Date
June 24, 2025, 12:47 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.419263] ================================================================== [ 14.419648] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.420125] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.420420] [ 14.420562] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.421705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.421737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.421770] Call Trace: [ 14.421795] <TASK> [ 14.421821] dump_stack_lvl+0x73/0xb0 [ 14.421860] print_report+0xd1/0x650 [ 14.421883] ? __virt_addr_valid+0x1db/0x2d0 [ 14.421905] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.421928] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.421963] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.421987] kasan_report+0x141/0x180 [ 14.422009] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.422037] kasan_check_range+0x10c/0x1c0 [ 14.422057] __kasan_check_write+0x18/0x20 [ 14.422077] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.422098] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.422121] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.422141] ? trace_hardirqs_on+0x37/0xe0 [ 14.422163] ? kasan_bitops_generic+0x92/0x1c0 [ 14.422186] kasan_bitops_generic+0x121/0x1c0 [ 14.422205] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.422225] ? __pfx_read_tsc+0x10/0x10 [ 14.422245] ? ktime_get_ts64+0x86/0x230 [ 14.422270] kunit_try_run_case+0x1a5/0x480 [ 14.422304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.422325] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.422348] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.422370] ? __kthread_parkme+0x82/0x180 [ 14.422392] ? preempt_count_sub+0x50/0x80 [ 14.422416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.422437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.422459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.422480] kthread+0x337/0x6f0 [ 14.422497] ? trace_preempt_on+0x20/0xc0 [ 14.422517] ? __pfx_kthread+0x10/0x10 [ 14.422535] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.422565] ? calculate_sigpending+0x7b/0xa0 [ 14.422586] ? __pfx_kthread+0x10/0x10 [ 14.422604] ret_from_fork+0x41/0x80 [ 14.422638] ? __pfx_kthread+0x10/0x10 [ 14.422659] ret_from_fork_asm+0x1a/0x30 [ 14.422689] </TASK> [ 14.422703] [ 14.434513] Allocated by task 281: [ 14.434928] kasan_save_stack+0x45/0x70 [ 14.435279] kasan_save_track+0x18/0x40 [ 14.435445] kasan_save_alloc_info+0x3b/0x50 [ 14.435943] __kasan_kmalloc+0xb7/0xc0 [ 14.436335] __kmalloc_cache_noprof+0x189/0x420 [ 14.436548] kasan_bitops_generic+0x92/0x1c0 [ 14.436729] kunit_try_run_case+0x1a5/0x480 [ 14.436908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.437106] kthread+0x337/0x6f0 [ 14.437371] ret_from_fork+0x41/0x80 [ 14.437808] ret_from_fork_asm+0x1a/0x30 [ 14.438166] [ 14.438284] The buggy address belongs to the object at ffff888102662fc0 [ 14.438284] which belongs to the cache kmalloc-16 of size 16 [ 14.438981] The buggy address is located 8 bytes inside of [ 14.438981] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.439580] [ 14.439771] The buggy address belongs to the physical page: [ 14.440149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.440460] flags: 0x200000000000000(node=0|zone=2) [ 14.440681] page_type: f5(slab) [ 14.440951] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.441532] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.441972] page dumped because: kasan: bad access detected [ 14.442182] [ 14.442323] Memory state around the buggy address: [ 14.442692] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.443470] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.444082] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.444477] ^ [ 14.444924] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.445268] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.445711] ================================================================== [ 14.475214] ================================================================== [ 14.476207] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.476993] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.477538] [ 14.477871] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.477984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.478030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.478073] Call Trace: [ 14.478119] <TASK> [ 14.478161] dump_stack_lvl+0x73/0xb0 [ 14.478224] print_report+0xd1/0x650 [ 14.478287] ? __virt_addr_valid+0x1db/0x2d0 [ 14.478332] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.478377] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.478415] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.478459] kasan_report+0x141/0x180 [ 14.478501] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.478573] kasan_check_range+0x10c/0x1c0 [ 14.478613] __kasan_check_write+0x18/0x20 [ 14.478664] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.478711] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.478742] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.478771] ? trace_hardirqs_on+0x37/0xe0 [ 14.478799] ? kasan_bitops_generic+0x92/0x1c0 [ 14.478829] kasan_bitops_generic+0x121/0x1c0 [ 14.478859] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.478892] ? __pfx_read_tsc+0x10/0x10 [ 14.478917] ? ktime_get_ts64+0x86/0x230 [ 14.478941] kunit_try_run_case+0x1a5/0x480 [ 14.478968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.478988] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.479012] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.479034] ? __kthread_parkme+0x82/0x180 [ 14.479056] ? preempt_count_sub+0x50/0x80 [ 14.479080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.479102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.479124] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.479146] kthread+0x337/0x6f0 [ 14.479162] ? trace_preempt_on+0x20/0xc0 [ 14.479183] ? __pfx_kthread+0x10/0x10 [ 14.479200] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.479220] ? calculate_sigpending+0x7b/0xa0 [ 14.479242] ? __pfx_kthread+0x10/0x10 [ 14.479260] ret_from_fork+0x41/0x80 [ 14.479278] ? __pfx_kthread+0x10/0x10 [ 14.479295] ret_from_fork_asm+0x1a/0x30 [ 14.479327] </TASK> [ 14.479340] [ 14.489147] Allocated by task 281: [ 14.489373] kasan_save_stack+0x45/0x70 [ 14.489753] kasan_save_track+0x18/0x40 [ 14.490045] kasan_save_alloc_info+0x3b/0x50 [ 14.490375] __kasan_kmalloc+0xb7/0xc0 [ 14.490657] __kmalloc_cache_noprof+0x189/0x420 [ 14.490994] kasan_bitops_generic+0x92/0x1c0 [ 14.491294] kunit_try_run_case+0x1a5/0x480 [ 14.491522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.491795] kthread+0x337/0x6f0 [ 14.491956] ret_from_fork+0x41/0x80 [ 14.492124] ret_from_fork_asm+0x1a/0x30 [ 14.492399] [ 14.492556] The buggy address belongs to the object at ffff888102662fc0 [ 14.492556] which belongs to the cache kmalloc-16 of size 16 [ 14.493323] The buggy address is located 8 bytes inside of [ 14.493323] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.493789] [ 14.493896] The buggy address belongs to the physical page: [ 14.494152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.494693] flags: 0x200000000000000(node=0|zone=2) [ 14.495045] page_type: f5(slab) [ 14.495318] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.495885] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.496316] page dumped because: kasan: bad access detected [ 14.496610] [ 14.496726] Memory state around the buggy address: [ 14.496916] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.497161] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.497494] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.497956] ^ [ 14.498396] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.498636] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.498862] ================================================================== [ 14.328848] ================================================================== [ 14.330731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.331313] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.331718] [ 14.331868] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.331982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.332008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.332051] Call Trace: [ 14.332110] <TASK> [ 14.332164] dump_stack_lvl+0x73/0xb0 [ 14.332225] print_report+0xd1/0x650 [ 14.332279] ? __virt_addr_valid+0x1db/0x2d0 [ 14.332321] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.332367] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.332414] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.332464] kasan_report+0x141/0x180 [ 14.332511] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.332575] kasan_check_range+0x10c/0x1c0 [ 14.332613] __kasan_check_write+0x18/0x20 [ 14.332668] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.332726] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.332772] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.332823] ? trace_hardirqs_on+0x37/0xe0 [ 14.332867] ? kasan_bitops_generic+0x92/0x1c0 [ 14.332925] kasan_bitops_generic+0x121/0x1c0 [ 14.332974] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.333011] ? __pfx_read_tsc+0x10/0x10 [ 14.333049] ? ktime_get_ts64+0x86/0x230 [ 14.333094] kunit_try_run_case+0x1a5/0x480 [ 14.333140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.333184] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.333232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.333278] ? __kthread_parkme+0x82/0x180 [ 14.333323] ? preempt_count_sub+0x50/0x80 [ 14.333375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.333422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.333469] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.333510] kthread+0x337/0x6f0 [ 14.333537] ? trace_preempt_on+0x20/0xc0 [ 14.333575] ? __pfx_kthread+0x10/0x10 [ 14.333604] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.333655] ? calculate_sigpending+0x7b/0xa0 [ 14.333694] ? __pfx_kthread+0x10/0x10 [ 14.333729] ret_from_fork+0x41/0x80 [ 