Date
May 26, 2025, 9:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.445874] ================================================================== [ 20.447492] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 20.447746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.448162] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 20.448411] kthread+0x328/0x630 [ 20.448532] [ 20.448725] __kasan_kmalloc+0xd4/0xd8 [ 20.448764] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.449123] The buggy address is located 8 bytes inside of [ 20.449123] allocated 9-byte region [fff00000c3eeb5e0, fff00000c3eeb5e9) [ 20.450412] page dumped because: kasan: bad access detected [ 20.450978] fff00000c3eeb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.451123] ==================================================================
[ 13.233239] ================================================================== [ 13.233571] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.234126] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.234467] [ 13.234646] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.234692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.234728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.234773] Call Trace: [ 13.234816] <TASK> [ 13.234831] dump_stack_lvl+0x73/0xb0 [ 13.234857] print_report+0xd1/0x650 [ 13.234880] ? __virt_addr_valid+0x1db/0x2d0 [ 13.234902] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.234929] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.234952] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.234979] kasan_report+0x141/0x180 [ 13.235002] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.235034] kasan_check_range+0x10c/0x1c0 [ 13.235058] __kasan_check_write+0x18/0x20 [ 13.235078] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.235106] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.235134] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.235154] ? trace_hardirqs_on+0x37/0xe0 [ 13.235175] ? kasan_bitops_generic+0x92/0x1c0 [ 13.235199] kasan_bitops_generic+0x121/0x1c0 [ 13.235219] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.235244] ? __pfx_read_tsc+0x10/0x10 [ 13.235265] ? ktime_get_ts64+0x86/0x230 [ 13.235289] kunit_try_run_case+0x1a5/0x480 [ 13.235310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.235330] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.235354] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.235392] ? __kthread_parkme+0x82/0x180 [ 13.235412] ? preempt_count_sub+0x50/0x80 [ 13.235435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.235456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.235481] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.235505] kthread+0x337/0x6f0 [ 13.235524] ? trace_preempt_on+0x20/0xc0 [ 13.235546] ? __pfx_kthread+0x10/0x10 [ 13.235567] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.235590] ? calculate_sigpending+0x7b/0xa0 [ 13.235614] ? __pfx_kthread+0x10/0x10 [ 13.235635] ret_from_fork+0x116/0x1d0 [ 13.235654] ? __pfx_kthread+0x10/0x10 [ 13.235674] ret_from_fork_asm+0x1a/0x30 [ 13.235704] </TASK> [ 13.235715] [ 13.246136] Allocated by task 279: [ 13.246370] kasan_save_stack+0x45/0x70 [ 13.246705] kasan_save_track+0x18/0x40 [ 13.246951] kasan_save_alloc_info+0x3b/0x50 [ 13.247244] __kasan_kmalloc+0xb7/0xc0 [ 13.247427] __kmalloc_cache_noprof+0x189/0x420 [ 13.247584] kasan_bitops_generic+0x92/0x1c0 [ 13.247925] kunit_try_run_case+0x1a5/0x480 [ 13.248240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.248566] kthread+0x337/0x6f0 [ 13.248760] ret_from_fork+0x116/0x1d0 [ 13.248907] ret_from_fork_asm+0x1a/0x30 [ 13.249347] [ 13.249478] The buggy address belongs to the object at ffff888101892d40 [ 13.249478] which belongs to the cache kmalloc-16 of size 16 [ 13.250151] The buggy address is located 8 bytes inside of [ 13.250151] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.250748] [ 13.250851] The buggy address belongs to the physical page: [ 13.251206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.251586] flags: 0x200000000000000(node=0|zone=2) [ 13.251903] page_type: f5(slab) [ 13.252201] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.252589] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.253015] page dumped because: kasan: bad access detected [ 13.253192] [ 13.253291] Memory state around the buggy address: [ 13.253534] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.253929] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.254264] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.254729] ^ [ 13.254917] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.255488] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.256147] ================================================================== [ 13.344323] ================================================================== [ 13.344688] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.345143] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.345409] [ 13.345514] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.345557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.345569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.345590] Call Trace: [ 13.345607] <TASK> [ 13.345623] dump_stack_lvl+0x73/0xb0 [ 13.345650] print_report+0xd1/0x650 [ 13.345674] ? __virt_addr_valid+0x1db/0x2d0 [ 13.345695] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.345723] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.345754] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.345781] kasan_report+0x141/0x180 [ 13.345804] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.345836] kasan_check_range+0x10c/0x1c0 [ 13.345860] __kasan_check_write+0x18/0x20 [ 13.345880] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.345907] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.345936] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.345956] ? trace_hardirqs_on+0x37/0xe0 [ 13.345980] ? kasan_bitops_generic+0x92/0x1c0 [ 13.346004] kasan_bitops_generic+0x121/0x1c0 [ 13.346031] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.346057] ? __pfx_read_tsc+0x10/0x10 [ 13.346078] ? ktime_get_ts64+0x86/0x230 [ 13.346103] kunit_try_run_case+0x1a5/0x480 [ 13.346124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.346144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.346170] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.346195] ? __kthread_parkme+0x82/0x180 [ 13.346215] ? preempt_count_sub+0x50/0x80 [ 13.346239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.346259] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.346284] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.346308] kthread+0x337/0x6f0 [ 13.346327] ? trace_preempt_on+0x20/0xc0 [ 13.346349] ? __pfx_kthread+0x10/0x10 [ 13.346371] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.346403] ? calculate_sigpending+0x7b/0xa0 [ 13.346428] ? __pfx_kthread+0x10/0x10 [ 13.346449] ret_from_fork+0x116/0x1d0 [ 13.346467] ? __pfx_kthread+0x10/0x10 [ 13.346488] ret_from_fork_asm+0x1a/0x30 [ 13.346518] </TASK> [ 13.346528] [ 13.355729] Allocated by task 279: [ 13.355987] kasan_save_stack+0x45/0x70 [ 13.356155] kasan_save_track+0x18/0x40 [ 13.356292] kasan_save_alloc_info+0x3b/0x50 [ 13.356482] __kasan_kmalloc+0xb7/0xc0 [ 13.356675] __kmalloc_cache_noprof+0x189/0x420 [ 13.356902] kasan_bitops_generic+0x92/0x1c0 [ 13.357205] kunit_try_run_case+0x1a5/0x480 [ 13.357462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.357686] kthread+0x337/0x6f0 [ 13.357849] ret_from_fork+0x116/0x1d0 [ 13.358197] ret_from_fork_asm+0x1a/0x30 [ 13.358387] [ 13.358463] The buggy address belongs to the object at ffff888101892d40 [ 13.358463] which belongs to the cache kmalloc-16 of size 16 [ 13.358878] The buggy address is located 8 bytes inside of [ 13.358878] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.359500] [ 13.359714] The buggy address belongs to the physical page: [ 13.359952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.360283] flags: 0x200000000000000(node=0|zone=2) [ 13.360463] page_type: f5(slab) [ 13.360585] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.361210] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.361576] page dumped because: kasan: bad access detected [ 13.361797] [ 13.361903] Memory state around the buggy address: [ 13.362162] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.362397] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.362727] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.363251] ^ [ 13.363508] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.363802] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.364315] ================================================================== [ 13.324603] ================================================================== [ 13.324939] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.325517] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.325866] [ 13.325976] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.326022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.326037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.326057] Call