Date
July 12, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.913537] ================================================================== [ 14.914215] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.914689] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.915344] [ 14.915573] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.915622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.915634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.915821] Call Trace: [ 14.915842] <TASK> [ 14.915857] dump_stack_lvl+0x73/0xb0 [ 14.915887] print_report+0xd1/0x650 [ 14.915909] ? __virt_addr_valid+0x1db/0x2d0 [ 14.915932] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.915961] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.915985] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.916014] kasan_report+0x141/0x180 [ 14.916035] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.916069] kasan_check_range+0x10c/0x1c0 [ 14.916093] __kasan_check_write+0x18/0x20 [ 14.916112] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.916141] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.916172] ? kasan_save_alloc_info+0x3b/0x50 [ 14.916196] ? kasan_save_stack+0x45/0x70 [ 14.916220] kasan_bitops_generic+0x121/0x1c0 [ 14.916244] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.916270] ? __pfx_read_tsc+0x10/0x10 [ 14.916290] ? ktime_get_ts64+0x86/0x230 [ 14.916314] kunit_try_run_case+0x1a5/0x480 [ 14.916337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.916360] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.916384] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.916408] ? __kthread_parkme+0x82/0x180 [ 14.916428] ? preempt_count_sub+0x50/0x80 [ 14.916451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.916476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.916500] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.916525] kthread+0x337/0x6f0 [ 14.916544] ? trace_preempt_on+0x20/0xc0 [ 14.916568] ? __pfx_kthread+0x10/0x10 [ 14.916588] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.916611] ? calculate_sigpending+0x7b/0xa0 [ 14.916634] ? __pfx_kthread+0x10/0x10 [ 14.916675] ret_from_fork+0x116/0x1d0 [ 14.916696] ? __pfx_kthread+0x10/0x10 [ 14.916717] ret_from_fork_asm+0x1a/0x30 [ 14.916759] </TASK> [ 14.916768] [ 14.929766] Allocated by task 279: [ 14.930373] kasan_save_stack+0x45/0x70 [ 14.930735] kasan_save_track+0x18/0x40 [ 14.930918] kasan_save_alloc_info+0x3b/0x50 [ 14.931319] __kasan_kmalloc+0xb7/0xc0 [ 14.931504] __kmalloc_cache_noprof+0x189/0x420 [ 14.932002] kasan_bitops_generic+0x92/0x1c0 [ 14.932220] kunit_try_run_case+0x1a5/0x480 [ 14.932501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.932992] kthread+0x337/0x6f0 [ 14.933278] ret_from_fork+0x116/0x1d0 [ 14.933556] ret_from_fork_asm+0x1a/0x30 [ 14.933970] [ 14.934162] The buggy address belongs to the object at ffff888102894300 [ 14.934162] which belongs to the cache kmalloc-16 of size 16 [ 14.935140] The buggy address is located 8 bytes inside of [ 14.935140] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.935620] [ 14.935967] The buggy address belongs to the physical page: [ 14.936218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.936531] flags: 0x200000000000000(node=0|zone=2) [ 14.937035] page_type: f5(slab) [ 14.937297] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.937900] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.938251] page dumped because: kasan: bad access detected [ 14.938575] [ 14.938856] Memory state around the buggy address: [ 14.939073] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.939471] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.940124] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.940524] ^ [ 14.940911] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.941322] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.941718] ================================================================== [ 14.857265] ================================================================== [ 14.857577] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.858075] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.859008] [ 14.859315] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.859362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.859375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.859395] Call Trace: [ 14.859413] <TASK> [ 14.859429] dump_stack_lvl+0x73/0xb0 [ 14.859461] print_report+0xd1/0x650 [ 14.859485] ? __virt_addr_valid+0x1db/0x2d0 [ 14.859508] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.859537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.859562] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.859591] kasan_report+0x141/0x180 [ 14.859613] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.859666] kasan_check_range+0x10c/0x1c0 [ 14.859691] __kasan_check_write+0x18/0x20 [ 14.859711] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.859740] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.859785] ? kasan_save_alloc_info+0x3b/0x50 [ 14.859809] ? kasan_save_stack+0x45/0x70 [ 14.859833] kasan_bitops_generic+0x121/0x1c0 [ 14.859858] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.859884] ? __pfx_read_tsc+0x10/0x10 [ 14.859905] ? ktime_get_ts64+0x86/0x230 [ 14.859930] kunit_try_run_case+0x1a5/0x480 [ 14.859954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.859977] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.860002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.860027] ? __kthread_parkme+0x82/0x180 [ 14.860047] ? preempt_count_sub+0x50/0x80 [ 14.860070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.860095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.860120] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.860144] kthread+0x337/0x6f0 [ 14.860164] ? trace_preempt_on+0x20/0xc0 [ 14.860188] ? __pfx_kthread+0x10/0x10 [ 14.860210] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.860232] ? calculate_sigpending+0x7b/0xa0 [ 14.860257] ? __pfx_kthread+0x10/0x10 [ 14.860279] ret_from_fork+0x116/0x1d0 [ 14.860297] ? __pfx_kthread+0x10/0x10 [ 14.860318] ret_from_fork_asm+0x1a/0x30 [ 14.860349] </TASK> [ 14.860360] [ 14.873483] Allocated by task 279: [ 14.873625] kasan_save_stack+0x45/0x70 [ 14.874100] kasan_save_track+0x18/0x40 [ 14.874373] kasan_save_alloc_info+0x3b/0x50 [ 14.874672] __kasan_kmalloc+0xb7/0xc0 [ 14.875046] __kmalloc_cache_noprof+0x189/0x420 [ 14.875353] kasan_bitops_generic+0x92/0x1c0 [ 14.875558] kunit_try_run_case+0x1a5/0x480 [ 14.876092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.876336] kthread+0x337/0x6f0 [ 14.876601] ret_from_fork+0x116/0x1d0 [ 14.877047] ret_from_fork_asm+0x1a/0x30 [ 14.877251] [ 14.877346] The buggy address belongs to the object at ffff888102894300 [ 14.877346] which belongs to the cache kmalloc-16 of size 16 [ 14.878282] The buggy address is located 8 bytes inside of [ 14.878282] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.879125] [ 14.879232] The buggy address belongs to the physical page: [ 14.879439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.880002] flags: 0x200000000000000(node=0|zone=2) [ 14.880334] page_type: f5(slab) [ 14.880590] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.881223] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.881732] page dumped because: kasan: bad access detected [ 14.881942] [ 14.882215] Memory state around the buggy address: [ 14.882553] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.882970] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.883278] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.883842] ^ [ 14.884145] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.884475] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.884869] ================================================================== [ 15.051178] ================================================================== [ 15.051623] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.052118] Read of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 15.052403] [ 15.052527] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.052579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.052591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.052611] Call Trace: [ 15.052704] <TASK> [ 15.052725] dump_stack_lvl+0x73/0xb0 [ 15.052767] print_report+0xd1/0x650 [ 15.052790] ? __virt_addr_valid+0x1db/0x2d0 [ 15.052813] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.052843] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.052868] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.052897] kasan_report+0x141/0x180 [ 15.052929] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.052962] __asan_report_load8_noabort+0x18/0x20 [ 15.052999] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.053037] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.053069] ? kasan_save_alloc_info+0x3b/0x50 [ 15.053103] ? kasan_save_stack+0x45/0x70 [ 15.053127] kasan_bitops_generic+0x121/0x1c0 [ 15.053150] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.053176] ? __pfx_read_tsc+0x10/0x10 [ 15.053197] ? ktime_get_ts64+0x86/0x230 [ 15.053223] kunit_try_run_case+0x1a5/0x480 [ 15.053257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.053281] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.053307] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.053342] ? __kthread_parkme+0x82/0x180 [ 15.053362] ? preempt_count_sub+0x50/0x80 [ 15.053386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.053410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.053435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.053469] kthread+0x337/0x6f0 [ 15.053488] ? trace_preempt_on+0x20/0xc0 [ 15.053512] ? __pfx_kthread+0x10/0x10 [ 15.053543] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.053565] ? calculate_sigpending+0x7b/0xa0 [ 15.053589] ? __pfx_kthread+0x10/0x10 [ 15.053610] ret_from_fork+0x116/0x1d0 [ 15.053689] ? __pfx_kthread+0x10/0x10 [ 15.053714] ret_from_fork_asm+0x1a/0x30 [ 15.053756] </TASK> [ 15.053767] [ 15.066980] Allocated by task 279: [ 15.067309] kasan_save_stack+0x45/0x70 [ 15.067696] kasan_save_track+0x18/0x40 [ 15.068182] kasan_save_alloc_info+0x3b/0x50 [ 15.068697] __kasan_kmalloc+0xb7/0xc0 [ 15.069093] __kmalloc_cache_noprof+0x189/0x420 [ 15.069280] kasan_bitops_generic+0x92/0x1c0 [ 15.069762] kunit_try_run_case+0x1a5/0x480 [ 15.070150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.070332] kthread+0x337/0x6f0 [ 15.070625] ret_from_fork+0x116/0x1d0 [ 15.071067] ret_from_fork_asm+0x1a/0x30 [ 15.071548] [ 15.071762] The buggy address belongs to the object at ffff888102894300 [ 15.071762] which belongs to the cache kmalloc-16 of size 16 [ 15.072317] The buggy address is located 8 bytes inside of [ 15.072317] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 15.072692] [ 15.072787] The buggy address belongs to the physical page: [ 15.073384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 15.073733] flags: 0x200000000000000(node=0|zone=2) [ 15.074158] page_type: f5(slab) [ 15.074353] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.074666] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.075042] page dumped because: kasan: bad access detected [ 15.075349] [ 15.075442] Memory state around the buggy address: [ 15.075667] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.076110] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.076392] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.076906] ^ [ 15.077088] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.077477] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.077920] ================================================================== [ 14.885501] ================================================================== [ 14.886230] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.886646] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.887369] [ 14.887591] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.887805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.887824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.887844] Call Trace: [ 14.887859] <TASK> [ 14.887875] dump_stack_lvl+0x73/0xb0 [ 14.887906] print_report+0xd1/0x650 [ 14.887927] ? __virt_addr_valid+0x1db/0x2d0 [ 14.887951] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.887981] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.888005] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.888035] kasan_report+0x141/0x180 [ 14.888056] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.888090] kasan_check_range+0x10c/0x1c0 [ 14.888114] __kasan_check_write+0x18/0x20 [ 14.888133] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.888162] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.888195] ? kasan_save_alloc_info+0x3b/0x50 [ 14.888218] ? kasan_save_stack+0x45/0x70 [ 14.888242] kasan_bitops_generic+0x121/0x1c0 [ 14.888265] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.888291] ? __pfx_read_tsc+0x10/0x10 [ 14.888311] ? ktime_get_ts64+0x86/0x230 [ 14.888336] kunit_try_run_case+0x1a5/0x480 [ 14.888359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.888383] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.888407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.888431] ? __kthread_parkme+0x82/0x180 [ 14.888451] ? preempt_count_sub+0x50/0x80 [ 14.888475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.888500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.888524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.888550] kthread+0x337/0x6f0 [ 14.888569] ? trace_preempt_on+0x20/0xc0 [ 14.888592] ? __pfx_kthread+0x10/0x10 [ 14.888613] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.888634] ? calculate_sigpending+0x7b/0xa0 [ 14.888722] ? __pfx_kthread+0x10/0x10 [ 14.888743] ret_from_fork+0x116/0x1d0 [ 14.888774] ? __pfx_kthread+0x10/0x10 [ 14.888794] ret_from_fork_asm+0x1a/0x30 [ 14.888825] </TASK> [ 14.888836] [ 14.901205] Allocated by task 279: [ 14.901526] kasan_save_stack+0x45/0x70 [ 14.901951] kasan_save_track+0x18/0x40 [ 14.902262] kasan_save_alloc_info+0x3b/0x50 [ 14.902482] __kasan_kmalloc+0xb7/0xc0 [ 14.903144] __kmalloc_cache_noprof+0x189/0x420 [ 14.903361] kasan_bitops_generic+0x92/0x1c0 [ 14.903645] kunit_try_run_case+0x1a5/0x480 [ 14.903979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.904235] kthread+0x337/0x6f0 [ 14.904395] ret_from_fork+0x116/0x1d0 [ 14.904533] ret_from_fork_asm+0x1a/0x30 [ 14.905118] [ 14.905218] The buggy address belongs to the object at ffff888102894300 [ 14.905218] which belongs to the cache kmalloc-16 of size 16 [ 14.906066] The buggy address is located 8 bytes inside of [ 14.906066] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.906945] [ 14.907058] The buggy address belongs to the physical page: [ 14.907263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.907868] flags: 0x200000000000000(node=0|zone=2) [ 14.908264] page_type: f5(slab) [ 14.908466] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.909138] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.909611] page