Date
July 5, 2025, 5:09 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.876165] ================================================================== [ 13.876715] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.877054] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.877443] [ 13.877580] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.877625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.877636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.877658] Call Trace: [ 13.877673] <TASK> [ 13.877691] dump_stack_lvl+0x73/0xb0 [ 13.877717] print_report+0xd1/0x650 [ 13.877740] ? __virt_addr_valid+0x1db/0x2d0 [ 13.877761] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.877787] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.877809] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.877835] kasan_report+0x141/0x180 [ 13.877856] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.877887] kasan_check_range+0x10c/0x1c0 [ 13.877911] __kasan_check_write+0x18/0x20 [ 13.877929] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.877956] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.877983] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.878007] ? trace_hardirqs_on+0x37/0xe0 [ 13.878028] ? kasan_bitops_generic+0x92/0x1c0 [ 13.878056] kasan_bitops_generic+0x121/0x1c0 [ 13.878078] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.878101] ? __pfx_read_tsc+0x10/0x10 [ 13.878121] ? ktime_get_ts64+0x86/0x230 [ 13.878145] kunit_try_run_case+0x1a5/0x480 [ 13.878167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.878189] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.878226] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.878249] ? __kthread_parkme+0x82/0x180 [ 13.878268] ? preempt_count_sub+0x50/0x80 [ 13.878292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.878314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.878337] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.878359] kthread+0x337/0x6f0 [ 13.878378] ? trace_preempt_on+0x20/0xc0 [ 13.878400] ? __pfx_kthread+0x10/0x10 [ 13.878421] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.878441] ? calculate_sigpending+0x7b/0xa0 [ 13.878474] ? __pfx_kthread+0x10/0x10 [ 13.878494] ret_from_fork+0x116/0x1d0 [ 13.878512] ? __pfx_kthread+0x10/0x10 [ 13.878532] ret_from_fork_asm+0x1a/0x30 [ 13.878562] </TASK> [ 13.878573] [ 13.886685] Allocated by task 279: [ 13.886888] kasan_save_stack+0x45/0x70 [ 13.887111] kasan_save_track+0x18/0x40 [ 13.887305] kasan_save_alloc_info+0x3b/0x50 [ 13.887528] __kasan_kmalloc+0xb7/0xc0 [ 13.887667] __kmalloc_cache_noprof+0x189/0x420 [ 13.888144] kasan_bitops_generic+0x92/0x1c0 [ 13.888307] kunit_try_run_case+0x1a5/0x480 [ 13.888469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.888913] kthread+0x337/0x6f0 [ 13.889086] ret_from_fork+0x116/0x1d0 [ 13.889408] ret_from_fork_asm+0x1a/0x30 [ 13.889591] [ 13.889699] The buggy address belongs to the object at ffff88810274c280 [ 13.889699] which belongs to the cache kmalloc-16 of size 16 [ 13.890130] The buggy address is located 8 bytes inside of [ 13.890130] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.890615] [ 13.890716] The buggy address belongs to the physical page: [ 13.891116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.891667] flags: 0x200000000000000(node=0|zone=2) [ 13.891877] page_type: f5(slab) [ 13.892036] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.892294] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.892653] page dumped because: kasan: bad access detected [ 13.892991] [ 13.893083] Memory state around the buggy address: [ 13.893367] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.893626] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.894166] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.894380] ^ [ 13.894588] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.895205] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.895489] ================================================================== [ 13.957999] ================================================================== [ 13.958419] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.958894] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.959189] [ 13.959327] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.959371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.959383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.959404] Call Trace: [ 13.959420] <TASK> [ 13.959435] dump_stack_lvl+0x73/0xb0 [ 13.959486] print_report+0xd1/0x650 [ 13.959507] ? __virt_addr_valid+0x1db/0x2d0 [ 13.959529] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.959556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.959578] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.959604] kasan_report+0x141/0x180 [ 13.959626] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.959657] kasan_check_range+0x10c/0x1c0 [ 13.959680] __kasan_check_write+0x18/0x20 [ 13.959700] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.959726] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.959754] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.959777] ? trace_hardirqs_on+0x37/0xe0 [ 13.959800] ? kasan_bitops_generic+0x92/0x1c0 [ 13.959826] kasan_bitops_generic+0x121/0x1c0 [ 13.959849] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.959873] ? __pfx_read_tsc+0x10/0x10 [ 13.959893] ? ktime_get_ts64+0x86/0x230 [ 13.959917] kunit_try_run_case+0x1a5/0x480 [ 13.959940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.959962] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.959984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.960006] ? __kthread_parkme+0x82/0x180 [ 13.960025] ? preempt_count_sub+0x50/0x80 [ 13.960048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.960072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.960093] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.960116] kthread+0x337/0x6f0 [ 13.960135] ? trace_preempt_on+0x20/0xc0 [ 13.960156] ? __pfx_kthread+0x10/0x10 [ 13.960176] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.960373] ? calculate_sigpending+0x7b/0xa0 [ 13.960403] ? __pfx_kthread+0x10/0x10 [ 13.960426] ret_from_fork+0x116/0x1d0 [ 13.960444] ? __pfx_kthread+0x10/0x10 [ 13.960480] ret_from_fork_asm+0x1a/0x30 [ 13.960510] </TASK> [ 13.960522] [ 13.969499] Allocated by task 279: [ 13.969660] kasan_save_stack+0x45/0x70 [ 13.969835] kasan_save_track+0x18/0x40 [ 13.969986] kasan_save_alloc_info+0x3b/0x50 [ 13.970255] __kasan_kmalloc+0xb7/0xc0 [ 13.970462] __kmalloc_cache_noprof+0x189/0x420 [ 13.970661] kasan_bitops_generic+0x92/0x1c0 [ 13.970856] kunit_try_run_case+0x1a5/0x480 [ 13.971037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.971395] kthread+0x337/0x6f0 [ 13.971545] ret_from_fork+0x116/0x1d0 [ 13.971781] ret_from_fork_asm+0x1a/0x30 [ 13.971941] [ 13.972040] The buggy address belongs to the object at ffff88810274c280 [ 13.972040] which belongs to the cache kmalloc-16 of size 16 [ 13.972473] The buggy address is located 8 bytes inside of [ 13.972473] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.972822] [ 13.972892] The buggy address belongs to the physical page: [ 13.973064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.973498] flags: 0x200000000000000(node=0|zone=2) [ 13.974209] page_type: f5(slab) [ 13.974385] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.974851] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.975089] page dumped because: kasan: bad access detected [ 13.975517] [ 13.975621] Memory state around the buggy address: [ 13.975985] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.976322] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.976576] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.976792] ^ [ 13.976920] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.977609] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.977942] ================================================================== [ 14.000840] ================================================================== [ 14.001245] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.001880] Read of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 14.002260] [ 14.002378] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.002420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.002433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.002466] Call Trace: [ 14.002483] <TASK> [ 14.002500] dump_stack_lvl+0x73/0xb0 [ 14.002528] print_report+0xd1/0x650 [ 14.002550] ? __virt_addr_valid+0x1db/0x2d0 [ 14.002570] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.002597] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.002619] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.002646] kasan_report+0x141/0x180 [ 14.002667] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.002698] kasan_check_range+0x10c/0x1c0 [ 14.002722] __kasan_check_read+0x15/0x20 [ 14.002741] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.002779] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.002806] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.002830] ? trace_hardirqs_on+0x37/0xe0 [ 14.002852] ? kasan_bitops_generic+0x92/0x1c0 [ 14.002878] kasan_bitops_generic+0x121/0x1c0 [ 14.002901] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.002926] ? __pfx_read_tsc+0x10/0x10 [ 14.002945] ? ktime_get_ts64+0x86/0x230 [ 14.002969] kunit_try_run_case+0x1a5/0x480 [ 14.002991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.003013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.003035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.003058] ? __kthread_parkme+0x82/0x180 [ 14.003077] ? preempt_count_sub+0x50/0x80 [ 14.003099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.003123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.003145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.003167] kthread+0x337/0x6f0 [ 14.003186] ? trace_preempt_on+0x20/0xc0 [ 14.003207] ? __pfx_kthread+0x10/0x10 [ 14.003227] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.003247] ? calculate_sigpending+0x7b/0xa0 [ 14.003271] ? __pfx_kthread+0x10/0x10 [ 14.003293] ret_from_fork+0x116/0x1d0 [ 