Date
July 22, 2025, 2:40 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.371553] ================================================================== [ 13.372241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.372740] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.373194] [ 13.373303] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.373348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.373359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.373380] Call Trace: [ 13.373405] <TASK> [ 13.373422] dump_stack_lvl+0x73/0xb0 [ 13.373447] print_report+0xd1/0x610 [ 13.373469] ? __virt_addr_valid+0x1db/0x2d0 [ 13.373490] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.373512] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.373534] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.373557] kasan_report+0x141/0x180 [ 13.373579] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.373608] kasan_check_range+0x10c/0x1c0 [ 13.373628] __kasan_check_write+0x18/0x20 [ 13.373647] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.373682] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.373706] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.373727] ? trace_hardirqs_on+0x37/0xe0 [ 13.373749] ? kasan_bitops_generic+0x92/0x1c0 [ 13.373773] kasan_bitops_generic+0x121/0x1c0 [ 13.373792] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.373813] ? __pfx_read_tsc+0x10/0x10 [ 13.373833] ? ktime_get_ts64+0x86/0x230 [ 13.373859] kunit_try_run_case+0x1a5/0x480 [ 13.373879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.373897] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.373920] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.373944] ? __kthread_parkme+0x82/0x180 [ 13.373966] ? preempt_count_sub+0x50/0x80 [ 13.373993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.374014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.374039] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.374062] kthread+0x337/0x6f0 [ 13.374079] ? trace_preempt_on+0x20/0xc0 [ 13.374101] ? __pfx_kthread+0x10/0x10 [ 13.374118] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.374140] ? calculate_sigpending+0x7b/0xa0 [ 13.374161] ? __pfx_kthread+0x10/0x10 [ 13.374179] ret_from_fork+0x41/0x80 [ 13.374199] ? __pfx_kthread+0x10/0x10 [ 13.374217] ret_from_fork_asm+0x1a/0x30 [ 13.374259] </TASK> [ 13.374270] [ 13.382908] Allocated by task 281: [ 13.383044] kasan_save_stack+0x45/0x70 [ 13.383192] kasan_save_track+0x18/0x40 [ 13.383337] kasan_save_alloc_info+0x3b/0x50 [ 13.383523] __kasan_kmalloc+0xb7/0xc0 [ 13.383706] __kmalloc_cache_noprof+0x189/0x420 [ 13.383918] kasan_bitops_generic+0x92/0x1c0 [ 13.384405] kunit_try_run_case+0x1a5/0x480 [ 13.384870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.385139] kthread+0x337/0x6f0 [ 13.385277] ret_from_fork+0x41/0x80 [ 13.385529] ret_from_fork_asm+0x1a/0x30 [ 13.385829] [ 13.385931] The buggy address belongs to the object at ffff888102219660 [ 13.385931] which belongs to the cache kmalloc-16 of size 16 [ 13.386428] The buggy address is located 8 bytes inside of [ 13.386428] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.386925] [ 13.387025] The buggy address belongs to the physical page: [ 13.387275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.387558] flags: 0x200000000000000(node=0|zone=2) [ 13.387862] page_type: f5(slab) [ 13.388026] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.388308] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.388793] page dumped because: kasan: bad access detected [ 13.389034] [ 13.389126] Memory state around the buggy address: [ 13.389314] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.389689] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.389907] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.390118] ^ [ 13.391318] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.392824] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.393858] ================================================================== [ 13.481474] ================================================================== [ 13.482027] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.482446] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.482809] [ 13.482906] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.482967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.482978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.482998] Call Trace: [ 13.483016] <TASK> [ 13.483031] dump_stack_lvl+0x73/0xb0 [ 13.483056] print_report+0xd1/0x610 [ 13.483079] ? __virt_addr_valid+0x1db/0x2d0 [ 13.483301] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.483333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.483368] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.483690] kasan_report+0x141/0x180 [ 13.483715] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.483744] kasan_check_range+0x10c/0x1c0 [ 13.483764] __kasan_check_write+0x18/0x20 [ 13.483784] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.483807] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.483832] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.483852] ? trace_hardirqs_on+0x37/0xe0 [ 13.483875] ? kasan_bitops_generic+0x92/0x1c0 [ 13.483899] kasan_bitops_generic+0x121/0x1c0 [ 13.483919] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.483940] ? __pfx_read_tsc+0x10/0x10 [ 13.483960] ? ktime_get_ts64+0x86/0x230 [ 13.483985] kunit_try_run_case+0x1a5/0x480 [ 13.484007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.484025] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.484046] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.484070] ? __kthread_parkme+0x82/0x180 [ 13.484425] ? preempt_count_sub+0x50/0x80 [ 13.484453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.484475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.484517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.484541] kthread+0x337/0x6f0 [ 13.484558] ? trace_preempt_on+0x20/0xc0 [ 13.484581] ? __pfx_kthread+0x10/0x10 [ 13.484710] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.484739] ? calculate_sigpending+0x7b/0xa0 [ 13.484761] ? __pfx_kthread+0x10/0x10 [ 13.484780] ret_from_fork+0x41/0x80 [ 13.484801] ? __pfx_kthread+0x10/0x10 [ 13.484819] ret_from_fork_asm+0x1a/0x30 [ 13.484851] </TASK> [ 13.484862] [ 13.497273] Allocated by task 281: [ 13.497670] kasan_save_stack+0x45/0x70 [ 13.497870] kasan_save_track+0x18/0x40 [ 13.498055] kasan_save_alloc_info+0x3b/0x50 [ 13.498265] __kasan_kmalloc+0xb7/0xc0 [ 13.498814] __kmalloc_cache_noprof+0x189/0x420 [ 13.499016] kasan_bitops_generic+0x92/0x1c0 [ 13.499235] kunit_try_run_case+0x1a5/0x480 [ 13.499430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.499638] kthread+0x337/0x6f0 [ 13.499858] ret_from_fork+0x41/0x80 [ 13.500029] ret_from_fork_asm+0x1a/0x30 [ 13.500233] [ 13.500321] The buggy address belongs to the object at ffff888102219660 [ 13.500321] which belongs to the cache kmalloc-16 of size 16 [ 13.500860] The buggy address is located 8 bytes inside of [ 13.500860] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.501351] [ 13.501465] The buggy address belongs to the physical page: [ 13.501745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.501992] flags: 0x200000000000000(node=0|zone=2) [ 13.502198] page_type: f5(slab) [ 13.502373] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.502723] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.502947] page dumped because: kasan: bad access detected [ 13.503417] [ 13.503610] Memory state around the buggy address: [ 13.504069] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.504316] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.504628] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.504997] ^ [ 13.505277] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.505537] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.505785] ================================================================== [ 13.506264] ================================================================== [ 13.506818] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.507181] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.507492] [ 13.507605] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.507650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.507661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.507683] Call Trace: [ 13.507700] <TASK> [ 13.507715] dump_stack_lvl+0x73/0xb0 [ 13.507740] print_report+0xd1/0x610 [ 13.507762] ? __virt_addr_valid+0x1db/0x2d0 [ 13.507783] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.507806] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.507828] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.507851] kasan_report+0x141/0x180 [ 13.507874] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.507902] kasan_check_range+0x10c/0x1c0 [ 13.507921] __kasan_check_write+0x18/0x20 [ 13.507941] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.507964] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.507988] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.508007] ? trace_hardirqs_on+0x37/0xe0 [ 13.508029] ? kasan_bitops_generic+0x92/0x1c0 [ 13.508053] kasan_bitops_generic+0x121/0x1c0 [ 13.508072] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.508094] ? __pfx_read_tsc+0x10/0x10 [ 13.508114] ? ktime_get_ts64+0x86/0x230 [ 13.508139] kunit_try_run_case+0x1a5/0x480 [ 13.508159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.508178] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.508198] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.508232] ? __kthread_parkme+0x82/0x180 [ 13.508254] ? preempt_count_sub+0x50/0x80 [ 13.508281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.508302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.508325] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.508349] kthread+0x337/0x6f0 [ 13.508366] ? trace_preempt_on+0x20/0xc0 [ 13.508388] ? __pfx_kthread+0x10/0x10 [ 13.508406] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.508428] ? calculate_sigpending+0x7b/0xa0 [ 13.508449] ? __pfx_kthread+0x10/0x10 [ 13.508467] ret_from_fork+0x41/0x80 [ 