Date
July 10, 2025, 11:10 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.897945] ================================================================== [ 14.898285] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.899020] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.899341] [ 14.899494] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.899537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.899548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.899568] Call Trace: [ 14.899581] <TASK> [ 14.899594] dump_stack_lvl+0x73/0xb0 [ 14.899623] print_report+0xd1/0x650 [ 14.899644] ? __virt_addr_valid+0x1db/0x2d0 [ 14.899667] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.899696] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.899720] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.899748] kasan_report+0x141/0x180 [ 14.899770] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.899804] kasan_check_range+0x10c/0x1c0 [ 14.899827] __kasan_check_write+0x18/0x20 [ 14.899846] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.899876] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.899906] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.899930] ? trace_hardirqs_on+0x37/0xe0 [ 14.899951] ? kasan_bitops_generic+0x92/0x1c0 [ 14.899979] kasan_bitops_generic+0x121/0x1c0 [ 14.900003] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.900028] ? __pfx_read_tsc+0x10/0x10 [ 14.900049] ? ktime_get_ts64+0x86/0x230 [ 14.900073] kunit_try_run_case+0x1a5/0x480 [ 14.900096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.900119] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.900142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.900171] ? __kthread_parkme+0x82/0x180 [ 14.900192] ? preempt_count_sub+0x50/0x80 [ 14.900215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.900239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.900266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.900291] kthread+0x337/0x6f0 [ 14.900309] ? trace_preempt_on+0x20/0xc0 [ 14.900332] ? __pfx_kthread+0x10/0x10 [ 14.900363] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.900384] ? calculate_sigpending+0x7b/0xa0 [ 14.900408] ? __pfx_kthread+0x10/0x10 [ 14.900430] ret_from_fork+0x116/0x1d0 [ 14.900448] ? __pfx_kthread+0x10/0x10 [ 14.900469] ret_from_fork_asm+0x1a/0x30 [ 14.900499] </TASK> [ 14.900509] [ 14.909774] Allocated by task 279: [ 14.909971] kasan_save_stack+0x45/0x70 [ 14.910190] kasan_save_track+0x18/0x40 [ 14.910423] kasan_save_alloc_info+0x3b/0x50 [ 14.910648] __kasan_kmalloc+0xb7/0xc0 [ 14.910801] __kmalloc_cache_noprof+0x189/0x420 [ 14.910950] kasan_bitops_generic+0x92/0x1c0 [ 14.911094] kunit_try_run_case+0x1a5/0x480 [ 14.911235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.911502] kthread+0x337/0x6f0 [ 14.911687] ret_from_fork+0x116/0x1d0 [ 14.911873] ret_from_fork_asm+0x1a/0x30 [ 14.912090] [ 14.912213] The buggy address belongs to the object at ffff888102749de0 [ 14.912213] which belongs to the cache kmalloc-16 of size 16 [ 14.913003] The buggy address is located 8 bytes inside of [ 14.913003] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.913505] [ 14.913604] The buggy address belongs to the physical page: [ 14.913823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.914085] flags: 0x200000000000000(node=0|zone=2) [ 14.914328] page_type: f5(slab) [ 14.914620] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.914941] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.915252] page dumped because: kasan: bad access detected [ 14.915524] [ 14.915634] Memory state around the buggy address: [ 14.915790] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.916065] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.916411] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.916645] ^ [ 14.916957] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.917218] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.917609] ================================================================== [ 14.978657] ================================================================== [ 14.979024] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.979551] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.979905] [ 14.980068] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.980149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.980161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.980211] Call Trace: [ 14.980240] <TASK> [ 14.980254] dump_stack_lvl+0x73/0xb0 [ 14.980296] print_report+0xd1/0x650 [ 14.980318] ? __virt_addr_valid+0x1db/0x2d0 [ 14.980341] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.980381] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.980423] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.980453] kasan_report+0x141/0x180 [ 14.980475] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.980509] kasan_check_range+0x10c/0x1c0 [ 14.980532] __kasan_check_write+0x18/0x20 [ 14.980552] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.980580] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.980611] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.980635] ? trace_hardirqs_on+0x37/0xe0 [ 14.980657] ? kasan_bitops_generic+0x92/0x1c0 [ 14.980713] kasan_bitops_generic+0x121/0x1c0 [ 14.980737] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.980775] ? __pfx_read_tsc+0x10/0x10 [ 14.980797] ? ktime_get_ts64+0x86/0x230 [ 14.980821] kunit_try_run_case+0x1a5/0x480 [ 14.980844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.980868] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.980892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.980916] ? __kthread_parkme+0x82/0x180 [ 14.980936] ? preempt_count_sub+0x50/0x80 [ 14.980961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.981014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.981038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.981063] kthread+0x337/0x6f0 [ 14.981093] ? trace_preempt_on+0x20/0xc0 [ 14.981115] ? __pfx_kthread+0x10/0x10 [ 14.981161] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.981183] ? calculate_sigpending+0x7b/0xa0 [ 14.981207] ? __pfx_kthread+0x10/0x10 [ 14.981239] ret_from_fork+0x116/0x1d0 [ 14.981257] ? __pfx_kthread+0x10/0x10 [ 14.981303] ret_from_fork_asm+0x1a/0x30 [ 14.981334] </TASK> [ 14.981343] [ 14.990538] Allocated by task 279: [ 14.990726] kasan_save_stack+0x45/0x70 [ 14.990925] kasan_save_track+0x18/0x40 [ 14.991117] kasan_save_alloc_info+0x3b/0x50 [ 14.991322] __kasan_kmalloc+0xb7/0xc0 [ 14.991465] __kmalloc_cache_noprof+0x189/0x420 [ 14.991847] kasan_bitops_generic+0x92/0x1c0 [ 14.992080] kunit_try_run_case+0x1a5/0x480 [ 14.992332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.992733] kthread+0x337/0x6f0 [ 14.992924] ret_from_fork+0x116/0x1d0 [ 14.993059] ret_from_fork_asm+0x1a/0x30 [ 14.993253] [ 14.993346] The buggy address belongs to the object at ffff888102749de0 [ 14.993346] which belongs to the cache kmalloc-16 of size 16 [ 14.993973] The buggy address is located 8 bytes inside of [ 14.993973] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.994973] [ 14.995108] The buggy address belongs to the physical page: [ 14.995433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.996610] flags: 0x200000000000000(node=0|zone=2) [ 14.997202] page_type: f5(slab) [ 14.997342] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.998746] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.999529] page dumped because: kasan: bad access detected [ 15.000086] [ 15.000174] Memory state around the buggy address: [ 15.000334] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.000713] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.000930] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 15.001146] ^ [ 15.001692] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.001910] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.002117] ================================================================== [ 15.024461] ================================================================== [ 15.024775] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.025134] Read of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 15.025460] [ 15.025570] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.025609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.025621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.025640] Call Trace: [ 15.025653] <TASK> [ 15.025665] dump_stack_lvl+0x73/0xb0 [ 15.025693] print_report+0xd1/0x650 [ 15.025714] ? __virt_addr_valid+0x1db/0x2d0 [ 15.025736] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.025765] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.025788] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.025817] kasan_report+0x141/0x180 [ 15.025839] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.025873] kasan_check_range+0x10c/0x1c0 [ 15.025897] __kasan_check_read+0x15/0x20 [ 15.025916] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.025945] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.025976] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.025999] ? trace_hardirqs_on+0x37/0xe0 [ 15.026021] ? kasan_bitops_generic+0x92/0x1c0 [ 15.026048] kasan_bitops_generic+0x121/0x1c0 [ 15.026071] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.026097] ? __pfx_read_tsc+0x10/0x10 [ 15.026117] ? ktime_get_ts64+0x86/0x230 [ 15.026140] kunit_try_run_case+0x1a5/0x480 [ 15.026163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.026187] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.026210] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.026234] ? __kthread_parkme+0x82/0x180 [ 15.026253] ? preempt_count_sub+0x50/0x80 [ 15.026277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.026302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.026326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.026361] kthread+0x337/0x6f0 [ 15.026381] ? trace_preempt_on+0x20/0xc0 [ 15.026422] ? __pfx_kthread+0x10/0x10 [ 15.026445] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.026468] ? calculate_sigpending+0x7b/0xa0 [ 15.026492] ? __pfx_kthread+0x10/0x10 [ 15.026514] ret_from_fork+0x116/0x1d0 [ 