Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 16.183407] ================================================================== [ 16.184158] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.184597] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.184904] [ 16.184987] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.185042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.185056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.185079] Call Trace: [ 16.185102] <TASK> [ 16.185121] dump_stack_lvl+0x73/0xb0 [ 16.185152] print_report+0xd1/0x650 [ 16.185176] ? __virt_addr_valid+0x1db/0x2d0 [ 16.185199] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.185221] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.185245] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.185268] kasan_report+0x141/0x180 [ 16.185291] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.185318] kasan_check_range+0x10c/0x1c0 [ 16.185338] __kasan_check_write+0x18/0x20 [ 16.185357] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.185381] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.185406] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.185427] ? trace_hardirqs_on+0x37/0xe0 [ 16.185451] ? kasan_bitops_generic+0x92/0x1c0 [ 16.185474] kasan_bitops_generic+0x121/0x1c0 [ 16.185493] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.185514] ? __pfx_read_tsc+0x10/0x10 [ 16.185534] ? ktime_get_ts64+0x86/0x230 [ 16.185576] kunit_try_run_case+0x1a5/0x480 [ 16.185896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.185922] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.185964] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.185988] ? __kthread_parkme+0x82/0x180 [ 16.186010] ? preempt_count_sub+0x50/0x80 [ 16.186036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.186059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.186083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.186106] kthread+0x337/0x6f0 [ 16.186123] ? trace_preempt_on+0x20/0xc0 [ 16.186145] ? __pfx_kthread+0x10/0x10 [ 16.186163] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.186184] ? calculate_sigpending+0x7b/0xa0 [ 16.186205] ? __pfx_kthread+0x10/0x10 [ 16.186224] ret_from_fork+0x41/0x80 [ 16.186245] ? __pfx_kthread+0x10/0x10 [ 16.186262] ret_from_fork_asm+0x1a/0x30 [ 16.186293] </TASK> [ 16.186306] [ 16.194385] Allocated by task 281: [ 16.194489] kasan_save_stack+0x45/0x70 [ 16.194611] kasan_save_track+0x18/0x40 [ 16.194862] kasan_save_alloc_info+0x3b/0x50 [ 16.195090] __kasan_kmalloc+0xb7/0xc0 [ 16.195418] __kmalloc_cache_noprof+0x189/0x420 [ 16.195744] kasan_bitops_generic+0x92/0x1c0 [ 16.196151] kunit_try_run_case+0x1a5/0x480 [ 16.196272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.196487] kthread+0x337/0x6f0 [ 16.196831] ret_from_fork+0x41/0x80 [ 16.196927] ret_from_fork_asm+0x1a/0x30 [ 16.197020] [ 16.197073] The buggy address belongs to the object at ffff888102497640 [ 16.197073] which belongs to the cache kmalloc-16 of size 16 [ 16.197272] The buggy address is located 8 bytes inside of [ 16.197272] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.197890] [ 16.198026] The buggy address belongs to the physical page: [ 16.198391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.198813] flags: 0x200000000000000(node=0|zone=2) [ 16.199258] page_type: f5(slab) [ 16.199360] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.199515] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.200203] page dumped because: kasan: bad access detected [ 16.200718] [ 16.200960] Memory state around the buggy address: [ 16.201199] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.201465] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.201682] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.202103] ^ [ 16.202369] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.202583] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.202936] ================================================================== [ 16.302865] ================================================================== [ 16.303408] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.303608] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.303750] [ 16.303833] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.304179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.304210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.304236] Call Trace: [ 16.304261] <TASK> [ 16.304283] dump_stack_lvl+0x73/0xb0 [ 16.304348] print_report+0xd1/0x650 [ 16.304384] ? __virt_addr_valid+0x1db/0x2d0 [ 16.304409] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.304433] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.304456] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.304481] kasan_report+0x141/0x180 [ 16.304506] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.304535] kasan_check_range+0x10c/0x1c0 [ 16.304556] __kasan_check_write+0x18/0x20 [ 16.304593] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.304701] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.304734] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.304758] ? trace_hardirqs_on+0x37/0xe0 [ 16.304783] ? kasan_bitops_generic+0x92/0x1c0 [ 16.304807] kasan_bitops_generic+0x121/0x1c0 [ 16.304828] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.304850] ? __pfx_read_tsc+0x10/0x10 [ 16.304871] ? ktime_get_ts64+0x86/0x230 [ 16.304898] kunit_try_run_case+0x1a5/0x480 [ 16.304925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.304949] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.304975] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.304998] ? __kthread_parkme+0x82/0x180 [ 16.305021] ? preempt_count_sub+0x50/0x80 [ 16.305074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.305103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.305128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.305151] kthread+0x337/0x6f0 [ 16.305169] ? trace_preempt_on+0x20/0xc0 [ 16.305192] ? __pfx_kthread+0x10/0x10 [ 16.305229] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.305252] ? calculate_sigpending+0x7b/0xa0 [ 16.305274] ? __pfx_kthread+0x10/0x10 [ 16.305294] ret_from_fork+0x41/0x80 [ 16.305315] ? __pfx_kthread+0x10/0x10 [ 16.305333] ret_from_fork_asm+0x1a/0x30 [ 16.305366] </TASK> [ 16.305381] [ 16.312976] Allocated by task 281: [ 16.313312] kasan_save_stack+0x45/0x70 [ 16.313636] kasan_save_track+0x18/0x40 [ 16.313899] kasan_save_alloc_info+0x3b/0x50 [ 16.314237] __kasan_kmalloc+0xb7/0xc0 [ 16.314333] __kmalloc_cache_noprof+0x189/0x420 [ 16.314436] kasan_bitops_generic+0x92/0x1c0 [ 16.314531] kunit_try_run_case+0x1a5/0x480 [ 16.315250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.315824] kthread+0x337/0x6f0 [ 16.316106] ret_from_fork+0x41/0x80 [ 16.316359] ret_from_fork_asm+0x1a/0x30 [ 16.316532] [ 16.316605] The buggy address belongs to the object at ffff888102497640 [ 16.316605] which belongs to the cache kmalloc-16 of size 16 [ 16.317134] The buggy address is located 8 bytes inside of [ 16.317134] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.317342] [ 16.317400] The buggy address belongs to the physical page: [ 16.317510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.318259] flags: 0x200000000000000(node=0|zone=2) [ 16.318582] page_type: f5(slab) [ 16.318812] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.319548] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.319843] page dumped because: kasan: bad access detected [ 16.319960] [ 16.320015] Memory state around the buggy address: [ 16.320124] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.320664] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.321086] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.321944] ^ [ 16.322142] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.322462] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.323049] ================================================================== [ 16.158250] ================================================================== [ 16.159112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.159390] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.159605] [ 16.159686] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.159743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.159757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.159782] Call Trace: [ 16.159807] <TASK> [ 16.159828] dump_stack_lvl+0x73/0xb0 [ 16.159861] print_report+0xd1/0x650 [ 16.159885] ? __virt_addr_valid+0x1db/0x2d0 [ 16.159909] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.159933] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.159955] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.159980] kasan_report+0x141/0x180 [ 16.160003] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.160032] kasan_check_range+0x10c/0x1c0 [ 16.160054] __kasan_check_write+0x18/0x20 [ 16.160075] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.160102] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.160128] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.160151] ? trace_hardirqs_on+0x37/0xe0 [ 16.160178] ? kasan_bitops_generic+0x92/0x1c0 [ 16.160204] kasan_bitops_generic+0x121/0x1c0 [ 16.160226] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.160249] ? __pfx_read_tsc+0x10/0x10 [ 16.160271] ? ktime_get_ts64+0x86/0x230 [ 16.160299] kunit_try_run_case+0x1a5/0x480 [ 16.160327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.160351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.160376] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.160400] ? __kthread_parkme+0x82/0x180 [ 16.160424] ? preempt_count_sub+0x50/0x80 [ 16.160453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.160479] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.160504] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.160530] kthread+0x337/0x6f0 [ 16.160549] ? trace_preempt_on+0x20/0xc0 [ 16.161331] ? __pfx_kthread+0x10/0x10 [ 16.161357] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.161384] ? calculate_sigpending+0x7b/0xa0 [ 16.161409] ? __pfx_kthread+0x10/0x10 [ 16.161430] ret_from_fork+0x41/0x80 [ 16.161456] ? __pfx_kthread+0x10/0x10 [ 16.161477] ret_from_fork_asm+0x1a/0x30 [ 16.161512] </TASK> [ 16.161527] [ 16.170455] Allocated by task 281: [ 16.170593] kasan_save_stack+0x45/0x70 [ 16.172328] kasan_save_track+0x18/0x40 [ 16.172473] kasan_save_alloc_info+0x3b/0x50 [ 16.173195] __kasan_kmalloc+0xb7/0xc0 [ 16.173418] __kmalloc_cache_noprof+0x189/0x420 [ 16.173549] kasan_bitops_generic+0x92/0x1c0 [ 16.174096] kunit_try_run_case+0x1a5/0x480 [ 16.174220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.174624] kthread+0x337/0x6f0 [ 16.174759] ret_from_fork+0x41/0x80 [ 16.174933] ret_from_fork_asm+0x1a/0x30 [ 16.175218] [ 16.175358] The buggy address belongs to the object at ffff888102497640 [ 16.175358] which belongs to the cache kmalloc-16 of size 16 [ 16.175859] The buggy address is located 8 bytes inside of [ 16.175859] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.176575] [ 16.176654] The buggy address belongs to the physical page: [ 16.177647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.177921] flags: 0x200000000000000(node=0|zone=2) [ 16.178075] page_type: f5(slab) [ 16.178199] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.178407] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.178639] page dumped because: kasan: bad access detected [ 16.179418] [ 16.179506] Memory state around the buggy address: [ 16.179856] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.180592] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.181071] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.181367] ^ [ 16.181952] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.182192] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.182521] ================================================================== [ 16.227052] ================================================================== [ 16.227593] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.228168] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.228444] [ 16.228828] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.228889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.228904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.228928] Call Trace: [ 16.228951] <TASK> [ 16.228972] dump_stack_lvl+0x73/0xb0 [ 16.229006] print_report+0xd1/0x650 [ 16.229032] ? __virt_addr_valid+0x1db/0x2d0 [ 16.229054] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.229077] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.229100] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.229124] kasan_report+0x141/0x180 [ 16.229146] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.229174] kasan_check_range+0x10c/0x1c0 [ 16.229196] __kasan_check_write+0x18/0x20 [ 16.229227] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.229251] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.229276] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.229297] ? trace_hardirqs_on+0x37/0xe0 [ 16.229321] ? kasan_bitops_generic+0x92/0x1c0 [ 16.229344] kasan_bitops_generic+0x121/0x1c0 [ 16.229363] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.229385] ? __pfx_read_tsc+0x10/0x10 [ 16.229405] ? ktime_get_ts64+0x86/0x230 [ 16.229431] kunit_try_run_case+0x1a5/0x480 [ 16.229455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.229478] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.229502] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.229526] ? __kthread_parkme+0x82/0x180 [ 16.229548] ? preempt_count_sub+0x50/0x80 [ 16.229593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.229618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.229642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.229666] kthread+0x337/0x6f0 [ 16.229684] ? trace_preempt_on+0x20/0xc0 [ 16.229706] ? __pfx_kthread+0x10/0x10 [ 16.229725] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.229746] ? calculate_sigpending+0x7b/0xa0 [ 16.229769] ? __pfx_kthread+0x10/0x10 [ 16.229787] ret_from_fork+0x41/0x80 [ 16.229810] ? __pfx_kthread+0x10/0x10 [ 16.229828] ret_from_fork_asm+0x1a/0x30 [ 16.229859] </TASK> [ 16.229872] [ 16.240592] Allocated by task 281: [ 16.241218] kasan_save_stack+0x45/0x70 [ 16.241371] kasan_save_track+0x18/0x40 [ 16.241465] kasan_save_alloc_info+0x3b/0x50 [ 16.242031] __kasan_kmalloc+0xb7/0xc0 [ 16.242321] __kmalloc_cache_noprof+0x189/0x420 [ 16.242697] kasan_bitops_generic+0x92/0x1c0 [ 16.242916] kunit_try_run_case+0x1a5/0x480 [ 16.243238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.243381] kthread+0x337/0x6f0 [ 16.243661] ret_from_fork+0x41/0x80 [ 16.243837] ret_from_fork_asm+0x1a/0x30 [ 16.243935] [ 16.244040] The buggy address belongs to the object at ffff888102497640 [ 16.244040] which belongs to the cache kmalloc-16 of size 16 [ 16.244401] The buggy address is located 8 bytes inside of [ 16.244401] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.245611] [ 16.245845] The buggy address belongs to the physical page: [ 16.246106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.246307] flags: 0x200000000000000(node=0|zone=2) [ 16.246421] page_type: f5(slab) [ 