Date
May 29, 2025, 7:10 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.143577] ================================================================== [ 13.144063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.144398] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 13.144647] [ 13.144803] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.144849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.144861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.144882] Call Trace: [ 13.144896] <TASK> [ 13.144911] dump_stack_lvl+0x73/0xb0 [ 13.144935] print_report+0xd1/0x650 [ 13.144957] ? __virt_addr_valid+0x1db/0x2d0 [ 13.144980] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.145004] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.145027] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.145051] kasan_report+0x141/0x180 [ 13.145074] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.145104] kasan_check_range+0x10c/0x1c0 [ 13.145128] __kasan_check_write+0x18/0x20 [ 13.145148] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.145172] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.145201] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.145221] ? trace_hardirqs_on+0x37/0xe0 [ 13.145242] ? kasan_bitops_generic+0x92/0x1c0 [ 13.145267] kasan_bitops_generic+0x121/0x1c0 [ 13.145288] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.145310] ? __pfx_read_tsc+0x10/0x10 [ 13.145330] ? ktime_get_ts64+0x86/0x230 [ 13.145354] kunit_try_run_case+0x1a5/0x480 [ 13.145375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.145395] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.145419] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.145444] ? __kthread_parkme+0x82/0x180 [ 13.145465] ? preempt_count_sub+0x50/0x80 [ 13.145488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.145510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.145534] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.145560] kthread+0x337/0x6f0 [ 13.145579] ? trace_preempt_on+0x20/0xc0 [ 13.145601] ? __pfx_kthread+0x10/0x10 [ 13.145634] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.145657] ? calculate_sigpending+0x7b/0xa0 [ 13.145681] ? __pfx_kthread+0x10/0x10 [ 13.145703] ret_from_fork+0x116/0x1d0 [ 13.145721] ? __pfx_kthread+0x10/0x10 [ 13.145742] ret_from_fork_asm+0x1a/0x30 [ 13.146014] </TASK> [ 13.146025] [ 13.155012] Allocated by task 278: [ 13.155296] kasan_save_stack+0x45/0x70 [ 13.155663] kasan_save_track+0x18/0x40 [ 13.156305] kasan_save_alloc_info+0x3b/0x50 [ 13.156626] __kasan_kmalloc+0xb7/0xc0 [ 13.157562] __kmalloc_cache_noprof+0x189/0x420 [ 13.158787] kasan_bitops_generic+0x92/0x1c0 [ 13.159061] kunit_try_run_case+0x1a5/0x480 [ 13.159251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.159507] kthread+0x337/0x6f0 [ 13.159705] ret_from_fork+0x116/0x1d0 [ 13.159876] ret_from_fork_asm+0x1a/0x30 [ 13.160099] [ 13.160175] The buggy address belongs to the object at ffff888102856080 [ 13.160175] which belongs to the cache kmalloc-16 of size 16 [ 13.160696] The buggy address is located 8 bytes inside of [ 13.160696] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 13.161652] [ 13.161758] The buggy address belongs to the physical page: [ 13.161985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 13.162565] flags: 0x200000000000000(node=0|zone=2) [ 13.162863] page_type: f5(slab) [ 13.162994] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.163474] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.164440] page dumped because: kasan: bad access detected [ 13.164706] [ 13.165149] Memory state around the buggy address: [ 13.165387] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.165897] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.166327] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.166988] ^ [ 13.167189] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.167465] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.168060] ================================================================== [ 13.082386] ================================================================== [ 13.082798] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.083219] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 13.083562] [ 13.083684] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.083729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.083742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.083764] Call Trace: [ 13.083780] <TASK> [ 13.083796] dump_stack_lvl+0x73/0xb0 [ 13.083820] print_report+0xd1/0x650 [ 13.084020] ? __virt_addr_valid+0x1db/0x2d0 [ 13.084047] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.084073] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.084096] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.084121] kasan_report+0x141/0x180 [ 13.084146] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.084175] kasan_check_range+0x10c/0x1c0 [ 13.084199] __kasan_check_write+0x18/0x20 [ 13.084220] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.084244] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.084274] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.084295] ? trace_hardirqs_on+0x37/0xe0 [ 13.084318] ? kasan_bitops_generic+0x92/0x1c0 [ 13.084342] kasan_bitops_generic+0x121/0x1c0 [ 13.084363] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.084385] ? __pfx_read_tsc+0x10/0x10 [ 13.084406] ? ktime_get_ts64+0x86/0x230 [ 13.084430] kunit_try_run_case+0x1a5/0x480 [ 13.084451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.084471] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.084496] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.084520] ? __kthread_parkme+0x82/0x180 [ 13.084542] ? preempt_count_sub+0x50/0x80 [ 13.084565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.084587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.084625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.084650] kthread+0x337/0x6f0 [ 13.084671] ? trace_preempt_on+0x20/0xc0 [ 13.084694] ? __pfx_kthread+0x10/0x10 [ 13.084715] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.084738] ? calculate_sigpending+0x7b/0xa0 [ 13.084828] ? __pfx_kthread+0x10/0x10 [ 13.084851] ret_from_fork+0x116/0x1d0 [ 13.084870] ? __pfx_kthread+0x10/0x10 [ 13.084891] ret_from_fork_asm+0x1a/0x30 [ 13.084922] </TASK> [ 13.084934] [ 13.094110] Allocated by task 278: [ 13.094291] kasan_save_stack+0x45/0x70 [ 13.094473] kasan_save_track+0x18/0x40 [ 13.094682] kasan_save_alloc_info+0x3b/0x50 [ 13.094837] __kasan_kmalloc+0xb7/0xc0 [ 13.094976] __kmalloc_cache_noprof+0x189/0x420 [ 13.095133] kasan_bitops_generic+0x92/0x1c0 [ 13.095350] kunit_try_run_case+0x1a5/0x480 [ 13.095641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.095912] kthread+0x337/0x6f0 [ 13.096294] ret_from_fork+0x116/0x1d0 [ 13.096464] ret_from_fork_asm+0x1a/0x30 [ 13.096622] [ 13.096696] The buggy address belongs to the object at ffff888102856080 [ 13.096696] which belongs to the cache kmalloc-16 of size 16 [ 13.097307] The buggy address is located 8 bytes inside of [ 13.097307] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 13.098076] [ 13.098171] The buggy address belongs to the physical page: [ 13.098404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 13.098675] flags: 0x200000000000000(node=0|zone=2) [ 13.098843] page_type: f5(slab) [ 13.099059] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.099412] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.099767] page dumped because: kasan: bad access detected [ 13.100030] [ 13.100131] Memory state around the buggy address: [ 13.100359] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.100653] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.101035] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.101299] ^ [ 13.101434] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.101725] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.102240] ================================================================== [ 13.197388] ================================================================== [ 13.197696] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.198588] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 13.199080] [ 13.199179] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.199224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.199237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.199257] Call Trace: [ 13.199273] <TASK> [ 13.199289] dump_stack_lvl+0x73/0xb0 [ 13.199316] print_report+0xd1/0x650 [ 13.199339] ? __virt_addr_valid+0x1db/0x2d0 [ 13.199669] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.199695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.199719] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.199743] kasan_report+0x141/0x180 [ 13.199785] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.199814] kasan_check_range+0x10c/0x1c0 [ 13.199838] __kasan_check_write+0x18/0x20 [ 13.199858] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.199882] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.199912] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.199934] ? trace_hardirqs_on+0x37/0xe0 [ 13.199955] ? kasan_bitops_generic+0x92/0x1c0 [ 13.199980] kasan_bitops_generic+0x121/0x1c0 [ 13.200001] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.200024] ? __pfx_read_tsc+0x10/0x10 [ 13.200046] ? ktime_get_ts64+0x86/0x230 [ 13.200074] kunit_try_run_case+0x1a5/0x480 [ 13.200096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.200117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.200143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.200169] ? __kthread_parkme+0x82/0x180 [ 13.200191] ? preempt_count_sub+0x50/0x80 [ 13.200215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.200239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.200264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.200290] kthread+0x337/0x6f0 [ 13.200312] ? trace_preempt_on+0x20/0xc0 [ 13.200335] ? __pfx_kthread+0x10/0x10 [ 13.200356] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.200378] ? calculate_sigpending+0x7b/0xa0 [ 13.200403] ? __pfx_kthread+0x10/0x10 [ 13.200425] ret_from_fork+0x116/0x1d0 [ 