Date
July 5, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 16.080910] ================================================================== [ 16.081505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.082027] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279 [ 16.082492] [ 16.082664] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.082743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.082759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.082785] Call Trace: [ 16.082821] <TASK> [ 16.082841] dump_stack_lvl+0x73/0xb0 [ 16.082875] print_report+0xd1/0x650 [ 16.082901] ? __virt_addr_valid+0x1db/0x2d0 [ 16.082958] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.083019] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.083059] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.083100] kasan_report+0x141/0x180 [ 16.083135] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.083171] kasan_check_range+0x10c/0x1c0 [ 16.083210] __kasan_check_write+0x18/0x20 [ 16.083232] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.083263] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.083295] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.083323] ? trace_hardirqs_on+0x37/0xe0 [ 16.083348] ? kasan_bitops_generic+0x92/0x1c0 [ 16.083379] kasan_bitops_generic+0x121/0x1c0 [ 16.083405] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.083465] ? __pfx_read_tsc+0x10/0x10 [ 16.083489] ? ktime_get_ts64+0x86/0x230 [ 16.083518] kunit_try_run_case+0x1a5/0x480 [ 16.083557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.083583] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.083628] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.083653] ? __kthread_parkme+0x82/0x180 [ 16.083692] ? preempt_count_sub+0x50/0x80 [ 16.083735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.083761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.083815] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.083841] kthread+0x337/0x6f0 [ 16.083879] ? trace_preempt_on+0x20/0xc0 [ 16.083915] ? __pfx_kthread+0x10/0x10 [ 16.083938] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.083963] ? calculate_sigpending+0x7b/0xa0 [ 16.084003] ? __pfx_kthread+0x10/0x10 [ 16.084027] ret_from_fork+0x116/0x1d0 [ 16.084050] ? __pfx_kthread+0x10/0x10 [ 16.084073] ret_from_fork_asm+0x1a/0x30 [ 16.084116] </TASK> [ 16.084130] [ 16.094543] Allocated by task 279: [ 16.094705] kasan_save_stack+0x45/0x70 [ 16.094941] kasan_save_track+0x18/0x40 [ 16.095209] kasan_save_alloc_info+0x3b/0x50 [ 16.095582] __kasan_kmalloc+0xb7/0xc0 [ 16.095730] __kmalloc_cache_noprof+0x189/0x420 [ 16.095914] kasan_bitops_generic+0x92/0x1c0 [ 16.096395] kunit_try_run_case+0x1a5/0x480 [ 16.096684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.097030] kthread+0x337/0x6f0 [ 16.097280] ret_from_fork+0x116/0x1d0 [ 16.097480] ret_from_fork_asm+0x1a/0x30 [ 16.097637] [ 16.097718] The buggy address belongs to the object at ffff88810216f120 [ 16.097718] which belongs to the cache kmalloc-16 of size 16 [ 16.098386] The buggy address is located 8 bytes inside of [ 16.098386] allocated 9-byte region [ffff88810216f120, ffff88810216f129) [ 16.099284] [ 16.099399] The buggy address belongs to the physical page: [ 16.099651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f [ 16.099931] flags: 0x200000000000000(node=0|zone=2) [ 16.100119] page_type: f5(slab) [ 16.100256] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.100512] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.100899] page dumped because: kasan: bad access detected [ 16.101263] [ 16.101395] Memory state around the buggy address: [ 16.101739] ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 16.102398] ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.102820] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.103110] ^ [ 16.103361] ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.103714] ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.104148] ================================================================== [ 16.105412] ================================================================== [ 16.105840] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.107008] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279 [ 16.107452] [ 16.107592] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.107681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.107696] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.107735] Call Trace: [ 