Trace: [ 13.326071] <TASK> [ 13.326085] dump_stack_lvl+0x73/0xb0 [ 13.326112] print_report+0xd1/0x650 [ 13.326135] ? __virt_addr_valid+0x1db/0x2d0 [ 13.326156] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.326183] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.326205] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.326233] kasan_report+0x141/0x180 [ 13.326255] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.326287] kasan_check_range+0x10c/0x1c0 [ 13.326311] __kasan_check_write+0x18/0x20 [ 13.326331] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.326358] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.326398] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.326418] ? trace_hardirqs_on+0x37/0xe0 [ 13.326439] ? kasan_bitops_generic+0x92/0x1c0 [ 13.326464] kasan_bitops_generic+0x121/0x1c0 [ 13.326484] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.326509] ? __pfx_read_tsc+0x10/0x10 [ 13.326530] ? ktime_get_ts64+0x86/0x230 [ 13.326554] kunit_try_run_case+0x1a5/0x480 [ 13.326575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.326595] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.326620] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.326646] ? __kthread_parkme+0x82/0x180 [ 13.326666] ? preempt_count_sub+0x50/0x80 [ 13.326690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.326711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.326791] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.326816] kthread+0x337/0x6f0 [ 13.326836] ? trace_preempt_on+0x20/0xc0 [ 13.326859] ? __pfx_kthread+0x10/0x10 [ 13.326879] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.326903] ? calculate_sigpending+0x7b/0xa0 [ 13.326926] ? __pfx_kthread+0x10/0x10 [ 13.326947] ret_from_fork+0x116/0x1d0 [ 13.326966] ? __pfx_kthread+0x10/0x10 [ 13.326986] ret_from_fork_asm+0x1a/0x30 [ 13.327050] </TASK> [ 13.327062] [ 13.335428] Allocated by task 279: [ 13.335617] kasan_save_stack+0x45/0x70 [ 13.335810] kasan_save_track+0x18/0x40 [ 13.336011] kasan_save_alloc_info+0x3b/0x50 [ 13.336199] __kasan_kmalloc+0xb7/0xc0 [ 13.336399] __kmalloc_cache_noprof+0x189/0x420 [ 13.336607] kasan_bitops_generic+0x92/0x1c0 [ 13.336792] kunit_try_run_case+0x1a5/0x480 [ 13.336936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.337114] kthread+0x337/0x6f0 [ 13.337235] ret_from_fork+0x116/0x1d0 [ 13.337477] ret_from_fork_asm+0x1a/0x30 [ 13.337682] [ 13.337824] The buggy address belongs to the object at ffff888101892d40 [ 13.337824] which belongs to the cache kmalloc-16 of size 16 [ 13.338542] The buggy address is located 8 bytes inside of [ 13.338542] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.338898] [ 13.338970] The buggy address belongs to the physical page: [ 13.339292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.339671] flags: 0x200000000000000(node=0|zone=2) [ 13.339972] page_type: f5(slab) [ 13.340390] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.340782] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.341162] page dumped because: kasan: bad access detected [ 13.341412] [ 13.341488] Memory state around the buggy address: [ 13.341731] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.342068] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.342356] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.342597] ^ [ 13.342776] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.343168] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.343669] ================================================================== [ 13.280401] ================================================================== [ 13.280728] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.281220] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.281561] [ 13.281678] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.281733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.281745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.281766] Call Trace: [ 13.281779] <TASK> [ 13.281792] dump_stack_lvl+0x73/0xb0 [ 13.281842] print_report+0xd1/0x650 [ 13.281866] ? __virt_addr_valid+0x1db/0x2d0 [ 13.281888] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.281915] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.281938] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.281965] kasan_report+0x141/0x180 [ 13.282003] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.282060] kasan_check_range+0x10c/0x1c0 [ 13.282084] __kasan_check_write+0x18/0x20 [ 