Date
July 3, 2025, 3:13 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.429728] ================================================================== [ 13.430019] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.430466] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.430694] [ 13.430781] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.430825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.430837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.430859] Call Trace: [ 13.430874] <TASK> [ 13.430889] dump_stack_lvl+0x73/0xb0 [ 13.430913] print_report+0xd1/0x650 [ 13.430936] ? __virt_addr_valid+0x1db/0x2d0 [ 13.430957] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.430980] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.431004] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.431029] kasan_report+0x141/0x180 [ 13.431052] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.431082] kasan_check_range+0x10c/0x1c0 [ 13.431102] __kasan_check_write+0x18/0x20 [ 13.431122] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.431147] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.431172] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.431193] ? trace_hardirqs_on+0x37/0xe0 [ 13.431217] ? kasan_bitops_generic+0x92/0x1c0 [ 13.431254] kasan_bitops_generic+0x121/0x1c0 [ 13.431275] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.431297] ? __pfx_read_tsc+0x10/0x10 [ 13.431317] ? ktime_get_ts64+0x86/0x230 [ 13.431342] kunit_try_run_case+0x1a5/0x480 [ 13.431367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.431389] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.431416] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.431440] ? __kthread_parkme+0x82/0x180 [ 13.431462] ? preempt_count_sub+0x50/0x80 [ 13.431488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.431512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.431536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.431559] kthread+0x337/0x6f0 [ 13.431576] ? trace_preempt_on+0x20/0xc0 [ 13.431599] ? __pfx_kthread+0x10/0x10 [ 13.431618] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.431640] ? calculate_sigpending+0x7b/0xa0 [ 13.431662] ? __pfx_kthread+0x10/0x10 [ 13.431681] ret_from_fork+0x41/0x80 [ 13.431703] ? __pfx_kthread+0x10/0x10 [ 13.431721] ret_from_fork_asm+0x1a/0x30 [ 13.431753] </TASK> [ 13.431763] [ 13.440515] Allocated by task 280: [ 13.440657] kasan_save_stack+0x45/0x70 [ 13.440935] kasan_save_track+0x18/0x40 [ 13.441210] kasan_save_alloc_info+0x3b/0x50 [ 13.441540] __kasan_kmalloc+0xb7/0xc0 [ 13.441692] __kmalloc_cache_noprof+0x189/0x420 [ 13.441845] kasan_bitops_generic+0x92/0x1c0 [ 13.441991] kunit_try_run_case+0x1a5/0x480 [ 13.442137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.442638] kthread+0x337/0x6f0 [ 13.442815] ret_from_fork+0x41/0x80 [ 13.442999] ret_from_fork_asm+0x1a/0x30 [ 13.443193] [ 13.443386] The buggy address belongs to the object at ffff888102307e00 [ 13.443386] which belongs to the cache kmalloc-16 of size 16 [ 13.443887] The buggy address is located 8 bytes inside of [ 13.443887] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.444249] [ 13.445044] The buggy address belongs to the physical page: [ 13.445643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.446015] flags: 0x200000000000000(node=0|zone=2) [ 13.446592] page_type: f5(slab) [ 13.447041] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.447617] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.447943] page dumped because: kasan: bad access detected [ 13.448177] [ 13.448279] Memory state around the buggy address: [ 13.448489] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.449260] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.450169] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.450737] ^ [ 13.450911] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.451207] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.451438] ================================================================== [ 13.594597] ================================================================== [ 13.595311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.596015] Read of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.596818] [ 13.596968] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.597017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.597029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.597082] Call Trace: [ 13.597101] <TASK> [ 13.597121] dump_stack_lvl+0x73/0xb0 [ 13.597149] print_report+0xd1/0x650 [ 13.597173] ? __virt_addr_valid+0x1db/0x2d0 [ 13.597195] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.597219] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.597254] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.597476] kasan_report+0x141/0x180 [ 13.597504] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.597534] __asan_report_load8_noabort+0x18/0x20 [ 13.597561] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.597587] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.597613] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.597658] ? trace_hardirqs_on+0x37/0xe0 [ 13.597681] ? kasan_bitops_generic+0x92/0x1c0 [ 13.597706] kasan_bitops_generic+0x121/0x1c0 [ 13.597727] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.597749] ? __pfx_read_tsc+0x10/0x10 [ 13.597770] ? ktime_get_ts64+0x86/0x230 [ 13.597795] kunit_try_run_case+0x1a5/0x480 [ 13.597821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.597843] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.597869] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.597893] ? __kthread_parkme+0x82/0x180 [ 13.597916] ? preempt_count_sub+0x50/0x80 [ 13.597941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.597965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.597990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.598013] kthread+0x337/0x6f0 [ 13.598030] ? trace_preempt_on+0x20/0xc0 [ 13.598053] ? __pfx_kthread+0x10/0x10 [ 13.598071] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.598093] ? calculate_sigpending+0x7b/0xa0 [ 13.598116] ? __pfx_kthread+0x10/0x10 [ 13.598134] ret_from_fork+0x41/0x80 [ 13.598155] ? __pfx_kthread+0x10/0x10 [ 13.598173] ret_from_fork_asm+0x1a/0x30 [ 13.598205] </TASK> [ 13.598216] [ 13.613756] Allocated by task 280: [ 13.614147] kasan_save_stack+0x45/0x70 [ 13.614474] kasan_save_track+0x18/0x40 [ 13.614622] kasan_save_alloc_info+0x3b/0x50 [ 13.615024] __kasan_kmalloc+0xb7/0xc0 [ 13.615458] __kmalloc_cache_noprof+0x189/0x420 [ 13.616015] kasan_bitops_generic+0x92/0x1c0 [ 13.616474] kunit_try_run_case+0x1a5/0x480 [ 13.616811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.616990] kthread+0x337/0x6f0 [ 13.617109] ret_from_fork+0x41/0x80 [ 13.617253] ret_from_fork_asm+0x1a/0x30 [ 13.617906] [ 13.618093] The buggy address belongs to the object at ffff888102307e00 [ 13.618093] which belongs to the cache kmalloc-16 of size 16 [ 13.619346] The buggy address is located 8 bytes inside of [ 13.619346] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.620755] [ 13.620927] The buggy address belongs to the physical page: [ 13.621575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.621954] flags: 0x200000000000000(node=0|zone=2) [ 13.622119] page_type: f5(slab) [ 13.622254] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.622531] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.622818] page dumped because: kasan: bad access detected [ 13.623488] [ 13.623823] Memory state around the buggy address: [ 13.624413] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.625210] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.626127] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.626932] ^ [ 13.627623] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.628351] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.629107] ================================================================== [ 13.544282] ================================================================== [ 13.544728] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.545089] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.545496] [ 13.545630] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.545675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.545688] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.545710] Call Trace: [ 13.545727] <TASK> [ 13.545753] dump_stack_lvl+0x73/0xb0 [ 13.545778] print_report+0xd1/0x650 [ 13.545801] ? __virt_addr_valid+0x1db/0x2d0 [ 13.545835] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.545859] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.545882] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.545917] kasan_report+0x141/0x180 [ 13.545940] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.545969] kasan_check_range+0x10c/0x1c0 [ 13.546001] __kasan_check_write+0x18/0x20 [ 13.546022] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.546047] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.546072] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.546094] ? trace_hardirqs_on+0x37/0xe0 [ 13.546117] ? kasan_bitops_generic+0x92/0x1c0 [ 13.546152] kasan_bitops_generic+0x121/0x1c0 [ 13.546172] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.546193] ? __pfx_read_tsc+0x10/0x10 [ 13.546224] ? ktime_get_ts64+0x86/0x230 [ 13.546274] kunit_try_run_case+0x1a5/0x480 [ 13.546298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.546320] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.546346] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.546370] ? __kthread_parkme+0x82/0x180 [ 13.546392] ? preempt_count_sub+0x50/0x80 [ 13.546419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.546443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.546466] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.546490] kthread+0x337/0x6f0 [ 13.546507] ? trace_preempt_on+0x20/0xc0 [ 13.546530] ? __pfx_kthread+0x10/0x10 [ 13.546549] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.546572] ? calculate_sigpending+0x7b/0xa0 [ 13.546594] ? __pfx_kthread+0x10/0x10 [ 13.546613] ret_from_fork+0x41/0x80 [ 13.546633] ? __pfx_kthread+0x10/0x10 [ 13.546652] ret_from_fork_asm+0x1a/0x30 [ 13.546683] </TASK> [ 13.546693] [ 13.556208] Allocated by task 280: [ 13.556455] kasan_save_stack+0x45/0x70 [ 13.556619] kasan_save_track+0x18/0x40 [ 13.556806] kasan_save_alloc_info+0x3b/0x50 [ 13.557132] __kasan_kmalloc+0xb7/0xc0 [ 13.557408] __kmalloc_cache_noprof+0x189/0x420 [ 13.557629] kasan_bitops_generic+0x92/0x1c0 [ 13.557838] kunit_try_run_case+0x1a5/0x480 [ 13.558045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.558315] kthread+0x337/0x6f0 [ 13.558593] ret_from_fork+0x41/0x80 [ 13.558806] ret_from_fork_asm+0x1a/0x30 [ 13.558979] [ 13.559075] The buggy address belongs to the object at ffff888102307e00 [ 13.559075] which belongs to the cache kmalloc-16 of size 16 [ 13.559792] The buggy address is located 8 bytes inside of [ 13.559792] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.560303] [ 13.560407] The buggy address belongs to the physical page: [ 13.560764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.561194] flags: 0x200000000000000(node=0|zone=2) [ 13.561435] page_type: f5(slab) [ 13.561637] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.562240] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.562727] page dumped because: kasan: bad access detected [ 13.562996] [ 13.563068] Memory state around the buggy address: [ 13.563330] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.563876] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.564184] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.564630] ^ [ 13.564821] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.565107] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.565479] ================================================================== [ 13.475342] ================================================================== [ 13.475770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.476164] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.476515] [ 13.476834] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.476899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.476912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.476933] Call Trace: [ 13.476952] <TASK> [ 13.476969] dump_stack_lvl+0x73/0xb0 [ 13.476996] print_report+0xd1/0x650 [ 13.477029] ? __virt_addr_valid+0x1db/0x2d0 [ 13.477051] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.477078] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.477112] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.477137] kasan_report+0x141/0x180 [ 13.477161] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.477198] kasan_check_range+0x10c/0x1c0 [ 13.477219] __kasan_check_write+0x18/0x20 [ 13.477257] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.477299] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.477328] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.477349] ? trace_hardirqs_on+0x37/0xe0 [ 13.477372] ? kasan_bitops_generic+0x92/0x1c0 [ 13.477406] kasan_bitops_generic+0x121/0x1c0 [ 13.477428] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.477524] ? __pfx_read_tsc+0x10/0x10 [ 13.477558] ? ktime_get_ts64+0x86/0x230 [ 13.477584] kunit_try_run_case+0x1a5/0x480 [ 13.477610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.477635] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.477671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.477695] ? __kthread_parkme+0x82/0x180 [ 13.477728] ? preempt_count_sub+0x50/0x80 [ 13.477754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.477779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.477801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.477825] kthread+0x337/0x6f0 [ 13.477842] ? trace_preempt_on+0x20/0xc0 [ 13.477864] ? __pfx_kthread+0x10/0x10 [ 13.477884] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.477906] ? calculate_sigpending+0x7b/0xa0 [ 13.477929] ? __pfx_kthread+0x10/0x10 [ 13.477947] ret_from_fork+0x41/0x80 [ 13.477968] ? __pfx_kthread+0x10/0x10 [ 13.477987] ret_from_fork_asm+0x1a/0x30 [ 13.478028] </TASK> [ 13.478038] [ 13.487543] Allocated by task 280: [ 13.487846] kasan_save_stack+0x45/0x70 [ 13.488042] kasan_save_track+0x18/0x40 [ 13.488202] kasan_save_alloc_info+0x3b/0x50 [ 13.488739] __kasan_kmalloc+0xb7/0xc0 [ 13.488930] __kmalloc_cache_noprof+0x189/0x420 [ 13.489150] kasan_bitops_generic+0x92/0x1c0 [ 13.489361] kunit_try_run_case+0x1a5/0x480 [ 13.489689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.489886] kthread+0x337/0x6f0 [ 13.490006] ret_from_fork+0x41/0x80 [ 13.490140] ret_from_fork_asm+0x1a/0x30 [ 13.490362] [ 13.490489] The buggy address belongs to the object at ffff888102307e00 [ 13.490489] which belongs to the cache kmalloc-16 of size 16 [ 13.491072] The buggy address is located 8 bytes inside of [ 13.491072] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.491602] [ 13.491768] The buggy address belongs to the physical page: [ 13.492055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.492898] flags: 0x200000000000000(node=0|zone=2) [ 13.493158] page_type: f5(slab) [ 