16.246541] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.247028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.247626] page dumped because: kasan: bad access detected [ 16.247734] [ 16.248174] Memory state around the buggy address: [ 16.248360] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.249378] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.249763] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.249957] ^ [ 16.250253] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.250514] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.250938] ================================================================== [ 16.276060] ================================================================== [ 16.276321] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.276596] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.278933] [ 16.279056] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.279118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.279143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.279169] Call Trace: [ 16.279193] <TASK> [ 16.279224] dump_stack_lvl+0x73/0xb0 [ 16.279267] print_report+0xd1/0x650 [ 16.279294] ? __virt_addr_valid+0x1db/0x2d0 [ 16.279319] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.279344] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.279367] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.279392] kasan_report+0x141/0x180 [ 16.279414] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.279442] kasan_check_range+0x10c/0x1c0 [ 16.279462] __kasan_check_write+0x18/0x20 [ 16.279482] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.279508] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.279536] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.279576] ? trace_hardirqs_on+0x37/0xe0 [ 16.279607] ? kasan_bitops_generic+0x92/0x1c0 [ 16.279634] kasan_bitops_generic+0x121/0x1c0 [ 16.279657] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.279681] ? __pfx_read_tsc+0x10/0x10 [ 16.279704] ? ktime_get_ts64+0x86/0x230 [ 16.279733] kunit_try_run_case+0x1a5/0x480 [ 16.279761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.279785] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.279811] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.279837] ? __kthread_parkme+0x82/0x180 [ 16.279861] ? preempt_count_sub+0x50/0x80 [ 16.279889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.279916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.279941] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.279966] kthread+0x337/0x6f0 [ 16.279985] ? trace_preempt_on+0x20/0xc0 [ 16.280010] ? __pfx_kthread+0x10/0x10 [ 16.280030] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.280053] ? calculate_sigpending+0x7b/0xa0 [ 16.280077] ? __pfx_kthread+0x10/0x10 [ 16.280098] ret_from_fork+0x41/0x80 [ 16.280120] ? __pfx_kthread+0x10/0x10 [ 16.280140] ret_from_fork_asm+0x1a/0x30 [ 16.280175] </TASK> [ 16.280188] [ 16.290016] Allocated by task 281: [ 16.290126] kasan_save_stack+0x45/0x70 [ 16.290396] kasan_save_track+0x18/0x40 [ 16.290662] kasan_save_alloc_info+0x3b/0x50 [ 16.290872] __kasan_kmalloc+0xb7/0xc0 [ 16.291191] __kmalloc_cache_noprof+0x189/0x420 [ 16.291822] kasan_bitops_generic+0x92/0x1c0 [ 16.292264] kunit_try_run_case+0x1a5/0x480 [ 16.292437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.294369] kthread+0x337/0x6f0 [ 16.294587] ret_from_fork+0x41/0x80 [ 16.294916] ret_from_fork_asm+0x1a/0x30 [ 16.295102] [ 16.295212] The buggy address belongs to the object at ffff888102497640 [ 16.295212] which belongs to the cache kmalloc-16 of size 16 [ 16.296131] The buggy address is located 8 bytes inside of [ 16.296131] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.296910] [ 16.297146] The buggy address belongs to the physical page: [ 16.297284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.297894] flags: 0x200000000000000(node=0|zone=2) [ 16.298235] page_type: f5(slab) [ 16.298345] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.298814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.299284] page dumped because: kasan: bad access detected [ 16.300041] [ 16.300256] Memory state around the buggy address: [ 16.300551] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.300754] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.301151] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.301550] ^ [ 16.301832] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.302204] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.302421] ================================================================== [ 16.323495] ================================================================== [ 16.324079] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.324582] Read of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.325012] [ 16.325137] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.325212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.325226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.325250] Call Trace: [ 16.325274] <TASK> [ 16.325309] dump_stack_lvl+0x73/0xb0 [ 16.325344] print_report+0xd1/0x650 [ 