Date
July 2, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.669465] ================================================================== [ 13.669789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.670380] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.670701] [ 13.671414] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.671465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.671485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.671506] Call Trace: [ 13.671520] <TASK> [ 13.671535] dump_stack_lvl+0x73/0xb0 [ 13.671572] print_report+0xd1/0x650 [ 13.671594] ? __virt_addr_valid+0x1db/0x2d0 [ 13.671619] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.671648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.671677] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.671704] kasan_report+0x141/0x180 [ 13.671725] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.671758] kasan_check_range+0x10c/0x1c0 [ 13.671782] __kasan_check_write+0x18/0x20 [ 13.671801] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.671827] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.671854] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.671878] ? trace_hardirqs_on+0x37/0xe0 [ 13.671901] ? kasan_bitops_generic+0x92/0x1c0 [ 13.671927] kasan_bitops_generic+0x121/0x1c0 [ 13.671949] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.671974] ? __pfx_read_tsc+0x10/0x10 [ 13.671993] ? ktime_get_ts64+0x86/0x230 [ 13.672016] kunit_try_run_case+0x1a5/0x480 [ 13.672040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.672061] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.672083] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.672105] ? __kthread_parkme+0x82/0x180 [ 13.672125] ? preempt_count_sub+0x50/0x80 [ 13.672147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.672170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.672192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.672214] kthread+0x337/0x6f0 [ 13.672233] ? trace_preempt_on+0x20/0xc0 [ 13.672255] ? __pfx_kthread+0x10/0x10 [ 13.672275] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.672296] ? calculate_sigpending+0x7b/0xa0 [ 13.672319] ? __pfx_kthread+0x10/0x10 [ 13.672340] ret_from_fork+0x116/0x1d0 [ 13.672370] ? __pfx_kthread+0x10/0x10 [ 13.672390] ret_from_fork_asm+0x1a/0x30 [ 13.672419] </TASK> [ 13.672430] [ 13.689696] Allocated by task 280: [ 13.689923] kasan_save_stack+0x45/0x70 [ 13.690340] kasan_save_track+0x18/0x40 [ 13.690772] kasan_save_alloc_info+0x3b/0x50 [ 13.691101] __kasan_kmalloc+0xb7/0xc0 [ 13.691394] __kmalloc_cache_noprof+0x189/0x420 [ 13.691764] kasan_bitops_generic+0x92/0x1c0 [ 13.692085] kunit_try_run_case+0x1a5/0x480 [ 13.692385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.692561] kthread+0x337/0x6f0 [ 13.692741] ret_from_fork+0x116/0x1d0 [ 13.693197] ret_from_fork_asm+0x1a/0x30 [ 13.693539] [ 13.693783] The buggy address belongs to the object at ffff8881027960e0 [ 13.693783] which belongs to the cache kmalloc-16 of size 16 [ 13.694482] The buggy address is located 8 bytes inside of [ 13.694482] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.695493] [ 13.695719] The buggy address belongs to the physical page: [ 13.696298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.697075] flags: 0x200000000000000(node=0|zone=2) [ 13.697622] page_type: f5(slab) [ 13.697747] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.697976] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.698200] page dumped because: kasan: bad access detected [ 13.698379] [ 13.698447] Memory state around the buggy address: [ 13.698625] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.698838] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.699615] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.700173] ^ [ 13.700535] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.701283] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.702016] ================================================================== [ 13.818463] ================================================================== [ 13.818817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.819386] Read of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.819764] [ 13.819900] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.819943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.819965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.819984] Call Trace: [ 13.819996] <TASK> [ 13.820010] dump_stack_lvl+0x73/0xb0 [ 13.820049] print_report+0xd1/0x650 [ 13.820073] ? __virt_addr_valid+0x1db/0x2d0 [ 13.820095] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.820120] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.820151] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.820176] kasan_report+0x141/0x180 [ 13.820197] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.820239] kasan_check_range+0x10c/0x1c0 [ 13.820261] __kasan_check_read+0x15/0x20 [ 13.820279] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.820306] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.820332] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.820366] ? trace_hardirqs_on+0x37/0xe0 [ 13.820388] ? kasan_bitops_generic+0x92/0x1c0 [ 13.820422] kasan_bitops_generic+0x121/0x1c0 [ 13.820445] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.820469] ? __pfx_read_tsc+0x10/0x10 [ 13.820501] ? ktime_get_ts64+0x86/0x230 [ 13.820524] kunit_try_run_case+0x1a5/0x480 [ 13.820547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.820568] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.820591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.820612] ? __kthread_parkme+0x82/0x180 [ 13.820633] ? preempt_count_sub+0x50/0x80 [ 13.820656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.820678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.820701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.820724] kthread+0x337/0x6f0 [ 13.820743] ? trace_preempt_on+0x20/0xc0 [ 13.820764] ? __pfx_kthread+0x10/0x10 [ 13.820828] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.820852] ? calculate_sigpending+0x7b/0xa0 [ 13.820888] ? __pfx_kthread+0x10/0x10 [ 13.820910] ret_from_fork+0x116/0x1d0 [ 13.820928] ? __pfx_kthread+0x10/0x10 [ 13.820948] ret_from_fork_asm+0x1a/0x30 [ 13.820986] </TASK> [ 13.820996] [ 13.832467] Allocated by task 280: [ 13.832653] kasan_save_stack+0x45/0x70 [ 13.832833] kasan_save_track+0x18/0x40 [ 13.833008] kasan_save_alloc_info+0x3b/0x50 [ 13.833202] __kasan_kmalloc+0xb7/0xc0 [ 13.833856] __kmalloc_cache_noprof+0x189/0x420 [ 13.834278] kasan_bitops_generic+0x92/0x1c0 [ 13.834926] kunit_try_run_case+0x1a5/0x480 [ 13.835257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.835851] kthread+0x337/0x6f0 [ 13.836154] ret_from_fork+0x116/0x1d0 [ 13.836641] ret_from_fork_asm+0x1a/0x30 [ 13.836928] [ 13.837030] The buggy address belongs to the object at ffff8881027960e0 [ 13.837030] which belongs to the cache kmalloc-16 of size 16 [ 13.837520] The buggy address is located 8 bytes inside of [ 13.837520] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.837996] [ 13.838088] The buggy address belongs to the physical page: [ 13.838319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.839171] flags: 0x200000000000000(node=0|zone=2) [ 13.839549] page_type: f5(slab) [ 13.839990] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.840490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.841419] page dumped because: kasan: bad access detected [ 13.842101] [ 13.842190] Memory state around the buggy address: [ 13.842425] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.843125] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.843560] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.844041] ^ [ 13.844324] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.844922] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.845350] ================================================================== [ 13.646393] ================================================================== [ 13.646791] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.647489] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.647915] [ 13.648024] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.648081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.648093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.648113] Call Trace: [ 13.648128] <TASK> [ 13.648163] dump_stack_lvl+0x73/0xb0 [ 13.648191] print_report+0xd1/0x650 [ 13.648212] ? __virt_addr_valid+0x1db/0x2d0 [ 13.648245] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.648271] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.648292] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.648319] kasan_report+0x141/0x180 [ 13.648340] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.648390] kasan_check_range+0x10c/0x1c0 [ 13.648412] __kasan_check_write+0x18/0x20 [ 13.648431] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.648468] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.648495] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.648519] ? trace_hardirqs_on+0x37/0xe0 [ 13.648540] ? kasan_bitops_generic+0x92/0x1c0 [ 13.648575] kasan_bitops_generic+0x121/0x1c0 [ 13.648597] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.648621] ? __pfx_read_tsc+0x10/0x10 [ 13.648692] ? ktime_get_ts64+0x86/0x230 [ 13.648715] kunit_try_run_case+0x1a5/0x480 [ 13.648740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.648760] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.648783] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.648804] ? __kthread_parkme+0x82/0x180 [ 13.648825] ? preempt_count_sub+0x50/0x80 [ 13.648847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.648869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.648891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.648914] kthread+0x337/0x6f0 [ 13.648932] ? trace_preempt_on+0x20/0xc0 [ 13.648953] ? __pfx_kthread+0x10/0x10 [ 13.648973] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.648993] ? calculate_sigpending+0x7b/0xa0 [ 13.649016] ? __pfx_kthread+0x10/0x10 [ 13.649037] ret_from_fork+0x116/0x1d0 [ 