13.200443] ? __pfx_kthread+0x10/0x10 [ 13.200464] ret_from_fork_asm+0x1a/0x30 [ 13.200494] </TASK> [ 13.200506] [ 13.212719] Allocated by task 278: [ 13.213084] kasan_save_stack+0x45/0x70 [ 13.213300] kasan_save_track+0x18/0x40 [ 13.213487] kasan_save_alloc_info+0x3b/0x50 [ 13.213696] __kasan_kmalloc+0xb7/0xc0 [ 13.214295] __kmalloc_cache_noprof+0x189/0x420 [ 13.214493] kasan_bitops_generic+0x92/0x1c0 [ 13.214734] kunit_try_run_case+0x1a5/0x480 [ 13.215293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.215646] kthread+0x337/0x6f0 [ 13.215785] ret_from_fork+0x116/0x1d0 [ 13.216194] ret_from_fork_asm+0x1a/0x30 [ 13.216399] [ 13.216674] The buggy address belongs to the object at ffff888102856080 [ 13.216674] which belongs to the cache kmalloc-16 of size 16 [ 13.217516] The buggy address is located 8 bytes inside of [ 13.217516] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 13.218406] [ 13.218492] The buggy address belongs to the physical page: [ 13.218908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 13.219461] flags: 0x200000000000000(node=0|zone=2) [ 13.219705] page_type: f5(slab) [ 13.220103] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.220428] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.221007] page dumped because: kasan: bad access detected [ 13.221260] [ 13.221342] Memory state around the buggy address: [ 13.221572] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.222094] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.222424] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.222747] ^ [ 13.223286] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.223578] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.224249] ================================================================== [ 13.224960] ================================================================== [ 13.225259] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.225584] Read of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 13.226037] [ 13.226144] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.226190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.226202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.226224] Call Trace: [ 13.226237] <TASK> [ 13.226254] dump_stack_lvl+0x73/0xb0 [ 13.226280] print_report+0xd1/0x650 [ 13.226303] ? __virt_addr_valid+0x1db/0x2d0 [ 13.226326] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.226350] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.226372] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.226397] kasan_report+0x141/0x180 [ 13.226419] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.226449] kasan_check_range+0x10c/0x1c0 [ 13.226473] __kasan_check_read+0x15/0x20 [ 13.226493] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.226517] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.226554] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.226788] ? trace_hardirqs_on+0x37/0xe0 [ 13.226830] ? kasan_bitops_generic+0x92/0x1c0 [ 13.226868] kasan_bitops_generic+0x121/0x1c0 [ 13.226890] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.226913] ? __pfx_read_tsc+0x10/0x10 [ 13.226933] ? ktime_get_ts64+0x86/0x230 [ 13.226957] kunit_try_run_case+0x1a5/0x480 [ 13.226979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.226999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.227024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.227049] ? __kthread_parkme+0x82/0x180 [ 13.227071] ? preempt_count_sub+0x50/0x80 [ 13.227094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.227116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.227140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.227165] kthread+0x337/0x6f0 [ 13.227185] ? trace_preempt_on+0x20/0xc0 [ 13.227207] ? __pfx_kthread+0x10/0x10 [ 13.227228] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.227251] ? calculate_sigpending+0x7b/0xa0 [ 13.227276] ? __pfx_kthread+0x10/0x10 [ 13.227298] ret_from_fork+0x116/0x1d0 [ 13.227317] ? __pfx_kthread+0x10/0x10 [ 13.227338] ret_from_fork_asm+0x1a/0x30 [ 13.227368] </TASK> [ 13.227379] [ 13.240540] Allocated by task 278: [ 13.240727] kasan_save_stack+0x45/0x70 [ 13.241080] kasan_save_track+0x18/0x40 [ 13.241292] kasan_save_alloc_info+0x3b/0x50 [ 13.241514] __kasan_kmalloc+0xb7/0xc0 [ 13.241773] __kmalloc_cache_noprof+0x189/0x420 [ 13.241989] kasan_bitops_generic+0x92/0x1c0 [ 13.242191] kunit_try_run_case+0x1a5/0x480 [ 13.242379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.242660] kthread+0x337/0x6f0 [ 13.242812] ret_from_fork+0x116/0x1d0 [ 13.243442] ret_from_fork_asm+0x1a/0x30 [ 13.243696] [ 13.243807] The buggy address belongs to the object at ffff888102856080 [ 13.243807] which belongs to the cache kmalloc-16 of size 16 [ 13.244526] The buggy address is located 8 bytes inside of [ 13.244526] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 13.245337] [ 13.245642] The buggy address belongs to the physical page: [ 13.245911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 13.246380] flags: 0x200000000000000(node=0|zone=2) [ 13.246721] page_type: f5(slab) [ 