Date
July 5, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 16.284633] ================================================================== [ 16.286583] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.288068] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.288356] [ 16.288470] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.288527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.288544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.288572] Call Trace: [ 16.288597] <TASK> [ 16.288622] dump_stack_lvl+0x73/0xb0 [ 16.289255] print_report+0xd1/0x650 [ 16.289292] ? __virt_addr_valid+0x1db/0x2d0 [ 16.289322] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.289355] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.289381] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.289414] kasan_report+0x141/0x180 [ 16.289440] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.289478] kasan_check_range+0x10c/0x1c0 [ 16.289505] __kasan_check_write+0x18/0x20 [ 16.289526] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.289558] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.289590] ? ret_from_fork_asm+0x1a/0x30 [ 16.289616] ? kthread+0x337/0x6f0 [ 16.289705] kasan_bitops_generic+0x121/0x1c0 [ 16.289737] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.289858] ? __pfx_read_tsc+0x10/0x10 [ 16.289888] ? ktime_get_ts64+0x86/0x230 [ 16.289919] kunit_try_run_case+0x1a5/0x480 [ 16.289948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.289974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.290002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.290028] ? __kthread_parkme+0x82/0x180 [ 16.290053] ? preempt_count_sub+0x50/0x80 [ 16.290081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.290107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.290134] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.290160] kthread+0x337/0x6f0 [ 16.290183] ? trace_preempt_on+0x20/0xc0 [ 16.290211] ? __pfx_kthread+0x10/0x10 [ 16.290235] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.290258] ? calculate_sigpending+0x7b/0xa0 [ 16.290287] ? __pfx_kthread+0x10/0x10 [ 16.290311] ret_from_fork+0x116/0x1d0 [ 16.290333] ? __pfx_kthread+0x10/0x10 [ 16.290358] ret_from_fork_asm+0x1a/0x30 [ 16.290395] </TASK> [ 16.290411] [ 16.303056] Allocated by task 279: [ 16.303308] kasan_save_stack+0x45/0x70 [ 16.303699] kasan_save_track+0x18/0x40 [ 16.304182] kasan_save_alloc_info+0x3b/0x50 [ 16.304450] __kasan_kmalloc+0xb7/0xc0 [ 16.304722] __kmalloc_cache_noprof+0x189/0x420 [ 16.305248] kasan_bitops_generic+0x92/0x1c0 [ 16.305502] kunit_try_run_case+0x1a5/0x480 [ 16.305802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.306017] kthread+0x337/0x6f0 [ 16.306158] ret_from_fork+0x116/0x1d0 [ 16.306362] ret_from_fork_asm+0x1a/0x30 [ 16.306841] [ 16.306966] The buggy address belongs to the object at ffff88810267b740 [ 16.306966] which belongs to the cache kmalloc-16 of size 16 [ 16.307628] The buggy address is located 8 bytes inside of [ 16.307628] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.308402] [ 16.308525] The buggy address belongs to the physical page: [ 16.308952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.309418] flags: 0x200000000000000(node=0|zone=2) [ 16.309783] page_type: f5(slab) [ 16.310129] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.310619] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.311105] page dumped because: kasan: bad access detected [ 16.311313] [ 16.311397] Memory state around the buggy address: [ 16.311580] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.312385] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.312743] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.313031] ^ [ 16.313235] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.313948] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.314381] ================================================================== [ 16.179699] ================================================================== [ 16.180013] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.180596] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.181366] [ 16.181505] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.181563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.181577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.181605] Call Trace: [ 16.181627] <TASK> [ 16.181666] dump_stack_lvl+0x73/0xb0 [ 16.181700] print_report+0xd1/0x650 [ 16.181727] ? __virt_addr_valid+0x1db/0x2d0 [ 16.181755] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.181883] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.181916] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.181948] kasan_report+0x141/0x180 [ 16.181976] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.182013] kasan_check_range+0x10c/0x1c0 [ 16.182041] __kasan_check_write+0x18/0x20 [ 16.182063] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.182095] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.182128] ? ret_from_fork_asm+0x1a/0x30 [ 16.182154] ? kthread+0x337/0x6f0 [ 16.182183] kasan_bitops_generic+0x121/0x1c0 [ 16.182210] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.182239] ? __pfx_read_tsc+0x10/0x10 [ 16.182264] ? ktime_get_ts64+0x86/0x230 [ 16.182293] kunit_try_run_case+0x1a5/0x480 [ 16.182323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.182349] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.182376] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.182402] ? __kthread_parkme+0x82/0x180 [ 16.182433] ? preempt_count_sub+0x50/0x80 [ 16.182461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.182489] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.182516] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.182543] kthread+0x337/0x6f0 [ 16.182566] ? trace_preempt_on+0x20/0xc0 [ 16.182593] ? __pfx_kthread+0x10/0x10 [ 16.182617] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.182641] ? calculate_sigpending+0x7b/0xa0 [ 16.182683] ? __pfx_kthread+0x10/0x10 [ 16.182708] ret_from_fork+0x116/0x1d0 [ 16.182730] ? __pfx_kthread+0x10/0x10 [ 16.182753] ret_from_fork_asm+0x1a/0x30 [ 16.182864] </TASK> [ 16.182880] [ 16.193969] Allocated by task 279: [ 16.194512] kasan_save_stack+0x45/0x70 [ 16.194823] kasan_save_track+0x18/0x40 [ 16.195192] kasan_save_alloc_info+0x3b/0x50 [ 16.195443] __kasan_kmalloc+0xb7/0xc0 [ 16.195607] __kmalloc_cache_noprof+0x189/0x420 [ 16.196068] kasan_bitops_generic+0x92/0x1c0 [ 16.196336] kunit_try_run_case+0x1a5/0x480 [ 16.196583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.196855] kthread+0x337/0x6f0 [ 16.197079] ret_from_fork+0x116/0x1d0 [ 16.197433] ret_from_fork_asm+0x1a/0x30 [ 16.197610] [ 16.197716] The buggy address belongs to the object at ffff88810267b740 [ 16.197716] which belongs to the cache kmalloc-16 of size 16 [ 16.198413] The buggy address is located 8 bytes inside of [ 16.198413] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.199420] [ 16.199591] The buggy address belongs to the physical page: [ 16.200119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.200450] flags: 0x200000000000000(node=0|zone=2) [ 16.200749] page_type: f5(slab) [ 16.201079] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.201428] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.201845] page dumped because: kasan: bad access detected [ 16.202129] [ 16.202217] Memory state around the buggy address: [ 16.202672] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.203345] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.203719] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.204348] ^ [ 16.204570] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205198] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.205495] ================================================================== [ 16.315233] ================================================================== [ 16.315687] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.316210] Read of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.316632] [ 16.316888] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.316987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.317003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.317030] Call Trace: [ 16.317053] <TASK> [ 16.317078] dump_stack_lvl+0x73/0xb0 [ 16.317115] print_report+0xd1/0x650 [ 16.317141] ? __virt_addr_valid+0x1db/0x2d0 [ 16.317207] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.317266] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.317292] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.317326] kasan_report+0x141/0x180 [ 16.317351] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.317388] kasan_check_range+0x10c/0x1c0 [ 16.317417] __kasan_check_read+0x15/0x20 [ 16.317439] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.317510] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.317544] ? ret_from_fork_asm+0x1a/0x30 [ 16.317570] ? kthread+0x337/0x6f0 [ 16.317599] kasan_bitops_generic+0x121/0x1c0 [ 16.317626] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.317704] ? __pfx_read_tsc+0x10/0x10 [ 16.317730] ? ktime_get_ts64+0x86/0x230 [ 16.317779] kunit_try_run_case+0x1a5/0x480 [ 16.317829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.317855] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.317883] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.317909] ? __kthread_parkme+0x82/0x180 [ 16.317971] ? preempt_count_sub+0x50/0x80 [ 16.318003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.318031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.318059] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.318086] kthread+0x337/0x6f0 [ 16.318108] ? trace_preempt_on+0x20/0xc0 [ 16.318174] ? __pfx_kthread+0x10/0x10 [ 16.318197] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.318222] ? calculate_sigpending+0x7b/0xa0 [ 16.318250] ? __pfx_kthread+0x10/0x10 [ 16.318275] ret_from_fork+0x116/0x1d0 [ 16.318328] ? __pfx_kthread+0x10/0x10 [ 