Date
July 20, 2025, 8:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.508488] ================================================================== [ 17.508552] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 17.508607] Write of size 8 at addr fff00000c43b3ca8 by task kunit_try_catch/262 [ 17.508679] [ 17.508714] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.508800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.508850] Hardware name: linux,dummy-virt (DT) [ 17.509269] Call trace: [ 17.509304] show_stack+0x20/0x38 (C) [ 17.509672] dump_stack_lvl+0x8c/0xd0 [ 17.509773] print_report+0x118/0x5d0 [ 17.509834] kasan_report+0xdc/0x128 [ 17.510183] kasan_check_range+0x100/0x1a8 [ 17.510317] __kasan_check_write+0x20/0x30 [ 17.510385] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 17.510450] kasan_bitops_generic+0x110/0x1c8 [ 17.510502] kunit_try_run_case+0x170/0x3f0 [ 17.510552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.510606] kthread+0x328/0x630 [ 17.510651] ret_from_fork+0x10/0x20 [ 17.510713] [ 17.510744] Allocated by task 262: [ 17.510784] kasan_save_stack+0x3c/0x68 [ 17.510847] kasan_save_track+0x20/0x40 [ 17.510894] kasan_save_alloc_info+0x40/0x58 [ 17.510947] __kasan_kmalloc+0xd4/0xd8 [ 17.510988] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.511040] kasan_bitops_generic+0xa0/0x1c8 [ 17.511088] kunit_try_run_case+0x170/0x3f0 [ 17.511144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.511200] kthread+0x328/0x630 [ 17.511244] ret_from_fork+0x10/0x20 [ 17.511283] [ 17.511307] The buggy address belongs to the object at fff00000c43b3ca0 [ 17.511307] which belongs to the cache kmalloc-16 of size 16 [ 17.511377] The buggy address is located 8 bytes inside of [ 17.511377] allocated 9-byte region [fff00000c43b3ca0, fff00000c43b3ca9) [ 17.511441] [ 17.511466] The buggy address belongs to the physical page: [ 17.511508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043b3 [ 17.511572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.511622] page_type: f5(slab) [ 17.511663] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.511724] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.511768] page dumped because: kasan: bad access detected [ 17.511804] [ 17.511841] Memory state around the buggy address: [ 17.511884] fff00000c43b3b80: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 17.511930] fff00000c43b3c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.511981] >fff00000c43b3c80: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.512028] ^ [ 17.512072] fff00000c43b3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.512113] fff00000c43b3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.512154] ================================================================== [ 17.516131] ================================================================== [ 17.516229] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 17.516554] Read of size 8 at addr fff00000c43b3ca8 by task kunit_try_catch/262 [ 17.516655] [ 17.516689] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.516773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.517060] Hardware name: linux,dummy-virt (DT) [ 17.517141] Call trace: [ 17.517271] show_stack+0x20/0x38 (C) [ 17.517348] dump_stack_lvl+0x8c/0xd0 [ 17.517661] print_report+0x118/0x5d0 [ 17.517755] kasan_report+0xdc/0x128 [ 17.517880] __asan_report_load8_noabort+0x20/0x30 [ 17.517978] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 17.518328] kasan_bitops_generic+0x110/0x1c8 [ 17.518452] kunit_try_run_case+0x170/0x3f0 [ 17.518543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.518703] kthread+0x328/0x630 [ 17.518749] ret_from_fork+0x10/0x20 [ 17.519064] [ 17.519156] Allocated by task 262: [ 17.519465] kasan_save_stack+0x3c/0x68 [ 17.519547] kasan_save_track+0x20/0x40 [ 17.519610] kasan_save_alloc_info+0x40/0x58 [ 17.519762] __kasan_kmalloc+0xd4/0xd8 [ 17.519805] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.520043] kasan_bitops_generic+0xa0/0x1c8 [ 17.520218] kunit_try_run_case+0x170/0x3f0 [ 17.520466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.520623] kthread+0x328/0x630 [ 17.520730] ret_from_fork+0x10/0x20 [ 17.520808] [ 17.520946] The buggy address belongs to the object at fff00000c43b3ca0 [ 17.520946] which belongs to the cache kmalloc-16 of size 16 [ 17.521013] The buggy address is located 8 bytes inside of [ 17.521013] allocated 9-byte region [fff00000c43b3ca0, fff00000c43b3ca9) [ 17.521305] [ 17.521369] The buggy address belongs to the physical page: [ 17.521736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043b3 [ 17.521846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.521958] page_type: f5(slab) [ 17.522097] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.522209] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.522316] page dumped because: kasan: bad access detected [ 17.522366] [ 17.522395] Memory state around the buggy address: [ 17.522756] fff00000c43b3c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.524580] ==================================================================
