Date
July 10, 2025, 11:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.355755] ================================================================== [ 18.355990] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.356613] Read of size 8 at addr fff00000c43f09c8 by task kunit_try_catch/261 [ 18.356759] [ 18.357074] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.357386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.358636] Hardware name: linux,dummy-virt (DT) [ 18.360983] kasan_bitops_generic+0x110/0x1c8 [ 18.367383] The buggy address belongs to the object at fff00000c43f09c0 [ 18.367383] which belongs to the cache kmalloc-16 of size 16 [ 18.374353] fff00000c43f0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.379784] [ 18.382201] dump_stack_lvl+0x8c/0xd0 [ 18.385511] kthread+0x328/0x630 [ 18.389007] [ 18.390645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043f0 [ 18.395230] ^ [ 18.399702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.400118] kasan_bitops_generic+0x110/0x1c8 [ 18.400627] __kasan_kmalloc+0xd4/0xd8 [ 18.401057] [ 18.401365] page dumped because: kasan: bad access detected [ 18.401612] ^ [ 18.401710] fff00000c43f0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.401920] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 18.402220] Call trace: [ 18.402243] show_stack+0x20/0x38 (C) [ 18.402291] dump_stack_lvl+0x8c/0xd0 [ 18.402488] kasan_check_range+0x100/0x1a8 [ 18.403237] kthread+0x328/0x630 [ 18.403676] kasan_bitops_generic+0xa0/0x1c8 [ 18.404158] [ 18.404889] page dumped because: kasan: bad access detected [ 18.405210] >fff00000c43f0980: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 18.406784] [ 18.407016] Call trace: [ 18.407446] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 18.408454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.409340] page dumped because: kasan: bad access detected [ 18.411224] kthread+0x328/0x630 [ 18.411797] kthread+0x328/0x630 [ 18.412387] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.412903] ================================================================== [ 18.320984] ================================================================== [ 18.321069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.324529] Write of size 8 at addr fff00000c43f09c8 by task kunit_try_catch/261 [ 18.324693] [ 18.325246] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.325343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.326416] Hardware name: linux,dummy-virt (DT) [ 18.326465] Call trace: [ 18.326915] show_stack+0x20/0x38 (C) [ 18.327892] dump_stack_lvl+0x8c/0xd0 [ 18.328145] print_report+0x118/0x608 [ 18.328201] kasan_report+0xdc/0x128 [ 18.328253] kasan_check_range+0x100/0x1a8 [ 18.329615] __kasan_check_write+0x20/0x30 [ 18.329686] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.330396] kasan_bitops_generic+0x110/0x1c8 [ 18.330572] kunit_try_run_case+0x170/0x3f0 [ 18.330628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.331552] kthread+0x328/0x630 [ 18.332187] ret_from_fork+0x10/0x20 [ 18.332759] [ 18.333118] Allocated by task 261: [ 18.333493] kasan_save_stack+0x3c/0x68 [ 18.333949] kasan_save_track+0x20/0x40 [ 18.334982] kasan_save_alloc_info+0x40/0x58 [ 18.335851] __kasan_kmalloc+0xd4/0xd8 [ 18.336017] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.336217] kasan_bitops_generic+0xa0/0x1c8 [ 18.336264] kunit_try_run_case+0x170/0x3f0 [ 18.336306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.336361] kthread+0x328/0x630 [ 18.337631] ret_from_fork+0x10/0x20 [ 18.337748] [ 18.338509] The buggy address belongs to the object at fff00000c43f09c0 [ 18.338509] which belongs to the cache kmalloc-16 of size 16 [ 18.338747] The buggy address is located 8 bytes inside of [ 18.338747] allocated 9-byte region [fff00000c43f09c0, fff00000c43f09c9) [ 18.339075] [ 18.339115] The buggy address belongs to the physical page: [ 18.339347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043f0 [ 18.339677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.339733] page_type: f5(slab) [ 18.339778] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.339832] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.340870] page dumped because: kasan: bad access detected [ 18.341109] [ 18.341162] Memory state around the buggy address: [ 18.341265] fff00000c43f0880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 18.341922] fff00000c43f0900: 00 00 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc [ 18.341975] >fff00000c43f0980: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 18.342806] ^ [ 18.343050] fff00000c43f0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.343343] fff00000c43f0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.343545] ==================================================================