13.247108] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.247526] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.247835] page dumped because: kasan: bad access detected [ 13.248294] [ 13.248400] Memory state around the buggy address: [ 13.248994] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.249298] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.249627] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.250305] ^ [ 13.250474] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.251020] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.251463] ================================================================== [ 13.169011] ================================================================== [ 13.169404] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.169999] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 13.170603] [ 13.170906] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.170957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.170970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.170991] Call Trace: [ 13.171006] <TASK> [ 13.171036] dump_stack_lvl+0x73/0xb0 [ 13.171063] print_report+0xd1/0x650 [ 13.171086] ? __virt_addr_valid+0x1db/0x2d0 [ 13.171109] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.171133] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.171156] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.171180] kasan_report+0x141/0x180 [ 13.171203] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.171232] kasan_check_range+0x10c/0x1c0 [ 13.171256] __kasan_check_write+0x18/0x20 [ 13.171276] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.171300] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.171329] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.171349] ? trace_hardirqs_on+0x37/0xe0 [ 13.171371] ? kasan_bitops_generic+0x92/0x1c0 [ 13.171395] kasan_bitops_generic+0x121/0x1c0 [ 13.171417] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.171439] ? __pfx_read_tsc+0x10/0x10 [ 13.171461] ? ktime_get_ts64+0x86/0x230 [ 13.171485] kunit_try_run_case+0x1a5/0x480 [ 13.171508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.171528] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.171553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.171577] ? __kthread_parkme+0x82/0x180 [ 13.171599] ? preempt_count_sub+0x50/0x80 [ 13.171637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.171658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.171683] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.171708] kthread+0x337/0x6f0 [ 13.171727] ? trace_preempt_on+0x20/0xc0 [ 13.171749] ? __pfx_kthread+0x10/0x10 [ 13.171780] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.171813] ? calculate_sigpending+0x7b/0xa0 [ 13.171837] ? __pfx_kthread+0x10/0x10 [ 13.171859] ret_from_fork+0x116/0x1d0 [ 13.171878] ? __pfx_kthread+0x10/0x10 [ 13.171899] ret_from_fork_asm+0x1a/0x30 [ 13.171929] </TASK> [ 13.171940] [ 13.185346] Allocated by task 278: [ 13.185535] kasan_save_stack+0x45/0x70 [ 13.185965] kasan_save_track+0x18/0x40 [ 13.186174] kasan_save_alloc_info+0x3b/0x50 [ 13.186384] __kasan_kmalloc+0xb7/0xc0 [ 13.186579] __kmalloc_cache_noprof+0x189/0x420 [ 13.186807] kasan_bitops_generic+0x92/0x1c0 [ 13.187007] kunit_try_run_case+0x1a5/0x480 [ 13.187221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.187472] kthread+0x337/0x6f0 [ 13.188244] ret_from_fork+0x116/0x1d0 [ 13.188427] ret_from_fork_asm+0x1a/0x30 [ 13.188921] [ 13.189028] The buggy address belongs to the object at ffff888102856080 [ 13.189028] which belongs to the cache kmalloc-16 of size 16 [ 13.189784] The buggy address is located 8 bytes inside of [ 13.189784] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 13.190577] [ 13.190681] The buggy address belongs to the physical page: [ 13.191175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 13.191633] flags: 0x200000000000000(node=0|zone=2) [ 13.192072] page_type: f5(slab) [ 13.192246] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.192949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.193390] page dumped because: kasan: bad access detected [ 13.193649] [ 13.193833] Memory state around the buggy address: [ 13.194075] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.194626] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.195080] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.195404] ^ [ 13.195560] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.196295] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.196560] ================================================================== [ 13.122840] ================================================================== [ 13.123180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.123575] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 13.124025] [ 13.124139] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.124185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.124197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.124218] Call Trace: [ 13.124234] <TASK> [ 13.124248] dump_stack_lvl+0x73/0xb0 [ 13.124273] print_report+0xd1/0x650 [ 13.124296] ? __virt_addr_valid+0x1db/0x2d0 [ 13.124318] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.124342] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.124365] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.124389] kasan_report+0x141/0x180 [ 13.124412] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.124440] kasan_check_range+0x10c/0x1c0 [ 13.124464] __kasan_check_write+0x18/0x20 [ 13.124484] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.124509] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.124538] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.124558] ? trace_hardirqs_on+0x37/0xe0 [ 13.124579] ? kasan_bitops_generic+0x92/0x1c0 [ 13.124604] kasan_bitops_generic+0x121/0x1c0 [ 13.124635] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.124656] ? __pfx_read_tsc+0x10/0x10 [ 13.124677] ? ktime_get_ts64+0x86/0x230 [ 13.124701] kunit_try_run_case+0x1a5/0x480 [ 13.124722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.124742] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.124767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.124791] ? __kthread_parkme+0x82/0x180 [ 13.124811] ? preempt_count_sub+0x50/0x80 [ 13.124835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.124857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.124882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.124907] kthread+0x337/0x6f0 [ 13.124927] ? trace_preempt_on+0x20/0xc0 [ 13.124949] ? __pfx_kthread+0x10/0x10 [ 13.124990] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.125012] ? calculate_sigpending+0x7b/0xa0 [ 13.125036] ? __pfx_kthread+0x10/0x10 [ 13.125058] ret_from_fork+0x116/0x1d0 [ 13.125077] ? __pfx_kthread+0x10/0x10 [ 13.125098] ret_from_fork_asm+0x1a/0x30 [ 13.125128] </TASK> [ 13.125138] [ 13.133798] Allocated by task 278: [ 13.133935] kasan_save_stack+0x45/0x70 [ 13.134085] kasan_save_track+0x18/0x40 [ 13.134229] kasan_save_alloc_info+0x3b/0x50 [ 13.134441] __kasan_kmalloc+0xb7/0xc0 [ 13.134755] __kmalloc_cache_noprof+0x189/0x420 [ 13.135220] kasan_bitops_generic+0x92/0x1c0 [ 13.135467] kunit_try_run_case+0x1a5/0x480 [ 13.135696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.136125] kthread+0x337/0x6f0 [ 13.136288] ret_from_fork+0x116/0x1d0 [ 13.136464] ret_from_fork_asm+0x1a/0x30 [ 13.136678] [ 13.136769] The buggy address belongs to the object at ffff888102856080 [ 13.136769] which belongs to the cache kmalloc-16 of size 16 [ 13.137247] The buggy address is located 8 bytes inside of [ 13.137247] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 13.137912] [ 13.138006] The buggy address belongs to the physical page: [ 13.138220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 13.138468] flags: 0x200000000000000(node=0|zone=2) [ 13.138654] page_type: f5(slab) [ 13.138782] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.139380] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.139757] page dumped because: kasan: bad access detected [ 13.140799] [ 13.140918] Memory state around the buggy address: [ 13.141151] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.141463] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.141770] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.142176] ^ [ 13.142364] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.142676] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.143144] ================================================================== [ 13.252413] ================================================================== [ 13.253047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.253716] Read of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 13.254128] [ 13.254247] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.254293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.254306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.254326] Call Trace: [ 13.254338] <TASK> [ 13.254353] dump_stack_lvl+0x73/0xb0 [ 13.254380] print_report+0xd1/0x650 [ 13.254402] ? __virt_addr_valid+0x1db/0x2d0 [ 13.254425] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.254451] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.254476] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.254500] kasan_report+0x141/0x180 [ 13.254524] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.254557] __asan_report_load8_noabort+0x18/0x20 [ 13.254579] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.254603] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.254644] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.254665] ? trace_hardirqs_on+0x37/0xe0 [ 13.254881] ? kasan_bitops_generic+0x92/0x1c0 [ 13.254910] kasan_bitops_generic+0x121/0x1c0 [ 13.254931] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.254953] ? __pfx_read_tsc+0x10/0x10 [ 13.254975] ? ktime_get_ts64+0x86/0x230 [ 13.254998] kunit_try_run_case+0x1a5/0x480 [ 13.255020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.255040] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.255065] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.255090] ? __kthread_parkme+0x82/0x180 [ 