Date
July 19, 2025, 11:11 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.331197] ================================================================== [ 14.331511] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.331843] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279 [ 14.332402] [ 14.332527] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.332571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.332582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.332603] Call Trace: [ 14.332620] <TASK> [ 14.332634] dump_stack_lvl+0x73/0xb0 [ 14.332662] print_report+0xd1/0x610 [ 14.332683] ? __virt_addr_valid+0x1db/0x2d0 [ 14.332704] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.332732] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.332755] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.332783] kasan_report+0x141/0x180 [ 14.332803] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.332836] kasan_check_range+0x10c/0x1c0 [ 14.332859] __kasan_check_write+0x18/0x20 [ 14.332878] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.332906] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.332934] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.332957] ? trace_hardirqs_on+0x37/0xe0 [ 14.332979] ? kasan_bitops_generic+0x92/0x1c0 [ 14.333006] kasan_bitops_generic+0x121/0x1c0 [ 14.333029] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.333053] ? __pfx_read_tsc+0x10/0x10 [ 14.333074] ? ktime_get_ts64+0x86/0x230 [ 14.333097] kunit_try_run_case+0x1a5/0x480 [ 14.333466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.333508] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.333533] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.333557] ? __kthread_parkme+0x82/0x180 [ 14.333577] ? preempt_count_sub+0x50/0x80 [ 14.333601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.333625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.333649] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.333673] kthread+0x337/0x6f0 [ 14.333691] ? trace_preempt_on+0x20/0xc0 [ 14.333713] ? __pfx_kthread+0x10/0x10 [ 14.333733] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.333754] ? calculate_sigpending+0x7b/0xa0 [ 14.333778] ? __pfx_kthread+0x10/0x10 [ 14.333798] ret_from_fork+0x116/0x1d0 [ 14.333817] ? __pfx_kthread+0x10/0x10 [ 14.333837] ret_from_fork_asm+0x1a/0x30 [ 14.333867] </TASK> [ 14.333877] [ 14.345593] Allocated by task 279: [ 14.345969] kasan_save_stack+0x45/0x70 [ 14.346325] kasan_save_track+0x18/0x40 [ 14.346670] kasan_save_alloc_info+0x3b/0x50 [ 14.346868] __kasan_kmalloc+0xb7/0xc0 [ 14.347036] __kmalloc_cache_noprof+0x189/0x420 [ 14.347457] kasan_bitops_generic+0x92/0x1c0 [ 14.347867] kunit_try_run_case+0x1a5/0x480 [ 14.348196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.348601] kthread+0x337/0x6f0 [ 14.348761] ret_from_fork+0x116/0x1d0 [ 14.348927] ret_from_fork_asm+0x1a/0x30 [ 14.349095] [ 14.349483] The buggy address belongs to the object at ffff888101642a40 [ 14.349483] which belongs to the cache kmalloc-16 of size 16 [ 14.350239] The buggy address is located 8 bytes inside of [ 14.350239] allocated 9-byte region [ffff888101642a40, ffff888101642a49) [ 14.350906] [ 14.351002] The buggy address belongs to the physical page: [ 14.351542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642 [ 14.351955] flags: 0x200000000000000(node=0|zone=2) [ 14.352323] page_type: f5(slab) [ 14.352662] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.352955] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.353435] page dumped because: kasan: bad access detected [ 14.353872] [ 14.354132] Memory state around the buggy address: [ 14.354450] ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.354755] ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.355020] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.355718] ^ [ 14.356006] ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.356607] ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.357102] ================================================================== [ 14.377584] ================================================================== [ 14.377930] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.378386] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279 [ 14.378668] [ 14.378755] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.378799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.378811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.378832] Call