[ 14.823517] ================================================================== [ 14.823804] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.824064] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.824301] [ 14.824444] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.824487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.824500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.824521] Call Trace: [ 14.824536] <TASK> [ 14.824549] dump_stack_lvl+0x73/0xb0 [ 14.824578] print_report+0xd1/0x650 [ 14.824600] ? __virt_addr_valid+0x1db/0x2d0 [ 14.824623] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.824676] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.824699] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.824725] kasan_report+0x141/0x180 [ 14.824747] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.824778] kasan_check_range+0x10c/0x1c0 [ 14.824802] __kasan_check_write+0x18/0x20 [ 14.824822] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.824866] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.824908] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.824932] ? trace_hardirqs_on+0x37/0xe0 [ 14.824955] ? kasan_bitops_generic+0x92/0x1c0 [ 14.824982] kasan_bitops_generic+0x116/0x1c0 [ 14.825006] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.825032] ? __pfx_read_tsc+0x10/0x10 [ 14.825054] ? ktime_get_ts64+0x86/0x230 [ 14.825077] kunit_try_run_case+0x1a5/0x480 [ 14.825100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.825124] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.825148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.825172] ? __kthread_parkme+0x82/0x180 [ 14.825193] ? preempt_count_sub+0x50/0x80 [ 14.825216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.825241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.825265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.825291] kthread+0x337/0x6f0 [ 14.825310] ? trace_preempt_on+0x20/0xc0 [ 14.825331] ? __pfx_kthread+0x10/0x10 [ 14.825365] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.825386] ? calculate_sigpending+0x7b/0xa0 [ 14.825429] ? __pfx_kthread+0x10/0x10 [ 14.825450] ret_from_fork+0x116/0x1d0 [ 14.825468] ? __pfx_kthread+0x10/0x10 [ 14.825488] ret_from_fork_asm+0x1a/0x30 [ 14.825518] </TASK> [ 14.825528] [ 14.833048] Allocated by task 279: [ 14.833257] kasan_save_stack+0x45/0x70 [ 14.833527] kasan_save_track+0x18/0x40 [ 14.833707] kasan_save_alloc_info+0x3b/0x50 [ 14.833947] __kasan_kmalloc+0xb7/0xc0 [ 14.834167] __kmalloc_cache_noprof+0x189/0x420 [ 14.834392] kasan_bitops_generic+0x92/0x1c0 [ 14.834624] kunit_try_run_case+0x1a5/0x480 [ 14.834828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.835098] kthread+0x337/0x6f0 [ 14.835263] ret_from_fork+0x116/0x1d0 [ 14.835501] ret_from_fork_asm+0x1a/0x30 [ 14.835646] [ 14.835715] The buggy address belongs to the object at ffff888102749de0 [ 14.835715] which belongs to the cache kmalloc-16 of size 16 [ 14.836051] The buggy address is located 8 bytes inside of [ 14.836051] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.836524] [ 14.836620] The buggy address belongs to the physical page: [ 14.836884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.837255] flags: 0x200000000000000(node=0|zone=2) [ 14.837559] page_type: f5(slab) [ 14.837748] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.838124] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.838501] page dumped because: kasan: bad access detected [ 14.838769] [ 14.838843] Memory state around the buggy address: [ 14.838989] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.839204] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.839584] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.839922] ^ [ 14.840241] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.840529] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.840750] ================================================================== [ 14.715694] ================================================================== [ 14.715951] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.716282] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.716626] [ 14.716732] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.716770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.716782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.716801] Call