13.255111] ? preempt_count_sub+0x50/0x80 [ 13.255135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.255156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.255181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.255206] kthread+0x337/0x6f0 [ 13.255225] ? trace_preempt_on+0x20/0xc0 [ 13.255248] ? __pfx_kthread+0x10/0x10 [ 13.255269] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.255292] ? calculate_sigpending+0x7b/0xa0 [ 13.255317] ? __pfx_kthread+0x10/0x10 [ 13.255339] ret_from_fork+0x116/0x1d0 [ 13.255359] ? __pfx_kthread+0x10/0x10 [ 13.255380] ret_from_fork_asm+0x1a/0x30 [ 13.255410] </TASK> [ 13.255421] [ 13.267543] Allocated by task 278: [ 13.268014] kasan_save_stack+0x45/0x70 [ 13.268302] kasan_save_track+0x18/0x40 [ 13.268546] kasan_save_alloc_info+0x3b/0x50 [ 13.269062] __kasan_kmalloc+0xb7/0xc0 [ 13.269269] __kmalloc_cache_noprof+0x189/0x420 [ 13.269451] kasan_bitops_generic+0x92/0x1c0 [ 13.269678] kunit_try_run_case+0x1a5/0x480 [ 13.269885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.270424] kthread+0x337/0x6f0 [ 13.270599] ret_from_fork+0x116/0x1d0 [ 13.270981] ret_from_fork_asm+0x1a/0x30 [ 13.271162] [ 13.271262] The buggy address belongs to the object at ffff888102856080 [ 13.271262] which belongs to the cache kmalloc-16 of size 16 [ 13.271754] The buggy address is located 8 bytes inside of [ 13.271754] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 13.272236] [ 13.272311] The buggy address belongs to the physical page: [ 13.272559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 13.273450] flags: 0x200000000000000(node=0|zone=2) [ 13.273645] page_type: f5(slab) [ 13.273778] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.274017] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.274255] page dumped because: kasan: bad access detected [ 13.274429] [ 13.274500] Memory state around the buggy address: [ 13.274672] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.274890] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.275103] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.275317] ^ [ 13.275443] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.275789] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.276040] ================================================================== [ 13.060804] ================================================================== [ 13.061509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.061919] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 13.062242] [ 13.062329] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.062373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.062386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.062407] Call Trace: [ 13.062421] <TASK> [ 13.062436] dump_stack_lvl+0x73/0xb0 [ 13.062754] print_report+0xd1/0x650 [ 13.062781] ? __virt_addr_valid+0x1db/0x2d0 [ 13.062805] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.062828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.062997] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.063027] kasan_report+0x141/0x180 [ 13.063050] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.063080] kasan_check_range+0x10c/0x1c0 [ 13.063104] __kasan_check_write+0x18/0x20 [ 13.063125] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.063149] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.063179] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.063200] ? trace_hardirqs_on+0x37/0xe0 [ 13.063223] ? kasan_bitops_generic+0x92/0x1c0 [ 13.063247] kasan_bitops_generic+0x121/0x1c0 [ 13.063268] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.063290] ? __pfx_read_tsc+0x10/0x10 [ 13.063311] ? ktime_get_ts64+0x86/0x230 [ 13.063335] kunit_try_run_case+0x1a5/0x480 [ 13.063357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.063378] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.063403] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.063428] ? __kthread_parkme+0x82/0x180 [ 13.063449] ? preempt_count_sub+0x50/0x80 [ 13.063472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.063494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.063518] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.063543] kthread+0x337/0x6f0 [ 13.063563] ? trace_preempt_on+0x20/0xc0 [ 13.063585] ? __pfx_kthread+0x10/0x10 [ 13.063606] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.063643] ? calculate_sigpending+0x7b/0xa0 [ 13.063675] ? __pfx_kthread+0x10/0x10 [ 13.063697] ret_from_fork+0x116/0x1d0 [ 13.063716] ? __pfx_kthread+0x10/0x10 [ 13.063737] ret_from_fork_asm+0x1a/0x30 [ 13.063778] </TASK> [ 13.063789] [ 13.073453] Allocated by task 278: [ 13.073640] kasan_save_stack+0x45/0x70 [ 13.073895] kasan_save_track+0x18/0x40 [ 13.074097] kasan_save_alloc_info+0x3b/0x50 [ 13.074292] __kasan_kmalloc+0xb7/0xc0 [ 13.074479] __kmalloc_cache_noprof+0x189/0x420 [ 13.074690] kasan_bitops_generic+0x92/0x1c0 [ 13.074901] kunit_try_run_case+0x1a5/0x480 [ 13.075204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.075448] kthread+0x337/0x6f0 [ 13.075599] ret_from_fork+0x116/0x1d0 [ 13.075795] ret_from_fork_asm+0x1a/0x30 [ 