Date
July 10, 2025, 6:10 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.789842] ================================================================== [ 14.790180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.790586] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.791079] [ 14.791278] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.791322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.791334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.791354] Call Trace: [ 14.791368] <TASK> [ 14.791383] dump_stack_lvl+0x73/0xb0 [ 14.791411] print_report+0xd1/0x650 [ 14.791432] ? __virt_addr_valid+0x1db/0x2d0 [ 14.791455] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.791484] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.791508] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.791537] kasan_report+0x141/0x180 [ 14.791559] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.791592] kasan_check_range+0x10c/0x1c0 [ 14.791616] __kasan_check_write+0x18/0x20 [ 14.791634] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.791664] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.791695] ? ret_from_fork_asm+0x1a/0x30 [ 14.791717] ? kthread+0x337/0x6f0 [ 14.791739] kasan_bitops_generic+0x121/0x1c0 [ 14.791763] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.791789] ? __pfx_read_tsc+0x10/0x10 [ 14.791809] ? ktime_get_ts64+0x86/0x230 [ 14.791833] kunit_try_run_case+0x1a5/0x480 [ 14.791857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.791880] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.791905] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.791929] ? __kthread_parkme+0x82/0x180 [ 14.791955] ? preempt_count_sub+0x50/0x80 [ 14.791979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.792002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.792027] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.792065] kthread+0x337/0x6f0 [ 14.792084] ? trace_preempt_on+0x20/0xc0 [ 14.792106] ? __pfx_kthread+0x10/0x10 [ 14.792127] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.792148] ? calculate_sigpending+0x7b/0xa0 [ 14.792171] ? __pfx_kthread+0x10/0x10 [ 14.792193] ret_from_fork+0x116/0x1d0 [ 14.792220] ? __pfx_kthread+0x10/0x10 [ 14.792240] ret_from_fork_asm+0x1a/0x30 [ 14.792270] </TASK> [ 14.792279] [ 14.800571] Allocated by task 278: [ 14.800703] kasan_save_stack+0x45/0x70 [ 14.800843] kasan_save_track+0x18/0x40 [ 14.800978] kasan_save_alloc_info+0x3b/0x50 [ 14.801136] __kasan_kmalloc+0xb7/0xc0 [ 14.801267] __kmalloc_cache_noprof+0x189/0x420 [ 14.801583] kasan_bitops_generic+0x92/0x1c0 [ 14.801793] kunit_try_run_case+0x1a5/0x480 [ 14.801996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.802262] kthread+0x337/0x6f0 [ 14.802434] ret_from_fork+0x116/0x1d0 [ 14.802625] ret_from_fork_asm+0x1a/0x30 [ 14.802784] [ 14.802854] The buggy address belongs to the object at ffff888101debea0 [ 14.802854] which belongs to the cache kmalloc-16 of size 16 [ 14.803216] The buggy address is located 8 bytes inside of [ 14.803216] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.803999] [ 14.804114] The buggy address belongs to the physical page: [ 14.804363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.804709] flags: 0x200000000000000(node=0|zone=2) [ 14.804943] page_type: f5(slab) [ 14.805100] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.805328] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.805551] page dumped because: kasan: bad access detected [ 14.805721] [ 14.805790] Memory state around the buggy address: [ 14.805972] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.806311] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.806632] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.806953] ^ [ 14.807182] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.807563] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.807772] ================================================================== [ 14.828999] ================================================================== [ 14.830098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.831333] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.831565] [ 14.831647] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.831688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.831702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.831722] Call Trace: [ 14.831738] <TASK> [ 14.831753] dump_stack_lvl+0x73/0xb0 [ 14.831783] print_report+0xd1/0x650 [ 14.831806] ? __virt_addr_valid+0x1db/0x2d0 [ 14.831828] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.831857] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.831881] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.831910] kasan_report+0x141/0x180 [ 14.832577] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.832614] kasan_check_range+0x10c/0x1c0 [ 14.832643] __kasan_check_write+0x18/0x20 [ 14.832664] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.832694] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.832726] ? ret_from_fork_asm+0x1a/0x30 [ 14.832750] ? kthread+0x337/0x6f0 [ 14.832773] kasan_bitops_generic+0x121/0x1c0 [ 14.832798] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.832826] ? __pfx_read_tsc+0x10/0x10 [ 14.832848] ? ktime_get_ts64+0x86/0x230 [ 14.832871] kunit_try_run_case+0x1a5/0x480 [ 14.832895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.832944] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.832970] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.832994] ? __kthread_parkme+0x82/0x180 [ 14.833014] ? preempt_count_sub+0x50/0x80 [ 14.833050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.833074] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.833098] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.833124] kthread+0x337/0x6f0 [ 14.833142] ? trace_preempt_on+0x20/0xc0 [ 14.833166] ? __pfx_kthread+0x10/0x10 [ 14.833186] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.833208] ? calculate_sigpending+0x7b/0xa0 [ 14.833232] ? __pfx_kthread+0x10/0x10 [ 14.833252] ret_from_fork+0x116/0x1d0 [ 14.833271] ? __pfx_kthread+0x10/0x10 [ 14.833291] ret_from_fork_asm+0x1a/0x30 [ 14.833321] </TASK> [ 14.833331] [ 14.843862] Allocated by task 278: [ 14.843998] kasan_save_stack+0x45/0x70 [ 14.844629] kasan_save_track+0x18/0x40 [ 14.844844] kasan_save_alloc_info+0x3b/0x50 [ 14.845186] __kasan_kmalloc+0xb7/0xc0 [ 14.845519] __kmalloc_cache_noprof+0x189/0x420 [ 14.845723] kasan_bitops_generic+0x92/0x1c0 [ 14.845916] kunit_try_run_case+0x1a5/0x480 [ 14.846396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.846624] kthread+0x337/0x6f0 [ 14.846774] ret_from_fork+0x116/0x1d0 [ 14.847213] ret_from_fork_asm+0x1a/0x30 [ 14.847471] [ 14.847722] The buggy address belongs to the object at ffff888101debea0 [ 14.847722] which belongs to the cache kmalloc-16 of size 16 [ 14.848779] The buggy address is located 8 bytes inside of [ 14.848779] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.849632] [ 14.849879] The buggy address belongs to the physical page: [ 14.850291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.850625] flags: 0x200000000000000(node=0|zone=2) [ 14.850846] page_type: f5(slab) [ 14.851303] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.851839] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.852373] page dumped because: kasan: bad access detected [ 14.852608] [ 14.852698] Memory state around the buggy address: [ 14.852902] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.853496] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.853803] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.854461] ^ [ 14.854749] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.855391] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.855694] ================================================================== [ 14.772402] ================================================================== [ 14.772641] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.772925] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.773279] [ 14.773363] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.773404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.773416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.773436] Call Trace: [ 14.773451] <TASK> [ 14.773464] dump_stack_lvl+0x73/0xb0 [ 14.773492] print_report+0xd1/0x650 [ 14.773514] ? __virt_addr_valid+0x1db/0x2d0 [ 14.773537] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.773567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.773591] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.773619] kasan_report+0x141/0x180 [ 14.773641] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.773674] kasan_check_range+0x10c/0x1c0 [ 14.773697] __kasan_check_write+0x18/0x20 [ 14.773717] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.773746] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.773777] ? ret_from_fork_asm+0x1a/0x30 [ 14.773799] ? kthread+0x337/0x6f0 [ 14.773822] kasan_bitops_generic+0x121/0x1c0 [ 14.773846] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.773871] ? __pfx_read_tsc+0x10/0x10 [ 14.773892] ? ktime_get_ts64+0x86/0x230 [ 14.773916] kunit_try_run_case+0x1a5/0x480 [ 14.773954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.773977] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.774001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.774024] ? __kthread_parkme+0x82/0x180 [ 14.774054] ? preempt_count_sub+0x50/0x80 [ 14.774078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.774102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.774127] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.774152] kthread+0x337/0x6f0 [ 14.774170] ? trace_preempt_on+0x20/0xc0 [ 14.774194] ? __pfx_kthread+0x10/0x10 [ 14.774214] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.774235] ? calculate_sigpending+0x7b/0xa0 [ 14.774259] ? __pfx_kthread+0x10/0x10 [ 14.774279] ret_from_fork+0x116/0x1d0 [ 14.774298] ? __pfx_kthread+0x10/0x10 [ 