13.282104] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.282133] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.282162] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.282183] ? trace_hardirqs_on+0x37/0xe0 [ 13.282206] ? kasan_bitops_generic+0x92/0x1c0 [ 13.282230] kasan_bitops_generic+0x121/0x1c0 [ 13.282250] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.282275] ? __pfx_read_tsc+0x10/0x10 [ 13.282295] ? ktime_get_ts64+0x86/0x230 [ 13.282320] kunit_try_run_case+0x1a5/0x480 [ 13.282340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.282360] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.282396] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.282421] ? __kthread_parkme+0x82/0x180 [ 13.282442] ? preempt_count_sub+0x50/0x80 [ 13.282465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.282486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.282511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.282538] kthread+0x337/0x6f0 [ 13.282557] ? trace_preempt_on+0x20/0xc0 [ 13.282579] ? __pfx_kthread+0x10/0x10 [ 13.282599] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.282623] ? calculate_sigpending+0x7b/0xa0 [ 13.282647] ? __pfx_kthread+0x10/0x10 [ 13.282668] ret_from_fork+0x116/0x1d0 [ 13.282687] ? __pfx_kthread+0x10/0x10 [ 13.282710] ret_from_fork_asm+0x1a/0x30 [ 13.282741] </TASK> [ 13.282751] [ 13.293425] Allocated by task 279: [ 13.293565] kasan_save_stack+0x45/0x70 [ 13.293826] kasan_save_track+0x18/0x40 [ 13.294033] kasan_save_alloc_info+0x3b/0x50 [ 13.294283] __kasan_kmalloc+0xb7/0xc0 [ 13.294479] __kmalloc_cache_noprof+0x189/0x420 [ 13.294668] kasan_bitops_generic+0x92/0x1c0 [ 13.294819] kunit_try_run_case+0x1a5/0x480 [ 13.294969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.295265] kthread+0x337/0x6f0 [ 13.295457] ret_from_fork+0x116/0x1d0 [ 13.295636] ret_from_fork_asm+0x1a/0x30 [ 13.295933] [ 13.296058] The buggy address belongs to the object at ffff888101892d40 [ 13.296058] which belongs to the cache kmalloc-16 of size 16 [ 13.296535] The buggy address is located 8 bytes inside of [ 13.296535] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.297252] [ 13.297363] The buggy address belongs to the physical page: [ 13.297588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.297917] flags: 0x200000000000000(node=0|zone=2) [ 13.298187] page_type: f5(slab) [ 13.298368] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.298728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.299149] page dumped because: kasan: bad access detected [ 13.299411] [ 13.299491] Memory state around the buggy address: [ 13.299700] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.299953] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.300191] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.300518] ^ [ 13.300848] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.301342] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.301633] ================================================================== [ 13.302037] ================================================================== [ 13.302549] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.302916] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.303185] [ 13.303473] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.303524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.303536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.303558] Call Trace: [ 13.303572] <TASK> [ 13.303588] dump_stack_lvl+0x73/0xb0 [ 13.303615] print_report+0xd1/0x650 [ 13.303639] ? __virt_addr_valid+0x1db/0x2d0 [ 13.303661] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.303689] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.303711] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.303740] kasan_report+0x141/0x180 [ 13.303763] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.303795] kasan_check_range+0x10c/0x1c0 [ 13.303819] __kasan_check_write+0x18/0x20 [ 13.303839] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.303867] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.303895] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.303916] ? trace_hardirqs_on+0x37/0xe0 [ 13.303937] ? kasan_bitops_generic+0x92/0x1c0 [ 13.303961] kasan_bitops_generic+0x121/0x1c0 [ 13.303981] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.304007] ? __pfx_read_tsc+0x10/0x10 [ 13.304027] ? ktime_get_ts64+0x86/0x230 [ 13.304051] kunit_try_run_case+0x1a5/0x480 [ 13.304072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.304091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.304117] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.304142] ? __kthread_parkme+0x82/0x180 [ 13.304163] ? preempt_count_sub+0x50/0x80 [ 13.304186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.304208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.304232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.304256] kthread+0x337/0x6f0 [ 13.304276] ? trace_preempt_on+0x20/0xc0 [ 13.304298] ? __pfx_kthread+0x10/0x10 [ 13.304318] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.304342] ? calculate_sigpending+0x7b/0xa0 [ 13.304365] ? __pfx_kthread+0x10/0x10 [ 13.304396] ret_from_fork+0x116/0x1d0 [ 13.304415] ? __pfx_kthread+0x10/0x10 [ 13.304435] ret_from_fork_asm+0x1a/0x30 [ 13.304465] </TASK> [ 13.304475] [ 13.314627] Allocated by task 279: [ 13.315077] kasan_save_stack+0x45/0x70 [ 13.315325] kasan_save_track+0x18/0x40 [ 13.315629] kasan_save_alloc_info+0x3b/0x50 [ 13.315971] __kasan_kmalloc+0xb7/0xc0 [ 13.316258] __kmalloc_cache_noprof+0x189/0x420 [ 13.316476] kasan_bitops_generic+0x92/0x1c0 [ 13.316677] kunit_try_run_case+0x1a5/0x480 [ 13.317315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.317643] kthread+0x337/0x6f0 [ 13.317910] ret_from_fork+0x116/0x1d0 [ 13.318246] ret_from_fork_asm+0x1a/0x30 [ 13.318446] [ 13.318534] The buggy address belongs to the object at ffff888101892d40 [ 13.318534] which belongs to the cache kmalloc-16 of size 16 [ 13.318985] The buggy address is located 8 bytes inside of [ 13.318985] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.319720] [ 13.319830] The buggy address belongs to the physical page: [ 13.320123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.320452] flags: 0x200000000000000(node=0|zone=2) [ 13.320680] page_type: f5(slab) [ 13.320895] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.321174] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.321578] page dumped because: kasan: bad access detected [ 13.321913] [ 13.321995] Memory state around the buggy address: [ 13.322194] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.322512] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.322814] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.323223] ^ [ 13.323435] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.323707] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.324100] ================================================================== [ 13.364690] ================================================================== [ 13.365026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.365533] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.365905] [ 13.366057] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.366102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.366114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.366134] Call Trace: [ 13.366148] <TASK> [ 13.366162] dump_stack_lvl+0x73/0xb0 [ 13.366189] print_report+0xd1/0x650 [ 13.366212] ? __virt_addr_valid+0x1db/0x2d0 [ 13.366234] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.366261] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.366283] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.366311] kasan_report+0x141/0x180 [ 13.366334] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.366367] kasan_check_range+0x10c/0x1c0 [ 13.366404] __kasan_check_write+0x18/0x20 [ 13.366427] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.366454] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.366483] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.366503] ? trace_hardirqs_on+0x37/0xe0 [ 13.366525] ? kasan_bitops_generic+0x92/0x1c0 [ 13.366549] kasan_bitops_generic+0x121/0x1c0 [ 13.366569] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.366594] ? __pfx_read_tsc+0x10/0x10 [ 13.366615] ? ktime_get_ts64+0x86/0x230 [ 13.366638] kunit_try_run_case+0x1a5/0x480 [ 13.366660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.366679] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.366704] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.366728] ? __kthread_parkme+0x82/0x180 [ 13.366748] ? preempt_count_sub+0x50/0x80 [ 13.366772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.366793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.366817] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.366841] kthread+0x337/0x6f0 [ 13.366860] ? trace_preempt_on+0x20/0xc0 [ 13.366881] ? __pfx_kthread+0x10/0x10 [ 13.366912] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.366935] ? calculate_sigpending+0x7b/0xa0 [ 13.366958] ? __pfx_kthread+0x10/0x10 [ 13.366980] ret_from_fork+0x116/0x1d0 [ 13.366998] ? __pfx_kthread+0x10/0x10 [ 13.367028] ret_from_fork_asm+0x1a/0x30 [ 13.367058] </TASK> [ 13.367068] [ 13.377347] Allocated by task 279: [ 13.377536] kasan_save_stack+0x45/0x70 [ 13.377729] kasan_save_track+0x18/0x40 [ 13.377914] kasan_save_alloc_info+0x3b/0x50 [ 13.378428] __kasan_kmalloc+0xb7/0xc0 [ 13.378818] __kmalloc_cache_noprof+0x189/0x420 [ 13.379300] kasan_bitops_generic+0x92/0x1c0 [ 13.379530] kunit_try_run_case+0x1a5/0x480 [ 13.379724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.379952] kthread+0x337/0x6f0 [ 13.380588] ret_from_fork+0x116/0x1d0 [ 13.381104] ret_from_fork_asm+0x1a/0x30 [ 13.381392] [ 13.381495] The buggy address belongs to the object at ffff888101892d40 [ 13.381495] which belongs to the cache kmalloc-16 of size 16 [ 13.382333] The buggy address is located 8 bytes inside of [ 13.382333] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.383265] [ 13.383517] The buggy address belongs to the physical page: [ 13.383848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.384355] flags: 0x200000000000000(node=0|zone=2) [ 13.384585] page_type: f5(slab) [ 13.384923] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.385883] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.386275] page dumped because: kasan: bad access detected [ 13.386523] [ 13.386613] Memory state around the buggy address: [ 13.387053] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.387683] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.388028] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.388319] ^ [ 13.388567] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.389188] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.389658] ================================================================== [ 13.390740] ================================================================== [ 13.391387] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.391878] Read of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.392609] [ 13.392732] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.392781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.392793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.392816] Call Trace: [ 13.392830] <TASK> [ 13.392846] dump_stack_lvl+0x73/0xb0 [ 13.392874] print_report+0xd1/0x650 [ 13.392898] ? __virt_addr_valid+0x1db/0x2d0 [ 13.392920] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.392947] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.392970] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.392997] kasan_report+0x141/0x180 [ 13.393021] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.393053] kasan_check_range+0x10c/0x1c0 [ 13.393077] __kasan_check_read+0x15/0x20 [ 13.393097] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.393125] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.393154] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.393174] ? trace_hardirqs_on+0x37/0xe0 [ 13.393196] ? kasan_bitops_generic+0x92/0x1c0 [ 13.393219] kasan_bitops_generic+0x121/0x1c0 [ 13.393239] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.393264] ? __pfx_read_tsc+0x10/0x10 [ 13.393284] ? ktime_get_ts64+0x86/0x230 [ 13.393309] kunit_try_run_case+0x1a5/0x480 [ 13.393330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.393349] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.393383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.393408] ? __kthread_parkme+0x82/0x180 [ 13.393429] ? preempt_count_sub+0x50/0x80 [ 13.393452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.393473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.393496] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.393521] kthread+0x337/0x6f0 [ 13.393540] ? trace_preempt_on+0x20/0xc0 [ 13.393562] ? __pfx_kthread+0x10/0x10 [ 13.393583] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.393605] ? calculate_sigpending+0x7b/0xa0 [ 13.393629] ? __pfx_kthread+0x10/0x10 [ 13.393650] ret_from_fork+0x116/0x1d0 [ 13.393671] ? __pfx_kthread+0x10/0x10 [ 13.393693] ret_from_fork_asm+0x1a/0x30 [ 13.393735] </TASK> [ 13.393745] [ 13.402542] Allocated by task 279: [ 13.402705] kasan_save_stack+0x45/0x70 [ 13.402910] kasan_save_track+0x18/0x40 [ 13.403139] kasan_save_alloc_info+0x3b/0x50 [ 13.403294] __kasan_kmalloc+0xb7/0xc0 [ 13.403456] __kmalloc_cache_noprof+0x189/0x420 [ 13.403678] kasan_bitops_generic+0x92/0x1c0 [ 13.403929] kunit_try_run_case+0x1a5/0x480 [ 13.404263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.405131] kthread+0x337/0x6f0 [ 13.405282] ret_from_fork+0x116/0x1d0 [ 13.405431] ret_from_fork_asm+0x1a/0x30 [ 13.405575] [ 