304248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.304775] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.304814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.304836] ? __kthread_parkme+0x82/0x180 [ 14.304857] ? preempt_count_sub+0x50/0x80 [ 14.304880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.304903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.304927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.304948] kthread+0x337/0x6f0 [ 14.304968] ? trace_preempt_on+0x20/0xc0 [ 14.304989] ? __pfx_kthread+0x10/0x10 [ 14.305009] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.305029] ? calculate_sigpending+0x7b/0xa0 [ 14.305053] ? __pfx_kthread+0x10/0x10 [ 14.305073] ret_from_fork+0x116/0x1d0 [ 14.305093] ? __pfx_kthread+0x10/0x10 [ 14.305112] ret_from_fork_asm+0x1a/0x30 [ 14.305143] </TASK> [ 14.305154] [ 14.313701] Allocated by task 278: [ 14.313918] kasan_save_stack+0x45/0x70 [ 14.314118] kasan_save_track+0x18/0x40 [ 14.314342] kasan_save_alloc_info+0x3b/0x50 [ 14.314545] __kasan_kmalloc+0xb7/0xc0 [ 14.314690] __kmalloc_cache_noprof+0x189/0x420 [ 14.314846] kasan_bitops_generic+0x92/0x1c0 [ 14.314994] kunit_try_run_case+0x1a5/0x480 [ 14.315154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.315412] kthread+0x337/0x6f0 [ 14.315617] ret_from_fork+0x116/0x1d0 [ 14.315801] ret_from_fork_asm+0x1a/0x30 [ 14.316134] [ 14.316206] The buggy address belongs to the object at ffff88810298e120 [ 14.316206] which belongs to the cache kmalloc-16 of size 16 [ 14.316780] The buggy address is located 8 bytes inside of [ 14.316780] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.317144] [ 14.317229] The buggy address belongs to the physical page: [ 14.317487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.317849] flags: 0x200000000000000(node=0|zone=2) [ 14.318186] page_type: f5(slab) [ 14.318499] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.318877] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.319102] page dumped because: kasan: bad access detected [ 14.319379] [ 14.319476] Memory state around the buggy address: [ 14.319696] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.320008] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.320377] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.320591] ^ [ 14.320734] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.320949] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.321208] ================================================================== [ 14.349755] ================================================================== [ 14.350424] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.350809] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.351063] [ 14.351184] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.351248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.351274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.351298] Call Trace: [ 14.351319] <TASK> [ 14.351339] dump_stack_lvl+0x73/0xb0 [ 14.351370] print_report+0xd1/0x650 [ 14.351393] ? __virt_addr_valid+0x1db/0x2d0 [ 14.351416] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.351441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.351462] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.351488] kasan_report+0x141/0x180 [ 14.351510] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.351540] kasan_check_range+0x10c/0x1c0 [ 14.351562] __kasan_check_write+0x18/0x20 [ 14.351580] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.351607] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.351632] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.351656] ? trace_hardirqs_on+0x37/0xe0 [ 14.351678] ? kasan_bitops_generic+0x92/0x1c0 [ 14.351704] kasan_bitops_generic+0x121/0x1c0 [ 14.351727] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.351751] ? __pfx_read_tsc+0x10/0x10 [ 14.351771] ? ktime_get_ts64+0x86/0x230 [ 14.351794] kunit_try_run_case+0x1a5/0x480 [ 14.351817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.351839] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.351861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.351883] ? __kthread_parkme+0x82/0x180 [ 14.351902] ? preempt_count_sub+0x50/0x80 [ 14.351926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.351947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.351969] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.351991] kthread+0x337/0x6f0 [ 14.352009] ? trace_preempt_on+0x20/0xc0 [ 14.352030] ? __pfx_kthread+0x10/0x10 [ 14.352049] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.352068] ? calculate_sigpending+0x7b/0xa0 [ 14.352091] ? __pfx_kthread+0x10/0x10 [ 14.352112] ret_from_fork+0x116/0x1d0 [ 14.352129] ? __pfx_kthread+0x10/0x10 [ 14.352148] ret_from_fork_asm+0x1a/0x30 [ 14.352178] </TASK> [ 14.352189] [ 14.360140] Allocated by task 278: [ 14.360348] kasan_save_stack+0x45/0x70 [ 14.360554] kasan_save_track+0x18/0x40 [ 14.360758] kasan_save_alloc_info+0x3b/0x50 [ 14.360928] __kasan_kmalloc+0xb7/0xc0 [ 14.361114] __kmalloc_cache_noprof+0x189/0x420 [ 14.361297] kasan_bitops_generic+0x92/0x1c0 [ 14.361526] kunit_try_run_case+0x1a5/0x480 [ 14.361718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.361890] kthread+0x337/0x6f0 [ 14.362061] ret_from_fork+0x116/0x1d0 [ 14.362258] ret_from_fork_asm+0x1a/0x30 [ 14.362551] [ 14.362641] The buggy address belongs to the object at ffff88810298e120 [ 14.362641] which belongs to the cache kmalloc-16 of size 16 [ 14.363271] The buggy address is located 8 bytes inside of [ 14.363271] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.363775] [ 14.363879] The buggy address belongs to the physical page: [ 14.364069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.364324] flags: 0x200000000000000(node=0|zone=2) [ 14.364491] page_type: f5(slab) [ 14.364613] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.364927] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.365273] page dumped because: kasan: bad access detected [ 14.365531] [ 14.365622] Memory state around the buggy address: [ 14.365844] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.366085] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.366467] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.366781] ^ [ 14.366956] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.367171] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.367659] ================================================================== [ 14.237668] ================================================================== [ 14.238330] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.238874] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.239256] [ 14.239741] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.239797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.239810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.239833] Call Trace: [ 14.239855] <TASK> [ 14.239876] dump_stack_lvl+0x73/0xb0 [ 14.239912] print_report+0xd1/0x650 [ 14.239936] ? __virt_addr_valid+0x1db/0x2d0 [ 14.239958] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.239985] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.240009] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.240035] kasan_report+0x141/0x180 [ 14.240055] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.240087] kasan_check_range+0x10c/0x1c0 [ 14.240110] __kasan_check_write+0x18/0x20 [ 14.240128] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.240154] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.240180] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.240204] ? trace_hardirqs_on+0x37/0xe0 [ 14.240239] ? kasan_bitops_generic+0x92/0x1c0 [ 14.240278] kasan_bitops_generic+0x121/0x1c0 [ 14.240301] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.240325] ? __pfx_read_tsc+0x10/0x10 [ 14.240345] ? ktime_get_ts64+0x86/0x230 [ 14.240369] kunit_try_run_case+0x1a5/0x480 [ 14.240392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.240413] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.240436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.240458] ? __kthread_parkme+0x82/0x180 [ 14.240479] ? preempt_count_sub+0x50/0x80 [ 14.240501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.240523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.240545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.240566] kthread+0x337/0x6f0 [ 14.240585] ? trace_preempt_on+0x20/0xc0 [ 14.240607] ? __pfx_kthread+0x10/0x10 [ 14.240627] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.240648] ? calculate_sigpending+0x7b/0xa0 [ 14.240672] ? __pfx_kthread+0x10/0x10 [ 14.240693] ret_from_fork+0x116/0x1d0 [ 14.240710] ? __pfx_kthread+0x10/0x10 [ 14.240729] ret_from_fork_asm+0x1a/0x30 [ 14.240760] </TASK> [ 14.240772] [ 14.252934] Allocated by task 278: [ 14.253245] kasan_save_stack+0x45/0x70 [ 14.253580] kasan_save_track+0x18/0x40 [ 14.253769] kasan_save_alloc_info+0x3b/0x50 [ 14.253955] __kasan_kmalloc+0xb7/0xc0 [ 14.254140] __kmalloc_cache_noprof+0x189/0x420 [ 14.254380] kasan_bitops_generic+0x92/0x1c0 [ 14.254940] kunit_try_run_case+0x1a5/0x480 [ 