13.649055] ? __pfx_kthread+0x10/0x10 [ 13.649074] ret_from_fork_asm+0x1a/0x30 [ 13.649103] </TASK> [ 13.649114] [ 13.658067] Allocated by task 280: [ 13.658270] kasan_save_stack+0x45/0x70 [ 13.658495] kasan_save_track+0x18/0x40 [ 13.658844] kasan_save_alloc_info+0x3b/0x50 [ 13.659034] __kasan_kmalloc+0xb7/0xc0 [ 13.659252] __kmalloc_cache_noprof+0x189/0x420 [ 13.659480] kasan_bitops_generic+0x92/0x1c0 [ 13.659838] kunit_try_run_case+0x1a5/0x480 [ 13.659990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.660165] kthread+0x337/0x6f0 [ 13.660312] ret_from_fork+0x116/0x1d0 [ 13.660511] ret_from_fork_asm+0x1a/0x30 [ 13.660732] [ 13.660828] The buggy address belongs to the object at ffff8881027960e0 [ 13.660828] which belongs to the cache kmalloc-16 of size 16 [ 13.661268] The buggy address is located 8 bytes inside of [ 13.661268] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.662112] [ 13.662213] The buggy address belongs to the physical page: [ 13.662660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.663319] flags: 0x200000000000000(node=0|zone=2) [ 13.663990] page_type: f5(slab) [ 13.664280] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.664865] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.665274] page dumped because: kasan: bad access detected [ 13.665531] [ 13.665867] Memory state around the buggy address: [ 13.666178] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.666561] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.667078] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.667457] ^ [ 13.667995] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.668298] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.668761] ================================================================== [ 13.754614] ================================================================== [ 13.755165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.755639] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.755995] [ 13.756120] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.756175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.756187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.756206] Call Trace: [ 13.756221] <TASK> [ 13.756237] dump_stack_lvl+0x73/0xb0 [ 13.756263] print_report+0xd1/0x650 [ 13.756296] ? __virt_addr_valid+0x1db/0x2d0 [ 13.756318] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.756344] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.756386] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.756412] kasan_report+0x141/0x180 [ 13.756433] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.756464] kasan_check_range+0x10c/0x1c0 [ 13.756486] __kasan_check_write+0x18/0x20 [ 13.756514] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.756541] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.756567] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.756601] ? trace_hardirqs_on+0x37/0xe0 [ 13.756622] ? kasan_bitops_generic+0x92/0x1c0 [ 13.756648] kasan_bitops_generic+0x121/0x1c0 [ 13.756681] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.756705] ? __pfx_read_tsc+0x10/0x10 [ 13.756725] ? ktime_get_ts64+0x86/0x230 [ 13.756792] kunit_try_run_case+0x1a5/0x480 [ 13.756818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.756840] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.756862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.756894] ? __kthread_parkme+0x82/0x180 [ 13.756914] ? preempt_count_sub+0x50/0x80 [ 13.756937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.756972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.756994] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.757016] kthread+0x337/0x6f0 [ 13.757035] ? trace_preempt_on+0x20/0xc0 [ 13.757065] ? __pfx_kthread+0x10/0x10 [ 13.757085] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.757105] ? calculate_sigpending+0x7b/0xa0 [ 13.757143] ? __pfx_kthread+0x10/0x10 [ 13.757165] ret_from_fork+0x116/0x1d0 [ 13.757184] ? __pfx_kthread+0x10/0x10 [ 13.757212] ret_from_fork_asm+0x1a/0x30 [ 13.757242] </TASK> [ 13.757254] [ 13.766465] Allocated by task 280: [ 13.766604] kasan_save_stack+0x45/0x70 [ 13.766809] kasan_save_track+0x18/0x40 [ 13.767012] kasan_save_alloc_info+0x3b/0x50 [ 13.767251] __kasan_kmalloc+0xb7/0xc0 [ 13.767478] __kmalloc_cache_noprof+0x189/0x420 [ 13.767847] kasan_bitops_generic+0x92/0x1c0 [ 13.768053] kunit_try_run_case+0x1a5/0x480 [ 13.768210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.768394] kthread+0x337/0x6f0 [ 13.768552] ret_from_fork+0x116/0x1d0 [ 13.768736] ret_from_fork_asm+0x1a/0x30 [ 13.768965] [ 13.769077] The buggy address belongs to the object at ffff8881027960e0 [ 13.769077] which belongs to the cache kmalloc-16 of size 16 [ 13.769556] The buggy address is located 8 bytes inside of [ 13.769556] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.770366] [ 13.770453] The buggy address belongs to the physical page: [ 13.770798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.771086] flags: 0x200000000000000(node=0|zone=2) [ 13.771263] page_type: f5(slab) [ 