16.318353] ret_from_fork_asm+0x1a/0x30 [ 16.318389] </TASK> [ 16.318401] [ 16.329786] Allocated by task 279: [ 16.330002] kasan_save_stack+0x45/0x70 [ 16.330233] kasan_save_track+0x18/0x40 [ 16.330463] kasan_save_alloc_info+0x3b/0x50 [ 16.330902] __kasan_kmalloc+0xb7/0xc0 [ 16.331137] __kmalloc_cache_noprof+0x189/0x420 [ 16.331399] kasan_bitops_generic+0x92/0x1c0 [ 16.331659] kunit_try_run_case+0x1a5/0x480 [ 16.332222] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.332578] kthread+0x337/0x6f0 [ 16.332921] ret_from_fork+0x116/0x1d0 [ 16.333192] ret_from_fork_asm+0x1a/0x30 [ 16.333440] [ 16.333589] The buggy address belongs to the object at ffff88810267b740 [ 16.333589] which belongs to the cache kmalloc-16 of size 16 [ 16.334332] The buggy address is located 8 bytes inside of [ 16.334332] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.335125] [ 16.335253] The buggy address belongs to the physical page: [ 16.335560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.336275] flags: 0x200000000000000(node=0|zone=2) [ 16.336501] page_type: f5(slab) [ 16.336758] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.337303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.337743] page dumped because: kasan: bad access detected [ 16.338190] [ 16.338342] Memory state around the buggy address: [ 16.338583] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.339141] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.339529] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.340251] ^ [ 16.340547] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341030] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341354] ================================================================== [ 16.130425] ================================================================== [ 16.130765] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.131192] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.132132] [ 16.132250] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.132306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.132321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.132346] Call Trace: [ 16.132366] <TASK> [ 16.132385] dump_stack_lvl+0x73/0xb0 [ 16.132419] print_report+0xd1/0x650 [ 16.132445] ? __virt_addr_valid+0x1db/0x2d0 [ 16.132471] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.132502] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.132529] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.132560] kasan_report+0x141/0x180 [ 16.132586] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.132623] kasan_check_range+0x10c/0x1c0 [ 16.132670] __kasan_check_write+0x18/0x20 [ 16.132697] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.132731] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.132765] ? ret_from_fork_asm+0x1a/0x30 [ 16.132791] ? kthread+0x337/0x6f0 [ 16.132821] kasan_bitops_generic+0x121/0x1c0 [ 16.132849] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.132877] ? __pfx_read_tsc+0x10/0x10 [ 16.132903] ? ktime_get_ts64+0x86/0x230 [ 16.132931] kunit_try_run_case+0x1a5/0x480 [ 16.132960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.132986] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.133012] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.133039] ? __kthread_parkme+0x82/0x180 [ 16.133062] ? preempt_count_sub+0x50/0x80 [ 16.133089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.133117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.133143] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.133170] kthread+0x337/0x6f0 [ 16.133192] ? trace_preempt_on+0x20/0xc0 [ 16.133218] ? __pfx_kthread+0x10/0x10 [ 16.133242] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.133265] ? calculate_sigpending+0x7b/0xa0 [ 16.133293] ? __pfx_kthread+0x10/0x10 [ 16.133318] ret_from_fork+0x116/0x1d0 [ 16.133339] ? __pfx_kthread+0x10/0x10 [ 16.133362] ret_from_fork_asm+0x1a/0x30 [ 16.133397] </TASK> [ 16.133410] [ 16.144134] Allocated by task 279: [ 16.144373] kasan_save_stack+0x45/0x70 [ 16.144633] kasan_save_track+0x18/0x40 [ 16.144964] kasan_save_alloc_info+0x3b/0x50 [ 16.145185] __kasan_kmalloc+0xb7/0xc0 [ 16.145364] __kmalloc_cache_noprof+0x189/0x420 [ 16.145618] kasan_bitops_generic+0x92/0x1c0 [ 16.145991] kunit_try_run_case+0x1a5/0x480 [ 16.146219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.146483] kthread+0x337/0x6f0 [ 16.146706] ret_from_fork+0x116/0x1d0 [ 16.146982] ret_from_fork_asm+0x1a/0x30 [ 16.147221] [ 16.147325] The buggy address belongs to the object at ffff88810267b740 [ 16.147325] which belongs to the cache kmalloc-16 of size 16 [ 16.148226] The buggy address is located 8 bytes inside of [ 16.148226] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.148754] [ 16.148847] The buggy address belongs to the physical page: [ 16.149056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.149452] flags: 0x200000000000000(node=0|zone=2) [ 16.149747] page_type: f5(slab) [ 