15.026532] ? __pfx_kthread+0x10/0x10 [ 15.026553] ret_from_fork_asm+0x1a/0x30 [ 15.026584] </TASK> [ 15.026593] [ 15.034377] Allocated by task 279: [ 15.034573] kasan_save_stack+0x45/0x70 [ 15.034752] kasan_save_track+0x18/0x40 [ 15.034931] kasan_save_alloc_info+0x3b/0x50 [ 15.035096] __kasan_kmalloc+0xb7/0xc0 [ 15.035285] __kmalloc_cache_noprof+0x189/0x420 [ 15.035519] kasan_bitops_generic+0x92/0x1c0 [ 15.035671] kunit_try_run_case+0x1a5/0x480 [ 15.035881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.036144] kthread+0x337/0x6f0 [ 15.036332] ret_from_fork+0x116/0x1d0 [ 15.036547] ret_from_fork_asm+0x1a/0x30 [ 15.036716] [ 15.036810] The buggy address belongs to the object at ffff888102749de0 [ 15.036810] which belongs to the cache kmalloc-16 of size 16 [ 15.037198] The buggy address is located 8 bytes inside of [ 15.037198] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 15.037575] [ 15.037670] The buggy address belongs to the physical page: [ 15.037921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 15.038270] flags: 0x200000000000000(node=0|zone=2) [ 15.038534] page_type: f5(slab) [ 15.038688] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.038920] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.039146] page dumped because: kasan: bad access detected [ 15.039366] [ 15.039483] Memory state around the buggy address: [ 15.039707] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.040036] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.040377] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 15.040712] ^ [ 15.041003] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.041285] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.041541] ================================================================== [ 15.003013] ================================================================== [ 15.003782] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.004711] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 15.005230] [ 15.005721] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.005771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.005791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.005812] Call Trace: [ 15.005826] <TASK> [ 15.005848] dump_stack_lvl+0x73/0xb0 [ 15.005879] print_report+0xd1/0x650 [ 15.005901] ? __virt_addr_valid+0x1db/0x2d0 [ 15.005922] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.005951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.005974] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.006004] kasan_report+0x141/0x180 [ 15.006025] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.006058] kasan_check_range+0x10c/0x1c0 [ 15.006082] __kasan_check_write+0x18/0x20 [ 15.006102] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.006131] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.006161] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.006186] ? trace_hardirqs_on+0x37/0xe0 [ 15.006207] ? kasan_bitops_generic+0x92/0x1c0 [ 15.006235] kasan_bitops_generic+0x121/0x1c0 [ 15.006259] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.006284] ? __pfx_read_tsc+0x10/0x10 [ 15.006305] ? ktime_get_ts64+0x86/0x230 [ 15.006328] kunit_try_run_case+0x1a5/0x480 [ 15.006367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.006390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.006438] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.006462] ? __kthread_parkme+0x82/0x180 [ 15.006483] ? preempt_count_sub+0x50/0x80 [ 15.006506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.006531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.006557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.006582] kthread+0x337/0x6f0 [ 15.006600] ? trace_preempt_on+0x20/0xc0 [ 15.006622] ? __pfx_kthread+0x10/0x10 [ 15.006642] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.006664] ? calculate_sigpending+0x7b/0xa0 [ 15.006688] ? __pfx_kthread+0x10/0x10 [ 15.006710] ret_from_fork+0x116/0x1d0 [ 15.006727] ? __pfx_kthread+0x10/0x10 [ 15.006747] ret_from_fork_asm+0x1a/0x30 [ 15.006778] </TASK> [ 15.006789] [ 15.014486] Allocated by task 279: [ 15.014632] kasan_save_stack+0x45/0x70 [ 15.014777] kasan_save_track+0x18/0x40 [ 15.014968] kasan_save_alloc_info+0x3b/0x50 [ 15.015180] __kasan_kmalloc+0xb7/0xc0 [ 15.015358] __kmalloc_cache_noprof+0x189/0x420 [ 15.015541] kasan_bitops_generic+0x92/0x1c0 [ 15.015757] kunit_try_run_case+0x1a5/0x480 [ 15.015964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.016229] kthread+0x337/0x6f0 [ 15.016359] ret_from_fork+0x116/0x1d0 [ 15.016516] ret_from_fork_asm+0x1a/0x30 [ 15.016657] [ 15.016726] The buggy address belongs to the object at ffff888102749de0 [ 15.016726] which belongs to the cache kmalloc-16 of size 16 [ 15.017244] The buggy address is located 8 bytes inside of [ 15.017244] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 15.017790] [ 15.017887] The buggy address belongs to the physical page: [ 15.018064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 15.018300] flags: 0x200000000000000(node=0|zone=2) [ 15.018528] page_type: f5(slab) [ 