14.774319] ret_from_fork_asm+0x1a/0x30 [ 14.774349] </TASK> [ 14.774359] [ 14.781899] Allocated by task 278: [ 14.782078] kasan_save_stack+0x45/0x70 [ 14.782282] kasan_save_track+0x18/0x40 [ 14.782470] kasan_save_alloc_info+0x3b/0x50 [ 14.782633] __kasan_kmalloc+0xb7/0xc0 [ 14.782765] __kmalloc_cache_noprof+0x189/0x420 [ 14.782919] kasan_bitops_generic+0x92/0x1c0 [ 14.783078] kunit_try_run_case+0x1a5/0x480 [ 14.783431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.783685] kthread+0x337/0x6f0 [ 14.783852] ret_from_fork+0x116/0x1d0 [ 14.784055] ret_from_fork_asm+0x1a/0x30 [ 14.784277] [ 14.784373] The buggy address belongs to the object at ffff888101debea0 [ 14.784373] which belongs to the cache kmalloc-16 of size 16 [ 14.784867] The buggy address is located 8 bytes inside of [ 14.784867] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.785289] [ 14.785382] The buggy address belongs to the physical page: [ 14.785633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.786017] flags: 0x200000000000000(node=0|zone=2) [ 14.786224] page_type: f5(slab) [ 14.786366] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.786671] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.787005] page dumped because: kasan: bad access detected [ 14.787200] [ 14.787268] Memory state around the buggy address: [ 14.787420] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.787635] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.787899] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.788509] ^ [ 14.788946] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.789197] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.789416] ================================================================== [ 14.684342] ================================================================== [ 14.684700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.685138] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.685878] [ 14.686117] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.686167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.686179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.686199] Call Trace: [ 14.686214] <TASK> [ 14.686227] dump_stack_lvl+0x73/0xb0 [ 14.686257] print_report+0xd1/0x650 [ 14.686279] ? __virt_addr_valid+0x1db/0x2d0 [ 14.686303] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.686333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.686356] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.686385] kasan_report+0x141/0x180 [ 14.686407] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.686439] kasan_check_range+0x10c/0x1c0 [ 14.686463] __kasan_check_write+0x18/0x20 [ 14.686483] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.686512] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.686543] ? ret_from_fork_asm+0x1a/0x30 [ 14.686565] ? kthread+0x337/0x6f0 [ 14.686587] kasan_bitops_generic+0x121/0x1c0 [ 14.686611] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.686636] ? __pfx_read_tsc+0x10/0x10 [ 14.686657] ? ktime_get_ts64+0x86/0x230 [ 14.686681] kunit_try_run_case+0x1a5/0x480 [ 14.686705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.686728] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.686751] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.686775] ? __kthread_parkme+0x82/0x180 [ 14.686794] ? preempt_count_sub+0x50/0x80 [ 14.686818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.686842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.686866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.686891] kthread+0x337/0x6f0 [ 14.686910] ? trace_preempt_on+0x20/0xc0 [ 14.686965] ? __pfx_kthread+0x10/0x10 [ 14.686986] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.687008] ? calculate_sigpending+0x7b/0xa0 [ 14.687047] ? __pfx_kthread+0x10/0x10 [ 14.687069] ret_from_fork+0x116/0x1d0 [ 14.687088] ? __pfx_kthread+0x10/0x10 [ 14.687109] ret_from_fork_asm+0x1a/0x30 [ 14.687139] </TASK> [ 14.687149] [ 14.701459] Allocated by task 278: [ 14.701798] kasan_save_stack+0x45/0x70 [ 14.702236] kasan_save_track+0x18/0x40 [ 14.702599] kasan_save_alloc_info+0x3b/0x50 [ 14.703005] __kasan_kmalloc+0xb7/0xc0 [ 14.703359] __kmalloc_cache_noprof+0x189/0x420 [ 14.703780] kasan_bitops_generic+0x92/0x1c0 [ 14.704203] kunit_try_run_case+0x1a5/0x480 [ 14.704348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.704517] kthread+0x337/0x6f0 [ 14.704633] ret_from_fork+0x116/0x1d0 [ 14.704762] ret_from_fork_asm+0x1a/0x30 [ 14.704897] [ 14.705057] The buggy address belongs to the object at ffff888101debea0 [ 14.705057] which belongs to the cache kmalloc-16 of size 16 [ 14.706160] The buggy address is located 8 bytes inside of [ 14.706160] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.707263] [ 14.707438] The buggy address belongs to the physical page: [ 14.707954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.708640] flags: 0x200000000000000(node=0|zone=2) [ 14.709116] page_type: f5(slab) [ 