Trace: [ 14.378844] <TASK> [ 14.378860] dump_stack_lvl+0x73/0xb0 [ 14.378888] print_report+0xd1/0x610 [ 14.378909] ? __virt_addr_valid+0x1db/0x2d0 [ 14.378931] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.378958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.378981] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.379008] kasan_report+0x141/0x180 [ 14.379029] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.379063] kasan_check_range+0x10c/0x1c0 [ 14.379086] __kasan_check_write+0x18/0x20 [ 14.379104] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.379132] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.379161] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.379184] ? trace_hardirqs_on+0x37/0xe0 [ 14.379206] ? kasan_bitops_generic+0x92/0x1c0 [ 14.379232] kasan_bitops_generic+0x121/0x1c0 [ 14.379255] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.379279] ? __pfx_read_tsc+0x10/0x10 [ 14.379299] ? ktime_get_ts64+0x86/0x230 [ 14.379322] kunit_try_run_case+0x1a5/0x480 [ 14.379346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.379368] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.379391] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.379414] ? __kthread_parkme+0x82/0x180 [ 14.379434] ? preempt_count_sub+0x50/0x80 [ 14.379458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.379481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.379516] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.379540] kthread+0x337/0x6f0 [ 14.379559] ? trace_preempt_on+0x20/0xc0 [ 14.379580] ? __pfx_kthread+0x10/0x10 [ 14.379599] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.379620] ? calculate_sigpending+0x7b/0xa0 [ 14.379645] ? __pfx_kthread+0x10/0x10 [ 14.379665] ret_from_fork+0x116/0x1d0 [ 14.379684] ? __pfx_kthread+0x10/0x10 [ 14.379703] ret_from_fork_asm+0x1a/0x30 [ 14.379733] </TASK> [ 14.379743] [ 14.387914] Allocated by task 279: [ 14.388079] kasan_save_stack+0x45/0x70 [ 14.388343] kasan_save_track+0x18/0x40 [ 14.388542] kasan_save_alloc_info+0x3b/0x50 [ 14.388709] __kasan_kmalloc+0xb7/0xc0 [ 14.388895] __kmalloc_cache_noprof+0x189/0x420 [ 14.389090] kasan_bitops_generic+0x92/0x1c0 [ 14.389244] kunit_try_run_case+0x1a5/0x480 [ 14.389390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.389576] kthread+0x337/0x6f0 [ 14.389697] ret_from_fork+0x116/0x1d0 [ 14.389828] ret_from_fork_asm+0x1a/0x30 [ 14.389967] [ 14.390037] The buggy address belongs to the object at ffff888101642a40 [ 14.390037] which belongs to the cache kmalloc-16 of size 16 [ 14.390400] The buggy address is located 8 bytes inside of [ 14.390400] allocated 9-byte region [ffff888101642a40, ffff888101642a49) [ 14.390928] [ 14.391127] The buggy address belongs to the physical page: [ 14.391594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642 [ 14.391947] flags: 0x200000000000000(node=0|zone=2) [ 14.392175] page_type: f5(slab) [ 14.392318] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.392560] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.392788] page dumped because: kasan: bad access detected [ 14.392959] [ 14.393026] Memory state around the buggy address: [ 14.393180] ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.393397] ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.393978] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.394467] ^ [ 14.394730] ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.395045] ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.395649] ================================================================== [ 14.264962] ================================================================== [ 14.265385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.265773] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279 [ 14.266255] [ 14.266372] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.266418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.266429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.266451] Call Trace: [ 14.266471] <TASK> [ 14.266490] dump_stack_lvl+0x73/0xb0 [ 14.266534] print_report+0xd1/0x610 [ 14.266555] ? __virt_addr_valid+0x1db/0x2d0 [ 14.266578] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.266606] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.266629] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.266657] kasan_report+0x141/0x180 [ 14.266678] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.266711] kasan_check_range+0x10c/0x1c0 [ 14.266734] __kasan_check_write+0x18/0x20 [ 14.266753] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.266781] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.266810] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.266834] ? trace_hardirqs_on+0x37/0xe0 [ 14.266857] ? kasan_bitops_generic+0x92/0x1c0 [ 14.266884] kasan_bitops_generic+0x121/0x1c0 [ 14.266907] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.266932] ? __pfx_read_tsc+0x10/0x10 [ 14.266952] ? ktime_get_ts64+0x86/0x230 [ 14.266976] kunit_try_run_case+0x1a5/0x480 [ 14.267000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.267023] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.267110] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.267135] ? __kthread_parkme+0x82/0x180 [ 14.267156] ? preempt_count_sub+0x50/0x80 [ 14.267179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.267203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.267227] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.267251] kthread+0x337/0x6f0 [ 14.267270] ? trace_preempt_on+0x20/0xc0 [ 14.267291] ? __pfx_kthread+0x10/0x10 [ 14.267311] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.267332] ? calculate_sigpending+0x7b/0xa0 [ 14.267356] ? __pfx_kthread+0x10/0x10 [ 14.267376] ret_from_fork+0x116/0x1d0 [ 14.267395] ? __pfx_kthread+0x10/0x10 [ 14.267415] ret_from_fork_asm+0x1a/0x30 [ 14.267446] </TASK> [ 14.267456] [ 14.275567] Allocated by task 279: [ 14.275749] kasan_save_stack+0x45/0x70 [ 14.275953] kasan_save_track+0x18/0x40 [ 14.276142] kasan_save_alloc_info+0x3b/0x50 [ 14.276350] __kasan_kmalloc+0xb7/0xc0 [ 14.276549] __kmalloc_cache_noprof+0x189/0x420 [ 14.277164] kasan_bitops_generic+0x92/0x1c0 [ 14.277599] kunit_try_run_case+0x1a5/0x480 [ 14.277808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.278072] kthread+0x337/0x6f0 [ 14.278302] ret_from_fork+0x116/0x1d0 [ 14.278575] ret_from_fork_asm+0x1a/0x30 [ 14.278775] [ 14.278872] The buggy address belongs to the object at ffff888101642a40 [ 14.278872] which belongs to the cache kmalloc-16 of size 16 [ 14.279486] The buggy address is located 8 bytes inside of [ 14.279486] allocated 9-byte region [ffff888101642a40, ffff888101642a49) [ 14.279928] [ 14.280027] The buggy address belongs to the physical page: [ 14.280701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642 [ 14.281177] flags: 0x200000000000000(node=0|zone=2) [ 14.281352] page_type: f5(slab) [ 14.281474] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.281716] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.281936] page dumped because: kasan: bad access detected [ 14.282101] [ 14.282168] Memory state around the buggy address: [ 14.283856] ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.284525] ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.285413] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.285828] ^ [ 14.286265] ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.286693] ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.287185] ================================================================== [ 14.401443] ================================================================== [ 14.401787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.402153] Read of size 8 at addr ffff888101642a48 by task kunit_try_catch/279 [ 14.402489] [ 14.402615] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.402661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.402672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.402694] Call Trace: [ 14.402707] <TASK> [ 14.402724] dump_stack_lvl+0x73/0xb0 [ 14.402751] print_report+0xd1/0x610 [ 14.402772] ? __virt_addr_valid+0x1db/0x2d0 [ 14.402796] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.402824] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.402846] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.402874] kasan_report+0x141/0x180 [ 14.402894] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.402927] kasan_check_range+0x10c/0x1c0 [ 14.402949] __kasan_check_read+0x15/0x20 [ 14.402968] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.402995] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.403024] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.403047] ? trace_hardirqs_on+0x37/0xe0 [ 14.403069] ? kasan_bitops_generic+0x92/0x1c0 [ 14.403096] kasan_bitops_generic+0x121/0x1c0 [ 14.403118] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.403144] ? __pfx_read_tsc+0x10/0x10 [ 14.403164] ? ktime_get_ts64+0x86/0x230 [ 