16.325370] ? __virt_addr_valid+0x1db/0x2d0 [ 16.325393] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.325416] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.325439] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.325463] kasan_report+0x141/0x180 [ 16.325503] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.325535] kasan_check_range+0x10c/0x1c0 [ 16.325555] __kasan_check_read+0x15/0x20 [ 16.325681] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.325710] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.325736] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.325759] ? trace_hardirqs_on+0x37/0xe0 [ 16.325783] ? kasan_bitops_generic+0x92/0x1c0 [ 16.325807] kasan_bitops_generic+0x121/0x1c0 [ 16.325827] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.325849] ? __pfx_read_tsc+0x10/0x10 [ 16.325886] ? ktime_get_ts64+0x86/0x230 [ 16.325915] kunit_try_run_case+0x1a5/0x480 [ 16.325942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.325965] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.325990] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.326013] ? __kthread_parkme+0x82/0x180 [ 16.326036] ? preempt_count_sub+0x50/0x80 [ 16.326064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.326089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.326112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.326135] kthread+0x337/0x6f0 [ 16.326153] ? trace_preempt_on+0x20/0xc0 [ 16.326176] ? __pfx_kthread+0x10/0x10 [ 16.326195] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.326216] ? calculate_sigpending+0x7b/0xa0 [ 16.326238] ? __pfx_kthread+0x10/0x10 [ 16.326256] ret_from_fork+0x41/0x80 [ 16.326278] ? __pfx_kthread+0x10/0x10 [ 16.326296] ret_from_fork_asm+0x1a/0x30 [ 16.326328] </TASK> [ 16.326341] [ 16.333777] Allocated by task 281: [ 16.333966] kasan_save_stack+0x45/0x70 [ 16.334172] kasan_save_track+0x18/0x40 [ 16.334373] kasan_save_alloc_info+0x3b/0x50 [ 16.334566] __kasan_kmalloc+0xb7/0xc0 [ 16.335053] __kmalloc_cache_noprof+0x189/0x420 [ 16.335234] kasan_bitops_generic+0x92/0x1c0 [ 16.335464] kunit_try_run_case+0x1a5/0x480 [ 16.335595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.336005] kthread+0x337/0x6f0 [ 16.336091] ret_from_fork+0x41/0x80 [ 16.336236] ret_from_fork_asm+0x1a/0x30 [ 16.336476] [ 16.336595] The buggy address belongs to the object at ffff888102497640 [ 16.336595] which belongs to the cache kmalloc-16 of size 16 [ 16.337039] The buggy address is located 8 bytes inside of [ 16.337039] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.337238] [ 16.337356] The buggy address belongs to the physical page: [ 16.337734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.338031] flags: 0x200000000000000(node=0|zone=2) [ 16.338229] page_type: f5(slab) [ 16.338318] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.338459] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.338978] page dumped because: kasan: bad access detected [ 16.339333] [ 16.339447] Memory state around the buggy address: [ 16.339758] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.340025] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.340288] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.340413] ^ [ 16.340517] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.340991] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.341390] ================================================================== [ 16.341951] ================================================================== [ 16.342225] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.342532] Read of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.343042] [ 16.343146] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.343209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.343224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.343250] Call Trace: [ 16.343274] <TASK> [ 16.343295] dump_stack_lvl+0x73/0xb0 [ 16.343344] print_report+0xd1/0x650 [ 16.343369] ? __virt_addr_valid+0x1db/0x2d0 [ 16.343399] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.343423] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.343446] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.343470] kasan_report+0x141/0x180 [ 16.343494] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.343522] __asan_report_load8_noabort+0x18/0x20 [ 16.343543] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.343579] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.343743] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.343767] ? trace_hardirqs_on+0x37/0xe0 [ 16.343792] ? kasan_bitops_generic+0x92/0x1c0 [ 16.343816] kasan_bitops_generic+0x121/0x1c0 [ 16.343836] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.343858] ? __pfx_read_tsc+0x10/0x10 [ 16.343897] ? ktime_get_ts64+0x86/0x230 [ 16.343925] kunit_try_run_case+0x1a5/0x480 [ 16.343959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.343983] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.344007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.344031] ? __kthread_parkme+0x82/0x180 [ 