Date
June 3, 2025, 7:38 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 17.305832] ================================================================== [ 17.306356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.307643] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.308537] [ 17.309280] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.309359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.309374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.309400] Call Trace: [ 17.309425] <TASK> [ 17.309450] dump_stack_lvl+0x73/0xb0 [ 17.309536] print_report+0xd1/0x650 [ 17.309576] ? __virt_addr_valid+0x1db/0x2d0 [ 17.309614] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.309655] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.309689] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.309774] kasan_report+0x141/0x180 [ 17.309815] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.309868] kasan_check_range+0x10c/0x1c0 [ 17.309907] __kasan_check_write+0x18/0x20 [ 17.309941] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 17.309987] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.310037] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.310075] ? kasan_bitops_generic+0x92/0x1c0 [ 17.310119] kasan_bitops_generic+0x121/0x1c0 [ 17.310157] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.310211] ? __pfx_read_tsc+0x10/0x10 [ 17.310254] ? ktime_get_ts64+0x86/0x230 [ 17.310316] kunit_try_run_case+0x1a5/0x480 [ 17.310343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.310364] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.310393] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.310420] ? __kthread_parkme+0x82/0x180 [ 17.310443] ? preempt_count_sub+0x50/0x80 [ 17.310496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.310520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.310548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.310575] kthread+0x337/0x6f0 [ 17.310598] ? trace_preempt_on+0x20/0xc0 [ 17.310625] ? __pfx_kthread+0x10/0x10 [ 17.310647] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.310672] ? calculate_sigpending+0x7b/0xa0 [ 17.310845] ? __pfx_kthread+0x10/0x10 [ 17.310875] ret_from_fork+0x116/0x1d0 [ 17.310898] ? __pfx_kthread+0x10/0x10 [ 17.310921] ret_from_fork_asm+0x1a/0x30 [ 17.310957] </TASK> [ 17.310972] [ 17.326585] Allocated by task 278: [ 17.327141] kasan_save_stack+0x45/0x70 [ 17.328334] kasan_save_track+0x18/0x40 [ 17.328757] kasan_save_alloc_info+0x3b/0x50 [ 17.329120] __kasan_kmalloc+0xb7/0xc0 [ 17.329738] __kmalloc_cache_noprof+0x189/0x420 [ 17.330107] kasan_bitops_generic+0x92/0x1c0 [ 17.330325] kunit_try_run_case+0x1a5/0x480 [ 17.331200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.331655] kthread+0x337/0x6f0 [ 17.331985] ret_from_fork+0x116/0x1d0 [ 17.332865] ret_from_fork_asm+0x1a/0x30 [ 17.333211] [ 17.333351] The buggy address belongs to the object at ffff8881023809a0 [ 17.333351] which belongs to the cache kmalloc-16 of size 16 [ 17.333927] The buggy address is located 8 bytes inside of [ 17.333927] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.335448] [ 17.335669] The buggy address belongs to the physical page: [ 17.335982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.337069] flags: 0x200000000000000(node=0|zone=2) [ 17.337847] page_type: f5(slab) [ 17.338099] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.338661] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.339410] page dumped because: kasan: bad access detected [ 17.339749] [ 17.340199] Memory state around the buggy address: [ 17.341137] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.341557] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.342146] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.342680] ^ [ 17.343285] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.343761] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.344630] ================================================================== [ 17.433108] ================================================================== [ 17.433438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.434399] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.435027] [ 17.435476] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.435602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.435635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.435687] Call Trace: [ 17.435722] <TASK> [ 17.435766] dump_stack_lvl+0x73/0xb0 [ 17.435841] print_report+0xd1/0x650 [ 17.435887] ? __virt_addr_valid+0x1db/0x2d0 [ 17.435925] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.435957] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.435984] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.436015] kasan_report+0x141/0x180 [ 17.436040] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.436076] kasan_check_range+0x10c/0x1c0 [ 17.436103] __kasan_check_write+0x18/0x20 [ 17.436125] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 