Trace: [ 14.716811] <TASK> [ 14.716824] dump_stack_lvl+0x73/0xb0 [ 14.716851] print_report+0xd1/0x650 [ 14.716871] ? __virt_addr_valid+0x1db/0x2d0 [ 14.716891] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.716917] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.716938] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.716963] kasan_report+0x141/0x180 [ 14.716984] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.717014] kasan_check_range+0x10c/0x1c0 [ 14.717038] __kasan_check_write+0x18/0x20 [ 14.717056] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.717096] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.717393] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.717420] ? trace_hardirqs_on+0x37/0xe0 [ 14.717442] ? kasan_bitops_generic+0x92/0x1c0 [ 14.717469] kasan_bitops_generic+0x116/0x1c0 [ 14.717494] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.717519] ? __pfx_read_tsc+0x10/0x10 [ 14.717540] ? ktime_get_ts64+0x86/0x230 [ 14.717564] kunit_try_run_case+0x1a5/0x480 [ 14.717642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.717667] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.717691] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.717716] ? __kthread_parkme+0x82/0x180 [ 14.717737] ? preempt_count_sub+0x50/0x80 [ 14.717760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.717785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.717810] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.717835] kthread+0x337/0x6f0 [ 14.717853] ? trace_preempt_on+0x20/0xc0 [ 14.717876] ? __pfx_kthread+0x10/0x10 [ 14.717896] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.717918] ? calculate_sigpending+0x7b/0xa0 [ 14.717941] ? __pfx_kthread+0x10/0x10 [ 14.717963] ret_from_fork+0x116/0x1d0 [ 14.717981] ? __pfx_kthread+0x10/0x10 [ 14.718002] ret_from_fork_asm+0x1a/0x30 [ 14.718032] </TASK> [ 14.718041] [ 14.725819] Allocated by task 279: [ 14.726003] kasan_save_stack+0x45/0x70 [ 14.726213] kasan_save_track+0x18/0x40 [ 14.726424] kasan_save_alloc_info+0x3b/0x50 [ 14.726803] __kasan_kmalloc+0xb7/0xc0 [ 14.727001] __kmalloc_cache_noprof+0x189/0x420 [ 14.727226] kasan_bitops_generic+0x92/0x1c0 [ 14.727498] kunit_try_run_case+0x1a5/0x480 [ 14.727698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.727925] kthread+0x337/0x6f0 [ 14.728046] ret_from_fork+0x116/0x1d0 [ 14.728225] ret_from_fork_asm+0x1a/0x30 [ 14.728567] [ 14.728678] The buggy address belongs to the object at ffff888102749de0 [ 14.728678] which belongs to the cache kmalloc-16 of size 16 [ 14.729146] The buggy address is located 8 bytes inside of [ 14.729146] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.729724] [ 14.729824] The buggy address belongs to the physical page: [ 14.730034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.730336] flags: 0x200000000000000(node=0|zone=2) [ 14.730727] page_type: f5(slab) [ 14.730885] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.731116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.731341] page dumped because: kasan: bad access detected [ 14.731524] [ 14.731611] Memory state around the buggy address: [ 14.731829] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.732158] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.732571] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.732899] ^ [ 14.733141] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.733407] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.733734] ================================================================== [ 14.737168] ================================================================== [ 14.738089] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.739381] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.739881] [ 14.739974] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.740018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.740030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.740051] Call Trace: [ 14.740063] <TASK> [ 14.740078] dump_stack_lvl+0x73/0xb0 [ 14.740108] print_report+0xd1/0x650 [ 14.740130] ? __virt_addr_valid+0x1db/0x2d0 [ 14.740153] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.740187] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.740210] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.740237] kasan_report+0x141/0x180 [ 14.740258] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.740289] kasan_check_range+0x10c/0x1c0 [ 14.740312] __kasan_check_write+0x18/0x20 [ 