13.508488] ? __pfx_kthread+0x10/0x10 [ 13.508505] ret_from_fork_asm+0x1a/0x30 [ 13.508537] </TASK> [ 13.508547] [ 13.517114] Allocated by task 281: [ 13.517296] kasan_save_stack+0x45/0x70 [ 13.517507] kasan_save_track+0x18/0x40 [ 13.517644] kasan_save_alloc_info+0x3b/0x50 [ 13.517791] __kasan_kmalloc+0xb7/0xc0 [ 13.517969] __kmalloc_cache_noprof+0x189/0x420 [ 13.518187] kasan_bitops_generic+0x92/0x1c0 [ 13.518405] kunit_try_run_case+0x1a5/0x480 [ 13.518654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.519053] kthread+0x337/0x6f0 [ 13.519220] ret_from_fork+0x41/0x80 [ 13.519432] ret_from_fork_asm+0x1a/0x30 [ 13.519574] [ 13.519709] The buggy address belongs to the object at ffff888102219660 [ 13.519709] which belongs to the cache kmalloc-16 of size 16 [ 13.520216] The buggy address is located 8 bytes inside of [ 13.520216] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.520779] [ 13.520862] The buggy address belongs to the physical page: [ 13.521083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.521417] flags: 0x200000000000000(node=0|zone=2) [ 13.521589] page_type: f5(slab) [ 13.521800] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.522126] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.522551] page dumped because: kasan: bad access detected [ 13.522809] [ 13.522903] Memory state around the buggy address: [ 13.523106] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.523433] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.523890] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.524177] ^ [ 13.524487] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.524846] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.525140] ================================================================== [ 13.574140] ================================================================== [ 13.574659] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.575050] Read of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.575313] [ 13.575420] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.575468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.575479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.575503] Call Trace: [ 13.575514] <TASK> [ 13.575544] dump_stack_lvl+0x73/0xb0 [ 13.575570] print_report+0xd1/0x610 [ 13.575593] ? __virt_addr_valid+0x1db/0x2d0 [ 13.575614] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.575639] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.575662] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.575687] kasan_report+0x141/0x180 [ 13.575710] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.575740] __asan_report_load8_noabort+0x18/0x20 [ 13.575761] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.575796] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.575822] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.575845] ? trace_hardirqs_on+0x37/0xe0 [ 13.575871] ? kasan_bitops_generic+0x92/0x1c0 [ 13.575897] kasan_bitops_generic+0x121/0x1c0 [ 13.575918] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.575941] ? __pfx_read_tsc+0x10/0x10 [ 13.575961] ? ktime_get_ts64+0x86/0x230 [ 13.575987] kunit_try_run_case+0x1a5/0x480 [ 13.576008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.576027] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.576049] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.576074] ? __kthread_parkme+0x82/0x180 [ 13.576095] ? preempt_count_sub+0x50/0x80 [ 13.576122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.576143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.576167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.576192] kthread+0x337/0x6f0 [ 13.576209] ? trace_preempt_on+0x20/0xc0 [ 13.576242] ? __pfx_kthread+0x10/0x10 [ 13.576260] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.576283] ? calculate_sigpending+0x7b/0xa0 [ 13.576305] ? __pfx_kthread+0x10/0x10 [ 13.576324] ret_from_fork+0x41/0x80 [ 13.576345] ? __pfx_kthread+0x10/0x10 [ 13.576363] ret_from_fork_asm+0x1a/0x30 [ 13.576395] </TASK> [ 13.576405] [ 13.585160] Allocated by task 281: [ 13.585340] kasan_save_stack+0x45/0x70 [ 13.585543] kasan_save_track+0x18/0x40 [ 13.585787] kasan_save_alloc_info+0x3b/0x50 [ 13.585964] __kasan_kmalloc+0xb7/0xc0 [ 13.586143] __kmalloc_cache_noprof+0x189/0x420 [ 13.586367] kasan_bitops_generic+0x92/0x1c0 [ 13.586560] kunit_try_run_case+0x1a5/0x480 [ 13.586791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.586966] kthread+0x337/0x6f0 [ 13.587085] ret_from_fork+0x41/0x80 [ 13.587214] ret_from_fork_asm+0x1a/0x30 [ 13.587431] [ 13.587530] The buggy address belongs to the object at ffff888102219660 [ 13.587530] which belongs to the cache kmalloc-16 of size 16 [ 13.588230] The buggy address is located 8 bytes inside of [ 13.588230] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.588596] [ 13.588774] The buggy address belongs to the physical page: [ 13.589327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.589627] flags: 0x200000000000000(node=0|zone=2) [ 13.590014] page_type: f5(slab) [ 