14.334075] ? __pfx_kthread+0x10/0x10 [ 14.334131] ret_from_fork_asm+0x1a/0x30 [ 14.334192] </TASK> [ 14.334215] [ 14.348095] Allocated by task 281: [ 14.348457] kasan_save_stack+0x45/0x70 [ 14.348924] kasan_save_track+0x18/0x40 [ 14.349080] kasan_save_alloc_info+0x3b/0x50 [ 14.349568] __kasan_kmalloc+0xb7/0xc0 [ 14.349937] __kmalloc_cache_noprof+0x189/0x420 [ 14.350363] kasan_bitops_generic+0x92/0x1c0 [ 14.350722] kunit_try_run_case+0x1a5/0x480 [ 14.351035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.351433] kthread+0x337/0x6f0 [ 14.351882] ret_from_fork+0x41/0x80 [ 14.352097] ret_from_fork_asm+0x1a/0x30 [ 14.352379] [ 14.352538] The buggy address belongs to the object at ffff888102662fc0 [ 14.352538] which belongs to the cache kmalloc-16 of size 16 [ 14.353330] The buggy address is located 8 bytes inside of [ 14.353330] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.354219] [ 14.354377] The buggy address belongs to the physical page: [ 14.354596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.355230] flags: 0x200000000000000(node=0|zone=2) [ 14.355635] page_type: f5(slab) [ 14.355931] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.356509] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.356941] page dumped because: kasan: bad access detected [ 14.357341] [ 14.357498] Memory state around the buggy address: [ 14.357851] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.358170] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.358616] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.359001] ^ [ 14.359336] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.360268] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.360502] ================================================================== [ 14.390078] ================================================================== [ 14.390384] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.390853] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.391337] [ 14.392153] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.392282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.392299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.392325] Call Trace: [ 14.392352] <TASK> [ 14.392378] dump_stack_lvl+0x73/0xb0 [ 14.392415] print_report+0xd1/0x650 [ 14.392439] ? __virt_addr_valid+0x1db/0x2d0 [ 14.392461] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.392483] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.392505] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.392529] kasan_report+0x141/0x180 [ 14.392948] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.393031] kasan_check_range+0x10c/0x1c0 [ 14.393079] __kasan_check_write+0x18/0x20 [ 14.393112] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.393137] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.393160] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.393182] ? trace_hardirqs_on+0x37/0xe0 [ 14.393204] ? kasan_bitops_generic+0x92/0x1c0 [ 14.393227] kasan_bitops_generic+0x121/0x1c0 [ 14.393247] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.393267] ? __pfx_read_tsc+0x10/0x10 [ 14.393287] ? ktime_get_ts64+0x86/0x230 [ 14.393310] kunit_try_run_case+0x1a5/0x480 [ 14.393336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.393356] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.393378] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.393400] ? __kthread_parkme+0x82/0x180 [ 14.393421] ? preempt_count_sub+0x50/0x80 [ 14.393445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.393466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.393488] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.393509] kthread+0x337/0x6f0 [ 14.393525] ? trace_preempt_on+0x20/0xc0 [ 14.393570] ? __pfx_kthread+0x10/0x10 [ 14.393589] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.393609] ? calculate_sigpending+0x7b/0xa0 [ 14.393649] ? __pfx_kthread+0x10/0x10 [ 14.393670] ret_from_fork+0x41/0x80 [ 14.393691] ? __pfx_kthread+0x10/0x10 [ 14.393708] ret_from_fork_asm+0x1a/0x30 [ 14.393738] </TASK> [ 14.393750] [ 14.406349] Allocated by task 281: [ 14.407126] kasan_save_stack+0x45/0x70 [ 14.407359] kasan_save_track+0x18/0x40 [ 14.407526] kasan_save_alloc_info+0x3b/0x50 [ 14.408013] __kasan_kmalloc+0xb7/0xc0 [ 14.408402] __kmalloc_cache_noprof+0x189/0x420 [ 14.408873] kasan_bitops_generic+0x92/0x1c0 [ 14.409099] kunit_try_run_case+0x1a5/0x480 [ 14.409308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.409542] kthread+0x337/0x6f0 [ 14.409727] ret_from_fork+0x41/0x80 [ 14.409897] ret_from_fork_asm+0x1a/0x30 [ 14.410104] [ 14.410203] The buggy address belongs to the object at ffff888102662fc0 [ 14.410203] which belongs to the cache kmalloc-16 of size 16 [ 14.411782] The buggy address is located 8 bytes inside of [ 14.411782] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.412402] [ 14.412548] The buggy address belongs to the physical page: [ 14.412805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.413124] flags: 0x200000000000000(node=0|zone=2) [ 14.413370] page_type: f5(slab) [ 