13.405674] The buggy address belongs to the object at ffff888101892d40 [ 13.405674] which belongs to the cache kmalloc-16 of size 16 [ 13.406343] The buggy address is located 8 bytes inside of [ 13.406343] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.406887] [ 13.406964] The buggy address belongs to the physical page: [ 13.407209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.407706] flags: 0x200000000000000(node=0|zone=2) [ 13.407901] page_type: f5(slab) [ 13.408192] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.408533] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.408890] page dumped because: kasan: bad access detected [ 13.409067] [ 13.409162] Memory state around the buggy address: [ 13.409411] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.409909] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.410220] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.410524] ^ [ 13.410789] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.411129] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.411628] ================================================================== [ 13.412017] ================================================================== [ 13.412493] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.412975] Read of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.413314] [ 13.413479] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.413527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.413539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.413561] Call Trace: [ 13.413574] <TASK> [ 13.413589] dump_stack_lvl+0x73/0xb0 [ 13.413615] print_report+0xd1/0x650 [ 13.413638] ? __virt_addr_valid+0x1db/0x2d0 [ 13.413661] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.413688] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.413711] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.413747] kasan_report+0x141/0x180 [ 13.413770] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.413803] __asan_report_load8_noabort+0x18/0x20 [ 13.413824] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.413852] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.413881] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.413901] ? trace_hardirqs_on+0x37/0xe0 [ 13.413923] ? kasan_bitops_generic+0x92/0x1c0 [ 13.413947] kasan_bitops_generic+0x121/0x1c0 [ 13.413967] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.413992] ? __pfx_read_tsc+0x10/0x10 [ 13.414012] ? ktime_get_ts64+0x86/0x230 [ 13.414083] kunit_try_run_case+0x1a5/0x480 [ 13.414105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.414125] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.414149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.414174] ? __kthread_parkme+0x82/0x180 [ 13.414195] ? preempt_count_sub+0x50/0x80 [ 13.414218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.414239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.414264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.414288] kthread+0x337/0x6f0 [ 13.414307] ? trace_preempt_on+0x20/0xc0 [ 13.414330] ? __pfx_kthread+0x10/0x10 [ 13.414350] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.414385] ? calculate_sigpending+0x7b/0xa0 [ 13.414409] ? __pfx_kthread+0x10/0x10 [ 13.414431] ret_from_fork+0x116/0x1d0 [ 13.414449] ? __pfx_kthread+0x10/0x10 [ 13.414469] ret_from_fork_asm+0x1a/0x30 [ 13.414499] </TASK> [ 13.414510] [ 13.423109] Allocated by task 279: [ 13.423244] kasan_save_stack+0x45/0x70 [ 13.423456] kasan_save_track+0x18/0x40 [ 13.423663] kasan_save_alloc_info+0x3b/0x50 [ 13.424121] __kasan_kmalloc+0xb7/0xc0 [ 13.424323] __kmalloc_cache_noprof+0x189/0x420 [ 13.424522] kasan_bitops_generic+0x92/0x1c0 [ 13.424721] kunit_try_run_case+0x1a5/0x480 [ 13.424932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.425282] kthread+0x337/0x6f0 [ 13.425461] ret_from_fork+0x116/0x1d0 [ 13.425612] ret_from_fork_asm+0x1a/0x30 [ 13.425924] [ 13.426251] The buggy address belongs to the object at ffff888101892d40 [ 13.426251] which belongs to the cache kmalloc-16 of size 16 [ 13.426791] The buggy address is located 8 bytes inside of [ 13.426791] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.427366] [ 13.427477] The buggy address belongs to the physical page: [ 13.427668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.428141] flags: 0x200000000000000(node=0|zone=2) [ 13.428448] page_type: f5(slab) [ 13.428664] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.428918] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.429144] page dumped because: kasan: bad