13.493414] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.493805] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.494146] page dumped because: kasan: bad access detected [ 13.494480] [ 13.494580] Memory state around the buggy address: [ 13.494876] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.495167] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.495648] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.495959] ^ [ 13.496144] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.496478] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.496821] ================================================================== [ 13.452737] ================================================================== [ 13.453272] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.453955] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.454369] [ 13.454468] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.454524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.454537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.454558] Call Trace: [ 13.454583] <TASK> [ 13.454599] dump_stack_lvl+0x73/0xb0 [ 13.454625] print_report+0xd1/0x650 [ 13.454648] ? __virt_addr_valid+0x1db/0x2d0 [ 13.454669] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.454703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.454726] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.454751] kasan_report+0x141/0x180 [ 13.454783] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.454814] kasan_check_range+0x10c/0x1c0 [ 13.454836] __kasan_check_write+0x18/0x20 [ 13.454856] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.454890] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.454916] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.454947] ? trace_hardirqs_on+0x37/0xe0 [ 13.454969] ? kasan_bitops_generic+0x92/0x1c0 [ 13.454994] kasan_bitops_generic+0x121/0x1c0 [ 13.455014] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.455037] ? __pfx_read_tsc+0x10/0x10 [ 13.455066] ? ktime_get_ts64+0x86/0x230 [ 13.455092] kunit_try_run_case+0x1a5/0x480 [ 13.455117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.455150] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.455175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.455199] ? __kthread_parkme+0x82/0x180 [ 13.455221] ? preempt_count_sub+0x50/0x80 [ 13.455257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.455354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.455383] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.455407] kthread+0x337/0x6f0 [ 13.455426] ? trace_preempt_on+0x20/0xc0 [ 13.455448] ? __pfx_kthread+0x10/0x10 [ 13.455467] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.455491] ? calculate_sigpending+0x7b/0xa0 [ 13.455513] ? __pfx_kthread+0x10/0x10 [ 13.455532] ret_from_fork+0x41/0x80 [ 13.455553] ? __pfx_kthread+0x10/0x10 [ 13.455571] ret_from_fork_asm+0x1a/0x30 [ 13.455602] </TASK> [ 13.455612] [ 13.465640] Allocated by task 280: [ 13.465778] kasan_save_stack+0x45/0x70 [ 13.466214] kasan_save_track+0x18/0x40 [ 13.466399] kasan_save_alloc_info+0x3b/0x50 [ 13.466679] __kasan_kmalloc+0xb7/0xc0 [ 13.466925] __kmalloc_cache_noprof+0x189/0x420 [ 13.467120] kasan_bitops_generic+0x92/0x1c0 [ 13.467359] kunit_try_run_case+0x1a5/0x480 [ 13.467608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.467864] kthread+0x337/0x6f0 [ 13.468046] ret_from_fork+0x41/0x80 [ 13.468247] ret_from_fork_asm+0x1a/0x30 [ 13.468795] [ 13.468892] The buggy address belongs to the object at ffff888102307e00 [ 13.468892] which belongs to the cache kmalloc-16 of size 16 [ 13.469488] The buggy address is located 8 bytes inside of [ 13.469488] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.470052] [ 13.470166] The buggy address belongs to the physical page: [ 13.470425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.470930] flags: 0x200000000000000(node=0|zone=2) [ 13.471170] page_type: f5(slab) [ 13.471442] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.471813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.472147] page dumped because: kasan: bad access detected [ 13.472562] [ 13.472775] Memory state around the buggy address: [ 13.473027] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.473274] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.473498] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.473912] ^ [ 13.474091] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.474486] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.474822] ================================================================== [ 13.521790] ================================================================== [ 13.522254] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.522638] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.523054] [ 13.523220] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.523294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.523306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.523330] Call Trace: [ 13.523350] <TASK> [ 13.523485] dump_stack_lvl+0x73/0xb0 [ 13.523525] print_report+0xd1/0x650 [ 13.523550] ? __virt_addr_valid+0x1db/0x2d0 [ 13.523572] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.523598] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.523623] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.523647] kasan_report+0x141/0x180 [ 13.523670] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.523699] kasan_check_range+0x10c/0x1c0 [ 13.523721] __kasan_check_write+0x18/0x20 [ 13.523741] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.523766] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.523792] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.523814] ? trace_hardirqs_on+0x37/0xe0 [ 13.523836] ? kasan_bitops_generic+0x92/0x1c0 [ 13.523861] kasan_bitops_generic+0x121/0x1c0 [ 13.523881] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.523903] ? __pfx_read_tsc+0x10/0x10 [ 13.523923] ? ktime_get_ts64+0x86/0x230 [ 13.523950] kunit_try_run_case+0x1a5/0x480 [ 13.524096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.524121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.524145] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.524170] ? __kthread_parkme+0x82/0x180 [ 13.524192] ? preempt_count_sub+0x50/0x80 [ 13.524218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.524252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.524326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.524354] kthread+0x337/0x6f0 [ 13.524373] ? trace_preempt_on+0x20/0xc0 [ 13.524396] ? __pfx_kthread+0x10/0x10 [ 13.524414] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.524436] ? calculate_sigpending+0x7b/0xa0 [ 13.524459] ? __pfx_kthread+0x10/0x10 [ 13.524478] ret_from_fork+0x41/0x80 [ 13.524499] ? __pfx_kthread+0x10/0x10 [ 13.524518] ret_from_fork_asm+0x1a/0x30 [ 13.524549] </TASK> [ 13.524560] [ 13.534368] Allocated by task 280: [ 13.534612] kasan_save_stack+0x45/0x70 [ 13.534867] kasan_save_track+0x18/0x40 [ 13.535062] kasan_save_alloc_info+0x3b/0x50 [ 13.535275] __kasan_kmalloc+0xb7/0xc0 [ 13.535543] __kmalloc_cache_noprof+0x189/0x420 [ 13.535960] kasan_bitops_generic+0x92/0x1c0 [ 13.536167] kunit_try_run_case+0x1a5/0x480 [ 13.536419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.536766] kthread+0x337/0x6f0 [ 13.536968] ret_from_fork+0x41/0x80 [ 13.537099] ret_from_fork_asm+0x1a/0x30 [ 13.537250] [ 13.537331] The buggy address belongs to the object at ffff888102307e00 [ 13.537331] which belongs to the cache kmalloc-16 of size 16 [ 13.538144] The buggy address is located 8 bytes inside of [ 13.538144] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.538508] [ 13.538582] The buggy address belongs to the physical page: [ 13.538857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.539264] flags: 0x200000000000000(node=0|zone=2) [ 13.539520] page_type: f5(slab) [ 13.539863] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.540270] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.540775] page dumped because: kasan: bad access detected [ 13.541053] [ 13.541143] Memory state around the buggy address: [ 13.541415] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.541823] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.542155] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.542680] ^ [ 13.542815] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.543033] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.543442] ================================================================== [ 13.409565] ================================================================== [ 13.409904] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.410274] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.410861] [ 13.410957] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.411005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.411017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.411038] Call Trace: [ 13.411055] <TASK> [ 13.411073] dump_stack_lvl+0x73/0xb0 [ 13.411101] print_report+0xd1/0x650 [ 13.411123] ? __virt_addr_valid+0x1db/0x2d0 [ 13.411146] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.411171] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.411194] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.411219] kasan_report+0x141/0x180 [ 13.411255] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.411285] kasan_check_range+0x10c/0x1c0 [ 13.411306] __kasan_check_write+0x18/0x20 [ 13.411325] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.411350] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.411375] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.411473] ? trace_hardirqs_on+0x37/0xe0 [ 13.411497] ? kasan_bitops_generic+0x92/0x1c0 [ 13.411522] kasan_bitops_generic+0x121/0x1c0 [ 13.411543] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.411565] ? __pfx_read_tsc+0x10/0x10 [ 13.411586] ? ktime_get_ts64+0x86/0x230 [ 13.411612] kunit_try_run_case+0x1a5/0x480 [ 13.411637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.411662] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.411688] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.411712] ? __kthread_parkme+0x82/0x180 [ 