16.107756] <TASK> [ 16.107777] dump_stack_lvl+0x73/0xb0 [ 16.107859] print_report+0xd1/0x650 [ 16.107887] ? __virt_addr_valid+0x1db/0x2d0 [ 16.107915] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.107959] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.107984] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.108046] kasan_report+0x141/0x180 [ 16.108072] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.108131] kasan_check_range+0x10c/0x1c0 [ 16.108158] __kasan_check_write+0x18/0x20 [ 16.108193] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.108223] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.108255] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.108304] ? trace_hardirqs_on+0x37/0xe0 [ 16.108345] ? kasan_bitops_generic+0x92/0x1c0 [ 16.108388] kasan_bitops_generic+0x121/0x1c0 [ 16.108415] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.108443] ? __pfx_read_tsc+0x10/0x10 [ 16.108482] ? ktime_get_ts64+0x86/0x230 [ 16.108509] kunit_try_run_case+0x1a5/0x480 [ 16.108550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.108576] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.108603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.108630] ? __kthread_parkme+0x82/0x180 [ 16.108655] ? preempt_count_sub+0x50/0x80 [ 16.108682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.108710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.108735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.108761] kthread+0x337/0x6f0 [ 16.108784] ? trace_preempt_on+0x20/0xc0 [ 16.108819] ? __pfx_kthread+0x10/0x10 [ 16.108843] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.108867] ? calculate_sigpending+0x7b/0xa0 [ 16.108894] ? __pfx_kthread+0x10/0x10 [ 16.108919] ret_from_fork+0x116/0x1d0 [ 16.108941] ? __pfx_kthread+0x10/0x10 [ 16.108964] ret_from_fork_asm+0x1a/0x30 [ 16.109000] </TASK> [ 16.109015] [ 16.120044] Allocated by task 279: [ 16.120305] kasan_save_stack+0x45/0x70 [ 16.120562] kasan_save_track+0x18/0x40 [ 16.120804] kasan_save_alloc_info+0x3b/0x50 [ 16.121102] __kasan_kmalloc+0xb7/0xc0 [ 16.121343] __kmalloc_cache_noprof+0x189/0x420 [ 16.121641] kasan_bitops_generic+0x92/0x1c0 [ 16.121856] kunit_try_run_case+0x1a5/0x480 [ 16.122126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.122467] kthread+0x337/0x6f0 [ 16.122611] ret_from_fork+0x116/0x1d0 [ 16.122765] ret_from_fork_asm+0x1a/0x30 [ 16.123099] [ 16.123249] The buggy address belongs to the object at ffff88810216f120 [ 16.123249] which belongs to the cache kmalloc-16 of size 16 [ 16.126349] The buggy address is located 8 bytes inside of [ 16.126349] allocated 9-byte region [ffff88810216f120, ffff88810216f129) [ 16.127848] [ 16.127953] The buggy address belongs to the physical page: [ 16.128907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f [ 16.130411] flags: 0x200000000000000(node=0|zone=2) [ 16.130807] page_type: f5(slab) [ 16.130960] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.132188] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.133310] page dumped because: kasan: bad access detected [ 16.133540] [ 16.133626] Memory state around the buggy address: [ 16.134158] ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 16.134672] ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.135032] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.135377] ^ [ 16.135616] ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.136349] ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.136635] ================================================================== [ 16.137731] ================================================================== [ 16.138201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.138583] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279 [ 16.138976] [ 16.139139] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.139193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.139208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.139235] Call Trace: [ 16.139257] <TASK> [ 16.139278] dump_stack_lvl+0x73/0xb0 [ 16.139313] print_report+0xd1/0x650 [ 16.139339] ? __virt_addr_valid+0x1db/0x2d0 [ 16.139366] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.139398] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.139423] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.139453] kasan_report+0x141/0x180 [ 16.139477] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.139513] kasan_check_range+0x10c/0x1c0 [ 16.139539] __kasan_check_write+0x18/0x20 [ 