Date
May 12, 2025, 11:48 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 19.435016] ================================================================== [ 19.435973] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 19.436840] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278 [ 19.437486] [ 19.437762] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.437877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.437903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.437947] Call Trace: [ 19.437987] <TASK> [ 19.438023] dump_stack_lvl+0x73/0xb0 [ 19.438236] print_report+0xd1/0x650 [ 19.438292] ? __virt_addr_valid+0x1db/0x2d0 [ 19.438332] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 19.438363] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.438388] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 19.438418] kasan_report+0x141/0x180 [ 19.438442] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 19.438476] kasan_check_range+0x10c/0x1c0 [ 19.438502] __kasan_check_write+0x18/0x20 [ 19.438524] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 19.438554] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.438584] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.438607] ? trace_hardirqs_on+0x37/0xe0 [ 19.438633] ? kasan_bitops_generic+0x92/0x1c0 [ 19.438684] kasan_bitops_generic+0x121/0x1c0 [ 19.438720] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.438748] ? __pfx_read_tsc+0x10/0x10 [ 19.438771] ? ktime_get_ts64+0x86/0x230 [ 19.438797] kunit_try_run_case+0x1a5/0x480 [ 19.438823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.438847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.438871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.438895] ? __kthread_parkme+0x82/0x180 [ 19.438917] ? preempt_count_sub+0x50/0x80 [ 19.438942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.438967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.439001] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.439029] kthread+0x337/0x6f0 [ 19.439100] ? trace_preempt_on+0x20/0xc0 [ 19.439147] ? __pfx_kthread+0x10/0x10 [ 19.439182] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.439215] ? calculate_sigpending+0x7b/0xa0 [ 19.439255] ? __pfx_kthread+0x10/0x10 [ 19.439307] ret_from_fork+0x116/0x1d0 [ 19.439339] ? __pfx_kthread+0x10/0x10 [ 19.439374] ret_from_fork_asm+0x1a/0x30 [ 19.439426] </TASK> [ 19.439448] [ 19.456151] Allocated by task 278: [ 19.456459] kasan_save_stack+0x45/0x70 [ 19.457030] kasan_save_track+0x18/0x40 [ 19.457859] kasan_save_alloc_info+0x3b/0x50 [ 19.458474] __kasan_kmalloc+0xb7/0xc0 [ 19.458827] __kmalloc_cache_noprof+0x189/0x420 [ 19.459064] kasan_bitops_generic+0x92/0x1c0 [ 19.459293] kunit_try_run_case+0x1a5/0x480 [ 19.459614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.460039] kthread+0x337/0x6f0 [ 19.460942] ret_from_fork+0x116/0x1d0 [ 19.461399] ret_from_fork_asm+0x1a/0x30 [ 19.461806] [ 19.461967] The buggy address belongs to the object at ffff8881026fb960 [ 19.461967] which belongs to the cache kmalloc-16 of size 16 [ 19.462871] The buggy address is located 8 bytes inside of [ 19.462871] allocated 9-byte region [ffff8881026fb960, ffff8881026fb969) [ 19.463831] [ 19.464540] The buggy address belongs to the physical page: [ 19.464915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb [ 19.465400] flags: 0x200000000000000(node=0|zone=2) [ 19.465989] page_type: f5(slab) [ 19.466539] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.467003] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.467521] page dumped because: kasan: bad access detected [ 19.467903] [ 19.468092] Memory state around the buggy address: [ 19.468456] ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc [ 19.469327] ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 19.470012] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.470431] ^ [ 19.470692] ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.471206] ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.471976] ================================================================== [ 19.548329] ================================================================== [ 19.548731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 19.549950] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278 [ 19.550982] [ 19.551214] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.551377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.551406] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.551467] Call Trace: [ 