14.003311] ? __pfx_kthread+0x10/0x10 [ 14.003332] ret_from_fork_asm+0x1a/0x30 [ 14.003362] </TASK> [ 14.003372] [ 14.012346] Allocated by task 279: [ 14.012549] kasan_save_stack+0x45/0x70 [ 14.012846] kasan_save_track+0x18/0x40 [ 14.013033] kasan_save_alloc_info+0x3b/0x50 [ 14.013192] __kasan_kmalloc+0xb7/0xc0 [ 14.013327] __kmalloc_cache_noprof+0x189/0x420 [ 14.013516] kasan_bitops_generic+0x92/0x1c0 [ 14.013729] kunit_try_run_case+0x1a5/0x480 [ 14.014212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.014589] kthread+0x337/0x6f0 [ 14.014719] ret_from_fork+0x116/0x1d0 [ 14.014855] ret_from_fork_asm+0x1a/0x30 [ 14.015060] [ 14.015158] The buggy address belongs to the object at ffff88810274c280 [ 14.015158] which belongs to the cache kmalloc-16 of size 16 [ 14.015811] The buggy address is located 8 bytes inside of [ 14.015811] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 14.016285] [ 14.016358] The buggy address belongs to the physical page: [ 14.016585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 14.016942] flags: 0x200000000000000(node=0|zone=2) [ 14.017439] page_type: f5(slab) [ 14.017619] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.018019] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.018404] page dumped because: kasan: bad access detected [ 14.018659] [ 14.018813] Memory state around the buggy address: [ 14.018982] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.019379] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.019724] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.019975] ^ [ 14.020153] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.020537] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.020900] ================================================================== [ 13.846685] ================================================================== [ 13.847021] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.847473] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.848130] [ 13.848304] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.848348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.848361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.848384] Call Trace: [ 13.848401] <TASK> [ 13.848417] dump_stack_lvl+0x73/0xb0 [ 13.848446] print_report+0xd1/0x650 [ 13.848481] ? __virt_addr_valid+0x1db/0x2d0 [ 13.848503] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.848530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.848552] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.848579] kasan_report+0x141/0x180 [ 13.848602] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.848633] kasan_check_range+0x10c/0x1c0 [ 13.848656] __kasan_check_write+0x18/0x20 [ 13.848675] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.848702] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.848729] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.848752] ? trace_hardirqs_on+0x37/0xe0 [ 13.848774] ? kasan_bitops_generic+0x92/0x1c0 [ 13.848801] kasan_bitops_generic+0x121/0x1c0 [ 13.848823] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.848849] ? __pfx_read_tsc+0x10/0x10 [ 13.848869] ? ktime_get_ts64+0x86/0x230 [ 13.848891] kunit_try_run_case+0x1a5/0x480 [ 13.848914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.848935] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.848958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.848980] ? __kthread_parkme+0x82/0x180 [ 13.848999] ? preempt_count_sub+0x50/0x80 [ 13.849023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.849045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.849067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.849090] kthread+0x337/0x6f0 [ 13.849108] ? trace_preempt_on+0x20/0xc0 [ 13.849129] ? __pfx_kthread+0x10/0x10 [ 13.849150] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.849171] ? calculate_sigpending+0x7b/0xa0 [ 13.849217] ? __pfx_kthread+0x10/0x10 [ 13.849239] ret_from_fork+0x116/0x1d0 [ 13.849256] ? __pfx_kthread+0x10/0x10 [ 13.849276] ret_from_fork_asm+0x1a/0x30 [ 13.849306] </TASK> [ 13.849317] [ 13.861114] Allocated by task 279: [ 13.861782] kasan_save_stack+0x45/0x70 [ 13.861997] kasan_save_track+0x18/0x40 [ 13.862165] kasan_save_alloc_info+0x3b/0x50 [ 13.862579] __kasan_kmalloc+0xb7/0xc0 [ 13.863034] __kmalloc_cache_noprof+0x189/0x420 [ 13.863471] kasan_bitops_generic+0x92/0x1c0 [ 13.863931] kunit_try_run_case+0x1a5/0x480 [ 13.864153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.864959] kthread+0x337/0x6f0 [ 13.865270] ret_from_fork+0x116/0x1d0 [ 13.865628] ret_from_fork_asm+0x1a/0x30 [ 13.866123] [ 13.866385] The buggy address belongs to the object at ffff88810274c280 [ 13.866385] which belongs to the cache kmalloc-16 of size 16 [ 13.867422] The buggy address is located 8 bytes inside of [ 13.867422] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.868219] [ 13.868487] The buggy address belongs to the physical page: [ 13.869009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.869697] flags: 0x200000000000000(node=0|zone=2) [ 13.869933] page_type: f5(slab) [ 