Date
July 17, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 15.477205] ================================================================== [ 15.477622] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.477946] Read of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.478249] [ 15.478351] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.478410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.478421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.478442] Call Trace: [ 15.478455] <TASK> [ 15.478470] dump_stack_lvl+0x73/0xb0 [ 15.478498] print_report+0xd1/0x610 [ 15.478521] ? __virt_addr_valid+0x1db/0x2d0 [ 15.478543] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.478583] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.478608] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.478638] kasan_report+0x141/0x180 [ 15.478660] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.478695] __asan_report_load8_noabort+0x18/0x20 [ 15.478724] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.478755] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.478795] kasan_bitops_generic+0x121/0x1c0 [ 15.478820] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.478845] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.478876] kunit_try_run_case+0x1a5/0x480 [ 15.478901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.478925] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.478949] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.478975] ? __kthread_parkme+0x82/0x180 [ 15.478996] ? preempt_count_sub+0x50/0x80 [ 15.479021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.479047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.479073] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.479100] kthread+0x337/0x6f0 [ 15.479119] ? trace_preempt_on+0x20/0xc0 [ 15.479143] ? __pfx_kthread+0x10/0x10 [ 15.479164] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.479186] ? calculate_sigpending+0x7b/0xa0 [ 15.479211] ? __pfx_kthread+0x10/0x10 [ 15.479232] ret_from_fork+0x116/0x1d0 [ 15.479251] ? __pfx_kthread+0x10/0x10 [ 15.479272] ret_from_fork_asm+0x1a/0x30 [ 15.479303] </TASK> [ 15.479313] [ 15.487357] Allocated by task 278: [ 15.487538] kasan_save_stack+0x45/0x70 [ 15.487909] kasan_save_track+0x18/0x40 [ 15.488067] kasan_save_alloc_info+0x3b/0x50 [ 15.488221] __kasan_kmalloc+0xb7/0xc0 [ 15.488416] __kmalloc_cache_noprof+0x189/0x420 [ 15.488658] kasan_bitops_generic+0x92/0x1c0 [ 15.488882] kunit_try_run_case+0x1a5/0x480 [ 15.489089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.489404] kthread+0x337/0x6f0 [ 15.489572] ret_from_fork+0x116/0x1d0 [ 15.489750] ret_from_fork_asm+0x1a/0x30 [ 15.489954] [ 15.490030] The buggy address belongs to the object at ffff888101679da0 [ 15.490030] which belongs to the cache kmalloc-16 of size 16 [ 15.490529] The buggy address is located 8 bytes inside of [ 15.490529] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.491339] [ 15.491438] The buggy address belongs to the physical page: [ 15.491681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.492005] flags: 0x200000000000000(node=0|zone=2) [ 15.492206] page_type: f5(slab) [ 15.492437] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.492680] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.492905] page dumped because: kasan: bad access detected [ 15.493079] [ 15.493226] Memory state around the buggy address: [ 15.493589] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.493906] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.494218] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.494972] ^ [ 15.495133] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.496080] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.496909] ================================================================== [ 15.418977] ================================================================== [ 15.419325] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.419715] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.420033] [ 15.420120] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.420162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.420174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.420195] Call Trace: [ 15.420207] <TASK> [ 15.420221] dump_stack_lvl+0x73/0xb0 [ 15.420248] print_report+0xd1/0x610 [ 15.420270] ? __virt_addr_valid+0x1db/0x2d0 [ 15.420292] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.420321] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.420345] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.420375] kasan_report+0x141/0x180 [ 15.420397] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.420431] kasan_check_range+0x10c/0x1c0 [ 15.420455] __kasan_check_write+0x18/0x20 [ 15.420474] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.420504] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.420542] kasan_bitops_generic+0x121/0x1c0 [ 15.420577] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.420602] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.420632] kunit_try_run_case+0x1a5/0x480 [ 15.420656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.420680] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.420704] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.420729] ? __kthread_parkme+0x82/0x180 [ 15.420750] ? preempt_count_sub+0x50/0x80 [ 15.420774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.420799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.420824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.420851] kthread+0x337/0x6f0 [ 15.420870] ? trace_preempt_on+0x20/0xc0 [ 15.420894] ? __pfx_kthread+0x10/0x10 [ 15.420915] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.420937] ? calculate_sigpending+0x7b/0xa0 [ 15.420962] ? __pfx_kthread+0x10/0x10 [ 15.420984] ret_from_fork+0x116/0x1d0 [ 15.421003] ? __pfx_kthread+0x10/0x10 [ 15.421024] ret_from_fork_asm+0x1a/0x30 [ 15.421054] </TASK> [ 15.421064] [ 15.428894] Allocated by task 278: [ 15.429064] kasan_save_stack+0x45/0x70 [ 15.429233] kasan_save_track+0x18/0x40 [ 15.429600] kasan_save_alloc_info+0x3b/0x50 [ 15.429871] __kasan_kmalloc+0xb7/0xc0 [ 15.430043] __kmalloc_cache_noprof+0x189/0x420 [ 15.430229] kasan_bitops_generic+0x92/0x1c0 [ 15.430379] kunit_try_run_case+0x1a5/0x480 [ 15.430524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.430788] kthread+0x337/0x6f0 [ 15.430955] ret_from_fork+0x116/0x1d0 [ 15.431268] ret_from_fork_asm+0x1a/0x30 [ 15.431575] [ 15.431649] The buggy address belongs to the object at ffff888101679da0 [ 15.431649] which belongs to the cache kmalloc-16 of size 16 [ 15.432017] The buggy address is located 8 bytes inside of [ 15.432017] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.432836] [ 15.432928] The buggy address belongs to the physical page: [ 15.433152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.433526] flags: 0x200000000000000(node=0|zone=2) [ 15.433796] page_type: f5(slab) [ 15.433940] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.434310] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.434662] page dumped because: kasan: bad access detected [ 15.434897] [ 15.434990] Memory state around the buggy address: [ 15.435166] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.435386] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.435618] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.435834] ^ [ 15.436222] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.437717] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.438007] ================================================================== [ 15.371988] ================================================================== [ 15.372640] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.373424] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.373749] [ 15.373855] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.373901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.373914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.373936] Call Trace: [ 15.373952] <TASK> [ 15.373969] dump_stack_lvl+0x73/0xb0 [ 15.373998] print_report+0xd1/0x610 [ 15.374022] ? __virt_addr_valid+0x1db/0x2d0 [ 15.374045] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.374075] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.374100] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.374130] kasan_report+0x141/0x180 [ 15.374152] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.374187] kasan_check_range+0x10c/0x1c0 [ 15.374212] __kasan_check_write+0x18/0x20 [ 15.374233] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.374449] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.374499] kasan_bitops_generic+0x121/0x1c0 [ 15.374524] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.374713] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.374755] kunit_try_run_case+0x1a5/0x480 [ 15.374782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.374806] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.374833] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.374859] ? __kthread_parkme+0x82/0x180 [ 15.374881] ? preempt_count_sub+0x50/0x80 [ 15.374906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.374931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.374957] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.374984] kthread+0x337/0x6f0 [ 15.375003] ? trace_preempt_on+0x20/0xc0 [ 15.375027] ? __pfx_kthread+0x10/0x10 [ 15.375049] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.375072] ? calculate_sigpending+0x7b/0xa0 [ 15.375097] ? __pfx_kthread+0x10/0x10 [ 15.375118] ret_from_fork+0x116/0x1d0 [ 15.375137] ? __pfx_kthread+0x10/0x10 [ 15.375159] ret_from_fork_asm+0x1a/0x30 [ 15.375189] </TASK> [ 15.375200] [ 