19.551509] <TASK> [ 19.551548] dump_stack_lvl+0x73/0xb0 [ 19.551615] print_report+0xd1/0x650 [ 19.551666] ? __virt_addr_valid+0x1db/0x2d0 [ 19.551731] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 19.551786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.552007] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 19.552086] kasan_report+0x141/0x180 [ 19.552117] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 19.552151] kasan_check_range+0x10c/0x1c0 [ 19.552176] __kasan_check_write+0x18/0x20 [ 19.552197] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 19.552226] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.552272] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.552310] ? trace_hardirqs_on+0x37/0xe0 [ 19.552345] ? kasan_bitops_generic+0x92/0x1c0 [ 19.552387] kasan_bitops_generic+0x121/0x1c0 [ 19.552425] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.552464] ? __pfx_read_tsc+0x10/0x10 [ 19.552488] ? ktime_get_ts64+0x86/0x230 [ 19.552512] kunit_try_run_case+0x1a5/0x480 [ 19.552539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.552562] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.552587] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.552610] ? __kthread_parkme+0x82/0x180 [ 19.552631] ? preempt_count_sub+0x50/0x80 [ 19.552658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.552708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.552735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.552759] kthread+0x337/0x6f0 [ 19.552780] ? trace_preempt_on+0x20/0xc0 [ 19.552803] ? __pfx_kthread+0x10/0x10 [ 19.552824] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.552845] ? calculate_sigpending+0x7b/0xa0 [ 19.552870] ? __pfx_kthread+0x10/0x10 [ 19.552892] ret_from_fork+0x116/0x1d0 [ 19.552911] ? __pfx_kthread+0x10/0x10 [ 19.552932] ret_from_fork_asm+0x1a/0x30 [ 19.552963] </TASK> [ 19.552977] [ 19.568275] Allocated by task 278: [ 19.568594] kasan_save_stack+0x45/0x70 [ 19.568936] kasan_save_track+0x18/0x40 [ 19.569136] kasan_save_alloc_info+0x3b/0x50 [ 19.569513] __kasan_kmalloc+0xb7/0xc0 [ 19.570703] __kmalloc_cache_noprof+0x189/0x420 [ 19.571095] kasan_bitops_generic+0x92/0x1c0 [ 19.571889] kunit_try_run_case+0x1a5/0x480 [ 19.572490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.572834] kthread+0x337/0x6f0 [ 19.573364] ret_from_fork+0x116/0x1d0 [ 19.573728] ret_from_fork_asm+0x1a/0x30 [ 19.574240] [ 19.575030] The buggy address belongs to the object at ffff8881026fb960 [ 19.575030] which belongs to the cache kmalloc-16 of size 16 [ 19.575814] The buggy address is located 8 bytes inside of [ 19.575814] allocated 9-byte region [ffff8881026fb960, ffff8881026fb969) [ 19.576767] [ 19.576961] The buggy address belongs to the physical page: [ 19.577939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb [ 19.578658] flags: 0x200000000000000(node=0|zone=2) [ 19.579382] page_type: f5(slab) [ 19.579658] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.580377] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.580899] page dumped because: kasan: bad access detected [ 19.581311] [ 19.581796] Memory state around the buggy address: [ 19.582283] ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc [ 19.582781] ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 19.583383] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.584334] ^ [ 19.585093] ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.585833] ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.586294] ================================================================== [ 19.509415] ================================================================== [ 19.509845] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 19.510487] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278 [ 19.511022] [ 19.511175] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.511805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.511842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.511882] Call Trace: [ 19.511919] <TASK> [ 19.511958] dump_stack_lvl+0x73/0xb0 [ 19.512026] print_report+0xd1/0x650 [ 19.512074] ? __virt_addr_valid+0x1db/0x2d0 [ 19.512119] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 19.512174] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.512222] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 19.512290] kasan_report+0x141/0x180 [ 19.512334] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 19.512400] kasan_check_range+0x10c/0x1c0 [ 19.512452] __kasan_check_write+0x18/0x20 [ 