14.709427] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.710091] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.710321] page dumped because: kasan: bad access detected [ 14.710485] [ 14.710552] Memory state around the buggy address: [ 14.710701] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.710908] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.711541] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.712174] ^ [ 14.712578] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.713231] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.713959] ================================================================== [ 14.808281] ================================================================== [ 14.808613] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.809026] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.809378] [ 14.809460] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.809501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.809512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.809531] Call Trace: [ 14.809545] <TASK> [ 14.809559] dump_stack_lvl+0x73/0xb0 [ 14.809722] print_report+0xd1/0x650 [ 14.809750] ? __virt_addr_valid+0x1db/0x2d0 [ 14.809773] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.809802] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.809826] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.809856] kasan_report+0x141/0x180 [ 14.809878] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.809911] kasan_check_range+0x10c/0x1c0 [ 14.809949] __kasan_check_write+0x18/0x20 [ 14.809969] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.809999] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.810043] ? ret_from_fork_asm+0x1a/0x30 [ 14.810066] ? kthread+0x337/0x6f0 [ 14.810089] kasan_bitops_generic+0x121/0x1c0 [ 14.810114] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.810139] ? __pfx_read_tsc+0x10/0x10 [ 14.810160] ? ktime_get_ts64+0x86/0x230 [ 14.810183] kunit_try_run_case+0x1a5/0x480 [ 14.810207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.810231] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.810255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.810279] ? __kthread_parkme+0x82/0x180 [ 14.810299] ? preempt_count_sub+0x50/0x80 [ 14.810322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.810347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.810372] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.810397] kthread+0x337/0x6f0 [ 14.810415] ? trace_preempt_on+0x20/0xc0 [ 14.810437] ? __pfx_kthread+0x10/0x10 [ 14.810457] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.810480] ? calculate_sigpending+0x7b/0xa0 [ 14.810504] ? __pfx_kthread+0x10/0x10 [ 14.810525] ret_from_fork+0x116/0x1d0 [ 14.810544] ? __pfx_kthread+0x10/0x10 [ 14.810564] ret_from_fork_asm+0x1a/0x30 [ 14.810594] </TASK> [ 14.810605] [ 14.818534] Allocated by task 278: [ 14.818664] kasan_save_stack+0x45/0x70 [ 14.818806] kasan_save_track+0x18/0x40 [ 14.818941] kasan_save_alloc_info+0x3b/0x50 [ 14.819165] __kasan_kmalloc+0xb7/0xc0 [ 14.819421] __kmalloc_cache_noprof+0x189/0x420 [ 14.819639] kasan_bitops_generic+0x92/0x1c0 [ 14.820021] kunit_try_run_case+0x1a5/0x480 [ 14.820241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.820443] kthread+0x337/0x6f0 [ 14.820613] ret_from_fork+0x116/0x1d0 [ 14.820772] ret_from_fork_asm+0x1a/0x30 [ 14.820984] [ 14.821069] The buggy address belongs to the object at ffff888101debea0 [ 14.821069] which belongs to the cache kmalloc-16 of size 16 [ 14.821523] The buggy address is located 8 bytes inside of [ 14.821523] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.821978] [ 14.822102] The buggy address belongs to the physical page: [ 14.822327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.822636] flags: 0x200000000000000(node=0|zone=2) [ 14.822813] page_type: f5(slab) [ 14.823007] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.823307] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.823557] page dumped because: kasan: bad access detected [ 14.823726] [ 14.823793] Memory state around the buggy address: [ 14.823948] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.824173] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.824386] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.824709] ^ [ 14.824918] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.825248] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.825567] ================================================================== [ 14.743223] ================================================================== [ 14.743478] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.743754] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.744472] [ 14.744648] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.744689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.744700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.744720] Call Trace: [ 14.744736] <TASK> [ 14.744750] dump_stack_lvl+0x73/0xb0 [ 14.744779] print_report+0xd1/0x650 [ 14.744800] ? __virt_addr_valid+0x1db/0x2d0 [ 14.744822] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.744851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.744874] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.744903] kasan_report+0x141/0x180 [ 14.744925] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.744958] kasan_check_range+0x10c/0x1c0 [ 14.744981] __kasan_check_write+0x18/0x20 [ 14.745000] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.745042] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.745073] ? ret_from_fork_asm+0x1a/0x30 [ 14.745095] ? kthread+0x337/0x6f0 [ 14.745117] kasan_bitops_generic+0x121/0x1c0 [ 14.745142] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.745180] ? __pfx_read_tsc+0x10/0x10 [ 14.745201] ? ktime_get_ts64+0x86/0x230 [ 14.745225] kunit_try_run_case+0x1a5/0x480 [ 14.745248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.745271] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.745295] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.745319] ? __kthread_parkme+0x82/0x180 [ 14.745339] ? preempt_count_sub+0x50/0x80 [ 14.745362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.745386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.745411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.745436] kthread+0x337/0x6f0 [ 14.745454] ? trace_preempt_on+0x20/0xc0 [ 14.745477] ? __pfx_kthread+0x10/0x10 [ 14.745496] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.745519] ? calculate_sigpending+0x7b/0xa0 [ 14.745542] ? __pfx_kthread+0x10/0x10 [ 14.745563] ret_from_fork+0x116/0x1d0 [ 14.745582] ? __pfx_kthread+0x10/0x10 [ 14.745602] ret_from_fork_asm+0x1a/0x30 [ 14.745632] </TASK> [ 14.745641] [ 14.758487] Allocated by task 278: [ 14.758792] kasan_save_stack+0x45/0x70 [ 14.759186] kasan_save_track+0x18/0x40 [ 14.759554] kasan_save_alloc_info+0x3b/0x50 [ 14.759937] __kasan_kmalloc+0xb7/0xc0 [ 14.760291] __kmalloc_cache_noprof+0x189/0x420 [ 14.760697] kasan_bitops_generic+0x92/0x1c0 [ 14.761113] kunit_try_run_case+0x1a5/0x480 [ 14.761554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.762058] kthread+0x337/0x6f0 [ 14.762438] ret_from_fork+0x116/0x1d0 [ 14.762701] ret_from_fork_asm+0x1a/0x30 [ 14.763108] [ 14.763256] The buggy address belongs to the object at ffff888101debea0 [ 14.763256] which belongs to the cache kmalloc-16 of size 16 [ 14.763607] The buggy address is located 8 bytes inside of [ 14.763607] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.763997] [ 14.764172] The buggy address belongs to the physical page: [ 14.764631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.765455] flags: 0x200000000000000(node=0|zone=2) [ 14.765880] page_type: f5(slab) [ 14.766192] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.766824] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.767577] page dumped because: kasan: bad access detected [ 14.768083] [ 14.768257] Memory state around the buggy address: [ 14.768508] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.768722] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.768942] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.769543] ^ [ 14.769936] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.770764] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.771584] ================================================================== [ 14.884018] ================================================================== [ 14.884341] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.884705] Read of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.885356] [ 14.885580] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.885629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.885737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.885762] Call Trace: [ 14.885779] <TASK> [ 14.885795] dump_stack_lvl+0x73/0xb0 [ 14.885824] print_report+0xd1/0x650 [ 14.885847] ? __virt_addr_valid+0x1db/0x2d0 [ 14.885870] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.885932] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.885956] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.885986] kasan_report+0x141/0x180 [ 14.886008] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.886051] __asan_report_load8_noabort+0x18/0x20 [ 14.886078] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.886109] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.886141] ? ret_from_fork_asm+0x1a/0x30 [ 14.886163] ? kthread+0x337/0x6f0 [ 14.886187] kasan_bitops_generic+0x121/0x1c0 [ 14.886211] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.886237] ? __pfx_read_tsc+0x10/0x10 [ 14.886259] ? ktime_get_ts64+0x86/0x230 [ 14.886282] kunit_try_run_case+0x1a5/0x480 [ 14.886308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.886331] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.886355] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.886380] ? __kthread_parkme+0x82/0x180 [ 14.886400] ? preempt_count_sub+0x50/0x80 [ 