13.411735] ? preempt_count_sub+0x50/0x80 [ 13.411761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.411785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.411808] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.411832] kthread+0x337/0x6f0 [ 13.411850] ? trace_preempt_on+0x20/0xc0 [ 13.411874] ? __pfx_kthread+0x10/0x10 [ 13.411892] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.411925] ? calculate_sigpending+0x7b/0xa0 [ 13.411948] ? __pfx_kthread+0x10/0x10 [ 13.411967] ret_from_fork+0x41/0x80 [ 13.411988] ? __pfx_kthread+0x10/0x10 [ 13.412006] ret_from_fork_asm+0x1a/0x30 [ 13.412037] </TASK> [ 13.412048] [ 13.421178] Allocated by task 280: [ 13.421380] kasan_save_stack+0x45/0x70 [ 13.421585] kasan_save_track+0x18/0x40 [ 13.421865] kasan_save_alloc_info+0x3b/0x50 [ 13.422047] __kasan_kmalloc+0xb7/0xc0 [ 13.422182] __kmalloc_cache_noprof+0x189/0x420 [ 13.422477] kasan_bitops_generic+0x92/0x1c0 [ 13.422697] kunit_try_run_case+0x1a5/0x480 [ 13.423082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.423327] kthread+0x337/0x6f0 [ 13.423506] ret_from_fork+0x41/0x80 [ 13.423747] ret_from_fork_asm+0x1a/0x30 [ 13.423932] [ 13.424013] The buggy address belongs to the object at ffff888102307e00 [ 13.424013] which belongs to the cache kmalloc-16 of size 16 [ 13.424557] The buggy address is located 8 bytes inside of [ 13.424557] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.425080] [ 13.425172] The buggy address belongs to the physical page: [ 13.425503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.425856] flags: 0x200000000000000(node=0|zone=2) [ 13.426026] page_type: f5(slab) [ 13.426146] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.426390] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.426618] page dumped because: kasan: bad access detected [ 13.426870] [ 13.426992] Memory state around the buggy address: [ 13.427217] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.427544] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.428046] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.428483] ^ [ 13.428647] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.428925] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.429198] ================================================================== [ 13.566052] ================================================================== [ 13.566499] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.566900] Read of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.567246] [ 13.567417] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.567463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.567475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.567496] Call Trace: [ 13.567512] <TASK> [ 13.567528] dump_stack_lvl+0x73/0xb0 [ 13.567552] print_report+0xd1/0x650 [ 13.567575] ? __virt_addr_valid+0x1db/0x2d0 [ 13.567597] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.567620] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.567644] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.567669] kasan_report+0x141/0x180 [ 13.567691] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.567720] kasan_check_range+0x10c/0x1c0 [ 13.567741] __kasan_check_read+0x15/0x20 [ 13.567968] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.567999] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.568026] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.568047] ? trace_hardirqs_on+0x37/0xe0 [ 13.568069] ? kasan_bitops_generic+0x92/0x1c0 [ 13.568103] kasan_bitops_generic+0x121/0x1c0 [ 13.568125] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.568148] ? __pfx_read_tsc+0x10/0x10 [ 13.568168] ? ktime_get_ts64+0x86/0x230 [ 13.568194] kunit_try_run_case+0x1a5/0x480 [ 13.568219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.568255] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.568373] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.568403] ? __kthread_parkme+0x82/0x180 [ 13.568426] ? preempt_count_sub+0x50/0x80 [ 13.568453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.568487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.568514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.568538] kthread+0x337/0x6f0 [ 13.568565] ? trace_preempt_on+0x20/0xc0 [ 13.568589] ? __pfx_kthread+0x10/0x10 [ 13.568608] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.568639] ? calculate_sigpending+0x7b/0xa0 [ 13.568662] ? __pfx_kthread+0x10/0x10 [ 13.568681] ret_from_fork+0x41/0x80 [ 13.568711] ? __pfx_kthread+0x10/0x10 [ 13.568730] ret_from_fork_asm+0x1a/0x30 [ 13.568761] </TASK> [ 13.568772] [ 13.579562] Allocated by task 280: [ 13.579722] kasan_save_stack+0x45/0x70 [ 13.579884] kasan_save_track+0x18/0x40 [ 13.580030] kasan_save_alloc_info+0x3b/0x50 [ 13.580960] __kasan_kmalloc+0xb7/0xc0 [ 13.581181] __kmalloc_cache_noprof+0x189/0x420 [ 13.581691] kasan_bitops_generic+0x92/0x1c0 [ 13.581956] kunit_try_run_case+0x1a5/0x480 [ 13.582192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.582789] kthread+0x337/0x6f0 [ 13.583003] ret_from_fork+0x41/0x80 [ 13.583206] ret_from_fork_asm+0x1a/0x30 [ 