19.512495] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 19.512670] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.512745] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.512786] ? trace_hardirqs_on+0x37/0xe0 [ 19.512831] ? kasan_bitops_generic+0x92/0x1c0 [ 19.512891] kasan_bitops_generic+0x121/0x1c0 [ 19.512942] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.512988] ? __pfx_read_tsc+0x10/0x10 [ 19.513047] ? ktime_get_ts64+0x86/0x230 [ 19.513311] kunit_try_run_case+0x1a5/0x480 [ 19.513370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.513421] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.513472] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.513522] ? __kthread_parkme+0x82/0x180 [ 19.513563] ? preempt_count_sub+0x50/0x80 [ 19.513592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.513617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.513642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.513674] kthread+0x337/0x6f0 [ 19.513720] ? trace_preempt_on+0x20/0xc0 [ 19.513746] ? __pfx_kthread+0x10/0x10 [ 19.513769] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.513790] ? calculate_sigpending+0x7b/0xa0 [ 19.513817] ? __pfx_kthread+0x10/0x10 [ 19.513840] ret_from_fork+0x116/0x1d0 [ 19.513860] ? __pfx_kthread+0x10/0x10 [ 19.513883] ret_from_fork_asm+0x1a/0x30 [ 19.513915] </TASK> [ 19.513929] [ 19.529584] Allocated by task 278: [ 19.530601] kasan_save_stack+0x45/0x70 [ 19.531031] kasan_save_track+0x18/0x40 [ 19.531384] kasan_save_alloc_info+0x3b/0x50 [ 19.532150] __kasan_kmalloc+0xb7/0xc0 [ 19.532412] __kmalloc_cache_noprof+0x189/0x420 [ 19.532918] kasan_bitops_generic+0x92/0x1c0 [ 19.533789] kunit_try_run_case+0x1a5/0x480 [ 19.534446] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.534896] kthread+0x337/0x6f0 [ 19.535427] ret_from_fork+0x116/0x1d0 [ 19.535652] ret_from_fork_asm+0x1a/0x30 [ 19.535977] [ 19.536291] The buggy address belongs to the object at ffff8881026fb960 [ 19.536291] which belongs to the cache kmalloc-16 of size 16 [ 19.537068] The buggy address is located 8 bytes inside of [ 19.537068] allocated 9-byte region [ffff8881026fb960, ffff8881026fb969) [ 19.537769] [ 19.538753] The buggy address belongs to the physical page: [ 19.539127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb [ 19.539725] flags: 0x200000000000000(node=0|zone=2) [ 19.540455] page_type: f5(slab) [ 19.540929] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.541526] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.542087] page dumped because: kasan: bad access detected [ 19.542603] [ 19.542879] Memory state around the buggy address: [ 19.543628] ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc [ 19.544155] ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 19.545033] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.545663] ^ [ 19.546417] ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.546847] ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.547484] ================================================================== [ 19.587599] ================================================================== [ 19.588510] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 19.590002] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278 [ 19.590593] [ 19.591135] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.591316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.591351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.591391] Call Trace: [ 19.591430] <TASK> [ 19.591469] dump_stack_lvl+0x73/0xb0 [ 19.591528] print_report+0xd1/0x650 [ 19.591556] ? __virt_addr_valid+0x1db/0x2d0 [ 19.591581] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 19.591611] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.591635] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 19.591686] kasan_report+0x141/0x180 [ 19.591719] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 19.591753] kasan_check_range+0x10c/0x1c0 [ 19.591779] __kasan_check_write+0x18/0x20 [ 19.591799] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 19.591829] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.591860] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.591883] ? trace_hardirqs_on+0x37/0xe0 [ 19.591908] ? kasan_bitops_generic+0x92/0x1c0 [ 19.591938] kasan_bitops_generic+0x121/0x1c0 [ 19.591963] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.591990] ? __pfx_read_tsc+0x10/0x10 [ 19.592013] ? ktime_get_ts64+0x86/0x230 [ 19.592043] kunit_try_run_case+0x1a5/0x480 [ 