15.386886] Allocated by task 278: [ 15.387071] kasan_save_stack+0x45/0x70 [ 15.387434] kasan_save_track+0x18/0x40 [ 15.387762] kasan_save_alloc_info+0x3b/0x50 [ 15.387978] __kasan_kmalloc+0xb7/0xc0 [ 15.388153] __kmalloc_cache_noprof+0x189/0x420 [ 15.388726] kasan_bitops_generic+0x92/0x1c0 [ 15.389012] kunit_try_run_case+0x1a5/0x480 [ 15.389431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.389789] kthread+0x337/0x6f0 [ 15.389961] ret_from_fork+0x116/0x1d0 [ 15.390140] ret_from_fork_asm+0x1a/0x30 [ 15.390317] [ 15.390408] The buggy address belongs to the object at ffff888101679da0 [ 15.390408] which belongs to the cache kmalloc-16 of size 16 [ 15.390892] The buggy address is located 8 bytes inside of [ 15.390892] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.391360] [ 15.391928] The buggy address belongs to the physical page: [ 15.392364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.392853] flags: 0x200000000000000(node=0|zone=2) [ 15.393481] page_type: f5(slab) [ 15.393724] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.394159] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.395227] page dumped because: kasan: bad access detected [ 15.395625] [ 15.395867] Memory state around the buggy address: [ 15.396089] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.396839] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.397336] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.397832] ^ [ 15.398033] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.398735] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.399187] ================================================================== [ 15.399894] ================================================================== [ 15.400146] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.400639] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.401001] [ 15.401114] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.401161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.401173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.401195] Call Trace: [ 15.401209] <TASK> [ 15.401224] dump_stack_lvl+0x73/0xb0 [ 15.401251] print_report+0xd1/0x610 [ 15.401274] ? __virt_addr_valid+0x1db/0x2d0 [ 15.401296] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.401326] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.401350] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.401392] kasan_report+0x141/0x180 [ 15.401414] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.401448] kasan_check_range+0x10c/0x1c0 [ 15.401472] __kasan_check_write+0x18/0x20 [ 15.401492] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.401522] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.401617] kasan_bitops_generic+0x121/0x1c0 [ 15.401644] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.401669] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.401699] kunit_try_run_case+0x1a5/0x480 [ 15.401724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.401748] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.401772] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.401797] ? __kthread_parkme+0x82/0x180 [ 15.401818] ? preempt_count_sub+0x50/0x80 [ 15.401842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.401867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.401893] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.401919] kthread+0x337/0x6f0 [ 15.401938] ? trace_preempt_on+0x20/0xc0 [ 15.401961] ? __pfx_kthread+0x10/0x10 [ 15.401982] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.402007] ? calculate_sigpending+0x7b/0xa0 [ 15.402031] ? __pfx_kthread+0x10/0x10 [ 15.402053] ret_from_fork+0x116/0x1d0 [ 15.402072] ? __pfx_kthread+0x10/0x10 [ 15.402092] ret_from_fork_asm+0x1a/0x30 [ 15.402123] </TASK> [ 15.402133] [ 15.409812] Allocated by task 278: [ 15.409987] kasan_save_stack+0x45/0x70 [ 15.410316] kasan_save_track+0x18/0x40 [ 15.410663] kasan_save_alloc_info+0x3b/0x50 [ 15.410820] __kasan_kmalloc+0xb7/0xc0 [ 15.410954] __kmalloc_cache_noprof+0x189/0x420 [ 15.411178] kasan_bitops_generic+0x92/0x1c0 [ 15.411644] kunit_try_run_case+0x1a5/0x480 [ 15.411845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.412094] kthread+0x337/0x6f0 [ 15.412460] ret_from_fork+0x116/0x1d0 [ 15.412673] ret_from_fork_asm+0x1a/0x30 [ 15.412854] [ 15.412937] The buggy address belongs to the object at ffff888101679da0 [ 15.412937] which belongs to the cache kmalloc-16 of size 16 [ 15.413293] The buggy address is located 8 bytes inside of [ 15.413293] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.413945] [ 15.414047] The buggy address belongs to the physical page: [ 15.414368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.414660] flags: 0x200000000000000(node=0|zone=2) [ 15.414824] page_type: f5(slab) [ 15.414943] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.415351] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.415703] page