16.150104] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.150386] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.150678] page dumped because: kasan: bad access detected [ 16.151246] [ 16.151365] Memory state around the buggy address: [ 16.151641] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.152356] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.153073] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.153337] ^ [ 16.153546] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.154200] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.154595] ================================================================== [ 16.341916] ================================================================== [ 16.342230] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.342678] Read of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.343184] [ 16.343297] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.343352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.343367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.343393] Call Trace: [ 16.343415] <TASK> [ 16.343434] dump_stack_lvl+0x73/0xb0 [ 16.343468] print_report+0xd1/0x650 [ 16.343492] ? __virt_addr_valid+0x1db/0x2d0 [ 16.343520] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.343554] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.343582] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.343615] kasan_report+0x141/0x180 [ 16.343757] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.344049] __asan_report_load8_noabort+0x18/0x20 [ 16.344083] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.344116] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.344180] ? ret_from_fork_asm+0x1a/0x30 [ 16.344208] ? kthread+0x337/0x6f0 [ 16.344239] kasan_bitops_generic+0x121/0x1c0 [ 16.344267] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.344298] ? __pfx_read_tsc+0x10/0x10 [ 16.344323] ? ktime_get_ts64+0x86/0x230 [ 16.344351] kunit_try_run_case+0x1a5/0x480 [ 16.344382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.344408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.344437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.344464] ? __kthread_parkme+0x82/0x180 [ 16.344487] ? preempt_count_sub+0x50/0x80 [ 16.344516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.344544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.344569] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.344597] kthread+0x337/0x6f0 [ 16.344644] ? trace_preempt_on+0x20/0xc0 [ 16.344685] ? __pfx_kthread+0x10/0x10 [ 16.344710] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.344735] ? calculate_sigpending+0x7b/0xa0 [ 16.344763] ? __pfx_kthread+0x10/0x10 [ 16.344873] ret_from_fork+0x116/0x1d0 [ 16.344898] ? __pfx_kthread+0x10/0x10 [ 16.344922] ret_from_fork_asm+0x1a/0x30 [ 16.344959] </TASK> [ 16.344972] [ 16.356580] Allocated by task 279: [ 16.356931] kasan_save_stack+0x45/0x70 [ 16.357195] kasan_save_track+0x18/0x40 [ 16.357440] kasan_save_alloc_info+0x3b/0x50 [ 16.357629] __kasan_kmalloc+0xb7/0xc0 [ 16.358000] __kmalloc_cache_noprof+0x189/0x420 [ 16.358323] kasan_bitops_generic+0x92/0x1c0 [ 16.358604] kunit_try_run_case+0x1a5/0x480 [ 16.359094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.359610] kthread+0x337/0x6f0 [ 16.359881] ret_from_fork+0x116/0x1d0 [ 16.360223] ret_from_fork_asm+0x1a/0x30 [ 16.360487] [ 16.360608] The buggy address belongs to the object at ffff88810267b740 [ 16.360608] which belongs to the cache kmalloc-16 of size 16 [ 16.361330] The buggy address is located 8 bytes inside of [ 16.361330] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.362069] [ 16.362191] The buggy address belongs to the physical page: [ 16.362451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.362914] flags: 0x200000000000000(node=0|zone=2) [ 16.363452] page_type: f5(slab) [ 16.363610] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.363912] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.364402] page dumped because: kasan: bad access detected [ 16.364902] [ 16.365022] Memory state around the buggy address: [ 16.365342] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.365747] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.366210] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.366633] ^ [ 16.367361] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.367734] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.368121] ================================================================== [ 16.232003] ================================================================== [ 16.232435] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.233215] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.233602] [ 16.233747] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.233803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.233819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.233847] Call Trace: [ 16.233870] <TASK> [ 16.233894] dump_stack_lvl+0x73/0xb0 [ 16.233928] print_report+0xd1/0x650 [ 