19.592104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.592141] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.592177] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.592213] ? __kthread_parkme+0x82/0x180 [ 19.592248] ? preempt_count_sub+0x50/0x80 [ 19.592300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.592340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.592378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.592415] kthread+0x337/0x6f0 [ 19.592446] ? trace_preempt_on+0x20/0xc0 [ 19.592485] ? __pfx_kthread+0x10/0x10 [ 19.592533] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.592567] ? calculate_sigpending+0x7b/0xa0 [ 19.592594] ? __pfx_kthread+0x10/0x10 [ 19.592626] ret_from_fork+0x116/0x1d0 [ 19.592647] ? __pfx_kthread+0x10/0x10 [ 19.592680] ret_from_fork_asm+0x1a/0x30 [ 19.592719] </TASK> [ 19.592732] [ 19.605717] Allocated by task 278: [ 19.605839] kasan_save_stack+0x45/0x70 [ 19.605960] kasan_save_track+0x18/0x40 [ 19.606055] kasan_save_alloc_info+0x3b/0x50 [ 19.606153] __kasan_kmalloc+0xb7/0xc0 [ 19.606245] __kmalloc_cache_noprof+0x189/0x420 [ 19.606701] kasan_bitops_generic+0x92/0x1c0 [ 19.607196] kunit_try_run_case+0x1a5/0x480 [ 19.607723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.608598] kthread+0x337/0x6f0 [ 19.609136] ret_from_fork+0x116/0x1d0 [ 19.609578] ret_from_fork_asm+0x1a/0x30 [ 19.609983] [ 19.610176] The buggy address belongs to the object at ffff8881026fb960 [ 19.610176] which belongs to the cache kmalloc-16 of size 16 [ 19.611164] The buggy address is located 8 bytes inside of [ 19.611164] allocated 9-byte region [ffff8881026fb960, ffff8881026fb969) [ 19.612457] [ 19.612657] The buggy address belongs to the physical page: [ 19.613239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb [ 19.613941] flags: 0x200000000000000(node=0|zone=2) [ 19.614511] page_type: f5(slab) [ 19.614812] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.616139] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.616607] page dumped because: kasan: bad access detected [ 19.617081] [ 19.617205] Memory state around the buggy address: [ 19.617648] ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc [ 19.618355] ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 19.619013] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.619802] ^ [ 19.620530] ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.621369] ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.621779] ================================================================== [ 19.622608] ================================================================== [ 19.622947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 19.624382] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278 [ 19.625272] [ 19.625425] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.625854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.625888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.625925] Call Trace: [ 19.625960] <TASK> [ 19.625992] dump_stack_lvl+0x73/0xb0 [ 19.626050] print_report+0xd1/0x650 [ 19.626081] ? __virt_addr_valid+0x1db/0x2d0 [ 19.626113] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 19.626151] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.626186] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 19.626224] kasan_report+0x141/0x180 [ 19.626329] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 19.626392] kasan_check_range+0x10c/0x1c0 [ 19.626437] __kasan_check_write+0x18/0x20 [ 19.626460] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 19.626489] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.626520] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.626541] ? trace_hardirqs_on+0x37/0xe0 [ 19.626567] ? kasan_bitops_generic+0x92/0x1c0 [ 19.626595] kasan_bitops_generic+0x121/0x1c0 [ 19.626619] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.626645] ? __pfx_read_tsc+0x10/0x10 [ 19.626706] ? ktime_get_ts64+0x86/0x230 [ 19.626735] kunit_try_run_case+0x1a5/0x480 [ 19.626762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.626785] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.626809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.626834] ? __kthread_parkme+0x82/0x180 [ 19.626856] ? preempt_count_sub+0x50/0x80 [ 19.626881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.626905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.626929] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.626953] kthread+0x337/0x6f0 [ 19.626973] ? trace_preempt_on+0x20/0xc0 [ 