[ 14.992890] ================================================================== [ 14.994146] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.995054] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279 [ 14.995903] [ 14.996091] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.996141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.996153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.996176] Call Trace: [ 14.996189] <TASK> [ 14.996208] dump_stack_lvl+0x73/0xb0 [ 14.996241] print_report+0xd1/0x610 [ 14.996265] ? __virt_addr_valid+0x1db/0x2d0 [ 14.996289] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.996315] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.996338] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.996364] kasan_report+0x141/0x180 [ 14.996386] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.996418] kasan_check_range+0x10c/0x1c0 [ 14.996441] __kasan_check_write+0x18/0x20 [ 14.996460] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.996519] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.996545] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.996570] ? trace_hardirqs_on+0x37/0xe0 [ 14.996593] ? kasan_bitops_generic+0x92/0x1c0 [ 14.996620] kasan_bitops_generic+0x116/0x1c0 [ 14.996643] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.996669] ? __pfx_read_tsc+0x10/0x10 [ 14.996690] ? ktime_get_ts64+0x86/0x230 [ 14.996715] kunit_try_run_case+0x1a5/0x480 [ 14.996740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.996770] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.996795] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.996818] ? __kthread_parkme+0x82/0x180 [ 14.996839] ? preempt_count_sub+0x50/0x80 [ 14.996863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.996887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.996910] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.996934] kthread+0x337/0x6f0 [ 14.996953] ? trace_preempt_on+0x20/0xc0 [ 14.996975] ? __pfx_kthread+0x10/0x10 [ 14.996995] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.997016] ? calculate_sigpending+0x7b/0xa0 [ 14.997039] ? __pfx_kthread+0x10/0x10 [ 14.997061] ret_from_fork+0x116/0x1d0 [ 14.997079] ? __pfx_kthread+0x10/0x10 [ 14.997100] ret_from_fork_asm+0x1a/0x30 [ 14.997130] </TASK> [ 14.997142] [ 15.009961] Allocated by task 279: [ 15.010376] kasan_save_stack+0x45/0x70 [ 15.010771] kasan_save_track+0x18/0x40 [ 15.011155] kasan_save_alloc_info+0x3b/0x50 [ 15.011501] __kasan_kmalloc+0xb7/0xc0 [ 15.011635] __kmalloc_cache_noprof+0x189/0x420 [ 15.011829] kasan_bitops_generic+0x92/0x1c0 [ 15.012207] kunit_try_run_case+0x1a5/0x480 [ 15.012596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.013224] kthread+0x337/0x6f0 [ 15.013552] ret_from_fork+0x116/0x1d0 [ 15.013957] ret_from_fork_asm+0x1a/0x30 [ 15.014264] [ 15.014337] The buggy address belongs to the object at ffff888102641aa0 [ 15.014337] which belongs to the cache kmalloc-16 of size 16 [ 15.014708] The buggy address is located 8 bytes inside of [ 15.014708] allocated 9-byte region [ffff888102641aa0, ffff888102641aa9) [ 15.015194] [ 15.015357] The buggy address belongs to the physical page: [ 15.015856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641 [ 15.016555] flags: 0x200000000000000(node=0|zone=2) [ 15.017011] page_type: f5(slab) [ 15.017312] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.018030] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.018310] page dumped because: kasan: bad access detected [ 15.018490] [ 15.018562] Memory state around the buggy address: [ 15.018717] ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc [ 15.018983] ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 15.019266] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.019684] ^ [ 15.019867] ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.020197] ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.020564] ================================================================== [ 15.021236] ================================================================== [ 15.021656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.022067] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279 [ 15.022348] [ 15.022436] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.022492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.022503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.022526] Call Trace: [ 15.022542] <TASK> [ 15.022557] dump_stack_lvl+0x73/0xb0 [ 15.022588] print_report+0xd1/0x610 [ 15.022611] ? __virt_addr_valid+0x1db/0x2d0 [ 15.022634] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.022660] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.022682] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.022709] kasan_report+0x141/0x180 [ 15.022730] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.022761] kasan_check_range+0x10c/0x1c0 [ 15.022785] __kasan_check_write+0x18/0x20 [ 15.022804] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.022829] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.022856] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.022880] ? trace_hardirqs_on+0x37/0xe0 [ 15.022902] ? kasan_bitops_generic+0x92/0x1c0 [ 15.022930] kasan_bitops_generic+0x116/0x1c0 [ 15.022954] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.022979] ? __pfx_read_tsc+0x10/0x10 [ 15.023000] ? ktime_get_ts64+0x86/0x230 [ 15.023024] kunit_try_run_case+0x1a5/0x480 [ 15.023049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.023071] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.023095] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.023120] ? __kthread_parkme+0x82/0x180 [ 15.023140] ? preempt_count_sub+0x50/0x80 [ 15.023164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.023188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.023225] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.023249] kthread+0x337/0x6f0 [ 15.023269] ? trace_preempt_on+0x20/0xc0 [ 15.023292] ? __pfx_kthread+0x10/0x10 [ 15.023312] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.023334] ? calculate_sigpending+0x7b/0xa0 [ 15.023359] ? __pfx_kthread+0x10/0x10 [ 15.023380] ret_from_fork+0x116/0x1d0 [ 15.023400] ? __pfx_kthread+0x10/0x10 [ 15.023421] ret_from_fork_asm+0x1a/0x30 [ 15.023452] </TASK> [ 15.023463] [ 15.031043] Allocated by task 279: [ 15.031262] kasan_save_stack+0x45/0x70 [ 15.031478] kasan_save_track+0x18/0x40 [ 15.031674] kasan_save_alloc_info+0x3b/0x50 [ 15.032001] __kasan_kmalloc+0xb7/0xc0 [ 15.032214] __kmalloc_cache_noprof+0x189/0x420 [ 15.032381] kasan_bitops_generic+0x92/0x1c0 [ 15.032546] kunit_try_run_case+0x1a5/0x480 [ 15.032697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.033107] kthread+0x337/0x6f0 [ 15.033282] ret_from_fork+0x116/0x1d0 [ 15.033488] ret_from_fork_asm+0x1a/0x30 [ 15.033690] [ 15.033793] The buggy address belongs to the object at ffff888102641aa0 [ 15.033793] which belongs to the cache kmalloc-16 of size 16 [ 15.034297] The buggy address is located 8 bytes inside of [ 15.034297] allocated 9-byte region [ffff888102641aa0, ffff888102641aa9) [ 15.034806] [ 15.034904] The buggy address belongs to the physical page: [ 15.035115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641 [ 15.035452] flags: 0x200000000000000(node=0|zone=2) [ 15.035681] page_type: f5(slab) [ 15.035865] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.036168] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.036489] page dumped because: kasan: bad access detected [ 15.036675] [ 15.036747] Memory state around the buggy address: [ 15.037201] ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc [ 15.037490] ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 15.037750] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.038063] ^ [ 15.038265] ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.038526] ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.038770] ================================================================== [ 15.078607] ================================================================== [ 15.078950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.079321] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279 [ 15.079621] [ 15.079742] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.079789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.079801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.079823] Call Trace: [ 15.079842] <TASK> [ 15.079857] dump_stack_lvl+0x73/0xb0 [ 15.079888] print_report+0xd1/0x610 [ 15.079912] ? __virt_addr_valid+0x1db/0x2d0 [ 15.079936] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.079962] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.079985] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.080011] kasan_report+0x141/0x180 [ 