13.771454] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.772111] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.772490] page dumped because: kasan: bad access detected [ 13.772811] [ 13.772896] Memory state around the buggy address: [ 13.773053] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.773333] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.773671] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.773953] ^ [ 13.774150] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.774716] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.775040] ================================================================== [ 13.775514] ================================================================== [ 13.776049] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.776443] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.776845] [ 13.776951] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.776994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.777006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.777027] Call Trace: [ 13.777041] <TASK> [ 13.777055] dump_stack_lvl+0x73/0xb0 [ 13.777080] print_report+0xd1/0x650 [ 13.777102] ? __virt_addr_valid+0x1db/0x2d0 [ 13.777124] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.777150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.777171] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.777197] kasan_report+0x141/0x180 [ 13.777231] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.777262] kasan_check_range+0x10c/0x1c0 [ 13.777295] __kasan_check_write+0x18/0x20 [ 13.777314] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.777341] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.777378] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.777402] ? trace_hardirqs_on+0x37/0xe0 [ 13.777423] ? kasan_bitops_generic+0x92/0x1c0 [ 13.777449] kasan_bitops_generic+0x121/0x1c0 [ 13.777471] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.777495] ? __pfx_read_tsc+0x10/0x10 [ 13.777516] ? ktime_get_ts64+0x86/0x230 [ 13.777538] kunit_try_run_case+0x1a5/0x480 [ 13.777561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.777594] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.777616] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.777637] ? __kthread_parkme+0x82/0x180 [ 13.777657] ? preempt_count_sub+0x50/0x80 [ 13.777680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.777703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.777762] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.777787] kthread+0x337/0x6f0 [ 13.777820] ? trace_preempt_on+0x20/0xc0 [ 13.777841] ? __pfx_kthread+0x10/0x10 [ 13.777861] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.777881] ? calculate_sigpending+0x7b/0xa0 [ 13.777904] ? __pfx_kthread+0x10/0x10 [ 13.777924] ret_from_fork+0x116/0x1d0 [ 13.777941] ? __pfx_kthread+0x10/0x10 [ 13.777962] ret_from_fork_asm+0x1a/0x30 [ 13.777991] </TASK> [ 13.778003] [ 13.787108] Allocated by task 280: [ 13.787247] kasan_save_stack+0x45/0x70 [ 13.787479] kasan_save_track+0x18/0x40 [ 13.787678] kasan_save_alloc_info+0x3b/0x50 [ 13.787988] __kasan_kmalloc+0xb7/0xc0 [ 13.788209] __kmalloc_cache_noprof+0x189/0x420 [ 13.788429] kasan_bitops_generic+0x92/0x1c0 [ 13.788626] kunit_try_run_case+0x1a5/0x480 [ 13.789021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.789242] kthread+0x337/0x6f0 [ 13.789420] ret_from_fork+0x116/0x1d0 [ 13.789671] ret_from_fork_asm+0x1a/0x30 [ 13.789899] [ 13.790008] The buggy address belongs to the object at ffff8881027960e0 [ 13.790008] which belongs to the cache kmalloc-16 of size 16 [ 13.790508] The buggy address is located 8 bytes inside of [ 13.790508] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.791015] [ 13.791092] The buggy address belongs to the physical page: [ 13.791264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.791631] flags: 0x200000000000000(node=0|zone=2) [ 13.791899] page_type: f5(slab) [ 13.792068] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.792419] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.792734] page dumped because: kasan: bad access detected [ 13.793328] [ 13.793422] Memory state around the buggy address: [ 13.793579] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.794373] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.794622] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.794836] ^ [ 13.795140] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.795559] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.796154] ================================================================== [ 13.702679] ================================================================== [ 13.703546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.704353] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.705086] [ 13.705210] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.705253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.705266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.705286] Call Trace: [ 13.705299] <TASK> [ 13.705316] dump_stack_lvl+0x73/0xb0 [ 13.705380] print_report+0xd1/0x650 [ 