19.627011] ? __pfx_kthread+0x10/0x10 [ 19.627036] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.627087] ? calculate_sigpending+0x7b/0xa0 [ 19.627128] ? __pfx_kthread+0x10/0x10 [ 19.627163] ret_from_fork+0x116/0x1d0 [ 19.627195] ? __pfx_kthread+0x10/0x10 [ 19.627228] ret_from_fork_asm+0x1a/0x30 [ 19.627291] </TASK> [ 19.627312] [ 19.645094] Allocated by task 278: [ 19.645815] kasan_save_stack+0x45/0x70 [ 19.646321] kasan_save_track+0x18/0x40 [ 19.647145] kasan_save_alloc_info+0x3b/0x50 [ 19.647378] __kasan_kmalloc+0xb7/0xc0 [ 19.647637] __kmalloc_cache_noprof+0x189/0x420 [ 19.648493] kasan_bitops_generic+0x92/0x1c0 [ 19.649018] kunit_try_run_case+0x1a5/0x480 [ 19.649249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.649637] kthread+0x337/0x6f0 [ 19.649924] ret_from_fork+0x116/0x1d0 [ 19.650733] ret_from_fork_asm+0x1a/0x30 [ 19.650977] [ 19.651458] The buggy address belongs to the object at ffff8881026fb960 [ 19.651458] which belongs to the cache kmalloc-16 of size 16 [ 19.652730] The buggy address is located 8 bytes inside of [ 19.652730] allocated 9-byte region [ffff8881026fb960, ffff8881026fb969) [ 19.653332] [ 19.653519] The buggy address belongs to the physical page: [ 19.653737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb [ 19.654428] flags: 0x200000000000000(node=0|zone=2) [ 19.654732] page_type: f5(slab) [ 19.654966] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.655331] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.655867] page dumped because: kasan: bad access detected [ 19.656320] [ 19.656490] Memory state around the buggy address: [ 19.656747] ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc [ 19.657185] ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 19.658208] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.658514] ^ [ 19.659598] ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660360] ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.660737] ================================================================== [ 19.396581] ================================================================== [ 19.397310] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 19.398732] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278 [ 19.399815] [ 19.399938] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.400004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.400019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.400062] Call Trace: [ 19.400113] <TASK> [ 19.400148] dump_stack_lvl+0x73/0xb0 [ 19.400221] print_report+0xd1/0x650 [ 19.400278] ? __virt_addr_valid+0x1db/0x2d0 [ 19.400325] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 19.400429] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.400478] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 19.400531] kasan_report+0x141/0x180 [ 19.400578] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 19.400640] kasan_check_range+0x10c/0x1c0 [ 19.400683] __kasan_check_write+0x18/0x20 [ 19.400718] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 19.400766] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.400819] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.400864] ? trace_hardirqs_on+0x37/0xe0 [ 19.400908] ? kasan_bitops_generic+0x92/0x1c0 [ 19.400955] kasan_bitops_generic+0x121/0x1c0 [ 19.400992] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.401019] ? __pfx_read_tsc+0x10/0x10 [ 19.401050] ? ktime_get_ts64+0x86/0x230 [ 19.401108] kunit_try_run_case+0x1a5/0x480 [ 19.401146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.401180] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.401218] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.401272] ? __kthread_parkme+0x82/0x180 [ 19.401302] ? preempt_count_sub+0x50/0x80 [ 19.401328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.401354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.401379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.401404] kthread+0x337/0x6f0 [ 19.401425] ? trace_preempt_on+0x20/0xc0 [ 19.401449] ? __pfx_kthread+0x10/0x10 [ 19.401472] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.401493] ? calculate_sigpending+0x7b/0xa0 [ 19.401519] ? __pfx_kthread+0x10/0x10 [ 19.401542] ret_from_fork+0x116/0x1d0 [ 19.401562] ? __pfx_kthread+0x10/0x10 [ 19.401584] ret_from_fork_asm+0x1a/0x30 [ 19.401618] </TASK> [ 19.401632] [ 19.417960] Allocated by task 278: [ 19.418315] kasan_save_stack+0x45/0x70 [ 19.418547] kasan_save_track+0x18/0x40 [ 19.419595] kasan_save_alloc_info+0x3b/0x50 [ 19.420028] __kasan_kmalloc+0xb7/0xc0 [ 19.420606] __kmalloc_cache_noprof+0x189/0x420 [ 19.420947] kasan_bitops_generic+0x92/0x1c0 [ 19.421199] kunit_try_run_case+0x1a5/0x480 [ 19.421559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.422000] kthread+0x337/0x6f0 [ 19.422224] ret_from_fork+0x116/0x1d0 [ 19.422841] ret_from_fork_asm+0x1a/0x30 [ 19.423769] [ 19.423972] The buggy address belongs to the object at ffff8881026fb960 [ 19.423972] which belongs to the cache kmalloc-16 of size 16 [ 19.424827] The buggy address is located 8 bytes inside of [ 19.424827] allocated 9-byte region [ffff8881026fb960, ffff8881026fb969) [ 19.425600] [ 19.425823] The buggy address belongs to the physical page: [ 19.426441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb [ 19.426923] flags: 0x200000000000000(node=0|zone=2) [ 19.427708] page_type: f5(slab) [ 19.428033] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.428508] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.428891] page dumped because: kasan: bad access detected [ 19.429544] [ 19.429759] Memory state around the buggy address: [ 19.430282] ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc [ 19.430853] ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 19.431850] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.432444] ^ [ 19.432871] ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.433526] ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.433997] ================================================================== [ 19.698605] ================================================================== [ 19.699695] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 19.700432] Read of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278 [ 19.700914] [ 19.701549] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.701757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.701777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.701802] Call Trace: [ 19.701824] <TASK> [ 19.701848] dump_stack_lvl+0x73/0xb0 [ 19.701885] print_report+0xd1/0x650 [ 19.701910] ? __virt_addr_valid+0x1db/0x2d0 [ 19.701935] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 19.701963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.701986] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 19.702015] kasan_report+0x141/0x180 [ 19.702038] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 19.702070] __asan_report_load8_noabort+0x18/0x20 [ 19.702095] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 19.702124] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.702153] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.702175] ? trace_hardirqs_on+0x37/0xe0 [ 19.702198] ? kasan_bitops_generic+0x92/0x1c0 [ 19.702226] kasan_bitops_generic+0x121/0x1c0 [ 19.702251] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.702302] ? __pfx_read_tsc+0x10/0x10 [ 19.702326] ? ktime_get_ts64+0x86/0x230 [ 19.702351] kunit_try_run_case+0x1a5/0x480 [ 19.702379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.702402] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.702426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.702449] ? __kthread_parkme+0x82/0x180 [ 19.702472] ? preempt_count_sub+0x50/0x80 [ 19.702496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.702520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.702543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.702567] kthread+0x337/0x6f0 [ 19.702588] ? trace_preempt_on+0x20/0xc0 [ 19.702610] ? __pfx_kthread+0x10/0x10 [ 19.702631] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.702653] ? calculate_sigpending+0x7b/0xa0 [ 19.702706] ? __pfx_kthread+0x10/0x10 [ 19.702731] ret_from_fork+0x116/0x1d0 [ 19.702751] ? __pfx_kthread+0x10/0x10 [ 19.702774] ret_from_fork_asm+0x1a/0x30 [ 19.702806] </TASK> [ 19.702819] [ 19.714059] Allocated by task 278: [ 19.714277] kasan_save_stack+0x45/0x70 [ 19.714629] kasan_save_track+0x18/0x40 [ 19.714943] kasan_save_alloc_info+0x3b/0x50 [ 19.715321] __kasan_kmalloc+0xb7/0xc0 [ 19.715645] __kmalloc_cache_noprof+0x189/0x420 [ 19.716015] kasan_bitops_generic+0x92/0x1c0 [ 19.716238] kunit_try_run_case+0x1a5/0x480 [ 19.716563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.717029] kthread+0x337/0x6f0 [ 19.717331] ret_from_fork+0x116/0x1d0 [ 19.717522] ret_from_fork_asm+0x1a/0x30 [ 19.717773] [ 19.717970] The buggy address belongs to the object at ffff8881026fb960 [ 19.717970] which belongs to the cache kmalloc-16 of size 16 [ 19.718751] The buggy address is located 8 bytes inside of [ 19.718751] allocated 