dumped because: kasan: bad access detected [ 15.416063] [ 15.416133] Memory state around the buggy address: [ 15.416287] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.416747] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.417072] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.417506] ^ [ 15.417689] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.418006] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.418607] ================================================================== [ 15.438452] ================================================================== [ 15.438795] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.439074] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.439657] [ 15.439770] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.439815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.439827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.439848] Call Trace: [ 15.439862] <TASK> [ 15.439877] dump_stack_lvl+0x73/0xb0 [ 15.439904] print_report+0xd1/0x610 [ 15.439925] ? __virt_addr_valid+0x1db/0x2d0 [ 15.439949] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.439980] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.440004] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.440035] kasan_report+0x141/0x180 [ 15.440062] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.440097] kasan_check_range+0x10c/0x1c0 [ 15.440121] __kasan_check_write+0x18/0x20 [ 15.440142] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.440172] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.440212] kasan_bitops_generic+0x121/0x1c0 [ 15.440237] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.440262] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.440291] kunit_try_run_case+0x1a5/0x480 [ 15.440316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.440340] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.440365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.440391] ? __kthread_parkme+0x82/0x180 [ 15.440412] ? preempt_count_sub+0x50/0x80 [ 15.440497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.440523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.440562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.440590] kthread+0x337/0x6f0 [ 15.440611] ? trace_preempt_on+0x20/0xc0 [ 15.440635] ? __pfx_kthread+0x10/0x10 [ 15.440657] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.440679] ? calculate_sigpending+0x7b/0xa0 [ 15.440704] ? __pfx_kthread+0x10/0x10 [ 15.440726] ret_from_fork+0x116/0x1d0 [ 15.440746] ? __pfx_kthread+0x10/0x10 [ 15.440767] ret_from_fork_asm+0x1a/0x30 [ 15.440799] </TASK> [ 15.440809] [ 15.448782] Allocated by task 278: [ 15.448968] kasan_save_stack+0x45/0x70 [ 15.449127] kasan_save_track+0x18/0x40 [ 15.449458] kasan_save_alloc_info+0x3b/0x50 [ 15.449671] __kasan_kmalloc+0xb7/0xc0 [ 15.449807] __kmalloc_cache_noprof+0x189/0x420 [ 15.449972] kasan_bitops_generic+0x92/0x1c0 [ 15.450182] kunit_try_run_case+0x1a5/0x480 [ 15.450538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.450735] kthread+0x337/0x6f0 [ 15.450876] ret_from_fork+0x116/0x1d0 [ 15.451064] ret_from_fork_asm+0x1a/0x30 [ 15.451318] [ 15.451420] The buggy address belongs to the object at ffff888101679da0 [ 15.451420] which belongs to the cache kmalloc-16 of size 16 [ 15.452013] The buggy address is located 8 bytes inside of [ 15.452013] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.452600] [ 15.452674] The buggy address belongs to the physical page: [ 15.452846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.453094] flags: 0x200000000000000(node=0|zone=2) [ 15.453318] page_type: f5(slab) [ 15.453482] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.453832] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.454731] page dumped because: kasan: bad access detected [ 15.454961] [ 15.455055] Memory state around the buggy address: [ 15.455222] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.455440] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.455919] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.456288] ^ [ 15.456514] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.456816] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.457072] ================================================================== [ 15.457579] ================================================================== [ 15.457896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.458267] Read of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.458608] [ 15.458694] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.458736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.458748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.458769] Call Trace: [ 15.458783] <TASK> [ 15.458797] dump_stack_lvl+0x73/0xb0 [ 15.458824] print_report+0xd1/0x610 [ 