15.018697] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.019039] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.019380] page dumped because: kasan: bad access detected [ 15.019644] [ 15.019730] Memory state around the buggy address: [ 15.019929] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.020195] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.020511] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 15.020796] ^ [ 15.021063] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.021335] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.021650] ================================================================== [ 14.919152] ================================================================== [ 14.919529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.919835] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.920059] [ 14.920140] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.920187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.920199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.920217] Call Trace: [ 14.920230] <TASK> [ 14.920244] dump_stack_lvl+0x73/0xb0 [ 14.920270] print_report+0xd1/0x650 [ 14.920292] ? __virt_addr_valid+0x1db/0x2d0 [ 14.920313] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.920341] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.920375] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.920405] kasan_report+0x141/0x180 [ 14.920440] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.920473] kasan_check_range+0x10c/0x1c0 [ 14.920497] __kasan_check_write+0x18/0x20 [ 14.920541] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.920570] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.920616] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.920640] ? trace_hardirqs_on+0x37/0xe0 [ 14.920676] ? kasan_bitops_generic+0x92/0x1c0 [ 14.920717] kasan_bitops_generic+0x121/0x1c0 [ 14.920767] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.920806] ? __pfx_read_tsc+0x10/0x10 [ 14.920841] ? ktime_get_ts64+0x86/0x230 [ 14.920878] kunit_try_run_case+0x1a5/0x480 [ 14.920917] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.920940] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.920963] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.920987] ? __kthread_parkme+0x82/0x180 [ 14.921008] ? preempt_count_sub+0x50/0x80 [ 14.921031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.921055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.921079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.921105] kthread+0x337/0x6f0 [ 14.921123] ? trace_preempt_on+0x20/0xc0 [ 14.921146] ? __pfx_kthread+0x10/0x10 [ 14.921182] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.921217] ? calculate_sigpending+0x7b/0xa0 [ 14.921241] ? __pfx_kthread+0x10/0x10 [ 14.921276] ret_from_fork+0x116/0x1d0 [ 14.921307] ? __pfx_kthread+0x10/0x10 [ 14.921327] ret_from_fork_asm+0x1a/0x30 [ 14.921381] </TASK> [ 14.921392] [ 14.930204] Allocated by task 279: [ 14.930383] kasan_save_stack+0x45/0x70 [ 14.930577] kasan_save_track+0x18/0x40 [ 14.930788] kasan_save_alloc_info+0x3b/0x50 [ 14.930952] __kasan_kmalloc+0xb7/0xc0 [ 14.931086] __kmalloc_cache_noprof+0x189/0x420 [ 14.931266] kasan_bitops_generic+0x92/0x1c0 [ 14.931562] kunit_try_run_case+0x1a5/0x480 [ 14.931794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.932079] kthread+0x337/0x6f0 [ 14.932258] ret_from_fork+0x116/0x1d0 [ 14.932550] ret_from_fork_asm+0x1a/0x30 [ 14.932748] [ 14.932840] The buggy address belongs to the object at ffff888102749de0 [ 14.932840] which belongs to the cache kmalloc-16 of size 16 [ 14.933266] The buggy address is located 8 bytes inside of [ 14.933266] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.933991] [ 14.934100] The buggy address belongs to the physical page: [ 14.934306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.934764] flags: 0x200000000000000(node=0|zone=2) [ 14.934998] page_type: f5(slab) [ 14.935161] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.935452] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.935812] page dumped because: kasan: bad access detected [ 14.936007] [ 14.936099] Memory state around the buggy address: [ 14.936344] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.936704] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.936954] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.937285] ^ [ 14.937605] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.937913] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.938200] ================================================================== [ 14.958017] ================================================================== [ 14.958609] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.959023] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.959314] [ 14.959511] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.959563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.959575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.959604] Call Trace: [ 14.959620] <TASK> [ 14.959633] dump_stack_lvl+0x73/0xb0 [ 14.959660] print_report+0xd1/0x650 [ 14.959682] ? __virt_addr_valid+0x1db/0x2d0 [ 14.959704] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.959762] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.959786] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.959826] kasan_report+0x141/0x180 [ 14.959849] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.959909] kasan_check_range+0x10c/0x1c0 [ 14.959933] __kasan_check_write+0x18/0x20 [ 14.959962] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.959993] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.960048] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.960073] ? trace_hardirqs_on+0x37/0xe0 [ 14.960104] ? kasan_bitops_generic+0x92/0x1c0 [ 14.960132] kasan_bitops_generic+0x121/0x1c0 [ 14.960184] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.960209] ? __pfx_read_tsc+0x10/0x10 [ 14.960241] ? ktime_get_ts64+0x86/0x230 [ 14.960264] kunit_try_run_case+0x1a5/0x480 [ 14.960289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.960312] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.960334] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.960367] ? __kthread_parkme+0x82/0x180 [ 14.960388] ? preempt_count_sub+0x50/0x80 [ 14.960430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.960455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.960479] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.960532] kthread+0x337/0x6f0 [ 14.960552] ? trace_preempt_on+0x20/0xc0 [ 14.960575] ? __pfx_kthread+0x10/0x10 [ 14.960606] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.960628] ? calculate_sigpending+0x7b/0xa0 [ 14.960652] ? __pfx_kthread+0x10/0x10 [ 14.960699] ret_from_fork+0x116/0x1d0 [ 14.960717] ? __pfx_kthread+0x10/0x10 [ 14.960738] ret_from_fork_asm+0x1a/0x30 [ 14.960778] </TASK> [ 14.960787] [ 14.969684] Allocated by task 279: [ 14.969888] kasan_save_stack+0x45/0x70 [ 14.970111] kasan_save_track+0x18/0x40 [ 14.970332] kasan_save_alloc_info+0x3b/0x50 [ 14.970577] __kasan_kmalloc+0xb7/0xc0 [ 14.970750] __kmalloc_cache_noprof+0x189/0x420 [ 14.970934] kasan_bitops_generic+0x92/0x1c0 [ 14.971143] kunit_try_run_case+0x1a5/0x480 [ 14.971386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.971738] kthread+0x337/0x6f0 [ 14.971860] ret_from_fork+0x116/0x1d0 [ 14.972089] ret_from_fork_asm+0x1a/0x30 [ 14.972368] [ 14.972491] The buggy address belongs to the object at ffff888102749de0 [ 14.972491] which belongs to the cache kmalloc-16 of size 16 [ 14.973072] The buggy address is located 8 bytes inside of [ 14.973072] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.973712] [ 14.973810] The buggy address belongs to the physical page: [ 14.974060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.974332] flags: 0x200000000000000(node=0|zone=2) [ 14.974525] page_type: f5(slab) [ 14.974660] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.975007] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.975377] page dumped because: kasan: bad access detected [ 14.975702] [ 14.975832] Memory state around the buggy address: [ 14.976074] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.976427] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.976804] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.977107] ^ [ 14.977315] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.977704] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.978067] ================================================================== [ 14.938779] ================================================================== [ 14.939194] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.939643] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.939951] [ 14.940074] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.940117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.940135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.940155] Call Trace: [ 14.940170] <TASK> [ 14.940201] dump_stack_lvl+0x73/0xb0 [ 14.940229] print_report+0xd1/0x650 [ 14.940250] ? __virt_addr_valid+0x1db/0x2d0 [ 14.940272] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.940324] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.940358] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.940388] kasan_report+0x141/0x180 [ 14.940409] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.940467] kasan_check_range+0x10c/0x1c0 [ 14.940491] __kasan_check_write+0x18/0x20 [ 14.940511] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.940541] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.940571] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.940596] ? trace_hardirqs_on+0x37/0xe0 [ 14.940634] ? kasan_bitops_generic+0x92/0x1c0 [ 14.940676] kasan_bitops_generic+0x121/0x1c0 [ 14.940713] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.940751] ? __pfx_read_tsc+0x10/0x10 [ 14.940772] ? ktime_get_ts64+0x86/0x230 [ 14.940795] kunit_try_run_case+0x1a5/0x480 [ 14.940819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.940842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.940865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.940888] ? __kthread_parkme+0x82/0x180 [ 14.940908] ? preempt_count_sub+0x50/0x80 [ 14.940931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.940955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.940979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.941004] kthread+0x337/0x6f0 [ 14.941023] ? trace_preempt_on+0x20/0xc0 [ 14.941044] ? __pfx_kthread+0x10/0x10 [ 14.941065] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.941087] ? calculate_sigpending+0x7b/0xa0 [ 14.941110] ? __pfx_kthread+0x10/0x10 [ 14.941132] ret_from_fork+0x116/0x1d0 [ 14.941150] ? __pfx_kthread+0x10/0x10 [ 14.941170] ret_from_fork_asm+0x1a/0x30 [ 14.941201] </TASK> [ 14.941210] [ 14.949363] Allocated by task 279: [ 14.949491] kasan_save_stack+0x45/0x70 [ 14.949635] kasan_save_track+0x18/0x40 [ 14.949825] kasan_save_alloc_info+0x3b/0x50 [ 14.950037] __kasan_kmalloc+0xb7/0xc0 [ 14.950226] __kmalloc_cache_noprof+0x189/0x420 [ 14.950525] kasan_bitops_generic+0x92/0x1c0 [ 14.950740] kunit_try_run_case+0x1a5/0x480 [ 14.950948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.951230] kthread+0x337/0x6f0 [ 14.951446] ret_from_fork+0x116/0x1d0 [ 14.951629] ret_from_fork_asm+0x1a/0x30 [ 14.951768] [ 14.951839] The buggy address belongs to the object at ffff888102749de0 [ 14.951839] which belongs to the cache kmalloc-16 of size 16 [ 14.952182] The buggy address is located 8 bytes inside of [ 14.952182] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.952836] [ 14.952996] The buggy address belongs to the physical page: [ 14.953298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.953677] flags: 0x200000000000000(node=0|zone=2) [ 14.953906] page_type: f5(slab) [ 14.954066] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.954431] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.954785] page dumped because: kasan: bad access detected [ 14.955050] [ 14.955165] Memory state around the buggy address: [ 14.955423] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.955758] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.956072] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.956492] ^ [ 14.956777] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.957124] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.957484] ================================================================== [ 14.879008] ================================================================== [ 14.879443] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.880076] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.880467] [ 14.880583] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.880623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.880635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.880654] Call Trace: [ 14.880668] <TASK> [ 14.880682] dump_stack_lvl+0x73/0xb0 [ 14.880708] print_report+0xd1/0x650 [ 14.880729] ? __virt_addr_valid+0x1db/0x2d0 [ 14.880751] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.880779] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.880803] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.880831] kasan_report+0x141/0x180 [ 14.880853] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.880886] kasan_check_range+0x10c/0x1c0 [ 14.880910] __kasan_check_write+0x18/0x20 [ 14.880929] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.880958] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.880988] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.881012] ? trace_hardirqs_on+0x37/0xe0 [ 14.881034] ? kasan_bitops_generic+0x92/0x1c0 [ 14.881063] kasan_bitops_generic+0x121/0x1c0 [ 14.881086] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.881111] ? __pfx_read_tsc+0x10/0x10 [ 14.881132] ? ktime_get_ts64+0x86/0x230 [ 14.881154] kunit_try_run_case+0x1a5/0x480 [ 14.881178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.881201] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.881247] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.881271] ? __kthread_parkme+0x82/0x180 [ 14.881291] ? preempt_count_sub+0x50/0x80 [ 14.881330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.881379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.881404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.881440] kthread+0x337/0x6f0 [ 14.881459] ? trace_preempt_on+0x20/0xc0 [ 14.881481] ? __pfx_kthread+0x10/0x10 [ 14.881501] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.881523] ? calculate_sigpending+0x7b/0xa0 [ 14.881546] ? __pfx_kthread+0x10/0x10 [ 14.881568] ret_from_fork+0x116/0x1d0 [ 14.881586] ? __pfx_kthread+0x10/0x10 [ 14.881606] ret_from_fork_asm+0x1a/0x30 [ 14.881637] </TASK> [ 14.881646] [ 14.890002] Allocated by task 279: [ 14.890176] kasan_save_stack+0x45/0x70 [ 14.890393] kasan_save_track+0x18/0x40 [ 14.890607] kasan_save_alloc_info+0x3b/0x50 [ 14.890814] __kasan_kmalloc+0xb7/0xc0 [ 14.890997] __kmalloc_cache_noprof+0x189/0x420 [ 14.891220] kasan_bitops_generic+0x92/0x1c0 [ 14.891463] kunit_try_run_case+0x1a5/0x480 [ 14.891671] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.891864] kthread+0x337/0x6f0 [ 14.891986] ret_from_fork+0x116/0x1d0 [ 