dumped because: kasan: bad access detected [ 14.910002] [ 14.910107] Memory state around the buggy address: [ 14.910326] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.910595] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.911203] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.911568] ^ [ 14.912048] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.912375] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.912664] ================================================================== [ 14.970557] ================================================================== [ 14.970809] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.972350] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.972596] [ 14.972693] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.972738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.972761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.972781] Call Trace: [ 14.972796] <TASK> [ 14.973280] dump_stack_lvl+0x73/0xb0 [ 14.973321] print_report+0xd1/0x650 [ 14.973352] ? __virt_addr_valid+0x1db/0x2d0 [ 14.973375] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.973416] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.973456] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.973485] kasan_report+0x141/0x180 [ 14.973507] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.973541] kasan_check_range+0x10c/0x1c0 [ 14.973566] __kasan_check_write+0x18/0x20 [ 14.973585] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.973614] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.973655] ? kasan_save_alloc_info+0x3b/0x50 [ 14.973696] ? kasan_save_stack+0x45/0x70 [ 14.973719] kasan_bitops_generic+0x121/0x1c0 [ 14.973743] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.973778] ? __pfx_read_tsc+0x10/0x10 [ 14.973799] ? ktime_get_ts64+0x86/0x230 [ 14.973823] kunit_try_run_case+0x1a5/0x480 [ 14.973847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.973870] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.973894] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.973918] ? __kthread_parkme+0x82/0x180 [ 14.973939] ? preempt_count_sub+0x50/0x80 [ 14.973962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.973987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.974011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.974036] kthread+0x337/0x6f0 [ 14.974055] ? trace_preempt_on+0x20/0xc0 [ 14.974078] ? __pfx_kthread+0x10/0x10 [ 14.974099] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.974121] ? calculate_sigpending+0x7b/0xa0 [ 14.974145] ? __pfx_kthread+0x10/0x10 [ 14.974166] ret_from_fork+0x116/0x1d0 [ 14.974184] ? __pfx_kthread+0x10/0x10 [ 14.974205] ret_from_fork_asm+0x1a/0x30 [ 14.974234] </TASK> [ 14.974245] [ 14.983644] Allocated by task 279: [ 14.983831] kasan_save_stack+0x45/0x70 [ 14.984032] kasan_save_track+0x18/0x40 [ 14.984226] kasan_save_alloc_info+0x3b/0x50 [ 14.984425] __kasan_kmalloc+0xb7/0xc0 [ 14.984594] __kmalloc_cache_noprof+0x189/0x420 [ 14.984831] kasan_bitops_generic+0x92/0x1c0 [ 14.985029] kunit_try_run_case+0x1a5/0x480 [ 14.985175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.985350] kthread+0x337/0x6f0 [ 14.985494] ret_from_fork+0x116/0x1d0 [ 14.985694] ret_from_fork_asm+0x1a/0x30 [ 14.986124] [ 14.986244] The buggy address belongs to the object at ffff888102894300 [ 14.986244] which belongs to the cache kmalloc-16 of size 16 [ 14.986642] The buggy address is located 8 bytes inside of [ 14.986642] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.987208] [ 14.987294] The buggy address belongs to the physical page: [ 14.987524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.987917] flags: 0x200000000000000(node=0|zone=2) [ 14.988126] page_type: f5(slab) [ 14.988248] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.988528] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.989184] page dumped because: kasan: bad access detected [ 14.989448] [ 14.989545] Memory state around the buggy address: [ 14.989879] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.990190] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.990472] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.990840] ^ [ 14.990968] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.991186] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.991400] ================================================================== [ 14.992029] ================================================================== [ 14.992374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.992885] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.993114] [ 14.993197] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.993238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.993250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.993269] Call Trace: [ 14.993284] <TASK> [ 14.993298] dump_stack_lvl+0x73/0xb0 [ 14.993326] print_report+0xd1/0x650 [ 14.993349] ? __virt_addr_valid+0x1db/0x2d0 [ 14.993371] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.993401] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.993425] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.993455] kasan_report+0x141/0x180 [ 14.993478] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.993512] kasan_check_range+0x10c/0x1c0 [ 14.993535] __kasan_check_write+0x18/0x20 [ 14.993555] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.993584] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.993615] ? kasan_save_alloc_info+0x3b/0x50 [ 14.993638] ? kasan_save_stack+0x45/0x70 [ 14.993718] kasan_bitops_generic+0x121/0x1c0 [ 14.993757] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.993783] ? __pfx_read_tsc+0x10/0x10 [ 14.993803] ? ktime_get_ts64+0x86/0x230 [ 14.993827] kunit_try_run_case+0x1a5/0x480 [ 14.993851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.993873] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.993898] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.993921] ? __kthread_parkme+0x82/0x180 [ 14.993941] ? preempt_count_sub+0x50/0x80 [ 14.993965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.993989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.994014] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.994040] kthread+0x337/0x6f0 [ 14.994059] ? trace_preempt_on+0x20/0xc0 [ 14.994082] ? __pfx_kthread+0x10/0x10 [ 14.994103] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.994124] ? calculate_sigpending+0x7b/0xa0 [ 14.994147] ? __pfx_kthread+0x10/0x10 [ 14.994168] ret_from_fork+0x116/0x1d0 [ 14.994186] ? __pfx_kthread+0x10/0x10 [ 14.994207] ret_from_fork_asm+0x1a/0x30 [ 14.994236] </TASK> [ 14.994247] [ 15.002473] Allocated by task 279: [ 15.002640] kasan_save_stack+0x45/0x70 [ 15.002875] kasan_save_track+0x18/0x40 [ 15.003069] kasan_save_alloc_info+0x3b/0x50 [ 15.003285] __kasan_kmalloc+0xb7/0xc0 [ 15.003454] __kmalloc_cache_noprof+0x189/0x420 [ 15.003708] kasan_bitops_generic+0x92/0x1c0 [ 15.003917] kunit_try_run_case+0x1a5/0x480 [ 15.004086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.004344] kthread+0x337/0x6f0 [ 15.004487] ret_from_fork+0x116/0x1d0 [ 15.004719] ret_from_fork_asm+0x1a/0x30 [ 15.004994] [ 15.005080] The buggy address belongs to the object at ffff888102894300 [ 15.005080] which belongs to the cache kmalloc-16 of size 16 [ 15.005487] The buggy address is located 8 bytes inside of [ 15.005487] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 15.006052] [ 15.006121] The buggy address belongs to the physical page: [ 15.006289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 15.006529] flags: 0x200000000000000(node=0|zone=2) [ 15.006687] page_type: f5(slab) [ 15.006911] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.007254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.007586] page dumped because: kasan: bad access detected [ 15.008054] [ 15.008147] Memory state around the buggy address: [ 15.008827] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.009070] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.009285] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.009496] ^ [ 15.009714] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.010051] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.010372] ================================================================== [ 14.942227] ================================================================== [ 14.942468] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.943529] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.944098] [ 14.944412] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.944463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.944475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.944495] Call Trace: [ 14.944512] <TASK> [ 14.944528] dump_stack_lvl+0x73/0xb0 [ 14.944558] print_report+0xd1/0x650 [ 14.944582] ? __virt_addr_valid+0x1db/0x2d0 [ 14.944606] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.944635] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.944725] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.944768] kasan_report+0x141/0x180 [ 14.944792] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.944826] kasan_check_range+0x10c/0x1c0 [ 14.944849] __kasan_check_write+0x18/0x20 [ 14.944869] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.944898] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.944930] ? kasan_save_alloc_info+0x3b/0x50 [ 14.944954] ? kasan_save_stack+0x45/0x70 [ 14.944977] kasan_bitops_generic+0x121/0x1c0 [ 14.945001] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.945027] ? __pfx_read_tsc+0x10/0x10 [ 14.945048] ? ktime_get_ts64+0x86/0x230 [ 14.945074] kunit_try_run_case+0x1a5/0x480 [ 14.945098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.945122] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.945148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.945173] ? __kthread_parkme+0x82/0x180 [ 14.945192] ? preempt_count_sub+0x50/0x80 [ 