14.403188] kunit_try_run_case+0x1a5/0x480 [ 14.403211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.403233] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.403257] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.403291] ? __kthread_parkme+0x82/0x180 [ 14.403311] ? preempt_count_sub+0x50/0x80 [ 14.403335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.403359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.403383] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.403407] kthread+0x337/0x6f0 [ 14.403425] ? trace_preempt_on+0x20/0xc0 [ 14.403447] ? __pfx_kthread+0x10/0x10 [ 14.403467] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.403488] ? calculate_sigpending+0x7b/0xa0 [ 14.403524] ? __pfx_kthread+0x10/0x10 [ 14.403544] ret_from_fork+0x116/0x1d0 [ 14.403563] ? __pfx_kthread+0x10/0x10 [ 14.403582] ret_from_fork_asm+0x1a/0x30 [ 14.403612] </TASK> [ 14.403623] [ 14.413478] Allocated by task 279: [ 14.413737] kasan_save_stack+0x45/0x70 [ 14.414165] kasan_save_track+0x18/0x40 [ 14.414393] kasan_save_alloc_info+0x3b/0x50 [ 14.414604] __kasan_kmalloc+0xb7/0xc0 [ 14.414778] __kmalloc_cache_noprof+0x189/0x420 [ 14.414973] kasan_bitops_generic+0x92/0x1c0 [ 14.415156] kunit_try_run_case+0x1a5/0x480 [ 14.415338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.415896] kthread+0x337/0x6f0 [ 14.416216] ret_from_fork+0x116/0x1d0 [ 14.416572] ret_from_fork_asm+0x1a/0x30 [ 14.416904] [ 14.417132] The buggy address belongs to the object at ffff888101642a40 [ 14.417132] which belongs to the cache kmalloc-16 of size 16 [ 14.417901] The buggy address is located 8 bytes inside of [ 14.417901] allocated 9-byte region [ffff888101642a40, ffff888101642a49) [ 14.418880] [ 14.419112] The buggy address belongs to the physical page: [ 14.419703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642 [ 14.420142] flags: 0x200000000000000(node=0|zone=2) [ 14.420514] page_type: f5(slab) [ 14.420682] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.420987] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.421686] page dumped because: kasan: bad access detected [ 14.421986] [ 14.422228] Memory state around the buggy address: [ 14.422696] ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.423175] ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.423468] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.423709] ^ [ 14.423969] ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.424216] ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.424580] ================================================================== [ 14.288312] ================================================================== [ 14.288663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.289431] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279 [ 14.289746] [ 14.289863] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.289909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.289921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.289942] Call Trace: [ 14.289961] <TASK> [ 14.289979] dump_stack_lvl+0x73/0xb0 [ 14.290010] print_report+0xd1/0x610 [ 14.290033] ? __virt_addr_valid+0x1db/0x2d0 [ 14.290055] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.290083] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.290105] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.290134] kasan_report+0x141/0x180 [ 14.290154] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.290187] kasan_check_range+0x10c/0x1c0 [ 14.290216] __kasan_check_write+0x18/0x20 [ 14.290235] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.290263] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.290291] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.290316] ? trace_hardirqs_on+0x37/0xe0 [ 14.290338] ? kasan_bitops_generic+0x92/0x1c0 [ 14.290365] kasan_bitops_generic+0x121/0x1c0 [ 14.290388] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.290413] ? __pfx_read_tsc+0x10/0x10 [ 14.290433] ? ktime_get_ts64+0x86/0x230 [ 14.290457] kunit_try_run_case+0x1a5/0x480 [ 14.290480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.290513] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.290538] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.290562] ? __kthread_parkme+0x82/0x180 [ 14.290583] ? preempt_count_sub+0x50/0x80 [ 14.290608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.290631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.290656] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.290682] kthread+0x337/0x6f0 [ 14.290702] ? trace_preempt_on+0x20/0xc0 [ 14.290724] ? __pfx_kthread+0x10/0x10 [ 14.290744] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.290764] ? calculate_sigpending+0x7b/0xa0 [ 14.290789] ? __pfx_kthread+0x10/0x10 [ 14.290811] ret_from_fork+0x116/0x1d0 [ 14.290829] ? __pfx_kthread+0x10/0x10 [ 14.290849] ret_from_fork_asm+0x1a/0x30 [ 14.290879] </TASK> [ 14.290889] [ 14.302866] Allocated by task 279: [ 14.303021] kasan_save_stack+0x45/0x70 [ 14.303250] kasan_save_track+0x18/0x40 [ 14.303533] kasan_save_alloc_info+0x3b/0x50 [ 14.303681] __kasan_kmalloc+0xb7/0xc0 [ 14.303888] __kmalloc_cache_noprof+0x189/0x420 [ 14.304151] kasan_bitops_generic+0x92/0x1c0 [ 14.304369] kunit_try_run_case+0x1a5/0x480 [ 14.304595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.304855] kthread+0x337/0x6f0 [ 14.305003] ret_from_fork+0x116/0x1d0 [ 14.305168] ret_from_fork_asm+0x1a/0x30 [ 14.305311] [ 14.305382] The buggy address belongs to the object at ffff888101642a40 [ 14.305382] which belongs to the cache kmalloc-16 of size 16 [ 14.305880] The buggy address is located 8 bytes inside of [ 14.305880] allocated 9-byte region [ffff888101642a40, ffff888101642a49) [ 14.306585] [ 14.306693] The buggy address belongs to the physical page: [ 14.306952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642 [ 14.307490] flags: 0x200000000000000(node=0|zone=2) [ 14.307690] page_type: f5(slab) [ 14.307814] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.308073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.308477] page dumped because: kasan: bad access detected [ 14.308784] [ 14.308877] Memory state around the buggy address: [ 14.309319] ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.309619] ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.309891] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.310395] ^ [ 14.310607] ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.310929] ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.311357] ================================================================== [ 14.311829] ================================================================== [ 14.312199] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.312568] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279 [ 14.312815] [ 14.312928] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.312973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.312983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.313005] Call Trace: [ 14.313026] <TASK> [ 14.313043] dump_stack_lvl+0x73/0xb0 [ 14.313071] print_report+0xd1/0x610 [ 14.313092] ? __virt_addr_valid+0x1db/0x2d0 [ 14.313114] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.313142] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.313164] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.313191] kasan_report+0x141/0x180 [ 14.313213] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.313247] kasan_check_range+0x10c/0x1c0 [ 14.313270] __kasan_check_write+0x18/0x20 [ 14.313288] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.313317] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.313345] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.313369] ? trace_hardirqs_on+0x37/0xe0 [ 14.313392] ? kasan_bitops_generic+0x92/0x1c0 [ 14.313418] kasan_bitops_generic+0x121/0x1c0 [ 14.313441] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.313466] ? __pfx_read_tsc+0x10/0x10 [ 14.313487] ? ktime_get_ts64+0x86/0x230 [ 14.313520] kunit_try_run_case+0x1a5/0x480 [ 14.313544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.313565] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.313590] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.313612] ? __kthread_parkme+0x82/0x180 [ 14.313632] ? preempt_count_sub+0x50/0x80 [ 14.313656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.313679] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.313704] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.313726] kthread+0x337/0x6f0 [ 14.313745] ? trace_preempt_on+0x20/0xc0 [ 14.313766] ? __pfx_kthread+0x10/0x10 [ 14.313785] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.313806] ? calculate_sigpending+0x7b/0xa0 [ 14.313830] ? __pfx_kthread+0x10/0x10 [ 14.313851] ret_from_fork+0x116/0x1d0 [ 14.313870] ? __pfx_kthread+0x10/0x10 [ 14.313889] ret_from_fork_asm+0x1a/0x30 [ 14.313920] </TASK> [ 14.313929] [ 14.322764] Allocated by task 279: [ 14.322923] kasan_save_stack+0x45/0x70 [ 