16.233955] ? __virt_addr_valid+0x1db/0x2d0 [ 16.233982] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.234015] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.234243] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.234288] kasan_report+0x141/0x180 [ 16.234315] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.234354] kasan_check_range+0x10c/0x1c0 [ 16.234382] __kasan_check_write+0x18/0x20 [ 16.234406] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.234442] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.234475] ? ret_from_fork_asm+0x1a/0x30 [ 16.234501] ? kthread+0x337/0x6f0 [ 16.234531] kasan_bitops_generic+0x121/0x1c0 [ 16.234559] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.234589] ? __pfx_read_tsc+0x10/0x10 [ 16.234613] ? ktime_get_ts64+0x86/0x230 [ 16.234642] kunit_try_run_case+0x1a5/0x480 [ 16.234683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.234710] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.234928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.234957] ? __kthread_parkme+0x82/0x180 [ 16.234982] ? preempt_count_sub+0x50/0x80 [ 16.235010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.235039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.235067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.235094] kthread+0x337/0x6f0 [ 16.235117] ? trace_preempt_on+0x20/0xc0 [ 16.235144] ? __pfx_kthread+0x10/0x10 [ 16.235168] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.235193] ? calculate_sigpending+0x7b/0xa0 [ 16.235221] ? __pfx_kthread+0x10/0x10 [ 16.235247] ret_from_fork+0x116/0x1d0 [ 16.235269] ? __pfx_kthread+0x10/0x10 [ 16.235293] ret_from_fork_asm+0x1a/0x30 [ 16.235329] </TASK> [ 16.235343] [ 16.246719] Allocated by task 279: [ 16.246898] kasan_save_stack+0x45/0x70 [ 16.247146] kasan_save_track+0x18/0x40 [ 16.247377] kasan_save_alloc_info+0x3b/0x50 [ 16.247774] __kasan_kmalloc+0xb7/0xc0 [ 16.248185] __kmalloc_cache_noprof+0x189/0x420 [ 16.248385] kasan_bitops_generic+0x92/0x1c0 [ 16.248638] kunit_try_run_case+0x1a5/0x480 [ 16.248991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.249304] kthread+0x337/0x6f0 [ 16.249454] ret_from_fork+0x116/0x1d0 [ 16.249616] ret_from_fork_asm+0x1a/0x30 [ 16.250063] [ 16.250356] The buggy address belongs to the object at ffff88810267b740 [ 16.250356] which belongs to the cache kmalloc-16 of size 16 [ 16.251048] The buggy address is located 8 bytes inside of [ 16.251048] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.251609] [ 16.251769] The buggy address belongs to the physical page: [ 16.251991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.252893] flags: 0x200000000000000(node=0|zone=2) [ 16.253189] page_type: f5(slab) [ 16.253359] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.253782] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.254404] page dumped because: kasan: bad access detected [ 16.254777] [ 16.254873] Memory state around the buggy address: [ 16.255228] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.255528] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.255939] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.256340] ^ [ 16.256621] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.257098] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.257611] ================================================================== [ 16.206272] ================================================================== [ 16.206616] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.207216] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.207896] [ 16.208015] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.208072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.208088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.208116] Call Trace: [ 16.208138] <TASK> [ 16.208160] dump_stack_lvl+0x73/0xb0 [ 16.208195] print_report+0xd1/0x650 [ 16.208221] ? __virt_addr_valid+0x1db/0x2d0 [ 16.208249] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.208282] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.208308] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.208341] kasan_report+0x141/0x180 [ 16.208368] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.208407] kasan_check_range+0x10c/0x1c0 [ 16.208434] __kasan_check_write+0x18/0x20 [ 16.208458] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.208491] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.208526] ? ret_from_fork_asm+0x1a/0x30 [ 16.208552] ? kthread+0x337/0x6f0 [ 16.208582] kasan_bitops_generic+0x121/0x1c0 [ 16.208610] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.208640] ? __pfx_read_tsc+0x10/0x10 [ 16.208708] ? ktime_get_ts64+0x86/0x230 [ 16.208739] kunit_try_run_case+0x1a5/0x480 [ 16.208768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.208795] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.208823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.208850] ? __kthread_parkme+0x82/0x180 [ 16.208873] ? preempt_count_sub+0x50/0x80 [ 