access detected [ 13.429397] [ 13.429490] Memory state around the buggy address: [ 13.429842] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.430262] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.430499] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.430720] ^ [ 13.430979] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.431501] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.431991] ================================================================== [ 13.256935] ================================================================== [ 13.257349] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.257972] Write of size 8 at addr ffff888101892d48 by task kunit_try_catch/279 [ 13.258372] [ 13.258504] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) [ 13.258587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.258600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.258621] Call Trace: [ 13.258638] <TASK> [ 13.258656] dump_stack_lvl+0x73/0xb0 [ 13.258684] print_report+0xd1/0x650 [ 13.258707] ? __virt_addr_valid+0x1db/0x2d0 [ 13.258770] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.258798] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.258821] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.258848] kasan_report+0x141/0x180 [ 13.258871] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.258902] kasan_check_range+0x10c/0x1c0 [ 13.258926] __kasan_check_write+0x18/0x20 [ 13.258946] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.258974] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.259004] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.259100] ? trace_hardirqs_on+0x37/0xe0 [ 13.259125] ? kasan_bitops_generic+0x92/0x1c0 [ 13.259150] kasan_bitops_generic+0x121/0x1c0 [ 13.259170] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.259231] ? __pfx_read_tsc+0x10/0x10 [ 13.259252] ? ktime_get_ts64+0x86/0x230 [ 13.259276] kunit_try_run_case+0x1a5/0x480 [ 13.259299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.259318] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.259387] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.259413] ? __kthread_parkme+0x82/0x180 [ 13.259433] ? preempt_count_sub+0x50/0x80 [ 13.259457] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.259478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.259503] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.259528] kthread+0x337/0x6f0 [ 13.259547] ? trace_preempt_on+0x20/0xc0 [ 13.259569] ? __pfx_kthread+0x10/0x10 [ 13.259590] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.259613] ? calculate_sigpending+0x7b/0xa0 [ 13.259636] ? __pfx_kthread+0x10/0x10 [ 13.259658] ret_from_fork+0x116/0x1d0 [ 13.259677] ? __pfx_kthread+0x10/0x10 [ 13.259698] ret_from_fork_asm+0x1a/0x30 [ 13.259740] </TASK> [ 13.259751] [ 13.269813] Allocated by task 279: [ 13.270046] kasan_save_stack+0x45/0x70 [ 13.270336] kasan_save_track+0x18/0x40 [ 13.270836] kasan_save_alloc_info+0x3b/0x50 [ 13.271097] __kasan_kmalloc+0xb7/0xc0 [ 13.271235] __kmalloc_cache_noprof+0x189/0x420 [ 13.271400] kasan_bitops_generic+0x92/0x1c0 [ 13.271651] kunit_try_run_case+0x1a5/0x480 [ 13.272134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.272467] kthread+0x337/0x6f0 [ 13.272666] ret_from_fork+0x116/0x1d0 [ 13.272905] ret_from_fork_asm+0x1a/0x30 [ 13.273160] [ 13.273235] The buggy address belongs to the object at ffff888101892d40 [ 13.273235] which belongs to the cache kmalloc-16 of size 16 [ 13.273758] The buggy address is located 8 bytes inside of [ 13.273758] allocated 9-byte region [ffff888101892d40, ffff888101892d49) [ 13.274421] [ 13.274499] The buggy address belongs to the physical page: [ 13.274993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101892 [ 13.275474] flags: 0x200000000000000(node=0|zone=2) [ 13.275644] page_type: f5(slab) [ 13.275838] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.276254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.276921] page dumped because: kasan: bad access detected [ 13.277116] [ 13.277240] Memory state around the buggy address: [ 13.277523] ffff888101892c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 13.277901] ffff888101892c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.278282] >ffff888101892d00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.278627] ^ [ 13.278952] ffff888101892d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.279525] ffff888101892e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.279812] ==================================================================