17.436156] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.436188] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.436255] ? kasan_bitops_generic+0x92/0x1c0 [ 17.436324] kasan_bitops_generic+0x121/0x1c0 [ 17.436377] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.436489] ? __pfx_read_tsc+0x10/0x10 [ 17.436518] ? ktime_get_ts64+0x86/0x230 [ 17.436561] kunit_try_run_case+0x1a5/0x480 [ 17.436605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.436629] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.436658] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.436686] ? __kthread_parkme+0x82/0x180 [ 17.436710] ? preempt_count_sub+0x50/0x80 [ 17.436737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.436761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.436789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.436817] kthread+0x337/0x6f0 [ 17.436839] ? trace_preempt_on+0x20/0xc0 [ 17.436866] ? __pfx_kthread+0x10/0x10 [ 17.436888] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.436914] ? calculate_sigpending+0x7b/0xa0 [ 17.436940] ? __pfx_kthread+0x10/0x10 [ 17.436964] ret_from_fork+0x116/0x1d0 [ 17.436986] ? __pfx_kthread+0x10/0x10 [ 17.437008] ret_from_fork_asm+0x1a/0x30 [ 17.437044] </TASK> [ 17.437058] [ 17.451155] Allocated by task 278: [ 17.451673] kasan_save_stack+0x45/0x70 [ 17.452133] kasan_save_track+0x18/0x40 [ 17.452567] kasan_save_alloc_info+0x3b/0x50 [ 17.452844] __kasan_kmalloc+0xb7/0xc0 [ 17.453259] __kmalloc_cache_noprof+0x189/0x420 [ 17.453486] kasan_bitops_generic+0x92/0x1c0 [ 17.453918] kunit_try_run_case+0x1a5/0x480 [ 17.454604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.454940] kthread+0x337/0x6f0 [ 17.455231] ret_from_fork+0x116/0x1d0 [ 17.456085] ret_from_fork_asm+0x1a/0x30 [ 17.456407] [ 17.456536] The buggy address belongs to the object at ffff8881023809a0 [ 17.456536] which belongs to the cache kmalloc-16 of size 16 [ 17.457496] The buggy address is located 8 bytes inside of [ 17.457496] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.458206] [ 17.458471] The buggy address belongs to the physical page: [ 17.459050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.459528] flags: 0x200000000000000(node=0|zone=2) [ 17.459903] page_type: f5(slab) [ 17.460172] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.460648] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.461065] page dumped because: kasan: bad access detected [ 17.461523] [ 17.461646] Memory state around the buggy address: [ 17.462040] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.462776] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.463089] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.463657] ^ [ 17.464057] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.464496] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.464995] ================================================================== [ 17.466340] ================================================================== [ 17.466758] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.467602] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.468098] [ 17.468272] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.468381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.468409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.468468] Call Trace: [ 17.468513] <TASK> [ 17.468556] dump_stack_lvl+0x73/0xb0 [ 17.468626] print_report+0xd1/0x650 [ 17.468679] ? __virt_addr_valid+0x1db/0x2d0 [ 17.468732] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.468776] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.468803] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.468834] kasan_report+0x141/0x180 [ 17.468860] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.468907] kasan_check_range+0x10c/0x1c0 [ 17.468955] __kasan_check_write+0x18/0x20 [ 17.468991] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 17.469039] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.469098] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.469144] ? kasan_bitops_generic+0x92/0x1c0 [ 17.469204] kasan_bitops_generic+0x121/0x1c0 [ 17.470345] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.470464] ? __pfx_read_tsc+0x10/0x10 [ 17.470523] ? ktime_get_ts64+0x86/0x230 [ 17.470584] kunit_try_run_case+0x1a5/0x480 [ 17.470640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.470690] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.470725] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.470754] ? __kthread_parkme+0x82/0x180 [ 17.470779] ? preempt_count_sub+0x50/0x80 [ 17.470806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.470830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.470859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.470886] kthread+0x337/0x6f0 [ 17.470908] ? trace_preempt_on+0x20/0xc0 [ 17.470935] ? __pfx_kthread+0x10/0x10 [ 17.470959] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.470983] ? calculate_sigpending+0x7b/0xa0 [ 17.471011] ? __pfx_kthread+0x10/0x10 [ 17.471034] ret_from_fork+0x116/0x1d0 [ 17.471056] ? __pfx_kthread+0x10/0x10 [ 17.471078] ret_from_fork_asm+0x1a/0x30 [ 17.471114] </TASK> [ 17.471127] [ 17.482680] Allocated by task 278: [ 17.482937] kasan_save_stack+0x45/0x70 [ 17.483186] kasan_save_track+0x18/0x40 [ 17.483583] kasan_save_alloc_info+0x3b/0x50 [ 17.483969] __kasan_kmalloc+0xb7/0xc0 [ 17.484288] __kmalloc_cache_noprof+0x189/0x420 [ 17.484812] kasan_bitops_generic+0x92/0x1c0 [ 17.485195] kunit_try_run_case+0x1a5/0x480 [ 17.485578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.486012] kthread+0x337/0x6f0 [ 17.486387] ret_from_fork+0x116/0x1d0 [ 17.486672] ret_from_fork_asm+0x1a/0x30 [ 17.486933] [ 17.487065] The buggy address belongs to the object at ffff8881023809a0 [ 17.487065] which belongs to the cache kmalloc-16 of size 16 [ 17.487513] The buggy address is located 8 bytes inside of [ 17.487513] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.488004] [ 17.488201] The buggy address belongs to the physical page: [ 17.488668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.489487] flags: 0x200000000000000(node=0|zone=2) [ 17.489925] page_type: f5(slab) [ 17.490254] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.490864] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.491368] page dumped because: kasan: bad access detected [ 17.491711] [ 17.491898] Memory state around the buggy address: [ 17.492192] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.492728] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.493160] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.493679] ^ [ 17.493916] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.494194] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.494495] ================================================================== [ 17.560950] ================================================================== [ 17.561524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.562289] Read of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.562787] [ 17.563061] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.563229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.563265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.563314] Call Trace: [ 17.563367] <TASK> [ 17.563439] dump_stack_lvl+0x73/0xb0 [ 17.563530] print_report+0xd1/0x650 [ 17.563583] ? __virt_addr_valid+0x1db/0x2d0 [ 17.563634] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.563724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.563789] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.563827] kasan_report+0x141/0x180 [ 17.563853] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.563888] __asan_report_load8_noabort+0x18/0x20 [ 17.563911] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 17.563951] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.564000] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.564045] ? kasan_bitops_generic+0x92/0x1c0 [ 17.564129] kasan_bitops_generic+0x121/0x1c0 [ 17.564236] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.564293] ? __pfx_read_tsc+0x10/0x10 [ 17.564368] ? ktime_get_ts64+0x86/0x230 [ 17.564443] kunit_try_run_case+0x1a5/0x480 [ 17.564500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.564538] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.564568] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.564595] ? __kthread_parkme+0x82/0x180 [ 17.564619] ? preempt_count_sub+0x50/0x80 [ 17.564645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.564668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.564695] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.564722] kthread+0x337/0x6f0 [ 17.564745] ? trace_preempt_on+0x20/0xc0 [ 17.564771] ? __pfx_kthread+0x10/0x10 [ 17.564793] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.564817] ? calculate_sigpending+0x7b/0xa0 [ 17.564844] ? __pfx_kthread+0x10/0x10 [ 17.564868] ret_from_fork+0x116/0x1d0 [ 17.564889] ? __pfx_kthread+0x10/0x10 [ 17.564911] ret_from_fork_asm+0x1a/0x30 [ 17.564945] </TASK> [ 17.564959] [ 17.576666] Allocated by task 278: [ 17.577094] kasan_save_stack+0x45/0x70 [ 17.577553] kasan_save_track+0x18/0x40 [ 17.577923] kasan_save_alloc_info+0x3b/0x50 [ 17.578286] __kasan_kmalloc+0xb7/0xc0 [ 17.578499] __kmalloc_cache_noprof+0x189/0x420 [ 17.578759] kasan_bitops_generic+0x92/0x1c0 [ 17.579188] kunit_try_run_case+0x1a5/0x480 [ 17.579626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.579998] kthread+0x337/0x6f0 [ 17.580398] ret_from_fork+0x116/0x1d0 [ 17.580745] ret_from_fork_asm+0x1a/0x30 [ 17.581090] [ 17.581272] The buggy address belongs to the object at ffff8881023809a0 [ 17.581272] which belongs to the cache kmalloc-16 of size 16 [ 17.582001] The buggy address is located 8 bytes inside of [ 17.582001] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.582974] [ 17.583177] The buggy address belongs to the physical page: [ 17.583517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.584184] flags: 0x200000000000000(node=0|zone=2) [ 17.584793] page_type: f5(slab) [ 17.585540] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.585932] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.587423] page