14.413707] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.414049] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.414306] page dumped because: kasan: bad access detected [ 14.414674] [ 14.414845] Memory state around the buggy address: [ 14.415272] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.415804] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.416196] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.416696] ^ [ 14.417087] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.417483] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.417918] ================================================================== [ 14.362759] ================================================================== [ 14.363061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.363323] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.363503] [ 14.363725] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.363818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.363842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.363885] Call Trace: [ 14.363925] <TASK> [ 14.363960] dump_stack_lvl+0x73/0xb0 [ 14.364043] print_report+0xd1/0x650 [ 14.364089] ? __virt_addr_valid+0x1db/0x2d0 [ 14.364146] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.364192] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.364240] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.364289] kasan_report+0x141/0x180 [ 14.364331] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.364360] kasan_check_range+0x10c/0x1c0 [ 14.364380] __kasan_check_write+0x18/0x20 [ 14.364400] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.364423] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.364448] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.364469] ? trace_hardirqs_on+0x37/0xe0 [ 14.364491] ? kasan_bitops_generic+0x92/0x1c0 [ 14.364514] kasan_bitops_generic+0x121/0x1c0 [ 14.364533] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.364578] ? __pfx_read_tsc+0x10/0x10 [ 14.364609] ? ktime_get_ts64+0x86/0x230 [ 14.364667] kunit_try_run_case+0x1a5/0x480 [ 14.364713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.364752] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.364794] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.364840] ? __kthread_parkme+0x82/0x180 [ 14.364880] ? preempt_count_sub+0x50/0x80 [ 14.364928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.364973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.365013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.365047] kthread+0x337/0x6f0 [ 14.365078] ? trace_preempt_on+0x20/0xc0 [ 14.365121] ? __pfx_kthread+0x10/0x10 [ 14.365159] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.365201] ? calculate_sigpending+0x7b/0xa0 [ 14.365246] ? __pfx_kthread+0x10/0x10 [ 14.365283] ret_from_fork+0x41/0x80 [ 14.365324] ? __pfx_kthread+0x10/0x10 [ 14.365356] ret_from_fork_asm+0x1a/0x30 [ 14.365395] </TASK> [ 14.365413] [ 14.377975] Allocated by task 281: [ 14.378339] kasan_save_stack+0x45/0x70 [ 14.378672] kasan_save_track+0x18/0x40 [ 14.379062] kasan_save_alloc_info+0x3b/0x50 [ 14.379349] __kasan_kmalloc+0xb7/0xc0 [ 14.379566] __kmalloc_cache_noprof+0x189/0x420 [ 14.379817] kasan_bitops_generic+0x92/0x1c0 [ 14.380013] kunit_try_run_case+0x1a5/0x480 [ 14.380224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.380464] kthread+0x337/0x6f0 [ 14.380710] ret_from_fork+0x41/0x80 [ 14.381371] ret_from_fork_asm+0x1a/0x30 [ 14.381620] [ 14.382137] The buggy address belongs to the object at ffff888102662fc0 [ 14.382137] which belongs to the cache kmalloc-16 of size 16 [ 14.382795] The buggy address is located 8 bytes inside of [ 14.382795] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.383268] [ 14.383372] The buggy address belongs to the physical page: [ 14.383697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.384238] flags: 0x200000000000000(node=0|zone=2) [ 14.384449] page_type: f5(slab) [ 14.384683] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.384944] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.385260] page dumped because: kasan: bad access detected [ 14.385726] [ 14.385899] Memory state around the buggy address: [ 14.386289] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.386865] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.387345] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.387609] ^ [ 14.387903] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.388293] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.388635] ================================================================== [ 14.447685] ================================================================== [ 14.448166] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.449299] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.449742] [ 14.450172] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.450248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.450269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.450309] Call Trace: [ 14.450372] <TASK> [ 14.450402] dump_stack_lvl+0x73/0xb0 [ 14.450441] print_report+0xd1/0x650 [ 14.450471] ? __virt_addr_valid+0x1db/0x2d0 [ 14.450493] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.450526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.450657] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.450712] kasan_report+0x141/0x180 [ 14.450737] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.450765] kasan_check_range+0x10c/0x1c0 [ 14.450784] __kasan_check_write+0x18/0x20 [ 14.450803] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.450825] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.450847] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.450868] ? trace_hardirqs_on+0x37/0xe0 [ 14.450890] ? kasan_bitops_generic+0x92/0x1c0 [ 14.450912] kasan_bitops_generic+0x121/0x1c0 [ 14.450932] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.450952] ? __pfx_read_tsc+0x10/0x10 [ 14.450970] ? ktime_get_ts64+0x86/0x230 [ 14.450994] kunit_try_run_case+0x1a5/0x480 [ 14.451019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.451039] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.451061] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.451083] ? __kthread_parkme+0x82/0x180 [ 14.451104] ? preempt_count_sub+0x50/0x80 [ 14.451128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.451149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.451171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.451192] kthread+0x337/0x6f0 [ 14.451209] ? trace_preempt_on+0x20/0xc0 [ 14.451229] ? __pfx_kthread+0x10/0x10 [ 14.451246] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.451266] ? calculate_sigpending+0x7b/0xa0 [ 14.451287] ? __pfx_kthread+0x10/0x10 [ 14.451304] ret_from_fork+0x41/0x80 [ 14.451323] ? __pfx_kthread+0x10/0x10 [ 14.451340] ret_from_fork_asm+0x1a/0x30 [ 14.451369] </TASK> [ 14.451382] [ 14.462534] Allocated by task 281: [ 14.462977] kasan_save_stack+0x45/0x70 [ 14.463365] kasan_save_track+0x18/0x40 [ 14.463765] kasan_save_alloc_info+0x3b/0x50 [ 14.464170] __kasan_kmalloc+0xb7/0xc0 [ 14.464344] __kmalloc_cache_noprof+0x189/0x420 [ 14.464754] kasan_bitops_generic+0x92/0x1c0 [ 14.464941] kunit_try_run_case+0x1a5/0x480 [ 14.465338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.465601] kthread+0x337/0x6f0 [ 14.465912] ret_from_fork+0x41/0x80 [ 14.466129] ret_from_fork_asm+0x1a/0x30 [ 14.466507] [ 14.466664] The buggy address belongs to the object at ffff888102662fc0 [ 14.466664] which belongs to the cache kmalloc-16 of size 16 [ 14.467035] The buggy address is located 8 bytes inside of [ 14.467035] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.467873] [ 14.468042] The buggy address belongs to the physical page: [ 14.468419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.468860] flags: 0x200000000000000(node=0|zone=2) [ 14.469072] page_type: f5(slab) [ 14.469241] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.469645] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.470187] page dumped because: kasan: bad access detected [ 14.470602] [ 14.470801] Memory state around the buggy address: [ 14.471066] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.471311] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.471903] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.472398] ^ [ 14.472842] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.473319] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.473786] ================================================================== [ 14.500204] ================================================================== [ 14.501528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.502160] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.502658] [ 14.502852] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.502945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.502970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.503011] Call Trace: [ 14.503056] <TASK> [ 14.503096] dump_stack_lvl+0x73/0xb0 [ 14.503150] print_report+0xd1/0x650 [ 14.503197] ? __virt_addr_valid+0x1db/0x2d0 [ 14.503244] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.503287] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.503330] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.503373] kasan_report+0x141/0x180 [ 14.503418] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.503475] kasan_check_range+0x10c/0x1c0 [ 14.503516] __kasan_check_write+0x18/0x20 [ 14.503550] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.503585] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.504092] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.504176] ? trace_hardirqs_on+0x37/0xe0 [ 14.504224] ? kasan_bitops_generic+0x92/0x1c0 [ 14.504276] kasan_bitops_generic+0x121/0x1c0 [ 14.504316] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.504360] ? __pfx_read_tsc+0x10/0x10 [ 14.504400] ? ktime_get_ts64+0x86/0x230 [ 14.504451] kunit_try_run_case+0x1a5/0x480 [ 14.504502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.504544] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.504588] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.504648] ? __kthread_parkme+0x82/0x180 [ 14.504695] ? preempt_count_sub+0x50/0x80 [ 14.504745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.504792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.504839] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.504881] kthread+0x337/0x6f0 [ 14.504913] ? trace_preempt_on+0x20/0xc0 [ 14.504957] ? __pfx_kthread+0x10/0x10 [ 14.504993] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.505030] ? calculate_sigpending+0x7b/0xa0 [ 14.505053] ? __pfx_kthread+0x10/0x10 [ 14.505070] ret_from_fork+0x41/0x80 [ 14.505090] ? __pfx_kthread+0x10/0x10 [ 14.505107] ret_from_fork_asm+0x1a/0x30 [ 14.505135] </TASK> [ 14.505147] [ 14.515073] Allocated by task 281: [ 14.515394] kasan_save_stack+0x45/0x70 [ 14.515861] kasan_save_track+0x18/0x40 [ 14.516027] kasan_save_alloc_info+0x3b/0x50 [ 14.516206] __kasan_kmalloc+0xb7/0xc0 [ 14.516369] __kmalloc_cache_noprof+0x189/0x420 [ 14.516722] kasan_bitops_generic+0x92/0x1c0 [ 14.517055] kunit_try_run_case+0x1a5/0x480 [ 14.517384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.517836] kthread+0x337/0x6f0 [ 14.518100] ret_from_fork+0x41/0x80 [ 14.518275] ret_from_fork_asm+0x1a/0x30 [ 14.518572] [ 14.518756] The buggy address belongs to the object at ffff888102662fc0 [ 14.518756] which belongs to the cache kmalloc-16 of size 16 [ 14.519258] The buggy address is located 8 bytes inside of [ 14.519258] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.519720] [ 14.519887] The buggy address belongs to the physical page: [ 14.520286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.520881] flags: 0x200000000000000(node=0|zone=2) [ 14.521153] page_type: f5(slab) [ 14.521335] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.521702] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.522222] page dumped because: kasan: bad access detected [ 14.522646] [ 14.522778] Memory state around the buggy address: [ 14.523065] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.523421] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.524016] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.524316] ^ [ 14.524772] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.525017] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.525248] ================================================================== [ 14.528465] ================================================================== [ 14.529050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.530259] Read of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.530903] [ 14.531111] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.531219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.531246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.531307] Call Trace: [ 14.531349] <TASK> [ 14.531388] dump_stack_lvl+0x73/0xb0 [ 14.531463] print_report+0xd1/0x650 [ 14.531523] ? __virt_addr_valid+0x1db/0x2d0 [ 14.531574] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.531616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.531684] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.531732] kasan_report+0x141/0x180 [ 14.531791] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.531846] kasan_check_range+0x10c/0x1c0 [ 14.531895] __kasan_check_read+0x15/0x20 [ 14.531938] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.532000] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.532051] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.532075] ? trace_hardirqs_on+0x37/0xe0 [ 14.532099] ? kasan_bitops_generic+0x92/0x1c0 [ 14.532122] kasan_bitops_generic+0x121/0x1c0 [ 14.532142] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.532163] ? __pfx_read_tsc+0x10/0x10 [ 14.532189] ? ktime_get_ts64+0x86/0x230 [ 14.532230] kunit_try_run_case+0x1a5/0x480 [ 14.532277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.532317] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.532363] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.532405] ? __kthread_parkme+0x82/0x180 [ 14.532442] ? preempt_count_sub+0x50/0x80 [ 14.532483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.532525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.532582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.532638] kthread+0x337/0x6f0 [ 14.532675] ? trace_preempt_on+0x20/0xc0 [ 14.532723] ? __pfx_kthread+0x10/0x10 [ 14.532751] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.532772] ? calculate_sigpending+0x7b/0xa0 [ 14.532794] ? __pfx_kthread+0x10/0x10 [ 14.532812] ret_from_fork+0x41/0x80 [ 14.532832] ? __pfx_kthread+0x10/0x10 [ 14.532850] ret_from_fork_asm+0x1a/0x30 [ 14.532880] </TASK> [ 14.532893] [ 14.542201] Allocated by task 281: [ 14.542434] kasan_save_stack+0x45/0x70 [ 14.542780] kasan_save_track+0x18/0x40 [ 14.543055] kasan_save_alloc_info+0x3b/0x50 [ 14.543378] __kasan_kmalloc+0xb7/0xc0 [ 14.543693] __kmalloc_cache_noprof+0x189/0x420 [ 14.544063] kasan_bitops_generic+0x92/0x1c0 [ 14.544266] kunit_try_run_case+0x1a5/0x480 [ 14.544568] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.544803] kthread+0x337/0x6f0 [ 14.544958] ret_from_fork+0x41/0x80 [ 