13.590139] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.590452] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.590834] page dumped because: kasan: bad access detected [ 13.591164] [ 13.591241] Memory state around the buggy address: [ 13.591556] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.591860] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.592147] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.592482] ^ [ 13.592680] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.592894] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.593110] ================================================================== [ 13.395027] ================================================================== [ 13.395578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.395859] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.396082] [ 13.396170] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.396213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.396235] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.396257] Call Trace: [ 13.396274] <TASK> [ 13.396289] dump_stack_lvl+0x73/0xb0 [ 13.396314] print_report+0xd1/0x610 [ 13.396336] ? __virt_addr_valid+0x1db/0x2d0 [ 13.396356] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.396379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.396401] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.396425] kasan_report+0x141/0x180 [ 13.396447] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.396474] kasan_check_range+0x10c/0x1c0 [ 13.396493] __kasan_check_write+0x18/0x20 [ 13.396513] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.396536] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.396562] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.396583] ? trace_hardirqs_on+0x37/0xe0 [ 13.396605] ? kasan_bitops_generic+0x92/0x1c0 [ 13.396628] kasan_bitops_generic+0x121/0x1c0 [ 13.396647] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.396668] ? __pfx_read_tsc+0x10/0x10 [ 13.396688] ? ktime_get_ts64+0x86/0x230 [ 13.396713] kunit_try_run_case+0x1a5/0x480 [ 13.396733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.396750] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.396771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.396794] ? __kthread_parkme+0x82/0x180 [ 13.396816] ? preempt_count_sub+0x50/0x80 [ 13.396843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.396863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.396886] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.396909] kthread+0x337/0x6f0 [ 13.396931] ? trace_preempt_on+0x20/0xc0 [ 13.396952] ? __pfx_kthread+0x10/0x10 [ 13.396970] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.396991] ? calculate_sigpending+0x7b/0xa0 [ 13.397012] ? __pfx_kthread+0x10/0x10 [ 13.397030] ret_from_fork+0x41/0x80 [ 13.397050] ? __pfx_kthread+0x10/0x10 [ 13.397067] ret_from_fork_asm+0x1a/0x30 [ 13.397097] </TASK> [ 13.397107] [ 13.414134] Allocated by task 281: [ 13.414510] kasan_save_stack+0x45/0x70 [ 13.414917] kasan_save_track+0x18/0x40 [ 13.415306] kasan_save_alloc_info+0x3b/0x50 [ 13.415621] __kasan_kmalloc+0xb7/0xc0 [ 13.416036] __kmalloc_cache_noprof+0x189/0x420 [ 13.416380] kasan_bitops_generic+0x92/0x1c0 [ 13.416660] kunit_try_run_case+0x1a5/0x480 [ 13.417115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.417307] kthread+0x337/0x6f0 [ 13.417454] ret_from_fork+0x41/0x80 [ 13.417823] ret_from_fork_asm+0x1a/0x30 [ 13.418439] [ 13.418617] The buggy address belongs to the object at ffff888102219660 [ 13.418617] which belongs to the cache kmalloc-16 of size 16 [ 13.419876] The buggy address is located 8 bytes inside of [ 13.419876] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.420373] [ 13.420544] The buggy address belongs to the physical page: [ 13.421106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.421965] flags: 0x200000000000000(node=0|zone=2) [ 13.422445] page_type: f5(slab) [ 13.422732] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.423431] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.423663] page dumped because: kasan: bad access detected [ 13.423881] [ 13.423950] Memory state around the buggy address: [ 13.424104] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.424491] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.425162] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.425544] ^ [ 13.425960] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.426608] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.427268] ================================================================== [ 13.545522] ================================================================== [ 13.546179] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.546553] Read of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.547077] [ 13.547171] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.547214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.547236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.547257] Call Trace: [ 13.547273] <TASK> [ 13.547287] dump_stack_lvl+0x73/0xb0 [ 13.547314] print_report+0xd1/0x610 [ 