dumped because: kasan: bad access detected [ 17.587691] [ 17.587817] Memory state around the buggy address: [ 17.588075] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.588525] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.589184] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.589939] ^ [ 17.590223] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.591286] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.591637] ================================================================== [ 17.266344] ================================================================== [ 17.267171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.267635] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.268401] [ 17.268914] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.269020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.269044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.269081] Call Trace: [ 17.269120] <TASK> [ 17.269157] dump_stack_lvl+0x73/0xb0 [ 17.269219] print_report+0xd1/0x650 [ 17.269258] ? __virt_addr_valid+0x1db/0x2d0 [ 17.269296] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.269339] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.269380] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.269426] kasan_report+0x141/0x180 [ 17.270000] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.270061] kasan_check_range+0x10c/0x1c0 [ 17.270091] __kasan_check_write+0x18/0x20 [ 17.270115] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 17.270147] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.270179] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.270213] ? kasan_bitops_generic+0x92/0x1c0 [ 17.270263] kasan_bitops_generic+0x121/0x1c0 [ 17.270290] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.270317] ? __pfx_read_tsc+0x10/0x10 [ 17.270344] ? ktime_get_ts64+0x86/0x230 [ 17.270373] kunit_try_run_case+0x1a5/0x480 [ 17.270399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.270420] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.270450] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.270501] ? __kthread_parkme+0x82/0x180 [ 17.270525] ? preempt_count_sub+0x50/0x80 [ 17.270556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.270580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.270608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.270636] kthread+0x337/0x6f0 [ 17.270660] ? trace_preempt_on+0x20/0xc0 [ 17.270687] ? __pfx_kthread+0x10/0x10 [ 17.270727] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.270765] ? calculate_sigpending+0x7b/0xa0 [ 17.270807] ? __pfx_kthread+0x10/0x10 [ 17.270844] ret_from_fork+0x116/0x1d0 [ 17.270881] ? __pfx_kthread+0x10/0x10 [ 17.270914] ret_from_fork_asm+0x1a/0x30 [ 17.270952] </TASK> [ 17.270967] [ 17.287662] Allocated by task 278: [ 17.288392] kasan_save_stack+0x45/0x70 [ 17.289338] kasan_save_track+0x18/0x40 [ 17.289989] kasan_save_alloc_info+0x3b/0x50 [ 17.290288] __kasan_kmalloc+0xb7/0xc0 [ 17.290663] __kmalloc_cache_noprof+0x189/0x420 [ 17.291218] kasan_bitops_generic+0x92/0x1c0 [ 17.291576] kunit_try_run_case+0x1a5/0x480 [ 17.292258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.292621] kthread+0x337/0x6f0 [ 17.293395] ret_from_fork+0x116/0x1d0 [ 17.293594] ret_from_fork_asm+0x1a/0x30 [ 17.293864] [ 17.294074] The buggy address belongs to the object at ffff8881023809a0 [ 17.294074] which belongs to the cache kmalloc-16 of size 16 [ 17.294932] The buggy address is located 8 bytes inside of [ 17.294932] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.295953] [ 17.296214] The buggy address belongs to the physical page: [ 17.296740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.297443] flags: 0x200000000000000(node=0|zone=2) [ 17.297983] page_type: f5(slab) [ 17.298503] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.299294] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.299690] page dumped because: kasan: bad access detected [ 17.300857] [ 17.301012] Memory state around the buggy address: [ 17.301384] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.302278] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.302733] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.303245] ^ [ 17.303668] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.304735] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.305161] ================================================================== [ 17.385412] ================================================================== [ 17.385717] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.386060] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.386298] [ 17.386444] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.386832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.386864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.386992] Call Trace: [ 17.387114] <TASK> [ 17.387244] dump_stack_lvl+0x73/0xb0 [ 17.387319] print_report+0xd1/0x650 [ 17.387374] ? __virt_addr_valid+0x1db/0x2d0 [ 