13.705404] ? __virt_addr_valid+0x1db/0x2d0 [ 13.705427] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.705453] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.705473] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.705500] kasan_report+0x141/0x180 [ 13.705544] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.705596] kasan_check_range+0x10c/0x1c0 [ 13.705630] __kasan_check_write+0x18/0x20 [ 13.705649] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.705675] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.705712] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.705737] ? trace_hardirqs_on+0x37/0xe0 [ 13.705759] ? kasan_bitops_generic+0x92/0x1c0 [ 13.705785] kasan_bitops_generic+0x121/0x1c0 [ 13.705807] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.705831] ? __pfx_read_tsc+0x10/0x10 [ 13.705851] ? ktime_get_ts64+0x86/0x230 [ 13.705875] kunit_try_run_case+0x1a5/0x480 [ 13.705898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.705919] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.705943] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.705964] ? __kthread_parkme+0x82/0x180 [ 13.705984] ? preempt_count_sub+0x50/0x80 [ 13.706007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.706029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.706051] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.706072] kthread+0x337/0x6f0 [ 13.706091] ? trace_preempt_on+0x20/0xc0 [ 13.706113] ? __pfx_kthread+0x10/0x10 [ 13.706133] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.706153] ? calculate_sigpending+0x7b/0xa0 [ 13.706176] ? __pfx_kthread+0x10/0x10 [ 13.706197] ret_from_fork+0x116/0x1d0 [ 13.706215] ? __pfx_kthread+0x10/0x10 [ 13.706235] ret_from_fork_asm+0x1a/0x30 [ 13.706264] </TASK> [ 13.706275] [ 13.720440] Allocated by task 280: [ 13.720813] kasan_save_stack+0x45/0x70 [ 13.721333] kasan_save_track+0x18/0x40 [ 13.721751] kasan_save_alloc_info+0x3b/0x50 [ 13.722292] __kasan_kmalloc+0xb7/0xc0 [ 13.722594] __kmalloc_cache_noprof+0x189/0x420 [ 13.723024] kasan_bitops_generic+0x92/0x1c0 [ 13.723178] kunit_try_run_case+0x1a5/0x480 [ 13.723323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.723509] kthread+0x337/0x6f0 [ 13.723658] ret_from_fork+0x116/0x1d0 [ 13.723793] ret_from_fork_asm+0x1a/0x30 [ 13.724040] [ 13.724137] The buggy address belongs to the object at ffff8881027960e0 [ 13.724137] which belongs to the cache kmalloc-16 of size 16 [ 13.724596] The buggy address is located 8 bytes inside of [ 13.724596] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.725160] [ 13.725232] The buggy address belongs to the physical page: [ 13.725738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.726281] flags: 0x200000000000000(node=0|zone=2) [ 13.726480] page_type: f5(slab) [ 13.726604] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.726981] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.727429] page dumped because: kasan: bad access detected [ 13.727842] [ 13.727927] Memory state around the buggy address: [ 13.728169] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.728448] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.729191] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.730090] ^ [ 13.730528] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.731078] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.731652] ================================================================== [ 13.846085] ================================================================== [ 13.846415] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.847470] Read of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.848116] [ 13.848223] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.848375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.848389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.848409] Call Trace: [ 13.848425] <TASK> [ 13.848442] dump_stack_lvl+0x73/0xb0 [ 13.848469] print_report+0xd1/0x650 [ 13.848500] ? __virt_addr_valid+0x1db/0x2d0 [ 13.848523] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.848548] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.848619] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.848649] kasan_report+0x141/0x180 [ 13.848672] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.848702] __asan_report_load8_noabort+0x18/0x20 [ 13.848727] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.848755] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.848783] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.848807] ? trace_hardirqs_on+0x37/0xe0 [ 13.848829] ? kasan_bitops_generic+0x92/0x1c0 [ 13.848856] kasan_bitops_generic+0x121/0x1c0 [ 13.848878] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.848901] ? __pfx_read_tsc+0x10/0x10 [ 13.848922] ? ktime_get_ts64+0x86/0x230 [ 13.848945] kunit_try_run_case+0x1a5/0x480 [ 13.848969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.848991] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.849014] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.849036] ? __kthread_parkme+0x82/0x180 [ 