14.545212] ret_from_fork_asm+0x1a/0x30 [ 14.545481] [ 14.545662] The buggy address belongs to the object at ffff888102662fc0 [ 14.545662] which belongs to the cache kmalloc-16 of size 16 [ 14.546176] The buggy address is located 8 bytes inside of [ 14.546176] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.546548] [ 14.546669] The buggy address belongs to the physical page: [ 14.547138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.547655] flags: 0x200000000000000(node=0|zone=2) [ 14.548134] page_type: f5(slab) [ 14.548299] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.548538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.550318] page dumped because: kasan: bad access detected [ 14.550555] [ 14.550676] Memory state around the buggy address: [ 14.551037] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.551372] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.552181] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.552872] ^ [ 14.553243] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.553504] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.553954] ================================================================== [ 14.555742] ================================================================== [ 14.556104] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.556519] Read of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.556945] [ 14.557103] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.557202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.557224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.557265] Call Trace: [ 14.557299] <TASK> [ 14.557336] dump_stack_lvl+0x73/0xb0 [ 14.557393] print_report+0xd1/0x650 [ 14.557433] ? __virt_addr_valid+0x1db/0x2d0 [ 14.557469] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.557508] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.557582] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.557611] kasan_report+0x141/0x180 [ 14.557662] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.557710] __asan_report_load8_noabort+0x18/0x20 [ 14.557749] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.557789] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.557829] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.557866] ? trace_hardirqs_on+0x37/0xe0 [ 14.557903] ? kasan_bitops_generic+0x92/0x1c0 [ 14.557957] kasan_bitops_generic+0x121/0x1c0 [ 14.557998] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.558035] ? __pfx_read_tsc+0x10/0x10 [ 14.558074] ? ktime_get_ts64+0x86/0x230 [ 14.558118] kunit_try_run_case+0x1a5/0x480 [ 14.558167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.558206] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.558244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.558267] ? __kthread_parkme+0x82/0x180 [ 14.558290] ? preempt_count_sub+0x50/0x80 [ 14.558314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.558335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.558357] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.558378] kthread+0x337/0x6f0 [ 14.558395] ? trace_preempt_on+0x20/0xc0 [ 14.558416] ? __pfx_kthread+0x10/0x10 [ 14.558434] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.558454] ? calculate_sigpending+0x7b/0xa0 [ 14.558474] ? __pfx_kthread+0x10/0x10 [ 14.558491] ret_from_fork+0x41/0x80 [ 14.558510] ? __pfx_kthread+0x10/0x10 [ 14.558527] ret_from_fork_asm+0x1a/0x30 [ 14.558578] </TASK> [ 14.558593] [ 14.567353] Allocated by task 281: [ 14.567571] kasan_save_stack+0x45/0x70 [ 14.567918] kasan_save_track+0x18/0x40 [ 14.568210] kasan_save_alloc_info+0x3b/0x50 [ 14.568534] __kasan_kmalloc+0xb7/0xc0 [ 14.568895] __kmalloc_cache_noprof+0x189/0x420 [ 14.569238] kasan_bitops_generic+0x92/0x1c0 [ 14.569548] kunit_try_run_case+0x1a5/0x480 [ 14.569874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.570084] kthread+0x337/0x6f0 [ 14.570330] ret_from_fork+0x41/0x80 [ 14.570568] ret_from_fork_asm+0x1a/0x30 [ 14.570776] [ 14.570923] The buggy address belongs to the object at ffff888102662fc0 [ 14.570923] which belongs to the cache kmalloc-16 of size 16 [ 14.571470] The buggy address is located 8 bytes inside of [ 14.571470] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.572251] [ 14.572435] The buggy address belongs to the physical page: [ 14.572763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.573183] flags: 0x200000000000000(node=0|zone=2) [ 14.573439] page_type: f5(slab) [ 14.573717] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.574207] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.574645] page dumped because: kasan: bad access detected [ 14.574994] [ 14.575154] Memory state around the buggy address: [ 14.575477] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.575837] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.576275] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.576696] ^ [ 14.576969] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.577214] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.577447] ==================================================================