16.139561] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.139591] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.139625] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.139653] ? trace_hardirqs_on+0x37/0xe0 [ 16.139678] ? kasan_bitops_generic+0x92/0x1c0 [ 16.139709] kasan_bitops_generic+0x121/0x1c0 [ 16.139735] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.139762] ? __pfx_read_tsc+0x10/0x10 [ 16.139798] ? ktime_get_ts64+0x86/0x230 [ 16.139825] kunit_try_run_case+0x1a5/0x480 [ 16.139853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.139878] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.139905] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.139931] ? __kthread_parkme+0x82/0x180 [ 16.139955] ? preempt_count_sub+0x50/0x80 [ 16.139982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.140007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.140032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.140059] kthread+0x337/0x6f0 [ 16.140104] ? trace_preempt_on+0x20/0xc0 [ 16.140129] ? __pfx_kthread+0x10/0x10 [ 16.140151] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.140175] ? calculate_sigpending+0x7b/0xa0 [ 16.140202] ? __pfx_kthread+0x10/0x10 [ 16.140225] ret_from_fork+0x116/0x1d0 [ 16.140246] ? __pfx_kthread+0x10/0x10 [ 16.140270] ret_from_fork_asm+0x1a/0x30 [ 16.140306] </TASK> [ 16.140320] [ 16.152362] Allocated by task 279: [ 16.152858] kasan_save_stack+0x45/0x70 [ 16.153348] kasan_save_track+0x18/0x40 [ 16.153571] kasan_save_alloc_info+0x3b/0x50 [ 16.153811] __kasan_kmalloc+0xb7/0xc0 [ 16.154013] __kmalloc_cache_noprof+0x189/0x420 [ 16.154662] kasan_bitops_generic+0x92/0x1c0 [ 16.154981] kunit_try_run_case+0x1a5/0x480 [ 16.155446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.155922] kthread+0x337/0x6f0 [ 16.156410] ret_from_fork+0x116/0x1d0 [ 16.156639] ret_from_fork_asm+0x1a/0x30 [ 16.156866] [ 16.156970] The buggy address belongs to the object at ffff88810216f120 [ 16.156970] which belongs to the cache kmalloc-16 of size 16 [ 16.158034] The buggy address is located 8 bytes inside of [ 16.158034] allocated 9-byte region [ffff88810216f120, ffff88810216f129) [ 16.158742] [ 16.158867] The buggy address belongs to the physical page: [ 16.159435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f [ 16.159966] flags: 0x200000000000000(node=0|zone=2) [ 16.160447] page_type: f5(slab) [ 16.160776] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.161409] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.161915] page dumped because: kasan: bad access detected [ 16.162443] [ 16.162561] Memory state around the buggy address: [ 16.162810] ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 16.163494] ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.163979] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.164666] ^ [ 16.164932] ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.165501] ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.165997] ================================================================== [ 16.200608] ================================================================== [ 16.201016] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.201586] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279 [ 16.201978] [ 16.202096] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.202149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.202163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.202189] Call Trace: [ 16.202209] <TASK> [ 16.202229] dump_stack_lvl+0x73/0xb0 [ 16.202265] print_report+0xd1/0x650 [ 16.202291] ? __virt_addr_valid+0x1db/0x2d0 [ 16.202318] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.202349] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.202375] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.202406] kasan_report+0x141/0x180 [ 16.202431] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.202466] kasan_check_range+0x10c/0x1c0 [ 16.202493] __kasan_check_write+0x18/0x20 [ 16.202516] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.202547] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.202579] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.202606] ? trace_hardirqs_on+0x37/0xe0 [ 16.202632] ? kasan_bitops_generic+0x92/0x1c0 [ 16.202663] kasan_bitops_generic+0x121/0x1c0 [ 16.202691] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.202719] ? __pfx_read_tsc+0x10/0x10 [ 16.202743] ? ktime_get_ts64+0x86/0x230 [ 16.202770] kunit_try_run_case+0x1a5/0x480 [ 