16.344053] ? preempt_count_sub+0x50/0x80 [ 16.344078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.344103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.344127] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.344167] kthread+0x337/0x6f0 [ 16.344187] ? trace_preempt_on+0x20/0xc0 [ 16.344211] ? __pfx_kthread+0x10/0x10 [ 16.344230] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.344250] ? calculate_sigpending+0x7b/0xa0 [ 16.344271] ? __pfx_kthread+0x10/0x10 [ 16.344308] ret_from_fork+0x41/0x80 [ 16.344330] ? __pfx_kthread+0x10/0x10 [ 16.344348] ret_from_fork_asm+0x1a/0x30 [ 16.344380] </TASK> [ 16.344392] [ 16.351190] Allocated by task 281: [ 16.351434] kasan_save_stack+0x45/0x70 [ 16.352743] kasan_save_track+0x18/0x40 [ 16.353027] kasan_save_alloc_info+0x3b/0x50 [ 16.353302] __kasan_kmalloc+0xb7/0xc0 [ 16.353427] __kmalloc_cache_noprof+0x189/0x420 [ 16.353578] kasan_bitops_generic+0x92/0x1c0 [ 16.354082] kunit_try_run_case+0x1a5/0x480 [ 16.354202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.354357] kthread+0x337/0x6f0 [ 16.354462] ret_from_fork+0x41/0x80 [ 16.354581] ret_from_fork_asm+0x1a/0x30 [ 16.355184] [ 16.355274] The buggy address belongs to the object at ffff888102497640 [ 16.355274] which belongs to the cache kmalloc-16 of size 16 [ 16.355585] The buggy address is located 8 bytes inside of [ 16.355585] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.355784] [ 16.355840] The buggy address belongs to the physical page: [ 16.355945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.356602] flags: 0x200000000000000(node=0|zone=2) [ 16.357004] page_type: f5(slab) [ 16.357156] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.357480] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.357624] page dumped because: kasan: bad access detected [ 16.357966] [ 16.358068] Memory state around the buggy address: [ 16.358329] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.358645] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.359260] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.359423] ^ [ 16.359533] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.359698] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.360163] ================================================================== [ 16.251805] ================================================================== [ 16.252615] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.252863] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.253052] [ 16.253151] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.253205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.253219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.253241] Call Trace: [ 16.253265] <TASK> [ 16.253286] dump_stack_lvl+0x73/0xb0 [ 16.253316] print_report+0xd1/0x650 [ 16.253339] ? __virt_addr_valid+0x1db/0x2d0 [ 16.253361] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.253385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.253408] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.253431] kasan_report+0x141/0x180 [ 16.253452] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.253479] kasan_check_range+0x10c/0x1c0 [ 16.253499] __kasan_check_write+0x18/0x20 [ 16.253518] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.253541] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.253577] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.253601] ? trace_hardirqs_on+0x37/0xe0 [ 16.253624] ? kasan_bitops_generic+0x92/0x1c0 [ 16.253648] kasan_bitops_generic+0x121/0x1c0 [ 16.253669] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.253690] ? __pfx_read_tsc+0x10/0x10 [ 16.253710] ? ktime_get_ts64+0x86/0x230 [ 16.254924] kunit_try_run_case+0x1a5/0x480 [ 16.254960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.254984] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.255010] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.255032] ? __kthread_parkme+0x82/0x180 [ 16.255055] ? preempt_count_sub+0x50/0x80 [ 16.255080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.255105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.255128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.255162] kthread+0x337/0x6f0 [ 16.255180] ? trace_preempt_on+0x20/0xc0 [ 16.255204] ? __pfx_kthread+0x10/0x10 [ 16.255223] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.255247] ? calculate_sigpending+0x7b/0xa0 [ 16.255271] ? __pfx_kthread+0x10/0x10 [ 16.255292] ret_from_fork+0x41/0x80 [ 16.255315] ? __pfx_kthread+0x10/0x10 [ 16.255335] ret_from_fork_asm+0x1a/0x30 [ 16.255370] </TASK> [ 16.255384] [ 16.266229] Allocated by task 281: [ 16.266356] kasan_save_stack+0x45/0x70 [ 16.266497] kasan_save_track+0x18/0x40 [ 16.266639] kasan_save_alloc_info+0x3b/0x50 [ 16.268206] __kasan_kmalloc+0xb7/0xc0 [ 16.268328] __kmalloc_cache_noprof+0x189/0x420 [ 16.268774] kasan_bitops_generic+0x92/0x1c0 [ 16.268968] kunit_try_run_case+0x1a5/0x480 [ 16.269165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.269397] kthread+0x337/0x6f0 [ 16.269535] ret_from_fork+0x41/0x80 [ 16.270085] ret_from_fork_asm+0x1a/0x30 [ 