13.547336] ? __virt_addr_valid+0x1db/0x2d0 [ 13.547368] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.547391] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.547413] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.547437] kasan_report+0x141/0x180 [ 13.547459] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.547488] kasan_check_range+0x10c/0x1c0 [ 13.547508] __kasan_check_read+0x15/0x20 [ 13.547528] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.547553] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.547578] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.547598] ? trace_hardirqs_on+0x37/0xe0 [ 13.547620] ? kasan_bitops_generic+0x92/0x1c0 [ 13.547644] kasan_bitops_generic+0x121/0x1c0 [ 13.547703] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.547726] ? __pfx_read_tsc+0x10/0x10 [ 13.547746] ? ktime_get_ts64+0x86/0x230 [ 13.547772] kunit_try_run_case+0x1a5/0x480 [ 13.547793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.547812] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.547832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.547857] ? __kthread_parkme+0x82/0x180 [ 13.547878] ? preempt_count_sub+0x50/0x80 [ 13.547904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.547924] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.547947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.547970] kthread+0x337/0x6f0 [ 13.547987] ? trace_preempt_on+0x20/0xc0 [ 13.548009] ? __pfx_kthread+0x10/0x10 [ 13.548027] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.548050] ? calculate_sigpending+0x7b/0xa0 [ 13.548071] ? __pfx_kthread+0x10/0x10 [ 13.548089] ret_from_fork+0x41/0x80 [ 13.548110] ? __pfx_kthread+0x10/0x10 [ 13.548128] ret_from_fork_asm+0x1a/0x30 [ 13.548159] </TASK> [ 13.548171] [ 13.564245] Allocated by task 281: [ 13.564647] kasan_save_stack+0x45/0x70 [ 13.565107] kasan_save_track+0x18/0x40 [ 13.565457] kasan_save_alloc_info+0x3b/0x50 [ 13.565967] __kasan_kmalloc+0xb7/0xc0 [ 13.566140] __kmalloc_cache_noprof+0x189/0x420 [ 13.566506] kasan_bitops_generic+0x92/0x1c0 [ 13.566949] kunit_try_run_case+0x1a5/0x480 [ 13.567427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.567764] kthread+0x337/0x6f0 [ 13.567881] ret_from_fork+0x41/0x80 [ 13.568010] ret_from_fork_asm+0x1a/0x30 [ 13.568145] [ 13.568213] The buggy address belongs to the object at ffff888102219660 [ 13.568213] which belongs to the cache kmalloc-16 of size 16 [ 13.568679] The buggy address is located 8 bytes inside of [ 13.568679] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.569154] [ 13.569258] The buggy address belongs to the physical page: [ 13.569562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.569800] flags: 0x200000000000000(node=0|zone=2) [ 13.569957] page_type: f5(slab) [ 13.570095] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.570668] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.570946] page dumped because: kasan: bad access detected [ 13.571108] [ 13.571172] Memory state around the buggy address: [ 13.571598] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.571912] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.572157] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.572373] ^ [ 13.572819] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.573247] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.573509] ================================================================== [ 13.456868] ================================================================== [ 13.457824] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.458698] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.459478] [ 13.459575] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.459621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.459632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.459653] Call Trace: [ 13.459666] <TASK> [ 13.459682] dump_stack_lvl+0x73/0xb0 [ 13.459708] print_report+0xd1/0x610 [ 13.459730] ? __virt_addr_valid+0x1db/0x2d0 [ 13.459751] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.459774] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.459796] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.459819] kasan_report+0x141/0x180 [ 13.459841] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.459870] kasan_check_range+0x10c/0x1c0 [ 13.459889] __kasan_check_write+0x18/0x20 [ 13.459908] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.459931] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.459956] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.459977] ? trace_hardirqs_on+0x37/0xe0 [ 13.459999] ? kasan_bitops_generic+0x92/0x1c0 [ 13.460024] kasan_bitops_generic+0x121/0x1c0 [ 13.460044] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.460066] ? __pfx_read_tsc+0x10/0x10 [ 13.460085] ? ktime_get_ts64+0x86/0x230 [ 13.460111] kunit_try_run_case+0x1a5/0x480 [ 13.460131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.460149] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.460170] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.460194] ? __kthread_parkme+0x82/0x180 [ 