16.202810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.202834] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.202862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.202888] ? __kthread_parkme+0x82/0x180 [ 16.202912] ? preempt_count_sub+0x50/0x80 [ 16.202939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.202966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.202992] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.203017] kthread+0x337/0x6f0 [ 16.203039] ? trace_preempt_on+0x20/0xc0 [ 16.203064] ? __pfx_kthread+0x10/0x10 [ 16.203101] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.203125] ? calculate_sigpending+0x7b/0xa0 [ 16.203153] ? __pfx_kthread+0x10/0x10 [ 16.203179] ret_from_fork+0x116/0x1d0 [ 16.203200] ? __pfx_kthread+0x10/0x10 [ 16.203224] ret_from_fork_asm+0x1a/0x30 [ 16.203259] </TASK> [ 16.203274] [ 16.212199] Allocated by task 279: [ 16.212419] kasan_save_stack+0x45/0x70 [ 16.212682] kasan_save_track+0x18/0x40 [ 16.212922] kasan_save_alloc_info+0x3b/0x50 [ 16.213253] __kasan_kmalloc+0xb7/0xc0 [ 16.213473] __kmalloc_cache_noprof+0x189/0x420 [ 16.213686] kasan_bitops_generic+0x92/0x1c0 [ 16.213910] kunit_try_run_case+0x1a5/0x480 [ 16.214077] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.214274] kthread+0x337/0x6f0 [ 16.214410] ret_from_fork+0x116/0x1d0 [ 16.214624] ret_from_fork_asm+0x1a/0x30 [ 16.214856] [ 16.214985] The buggy address belongs to the object at ffff88810216f120 [ 16.214985] which belongs to the cache kmalloc-16 of size 16 [ 16.215648] The buggy address is located 8 bytes inside of [ 16.215648] allocated 9-byte region [ffff88810216f120, ffff88810216f129) [ 16.216057] [ 16.216271] The buggy address belongs to the physical page: [ 16.216563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f [ 16.216994] flags: 0x200000000000000(node=0|zone=2) [ 16.217499] page_type: f5(slab) [ 16.217666] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.218030] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.218442] page dumped because: kasan: bad access detected [ 16.218699] [ 16.218799] Memory state around the buggy address: [ 16.218978] ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 16.219501] ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.219846] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.220089] ^ [ 16.220260] ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.221002] ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.221375] ================================================================== [ 16.027743] ================================================================== [ 16.028360] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.029017] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279 [ 16.029536] [ 16.029730] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.029825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.029870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.029898] Call Trace: [ 16.029919] <TASK> [ 16.029951] dump_stack_lvl+0x73/0xb0 [ 16.029989] print_report+0xd1/0x650 [ 16.030015] ? __virt_addr_valid+0x1db/0x2d0 [ 16.030041] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.030072] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.030097] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.030129] kasan_report+0x141/0x180 [ 16.030154] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.030190] kasan_check_range+0x10c/0x1c0 [ 16.030217] __kasan_check_write+0x18/0x20 [ 16.030272] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.030304] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.030348] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.030376] ? trace_hardirqs_on+0x37/0xe0 [ 16.030402] ? kasan_bitops_generic+0x92/0x1c0 [ 16.030471] kasan_bitops_generic+0x121/0x1c0 [ 16.030498] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.030527] ? __pfx_read_tsc+0x10/0x10 [ 16.030564] ? ktime_get_ts64+0x86/0x230 [ 16.030592] kunit_try_run_case+0x1a5/0x480 [ 16.030620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.030646] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.030674] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.030699] ? __kthread_parkme+0x82/0x180 [ 16.030723] ? preempt_count_sub+0x50/0x80 [ 16.030750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.030777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.030818] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.030843] kthread+0x337/0x6f0 [ 16.030866] ? trace_preempt_on+0x20/0xc0 [ 16.030891] ? __pfx_kthread+0x10/0x10 [ 16.030914] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.030937] ? calculate_sigpending+0x7b/0xa0 [ 16.030965] ? __pfx_kthread+0x10/0x10 [ 16.030990] ret_from_fork+0x116/0x1d0 [ 16.031012] ? __pfx_kthread+0x10/0x10 [ 16.031036] ret_from_fork_asm+0x1a/0x30 [ 16.031072] </TASK> [ 16.031086] [ 16.044911] Allocated by task 279: [ 16.045213] kasan_save_stack+0x45/0x70 [ 16.045672] kasan_save_track+0x18/0x40 [ 16.045901] kasan_save_alloc_info+0x3b/0x50 [ 16.046102] __kasan_kmalloc+0xb7/0xc0 [ 16.046377] __kmalloc_cache_noprof+0x189/0x420 [ 16.046689] kasan_bitops_generic+0x92/0x1c0 [ 16.046992] kunit_try_run_case+0x1a5/0x480 [ 16.047305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.047611] kthread+0x337/0x6f0 [ 16.047756] ret_from_fork+0x116/0x1d0 [ 16.048043] ret_from_fork_asm+0x1a/0x30 [ 16.048329] [ 16.048419] The buggy address belongs to the object at ffff88810216f120 [ 16.048419] which belongs to the cache kmalloc-16 of size 16 [ 16.049063] The buggy address is located 8 bytes inside of [ 16.049063] allocated 9-byte region [ffff88810216f120, ffff88810216f129) [ 16.049673] [ 16.049841] The buggy address belongs to the physical page: [ 16.050149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f [ 16.050569] flags: 0x200000000000000(node=0|zone=2) [ 16.050889] page_type: f5(slab) [ 16.051130] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.051538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.051961] page dumped because: kasan: bad access detected [ 16.052366] [ 16.052513] Memory state around the buggy address: [ 16.052805] ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 16.053180] ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.053573] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.053935] ^ [ 16.054104] ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.054367] ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.054844] ================================================================== [ 16.167614] ================================================================== [ 16.168209] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.168708] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279 [ 16.169075] [ 16.169617] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.169682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.169699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.169726] Call Trace: [ 16.169748] <TASK> [ 16.169819] dump_stack_lvl+0x73/0xb0 [ 16.169863] print_report+0xd1/0x650 [ 16.169890] ? __virt_addr_valid+0x1db/0x2d0 [ 16.169915] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.169948] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.169974] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.170008] kasan_report+0x141/0x180 [ 16.170033] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.170072] kasan_check_range+0x10c/0x1c0 [ 16.170118] __kasan_check_write+0x18/0x20 [ 16.170141] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.170172] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.170204] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.170232] ? trace_hardirqs_on+0x37/0xe0 [ 16.170257] ? kasan_bitops_generic+0x92/0x1c0 [ 16.170289] kasan_bitops_generic+0x121/0x1c0 [ 16.170316] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.170343] ? __pfx_read_tsc+0x10/0x10 [ 16.170368] ? ktime_get_ts64+0x86/0x230 [ 16.170395] kunit_try_run_case+0x1a5/0x480 [ 16.170423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.170448] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.170475] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.170502] ? __kthread_parkme+0x82/0x180 [ 16.170526] ? preempt_count_sub+0x50/0x80 [ 16.170552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.170579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.170605] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.170631] kthread+0x337/0x6f0 [ 16.170654] ? trace_preempt_on+0x20/0xc0 [ 16.170678] ? __pfx_kthread+0x10/0x10 [ 16.170701] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.170725] ? calculate_sigpending+0x7b/0xa0 [ 16.170752] ? __pfx_kthread+0x10/0x10 [ 16.170776] ret_from_fork+0x116/0x1d0 [ 16.170808] ? __pfx_kthread+0x10/0x10 [ 16.170832] ret_from_fork_asm+0x1a/0x30 [ 16.170868] </TASK> [ 16.170881] [ 16.184905] Allocated by task 279: [ 16.185364] kasan_save_stack+0x45/0x70 [ 16.185721] kasan_save_track+0x18/0x40 [ 16.186012] kasan_save_alloc_info+0x3b/0x50 [ 16.186663] __kasan_kmalloc+0xb7/0xc0 [ 16.186934] __kmalloc_cache_noprof+0x189/0x420 [ 16.187396] kasan_bitops_generic+0x92/0x1c0 [ 16.187649] kunit_try_run_case+0x1a5/0x480 [ 16.187886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.188508] kthread+0x337/0x6f0 [ 16.188762] ret_from_fork+0x116/0x1d0 [ 16.189103] ret_from_fork_asm+0x1a/0x30 [ 16.189566] [ 16.189831] The buggy address belongs to the object at ffff88810216f120 [ 16.189831] which belongs to the cache kmalloc-16 of size 16 [ 16.190671] The buggy address is located 8 bytes inside of [ 16.190671] allocated 9-byte region [ffff88810216f120, ffff88810216f129) [ 16.191548] [ 16.191823] The buggy address belongs to the physical page: [ 16.192274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f [ 16.192679] flags: 0x200000000000000(node=0|zone=2) [ 16.192944] page_type: f5(slab) [ 16.193317] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.194051] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.194563] page dumped because: kasan: bad access detected [ 16.194978] [ 16.195277] Memory state around the buggy address: [ 16.195532] ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 16.195892] ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.196657] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.197401] ^ [ 16.197731] ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.198408] ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.198932] ================================================================== [ 16.222131] ================================================================== [ 16.222544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.223586] Read of size 8 at addr ffff88810216f128 by task kunit_try_catch/279 [ 16.223994] [ 16.224141] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.224194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.224209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.224234] Call Trace: [ 16.224256] <TASK> [ 16.224275] dump_stack_lvl+0x73/0xb0 [ 16.224310] print_report+0xd1/0x650 [ 16.224336] ? __virt_addr_valid+0x1db/0x2d0 [ 16.224362] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.224393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.224419] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.224450] kasan_report+0x141/0x180 [ 16.224474] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.224511] kasan_check_range+0x10c/0x1c0 [ 16.224538] __kasan_check_read+0x15/0x20 [ 16.224559] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.224590] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.224623] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.224651] ? trace_hardirqs_on+0x37/0xe0 [ 16.224675] ? kasan_bitops_generic+0x92/0x1c0 [ 16.224706] kasan_bitops_generic+0x121/0x1c0 [ 16.224733] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.224762] ? __pfx_read_tsc+0x10/0x10 [ 16.224785] ? ktime_get_ts64+0x86/0x230 [ 16.224828] kunit_try_run_case+0x1a5/0x480 [ 16.224855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.224880] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.224908] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.224934] ? __kthread_parkme+0x82/0x180 [ 16.224956] ? preempt_count_sub+0x50/0x80 [ 16.224984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.225011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.225036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.225063] kthread+0x337/0x6f0 [ 16.225098] ? trace_preempt_on+0x20/0xc0 [ 16.225123] ? __pfx_kthread+0x10/0x10 [ 16.225147] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.225171] ? calculate_sigpending+0x7b/0xa0 [ 16.225197] ? __pfx_kthread+0x10/0x10 [ 16.225222] ret_from_fork+0x116/0x1d0 [ 16.225244] ? __pfx_kthread+0x10/0x10 [ 16.225267] ret_from_fork_asm+0x1a/0x30 [ 16.225303] </TASK> [ 16.225316] [ 16.234192] Allocated by task 279: [ 16.234769] kasan_save_stack+0x45/0x70 [ 16.234944] kasan_save_track+0x18/0x40 [ 16.235096] kasan_save_alloc_info+0x3b/0x50 [ 16.235333] __kasan_kmalloc+0xb7/0xc0 [ 16.235613] __kmalloc_cache_noprof+0x189/0x420 [ 16.235933] kasan_bitops_generic+0x92/0x1c0 [ 16.236175] kunit_try_run_case+0x1a5/0x480 [ 16.236340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.236536] kthread+0x337/0x6f0 [ 16.236671] ret_from_fork+0x116/0x1d0 [ 16.237109] ret_from_fork_asm+0x1a/0x30 [ 16.237363] [ 16.237475] The buggy address belongs to the object at ffff88810216f120 [ 16.237475] which belongs to the cache kmalloc-16 