15.080034] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.080065] kasan_check_range+0x10c/0x1c0 [ 15.080088] __kasan_check_write+0x18/0x20 [ 15.080108] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.080134] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.080161] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.080185] ? trace_hardirqs_on+0x37/0xe0 [ 15.080209] ? kasan_bitops_generic+0x92/0x1c0 [ 15.080236] kasan_bitops_generic+0x116/0x1c0 [ 15.080260] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.080286] ? __pfx_read_tsc+0x10/0x10 [ 15.080308] ? ktime_get_ts64+0x86/0x230 [ 15.080333] kunit_try_run_case+0x1a5/0x480 [ 15.080359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.080383] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.080408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.080432] ? __kthread_parkme+0x82/0x180 [ 15.080453] ? preempt_count_sub+0x50/0x80 [ 15.080488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.080513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.080538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.080562] kthread+0x337/0x6f0 [ 15.080581] ? trace_preempt_on+0x20/0xc0 [ 15.080603] ? __pfx_kthread+0x10/0x10 [ 15.080624] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.080646] ? calculate_sigpending+0x7b/0xa0 [ 15.080671] ? __pfx_kthread+0x10/0x10 [ 15.080693] ret_from_fork+0x116/0x1d0 [ 15.080711] ? __pfx_kthread+0x10/0x10 [ 15.080732] ret_from_fork_asm+0x1a/0x30 [ 15.080763] </TASK> [ 15.080773] [ 15.089117] Allocated by task 279: [ 15.089310] kasan_save_stack+0x45/0x70 [ 15.089497] kasan_save_track+0x18/0x40 [ 15.089693] kasan_save_alloc_info+0x3b/0x50 [ 15.089848] __kasan_kmalloc+0xb7/0xc0 [ 15.089985] __kmalloc_cache_noprof+0x189/0x420 [ 15.090157] kasan_bitops_generic+0x92/0x1c0 [ 15.090312] kunit_try_run_case+0x1a5/0x480 [ 15.090542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.090801] kthread+0x337/0x6f0 [ 15.090974] ret_from_fork+0x116/0x1d0 [ 15.091167] ret_from_fork_asm+0x1a/0x30 [ 15.091519] [ 15.091617] The buggy address belongs to the object at ffff888102641aa0 [ 15.091617] which belongs to the cache kmalloc-16 of size 16 [ 15.092131] The buggy address is located 8 bytes inside of [ 15.092131] allocated 9-byte region [ffff888102641aa0, ffff888102641aa9) [ 15.092618] [ 15.092716] The buggy address belongs to the physical page: [ 15.093078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641 [ 15.093369] flags: 0x200000000000000(node=0|zone=2) [ 15.093598] page_type: f5(slab) [ 15.093756] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.094077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.094389] page dumped because: kasan: bad access detected [ 15.094614] [ 15.094701] Memory state around the buggy address: [ 15.095003] ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc [ 15.095319] ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 15.095624] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.095940] ^ [ 15.096116] ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.096421] ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.096732] ================================================================== [ 15.116780] ================================================================== [ 15.117456] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.117751] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279 [ 15.118120] [ 15.118236] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.118282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.118293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.118315] Call Trace: [ 15.118333] <TASK> [ 15.118348] dump_stack_lvl+0x73/0xb0 [ 15.118379] print_report+0xd1/0x610 [ 15.118403] ? __virt_addr_valid+0x1db/0x2d0 [ 15.118427] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.118453] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.118488] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.118514] kasan_report+0x141/0x180 [ 15.118537] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.118567] kasan_check_range+0x10c/0x1c0 [ 15.118590] __kasan_check_write+0x18/0x20 [ 15.118610] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.118636] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.118662] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.118687] ? trace_hardirqs_on+0x37/0xe0 [ 15.118709] ? kasan_bitops_generic+0x92/0x1c0 [ 15.118737] kasan_bitops_generic+0x116/0x1c0 [ 15.118760] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.118798] ? __pfx_read_tsc+0x10/0x10 [ 15.118820] ? ktime_get_ts64+0x86/0x230 [ 15.118845] kunit_try_run_case+0x1a5/0x480 [ 15.118869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.118892] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.118918] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.118941] ? __kthread_parkme+0x82/0x180 [ 15.118962] ? preempt_count_sub+0x50/0x80 [ 15.118987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.119011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.119035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.119058] kthread+0x337/0x6f0 [ 15.119077] ? trace_preempt_on+0x20/0xc0 [ 15.119100] ? __pfx_kthread+0x10/0x10 [ 15.119122] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.119143] ? calculate_sigpending+0x7b/0xa0 [ 15.119167] ? __pfx_kthread+0x10/0x10 [ 15.119188] ret_from_fork+0x116/0x1d0 [ 15.119207] ? __pfx_kthread+0x10/0x10 [ 15.119227] ret_from_fork_asm+0x1a/0x30 [ 15.119259] </TASK> [ 15.119269] [ 15.127437] Allocated by task 279: [ 15.127578] kasan_save_stack+0x45/0x70 [ 15.127756] kasan_save_track+0x18/0x40 [ 15.127962] kasan_save_alloc_info+0x3b/0x50 [ 15.128179] __kasan_kmalloc+0xb7/0xc0 [ 15.128372] __kmalloc_cache_noprof+0x189/0x420 [ 15.128608] kasan_bitops_generic+0x92/0x1c0 [ 15.128888] kunit_try_run_case+0x1a5/0x480 [ 15.129085] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.129309] kthread+0x337/0x6f0 [ 15.129480] ret_from_fork+0x116/0x1d0 [ 15.129639] ret_from_fork_asm+0x1a/0x30 [ 15.129848] [ 15.129921] The buggy address belongs to the object at ffff888102641aa0 [ 15.129921] which belongs to the cache kmalloc-16 of size 16 [ 15.130423] The buggy address is located 8 bytes inside of [ 15.130423] allocated 9-byte region [ffff888102641aa0, ffff888102641aa9) [ 15.130936] [ 15.131011] The buggy address belongs to the physical page: [ 15.131192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641 [ 15.131439] flags: 0x200000000000000(node=0|zone=2) [ 15.131691] page_type: f5(slab) [ 15.131860] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.132210] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.132450] page dumped because: kasan: bad access detected [ 15.132636] [ 15.132708] Memory state around the buggy address: [ 15.132999] ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc [ 15.133326] ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 15.133663] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.134262] ^ [ 15.134458] ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.134772] ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.135047] ================================================================== [ 15.058622] ================================================================== [ 15.059669] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.060132] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279 [ 15.060441] [ 15.060571] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.060617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.060630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.060651] Call Trace: [ 15.060662] <TASK> [ 15.060677] dump_stack_lvl+0x73/0xb0 [ 15.060707] print_report+0xd1/0x610 [ 15.060730] ? __virt_addr_valid+0x1db/0x2d0 [ 15.060753] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.060779] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.060810] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.060835] kasan_report+0x141/0x180 [ 15.060857] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.060887] kasan_check_range+0x10c/0x1c0 [ 15.060911] __kasan_check_write+0x18/0x20 [ 15.060930] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.060956] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.060982] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.061006] ? trace_hardirqs_on+0x37/0xe0 [ 15.061030] ? kasan_bitops_generic+0x92/0x1c0 [ 15.061057] kasan_bitops_generic+0x116/0x1c0 [ 15.061081] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.061105] ? __pfx_read_tsc+0x10/0x10 [ 15.061127] ? ktime_get_ts64+0x86/0x230 [ 15.061152] kunit_try_run_case+0x1a5/0x480 [ 15.061176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.061199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.061223] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.061246] ? __kthread_parkme+0x82/0x180 [ 15.061267] ? preempt_count_sub+0x50/0x80 [ 15.061291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.061316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.061339] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.061363] kthread+0x337/0x6f0 [ 15.061382] ? trace_preempt_on+0x20/0xc0 [ 15.061404] ? __pfx_kthread+0x10/0x10 [ 15.061425] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.061446] ? calculate_sigpending+0x7b/0xa0 [ 15.061482] ? __pfx_kthread+0x10/0x10 [ 15.061504] ret_from_fork+0x116/0x1d0 [ 15.061523] ? __pfx_kthread+0x10/0x10 [ 15.061544] ret_from_fork_asm+0x1a/0x30 [ 15.061575] </TASK> [ 15.061586] [ 15.069853] Allocated by task 279: [ 15.069987] kasan_save_stack+0x45/0x70 [ 15.070152] kasan_save_track+0x18/0x40 [ 15.070350] kasan_save_alloc_info+0x3b/0x50 [ 15.070581] __kasan_kmalloc+0xb7/0xc0 [ 15.070775] __kmalloc_cache_noprof+0x189/0x420 [ 15.071102] kasan_bitops_generic+0x92/0x1c0 [ 15.071298] kunit_try_run_case+0x1a5/0x480 [ 15.071490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.071723] kthread+0x337/0x6f0 [ 15.072001] ret_from_fork+0x116/0x1d0 [ 15.072149] ret_from_fork_asm+0x1a/0x30 [ 15.072352] [ 15.072435] The buggy address belongs to the object at ffff888102641aa0 [ 15.072435] which belongs to the cache kmalloc-16 of size 16 [ 15.072999] The buggy address is located 8 bytes inside of [ 15.072999] allocated 9-byte region [ffff888102641aa0, ffff888102641aa9) [ 15.073445] [ 15.073551] The buggy address belongs to the physical page: [ 15.073761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641 [ 15.074010] flags: 0x200000000000000(node=0|zone=2) [ 15.074189] page_type: f5(slab) [ 15.074315] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.074602] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.074944] page dumped because: kasan: bad access detected [ 15.075201] [ 15.075310] Memory state around the buggy address: [ 15.075551] ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc [ 15.075911] ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 15.076230] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.076451] ^ [ 15.076613] ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.077194] ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.077540] ================================================================== [ 15.097787] ================================================================== [ 15.098201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.098489] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279 [ 15.098900] [ 15.099015] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.099061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.099072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.099095] Call Trace: [ 15.099113] <TASK> [ 15.099130] dump_stack_lvl+0x73/0xb0 [ 15.099160] print_report+0xd1/0x610 [ 15.099183] ? __virt_addr_valid+0x1db/0x2d0 [ 15.099207] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.099233] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.099255] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.099281] kasan_report+0x141/0x180 [ 15.099303] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.099333] kasan_check_range+0x10c/0x1c0 [ 15.099357] __kasan_check_write+0x18/0x20 [ 15.099379] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.099405] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.099432] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.099456] ? trace_hardirqs_on+0x37/0xe0 [ 15.099490] ? kasan_bitops_generic+0x92/0x1c0 [ 15.099518] kasan_bitops_generic+0x116/0x1c0 [ 15.099542] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.099568] ? __pfx_read_tsc+0x10/0x10 [ 15.099591] ? ktime_get_ts64+0x86/0x230 [ 15.099615] kunit_try_run_case+0x1a5/0x480 [ 15.099640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.099662] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.099687] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.099711] ? __kthread_parkme+0x82/0x180 [ 15.099732] ? preempt_count_sub+0x50/0x80 [ 15.099755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.099779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.099802] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.099826] kthread+0x337/0x6f0 [ 15.099846] ? trace_preempt_on+0x20/0xc0 [ 15.099867] ? __pfx_kthread+0x10/0x10 [ 15.099888] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.099909] ? calculate_sigpending+0x7b/0xa0 [ 15.099933] ? __pfx_kthread+0x10/0x10 [ 15.099954] ret_from_fork+0x116/0x1d0 [ 15.099973] ? __pfx_kthread+0x10/0x10 [ 15.099993] ret_from_fork_asm+0x1a/0x30 [ 15.100025] </TASK> [ 15.100035] [ 15.108162] Allocated by task 279: [ 15.108300] kasan_save_stack+0x45/0x70 [ 15.108449] kasan_save_track+0x18/0x40 [ 15.108598] kasan_save_alloc_info+0x3b/0x50 [ 15.108754] __kasan_kmalloc+0xb7/0xc0 [ 15.108996] __kmalloc_cache_noprof+0x189/0x420 [ 15.109222] kasan_bitops_generic+0x92/0x1c0 [ 15.109439] kunit_try_run_case+0x1a5/0x480 [ 15.109669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.110100] kthread+0x337/0x6f0 [ 15.110307] ret_from_fork+0x116/0x1d0 [ 15.110517] ret_from_fork_asm+0x1a/0x30 [ 15.110724] [ 15.110831] The buggy address belongs to the object at ffff888102641aa0 [ 15.110831] which belongs to the cache kmalloc-16 of size 16 [ 15.111397] The buggy address is located 8 bytes inside of [ 15.111397] allocated 9-byte region [ffff888102641aa0, ffff888102641aa9) [ 15.111956] [ 15.112036] The buggy address belongs to the physical page: [ 15.112259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641 [ 15.112535] flags: 0x200000000000000(node=0|zone=2) [ 15.112777] page_type: f5(slab) [ 15.112950] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.113271] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.113516] page dumped because: kasan: bad access detected [ 15.113694] [ 15.113765] Memory state around the buggy address: [ 15.114037] ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc [ 15.114371] ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 15.114715] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.115062] ^ [ 15.115382] ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.115643] ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.115867] ================================================================== [ 15.135963] ================================================================== [ 15.136607] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.136882] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279 [ 15.137118] [ 15.137205] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.137251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.137263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.137285] Call Trace: [ 15.137303] <TASK> [ 15.137318] dump_stack_lvl+0x73/0xb0 [ 15.137347] print_report+0xd1/0x610 [ 15.137371] ? __virt_addr_valid+0x1db/0x2d0 [ 15.137394] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.137420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.137444] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.137481] kasan_report+0x141/0x180 [ 15.137504] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.137537] kasan_check_range+0x10c/0x1c0 [ 15.137562] __kasan_check_write+0x18/0x20 [ 15.137582] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.137607] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.137634] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.137659] ? trace_hardirqs_on+0x37/0xe0 [ 15.137683] ? kasan_bitops_generic+0x92/0x1c0 [ 15.137711] kasan_bitops_generic+0x116/0x1c0 [ 15.137735] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.137760] ? __pfx_read_tsc+0x10/0x10 [ 15.137782] ? ktime_get_ts64+0x86/0x230 [ 15.137806] kunit_try_run_case+0x1a5/0x480 [ 15.137831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.137854] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.137879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.137902] ? __kthread_parkme+0x82/0x180 [ 15.137923] ? preempt_count_sub+0x50/0x80 [ 15.137947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.137972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.137999] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.138023] kthread+0x337/0x6f0 [ 15.138042] ? trace_preempt_on+0x20/0xc0 [ 15.138065] ? __pfx_kthread+0x10/0x10 [ 15.138085] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.138115] ? calculate_sigpending+0x7b/0xa0 [ 15.138139] ? __pfx_kthread+0x10/0x10 [ 15.138161] ret_from_fork+0x116/0x1d0 [ 15.138180] ? __pfx_kthread+0x10/0x10 [ 15.138201] ret_from_fork_asm+0x1a/0x30 [ 15.138231] </TASK> [ 15.138242] [ 15.146815] Allocated by task 279: [ 15.146983] kasan_save_stack+0x45/0x70 [ 15.147166] kasan_save_track+0x18/0x40 [ 15.147358] kasan_save_alloc_info+0x3b/0x50 [ 15.147549] __kasan_kmalloc+0xb7/0xc0 [ 15.147739] __kmalloc_cache_noprof+0x189/0x420 [ 15.147983] kasan_bitops_generic+0x92/0x1c0 [ 15.148180] kunit_try_run_case+0x1a5/0x480 [ 15.148381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.148614] kthread+0x337/0x6f0 [ 15.148768] ret_from_fork+0x116/0x1d0 [ 15.148942] ret_from_fork_asm+0x1a/0x30 [ 15.149137] [ 15.149213] The buggy address belongs to the object at ffff888102641aa0 [ 15.149213] which belongs to the cache kmalloc-16 of size 16 [ 15.149695] The buggy address is located 8 bytes inside of [ 15.149695] allocated 9-byte region [ffff888102641aa0, ffff888102641aa9) [ 15.150371] [ 15.150478] The buggy address belongs to the physical page: [ 15.150704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641 [ 15.151079] flags: 0x200000000000000(node=0|zone=2) [ 15.151264] page_type: f5(slab) [ 