14.255236] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.255596] kthread+0x337/0x6f0 [ 14.255869] ret_from_fork+0x116/0x1d0 [ 14.256120] ret_from_fork_asm+0x1a/0x30 [ 14.256487] [ 14.256580] The buggy address belongs to the object at ffff88810298e120 [ 14.256580] which belongs to the cache kmalloc-16 of size 16 [ 14.257297] The buggy address is located 8 bytes inside of [ 14.257297] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.257779] [ 14.257874] The buggy address belongs to the physical page: [ 14.258117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.258441] flags: 0x200000000000000(node=0|zone=2) [ 14.258606] page_type: f5(slab) [ 14.258889] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.259248] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.259547] page dumped because: kasan: bad access detected [ 14.259811] [ 14.259920] Memory state around the buggy address: [ 14.260138] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.260433] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.260734] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.261037] ^ [ 14.261244] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.261459] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.261875] ================================================================== [ 14.282751] ================================================================== [ 14.283779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.284130] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.284570] [ 14.284690] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.284738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.284751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.284774] Call Trace: [ 14.284803] <TASK> [ 14.284824] dump_stack_lvl+0x73/0xb0 [ 14.284855] print_report+0xd1/0x650 [ 14.284877] ? __virt_addr_valid+0x1db/0x2d0 [ 14.284901] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.284927] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.284948] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.284974] kasan_report+0x141/0x180 [ 14.284995] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.285025] kasan_check_range+0x10c/0x1c0 [ 14.285048] __kasan_check_write+0x18/0x20 [ 14.285067] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.285093] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.285120] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.285143] ? trace_hardirqs_on+0x37/0xe0 [ 14.285165] ? kasan_bitops_generic+0x92/0x1c0 [ 14.285192] kasan_bitops_generic+0x121/0x1c0 [ 14.285214] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.285251] ? __pfx_read_tsc+0x10/0x10 [ 14.285346] ? ktime_get_ts64+0x86/0x230 [ 14.285370] kunit_try_run_case+0x1a5/0x480 [ 14.285395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.285416] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.285439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.285461] ? __kthread_parkme+0x82/0x180 [ 14.285481] ? preempt_count_sub+0x50/0x80 [ 14.285503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.285526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.285547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.285569] kthread+0x337/0x6f0 [ 14.285588] ? trace_preempt_on+0x20/0xc0 [ 14.285618] ? __pfx_kthread+0x10/0x10 [ 14.285638] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.285658] ? calculate_sigpending+0x7b/0xa0 [ 14.285682] ? __pfx_kthread+0x10/0x10 [ 14.285702] ret_from_fork+0x116/0x1d0 [ 14.285720] ? __pfx_kthread+0x10/0x10 [ 14.285740] ret_from_fork_asm+0x1a/0x30 [ 14.285770] </TASK> [ 14.285781] [ 14.293744] Allocated by task 278: [ 14.293899] kasan_save_stack+0x45/0x70 [ 14.294100] kasan_save_track+0x18/0x40 [ 14.294303] kasan_save_alloc_info+0x3b/0x50 [ 14.294630] __kasan_kmalloc+0xb7/0xc0 [ 14.294882] __kmalloc_cache_noprof+0x189/0x420 [ 14.295039] kasan_bitops_generic+0x92/0x1c0 [ 14.295274] kunit_try_run_case+0x1a5/0x480 [ 14.295482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.295716] kthread+0x337/0x6f0 [ 14.295837] ret_from_fork+0x116/0x1d0 [ 14.295975] ret_from_fork_asm+0x1a/0x30 [ 14.296154] [ 14.296260] The buggy address belongs to the object at ffff88810298e120 [ 14.296260] which belongs to the cache kmalloc-16 of size 16 [ 14.297068] The buggy address is located 8 bytes inside of [ 14.297068] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.297452] [ 14.297525] The buggy address belongs to the physical page: [ 14.297701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.297965] flags: 0x200000000000000(node=0|zone=2) [ 14.298202] page_type: f5(slab) [ 