of size 16 [ 16.238052] The buggy address is located 8 bytes inside of [ 16.238052] allocated 9-byte region [ffff88810216f120, ffff88810216f129) [ 16.239798] [ 16.239902] The buggy address belongs to the physical page: [ 16.240409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f [ 16.241581] flags: 0x200000000000000(node=0|zone=2) [ 16.242225] page_type: f5(slab) [ 16.242676] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.243677] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.244354] page dumped because: kasan: bad access detected [ 16.244566] [ 16.244651] Memory state around the buggy address: [ 16.245378] ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 16.246327] ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.247296] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.248058] ^ [ 16.248727] ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.249453] ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.249706] ================================================================== [ 16.056060] ================================================================== [ 16.056754] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.057330] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279 [ 16.057730] [ 16.057899] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.057953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.057967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.057994] Call Trace: [ 16.058010] <TASK> [ 16.058029] dump_stack_lvl+0x73/0xb0 [ 16.058064] print_report+0xd1/0x650 [ 16.058108] ? __virt_addr_valid+0x1db/0x2d0 [ 16.058135] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.058166] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.058229] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.058261] kasan_report+0x141/0x180 [ 16.058299] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.058336] kasan_check_range+0x10c/0x1c0 [ 16.058384] __kasan_check_write+0x18/0x20 [ 16.058416] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.058448] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.058493] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.058522] ? trace_hardirqs_on+0x37/0xe0 [ 16.058578] ? kasan_bitops_generic+0x92/0x1c0 [ 16.058610] kasan_bitops_generic+0x121/0x1c0 [ 16.058650] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.058679] ? __pfx_read_tsc+0x10/0x10 [ 16.058703] ? ktime_get_ts64+0x86/0x230 [ 16.058731] kunit_try_run_case+0x1a5/0x480 [ 16.058759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.058784] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.058844] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.058888] ? __kthread_parkme+0x82/0x180 [ 16.058912] ? preempt_count_sub+0x50/0x80 [ 16.058952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.058979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.059018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.059045] kthread+0x337/0x6f0 [ 16.059068] ? trace_preempt_on+0x20/0xc0 [ 16.059103] ? __pfx_kthread+0x10/0x10 [ 16.059128] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.059152] ? calculate_sigpending+0x7b/0xa0 [ 16.059180] ? __pfx_kthread+0x10/0x10 [ 16.059205] ret_from_fork+0x116/0x1d0 [ 16.059227] ? __pfx_kthread+0x10/0x10 [ 16.059250] ret_from_fork_asm+0x1a/0x30 [ 16.059286] </TASK> [ 16.059300] [ 16.069843] Allocated by task 279: [ 16.070081] kasan_save_stack+0x45/0x70 [ 16.070413] kasan_save_track+0x18/0x40 [ 16.070646] kasan_save_alloc_info+0x3b/0x50 [ 16.070936] __kasan_kmalloc+0xb7/0xc0 [ 16.071245] __kmalloc_cache_noprof+0x189/0x420 [ 16.071476] kasan_bitops_generic+0x92/0x1c0 [ 16.071774] kunit_try_run_case+0x1a5/0x480 [ 16.072043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.072404] kthread+0x337/0x6f0 [ 16.072622] ret_from_fork+0x116/0x1d0 [ 16.072876] ret_from_fork_asm+0x1a/0x30 [ 16.073103] [ 16.073212] The buggy address belongs to the object at ffff88810216f120 [ 16.073212] which belongs to the cache kmalloc-16 of size 16 [ 16.073955] The buggy address is located 8 bytes inside of [ 16.073955] allocated 9-byte region [ffff88810216f120, ffff88810216f129) [ 16.074686] [ 16.074773] The buggy address belongs to the physical page: [ 16.075049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f [ 16.075474] flags: 0x200000000000000(node=0|zone=2) [ 16.075754] page_type: f5(slab) [ 16.075906] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.076403] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.076876] page