14.892130] ret_from_fork_asm+0x1a/0x30 [ 14.892334] [ 14.892449] The buggy address belongs to the object at ffff888102749de0 [ 14.892449] which belongs to the cache kmalloc-16 of size 16 [ 14.892966] The buggy address is located 8 bytes inside of [ 14.892966] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.893465] [ 14.893561] The buggy address belongs to the physical page: [ 14.893797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.894141] flags: 0x200000000000000(node=0|zone=2) [ 14.894393] page_type: f5(slab) [ 14.894564] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.894916] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.895210] page dumped because: kasan: bad access detected [ 14.895495] [ 14.895593] Memory state around the buggy address: [ 14.895794] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.896110] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.896445] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.896739] ^ [ 14.896970] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.897186] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.897425] ================================================================== [ 15.042186] ================================================================== [ 15.042589] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.042881] Read of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 15.043210] [ 15.043314] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.043361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.043374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.043392] Call Trace: [ 15.043424] <TASK> [ 15.043438] dump_stack_lvl+0x73/0xb0 [ 15.043464] print_report+0xd1/0x650 [ 15.043485] ? __virt_addr_valid+0x1db/0x2d0 [ 15.043509] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.043537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.043562] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.043590] kasan_report+0x141/0x180 [ 15.043612] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.043645] __asan_report_load8_noabort+0x18/0x20 [ 15.043671] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.043700] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.043731] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.043754] ? trace_hardirqs_on+0x37/0xe0 [ 15.043776] ? kasan_bitops_generic+0x92/0x1c0 [ 15.043804] kasan_bitops_generic+0x121/0x1c0 [ 15.043828] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.043854] ? __pfx_read_tsc+0x10/0x10 [ 15.043875] ? ktime_get_ts64+0x86/0x230 [ 15.043898] kunit_try_run_case+0x1a5/0x480 [ 15.043922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.043945] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.043967] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.043991] ? __kthread_parkme+0x82/0x180 [ 15.044011] ? preempt_count_sub+0x50/0x80 [ 15.044034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.044059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.044084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.044109] kthread+0x337/0x6f0 [ 15.044127] ? trace_preempt_on+0x20/0xc0 [ 15.044149] ? __pfx_kthread+0x10/0x10 [ 15.044174] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.044196] ? calculate_sigpending+0x7b/0xa0 [ 15.044220] ? __pfx_kthread+0x10/0x10 [ 15.044241] ret_from_fork+0x116/0x1d0 [ 15.044259] ? __pfx_kthread+0x10/0x10 [ 15.044280] ret_from_fork_asm+0x1a/0x30 [ 15.044310] </TASK> [ 15.044320] [ 15.055007] Allocated by task 279: [ 15.055247] kasan_save_stack+0x45/0x70 [ 15.055447] kasan_save_track+0x18/0x40 [ 15.055627] kasan_save_alloc_info+0x3b/0x50 [ 15.055844] __kasan_kmalloc+0xb7/0xc0 [ 15.056015] __kmalloc_cache_noprof+0x189/0x420 [ 15.056605] kasan_bitops_generic+0x92/0x1c0 [ 15.057084] kunit_try_run_case+0x1a5/0x480 [ 15.057592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.058056] kthread+0x337/0x6f0 [ 15.058187] ret_from_fork+0x116/0x1d0 [ 15.058319] ret_from_fork_asm+0x1a/0x30 [ 15.058942] [ 15.059201] The buggy address belongs to the object at ffff888102749de0 [ 15.059201] which belongs to the cache kmalloc-16 of size 16 [ 15.060445] The buggy address is located 8 bytes inside of [ 15.060445] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 15.060854] [ 15.060929] The buggy address belongs to the physical page: [ 15.061099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 15.061335] flags: 0x200000000000000(node=0|zone=2) [ 15.061816] page_type: f5(slab) [ 15.062109] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.062831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.063610] page dumped because: kasan: bad access detected [ 15.064186] [ 15.064449] Memory state around the buggy address: [ 15.065003] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.065563] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.065785] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 15.065998] ^ [ 15.066196] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.066547] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.067157] ==================================================================