17.387420] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.387491] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.387535] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.387584] kasan_report+0x141/0x180 [ 17.387622] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.387676] kasan_check_range+0x10c/0x1c0 [ 17.387719] __kasan_check_write+0x18/0x20 [ 17.387750] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 17.390898] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.390990] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.391035] ? kasan_bitops_generic+0x92/0x1c0 [ 17.391093] kasan_bitops_generic+0x121/0x1c0 [ 17.391142] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.391185] ? __pfx_read_tsc+0x10/0x10 [ 17.391244] ? ktime_get_ts64+0x86/0x230 [ 17.391297] kunit_try_run_case+0x1a5/0x480 [ 17.391362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.391410] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.391484] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.391544] ? __kthread_parkme+0x82/0x180 [ 17.391595] ? preempt_count_sub+0x50/0x80 [ 17.391652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.391703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.391760] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.391814] kthread+0x337/0x6f0 [ 17.391862] ? trace_preempt_on+0x20/0xc0 [ 17.391915] ? __pfx_kthread+0x10/0x10 [ 17.391964] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.392015] ? calculate_sigpending+0x7b/0xa0 [ 17.392072] ? __pfx_kthread+0x10/0x10 [ 17.392120] ret_from_fork+0x116/0x1d0 [ 17.392154] ? __pfx_kthread+0x10/0x10 [ 17.392192] ret_from_fork_asm+0x1a/0x30 [ 17.392250] </TASK> [ 17.392271] [ 17.412831] Allocated by task 278: [ 17.413090] kasan_save_stack+0x45/0x70 [ 17.413381] kasan_save_track+0x18/0x40 [ 17.414980] kasan_save_alloc_info+0x3b/0x50 [ 17.415332] __kasan_kmalloc+0xb7/0xc0 [ 17.416026] __kmalloc_cache_noprof+0x189/0x420 [ 17.416403] kasan_bitops_generic+0x92/0x1c0 [ 17.416658] kunit_try_run_case+0x1a5/0x480 [ 17.417300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.418372] kthread+0x337/0x6f0 [ 17.418626] ret_from_fork+0x116/0x1d0 [ 17.418902] ret_from_fork_asm+0x1a/0x30 [ 17.419511] [ 17.419808] The buggy address belongs to the object at ffff8881023809a0 [ 17.419808] which belongs to the cache kmalloc-16 of size 16 [ 17.420802] The buggy address is located 8 bytes inside of [ 17.420802] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.421404] [ 17.421871] The buggy address belongs to the physical page: [ 17.422194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.422534] flags: 0x200000000000000(node=0|zone=2) [ 17.422880] page_type: f5(slab) [ 17.423913] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.425167] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.426047] page dumped because: kasan: bad access detected [ 17.426540] [ 17.426929] Memory state around the buggy address: [ 17.427189] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.428551] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.429013] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.429474] ^ [ 17.429865] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.430516] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.431239] ================================================================== [ 17.527503] ================================================================== [ 17.527858] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.528247] Read of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.529016] [ 17.529327] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.529439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.529477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.529529] Call Trace: [ 17.529578] <TASK> [ 17.529623] dump_stack_lvl+0x73/0xb0 [ 17.529693] print_report+0xd1/0x650 [ 17.529750] ? __virt_addr_valid+0x1db/0x2d0 [ 17.529806] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.529872] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.529926] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.529989] kasan_report+0x141/0x180 [ 17.530043] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.530116] kasan_check_range+0x10c/0x1c0 [ 17.530172] __kasan_check_read+0x15/0x20 [ 17.530235] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 17.530293] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.530389] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.530465] ? kasan_bitops_generic+0x92/0x1c0 [ 17.530553] kasan_bitops_generic+0x121/0x1c0 [ 17.530646] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.530735] ? __pfx_read_tsc+0x10/0x10 [ 17.530783] ? ktime_get_ts64+0x86/0x230 [ 17.530858] kunit_try_run_case+0x1a5/0x480 [ 17.530909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.530951] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.530997] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.531044] ? __kthread_parkme+0x82/0x180 [ 17.531092] ? preempt_count_sub+0x50/0x80 [ 