16.208900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.208929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.208955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.208998] kthread+0x337/0x6f0 [ 16.209021] ? trace_preempt_on+0x20/0xc0 [ 16.209048] ? __pfx_kthread+0x10/0x10 [ 16.209072] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.209098] ? calculate_sigpending+0x7b/0xa0 [ 16.209126] ? __pfx_kthread+0x10/0x10 [ 16.209152] ret_from_fork+0x116/0x1d0 [ 16.209173] ? __pfx_kthread+0x10/0x10 [ 16.209198] ret_from_fork_asm+0x1a/0x30 [ 16.209235] </TASK> [ 16.209249] [ 16.220455] Allocated by task 279: [ 16.220700] kasan_save_stack+0x45/0x70 [ 16.221104] kasan_save_track+0x18/0x40 [ 16.221291] kasan_save_alloc_info+0x3b/0x50 [ 16.221500] __kasan_kmalloc+0xb7/0xc0 [ 16.221763] __kmalloc_cache_noprof+0x189/0x420 [ 16.221983] kasan_bitops_generic+0x92/0x1c0 [ 16.222204] kunit_try_run_case+0x1a5/0x480 [ 16.222778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.223141] kthread+0x337/0x6f0 [ 16.223331] ret_from_fork+0x116/0x1d0 [ 16.223551] ret_from_fork_asm+0x1a/0x30 [ 16.223734] [ 16.223823] The buggy address belongs to the object at ffff88810267b740 [ 16.223823] which belongs to the cache kmalloc-16 of size 16 [ 16.224813] The buggy address is located 8 bytes inside of [ 16.224813] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.225427] [ 16.225621] The buggy address belongs to the physical page: [ 16.226176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.226479] flags: 0x200000000000000(node=0|zone=2) [ 16.226890] page_type: f5(slab) [ 16.227108] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.227533] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.228091] page dumped because: kasan: bad access detected [ 16.228367] [ 16.228489] Memory state around the buggy address: [ 16.228767] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.229208] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.229475] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.230198] ^ [ 16.230529] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.231064] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.231400] ================================================================== [ 16.258134] ================================================================== [ 16.258559] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.259342] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.259884] [ 16.260061] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.260121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.260138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.260165] Call Trace: [ 16.260189] <TASK> [ 16.260211] dump_stack_lvl+0x73/0xb0 [ 16.260247] print_report+0xd1/0x650 [ 16.260274] ? __virt_addr_valid+0x1db/0x2d0 [ 16.260302] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.260335] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.260363] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.260396] kasan_report+0x141/0x180 [ 16.260423] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.260462] kasan_check_range+0x10c/0x1c0 [ 16.260492] __kasan_check_write+0x18/0x20 [ 16.260515] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.260549] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.260583] ? ret_from_fork_asm+0x1a/0x30 [ 16.260609] ? kthread+0x337/0x6f0 [ 16.260639] kasan_bitops_generic+0x121/0x1c0 [ 16.260682] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.260712] ? __pfx_read_tsc+0x10/0x10 [ 16.260737] ? ktime_get_ts64+0x86/0x230 [ 16.260767] kunit_try_run_case+0x1a5/0x480 [ 16.260916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.260943] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.260971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.260999] ? __kthread_parkme+0x82/0x180 [ 16.261024] ? preempt_count_sub+0x50/0x80 [ 16.261052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.261081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.261108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.261136] kthread+0x337/0x6f0 [ 16.261159] ? trace_preempt_on+0x20/0xc0 [ 16.261188] ? __pfx_kthread+0x10/0x10 [ 16.261212] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.261237] ? calculate_sigpending+0x7b/0xa0 [ 16.261265] ? __pfx_kthread+0x10/0x10 [ 16.261291] ret_from_fork+0x116/0x1d0 [ 16.261312] ? __pfx_kthread+0x10/0x10 [ 16.261339] ret_from_fork_asm+0x1a/0x30 [ 16.261374] </TASK> [ 16.261388] [ 16.272728] Allocated by task 279: [ 16.272996] kasan_save_stack+0x45/0x70 [ 16.273388] kasan_save_track+0x18/0x40 [ 16.273591] kasan_save_alloc_info+0x3b/0x50 [ 16.273786] __kasan_kmalloc+0xb7/0xc0 [ 16.273961] __kmalloc_cache_noprof+0x189/0x420 [ 16.274224] kasan_bitops_generic+0x92/0x1c0 [ 16.274612] kunit_try_run_case+0x1a5/0x480 [ 16.275187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.275487] kthread+0x337/0x6f0 [ 16.275738] ret_from_fork+0x116/0x1d0 [ 16.275909] ret_from_fork_asm+0x1a/0x30 [ 16.276307] [ 16.276463] The