14.740331] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.740380] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.740462] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.740488] ? trace_hardirqs_on+0x37/0xe0 [ 14.740607] ? kasan_bitops_generic+0x92/0x1c0 [ 14.740677] kasan_bitops_generic+0x116/0x1c0 [ 14.740819] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.740851] ? __pfx_read_tsc+0x10/0x10 [ 14.740873] ? ktime_get_ts64+0x86/0x230 [ 14.740896] kunit_try_run_case+0x1a5/0x480 [ 14.740920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.740943] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.740966] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.740990] ? __kthread_parkme+0x82/0x180 [ 14.741011] ? preempt_count_sub+0x50/0x80 [ 14.741034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.741059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.741083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.741108] kthread+0x337/0x6f0 [ 14.741127] ? trace_preempt_on+0x20/0xc0 [ 14.741149] ? __pfx_kthread+0x10/0x10 [ 14.741170] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.741191] ? calculate_sigpending+0x7b/0xa0 [ 14.741214] ? __pfx_kthread+0x10/0x10 [ 14.741236] ret_from_fork+0x116/0x1d0 [ 14.741256] ? __pfx_kthread+0x10/0x10 [ 14.741276] ret_from_fork_asm+0x1a/0x30 [ 14.741306] </TASK> [ 14.741316] [ 14.756318] Allocated by task 279: [ 14.756500] kasan_save_stack+0x45/0x70 [ 14.756653] kasan_save_track+0x18/0x40 [ 14.756790] kasan_save_alloc_info+0x3b/0x50 [ 14.756943] __kasan_kmalloc+0xb7/0xc0 [ 14.757082] __kmalloc_cache_noprof+0x189/0x420 [ 14.757239] kasan_bitops_generic+0x92/0x1c0 [ 14.757481] kunit_try_run_case+0x1a5/0x480 [ 14.757950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.758457] kthread+0x337/0x6f0 [ 14.758791] ret_from_fork+0x116/0x1d0 [ 14.759166] ret_from_fork_asm+0x1a/0x30 [ 14.759648] [ 14.759882] The buggy address belongs to the object at ffff888102749de0 [ 14.759882] which belongs to the cache kmalloc-16 of size 16 [ 14.760467] The buggy address is located 8 bytes inside of [ 14.760467] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.761647] [ 14.761775] The buggy address belongs to the physical page: [ 14.762118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.762372] flags: 0x200000000000000(node=0|zone=2) [ 14.762704] page_type: f5(slab) [ 14.763032] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.763777] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.764470] page dumped because: kasan: bad access detected [ 14.764975] [ 14.765170] Memory state around the buggy address: [ 14.765569] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.765992] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.766357] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.766931] ^ [ 14.767539] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.768000] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.768216] ================================================================== [ 14.693243] ================================================================== [ 14.693858] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.694199] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.694555] [ 14.694683] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.694724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.694735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.694755] Call Trace: [ 14.694766] <TASK> [ 14.694781] dump_stack_lvl+0x73/0xb0 [ 14.694808] print_report+0xd1/0x650 [ 14.694830] ? __virt_addr_valid+0x1db/0x2d0 [ 14.694853] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.694880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.694903] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.694930] kasan_report+0x141/0x180 [ 14.694951] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.694982] kasan_check_range+0x10c/0x1c0 [ 14.695006] __kasan_check_write+0x18/0x20 [ 14.695026] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.695052] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.695080] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.695105] ? trace_hardirqs_on+0x37/0xe0 [ 14.695127] ? kasan_bitops_generic+0x92/0x1c0 [ 14.695155] kasan_bitops_generic+0x116/0x1c0 [ 14.695179] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.695204] ? __pfx_read_tsc+0x10/0x10 [ 14.695225] ? ktime_get_ts64+0x86/0x230 [ 14.695250] kunit_try_run_case+0x1a5/0x480 [ 14.695274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.695297] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.695321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.695345] ? __kthread_parkme+0x82/0x180 [ 14.695397] ? preempt_count_sub+0x50/0x80 [ 14.695421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.695446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.695470] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.695496] kthread+0x337/0x6f0 [ 14.695515] ? trace_preempt_on+0x20/0xc0 [ 14.695537] ? __pfx_kthread+0x10/0x10 [ 14.695558] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.695579] ? calculate_sigpending+0x7b/0xa0 [ 14.695603] ? __pfx_kthread+0x10/0x10 [ 14.695625] ret_from_fork+0x116/0x1d0 [ 14.695644] ? __pfx_kthread+0x10/0x10 [ 14.695664] ret_from_fork_asm+0x1a/0x30 [ 14.695696] </TASK> [ 14.695706] [ 14.703863] Allocated by task 279: [ 14.704088] kasan_save_stack+0x45/0x70 [ 14.704305] kasan_save_track+0x18/0x40 [ 14.704677] kasan_save_alloc_info+0x3b/0x50 [ 14.704902] __kasan_kmalloc+0xb7/0xc0 [ 14.705093] __kmalloc_cache_noprof+0x189/0x420 [ 14.705284] kasan_bitops_generic+0x92/0x1c0 [ 14.705551] kunit_try_run_case+0x1a5/0x480 [ 14.705740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.705916] kthread+0x337/0x6f0 [ 14.706083] ret_from_fork+0x116/0x1d0 [ 14.706271] ret_from_fork_asm+0x1a/0x30 [ 14.706609] [ 14.706697] The buggy address belongs to the object at ffff888102749de0 [ 14.706697] which belongs to the cache kmalloc-16 of size 16 [ 14.707144] The buggy address is located 8 bytes inside of [ 14.707144] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.707664] [ 14.707749] The buggy address belongs to the physical page: [ 14.708009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.708311] flags: 0x200000000000000(node=0|zone=2) [ 14.708569] page_type: f5(slab) [ 14.708728] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.709036] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.709260] page dumped because: kasan: bad access detected [ 14.709439] [ 14.709507] Memory state around the buggy address: [ 14.709657] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.710023] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.710340] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.710710] ^ [ 14.710915] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.711130] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.711339] ================================================================== [ 14.796314] ================================================================== [ 14.797286] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.797801] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.798189] [ 14.798532] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.798576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.798588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.798607] Call Trace: [ 14.798622] <TASK> [ 14.798637] dump_stack_lvl+0x73/0xb0 [ 14.798666] print_report+0xd1/0x650 [ 14.798688] ? __virt_addr_valid+0x1db/0x2d0 [ 14.798822] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.798850] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.798908] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.798935] kasan_report+0x141/0x180 [ 14.798970] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.799001] kasan_check_range+0x10c/0x1c0 [ 14.799026] __kasan_check_write+0x18/0x20 [ 14.799045] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.799072] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.799100] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.799125] ? trace_hardirqs_on+0x37/0xe0 [ 14.799147] ? kasan_bitops_generic+0x92/0x1c0 [ 14.799174] kasan_bitops_generic+0x116/0x1c0 [ 14.799198] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.799224] ? __pfx_read_tsc+0x10/0x10 [ 14.799244] ? ktime_get_ts64+0x86/0x230 [ 14.799267] kunit_try_run_case+0x1a5/0x480 [ 14.799292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.799315] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.799338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.799371] ? __kthread_parkme+0x82/0x180 [ 14.799391] ? preempt_count_sub+0x50/0x80 [ 14.799414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.799439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.799463] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.799488] kthread+0x337/0x6f0 [ 14.799507] ? trace_preempt_on+0x20/0xc0 [ 14.799528] ? __pfx_kthread+0x10/0x10 [ 14.799548] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.799570] ? calculate_sigpending+0x7b/0xa0 [ 14.799594] ? __pfx_kthread+0x10/0x10 [ 14.799615] ret_from_fork+0x116/0x1d0 [ 14.799634] ? __pfx_kthread+0x10/0x10 [ 14.799654] ret_from_fork_asm+0x1a/0x30 [ 14.799685] </TASK> [ 14.799695] [ 14.811133] Allocated by task 279: [ 14.811310] kasan_save_stack+0x45/0x70 [ 14.811571] kasan_save_track+0x18/0x40 [ 14.811809] kasan_save_alloc_info+0x3b/0x50 [ 14.812049] __kasan_kmalloc+0xb7/0xc0 [ 14.812399] __kmalloc_cache_noprof+0x189/0x420 [ 14.812848] kasan_bitops_generic+0x92/0x1c0 [ 14.813039] kunit_try_run_case+0x1a5/0x480 [ 14.813240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.813751] kthread+0x337/0x6f0 [ 14.813909] ret_from_fork+0x116/0x1d0 [ 14.814306] ret_from_fork_asm+0x1a/0x30 [ 14.814711] [ 14.814804] The buggy address belongs to the object at ffff888102749de0 [ 14.814804] which belongs to the cache kmalloc-16 of size 16 [ 14.815568] The buggy address is located 8 bytes inside of [ 14.815568] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.816203] [ 14.816306] The buggy address belongs to the physical page: [ 14.816768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.817220] flags: 0x200000000000000(node=0|zone=2) [ 14.817619] page_type: f5(slab) [ 14.817908] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.818317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.818909] page dumped because: kasan: bad access detected [ 14.819255] [ 14.819366] Memory state around the buggy address: [ 14.819845] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.820173] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.820654] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.820974] ^ [ 14.821246] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.821818] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.822229] ================================================================== [ 14.768753] ================================================================== [ 14.769867] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.770693] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.771510] [ 14.771760] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.771802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.771813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.771833] Call Trace: [ 14.771846] <TASK> [ 14.771890] dump_stack_lvl+0x73/0xb0 [ 14.771922] print_report+0xd1/0x650 [ 14.771943] ? __virt_addr_valid+0x1db/0x2d0 [ 14.771977] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.772003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.772026] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.772053] kasan_report+0x141/0x180 [ 14.772074] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.772105] kasan_check_range+0x10c/0x1c0 [ 14.772129] __kasan_check_write+0x18/0x20 [ 14.772148] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.772178] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.772206] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.772230] ? trace_hardirqs_on+0x37/0xe0 [ 14.772252] ? kasan_bitops_generic+0x92/0x1c0 [ 14.772280] kasan_bitops_generic+0x116/0x1c0 [ 14.772307] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.772334] ? __pfx_read_tsc+0x10/0x10 [ 14.772364] ? ktime_get_ts64+0x86/0x230 [ 14.772387] kunit_try_run_case+0x1a5/0x480 [ 14.772411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.772442] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.772467] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.772491] ? __kthread_parkme+0x82/0x180 [ 14.772511] ? preempt_count_sub+0x50/0x80 [ 14.772536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.772561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.772585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.772611] kthread+0x337/0x6f0 [ 14.772629] ? trace_preempt_on+0x20/0xc0 [ 14.772651] ? __pfx_kthread+0x10/0x10 [ 14.772672] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.772694] ? calculate_sigpending+0x7b/0xa0 [ 14.772718] ? __pfx_kthread+0x10/0x10 [ 14.772739] ret_from_fork+0x116/0x1d0 [ 14.772757] ? __pfx_kthread+0x10/0x10 [ 14.772778] ret_from_fork_asm+0x1a/0x30 [ 14.772808] </TASK> [ 14.772818] [ 14.784599] Allocated by task 279: [ 14.784959] kasan_save_stack+0x45/0x70 [ 14.785293] kasan_save_track+0x18/0x40 [ 14.785714] kasan_save_alloc_info+0x3b/0x50 [ 14.786065] __kasan_kmalloc+0xb7/0xc0 [ 14.786213] __kmalloc_cache_noprof+0x189/0x420 [ 14.786657] kasan_bitops_generic+0x92/0x1c0 [ 14.786823] kunit_try_run_case+0x1a5/0x480 [ 14.787240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.787665] kthread+0x337/0x6f0 [ 14.787853] ret_from_fork+0x116/0x1d0 [ 14.788039] ret_from_fork_asm+0x1a/0x30 [ 14.788230] [ 14.788309] The