15.458847] ? __virt_addr_valid+0x1db/0x2d0 [ 15.458869] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.458899] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.458924] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.458954] kasan_report+0x141/0x180 [ 15.458977] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.459012] kasan_check_range+0x10c/0x1c0 [ 15.459036] __kasan_check_read+0x15/0x20 [ 15.459055] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.459087] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.459125] kasan_bitops_generic+0x121/0x1c0 [ 15.459150] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.459175] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.459205] kunit_try_run_case+0x1a5/0x480 [ 15.459230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.459254] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.459278] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.459303] ? __kthread_parkme+0x82/0x180 [ 15.459323] ? preempt_count_sub+0x50/0x80 [ 15.459348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.459372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.459398] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.459479] kthread+0x337/0x6f0 [ 15.459501] ? trace_preempt_on+0x20/0xc0 [ 15.459524] ? __pfx_kthread+0x10/0x10 [ 15.459546] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.459579] ? calculate_sigpending+0x7b/0xa0 [ 15.459604] ? __pfx_kthread+0x10/0x10 [ 15.459626] ret_from_fork+0x116/0x1d0 [ 15.459645] ? __pfx_kthread+0x10/0x10 [ 15.459666] ret_from_fork_asm+0x1a/0x30 [ 15.459697] </TASK> [ 15.459707] [ 15.468715] Allocated by task 278: [ 15.468861] kasan_save_stack+0x45/0x70 [ 15.469011] kasan_save_track+0x18/0x40 [ 15.469152] kasan_save_alloc_info+0x3b/0x50 [ 15.469492] __kasan_kmalloc+0xb7/0xc0 [ 15.469665] __kmalloc_cache_noprof+0x189/0x420 [ 15.469884] kasan_bitops_generic+0x92/0x1c0 [ 15.470059] kunit_try_run_case+0x1a5/0x480 [ 15.470259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.470436] kthread+0x337/0x6f0 [ 15.470565] ret_from_fork+0x116/0x1d0 [ 15.470752] ret_from_fork_asm+0x1a/0x30 [ 15.471181] [ 15.471343] The buggy address belongs to the object at ffff888101679da0 [ 15.471343] which belongs to the cache kmalloc-16 of size 16 [ 15.471833] The buggy address is located 8 bytes inside of [ 15.471833] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.472418] [ 15.472495] The buggy address belongs to the physical page: [ 15.472728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.473017] flags: 0x200000000000000(node=0|zone=2) [ 15.473182] page_type: f5(slab) [ 15.473345] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.473879] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.474157] page dumped because: kasan: bad access detected [ 15.474661] [ 15.474756] Memory state around the buggy address: [ 15.474940] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.475392] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.475635] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.475947] ^ [ 15.476149] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.476510] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.476769] ================================================================== [ 15.303198] ================================================================== [ 15.304148] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.305126] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.305771] [ 15.305865] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.305912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.305925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.305946] Call Trace: [ 15.305961] <TASK> [ 15.305976] dump_stack_lvl+0x73/0xb0 [ 15.306006] print_report+0xd1/0x610 [ 15.306029] ? __virt_addr_valid+0x1db/0x2d0 [ 15.306052] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.306083] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.306106] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.306136] kasan_report+0x141/0x180 [ 15.306158] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.306192] kasan_check_range+0x10c/0x1c0 [ 15.306216] __kasan_check_write+0x18/0x20 [ 15.306236] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.306339] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.306392] kasan_bitops_generic+0x121/0x1c0 [ 15.306425] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.306450] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.306479] kunit_try_run_case+0x1a5/0x480 [ 15.306504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.306526] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.306561] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.306586] ? __kthread_parkme+0x82/0x180 [ 15.306607] ? preempt_count_sub+0x50/0x80 [ 