13.076164] [ 13.076267] The buggy address belongs to the object at ffff888102856080 [ 13.076267] which belongs to the cache kmalloc-16 of size 16 [ 13.076814] The buggy address is located 8 bytes inside of [ 13.076814] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 13.077265] [ 13.077339] The buggy address belongs to the physical page: [ 13.077599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 13.078002] flags: 0x200000000000000(node=0|zone=2) [ 13.078200] page_type: f5(slab) [ 13.078372] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.078722] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.079124] page dumped because: kasan: bad access detected [ 13.079309] [ 13.079381] Memory state around the buggy address: [ 13.079541] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.079875] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.080585] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.080983] ^ [ 13.081149] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.081375] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.081597] ================================================================== [ 13.102736] ================================================================== [ 13.103019] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.103318] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 13.103661] [ 13.103770] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.103868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.103882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.103903] Call Trace: [ 13.103916] <TASK> [ 13.103941] dump_stack_lvl+0x73/0xb0 [ 13.103968] print_report+0xd1/0x650 [ 13.103990] ? __virt_addr_valid+0x1db/0x2d0 [ 13.104013] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.104038] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.104060] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.104084] kasan_report+0x141/0x180 [ 13.104106] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.104135] kasan_check_range+0x10c/0x1c0 [ 13.104160] __kasan_check_write+0x18/0x20 [ 13.104181] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.104206] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.104235] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.104256] ? trace_hardirqs_on+0x37/0xe0 [ 13.104278] ? kasan_bitops_generic+0x92/0x1c0 [ 13.104302] kasan_bitops_generic+0x121/0x1c0 [ 13.104323] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.104346] ? __pfx_read_tsc+0x10/0x10 [ 13.104367] ? ktime_get_ts64+0x86/0x230 [ 13.104391] kunit_try_run_case+0x1a5/0x480 [ 13.104412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.104433] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.104458] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.104483] ? __kthread_parkme+0x82/0x180 [ 13.104504] ? preempt_count_sub+0x50/0x80 [ 13.104527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.104549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.104574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.104599] kthread+0x337/0x6f0 [ 13.104631] ? trace_preempt_on+0x20/0xc0 [ 13.104653] ? __pfx_kthread+0x10/0x10 [ 13.104674] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.104697] ? calculate_sigpending+0x7b/0xa0 [ 13.104720] ? __pfx_kthread+0x10/0x10 [ 13.104743] ret_from_fork+0x116/0x1d0 [ 13.104809] ? __pfx_kthread+0x10/0x10 [ 13.104831] ret_from_fork_asm+0x1a/0x30 [ 13.104861] </TASK> [ 13.104872] [ 13.113782] Allocated by task 278: [ 13.113978] kasan_save_stack+0x45/0x70 [ 13.114184] kasan_save_track+0x18/0x40 [ 13.114689] kasan_save_alloc_info+0x3b/0x50 [ 13.114969] __kasan_kmalloc+0xb7/0xc0 [ 13.115158] __kmalloc_cache_noprof+0x189/0x420 [ 13.115348] kasan_bitops_generic+0x92/0x1c0 [ 13.115504] kunit_try_run_case+0x1a5/0x480 [ 13.115733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.116015] kthread+0x337/0x6f0 [ 13.116175] ret_from_fork+0x116/0x1d0 [ 13.116335] ret_from_fork_asm+0x1a/0x30 [ 13.116539] [ 13.116639] The buggy address belongs to the object at ffff888102856080 [ 13.116639] which belongs to the cache kmalloc-16 of size 16 [ 13.117150] The buggy address is located 8 bytes inside of [ 13.117150] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 13.117554] [ 13.117638] The buggy address belongs to the physical page: [ 13.117817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 13.118125] flags: 0x200000000000000(node=0|zone=2) [ 13.118359] page_type: f5(slab) [ 13.118527] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.119417] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.119675] page dumped because: kasan: bad access detected [ 13.120140] [ 13.120238] Memory state around the buggy address: [ 13.120468] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.120865] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.121161] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.121452] ^ [ 13.121628] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.122147] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.122379] ==================================================================