Date
May 26, 2025, 9:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.368527] ================================================================== [ 20.368654] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.368931] Write of size 8 at addr fff00000c3eeb5e8 by task kunit_try_catch/261 [ 20.369120] [ 20.369311] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT [ 20.370043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.370140] Hardware name: linux,dummy-virt (DT) [ 20.370427] Call trace: [ 20.370714] show_stack+0x20/0x38 (C) [ 20.371212] dump_stack_lvl+0x8c/0xd0 [ 20.371464] print_report+0x118/0x608 [ 20.371739] kasan_report+0xdc/0x128 [ 20.372104] kasan_check_range+0x100/0x1a8 [ 20.372173] __kasan_check_write+0x20/0x30 [ 20.372225] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.372279] kasan_bitops_generic+0x110/0x1c8 [ 20.372341] kunit_try_run_case+0x170/0x3f0 [ 20.372398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.372506] kthread+0x328/0x630 [ 20.372618] ret_from_fork+0x10/0x20 [ 20.372685] [ 20.372737] Allocated by task 261: [ 20.372773] kasan_save_stack+0x3c/0x68 [ 20.372820] kasan_save_track+0x20/0x40 [ 20.372862] kasan_save_alloc_info+0x40/0x58 [ 20.372904] __kasan_kmalloc+0xd4/0xd8 [ 20.372942] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.372988] kasan_bitops_generic+0xa0/0x1c8 [ 20.373028] kunit_try_run_case+0x170/0x3f0 [ 20.373067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.373122] kthread+0x328/0x630 [ 20.373189] ret_from_fork+0x10/0x20 [ 20.373246] [ 20.373269] The buggy address belongs to the object at fff00000c3eeb5e0 [ 20.373269] which belongs to the cache kmalloc-16 of size 16 [ 20.373347] The buggy address is located 8 bytes inside of [ 20.373347] allocated 9-byte region [fff00000c3eeb5e0, fff00000c3eeb5e9) [ 20.373472] [ 20.373499] The buggy address belongs to the physical page: [ 20.373562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eeb [ 20.373618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.373673] page_type: f5(slab) [ 20.373720] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.373776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.373816] page dumped because: kasan: bad access detected [ 20.373850] [ 20.373869] Memory state around the buggy address: [ 20.374024] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.375539] kasan_report+0xdc/0x128 [ 20.375964] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.376226] kunit_try_run_case+0x170/0x3f0 [ 20.377406] kasan_save_alloc_info+0x40/0x58 [ 20.378011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.378695] [ 20.379422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.380045] >fff00000c3eeb580: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.382031] show_stack+0x20/0x38 (C) [ 20.383484] kunit_try_run_case+0x170/0x3f0 [ 20.383636] [ 20.383717] The buggy address is located 8 bytes inside of [ 20.383717] allocated 9-byte region [fff00000c3eeb5e0, fff00000c3eeb5e9) [ 20.383939] page_type: f5(slab) [ 20.386530] Call trace: [ 20.387272] kasan_save_stack+0x3c/0x68 [ 20.389495] [ 20.390248] page_type: f5(slab) [ 20.397292] kunit_try_run_case+0x170/0x3f0 [ 20.398727] kasan_save_track+0x20/0x40 [ 20.399896] kthread+0x328/0x630 [ 20.400408] [ 20.400886] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.404019] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.406045] ==================================================================
[ 13.093694] ================================================================== [ 13.094791] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.095358] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.095758] [ 13.095992] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.096159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.096175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.096196] Call Trace: [ 13.096212] <TASK> [ 13.096228] dump_stack_lvl+0x73/0xb0 [ 13.096257] print_report+0xd1/0x650 [ 13.096282] ? __virt_addr_valid+0x1db/0x2d0 [ 13.096305] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.096331] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.096354] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.096396] kasan_report+0x141/0x180 [ 13.096419] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.096449] kasan_check_range+0x10c/0x1c0 [ 13.096474] __kasan_check_write+0x18/0x20 [ 13.096493] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.096519] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.096546] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.096566] ? trace_hardirqs_on+0x37/0xe0 [ 13.096590] ? kasan_bitops_generic+0x92/0x1c0 [ 13.096616] kasan_bitops_generic+0x116/0x1c0 [ 13.096636] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.096663] ? __pfx_read_tsc+0x10/0x10 [ 13.096685] ? ktime_get_ts64+0x86/0x230 [ 13.096710] kunit_try_run_case+0x1a5/0x480 [ 13.096731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.096750] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.096775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.096800] ? __kthread_parkme+0x82/0x180 [ 13.096820] ? preempt_count_sub+0x50/0x80 [ 13.096844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.096864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.096888] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.096912] kthread+0x337/0x6f0 [ 13.096931] ? trace_preempt_on+0x20/0xc0 [ 13.096953] ? __pfx_kthread+0x10/0x10 [ 13.096973] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.096996] ? calculate_sigpending+0x7b/0xa0 [ 13.097072] ? __pfx_kthread+0x10/0x10 [ 13.097096] ret_from_fork+0x116/0x1d0 [ 13.097115] ? __pfx_kthread+0x10/0x10 [ 13.097136] ret_from_fork_asm+0x1a/0x30 [ 13.097167] </TASK> [ 13.097177] [ 13.106200] Allocated by task 279: [ 13.106543] kasan_save_stack+0x45/0x70 [ 13.106928] kasan_save_track+0x18/0x40 [ 13.107279] kasan_save_alloc_info+0x3b/0x50 [ 13.107943] __kasan_kmalloc+0xb7/0xc0 [ 13.108285] __kmalloc_cache_noprof+0x189/0x420 [ 13.108533] kasan_bitops_generic+0x92/0x1c0 [ 13.108696] kunit_try_run_case+0x1a5/0x480 [ 13.108900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.109160] kthread+0x337/0x6f0 [ 13.109408] ret_from_fork+0x116/0x1d0 [ 13.109585] ret_from_fork_asm+0x1a/0x30 [ 13.109738] [ 13.109827] The buggy address belongs to the object at ffff888101892d40 [ 13.109827] which belongs to the cache kmalloc-16 of size 16 [ 13.110646] The buggy address is located 8 bytes inside of [ 13.110646] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.111148] [ 13.111246] The buggy address belongs to the physical page: [ 13.111489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.112540] flags: 0x200000000000000(node=0|zone=2) [ 13.113229] page_type: f5(slab) [ 13.113408] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.113892] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.114331] page dumped because: kasan: bad access detected [ 13.114768] [ 13.114852] Memory state around the buggy address: [ 13.115068] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.115601] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.116088] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.116501] ^ [ 13.116760] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.117443] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.117914] ================================================================== [ 13.164394] ================================================================== [ 13.164681] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.165145] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.165441] [ 13.165528] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.165574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.165585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.165607] Call Trace: [ 13.165620] <TASK> [ 13.165634] dump_stack_lvl+0x73/0xb0 [ 13.165660] print_report+0xd1/0x650 [ 13.165683] ? __virt_addr_valid+0x1db/0x2d0 [ 13.165743] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.165768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.165801] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.165827] kasan_report+0x141/0x180 [ 13.165877] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.165908] kasan_check_range+0x10c/0x1c0 [ 13.165931] __kasan_check_write+0x18/0x20 [ 13.165961] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.165987] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.166013] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.166037] ? trace_hardirqs_on+0x37/0xe0 [ 13.166060] ? kasan_bitops_generic+0x92/0x1c0 [ 13.166084] kasan_bitops_generic+0x116/0x1c0 [ 13.166103] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.166128] ? __pfx_read_tsc+0x10/0x10 [ 13.166148] ? ktime_get_ts64+0x86/0x230 [ 13.166245] kunit_try_run_case+0x1a5/0x480 [ 13.166283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.166303] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.166328] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.166353] ? __kthread_parkme+0x82/0x180 [ 13.166373] ? preempt_count_sub+0x50/0x80 [ 13.166407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.166428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.166451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.166475] kthread+0x337/0x6f0 [ 13.166494] ? trace_preempt_on+0x20/0xc0 [ 13.166516] ? __pfx_kthread+0x10/0x10 [ 13.166536] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.166559] ? calculate_sigpending+0x7b/0xa0 [ 13.166582] ? __pfx_kthread+0x10/0x10 [ 13.166603] ret_from_fork+0x116/0x1d0 [ 13.166621] ? __pfx_kthread+0x10/0x10 [ 13.166641] ret_from_fork_asm+0x1a/0x30 [ 13.166671] </TASK> [ 13.166682] [ 13.176737] Allocated by task 279: [ 13.176931] kasan_save_stack+0x45/0x70 [ 13.177193] kasan_save_track+0x18/0x40 [ 13.177437] kasan_save_alloc_info+0x3b/0x50 [ 13.177796] __kasan_kmalloc+0xb7/0xc0 [ 13.177997] __kmalloc_cache_noprof+0x189/0x420 [ 13.178300] kasan_bitops_generic+0x92/0x1c0 [ 