17.531175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.531277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.531339] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.531404] kthread+0x337/0x6f0 [ 17.531445] ? trace_preempt_on+0x20/0xc0 [ 17.531894] ? __pfx_kthread+0x10/0x10 [ 17.531979] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.532024] ? calculate_sigpending+0x7b/0xa0 [ 17.532056] ? __pfx_kthread+0x10/0x10 [ 17.532081] ret_from_fork+0x116/0x1d0 [ 17.532105] ? __pfx_kthread+0x10/0x10 [ 17.532128] ret_from_fork_asm+0x1a/0x30 [ 17.532164] </TASK> [ 17.532178] [ 17.545186] Allocated by task 278: [ 17.545758] kasan_save_stack+0x45/0x70 [ 17.546011] kasan_save_track+0x18/0x40 [ 17.546651] kasan_save_alloc_info+0x3b/0x50 [ 17.547074] __kasan_kmalloc+0xb7/0xc0 [ 17.547450] __kmalloc_cache_noprof+0x189/0x420 [ 17.548172] kasan_bitops_generic+0x92/0x1c0 [ 17.548647] kunit_try_run_case+0x1a5/0x480 [ 17.548852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.549505] kthread+0x337/0x6f0 [ 17.549989] ret_from_fork+0x116/0x1d0 [ 17.550304] ret_from_fork_asm+0x1a/0x30 [ 17.550804] [ 17.550956] The buggy address belongs to the object at ffff8881023809a0 [ 17.550956] which belongs to the cache kmalloc-16 of size 16 [ 17.551754] The buggy address is located 8 bytes inside of [ 17.551754] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.552434] [ 17.552917] The buggy address belongs to the physical page: [ 17.553231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.553996] flags: 0x200000000000000(node=0|zone=2) [ 17.554223] page_type: f5(slab) [ 17.554497] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.555069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.555397] page dumped because: kasan: bad access detected [ 17.555874] [ 17.556005] Memory state around the buggy address: [ 17.556266] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.556845] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.557569] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.558055] ^ [ 17.558313] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.558917] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.559568] ================================================================== [ 17.495968] ================================================================== [ 17.497152] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.497686] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.498162] [ 17.498422] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.498579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.498853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.498893] Call Trace: [ 17.498935] <TASK> [ 17.498977] dump_stack_lvl+0x73/0xb0 [ 17.499039] print_report+0xd1/0x650 [ 17.499088] ? __virt_addr_valid+0x1db/0x2d0 [ 17.499136] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.499193] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.499942] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.499993] kasan_report+0x141/0x180 [ 17.500024] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.500061] kasan_check_range+0x10c/0x1c0 [ 17.500090] __kasan_check_write+0x18/0x20 [ 17.500113] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 17.500144] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.500176] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.500210] ? kasan_bitops_generic+0x92/0x1c0 [ 17.500562] kasan_bitops_generic+0x121/0x1c0 [ 17.500622] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.500680] ? __pfx_read_tsc+0x10/0x10 [ 17.500732] ? ktime_get_ts64+0x86/0x230 [ 17.500793] kunit_try_run_case+0x1a5/0x480 [ 17.500848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.500897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.500956] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.501014] ? __kthread_parkme+0x82/0x180 [ 17.501063] ? preempt_count_sub+0x50/0x80 [ 17.501112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.501137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.501165] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.501210] kthread+0x337/0x6f0 [ 17.501267] ? trace_preempt_on+0x20/0xc0 [ 17.501294] ? __pfx_kthread+0x10/0x10 [ 17.501316] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.501341] ? calculate_sigpending+0x7b/0xa0 [ 17.501368] ? __pfx_kthread+0x10/0x10 [ 17.501391] ret_from_fork+0x116/0x1d0 [ 17.501411] ? __pfx_kthread+0x10/0x10 [ 17.501434] ret_from_fork_asm+0x1a/0x30 [ 17.501485] </TASK> [ 17.501500] [ 17.513812] Allocated by task 278: [ 17.514199] kasan_save_stack+0x45/0x70 [ 17.514529] kasan_save_track+0x18/0x40 [ 17.514865] kasan_save_alloc_info+0x3b/0x50 [ 17.515243] __kasan_kmalloc+0xb7/0xc0 [ 17.515485] __kmalloc_cache_noprof+0x189/0x420 [ 17.515866] kasan_bitops_generic+0x92/0x1c0 [ 17.516167] kunit_try_run_case+0x1a5/0x480 [ 17.516581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.516876] kthread+0x337/0x6f0 [ 17.517069] ret_from_fork+0x116/0x1d0 [ 17.517339] ret_from_fork_asm+0x1a/0x30 [ 17.517777] [ 17.517994] The buggy address belongs to the object at ffff8881023809a0 [ 17.517994] which belongs to the cache