13.870093] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.870718] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.871031] page dumped because: kasan: bad access detected [ 13.871522] [ 13.871785] Memory state around the buggy address: [ 13.872117] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.872619] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.873522] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.874124] ^ [ 13.874438] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.874987] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.875677] ================================================================== [ 14.021211] ================================================================== [ 14.021614] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.022126] Read of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 14.022535] [ 14.022643] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.022686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.022697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.022719] Call Trace: [ 14.022733] <TASK> [ 14.022748] dump_stack_lvl+0x73/0xb0 [ 14.022775] print_report+0xd1/0x650 [ 14.022797] ? __virt_addr_valid+0x1db/0x2d0 [ 14.022818] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.022845] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.022867] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.022894] kasan_report+0x141/0x180 [ 14.022917] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.022948] __asan_report_load8_noabort+0x18/0x20 [ 14.022971] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.022998] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.023026] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.023050] ? trace_hardirqs_on+0x37/0xe0 [ 14.023071] ? kasan_bitops_generic+0x92/0x1c0 [ 14.023098] kasan_bitops_generic+0x121/0x1c0 [ 14.023121] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.023145] ? __pfx_read_tsc+0x10/0x10 [ 14.023165] ? ktime_get_ts64+0x86/0x230 [ 14.023188] kunit_try_run_case+0x1a5/0x480 [ 14.023211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.023233] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.023256] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.023277] ? __kthread_parkme+0x82/0x180 [ 14.023297] ? preempt_count_sub+0x50/0x80 [ 14.023320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.023343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.023365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.023389] kthread+0x337/0x6f0 [ 14.023408] ? trace_preempt_on+0x20/0xc0 [ 14.023430] ? __pfx_kthread+0x10/0x10 [ 14.023463] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.023485] ? calculate_sigpending+0x7b/0xa0 [ 14.023508] ? __pfx_kthread+0x10/0x10 [ 14.023529] ret_from_fork+0x116/0x1d0 [ 14.023547] ? __pfx_kthread+0x10/0x10 [ 14.023567] ret_from_fork_asm+0x1a/0x30 [ 14.023611] </TASK> [ 14.023623] [ 14.032523] Allocated by task 279: [ 14.032671] kasan_save_stack+0x45/0x70 [ 14.032871] kasan_save_track+0x18/0x40 [ 14.033061] kasan_save_alloc_info+0x3b/0x50 [ 14.033392] __kasan_kmalloc+0xb7/0xc0 [ 14.033576] __kmalloc_cache_noprof+0x189/0x420 [ 14.033815] kasan_bitops_generic+0x92/0x1c0 [ 14.033994] kunit_try_run_case+0x1a5/0x480 [ 14.034199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.034399] kthread+0x337/0x6f0 [ 14.034706] ret_from_fork+0x116/0x1d0 [ 14.034908] ret_from_fork_asm+0x1a/0x30 [ 14.035110] [ 14.035207] The buggy address belongs to the object at ffff88810274c280 [ 14.035207] which belongs to the cache kmalloc-16 of size 16 [ 14.035636] The buggy address is located 8 bytes inside of [ 14.035636] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 14.036262] [ 14.036412] The buggy address belongs to the physical page: [ 14.036653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 14.036998] flags: 0x200000000000000(node=0|zone=2) [ 14.037168] page_type: f5(slab) [ 14.037292] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.037582] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.037917] page dumped because: kasan: bad access detected [ 14.038560] [ 14.038652] Memory state around the buggy address: [ 14.038914] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.039136] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.039657] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.039967] ^ [ 14.040207] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.040624] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.040878] ================================================================== [ 13.895888] ================================================================== [ 13.896232] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.896979] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.897413] [ 13.897544] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.897588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.897600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.897621] Call Trace: [ 13.897636] <TASK> [ 13.897651] dump_stack_lvl+0x73/0xb0 [ 13.897680] print_report+0xd1/0x650 [ 