15.151389] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.151695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.152327] page dumped because: kasan: bad access detected [ 15.152516] [ 15.152588] Memory state around the buggy address: [ 15.152770] ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc [ 15.153095] ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 15.153426] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.153718] ^ [ 15.154065] ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.154317] ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.154644] ================================================================== [ 15.039347] ================================================================== [ 15.039711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.040464] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279 [ 15.040772] [ 15.040901] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.040946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.040958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.040979] Call Trace: [ 15.040994] <TASK> [ 15.041008] dump_stack_lvl+0x73/0xb0 [ 15.041039] print_report+0xd1/0x610 [ 15.041062] ? __virt_addr_valid+0x1db/0x2d0 [ 15.041085] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.041112] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.041134] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.041160] kasan_report+0x141/0x180 [ 15.041182] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.041212] kasan_check_range+0x10c/0x1c0 [ 15.041236] __kasan_check_write+0x18/0x20 [ 15.041255] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.041281] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.041308] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.041332] ? trace_hardirqs_on+0x37/0xe0 [ 15.041355] ? kasan_bitops_generic+0x92/0x1c0 [ 15.041382] kasan_bitops_generic+0x116/0x1c0 [ 15.041406] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.041431] ? __pfx_read_tsc+0x10/0x10 [ 15.041453] ? ktime_get_ts64+0x86/0x230 [ 15.041490] kunit_try_run_case+0x1a5/0x480 [ 15.041515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.041538] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.041563] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.041587] ? __kthread_parkme+0x82/0x180 [ 15.041608] ? preempt_count_sub+0x50/0x80 [ 15.041633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.041658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.041681] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.041706] kthread+0x337/0x6f0 [ 15.041726] ? trace_preempt_on+0x20/0xc0 [ 15.041749] ? __pfx_kthread+0x10/0x10 [ 15.041771] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.041792] ? calculate_sigpending+0x7b/0xa0 [ 15.041817] ? __pfx_kthread+0x10/0x10 [ 15.041839] ret_from_fork+0x116/0x1d0 [ 15.041858] ? __pfx_kthread+0x10/0x10 [ 15.041878] ret_from_fork_asm+0x1a/0x30 [ 15.041909] </TASK> [ 15.041919] [ 15.049673] Allocated by task 279: [ 15.049807] kasan_save_stack+0x45/0x70 [ 15.049954] kasan_save_track+0x18/0x40 [ 15.050093] kasan_save_alloc_info+0x3b/0x50 [ 15.050263] __kasan_kmalloc+0xb7/0xc0 [ 15.050588] __kmalloc_cache_noprof+0x189/0x420 [ 15.050896] kasan_bitops_generic+0x92/0x1c0 [ 15.051113] kunit_try_run_case+0x1a5/0x480 [ 15.051330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.051599] kthread+0x337/0x6f0 [ 15.051772] ret_from_fork+0x116/0x1d0 [ 15.051962] ret_from_fork_asm+0x1a/0x30 [ 15.052162] [ 15.052257] The buggy address belongs to the object at ffff888102641aa0 [ 15.052257] which belongs to the cache kmalloc-16 of size 16 [ 15.052742] The buggy address is located 8 bytes inside of [ 15.052742] allocated 9-byte region [ffff888102641aa0, ffff888102641aa9) [ 15.053217] [ 15.053291] The buggy address belongs to the physical page: [ 15.053479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641 [ 15.053907] flags: 0x200000000000000(node=0|zone=2) [ 15.054158] page_type: f5(slab) [ 15.054338] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.054636] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.055099] page dumped because: kasan: bad access detected [ 15.055349] [ 15.055419] Memory state around the buggy address: [ 15.055660] ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc [ 15.055992] ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 15.056221] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.056430] ^ [ 15.056648] ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.057215] ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.057491] ==================================================================