13.849056] ? preempt_count_sub+0x50/0x80 [ 13.849079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.849101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.849123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.849146] kthread+0x337/0x6f0 [ 13.849164] ? trace_preempt_on+0x20/0xc0 [ 13.849185] ? __pfx_kthread+0x10/0x10 [ 13.849206] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.849226] ? calculate_sigpending+0x7b/0xa0 [ 13.849249] ? __pfx_kthread+0x10/0x10 [ 13.849270] ret_from_fork+0x116/0x1d0 [ 13.849286] ? __pfx_kthread+0x10/0x10 [ 13.849306] ret_from_fork_asm+0x1a/0x30 [ 13.849336] </TASK> [ 13.849346] [ 13.858742] Allocated by task 280: [ 13.859008] kasan_save_stack+0x45/0x70 [ 13.859200] kasan_save_track+0x18/0x40 [ 13.859400] kasan_save_alloc_info+0x3b/0x50 [ 13.859586] __kasan_kmalloc+0xb7/0xc0 [ 13.860261] __kmalloc_cache_noprof+0x189/0x420 [ 13.860471] kasan_bitops_generic+0x92/0x1c0 [ 13.860912] kunit_try_run_case+0x1a5/0x480 [ 13.861251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.861598] kthread+0x337/0x6f0 [ 13.861882] ret_from_fork+0x116/0x1d0 [ 13.862119] ret_from_fork_asm+0x1a/0x30 [ 13.862311] [ 13.862404] The buggy address belongs to the object at ffff8881027960e0 [ 13.862404] which belongs to the cache kmalloc-16 of size 16 [ 13.863094] The buggy address is located 8 bytes inside of [ 13.863094] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.863596] [ 13.863708] The buggy address belongs to the physical page: [ 13.864256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.864885] flags: 0x200000000000000(node=0|zone=2) [ 13.865124] page_type: f5(slab) [ 13.865439] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.865852] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.866155] page dumped because: kasan: bad access detected [ 13.866400] [ 13.866472] Memory state around the buggy address: [ 13.866683] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.867284] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.867572] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.868179] ^ [ 13.868425] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.868985] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.869461] ================================================================== [ 13.732449] ================================================================== [ 13.733094] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.733536] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.734097] [ 13.734395] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.734443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.734454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.734474] Call Trace: [ 13.734490] <TASK> [ 13.734506] dump_stack_lvl+0x73/0xb0 [ 13.734533] print_report+0xd1/0x650 [ 13.734667] ? __virt_addr_valid+0x1db/0x2d0 [ 13.734694] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.734720] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.734742] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.734768] kasan_report+0x141/0x180 [ 13.734790] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.734820] kasan_check_range+0x10c/0x1c0 [ 13.734843] __kasan_check_write+0x18/0x20 [ 13.734861] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.734887] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.734915] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.734939] ? trace_hardirqs_on+0x37/0xe0 [ 13.734961] ? kasan_bitops_generic+0x92/0x1c0 [ 13.734988] kasan_bitops_generic+0x121/0x1c0 [ 13.735011] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.735035] ? __pfx_read_tsc+0x10/0x10 [ 13.735055] ? ktime_get_ts64+0x86/0x230 [ 13.735078] kunit_try_run_case+0x1a5/0x480 [ 13.735102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.735123] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.735146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.735168] ? __kthread_parkme+0x82/0x180 [ 13.735187] ? preempt_count_sub+0x50/0x80 [ 13.735211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.735233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.735255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.735277] kthread+0x337/0x6f0 [ 13.735295] ? trace_preempt_on+0x20/0xc0 [ 13.735316] ? __pfx_kthread+0x10/0x10 [ 13.735336] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.735367] ? calculate_sigpending+0x7b/0xa0 [ 13.735389] ? __pfx_kthread+0x10/0x10 [ 13.735409] ret_from_fork+0x116/0x1d0 [ 13.735427] ? __pfx_kthread+0x10/0x10 [ 13.735447] ret_from_fork_asm+0x1a/0x30 [ 13.735476] </TASK> [ 13.735487] [ 13.745395] Allocated by task 280: [ 13.745552] kasan_save_stack+0x45/0x70 [ 13.745807] kasan_save_track+0x18/0x40 [ 13.746041] kasan_save_alloc_info+0x3b/0x50 [ 13.746263] __kasan_kmalloc+0xb7/0xc0 [ 13.746425] __kmalloc_cache_noprof+0x189/0x420 [ 13.746795] kasan_bitops_generic+0x92/0x1c0 [ 13.746990] kunit_try_run_case+0x1a5/0x480 [ 13.747185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.747387] kthread+0x337/0x6f0 [ 13.747575] ret_from_fork+0x116/0x1d0 [ 13.747766] ret_from_fork_asm+0x1a/0x30 [ 