14.886423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.886447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.886472] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.886497] kthread+0x337/0x6f0 [ 14.886516] ? trace_preempt_on+0x20/0xc0 [ 14.886538] ? __pfx_kthread+0x10/0x10 [ 14.886559] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.886580] ? calculate_sigpending+0x7b/0xa0 [ 14.886604] ? __pfx_kthread+0x10/0x10 [ 14.886625] ret_from_fork+0x116/0x1d0 [ 14.886643] ? __pfx_kthread+0x10/0x10 [ 14.886664] ret_from_fork_asm+0x1a/0x30 [ 14.886694] </TASK> [ 14.886705] [ 14.894247] Allocated by task 278: [ 14.894413] kasan_save_stack+0x45/0x70 [ 14.894605] kasan_save_track+0x18/0x40 [ 14.894743] kasan_save_alloc_info+0x3b/0x50 [ 14.894958] __kasan_kmalloc+0xb7/0xc0 [ 14.895158] __kmalloc_cache_noprof+0x189/0x420 [ 14.895341] kasan_bitops_generic+0x92/0x1c0 [ 14.895493] kunit_try_run_case+0x1a5/0x480 [ 14.895692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.895949] kthread+0x337/0x6f0 [ 14.896100] ret_from_fork+0x116/0x1d0 [ 14.896234] ret_from_fork_asm+0x1a/0x30 [ 14.896374] [ 14.896444] The buggy address belongs to the object at ffff888101debea0 [ 14.896444] which belongs to the cache kmalloc-16 of size 16 [ 14.896886] The buggy address is located 8 bytes inside of [ 14.896886] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.897409] [ 14.897503] The buggy address belongs to the physical page: [ 14.897761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.898054] flags: 0x200000000000000(node=0|zone=2) [ 14.898217] page_type: f5(slab) [ 14.898336] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.898565] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.899305] page dumped because: kasan: bad access detected [ 14.899547] [ 14.899634] Memory state around the buggy address: [ 14.899838] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.900104] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.900319] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.900709] ^ [ 14.901160] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.901472] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.901781] ================================================================== [ 14.715081] ================================================================== [ 14.715766] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.716699] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.717311] [ 14.717398] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.717458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.717469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.717489] Call Trace: [ 14.717501] <TASK> [ 14.717527] dump_stack_lvl+0x73/0xb0 [ 14.717555] print_report+0xd1/0x650 [ 14.717577] ? __virt_addr_valid+0x1db/0x2d0 [ 14.717600] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.717629] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.717652] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.717681] kasan_report+0x141/0x180 [ 14.717703] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.717745] kasan_check_range+0x10c/0x1c0 [ 14.717768] __kasan_check_write+0x18/0x20 [ 14.717788] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.717827] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.717858] ? ret_from_fork_asm+0x1a/0x30 [ 14.717880] ? kthread+0x337/0x6f0 [ 14.717912] kasan_bitops_generic+0x121/0x1c0 [ 14.717936] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.717961] ? __pfx_read_tsc+0x10/0x10 [ 14.718005] ? ktime_get_ts64+0x86/0x230 [ 14.718037] kunit_try_run_case+0x1a5/0x480 [ 14.718061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.718084] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.718109] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.718133] ? __kthread_parkme+0x82/0x180 [ 14.718153] ? preempt_count_sub+0x50/0x80 [ 14.718177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.718202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.718227] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.718252] kthread+0x337/0x6f0 [ 14.718271] ? trace_preempt_on+0x20/0xc0 [ 14.718294] ? __pfx_kthread+0x10/0x10 [ 14.718314] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.718337] ? calculate_sigpending+0x7b/0xa0 [ 14.718362] ? __pfx_kthread+0x10/0x10 [ 14.718383] ret_from_fork+0x116/0x1d0 [ 14.718402] ? __pfx_kthread+0x10/0x10 [ 14.718422] ret_from_fork_asm+0x1a/0x30 [ 14.718452] </TASK> [ 14.718463] [ 14.729986] Allocated by task 278: [ 14.730344] kasan_save_stack+0x45/0x70 [ 14.730718] kasan_save_track+0x18/0x40 [ 14.731139] kasan_save_alloc_info+0x3b/0x50 [ 14.731542] __kasan_kmalloc+0xb7/0xc0 [ 14.731903] __kmalloc_cache_noprof+0x189/0x420 [ 14.732266] kasan_bitops_generic+0x92/0x1c0 [ 14.732417] kunit_try_run_case+0x1a5/0x480 [ 14.732562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.732736] kthread+0x337/0x6f0 [ 14.732856] ret_from_fork+0x116/0x1d0 [ 14.733141] ret_from_fork_asm+0x1a/0x30 [ 14.733503] [ 14.733671] The