9-byte region [ffff8881026fb960, ffff8881026fb969) [ 19.719386] [ 19.719603] The buggy address belongs to the physical page: [ 19.720080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb [ 19.720442] flags: 0x200000000000000(node=0|zone=2) [ 19.720972] page_type: f5(slab) [ 19.721246] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.721700] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.722197] page dumped because: kasan: bad access detected [ 19.722426] [ 19.722547] Memory state around the buggy address: [ 19.722759] ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc [ 19.723035] ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 19.723344] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.723958] ^ [ 19.724679] ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.725272] ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.725840] ================================================================== [ 19.473002] ================================================================== [ 19.473910] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 19.474691] Write of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278 [ 19.475490] [ 19.475782] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.475892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.475918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.475970] Call Trace: [ 19.476009] <TASK> [ 19.476195] dump_stack_lvl+0x73/0xb0 [ 19.476296] print_report+0xd1/0x650 [ 19.476345] ? __virt_addr_valid+0x1db/0x2d0 [ 19.476391] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 19.476444] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.476487] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 19.476547] kasan_report+0x141/0x180 [ 19.476609] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 19.476694] kasan_check_range+0x10c/0x1c0 [ 19.476727] __kasan_check_write+0x18/0x20 [ 19.476748] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 19.476778] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.476807] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.476828] ? trace_hardirqs_on+0x37/0xe0 [ 19.476852] ? kasan_bitops_generic+0x92/0x1c0 [ 19.476879] kasan_bitops_generic+0x121/0x1c0 [ 19.476904] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.476930] ? __pfx_read_tsc+0x10/0x10 [ 19.476953] ? ktime_get_ts64+0x86/0x230 [ 19.476977] kunit_try_run_case+0x1a5/0x480 [ 19.477003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.477026] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.477107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.477151] ? __kthread_parkme+0x82/0x180 [ 19.477187] ? preempt_count_sub+0x50/0x80 [ 19.477223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.477275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.477317] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.477352] kthread+0x337/0x6f0 [ 19.477384] ? trace_preempt_on+0x20/0xc0 [ 19.477423] ? __pfx_kthread+0x10/0x10 [ 19.477454] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.477490] ? calculate_sigpending+0x7b/0xa0 [ 19.477528] ? __pfx_kthread+0x10/0x10 [ 19.477591] ret_from_fork+0x116/0x1d0 [ 19.477628] ? __pfx_kthread+0x10/0x10 [ 19.477651] ret_from_fork_asm+0x1a/0x30 [ 19.477719] </TASK> [ 19.477733] [ 19.492198] Allocated by task 278: [ 19.492847] kasan_save_stack+0x45/0x70 [ 19.493186] kasan_save_track+0x18/0x40 [ 19.493633] kasan_save_alloc_info+0x3b/0x50 [ 19.493962] __kasan_kmalloc+0xb7/0xc0 [ 19.494895] __kmalloc_cache_noprof+0x189/0x420 [ 19.495418] kasan_bitops_generic+0x92/0x1c0 [ 19.495700] kunit_try_run_case+0x1a5/0x480 [ 19.495911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.496146] kthread+0x337/0x6f0 [ 19.496617] ret_from_fork+0x116/0x1d0 [ 19.497157] ret_from_fork_asm+0x1a/0x30 [ 19.498012] [ 19.498489] The buggy address belongs to the object at ffff8881026fb960 [ 19.498489] which belongs to the cache kmalloc-16 of size 16 [ 19.500304] The buggy address is located 8 bytes inside of [ 19.500304] allocated 9-byte region [ffff8881026fb960, ffff8881026fb969) [ 19.500874] [ 19.501088] The buggy address belongs to the physical page: [ 19.501479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb [ 19.501979] flags: 0x200000000000000(node=0|zone=2) [ 19.502335] page_type: f5(slab) [ 19.502548] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.503051] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.504232] page dumped because: kasan: bad access detected [ 19.504664] [ 19.504877] Memory state around the