13.460216] ? preempt_count_sub+0x50/0x80 [ 13.460260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.460283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.460306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.460329] kthread+0x337/0x6f0 [ 13.460346] ? trace_preempt_on+0x20/0xc0 [ 13.460368] ? __pfx_kthread+0x10/0x10 [ 13.460386] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.460410] ? calculate_sigpending+0x7b/0xa0 [ 13.460431] ? __pfx_kthread+0x10/0x10 [ 13.460449] ret_from_fork+0x41/0x80 [ 13.460470] ? __pfx_kthread+0x10/0x10 [ 13.460488] ret_from_fork_asm+0x1a/0x30 [ 13.460519] </TASK> [ 13.460529] [ 13.473174] Allocated by task 281: [ 13.473410] kasan_save_stack+0x45/0x70 [ 13.473594] kasan_save_track+0x18/0x40 [ 13.473731] kasan_save_alloc_info+0x3b/0x50 [ 13.473876] __kasan_kmalloc+0xb7/0xc0 [ 13.474009] __kmalloc_cache_noprof+0x189/0x420 [ 13.474160] kasan_bitops_generic+0x92/0x1c0 [ 13.474422] kunit_try_run_case+0x1a5/0x480 [ 13.474630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.475038] kthread+0x337/0x6f0 [ 13.475213] ret_from_fork+0x41/0x80 [ 13.475462] ret_from_fork_asm+0x1a/0x30 [ 13.475606] [ 13.475728] The buggy address belongs to the object at ffff888102219660 [ 13.475728] which belongs to the cache kmalloc-16 of size 16 [ 13.476261] The buggy address is located 8 bytes inside of [ 13.476261] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.476734] [ 13.476843] The buggy address belongs to the physical page: [ 13.477099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.477472] flags: 0x200000000000000(node=0|zone=2) [ 13.477703] page_type: f5(slab) [ 13.477873] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.478158] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.478524] page dumped because: kasan: bad access detected [ 13.478752] [ 13.478845] Memory state around the buggy address: [ 13.479032] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.479255] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.479787] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.480084] ^ [ 13.480377] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.480744] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.480972] ================================================================== [ 13.427946] ================================================================== [ 13.428905] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.429515] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.430196] [ 13.430400] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.430448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.430459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.430479] Call Trace: [ 13.430491] <TASK> [ 13.430506] dump_stack_lvl+0x73/0xb0 [ 13.430532] print_report+0xd1/0x610 [ 13.430555] ? __virt_addr_valid+0x1db/0x2d0 [ 13.430575] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.430597] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.430620] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.430644] kasan_report+0x141/0x180 [ 13.430716] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.430748] kasan_check_range+0x10c/0x1c0 [ 13.430768] __kasan_check_write+0x18/0x20 [ 13.430788] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.430811] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.430836] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.430856] ? trace_hardirqs_on+0x37/0xe0 [ 13.430878] ? kasan_bitops_generic+0x92/0x1c0 [ 13.430902] kasan_bitops_generic+0x121/0x1c0 [ 13.430922] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.430943] ? __pfx_read_tsc+0x10/0x10 [ 13.430962] ? ktime_get_ts64+0x86/0x230 [ 13.430987] kunit_try_run_case+0x1a5/0x480 [ 13.431008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.431026] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.431046] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.431070] ? __kthread_parkme+0x82/0x180 [ 13.431092] ? preempt_count_sub+0x50/0x80 [ 13.431117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.431137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.431159] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.431182] kthread+0x337/0x6f0 [ 13.431198] ? trace_preempt_on+0x20/0xc0 [ 13.431220] ? __pfx_kthread+0x10/0x10 [ 13.431249] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.431270] ? calculate_sigpending+0x7b/0xa0 [ 13.431292] ? __pfx_kthread+0x10/0x10 [ 13.431309] ret_from_fork+0x41/0x80 [ 13.431330] ? __pfx_kthread+0x10/0x10 [ 13.431347] ret_from_fork_asm+0x1a/0x30 [ 13.431378] </TASK> [ 13.431388] [ 13.446017] Allocated by task 281: [ 13.446425] kasan_save_stack+0x45/0x70 [ 13.446815] kasan_save_track+0x18/0x40 [ 13.446964] kasan_save_alloc_info+0x3b/0x50 [ 13.447110] __kasan_kmalloc+0xb7/0xc0 [ 13.447254] __kmalloc_cache_noprof+0x189/0x420 [ 13.447411] kasan_bitops_generic+0x92/0x1c0 [ 13.447554] kunit_try_run_case+0x1a5/0x480 [ 13.447872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.448085] kthread+0x337/0x6f0 [ 13.448236] ret_from_fork+0x41/0x80 [ 13.448475] ret_from_fork_asm+0x1a/0x30 [ 