13.748035] [ 13.748189] The buggy address belongs to the object at ffff8881027960e0 [ 13.748189] which belongs to the cache kmalloc-16 of size 16 [ 13.748584] The buggy address is located 8 bytes inside of [ 13.748584] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.749345] [ 13.749468] The buggy address belongs to the physical page: [ 13.749798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.750047] flags: 0x200000000000000(node=0|zone=2) [ 13.750246] page_type: f5(slab) [ 13.750449] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.750930] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.751274] page dumped because: kasan: bad access detected [ 13.751458] [ 13.751533] Memory state around the buggy address: [ 13.751762] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.752233] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.752475] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.753096] ^ [ 13.753399] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.753857] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.754106] ================================================================== [ 13.796777] ================================================================== [ 13.797293] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.797679] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.798004] [ 13.798110] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.798150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.798163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.798182] Call Trace: [ 13.798198] <TASK> [ 13.798214] dump_stack_lvl+0x73/0xb0 [ 13.798324] print_report+0xd1/0x650 [ 13.798349] ? __virt_addr_valid+0x1db/0x2d0 [ 13.798393] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.798419] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.798441] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.798479] kasan_report+0x141/0x180 [ 13.798500] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.798530] kasan_check_range+0x10c/0x1c0 [ 13.798562] __kasan_check_write+0x18/0x20 [ 13.798615] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.798656] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.798683] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.798717] ? trace_hardirqs_on+0x37/0xe0 [ 13.798739] ? kasan_bitops_generic+0x92/0x1c0 [ 13.798767] kasan_bitops_generic+0x121/0x1c0 [ 13.798790] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.798813] ? __pfx_read_tsc+0x10/0x10 [ 13.798833] ? ktime_get_ts64+0x86/0x230 [ 13.798856] kunit_try_run_case+0x1a5/0x480 [ 13.798879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.798900] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.798923] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.798944] ? __kthread_parkme+0x82/0x180 [ 13.798965] ? preempt_count_sub+0x50/0x80 [ 13.798988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.799011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.799033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.799054] kthread+0x337/0x6f0 [ 13.799073] ? trace_preempt_on+0x20/0xc0 [ 13.799095] ? __pfx_kthread+0x10/0x10 [ 13.799115] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.799135] ? calculate_sigpending+0x7b/0xa0 [ 13.799158] ? __pfx_kthread+0x10/0x10 [ 13.799179] ret_from_fork+0x116/0x1d0 [ 13.799196] ? __pfx_kthread+0x10/0x10 [ 13.799216] ret_from_fork_asm+0x1a/0x30 [ 13.799255] </TASK> [ 13.799266] [ 13.808750] Allocated by task 280: [ 13.808962] kasan_save_stack+0x45/0x70 [ 13.809154] kasan_save_track+0x18/0x40 [ 13.809294] kasan_save_alloc_info+0x3b/0x50 [ 13.809534] __kasan_kmalloc+0xb7/0xc0 [ 13.809722] __kmalloc_cache_noprof+0x189/0x420 [ 13.809972] kasan_bitops_generic+0x92/0x1c0 [ 13.810187] kunit_try_run_case+0x1a5/0x480 [ 13.810396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.810761] kthread+0x337/0x6f0 [ 13.810927] ret_from_fork+0x116/0x1d0 [ 13.811113] ret_from_fork_asm+0x1a/0x30 [ 13.811306] [ 13.811386] The buggy address belongs to the object at ffff8881027960e0 [ 13.811386] which belongs to the cache kmalloc-16 of size 16 [ 13.811739] The buggy address is located 8 bytes inside of [ 13.811739] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.812576] [ 13.812668] The buggy address belongs to the physical page: [ 13.812841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.813081] flags: 0x200000000000000(node=0|zone=2) [ 13.813244] page_type: f5(slab) [ 13.813768] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.814253] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.814773] page dumped because: kasan: bad access detected [ 13.815096] [ 13.815195] Memory state around the buggy address: [ 13.815437] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.815853] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.816079] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.816403] ^ [ 13.816816] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.817300] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.817829] ==================================================================