buggy address belongs to the object at ffff88810267b740 [ 16.276463] which belongs to the cache kmalloc-16 of size 16 [ 16.277060] The buggy address is located 8 bytes inside of [ 16.277060] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.277583] [ 16.277754] The buggy address belongs to the physical page: [ 16.278073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.278536] flags: 0x200000000000000(node=0|zone=2) [ 16.279062] page_type: f5(slab) [ 16.279511] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.279902] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.280177] page dumped because: kasan: bad access detected [ 16.280586] [ 16.280809] Memory state around the buggy address: [ 16.281142] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.281467] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.281754] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.282005] ^ [ 16.282207] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.282470] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.283159] ================================================================== [ 16.155198] ================================================================== [ 16.155572] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.156078] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.156853] [ 16.157008] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.157065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.157081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.157107] Call Trace: [ 16.157129] <TASK> [ 16.157152] dump_stack_lvl+0x73/0xb0 [ 16.157186] print_report+0xd1/0x650 [ 16.157211] ? __virt_addr_valid+0x1db/0x2d0 [ 16.157237] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.157269] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.157295] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.157327] kasan_report+0x141/0x180 [ 16.157352] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.157389] kasan_check_range+0x10c/0x1c0 [ 16.157416] __kasan_check_write+0x18/0x20 [ 16.157440] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.157472] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.157504] ? ret_from_fork_asm+0x1a/0x30 [ 16.157530] ? kthread+0x337/0x6f0 [ 16.157559] kasan_bitops_generic+0x121/0x1c0 [ 16.157586] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.157614] ? __pfx_read_tsc+0x10/0x10 [ 16.157639] ? ktime_get_ts64+0x86/0x230 [ 16.157684] kunit_try_run_case+0x1a5/0x480 [ 16.157713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.157739] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.157767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.157793] ? __kthread_parkme+0x82/0x180 [ 16.157815] ? preempt_count_sub+0x50/0x80 [ 16.157844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.157870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.157897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.157924] kthread+0x337/0x6f0 [ 16.157946] ? trace_preempt_on+0x20/0xc0 [ 16.157973] ? __pfx_kthread+0x10/0x10 [ 16.157997] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.158022] ? calculate_sigpending+0x7b/0xa0 [ 16.158050] ? __pfx_kthread+0x10/0x10 [ 16.158075] ret_from_fork+0x116/0x1d0 [ 16.158097] ? __pfx_kthread+0x10/0x10 [ 16.158121] ret_from_fork_asm+0x1a/0x30 [ 16.158156] </TASK> [ 16.158168] [ 16.169070] Allocated by task 279: [ 16.169256] kasan_save_stack+0x45/0x70 [ 16.169491] kasan_save_track+0x18/0x40 [ 16.169672] kasan_save_alloc_info+0x3b/0x50 [ 16.170098] __kasan_kmalloc+0xb7/0xc0 [ 16.170336] __kmalloc_cache_noprof+0x189/0x420 [ 16.170610] kasan_bitops_generic+0x92/0x1c0 [ 16.170963] kunit_try_run_case+0x1a5/0x480 [ 16.171151] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.171361] kthread+0x337/0x6f0 [ 16.171559] ret_from_fork+0x116/0x1d0 [ 16.171774] ret_from_fork_asm+0x1a/0x30 [ 16.172013] [ 16.172126] The buggy address belongs to the object at ffff88810267b740 [ 16.172126] which belongs to the cache kmalloc-16 of size 16 [ 16.172772] The buggy address is located 8 bytes inside of [ 16.172772] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.173279] [ 16.173673] The buggy address belongs to the physical page: [ 16.174014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.174457] flags: 0x200000000000000(node=0|zone=2) [ 16.174977] page_type: f5(slab) [ 16.175168] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.175479] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.175845] page dumped because: kasan: bad access detected [ 16.176161] [ 16.176414] Memory state around the buggy address: [ 16.176707] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.177275] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.177614] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.177888] ^ [ 16.178100] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.178744] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.179131] ==================================================================