15.306631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.306655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.306679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.306705] kthread+0x337/0x6f0 [ 15.306725] ? trace_preempt_on+0x20/0xc0 [ 15.306747] ? __pfx_kthread+0x10/0x10 [ 15.306768] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.306790] ? calculate_sigpending+0x7b/0xa0 [ 15.306814] ? __pfx_kthread+0x10/0x10 [ 15.306835] ret_from_fork+0x116/0x1d0 [ 15.306853] ? __pfx_kthread+0x10/0x10 [ 15.306874] ret_from_fork_asm+0x1a/0x30 [ 15.306905] </TASK> [ 15.306914] [ 15.321864] Allocated by task 278: [ 15.322221] kasan_save_stack+0x45/0x70 [ 15.322582] kasan_save_track+0x18/0x40 [ 15.322952] kasan_save_alloc_info+0x3b/0x50 [ 15.323106] __kasan_kmalloc+0xb7/0xc0 [ 15.323239] __kmalloc_cache_noprof+0x189/0x420 [ 15.323420] kasan_bitops_generic+0x92/0x1c0 [ 15.323982] kunit_try_run_case+0x1a5/0x480 [ 15.324628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.325154] kthread+0x337/0x6f0 [ 15.325560] ret_from_fork+0x116/0x1d0 [ 15.325979] ret_from_fork_asm+0x1a/0x30 [ 15.326498] [ 15.326688] The buggy address belongs to the object at ffff888101679da0 [ 15.326688] which belongs to the cache kmalloc-16 of size 16 [ 15.327143] The buggy address is located 8 bytes inside of [ 15.327143] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.328440] [ 15.328644] The buggy address belongs to the physical page: [ 15.329224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.329996] flags: 0x200000000000000(node=0|zone=2) [ 15.330467] page_type: f5(slab) [ 15.330718] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.331411] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.331809] page dumped because: kasan: bad access detected [ 15.331988] [ 15.332063] Memory state around the buggy address: [ 15.332219] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.333104] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.333925] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.334762] ^ [ 15.335444] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.336023] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.336303] ================================================================== [ 15.337221] ================================================================== [ 15.338136] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.338826] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.339061] [ 15.339148] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.339192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.339204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.339226] Call Trace: [ 15.339241] <TASK> [ 15.339257] dump_stack_lvl+0x73/0xb0 [ 15.339287] print_report+0xd1/0x610 [ 15.339308] ? __virt_addr_valid+0x1db/0x2d0 [ 15.339331] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.339361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.339386] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.339590] kasan_report+0x141/0x180 [ 15.339621] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.339658] kasan_check_range+0x10c/0x1c0 [ 15.339682] __kasan_check_write+0x18/0x20 [ 15.339704] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.339733] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.339772] kasan_bitops_generic+0x121/0x1c0 [ 15.339797] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.339822] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.339851] kunit_try_run_case+0x1a5/0x480 [ 15.339874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.339898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.339922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.339947] ? __kthread_parkme+0x82/0x180 [ 15.339967] ? preempt_count_sub+0x50/0x80 [ 15.339991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.340016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.340040] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.340070] kthread+0x337/0x6f0 [ 15.340090] ? trace_preempt_on+0x20/0xc0 [ 15.340113] ? __pfx_kthread+0x10/0x10 [ 15.340134] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.340155] ? calculate_sigpending+0x7b/0xa0 [ 15.340179] ? __pfx_kthread+0x10/0x10 [ 15.340200] ret_from_fork+0x116/0x1d0 [ 15.340220] ? __pfx_kthread+0x10/0x10 [ 15.340289] ret_from_fork_asm+0x1a/0x30 [ 15.340323] </TASK> [ 15.340332] [ 15.356641] Allocated by task 278: [ 15.356820] kasan_save_stack+0x45/0x70 [ 15.356974] kasan_save_track+0x18/0x40 [ 15.357112] kasan_save_alloc_info+0x3b/0x50 [ 15.357779] __kasan_kmalloc+0xb7/0xc0 [ 15.358259] __kmalloc_cache_noprof+0x189/0x420 [ 15.359152] kasan_bitops_generic+0x92/0x1c0 [ 15.359687] kunit_try_run_case+0x1a5/0x480 [ 15.359906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.360140] kthread+0x337/0x6f0 [ 15.360294] ret_from_fork+0x116/0x1d0 [ 15.360452] ret_from_fork_asm+0x1a/0x30 [ 15.360612] [ 15.360703] The buggy address belongs