13.583623] [ 13.583812] The buggy address belongs to the object at ffff888102307e00 [ 13.583812] which belongs to the cache kmalloc-16 of size 16 [ 13.584200] The buggy address is located 8 bytes inside of [ 13.584200] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.585397] [ 13.585830] The buggy address belongs to the physical page: [ 13.586097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.587346] flags: 0x200000000000000(node=0|zone=2) [ 13.587748] page_type: f5(slab) [ 13.588260] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.588830] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.589062] page dumped because: kasan: bad access detected [ 13.589240] [ 13.589340] Memory state around the buggy address: [ 13.590100] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.590869] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.591589] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.592255] ^ [ 13.592719] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.593065] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.593558] ================================================================== [ 13.497520] ================================================================== [ 13.498293] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.499053] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.499585] [ 13.499745] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.499793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.499807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.499830] Call Trace: [ 13.499842] <TASK> [ 13.499860] dump_stack_lvl+0x73/0xb0 [ 13.499887] print_report+0xd1/0x650 [ 13.499911] ? __virt_addr_valid+0x1db/0x2d0 [ 13.499934] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.499958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.499982] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.500007] kasan_report+0x141/0x180 [ 13.500029] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.500059] kasan_check_range+0x10c/0x1c0 [ 13.500080] __kasan_check_write+0x18/0x20 [ 13.500100] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.500138] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.500164] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.500186] ? trace_hardirqs_on+0x37/0xe0 [ 13.500221] ? kasan_bitops_generic+0x92/0x1c0 [ 13.500256] kasan_bitops_generic+0x121/0x1c0 [ 13.500277] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.500298] ? __pfx_read_tsc+0x10/0x10 [ 13.500320] ? ktime_get_ts64+0x86/0x230 [ 13.500346] kunit_try_run_case+0x1a5/0x480 [ 13.500371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.500394] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.500419] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.500442] ? __kthread_parkme+0x82/0x180 [ 13.500466] ? preempt_count_sub+0x50/0x80 [ 13.500492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.500573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.500603] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.500627] kthread+0x337/0x6f0 [ 13.500645] ? trace_preempt_on+0x20/0xc0 [ 13.500668] ? __pfx_kthread+0x10/0x10 [ 13.500687] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.500710] ? calculate_sigpending+0x7b/0xa0 [ 13.500732] ? __pfx_kthread+0x10/0x10 [ 13.500752] ret_from_fork+0x41/0x80 [ 13.500774] ? __pfx_kthread+0x10/0x10 [ 13.500792] ret_from_fork_asm+0x1a/0x30 [ 13.500824] </TASK> [ 13.500835] [ 13.510805] Allocated by task 280: [ 13.511029] kasan_save_stack+0x45/0x70 [ 13.511623] kasan_save_track+0x18/0x40 [ 13.511848] kasan_save_alloc_info+0x3b/0x50 [ 13.512096] __kasan_kmalloc+0xb7/0xc0 [ 13.512337] __kmalloc_cache_noprof+0x189/0x420 [ 13.512514] kasan_bitops_generic+0x92/0x1c0 [ 13.512657] kunit_try_run_case+0x1a5/0x480 [ 13.512807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.513313] kthread+0x337/0x6f0 [ 13.513482] ret_from_fork+0x41/0x80 [ 13.513811] ret_from_fork_asm+0x1a/0x30 [ 13.514055] [ 13.514196] The buggy address belongs to the object at ffff888102307e00 [ 13.514196] which belongs to the cache kmalloc-16 of size 16 [ 13.514831] The buggy address is located 8 bytes inside of [ 13.514831] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.515206] [ 13.515538] The buggy address belongs to the physical page: [ 13.515953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.516408] flags: 0x200000000000000(node=0|zone=2) [ 13.516735] page_type: f5(slab) [ 13.516912] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.517322] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.517748] page dumped because: kasan: bad access detected [ 13.517925] [ 13.518017] Memory state around the buggy address: [ 13.518363] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.518900] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.519266] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.519848] ^ [ 13.520082] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.520521] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.520950] ==================================================================