buggy address belongs to the object at ffff888101debea0 [ 14.733671] which belongs to the cache kmalloc-16 of size 16 [ 14.734760] The buggy address is located 8 bytes inside of [ 14.734760] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.735814] [ 14.736022] The buggy address belongs to the physical page: [ 14.736543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.737285] flags: 0x200000000000000(node=0|zone=2) [ 14.737627] page_type: f5(slab) [ 14.737747] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.738007] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.738418] page dumped because: kasan: bad access detected [ 14.738589] [ 14.738657] Memory state around the buggy address: [ 14.738812] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.739227] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.739841] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.740462] ^ [ 14.740862] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.741570] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.742254] ================================================================== [ 14.856292] ================================================================== [ 14.856611] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.857672] Read of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.858155] [ 14.858366] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.858412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.858425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.858539] Call Trace: [ 14.858558] <TASK> [ 14.858573] dump_stack_lvl+0x73/0xb0 [ 14.858604] print_report+0xd1/0x650 [ 14.858627] ? __virt_addr_valid+0x1db/0x2d0 [ 14.858651] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.858715] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.858739] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.858768] kasan_report+0x141/0x180 [ 14.858790] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.858824] kasan_check_range+0x10c/0x1c0 [ 14.858848] __kasan_check_read+0x15/0x20 [ 14.858866] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.858896] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.858927] ? ret_from_fork_asm+0x1a/0x30 [ 14.858949] ? kthread+0x337/0x6f0 [ 14.858972] kasan_bitops_generic+0x121/0x1c0 [ 14.858997] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.859022] ? __pfx_read_tsc+0x10/0x10 [ 14.859054] ? ktime_get_ts64+0x86/0x230 [ 14.859077] kunit_try_run_case+0x1a5/0x480 [ 14.859101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.859124] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.859147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.859171] ? __kthread_parkme+0x82/0x180 [ 14.859192] ? preempt_count_sub+0x50/0x80 [ 14.859215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.859240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.859264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.859290] kthread+0x337/0x6f0 [ 14.859308] ? trace_preempt_on+0x20/0xc0 [ 14.859332] ? __pfx_kthread+0x10/0x10 [ 14.859352] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.859373] ? calculate_sigpending+0x7b/0xa0 [ 14.859397] ? __pfx_kthread+0x10/0x10 [ 14.859418] ret_from_fork+0x116/0x1d0 [ 14.859438] ? __pfx_kthread+0x10/0x10 [ 14.859458] ret_from_fork_asm+0x1a/0x30 [ 14.859490] </TASK> [ 14.859502] [ 14.871163] Allocated by task 278: [ 14.871341] kasan_save_stack+0x45/0x70 [ 14.871536] kasan_save_track+0x18/0x40 [ 14.871718] kasan_save_alloc_info+0x3b/0x50 [ 14.871911] __kasan_kmalloc+0xb7/0xc0 [ 14.872357] __kmalloc_cache_noprof+0x189/0x420 [ 14.872721] kasan_bitops_generic+0x92/0x1c0 [ 14.873137] kunit_try_run_case+0x1a5/0x480 [ 14.873468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.873713] kthread+0x337/0x6f0 [ 14.873865] ret_from_fork+0x116/0x1d0 [ 14.874290] ret_from_fork_asm+0x1a/0x30 [ 14.874602] [ 14.874816] The buggy address belongs to the object at ffff888101debea0 [ 14.874816] which belongs to the cache kmalloc-16 of size 16 [ 14.875571] The buggy address is located 8 bytes inside of [ 14.875571] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.876387] [ 14.876483] The buggy address belongs to the physical page: [ 14.876894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.877436] flags: 0x200000000000000(node=0|zone=2) [ 14.877784] page_type: f5(slab) [ 14.878125] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.878526] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.878833] page dumped because: kasan: bad access detected [ 14.879298] [ 14.879520] Memory state around the buggy address: [ 14.879854] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.880493] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.880786] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.881391] ^ [ 14.881666] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.882344] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.882778] ==================================================================