14.298501] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.298839] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.299151] page dumped because: kasan: bad access detected [ 14.299530] [ 14.299622] Memory state around the buggy address: [ 14.299780] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.299996] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.300230] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.300563] ^ [ 14.300780] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.301103] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.301658] ================================================================== [ 14.423587] ================================================================== [ 14.424002] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.425004] Read of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.425256] [ 14.425351] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.425401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.425413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.425435] Call Trace: [ 14.425457] <TASK> [ 14.425478] dump_stack_lvl+0x73/0xb0 [ 14.425513] print_report+0xd1/0x650 [ 14.425536] ? __virt_addr_valid+0x1db/0x2d0 [ 14.425559] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.425585] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.425606] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.425633] kasan_report+0x141/0x180 [ 14.425654] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.425686] __asan_report_load8_noabort+0x18/0x20 [ 14.425710] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.425737] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.425763] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.425787] ? trace_hardirqs_on+0x37/0xe0 [ 14.425809] ? kasan_bitops_generic+0x92/0x1c0 [ 14.425836] kasan_bitops_generic+0x121/0x1c0 [ 14.425857] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.425881] ? __pfx_read_tsc+0x10/0x10 [ 14.425903] ? ktime_get_ts64+0x86/0x230 [ 14.425927] kunit_try_run_case+0x1a5/0x480 [ 14.425951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.425972] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.425996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.426018] ? __kthread_parkme+0x82/0x180 [ 14.426039] ? preempt_count_sub+0x50/0x80 [ 14.426062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.426085] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.426107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.426129] kthread+0x337/0x6f0 [ 14.426147] ? trace_preempt_on+0x20/0xc0 [ 14.426168] ? __pfx_kthread+0x10/0x10 [ 14.426188] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.426208] ? calculate_sigpending+0x7b/0xa0 [ 14.426242] ? __pfx_kthread+0x10/0x10 [ 14.426274] ret_from_fork+0x116/0x1d0 [ 14.426294] ? __pfx_kthread+0x10/0x10 [ 14.426314] ret_from_fork_asm+0x1a/0x30 [ 14.426358] </TASK> [ 14.426369] [ 14.437699] Allocated by task 278: [ 14.437983] kasan_save_stack+0x45/0x70 [ 14.438331] kasan_save_track+0x18/0x40 [ 14.438653] kasan_save_alloc_info+0x3b/0x50 [ 14.438869] __kasan_kmalloc+0xb7/0xc0 [ 14.439043] __kmalloc_cache_noprof+0x189/0x420 [ 14.439255] kasan_bitops_generic+0x92/0x1c0 [ 14.439688] kunit_try_run_case+0x1a5/0x480 [ 14.439882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.440116] kthread+0x337/0x6f0 [ 14.440576] ret_from_fork+0x116/0x1d0 [ 14.440864] ret_from_fork_asm+0x1a/0x30 [ 14.441301] [ 14.441544] The buggy address belongs to the object at ffff88810298e120 [ 14.441544] which belongs to the cache kmalloc-16 of size 16 [ 14.442054] The buggy address is located 8 bytes inside of [ 14.442054] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.442956] [ 14.443203] The buggy address belongs to the physical page: [ 14.443530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.443865] flags: 0x200000000000000(node=0|zone=2) [ 14.444087] page_type: f5(slab) [ 14.444255] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.444574] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.444890] page dumped because: kasan: bad access detected [ 14.445117] [ 14.445205] Memory state around the buggy address: [ 14.445971] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.446775] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.447445] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.448171] ^ [ 14.448683] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.449004] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.449944] ==================================================================