16.270244] [ 16.270301] The buggy address belongs to the object at ffff888102497640 [ 16.270301] which belongs to the cache kmalloc-16 of size 16 [ 16.271189] The buggy address is located 8 bytes inside of [ 16.271189] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.271423] [ 16.271483] The buggy address belongs to the physical page: [ 16.271621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.272621] flags: 0x200000000000000(node=0|zone=2) [ 16.272737] page_type: f5(slab) [ 16.272824] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.273062] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.273391] page dumped because: kasan: bad access detected [ 16.273523] [ 16.273634] Memory state around the buggy address: [ 16.274235] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.274498] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.274898] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.275079] ^ [ 16.275235] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.275409] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.275590] ================================================================== [ 16.203593] ================================================================== [ 16.204186] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.204585] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.204978] [ 16.205064] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.205121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.205136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.205159] Call Trace: [ 16.205184] <TASK> [ 16.205203] dump_stack_lvl+0x73/0xb0 [ 16.205258] print_report+0xd1/0x650 [ 16.205289] ? __virt_addr_valid+0x1db/0x2d0 [ 16.205312] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.205336] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.205358] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.205381] kasan_report+0x141/0x180 [ 16.205404] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.205432] kasan_check_range+0x10c/0x1c0 [ 16.205451] __kasan_check_write+0x18/0x20 [ 16.205470] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.205494] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.205517] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.205539] ? trace_hardirqs_on+0x37/0xe0 [ 16.205573] ? kasan_bitops_generic+0x92/0x1c0 [ 16.205600] kasan_bitops_generic+0x121/0x1c0 [ 16.205620] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.205642] ? __pfx_read_tsc+0x10/0x10 [ 16.205661] ? ktime_get_ts64+0x86/0x230 [ 16.205687] kunit_try_run_case+0x1a5/0x480 [ 16.205712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.205734] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.205771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.205793] ? __kthread_parkme+0x82/0x180 [ 16.205815] ? preempt_count_sub+0x50/0x80 [ 16.205841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.205864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.205887] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.205910] kthread+0x337/0x6f0 [ 16.205927] ? trace_preempt_on+0x20/0xc0 [ 16.205949] ? __pfx_kthread+0x10/0x10 [ 16.205967] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.205987] ? calculate_sigpending+0x7b/0xa0 [ 16.206009] ? __pfx_kthread+0x10/0x10 [ 16.206026] ret_from_fork+0x41/0x80 [ 16.206047] ? __pfx_kthread+0x10/0x10 [ 16.206141] ret_from_fork_asm+0x1a/0x30 [ 16.206179] </TASK> [ 16.206192] [ 16.214200] Allocated by task 281: [ 16.214460] kasan_save_stack+0x45/0x70 [ 16.214614] kasan_save_track+0x18/0x40 [ 16.215342] kasan_save_alloc_info+0x3b/0x50 [ 16.215550] __kasan_kmalloc+0xb7/0xc0 [ 16.215800] __kmalloc_cache_noprof+0x189/0x420 [ 16.215902] kasan_bitops_generic+0x92/0x1c0 [ 16.215998] kunit_try_run_case+0x1a5/0x480 [ 16.216094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.216202] kthread+0x337/0x6f0 [ 16.216281] ret_from_fork+0x41/0x80 [ 16.216451] ret_from_fork_asm+0x1a/0x30 [ 16.217298] [ 16.217446] The buggy address belongs to the object at ffff888102497640 [ 16.217446] which belongs to the cache kmalloc-16 of size 16 [ 16.219577] The buggy address is located 8 bytes inside of [ 16.219577] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.220395] [ 16.220800] The buggy address belongs to the physical page: [ 16.221070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.221273] flags: 0x200000000000000(node=0|zone=2) [ 16.221408] page_type: f5(slab) [ 16.221522] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.222548] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.222971] page dumped because: kasan: bad access detected [ 16.223294] [ 16.223405] Memory state around the buggy address: [ 16.223606] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.223960] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.224851] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.225012] ^ [ 16.225280] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.225548] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.226366] ==================================================================