buggy address: [ 19.505482] ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc [ 19.505847] ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 19.506354] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.506987] ^ [ 19.507523] ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.507990] ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.508436] ================================================================== [ 19.662367] ================================================================== [ 19.663447] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 19.664362] Read of size 8 at addr ffff8881026fb968 by task kunit_try_catch/278 [ 19.665432] [ 19.665986] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) [ 19.666060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.666074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.666099] Call Trace: [ 19.666116] <TASK> [ 19.666140] dump_stack_lvl+0x73/0xb0 [ 19.666177] print_report+0xd1/0x650 [ 19.666203] ? __virt_addr_valid+0x1db/0x2d0 [ 19.666228] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 19.666272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.666306] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 19.666336] kasan_report+0x141/0x180 [ 19.666359] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 19.666391] kasan_check_range+0x10c/0x1c0 [ 19.666416] __kasan_check_read+0x15/0x20 [ 19.666436] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 19.666465] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 19.666495] ? __kmalloc_cache_noprof+0x189/0x420 [ 19.666517] ? trace_hardirqs_on+0x37/0xe0 [ 19.666542] ? kasan_bitops_generic+0x92/0x1c0 [ 19.666570] kasan_bitops_generic+0x121/0x1c0 [ 19.666595] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 19.666621] ? __pfx_read_tsc+0x10/0x10 [ 19.666644] ? ktime_get_ts64+0x86/0x230 [ 19.666681] kunit_try_run_case+0x1a5/0x480 [ 19.666712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.666735] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.666759] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.666783] ? __kthread_parkme+0x82/0x180 [ 19.666805] ? preempt_count_sub+0x50/0x80 [ 19.666831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.666855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.666879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.666904] kthread+0x337/0x6f0 [ 19.666925] ? trace_preempt_on+0x20/0xc0 [ 19.666948] ? __pfx_kthread+0x10/0x10 [ 19.666970] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.667002] ? calculate_sigpending+0x7b/0xa0 [ 19.667033] ? __pfx_kthread+0x10/0x10 [ 19.667056] ret_from_fork+0x116/0x1d0 [ 19.667076] ? __pfx_kthread+0x10/0x10 [ 19.667098] ret_from_fork_asm+0x1a/0x30 [ 19.667131] </TASK> [ 19.667143] [ 19.682832] Allocated by task 278: [ 19.683166] kasan_save_stack+0x45/0x70 [ 19.683432] kasan_save_track+0x18/0x40 [ 19.684141] kasan_save_alloc_info+0x3b/0x50 [ 19.684418] __kasan_kmalloc+0xb7/0xc0 [ 19.684584] __kmalloc_cache_noprof+0x189/0x420 [ 19.685204] kasan_bitops_generic+0x92/0x1c0 [ 19.685816] kunit_try_run_case+0x1a5/0x480 [ 19.686007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.686582] kthread+0x337/0x6f0 [ 19.686880] ret_from_fork+0x116/0x1d0 [ 19.687484] ret_from_fork_asm+0x1a/0x30 [ 19.687925] [ 19.688056] The buggy address belongs to the object at ffff8881026fb960 [ 19.688056] which belongs to the cache kmalloc-16 of size 16 [ 19.688536] The buggy address is located 8 bytes inside of [ 19.688536] allocated 9-byte region [ffff8881026fb960, ffff8881026fb969) [ 19.690108] [ 19.690231] The buggy address belongs to the physical page: [ 19.690485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026fb [ 19.691178] flags: 0x200000000000000(node=0|zone=2) [ 19.691471] page_type: f5(slab) [ 19.692088] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 19.692488] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.693176] page dumped because: kasan: bad access detected [ 19.693454] [ 19.693556] Memory state around the buggy address: [ 19.694466] ffff8881026fb800: 00 03 fc fc fa fb fc fc 00 02 fc fc 00 05 fc fc [ 19.694717] ffff8881026fb880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 19.695247] >ffff8881026fb900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.696052] ^ [ 19.696384] ffff8881026fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.696878] ffff8881026fba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.697325] ==================================================================