14.945216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.945241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.945266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.945293] kthread+0x337/0x6f0 [ 14.945312] ? trace_preempt_on+0x20/0xc0 [ 14.945336] ? __pfx_kthread+0x10/0x10 [ 14.945357] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.945379] ? calculate_sigpending+0x7b/0xa0 [ 14.945403] ? __pfx_kthread+0x10/0x10 [ 14.945425] ret_from_fork+0x116/0x1d0 [ 14.945444] ? __pfx_kthread+0x10/0x10 [ 14.945464] ret_from_fork_asm+0x1a/0x30 [ 14.945495] </TASK> [ 14.945506] [ 14.958178] Allocated by task 279: [ 14.958364] kasan_save_stack+0x45/0x70 [ 14.958568] kasan_save_track+0x18/0x40 [ 14.959169] kasan_save_alloc_info+0x3b/0x50 [ 14.959375] __kasan_kmalloc+0xb7/0xc0 [ 14.959632] __kmalloc_cache_noprof+0x189/0x420 [ 14.960100] kasan_bitops_generic+0x92/0x1c0 [ 14.960538] kunit_try_run_case+0x1a5/0x480 [ 14.960891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.961224] kthread+0x337/0x6f0 [ 14.961389] ret_from_fork+0x116/0x1d0 [ 14.961564] ret_from_fork_asm+0x1a/0x30 [ 14.961801] [ 14.962282] The buggy address belongs to the object at ffff888102894300 [ 14.962282] which belongs to the cache kmalloc-16 of size 16 [ 14.962973] The buggy address is located 8 bytes inside of [ 14.962973] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.963780] [ 14.963889] The buggy address belongs to the physical page: [ 14.964123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.964435] flags: 0x200000000000000(node=0|zone=2) [ 14.964668] page_type: f5(slab) [ 14.965261] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.965578] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.966248] page dumped because: kasan: bad access detected [ 14.966613] [ 14.966876] Memory state around the buggy address: [ 14.967199] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.967611] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.968254] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.968623] ^ [ 14.969086] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.969515] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.970087] ================================================================== [ 15.030100] ================================================================== [ 15.030445] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.031317] Read of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 15.031726] [ 15.031839] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.031879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.031890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.031910] Call Trace: [ 15.031925] <TASK> [ 15.031940] dump_stack_lvl+0x73/0xb0 [ 15.031969] print_report+0xd1/0x650 [ 15.031991] ? __virt_addr_valid+0x1db/0x2d0 [ 15.032013] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.032043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.032066] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.032096] kasan_report+0x141/0x180 [ 15.032118] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.032152] kasan_check_range+0x10c/0x1c0 [ 15.032176] __kasan_check_read+0x15/0x20 [ 15.032195] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.032224] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.032255] ? kasan_save_alloc_info+0x3b/0x50 [ 15.032278] ? kasan_save_stack+0x45/0x70 [ 15.032301] kasan_bitops_generic+0x121/0x1c0 [ 15.032326] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.032351] ? __pfx_read_tsc+0x10/0x10 [ 15.032372] ? ktime_get_ts64+0x86/0x230 [ 15.032397] kunit_try_run_case+0x1a5/0x480 [ 15.032421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.032444] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.032468] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.032493] ? __kthread_parkme+0x82/0x180 [ 15.032513] ? preempt_count_sub+0x50/0x80 [ 15.032535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.032560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.032585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.032610] kthread+0x337/0x6f0 [ 15.032629] ? trace_preempt_on+0x20/0xc0 [ 15.032714] ? __pfx_kthread+0x10/0x10 [ 15.032735] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.032770] ? calculate_sigpending+0x7b/0xa0 [ 15.032795] ? __pfx_kthread+0x10/0x10 [ 15.032815] ret_from_fork+0x116/0x1d0 [ 15.032834] ? __pfx_kthread+0x10/0x10 [ 15.032855] ret_from_fork_asm+0x1a/0x30 [ 15.032885] </TASK> [ 15.032895] [ 15.041489] Allocated by task 279: [ 15.041710] kasan_save_stack+0x45/0x70 [ 15.041892] kasan_save_track+0x18/0x40 [ 15.042052] kasan_save_alloc_info+0x3b/0x50 [ 15.042255] __kasan_kmalloc+0xb7/0xc0 [ 15.042438] __kmalloc_cache_noprof+0x189/0x420 [ 15.042614] kasan_bitops_generic+0x92/0x1c0 [ 15.042771] kunit_try_run_case+0x1a5/0x480 [ 15.042918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.043093] kthread+0x337/0x6f0 [ 15.043213] ret_from_fork+0x116/0x1d0 [ 15.043344] ret_from_fork_asm+0x1a/0x30 [ 15.043481] [ 15.043549] The