buggy address belongs to the object at ffff888102749de0 [ 14.788309] which belongs to the cache kmalloc-16 of size 16 [ 14.789071] The buggy address is located 8 bytes inside of [ 14.789071] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.790014] [ 14.790117] The buggy address belongs to the physical page: [ 14.790320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.791055] flags: 0x200000000000000(node=0|zone=2) [ 14.791273] page_type: f5(slab) [ 14.791589] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.791930] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.792367] page dumped because: kasan: bad access detected [ 14.792759] [ 14.792861] Memory state around the buggy address: [ 14.793251] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.793665] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.794005] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.794605] ^ [ 14.795008] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.795431] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.795740] ================================================================== [ 14.841272] ================================================================== [ 14.841636] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.841983] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.842292] [ 14.842423] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.842464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.842476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.842495] Call Trace: [ 14.842508] <TASK> [ 14.842522] dump_stack_lvl+0x73/0xb0 [ 14.842548] print_report+0xd1/0x650 [ 14.842569] ? __virt_addr_valid+0x1db/0x2d0 [ 14.842589] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.842614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.842636] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.842661] kasan_report+0x141/0x180 [ 14.842683] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.842713] kasan_check_range+0x10c/0x1c0 [ 14.842735] __kasan_check_write+0x18/0x20 [ 14.842753] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.842779] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.842805] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.842828] ? trace_hardirqs_on+0x37/0xe0 [ 14.842849] ? kasan_bitops_generic+0x92/0x1c0 [ 14.842875] kasan_bitops_generic+0x116/0x1c0 [ 14.842897] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.842922] ? __pfx_read_tsc+0x10/0x10 [ 14.842942] ? ktime_get_ts64+0x86/0x230 [ 14.842965] kunit_try_run_case+0x1a5/0x480 [ 14.842988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.843010] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.843031] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.843054] ? __kthread_parkme+0x82/0x180 [ 14.843072] ? preempt_count_sub+0x50/0x80 [ 14.843094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.843117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.843140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.843163] kthread+0x337/0x6f0 [ 14.843181] ? trace_preempt_on+0x20/0xc0 [ 14.843202] ? __pfx_kthread+0x10/0x10 [ 14.843221] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.843241] ? calculate_sigpending+0x7b/0xa0 [ 14.843263] ? __pfx_kthread+0x10/0x10 [ 14.843284] ret_from_fork+0x116/0x1d0 [ 14.843301] ? __pfx_kthread+0x10/0x10 [ 14.843320] ret_from_fork_asm+0x1a/0x30 [ 14.843360] </TASK> [ 14.843370] [ 14.851282] Allocated by task 279: [ 14.851496] kasan_save_stack+0x45/0x70 [ 14.851686] kasan_save_track+0x18/0x40 [ 14.851870] kasan_save_alloc_info+0x3b/0x50 [ 14.852057] __kasan_kmalloc+0xb7/0xc0 [ 14.852188] __kmalloc_cache_noprof+0x189/0x420 [ 14.852395] kasan_bitops_generic+0x92/0x1c0 [ 14.852636] kunit_try_run_case+0x1a5/0x480 [ 14.852845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.853100] kthread+0x337/0x6f0 [ 14.853267] ret_from_fork+0x116/0x1d0 [ 14.853498] ret_from_fork_asm+0x1a/0x30 [ 14.853637] [ 14.853729] The buggy address belongs to the object at ffff888102749de0 [ 14.853729] which belongs to the cache kmalloc-16 of size 16 [ 14.854237] The buggy address is located 8 bytes inside of [ 14.854237] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.854785] [ 14.854881] The buggy address belongs to the physical page: [ 14.855116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.855527] flags: 0x200000000000000(node=0|zone=2) [ 14.855803] page_type: f5(slab) [ 14.855981] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.856316] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.856667] page dumped because: kasan: bad access detected [ 14.856910] [ 14.856999] Memory state around the buggy address: [ 14.857212] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.857453] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.857659] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.857862] ^ [ 14.858051] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.858523] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.858860] ================================================================== [ 14.859853] ================================================================== [ 14.860250] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.860883] Write of size 8 at addr ffff888102749de8 by task kunit_try_catch/279 [ 14.861271] [ 14.861388] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.861428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.861439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.861457] Call Trace: [ 14.861470] <TASK> [ 14.861483] dump_stack_lvl+0x73/0xb0 [ 14.861510] print_report+0xd1/0x650 [ 14.861532] ? __virt_addr_valid+0x1db/0x2d0 [ 14.861554] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.861580] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.861603] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.861630] kasan_report+0x141/0x180 [ 14.861652] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.861683] kasan_check_range+0x10c/0x1c0 [ 14.861708] __kasan_check_write+0x18/0x20 [ 14.861727] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.861753] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.861781] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.861805] ? trace_hardirqs_on+0x37/0xe0 [ 14.861826] ? kasan_bitops_generic+0x92/0x1c0 [ 14.861854] kasan_bitops_generic+0x116/0x1c0 [ 14.861877] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.861902] ? __pfx_read_tsc+0x10/0x10 [ 14.861924] ? ktime_get_ts64+0x86/0x230 [ 14.861947] kunit_try_run_case+0x1a5/0x480 [ 14.861970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.861994] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.862016] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.862040] ? __kthread_parkme+0x82/0x180 [ 14.862061] ? preempt_count_sub+0x50/0x80 [ 14.862083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.862108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.862133] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.862158] kthread+0x337/0x6f0 [ 14.862176] ? trace_preempt_on+0x20/0xc0 [ 14.862198] ? __pfx_kthread+0x10/0x10 [ 14.862218] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.862239] ? calculate_sigpending+0x7b/0xa0 [ 14.862263] ? __pfx_kthread+0x10/0x10 [ 14.862284] ret_from_fork+0x116/0x1d0 [ 14.862325] ? __pfx_kthread+0x10/0x10 [ 14.862347] ret_from_fork_asm+0x1a/0x30 [ 14.862387] </TASK> [ 14.862396] [ 14.870629] Allocated by task 279: [ 14.870830] kasan_save_stack+0x45/0x70 [ 14.871019] kasan_save_track+0x18/0x40 [ 14.871181] kasan_save_alloc_info+0x3b/0x50 [ 14.871408] __kasan_kmalloc+0xb7/0xc0 [ 14.871606] __kmalloc_cache_noprof+0x189/0x420 [ 14.871820] kasan_bitops_generic+0x92/0x1c0 [ 14.872023] kunit_try_run_case+0x1a5/0x480 [ 14.872231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.872428] kthread+0x337/0x6f0 [ 14.872618] ret_from_fork+0x116/0x1d0 [ 14.872827] ret_from_fork_asm+0x1a/0x30 [ 14.873017] [ 14.873088] The buggy address belongs to the object at ffff888102749de0 [ 14.873088] which belongs to the cache kmalloc-16 of size 16 [ 14.873432] The buggy address is located 8 bytes inside of [ 14.873432] allocated 9-byte region [ffff888102749de0, ffff888102749de9) [ 14.873812] [ 14.873904] The buggy address belongs to the physical page: [ 14.874144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102749 [ 14.874639] flags: 0x200000000000000(node=0|zone=2) [ 14.874807] page_type: f5(slab) [ 14.874958] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.875287] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.875751] page dumped because: kasan: bad access detected [ 14.875922] [ 14.875989] Memory state around the buggy address: [ 14.876142] ffff888102749c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.876396] ffff888102749d00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.876742] >ffff888102749d80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.877077] ^ [ 14.877411] ffff888102749e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.877746] ffff888102749e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.878049] ==================================================================