13.897702] ? __virt_addr_valid+0x1db/0x2d0 [ 13.897724] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.897750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.897772] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.897798] kasan_report+0x141/0x180 [ 13.897820] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.897851] kasan_check_range+0x10c/0x1c0 [ 13.897874] __kasan_check_write+0x18/0x20 [ 13.897893] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.897920] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.897948] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.897972] ? trace_hardirqs_on+0x37/0xe0 [ 13.897993] ? kasan_bitops_generic+0x92/0x1c0 [ 13.898022] kasan_bitops_generic+0x121/0x1c0 [ 13.898048] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.898074] ? __pfx_read_tsc+0x10/0x10 [ 13.898095] ? ktime_get_ts64+0x86/0x230 [ 13.898118] kunit_try_run_case+0x1a5/0x480 [ 13.898141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.898162] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.898186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.898209] ? __kthread_parkme+0x82/0x180 [ 13.898229] ? preempt_count_sub+0x50/0x80 [ 13.898252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.898275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.898297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.898320] kthread+0x337/0x6f0 [ 13.898339] ? trace_preempt_on+0x20/0xc0 [ 13.898360] ? __pfx_kthread+0x10/0x10 [ 13.898380] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.898401] ? calculate_sigpending+0x7b/0xa0 [ 13.898423] ? __pfx_kthread+0x10/0x10 [ 13.898445] ret_from_fork+0x116/0x1d0 [ 13.898475] ? __pfx_kthread+0x10/0x10 [ 13.898495] ret_from_fork_asm+0x1a/0x30 [ 13.898526] </TASK> [ 13.898536] [ 13.907304] Allocated by task 279: [ 13.907440] kasan_save_stack+0x45/0x70 [ 13.907597] kasan_save_track+0x18/0x40 [ 13.907732] kasan_save_alloc_info+0x3b/0x50 [ 13.907882] __kasan_kmalloc+0xb7/0xc0 [ 13.908071] __kmalloc_cache_noprof+0x189/0x420 [ 13.908311] kasan_bitops_generic+0x92/0x1c0 [ 13.908531] kunit_try_run_case+0x1a5/0x480 [ 13.908788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.909279] kthread+0x337/0x6f0 [ 13.909491] ret_from_fork+0x116/0x1d0 [ 13.909691] ret_from_fork_asm+0x1a/0x30 [ 13.909891] [ 13.909988] The buggy address belongs to the object at ffff88810274c280 [ 13.909988] which belongs to the cache kmalloc-16 of size 16 [ 13.910651] The buggy address is located 8 bytes inside of [ 13.910651] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.911057] [ 13.911134] The buggy address belongs to the physical page: [ 13.911688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.912051] flags: 0x200000000000000(node=0|zone=2) [ 13.912500] page_type: f5(slab) [ 13.912663] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.912976] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.913371] page dumped because: kasan: bad access detected [ 13.913625] [ 13.913719] Memory state around the buggy address: [ 13.913947] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.914186] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.914536] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.914903] ^ [ 13.915033] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.915518] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.915864] ================================================================== [ 13.916242] ================================================================== [ 13.916518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.916916] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.917483] [ 13.917595] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.917638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.917650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.917671] Call Trace: [ 13.917686] <TASK> [ 13.917703] dump_stack_lvl+0x73/0xb0 [ 13.917907] print_report+0xd1/0x650 [ 13.917938] ? __virt_addr_valid+0x1db/0x2d0 [ 13.917959] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.917986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.918006] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.918034] kasan_report+0x141/0x180 [ 13.918055] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.918087] kasan_check_range+0x10c/0x1c0 [ 13.918110] __kasan_check_write+0x18/0x20 [ 13.918131] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.918158] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.918186] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.918256] ? trace_hardirqs_on+0x37/0xe0 [ 13.918277] ? kasan_bitops_generic+0x92/0x1c0 [ 13.918304] kasan_bitops_generic+0x121/0x1c0 [ 13.918327] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.918352] ? __pfx_read_tsc+0x10/0x10 [ 13.918371] ? ktime_get_ts64+0x86/0x230 [ 13.918394] kunit_try_run_case+0x1a5/0x480 [ 13.918416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.918438] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.918472] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.918495] ? __kthread_parkme+0x82/0x180 [ 