buggy address belongs to the object at ffff888102894300 [ 15.043549] which belongs to the cache kmalloc-16 of size 16 [ 15.044493] The buggy address is located 8 bytes inside of [ 15.044493] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 15.045019] [ 15.045112] The buggy address belongs to the physical page: [ 15.045320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 15.045553] flags: 0x200000000000000(node=0|zone=2) [ 15.045710] page_type: f5(slab) [ 15.047035] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.047426] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.047835] page dumped because: kasan: bad access detected [ 15.048086] [ 15.048183] Memory state around the buggy address: [ 15.048376] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.048603] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.049017] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.049327] ^ [ 15.049476] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.049857] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.050172] ================================================================== [ 15.010976] ================================================================== [ 15.011292] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.011592] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 15.012125] [ 15.012211] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.012253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.012265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.012285] Call Trace: [ 15.012298] <TASK> [ 15.012312] dump_stack_lvl+0x73/0xb0 [ 15.012341] print_report+0xd1/0x650 [ 15.012364] ? __virt_addr_valid+0x1db/0x2d0 [ 15.012388] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.012417] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.012441] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.012471] kasan_report+0x141/0x180 [ 15.012493] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.012526] kasan_check_range+0x10c/0x1c0 [ 15.012550] __kasan_check_write+0x18/0x20 [ 15.012569] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.012598] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.012630] ? kasan_save_alloc_info+0x3b/0x50 [ 15.012653] ? kasan_save_stack+0x45/0x70 [ 15.012677] kasan_bitops_generic+0x121/0x1c0 [ 15.012701] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.012726] ? __pfx_read_tsc+0x10/0x10 [ 15.012759] ? ktime_get_ts64+0x86/0x230 [ 15.012837] kunit_try_run_case+0x1a5/0x480 [ 15.012863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.012887] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.012912] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.012938] ? __kthread_parkme+0x82/0x180 [ 15.012958] ? preempt_count_sub+0x50/0x80 [ 15.012984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.013008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.013032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.013058] kthread+0x337/0x6f0 [ 15.013077] ? trace_preempt_on+0x20/0xc0 [ 15.013101] ? __pfx_kthread+0x10/0x10 [ 15.013121] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.013143] ? calculate_sigpending+0x7b/0xa0 [ 15.013166] ? __pfx_kthread+0x10/0x10 [ 15.013188] ret_from_fork+0x116/0x1d0 [ 15.013206] ? __pfx_kthread+0x10/0x10 [ 15.013227] ret_from_fork_asm+0x1a/0x30 [ 15.013257] </TASK> [ 15.013267] [ 15.021620] Allocated by task 279: [ 15.021825] kasan_save_stack+0x45/0x70 [ 15.022028] kasan_save_track+0x18/0x40 [ 15.022220] kasan_save_alloc_info+0x3b/0x50 [ 15.022435] __kasan_kmalloc+0xb7/0xc0 [ 15.022758] __kmalloc_cache_noprof+0x189/0x420 [ 15.022921] kasan_bitops_generic+0x92/0x1c0 [ 15.023096] kunit_try_run_case+0x1a5/0x480 [ 15.023308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.023571] kthread+0x337/0x6f0 [ 15.023893] ret_from_fork+0x116/0x1d0 [ 15.024062] ret_from_fork_asm+0x1a/0x30 [ 15.024225] [ 15.024295] The buggy address belongs to the object at ffff888102894300 [ 15.024295] which belongs to the cache kmalloc-16 of size 16 [ 15.024991] The buggy address is located 8 bytes inside of [ 15.024991] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 15.025487] [ 15.025573] The buggy address belongs to the physical page: [ 15.025934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 15.026305] flags: 0x200000000000000(node=0|zone=2) [ 15.026603] page_type: f5(slab) [ 15.026757] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.027226] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.027539] page dumped because: kasan: bad access detected [ 15.027834] [ 15.027938] Memory state around the buggy address: [ 15.028129] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.028411] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.028819] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.029034] ^ [ 15.029156] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.029371] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.029581] ==================================================================