14.323225] kasan_save_track+0x18/0x40 [ 14.323388] kasan_save_alloc_info+0x3b/0x50 [ 14.323550] __kasan_kmalloc+0xb7/0xc0 [ 14.323705] __kmalloc_cache_noprof+0x189/0x420 [ 14.323924] kasan_bitops_generic+0x92/0x1c0 [ 14.324139] kunit_try_run_case+0x1a5/0x480 [ 14.324359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.324605] kthread+0x337/0x6f0 [ 14.324771] ret_from_fork+0x116/0x1d0 [ 14.324963] ret_from_fork_asm+0x1a/0x30 [ 14.325123] [ 14.325298] The buggy address belongs to the object at ffff888101642a40 [ 14.325298] which belongs to the cache kmalloc-16 of size 16 [ 14.325695] The buggy address is located 8 bytes inside of [ 14.325695] allocated 9-byte region [ffff888101642a40, ffff888101642a49) [ 14.326050] [ 14.326143] The buggy address belongs to the physical page: [ 14.326398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642 [ 14.326974] flags: 0x200000000000000(node=0|zone=2) [ 14.327464] page_type: f5(slab) [ 14.327647] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.327984] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.328211] page dumped because: kasan: bad access detected [ 14.328537] [ 14.328631] Memory state around the buggy address: [ 14.328853] ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.329231] ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.329524] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.329829] ^ [ 14.330034] ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.330396] ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.330683] ================================================================== [ 14.358143] ================================================================== [ 14.358473] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.359189] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279 [ 14.359539] [ 14.359657] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.359703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.359715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.359736] Call Trace: [ 14.359755] <TASK> [ 14.359772] dump_stack_lvl+0x73/0xb0 [ 14.359801] print_report+0xd1/0x610 [ 14.359822] ? __virt_addr_valid+0x1db/0x2d0 [ 14.359844] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.359871] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.359894] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.359922] kasan_report+0x141/0x180 [ 14.359943] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.359976] kasan_check_range+0x10c/0x1c0 [ 14.359998] __kasan_check_write+0x18/0x20 [ 14.360016] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.360044] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.360073] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.360096] ? trace_hardirqs_on+0x37/0xe0 [ 14.360119] ? kasan_bitops_generic+0x92/0x1c0 [ 14.360146] kasan_bitops_generic+0x121/0x1c0 [ 14.360183] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.360207] ? __pfx_read_tsc+0x10/0x10 [ 14.360228] ? ktime_get_ts64+0x86/0x230 [ 14.360251] kunit_try_run_case+0x1a5/0x480 [ 14.360274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.360298] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.360321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.360346] ? __kthread_parkme+0x82/0x180 [ 14.360365] ? preempt_count_sub+0x50/0x80 [ 14.360388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.360412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.360435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.360459] kthread+0x337/0x6f0 [ 14.360478] ? trace_preempt_on+0x20/0xc0 [ 14.360509] ? __pfx_kthread+0x10/0x10 [ 14.360529] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.360550] ? calculate_sigpending+0x7b/0xa0 [ 14.360575] ? __pfx_kthread+0x10/0x10 [ 14.360595] ret_from_fork+0x116/0x1d0 [ 14.360613] ? __pfx_kthread+0x10/0x10 [ 14.360633] ret_from_fork_asm+0x1a/0x30 [ 14.360663] </TASK> [ 14.360673] [ 14.368800] Allocated by task 279: [ 14.368937] kasan_save_stack+0x45/0x70 [ 14.369135] kasan_save_track+0x18/0x40 [ 14.369329] kasan_save_alloc_info+0x3b/0x50 [ 14.369662] __kasan_kmalloc+0xb7/0xc0 [ 14.369850] __kmalloc_cache_noprof+0x189/0x420 [ 14.370014] kasan_bitops_generic+0x92/0x1c0 [ 14.370163] kunit_try_run_case+0x1a5/0x480 [ 14.370312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.370629] kthread+0x337/0x6f0 [ 14.370798] ret_from_fork+0x116/0x1d0 [ 14.370988] ret_from_fork_asm+0x1a/0x30 [ 14.371186] [ 14.371283] The buggy address belongs to the object at ffff888101642a40 [ 14.371283] which belongs to the cache kmalloc-16 of size 16 [ 14.371811] The buggy address is located 8 bytes inside of [ 14.371811] allocated 9-byte region [ffff888101642a40, ffff888101642a49) [ 14.372301] [ 14.372371] The buggy address belongs to the physical page: [ 14.372551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642 [ 14.372789] flags: 0x200000000000000(node=0|zone=2) [ 14.372951] page_type: f5(slab) [ 14.373072] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.373742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.374070] page dumped because: kasan: bad access detected [ 14.374548] [ 14.374645] Memory state around the buggy address: [ 14.374866] ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.375185] ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.375459] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.375682] ^ [ 14.375855] ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.376089] ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.376718] ================================================================== [ 14.243786] ================================================================== [ 14.244072] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.244974] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279 [ 14.245574] [ 14.245687] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.245733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.245744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.245765] Call Trace: [ 14.245784] <TASK> [ 14.245802] dump_stack_lvl+0x73/0xb0 [ 14.245831] print_report+0xd1/0x610 [ 14.245853] ? __virt_addr_valid+0x1db/0x2d0 [ 14.245875] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.245903] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.245925] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.245955] kasan_report+0x141/0x180 [ 14.245976] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.246009] kasan_check_range+0x10c/0x1c0 [ 14.246032] __kasan_check_write+0x18/0x20 [ 14.246122] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.246152] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.246203] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.246229] ? trace_hardirqs_on+0x37/0xe0 [ 14.246251] ? kasan_bitops_generic+0x92/0x1c0 [ 14.246277] kasan_bitops_generic+0x121/0x1c0 [ 14.246300] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.246325] ? __pfx_read_tsc+0x10/0x10 [ 14.246345] ? ktime_get_ts64+0x86/0x230 [ 14.246371] kunit_try_run_case+0x1a5/0x480 [ 14.246396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.246418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.246443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.246466] ? __kthread_parkme+0x82/0x180 [ 14.246486] ? preempt_count_sub+0x50/0x80 [ 14.246521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.246545] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.246568] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.246592] kthread+0x337/0x6f0 [ 14.246611] ? trace_preempt_on+0x20/0xc0 [ 14.246632] ? __pfx_kthread+0x10/0x10 [ 14.246652] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.246673] ? calculate_sigpending+0x7b/0xa0 [ 14.246697] ? __pfx_kthread+0x10/0x10 [ 14.246718] ret_from_fork+0x116/0x1d0 [ 14.246737] ? __pfx_kthread+0x10/0x10 [ 14.246756] ret_from_fork_asm+0x1a/0x30 [ 14.246787] </TASK> [ 14.246797] [ 14.255438] Allocated by task 279: [ 14.255636] kasan_save_stack+0x45/0x70 [ 14.255791] kasan_save_track+0x18/0x40 [ 14.255926] kasan_save_alloc_info+0x3b/0x50 [ 14.256075] __kasan_kmalloc+0xb7/0xc0 [ 14.256206] __kmalloc_cache_noprof+0x189/0x420 [ 14.256361] kasan_bitops_generic+0x92/0x1c0 [ 14.256520] kunit_try_run_case+0x1a5/0x480 [ 14.256666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.256840] kthread+0x337/0x6f0 [ 14.256960] ret_from_fork+0x116/0x1d0 [ 14.257092] ret_from_fork_asm+0x1a/0x30 [ 14.257233] [ 14.257303] The buggy address belongs to the object at ffff888101642a40 [ 14.257303] which belongs to the cache kmalloc-16 of size 16 [ 14.257850] The buggy address is located 8 bytes inside of [ 14.257850] allocated 9-byte region [ffff888101642a40, ffff888101642a49) [ 14.258986] [ 14.259224] The buggy address belongs to the physical page: [ 14.259482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642 [ 14.259850] flags: 0x200000000000000(node=0|zone=2) [ 14.260137] page_type: f5(slab) [ 14.260323] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.260569] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.260801] page