dumped because: kasan: bad access detected [ 16.077290] [ 16.077378] Memory state around the buggy address: [ 16.077557] ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 16.077813] ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.078117] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.078541] ^ [ 16.078896] ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.079446] ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.080019] ================================================================== [ 16.250260] ================================================================== [ 16.251003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.252025] Read of size 8 at addr ffff88810216f128 by task kunit_try_catch/279 [ 16.252830] [ 16.252941] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.252993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.253007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.253032] Call Trace: [ 16.253052] <TASK> [ 16.253104] dump_stack_lvl+0x73/0xb0 [ 16.253139] print_report+0xd1/0x650 [ 16.253165] ? __virt_addr_valid+0x1db/0x2d0 [ 16.253216] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.253246] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.253289] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.253321] kasan_report+0x141/0x180 [ 16.253354] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.253390] __asan_report_load8_noabort+0x18/0x20 [ 16.253417] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.253448] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.253479] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.253508] ? trace_hardirqs_on+0x37/0xe0 [ 16.253533] ? kasan_bitops_generic+0x92/0x1c0 [ 16.253564] kasan_bitops_generic+0x121/0x1c0 [ 16.253591] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.253619] ? __pfx_read_tsc+0x10/0x10 [ 16.253643] ? ktime_get_ts64+0x86/0x230 [ 16.253671] kunit_try_run_case+0x1a5/0x480 [ 16.253703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.253729] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.253756] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.253782] ? __kthread_parkme+0x82/0x180 [ 16.253820] ? preempt_count_sub+0x50/0x80 [ 16.253849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.253877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.253904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.253931] kthread+0x337/0x6f0 [ 16.253954] ? trace_preempt_on+0x20/0xc0 [ 16.253979] ? __pfx_kthread+0x10/0x10 [ 16.254002] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.254026] ? calculate_sigpending+0x7b/0xa0 [ 16.254054] ? __pfx_kthread+0x10/0x10 [ 16.254101] ret_from_fork+0x116/0x1d0 [ 16.254124] ? __pfx_kthread+0x10/0x10 [ 16.254147] ret_from_fork_asm+0x1a/0x30 [ 16.254183] </TASK> [ 16.254200] [ 16.267728] Allocated by task 279: [ 16.267918] kasan_save_stack+0x45/0x70 [ 16.268437] kasan_save_track+0x18/0x40 [ 16.268689] kasan_save_alloc_info+0x3b/0x50 [ 16.268932] __kasan_kmalloc+0xb7/0xc0 [ 16.269416] __kmalloc_cache_noprof+0x189/0x420 [ 16.269934] kasan_bitops_generic+0x92/0x1c0 [ 16.270427] kunit_try_run_case+0x1a5/0x480 [ 16.270666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.270953] kthread+0x337/0x6f0 [ 16.271379] ret_from_fork+0x116/0x1d0 [ 16.271728] ret_from_fork_asm+0x1a/0x30 [ 16.272375] [ 16.272492] The buggy address belongs to the object at ffff88810216f120 [ 16.272492] which belongs to the cache kmalloc-16 of size 16 [ 16.273082] The buggy address is located 8 bytes inside of [ 16.273082] allocated 9-byte region [ffff88810216f120, ffff88810216f129) [ 16.273652] [ 16.273760] The buggy address belongs to the physical page: [ 16.274523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f [ 16.275340] flags: 0x200000000000000(node=0|zone=2) [ 16.275853] page_type: f5(slab) [ 16.276354] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.276755] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.277362] page dumped because: kasan: bad access detected [ 16.277832] [ 16.278149] Memory state around the buggy address: [ 16.278752] ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 16.279641] ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.280191] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.280552] ^ [ 16.280783] ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.281091] ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.281444] ==================================================================