13.448677] [ 13.448745] The buggy address belongs to the object at ffff888102219660 [ 13.448745] which belongs to the cache kmalloc-16 of size 16 [ 13.449139] The buggy address is located 8 bytes inside of [ 13.449139] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.449873] [ 13.449952] The buggy address belongs to the physical page: [ 13.450423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.450839] flags: 0x200000000000000(node=0|zone=2) [ 13.451122] page_type: f5(slab) [ 13.451280] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.451556] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.452573] page dumped because: kasan: bad access detected [ 13.452932] [ 13.453032] Memory state around the buggy address: [ 13.453246] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.454050] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.454364] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.454839] ^ [ 13.455067] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.455408] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.455754] ================================================================== [ 13.525560] ================================================================== [ 13.525969] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.526357] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.526694] [ 13.526803] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.526845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.526855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.526876] Call Trace: [ 13.526889] <TASK> [ 13.526905] dump_stack_lvl+0x73/0xb0 [ 13.526942] print_report+0xd1/0x610 [ 13.526966] ? __virt_addr_valid+0x1db/0x2d0 [ 13.526987] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.527010] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.527033] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.527057] kasan_report+0x141/0x180 [ 13.527079] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.527107] kasan_check_range+0x10c/0x1c0 [ 13.527127] __kasan_check_write+0x18/0x20 [ 13.527147] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.527170] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.527195] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.527215] ? trace_hardirqs_on+0x37/0xe0 [ 13.527248] ? kasan_bitops_generic+0x92/0x1c0 [ 13.527272] kasan_bitops_generic+0x121/0x1c0 [ 13.527291] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.527313] ? __pfx_read_tsc+0x10/0x10 [ 13.527333] ? ktime_get_ts64+0x86/0x230 [ 13.527397] kunit_try_run_case+0x1a5/0x480 [ 13.527422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.527441] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.527462] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.527486] ? __kthread_parkme+0x82/0x180 [ 13.527507] ? preempt_count_sub+0x50/0x80 [ 13.527534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.527555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.527579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.527602] kthread+0x337/0x6f0 [ 13.527619] ? trace_preempt_on+0x20/0xc0 [ 13.527642] ? __pfx_kthread+0x10/0x10 [ 13.527690] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.527715] ? calculate_sigpending+0x7b/0xa0 [ 13.527736] ? __pfx_kthread+0x10/0x10 [ 13.527754] ret_from_fork+0x41/0x80 [ 13.527775] ? __pfx_kthread+0x10/0x10 [ 13.527792] ret_from_fork_asm+0x1a/0x30 [ 13.527823] </TASK> [ 13.527834] [ 13.536022] Allocated by task 281: [ 13.536209] kasan_save_stack+0x45/0x70 [ 13.536462] kasan_save_track+0x18/0x40 [ 13.536760] kasan_save_alloc_info+0x3b/0x50 [ 13.537016] __kasan_kmalloc+0xb7/0xc0 [ 13.537209] __kmalloc_cache_noprof+0x189/0x420 [ 13.537460] kasan_bitops_generic+0x92/0x1c0 [ 13.537865] kunit_try_run_case+0x1a5/0x480 [ 13.538049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.538238] kthread+0x337/0x6f0 [ 13.538359] ret_from_fork+0x41/0x80 [ 13.538489] ret_from_fork_asm+0x1a/0x30 [ 13.538627] [ 13.538696] The buggy address belongs to the object at ffff888102219660 [ 13.538696] which belongs to the cache kmalloc-16 of size 16 [ 13.539049] The buggy address is located 8 bytes inside of [ 13.539049] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.539501] [ 13.539595] The buggy address belongs to the physical page: [ 13.539844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.540475] flags: 0x200000000000000(node=0|zone=2) [ 13.540964] page_type: f5(slab) [ 13.541087] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.541331] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.541557] page dumped because: kasan: bad access detected [ 13.541727] [ 13.541795] Memory state around the buggy address: [ 13.541950] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.542165] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.542792] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.543114] ^ [ 13.543463] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.543786] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.544108] ==================================================================