dumped because: kasan: bad access detected [ 14.260972] [ 14.261040] Memory state around the buggy address: [ 14.262205] ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.262565] ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.262882] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.263455] ^ [ 14.263736] ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.264060] ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.264550] ================================================================== [ 14.427408] ================================================================== [ 14.427763] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.428178] Read of size 8 at addr ffff888101642a48 by task kunit_try_catch/279 [ 14.428760] [ 14.428858] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.428909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.428920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.428942] Call Trace: [ 14.428960] <TASK> [ 14.428977] dump_stack_lvl+0x73/0xb0 [ 14.429009] print_report+0xd1/0x610 [ 14.429030] ? __virt_addr_valid+0x1db/0x2d0 [ 14.429052] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.429080] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.429103] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.429131] kasan_report+0x141/0x180 [ 14.429151] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.429184] __asan_report_load8_noabort+0x18/0x20 [ 14.429207] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.429235] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.429281] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.429305] ? trace_hardirqs_on+0x37/0xe0 [ 14.429328] ? kasan_bitops_generic+0x92/0x1c0 [ 14.429354] kasan_bitops_generic+0x121/0x1c0 [ 14.429377] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.429402] ? __pfx_read_tsc+0x10/0x10 [ 14.429422] ? ktime_get_ts64+0x86/0x230 [ 14.429446] kunit_try_run_case+0x1a5/0x480 [ 14.429470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429491] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.429528] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.429551] ? __kthread_parkme+0x82/0x180 [ 14.429571] ? preempt_count_sub+0x50/0x80 [ 14.429595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.429642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.429665] kthread+0x337/0x6f0 [ 14.429683] ? trace_preempt_on+0x20/0xc0 [ 14.429705] ? __pfx_kthread+0x10/0x10 [ 14.429724] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.429745] ? calculate_sigpending+0x7b/0xa0 [ 14.429769] ? __pfx_kthread+0x10/0x10 [ 14.429789] ret_from_fork+0x116/0x1d0 [ 14.429807] ? __pfx_kthread+0x10/0x10 [ 14.429827] ret_from_fork_asm+0x1a/0x30 [ 14.429858] </TASK> [ 14.429867] [ 14.437870] Allocated by task 279: [ 14.438000] kasan_save_stack+0x45/0x70 [ 14.438254] kasan_save_track+0x18/0x40 [ 14.438447] kasan_save_alloc_info+0x3b/0x50 [ 14.438666] __kasan_kmalloc+0xb7/0xc0 [ 14.438853] __kmalloc_cache_noprof+0x189/0x420 [ 14.439037] kasan_bitops_generic+0x92/0x1c0 [ 14.439246] kunit_try_run_case+0x1a5/0x480 [ 14.439452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.439723] kthread+0x337/0x6f0 [ 14.439857] ret_from_fork+0x116/0x1d0 [ 14.439995] ret_from_fork_asm+0x1a/0x30 [ 14.440188] [ 14.440357] The buggy address belongs to the object at ffff888101642a40 [ 14.440357] which belongs to the cache kmalloc-16 of size 16 [ 14.440729] The buggy address is located 8 bytes inside of [ 14.440729] allocated 9-byte region [ffff888101642a40, ffff888101642a49) [ 14.441080] [ 14.441164] The buggy address belongs to the physical page: [ 14.441419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642 [ 14.441775] flags: 0x200000000000000(node=0|zone=2) [ 14.442007] page_type: f5(slab) [ 14.442170] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.442656] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.442952] page dumped because: kasan: bad access detected [ 14.443122] [ 14.443188] Memory state around the buggy address: [ 14.443342] ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 14.443995] ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.444513] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.444778] ^ [ 14.445014] ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.445313] ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.445569] ==================================================================