13.918515] ? preempt_count_sub+0x50/0x80 [ 13.918538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.918561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.918584] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.918607] kthread+0x337/0x6f0 [ 13.918625] ? trace_preempt_on+0x20/0xc0 [ 13.918647] ? __pfx_kthread+0x10/0x10 [ 13.918667] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.918702] ? calculate_sigpending+0x7b/0xa0 [ 13.918724] ? __pfx_kthread+0x10/0x10 [ 13.918746] ret_from_fork+0x116/0x1d0 [ 13.918763] ? __pfx_kthread+0x10/0x10 [ 13.918783] ret_from_fork_asm+0x1a/0x30 [ 13.918813] </TASK> [ 13.918824] [ 13.927818] Allocated by task 279: [ 13.928008] kasan_save_stack+0x45/0x70 [ 13.928278] kasan_save_track+0x18/0x40 [ 13.928446] kasan_save_alloc_info+0x3b/0x50 [ 13.928611] __kasan_kmalloc+0xb7/0xc0 [ 13.928745] __kmalloc_cache_noprof+0x189/0x420 [ 13.928900] kasan_bitops_generic+0x92/0x1c0 [ 13.929060] kunit_try_run_case+0x1a5/0x480 [ 13.929276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.929903] kthread+0x337/0x6f0 [ 13.930381] ret_from_fork+0x116/0x1d0 [ 13.930602] ret_from_fork_asm+0x1a/0x30 [ 13.930758] [ 13.930830] The buggy address belongs to the object at ffff88810274c280 [ 13.930830] which belongs to the cache kmalloc-16 of size 16 [ 13.931184] The buggy address is located 8 bytes inside of [ 13.931184] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.931708] [ 13.931807] The buggy address belongs to the physical page: [ 13.932204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.932568] flags: 0x200000000000000(node=0|zone=2) [ 13.932768] page_type: f5(slab) [ 13.932889] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.933121] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.933350] page dumped because: kasan: bad access detected [ 13.933793] [ 13.933889] Memory state around the buggy address: [ 13.934118] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.934437] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.934777] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.935103] ^ [ 13.935268] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.936123] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.936693] ================================================================== [ 13.937046] ================================================================== [ 13.937525] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.938012] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.938276] [ 13.938405] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.938446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.938469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.938490] Call Trace: [ 13.938502] <TASK> [ 13.938518] dump_stack_lvl+0x73/0xb0 [ 13.938544] print_report+0xd1/0x650 [ 13.938566] ? __virt_addr_valid+0x1db/0x2d0 [ 13.938589] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.938615] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.938637] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.938663] kasan_report+0x141/0x180 [ 13.938687] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.938718] kasan_check_range+0x10c/0x1c0 [ 13.938742] __kasan_check_write+0x18/0x20 [ 13.938761] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.938788] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.938815] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.938839] ? trace_hardirqs_on+0x37/0xe0 [ 13.938859] ? kasan_bitops_generic+0x92/0x1c0 [ 13.938886] kasan_bitops_generic+0x121/0x1c0 [ 13.938910] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.938934] ? __pfx_read_tsc+0x10/0x10 [ 13.938954] ? ktime_get_ts64+0x86/0x230 [ 13.938977] kunit_try_run_case+0x1a5/0x480 [ 13.939000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.939022] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.939044] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.939067] ? __kthread_parkme+0x82/0x180 [ 13.939087] ? preempt_count_sub+0x50/0x80 [ 13.939110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.939132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.939155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.939177] kthread+0x337/0x6f0 [ 13.939196] ? trace_preempt_on+0x20/0xc0 [ 13.939217] ? __pfx_kthread+0x10/0x10 [ 13.939237] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.939258] ? calculate_sigpending+0x7b/0xa0 [ 13.939280] ? __pfx_kthread+0x10/0x10 [ 13.939302] ret_from_fork+0x116/0x1d0 [ 13.939320] ? __pfx_kthread+0x10/0x10 [ 13.939339] ret_from_fork_asm+0x1a/0x30 [ 13.939369] </TASK> [ 13.939381] [ 13.948857] Allocated by task 279: [ 13.949016] kasan_save_stack+0x45/0x70 [ 13.949189] kasan_save_track+0x18/0x40 [ 13.949414] kasan_save_alloc_info+0x3b/0x50 [ 13.949600] __kasan_kmalloc+0xb7/0xc0 [ 13.949736] __kmalloc_cache_noprof+0x189/0x420 [ 13.950045] kasan_bitops_generic+0x92/0x1c0 [ 13.950259] kunit_try_run_case+0x1a5/0x480 [ 13.950478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.950853] kthread+0x337/0x6f0 [ 13.951000] ret_from_fork+0x116/0x1d0 [ 13.951134] ret_from_fork_asm+0x1a/0x30 [ 