kmalloc-16 of size 16 [ 17.518872] The buggy address is located 8 bytes inside of [ 17.518872] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.519297] [ 17.519442] The buggy address belongs to the physical page: [ 17.520019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.520726] flags: 0x200000000000000(node=0|zone=2) [ 17.521126] page_type: f5(slab) [ 17.521559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.522065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.522651] page dumped because: kasan: bad access detected [ 17.522883] [ 17.523000] Memory state around the buggy address: [ 17.523249] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.523747] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.524502] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.525078] ^ [ 17.525316] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.525772] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.526333] ================================================================== [ 17.345667] ================================================================== [ 17.346303] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.346894] Write of size 8 at addr ffff8881023809a8 by task kunit_try_catch/278 [ 17.347997] [ 17.348249] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 17.349088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.349151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.349199] Call Trace: [ 17.349266] <TASK> [ 17.349310] dump_stack_lvl+0x73/0xb0 [ 17.349395] print_report+0xd1/0x650 [ 17.349444] ? __virt_addr_valid+0x1db/0x2d0 [ 17.349510] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.349591] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.349641] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.349698] kasan_report+0x141/0x180 [ 17.349746] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.349792] kasan_check_range+0x10c/0x1c0 [ 17.349821] __kasan_check_write+0x18/0x20 [ 17.349844] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 17.349875] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 17.349907] ? __kmalloc_cache_noprof+0x189/0x420 [ 17.349932] ? kasan_bitops_generic+0x92/0x1c0 [ 17.349963] kasan_bitops_generic+0x121/0x1c0 [ 17.349990] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 17.350019] ? __pfx_read_tsc+0x10/0x10 [ 17.350043] ? ktime_get_ts64+0x86/0x230 [ 17.350073] kunit_try_run_case+0x1a5/0x480 [ 17.350097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.350119] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.350147] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.350174] ? __kthread_parkme+0x82/0x180 [ 17.350203] ? preempt_count_sub+0x50/0x80 [ 17.350284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.350327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.350396] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.350427] kthread+0x337/0x6f0 [ 17.350450] ? trace_preempt_on+0x20/0xc0 [ 17.350502] ? __pfx_kthread+0x10/0x10 [ 17.350527] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.350556] ? calculate_sigpending+0x7b/0xa0 [ 17.350585] ? __pfx_kthread+0x10/0x10 [ 17.350610] ret_from_fork+0x116/0x1d0 [ 17.350634] ? __pfx_kthread+0x10/0x10 [ 17.350658] ret_from_fork_asm+0x1a/0x30 [ 17.350719] </TASK> [ 17.350743] [ 17.367092] Allocated by task 278: [ 17.367329] kasan_save_stack+0x45/0x70 [ 17.368644] kasan_save_track+0x18/0x40 [ 17.369191] kasan_save_alloc_info+0x3b/0x50 [ 17.369747] __kasan_kmalloc+0xb7/0xc0 [ 17.370151] __kmalloc_cache_noprof+0x189/0x420 [ 17.370608] kasan_bitops_generic+0x92/0x1c0 [ 17.371436] kunit_try_run_case+0x1a5/0x480 [ 17.372507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.372908] kthread+0x337/0x6f0 [ 17.373073] ret_from_fork+0x116/0x1d0 [ 17.373180] ret_from_fork_asm+0x1a/0x30 [ 17.373409] [ 17.373550] The buggy address belongs to the object at ffff8881023809a0 [ 17.373550] which belongs to the cache kmalloc-16 of size 16 [ 17.374768] The buggy address is located 8 bytes inside of [ 17.374768] allocated 9-byte region [ffff8881023809a0, ffff8881023809a9) [ 17.375597] [ 17.375783] The buggy address belongs to the physical page: [ 17.376104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102380 [ 17.377240] flags: 0x200000000000000(node=0|zone=2) [ 17.377468] page_type: f5(slab) [ 17.377622] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.379095] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.379560] page dumped because: kasan: bad access detected [ 17.380251] [ 17.380380] Memory state around the buggy address: [ 17.381540] ffff888102380880: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 17.381928] ffff888102380900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 17.382750] >ffff888102380980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.383199] ^ [ 17.384107] ffff888102380a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.384370] ffff888102380a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.384812] ==================================================================