to the object at ffff888101679da0 [ 15.360703] which belongs to the cache kmalloc-16 of size 16 [ 15.361172] The buggy address is located 8 bytes inside of [ 15.361172] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.362729] [ 15.363075] The buggy address belongs to the physical page: [ 15.363796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.364999] flags: 0x200000000000000(node=0|zone=2) [ 15.365654] page_type: f5(slab) [ 15.365822] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.366139] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.367144] page dumped because: kasan: bad access detected [ 15.367924] [ 15.368024] Memory state around the buggy address: [ 15.368512] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.368955] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.369464] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.369806] ^ [ 15.370006] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.370755] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.371177] ================================================================== [ 15.267744] ================================================================== [ 15.268107] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.271484] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.271738] [ 15.271828] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.271874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.271886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.271907] Call Trace: [ 15.271918] <TASK> [ 15.271934] dump_stack_lvl+0x73/0xb0 [ 15.271964] print_report+0xd1/0x610 [ 15.271986] ? __virt_addr_valid+0x1db/0x2d0 [ 15.272009] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.272039] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.272069] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.272101] kasan_report+0x141/0x180 [ 15.272123] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.272158] kasan_check_range+0x10c/0x1c0 [ 15.272182] __kasan_check_write+0x18/0x20 [ 15.272202] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.272547] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.272609] kasan_bitops_generic+0x121/0x1c0 [ 15.272634] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.272659] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.272699] kunit_try_run_case+0x1a5/0x480 [ 15.272725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.272748] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.272784] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.272809] ? __kthread_parkme+0x82/0x180 [ 15.272831] ? preempt_count_sub+0x50/0x80 [ 15.272855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.272881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.272906] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.272932] kthread+0x337/0x6f0 [ 15.272951] ? trace_preempt_on+0x20/0xc0 [ 15.272975] ? __pfx_kthread+0x10/0x10 [ 15.273527] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.273604] ? calculate_sigpending+0x7b/0xa0 [ 15.273631] ? __pfx_kthread+0x10/0x10 [ 15.273654] ret_from_fork+0x116/0x1d0 [ 15.273676] ? __pfx_kthread+0x10/0x10 [ 15.273697] ret_from_fork_asm+0x1a/0x30 [ 15.273729] </TASK> [ 15.273739] [ 15.288136] Allocated by task 278: [ 15.288644] kasan_save_stack+0x45/0x70 [ 15.288844] kasan_save_track+0x18/0x40 [ 15.288979] kasan_save_alloc_info+0x3b/0x50 [ 15.289125] __kasan_kmalloc+0xb7/0xc0 [ 15.289336] __kmalloc_cache_noprof+0x189/0x420 [ 15.289932] kasan_bitops_generic+0x92/0x1c0 [ 15.290466] kunit_try_run_case+0x1a5/0x480 [ 15.290991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.291563] kthread+0x337/0x6f0 [ 15.291954] ret_from_fork+0x116/0x1d0 [ 15.292430] ret_from_fork_asm+0x1a/0x30 [ 15.292872] [ 15.293012] The buggy address belongs to the object at ffff888101679da0 [ 15.293012] which belongs to the cache kmalloc-16 of size 16 [ 15.293740] The buggy address is located 8 bytes inside of [ 15.293740] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.294958] [ 15.295087] The buggy address belongs to the physical page: [ 15.295671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.296284] flags: 0x200000000000000(node=0|zone=2) [ 15.296675] page_type: f5(slab) [ 15.296893] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.297479] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.297774] page dumped because: kasan: bad access detected [ 15.297948] [ 15.298017] Memory state around the buggy address: [ 15.298178] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.298934] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.299753] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.300524] ^ [ 15.301046] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.301785] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.302494] ==================================================================