13.951550] [ 13.951650] The buggy address belongs to the object at ffff88810274c280 [ 13.951650] which belongs to the cache kmalloc-16 of size 16 [ 13.952161] The buggy address is located 8 bytes inside of [ 13.952161] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.952786] [ 13.952867] The buggy address belongs to the physical page: [ 13.953085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.953444] flags: 0x200000000000000(node=0|zone=2) [ 13.953690] page_type: f5(slab) [ 13.953817] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.954052] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.954279] page dumped because: kasan: bad access detected [ 13.954450] [ 13.954545] Memory state around the buggy address: [ 13.954974] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.955505] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.956024] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.956694] ^ [ 13.956888] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.957270] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.957596] ================================================================== [ 13.978407] ================================================================== [ 13.978955] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.979440] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.979689] [ 13.979775] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.979817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.979829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.979850] Call Trace: [ 13.979868] <TASK> [ 13.979882] dump_stack_lvl+0x73/0xb0 [ 13.979909] print_report+0xd1/0x650 [ 13.979931] ? __virt_addr_valid+0x1db/0x2d0 [ 13.979953] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.979979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.980001] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.980028] kasan_report+0x141/0x180 [ 13.980049] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.980081] kasan_check_range+0x10c/0x1c0 [ 13.980116] __kasan_check_write+0x18/0x20 [ 13.980134] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.980161] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.980189] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.980213] ? trace_hardirqs_on+0x37/0xe0 [ 13.980233] ? kasan_bitops_generic+0x92/0x1c0 [ 13.980260] kasan_bitops_generic+0x121/0x1c0 [ 13.980283] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.980307] ? __pfx_read_tsc+0x10/0x10 [ 13.980328] ? ktime_get_ts64+0x86/0x230 [ 13.980350] kunit_try_run_case+0x1a5/0x480 [ 13.980374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.980396] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.980418] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.980441] ? __kthread_parkme+0x82/0x180 [ 13.980472] ? preempt_count_sub+0x50/0x80 [ 13.980494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.980517] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.980540] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.980611] kthread+0x337/0x6f0 [ 13.980633] ? trace_preempt_on+0x20/0xc0 [ 13.980655] ? __pfx_kthread+0x10/0x10 [ 13.980674] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.980696] ? calculate_sigpending+0x7b/0xa0 [ 13.980719] ? __pfx_kthread+0x10/0x10 [ 13.980740] ret_from_fork+0x116/0x1d0 [ 13.980758] ? __pfx_kthread+0x10/0x10 [ 13.980779] ret_from_fork_asm+0x1a/0x30 [ 13.980808] </TASK> [ 13.980819] [ 13.991097] Allocated by task 279: [ 13.991317] kasan_save_stack+0x45/0x70 [ 13.991514] kasan_save_track+0x18/0x40 [ 13.991703] kasan_save_alloc_info+0x3b/0x50 [ 13.992327] __kasan_kmalloc+0xb7/0xc0 [ 13.992534] __kmalloc_cache_noprof+0x189/0x420 [ 13.992750] kasan_bitops_generic+0x92/0x1c0 [ 13.993115] kunit_try_run_case+0x1a5/0x480 [ 13.993524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.993788] kthread+0x337/0x6f0 [ 13.993983] ret_from_fork+0x116/0x1d0 [ 13.994248] ret_from_fork_asm+0x1a/0x30 [ 13.994619] [ 13.994771] The buggy address belongs to the object at ffff88810274c280 [ 13.994771] which belongs to the cache kmalloc-16 of size 16 [ 13.995325] The buggy address is located 8 bytes inside of [ 13.995325] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.995827] [ 13.996003] The buggy address belongs to the physical page: [ 13.996216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.996658] flags: 0x200000000000000(node=0|zone=2) [ 13.996895] page_type: f5(slab) [ 13.997036] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.997367] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.997966] page dumped because: kasan: bad access detected [ 13.998251] [ 13.998342] Memory state around the buggy address: [ 13.998555] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.998904] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.999173] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.999551] ^ [ 13.999732] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.999989] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.000304] ==================================================================