13.178464] kunit_try_run_case+0x1a5/0x480 [ 13.178630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.179074] kthread+0x337/0x6f0 [ 13.179255] ret_from_fork+0x116/0x1d0 [ 13.179434] ret_from_fork_asm+0x1a/0x30 [ 13.179612] [ 13.179684] The buggy address belongs to the object at ffff888101892d40 [ 13.179684] which belongs to the cache kmalloc-16 of size 16 [ 13.180312] The buggy address is located 8 bytes inside of [ 13.180312] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.181031] [ 13.181249] The buggy address belongs to the physical page: [ 13.181478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.181724] flags: 0x200000000000000(node=0|zone=2) [ 13.181933] page_type: f5(slab) [ 13.182165] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.182667] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.183249] page dumped because: kasan: bad access detected [ 13.183468] [ 13.183586] Memory state around the buggy address: [ 13.183909] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.184302] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.184616] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.185050] ^ [ 13.185348] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.185647] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.186340] ================================================================== [ 13.051914] ================================================================== [ 13.052501] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.052900] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.053251] [ 13.053368] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.053428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.053441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.053464] Call Trace: [ 13.053476] <TASK> [ 13.053493] dump_stack_lvl+0x73/0xb0 [ 13.053520] print_report+0xd1/0x650 [ 13.053543] ? __virt_addr_valid+0x1db/0x2d0 [ 13.053567] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.053592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.053614] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.053640] kasan_report+0x141/0x180 [ 13.053663] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.053693] kasan_check_range+0x10c/0x1c0 [ 13.053716] __kasan_check_write+0x18/0x20 [ 13.053735] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.053761] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.053787] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.053808] ? trace_hardirqs_on+0x37/0xe0 [ 13.053830] ? kasan_bitops_generic+0x92/0x1c0 [ 13.053853] kasan_bitops_generic+0x116/0x1c0 [ 13.053873] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.053898] ? __pfx_read_tsc+0x10/0x10 [ 13.053919] ? ktime_get_ts64+0x86/0x230 [ 13.053943] kunit_try_run_case+0x1a5/0x480 [ 13.053965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.053984] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.054021] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.054049] ? __kthread_parkme+0x82/0x180 [ 13.054070] ? preempt_count_sub+0x50/0x80 [ 13.054094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.054114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.054138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.054162] kthread+0x337/0x6f0 [ 13.054180] ? trace_preempt_on+0x20/0xc0 [ 13.054202] ? __pfx_kthread+0x10/0x10 [ 13.054222] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.054245] ? calculate_sigpending+0x7b/0xa0 [ 13.054269] ? __pfx_kthread+0x10/0x10 [ 13.054290] ret_from_fork+0x116/0x1d0 [ 13.054308] ? __pfx_kthread+0x10/0x10 [ 13.054328] ret_from_fork_asm+0x1a/0x30 [ 13.054358] </TASK> [ 13.054368] [ 13.062590] Allocated by task 279: [ 13.062777] kasan_save_stack+0x45/0x70 [ 13.062986] kasan_save_track+0x18/0x40 [ 13.063169] kasan_save_alloc_info+0x3b/0x50 [ 13.063455] __kasan_kmalloc+0xb7/0xc0 [ 13.063606] __kmalloc_cache_noprof+0x189/0x420 [ 13.063920] kasan_bitops_generic+0x92/0x1c0 [ 13.064186] kunit_try_run_case+0x1a5/0x480 [ 13.064392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.064618] kthread+0x337/0x6f0 [ 13.064808] ret_from_fork+0x116/0x1d0 [ 13.064962] ret_from_fork_asm+0x1a/0x30 [ 13.065205] [ 13.065289] The buggy address belongs to the object at ffff888101892d40 [ 13.065289] which belongs to the cache kmalloc-16 of size 16 [ 13.065813] The buggy address is located 8 bytes inside of [ 13.065813] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.066438] [ 13.066520] The buggy address belongs to the physical page: [ 13.066696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.066941] flags: 0x200000000000000(node=0|zone=2) [ 13.067172] page_type: f5(slab) [ 13.067559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.067980] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.068291] page dumped because: kasan: bad access detected [ 13.068481] [ 13.068552] Memory state around the buggy address: [ 13.068708] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.069176] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.069512] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.069836] ^ [ 13.070171] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.070450] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.070700] ================================================================== [ 13.209235] ================================================================== [ 13.209558] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.209853] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.210570] [ 13.210703] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.210761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.210774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.210795] Call Trace: [ 13.210810] <TASK> [ 13.210825] dump_stack_lvl+0x73/0xb0 [ 13.210851] print_report+0xd1/0x650 [ 13.210874] ? __virt_addr_valid+0x1db/0x2d0 [ 13.210896] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.210921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.210943] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.210968] kasan_report+0x141/0x180 [ 13.210990] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.211088] kasan_check_range+0x10c/0x1c0 [ 13.211157] __kasan_check_write+0x18/0x20 [ 13.211188] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.211224] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.211251] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.211271] ? trace_hardirqs_on+0x37/0xe0 [ 13.211293] ? kasan_bitops_generic+0x92/0x1c0 [ 13.211317] kasan_bitops_generic+0x116/0x1c0 [ 13.211338] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.211363] ? __pfx_read_tsc+0x10/0x10 [ 13.211393] ? ktime_get_ts64+0x86/0x230 [ 13.211417] kunit_try_run_case+0x1a5/0x480 [ 13.211438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.211458] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.211482] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.211507] ? __kthread_parkme+0x82/0x180 [ 13.211556] ? preempt_count_sub+0x50/0x80 [ 13.211580] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.211613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.211637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.211662] kthread+0x337/0x6f0 [ 13.211681] ? trace_preempt_on+0x20/0xc0 [ 13.211703] ? __pfx_kthread+0x10/0x10 [ 13.211736] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.211759] ? calculate_sigpending+0x7b/0xa0 [ 13.211782] ? __pfx_kthread+0x10/0x10 [ 13.211804] ret_from_fork+0x116/0x1d0 [ 13.211822] ? __pfx_kthread+0x10/0x10 [ 13.211843] ret_from_fork_asm+0x1a/0x30 [ 13.211872] </TASK> [ 13.211882] [ 13.222246] Allocated by task 279: [ 13.222438] kasan_save_stack+0x45/0x70 [ 13.222641] kasan_save_track+0x18/0x40 [ 13.222877] kasan_save_alloc_info+0x3b/0x50 [ 13.223029] __kasan_kmalloc+0xb7/0xc0 [ 13.223448] __kmalloc_cache_noprof+0x189/0x420 [ 13.223911] kasan_bitops_generic+0x92/0x1c0 [ 13.224256] kunit_try_run_case+0x1a5/0x480 [ 13.224476] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.224732] kthread+0x337/0x6f0 [ 13.224909] ret_from_fork+0x116/0x1d0 [ 13.225149] ret_from_fork_asm+0x1a/0x30 [ 13.225648] [ 13.225726] The buggy address belongs to the object at ffff888101892d40 [ 13.225726] which belongs to the cache kmalloc-16 of size 16 [ 13.226399] The buggy address is located 8 bytes inside of [ 13.226399] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.226991] [ 13.227199] The buggy address belongs to the physical page: [ 13.227573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.227989] flags: 0x200000000000000(node=0|zone=2) [ 13.228251] page_type: f5(slab) [ 13.228405] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.228822] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.229208] page dumped because: kasan: bad access detected [ 13.229546] [ 13.229618] Memory state around the buggy address: [ 13.230180] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.230516] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.230925] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.231412] ^ [ 13.231695] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.231998] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.232430] ================================================================== [ 13.071181] ================================================================== [ 13.071854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.072227] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.072538] [ 13.072645] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.072689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.072701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.072722] Call Trace: [ 13.072735] <TASK> [ 13.072748] dump_stack_lvl+0x73/0xb0 [ 13.072774] print_report+0xd1/0x650 [ 13.072797] ? __virt_addr_valid+0x1db/0x2d0 [ 13.072819] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.072845] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.072868] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.072893] kasan_report+0x141/0x180 [ 13.072916] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.072946] kasan_check_range+0x10c/0x1c0 [ 13.072970] __kasan_check_write+0x18/0x20 [ 13.072992] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.073018] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.073095] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.073117] ? trace_hardirqs_on+0x37/0xe0 [ 13.073139] ? kasan_bitops_generic+0x92/0x1c0 [ 13.073164] kasan_bitops_generic+0x116/0x1c0 [ 13.073185] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.073209] ? __pfx_read_tsc+0x10/0x10 [ 13.073229] ? ktime_get_ts64+0x86/0x230 [ 13.073254] kunit_try_run_case+0x1a5/0x480 [ 13.073275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.073294] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.073318] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.073343] ? __kthread_parkme+0x82/0x180 [ 13.073363] ? preempt_count_sub+0x50/0x80 [ 13.073400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.073421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.073445] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.073469] kthread+0x337/0x6f0 [ 13.073489] ? trace_preempt_on+0x20/0xc0 [ 13.073511] ? __pfx_kthread+0x10/0x10 [ 13.073532] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.073554] ? calculate_sigpending+0x7b/0xa0 [ 13.073578] ? __pfx_kthread+0x10/0x10 [ 13.073599] ret_from_fork+0x116/0x1d0 [ 13.073617] ? __pfx_kthread+0x10/0x10 [ 13.073637] ret_from_fork_asm+0x1a/0x30 [ 13.073668] </TASK> [ 13.073678] [ 13.082256] Allocated by task 279: [ 13.082397] kasan_save_stack+0x45/0x70 [ 13.082911] kasan_save_track+0x18/0x40 [ 13.083273] kasan_save_alloc_info+0x3b/0x50 [ 13.083510] __kasan_kmalloc+0xb7/0xc0 [ 13.083702] __kmalloc_cache_noprof+0x189/0x420 [ 13.083973] kasan_bitops_generic+0x92/0x1c0 [ 13.084220] kunit_try_run_case+0x1a5/0x480 [ 13.084409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.084626] kthread+0x337/0x6f0 [ 13.084822] ret_from_fork+0x116/0x1d0 [ 13.084970] ret_from_fork_asm+0x1a/0x30 [ 13.085281] [ 13.085413] The buggy address belongs to the object at ffff888101892d40 [ 13.085413] which belongs to the cache kmalloc-16 of size 16 [ 13.085924] The buggy address is located 8 bytes inside of [ 13.085924] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.086410] [ 13.086510] The buggy address belongs to the physical page: [ 13.086773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.087403] flags: 0x200000000000000(node=0|zone=2) [ 13.087613] page_type: f5(slab) [ 13.087825] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.088222] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.088563] page dumped because: kasan: bad access detected [ 13.088832] [ 13.088918] Memory state around the buggy address: [ 13.089178] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.089503] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.089733] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.089950] ^ [ 13.090139] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.091126] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.091945] ================================================================== [ 13.186830] ================================================================== [ 13.187284] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.187713] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.188163] [ 13.188254] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.188334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.188347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.188386] Call Trace: [ 13.188428] <TASK> [ 13.188443] dump_stack_lvl+0x73/0xb0 [ 13.188470] print_report+0xd1/0x650 [ 13.188504] ? __virt_addr_valid+0x1db/0x2d0 [ 13.188526] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.188552] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.188574] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.188629] kasan_report+0x141/0x180 [ 13.188652] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.188693] kasan_check_range+0x10c/0x1c0 [ 13.188745] __kasan_check_write+0x18/0x20 [ 13.188764] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.188800] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.188827] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.188847] ? trace_hardirqs_on+0x37/0xe0 [ 13.188869] ? kasan_bitops_generic+0x92/0x1c0 [ 13.188893] kasan_bitops_generic+0x116/0x1c0 [ 13.188912] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.188938] ? __pfx_read_tsc+0x10/0x10 [ 13.188958] ? ktime_get_ts64+0x86/0x230 [ 13.188983] kunit_try_run_case+0x1a5/0x480 [ 13.189003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.189023] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.189047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.189072] ? __kthread_parkme+0x82/0x180 [ 13.189162] ? preempt_count_sub+0x50/0x80 [ 13.189202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.189224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.189250] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.189275] kthread+0x337/0x6f0 [ 13.189294] ? trace_preempt_on+0x20/0xc0 [ 13.189318] ? __pfx_kthread+0x10/0x10 [ 13.189339] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.189361] ? calculate_sigpending+0x7b/0xa0 [ 13.189396] ? __pfx_kthread+0x10/0x10 [ 13.189418] ret_from_fork+0x116/0x1d0 [ 13.189436] ? __pfx_kthread+0x10/0x10 [ 13.189456] ret_from_fork_asm+0x1a/0x30 [ 13.189486] </TASK> [ 13.189496] [ 13.199305] Allocated by task 279: [ 13.199455] kasan_save_stack+0x45/0x70 [ 13.199718] kasan_save_track+0x18/0x40 [ 13.199920] kasan_save_alloc_info+0x3b/0x50 [ 13.200241] __kasan_kmalloc+0xb7/0xc0 [ 13.200490] __kmalloc_cache_noprof+0x189/0x420 [ 13.200783] kasan_bitops_generic+0x92/0x1c0 [ 13.201066] kunit_try_run_case+0x1a5/0x480 [ 13.201399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.201645] kthread+0x337/0x6f0 [ 13.201957] ret_from_fork+0x116/0x1d0 [ 13.202353] ret_from_fork_asm+0x1a/0x30 [ 13.202523] [ 13.202595] The buggy address belongs to the object at ffff888101892d40 [ 13.202595] which belongs to the cache kmalloc-16 of size 16 [ 13.203068] The buggy address is located 8 bytes inside of [ 13.203068] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.203770] [ 13.203870] The buggy address belongs to the physical page: [ 13.204169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.204622] flags: 0x200000000000000(node=0|zone=2) [ 13.204973] page_type: f5(slab) [ 13.205094] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.205402] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.205804] page dumped because: kasan: bad access detected [ 13.206075] [ 13.206174] Memory state around the buggy address: [ 13.206475] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.206924] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.207433] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.207687] ^ [ 13.207991] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.208361] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.208766] ================================================================== [ 13.141147] ================================================================== [ 13.141508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.142227] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.142561] [ 13.142676] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.142735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.142747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.142769] Call Trace: [ 13.142783] <TASK> [ 13.142798] dump_stack_lvl+0x73/0xb0 [ 13.142858] print_report+0xd1/0x650 [ 13.142881] ? __virt_addr_valid+0x1db/0x2d0 [ 13.142915] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.142941] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.142964] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.142990] kasan_report+0x141/0x180 [ 13.143013] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.143042] kasan_check_range+0x10c/0x1c0 [ 13.143066] __kasan_check_write+0x18/0x20 [ 13.143085] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.143111] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.143137] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.143157] ? trace_hardirqs_on+0x37/0xe0 [ 13.143178] ? kasan_bitops_generic+0x92/0x1c0 [ 13.143201] kasan_bitops_generic+0x116/0x1c0 [ 13.143221] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.143246] ? __pfx_read_tsc+0x10/0x10 [ 13.143266] ? ktime_get_ts64+0x86/0x230 [ 13.143290] kunit_try_run_case+0x1a5/0x480 [ 13.143310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.143329] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.143444] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.143494] ? __kthread_parkme+0x82/0x180 [ 13.143517] ? preempt_count_sub+0x50/0x80 [ 13.143539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.143560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.143585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.143608] kthread+0x337/0x6f0 [ 13.143627] ? trace_preempt_on+0x20/0xc0 [ 13.143649] ? __pfx_kthread+0x10/0x10 [ 13.143669] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.143692] ? calculate_sigpending+0x7b/0xa0 [ 13.143722] ? __pfx_kthread+0x10/0x10 [ 13.143742] ret_from_fork+0x116/0x1d0 [ 13.143761] ? __pfx_kthread+0x10/0x10 [ 13.143781] ret_from_fork_asm+0x1a/0x30 [ 13.143811] </TASK> [ 13.143821] [ 13.153962] Allocated by task 279: [ 13.154235] kasan_save_stack+0x45/0x70 [ 13.154469] kasan_save_track+0x18/0x40 [ 13.154701] kasan_save_alloc_info+0x3b/0x50 [ 13.154961] __kasan_kmalloc+0xb7/0xc0 [ 13.155217] __kmalloc_cache_noprof+0x189/0x420 [ 13.155389] kasan_bitops_generic+0x92/0x1c0 [ 13.155603] kunit_try_run_case+0x1a5/0x480 [ 13.155942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.156140] kthread+0x337/0x6f0 [ 13.156670] ret_from_fork+0x116/0x1d0 [ 13.156890] ret_from_fork_asm+0x1a/0x30 [ 13.157170] [ 13.157358] The buggy address belongs to the object at ffff888101892d40 [ 13.157358] which belongs to the cache kmalloc-16 of size 16 [ 13.157798] The buggy address is located 8 bytes inside of [ 13.157798] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.158644] [ 13.158895] The buggy address belongs to the physical page: [ 13.159146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.159569] flags: 0x200000000000000(node=0|zone=2) [ 13.159803] page_type: f5(slab) [ 13.159983] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.160329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.160704] page dumped because: kasan: bad access detected [ 13.160943] [ 13.161250] Memory state around the buggy address: [ 13.161473] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.161867] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.162280] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.162620] ^ [ 13.162958] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.163407] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.163896] ================================================================== [ 13.118786] ================================================================== [ 13.119540] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.120024] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.120597] [ 13.120709] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.120756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.120768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.120790] Call Trace: [ 13.120804] <TASK> [ 13.120819] dump_stack_lvl+0x73/0xb0 [ 13.120846] print_report+0xd1/0x650 [ 13.120868] ? __virt_addr_valid+0x1db/0x2d0 [ 13.120890] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.120915] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.120938] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.120963] kasan_report+0x141/0x180 [ 13.120985] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.121088] kasan_check_range+0x10c/0x1c0 [ 13.121131] __kasan_check_write+0x18/0x20 [ 13.121151] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.121177] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.121204] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.121225] ? trace_hardirqs_on+0x37/0xe0 [ 13.121247] ? kasan_bitops_generic+0x92/0x1c0 [ 13.121271] kasan_bitops_generic+0x116/0x1c0 [ 13.121291] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.121316] ? __pfx_read_tsc+0x10/0x10 [ 13.121336] ? ktime_get_ts64+0x86/0x230 [ 13.121360] kunit_try_run_case+0x1a5/0x480 [ 13.121389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.121409] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.121433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.121458] ? __kthread_parkme+0x82/0x180 [ 13.121478] ? preempt_count_sub+0x50/0x80 [ 13.121501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.121522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.121546] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.121569] kthread+0x337/0x6f0 [ 13.121588] ? trace_preempt_on+0x20/0xc0 [ 13.121610] ? __pfx_kthread+0x10/0x10 [ 13.121630] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.121652] ? calculate_sigpending+0x7b/0xa0 [ 13.121676] ? __pfx_kthread+0x10/0x10 [ 13.121697] ret_from_fork+0x116/0x1d0 [ 13.121723] ? __pfx_kthread+0x10/0x10 [ 13.121743] ret_from_fork_asm+0x1a/0x30 [ 13.121773] </TASK> [ 13.121783] [ 13.131703] Allocated by task 279: [ 13.131837] kasan_save_stack+0x45/0x70 [ 13.132138] kasan_save_track+0x18/0x40 [ 13.132441] kasan_save_alloc_info+0x3b/0x50 [ 13.132663] __kasan_kmalloc+0xb7/0xc0 [ 13.132857] __kmalloc_cache_noprof+0x189/0x420 [ 13.133085] kasan_bitops_generic+0x92/0x1c0 [ 13.133453] kunit_try_run_case+0x1a5/0x480 [ 13.133633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.133920] kthread+0x337/0x6f0 [ 13.134289] ret_from_fork+0x116/0x1d0 [ 13.134532] ret_from_fork_asm+0x1a/0x30 [ 13.134677] [ 13.134748] The buggy address belongs to the object at ffff888101892d40 [ 13.134748] which belongs to the cache kmalloc-16 of size 16 [ 13.135404] The buggy address is located 8 bytes inside of [ 13.135404] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.136206] [ 13.136287] The buggy address belongs to the physical page: [ 13.136547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.136985] flags: 0x200000000000000(node=0|zone=2) [ 13.137269] page_type: f5(slab) [ 13.137458] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.137808] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.138042] page dumped because: kasan: bad access detected [ 13.138282] [ 13.138412] Memory state around the buggy address: [ 13.138646] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.139052] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.139451] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.139770] ^ [ 13.140097] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.140346] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.140671] ==================================================================