Date
June 5, 2025, 7:08 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.728771] ================================================================== [ 13.729165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.729485] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.729832] [ 13.729975] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.730023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.730035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.730056] Call Trace: [ 13.730069] <TASK> [ 13.730082] dump_stack_lvl+0x73/0xb0 [ 13.730106] print_report+0xd1/0x650 [ 13.730128] ? __virt_addr_valid+0x1db/0x2d0 [ 13.730150] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.730178] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.730200] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.730228] kasan_report+0x141/0x180 [ 13.730249] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.730281] kasan_check_range+0x10c/0x1c0 [ 13.730305] __kasan_check_write+0x18/0x20 [ 13.730324] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.730352] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.730380] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.730404] ? trace_hardirqs_on+0x37/0xe0 [ 13.730425] ? kasan_bitops_generic+0x92/0x1c0 [ 13.730452] kasan_bitops_generic+0x121/0x1c0 [ 13.730475] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.730500] ? __pfx_read_tsc+0x10/0x10 [ 13.730521] ? ktime_get_ts64+0x86/0x230 [ 13.730543] kunit_try_run_case+0x1a5/0x480 [ 13.730563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.730582] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.730607] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.730651] ? __kthread_parkme+0x82/0x180 [ 13.730671] ? preempt_count_sub+0x50/0x80 [ 13.730694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.730714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.730738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.730763] kthread+0x337/0x6f0 [ 13.730781] ? trace_preempt_on+0x20/0xc0 [ 13.730803] ? __pfx_kthread+0x10/0x10 [ 13.730823] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.730844] ? calculate_sigpending+0x7b/0xa0 [ 13.730869] ? __pfx_kthread+0x10/0x10 [ 13.730889] ret_from_fork+0x116/0x1d0 [ 13.730915] ? __pfx_kthread+0x10/0x10 [ 13.730981] ret_from_fork_asm+0x1a/0x30 [ 13.731012] </TASK> [ 13.731023] [ 13.743162] Allocated by task 278: [ 13.743303] kasan_save_stack+0x45/0x70 [ 13.744103] kasan_save_track+0x18/0x40 [ 13.744409] kasan_save_alloc_info+0x3b/0x50 [ 13.744573] __kasan_kmalloc+0xb7/0xc0 [ 13.745293] __kmalloc_cache_noprof+0x189/0x420 [ 13.746632] kasan_bitops_generic+0x92/0x1c0 [ 13.747131] kunit_try_run_case+0x1a5/0x480 [ 13.747284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.747476] kthread+0x337/0x6f0 [ 13.748208] ret_from_fork+0x116/0x1d0 [ 13.748709] ret_from_fork_asm+0x1a/0x30 [ 13.748882] [ 13.749002] The buggy address belongs to the object at ffff888102ae9140 [ 13.749002] which belongs to the cache kmalloc-16 of size 16 [ 13.749713] The buggy address is located 8 bytes inside of [ 13.749713] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.750386] [ 13.750489] The buggy address belongs to the physical page: [ 13.750997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.751306] flags: 0x200000000000000(node=0|zone=2) [ 13.751554] page_type: f5(slab) [ 13.751705] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.752220] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.752658] page dumped because: kasan: bad access detected [ 13.752854] [ 13.752955] Memory state around the buggy address: [ 13.753297] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.753845] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.754309] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.754606] ^ [ 13.754845] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.755276] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.755576] ================================================================== [ 13.776147] ================================================================== [ 13.776483] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.777076] Read of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.777402] [ 13.777501] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.777542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.777553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.777572] Call Trace: [ 13.777587] <TASK> [ 13.777601] dump_stack_lvl+0x73/0xb0 [ 13.777624] print_report+0xd1/0x650 [ 13.777645] ? __virt_addr_valid+0x1db/0x2d0 [ 13.777668] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.777695] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.777717] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.777745] kasan_report+0x141/0x180 [ 13.777783] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.777815] kasan_check_range+0x10c/0x1c0 [ 13.777839] __kasan_check_read+0x15/0x20 [ 13.777858] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.777886] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.777925] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.777948] ? trace_hardirqs_on+0x37/0xe0 [ 13.777970] ? kasan_bitops_generic+0x92/0x1c0 [ 13.777997] kasan_bitops_generic+0x121/0x1c0 [ 13.778021] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.778046] ? __pfx_read_tsc+0x10/0x10 [ 13.778066] ? ktime_get_ts64+0x86/0x230 [ 13.778090] kunit_try_run_case+0x1a5/0x480 [ 13.778111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.778130] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.778155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.778180] ? __kthread_parkme+0x82/0x180 [ 13.778200] ? preempt_count_sub+0x50/0x80 [ 13.778223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.778243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.778268] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.778292] kthread+0x337/0x6f0 [ 13.778311] ? trace_preempt_on+0x20/0xc0 [ 13.778332] ? __pfx_kthread+0x10/0x10 [ 13.778353] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.778375] ? calculate_sigpending+0x7b/0xa0 [ 13.778399] ? __pfx_kthread+0x10/0x10 [ 13.778420] ret_from_fork+0x116/0x1d0 [ 13.778438] ? __pfx_kthread+0x10/0x10 [ 13.778459] ret_from_fork_asm+0x1a/0x30 [ 13.778488] </TASK> [ 13.778498] [ 13.786850] Allocated by task 278: [ 13.786998] kasan_save_stack+0x45/0x70 [ 13.787143] kasan_save_track+0x18/0x40 [ 13.787278] kasan_save_alloc_info+0x3b/0x50 [ 13.787535] __kasan_kmalloc+0xb7/0xc0 [ 13.787778] __kmalloc_cache_noprof+0x189/0x420 [ 13.788014] kasan_bitops_generic+0x92/0x1c0 [ 13.788221] kunit_try_run_case+0x1a5/0x480 [ 13.788423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.788646] kthread+0x337/0x6f0 [ 13.788767] ret_from_fork+0x116/0x1d0 [ 13.788906] ret_from_fork_asm+0x1a/0x30 [ 13.789048] [ 13.789118] The buggy address belongs to the object at ffff888102ae9140 [ 13.789118] which belongs to the cache kmalloc-16 of size 16 [ 13.789966] The buggy address is located 8 bytes inside of [ 13.789966] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.790502] [ 13.790600] The buggy address belongs to the physical page: [ 13.791249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.791626] flags: 0x200000000000000(node=0|zone=2) [ 13.791860] page_type: f5(slab) [ 13.792121] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.792373] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.792617] page dumped because: kasan: bad access detected [ 13.792882] [ 13.793050] Memory state around the buggy address: [ 13.793277] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.793565] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.793887] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.794292] ^ [ 13.794504] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.794821] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.795046] ================================================================== [ 13.756265] ================================================================== [ 13.756563] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.757162] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.757462] [ 13.757578] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.757622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.757633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.757655] Call Trace: [ 13.757668] <TASK> [ 13.757682] dump_stack_lvl+0x73/0xb0 [ 13.757708] print_report+0xd1/0x650 [ 13.757730] ? __virt_addr_valid+0x1db/0x2d0 [ 13.757754] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.757782] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.757823] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.757851] kasan_report+0x141/0x180 [ 13.757873] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.757916] kasan_check_range+0x10c/0x1c0 [ 13.757939] __kasan_check_write+0x18/0x20 [ 13.757959] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.757986] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.758015] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.758038] ? trace_hardirqs_on+0x37/0xe0 [ 13.758059] ? kasan_bitops_generic+0x92/0x1c0 [ 13.758085] kasan_bitops_generic+0x121/0x1c0 [ 13.758158] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.758186] ? __pfx_read_tsc+0x10/0x10 [ 13.758207] ? ktime_get_ts64+0x86/0x230 [ 13.758230] kunit_try_run_case+0x1a5/0x480 [ 13.758251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.758270] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.758295] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.758318] ? __kthread_parkme+0x82/0x180 [ 13.758338] ? preempt_count_sub+0x50/0x80 [ 13.758361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.758382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.758406] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.758430] kthread+0x337/0x6f0 [ 13.758449] ? trace_preempt_on+0x20/0xc0 [ 13.758470] ? __pfx_kthread+0x10/0x10 [ 13.758490] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.758511] ? calculate_sigpending+0x7b/0xa0 [ 13.758535] ? __pfx_kthread+0x10/0x10 [ 13.758555] ret_from_fork+0x116/0x1d0 [ 13.758574] ? __pfx_kthread+0x10/0x10 [ 13.758593] ret_from_fork_asm+0x1a/0x30 [ 13.758623] </TASK> [ 13.758653] [ 13.767546] Allocated by task 278: [ 13.767834] kasan_save_stack+0x45/0x70 [ 13.768155] kasan_save_track+0x18/0x40 [ 13.768346] kasan_save_alloc_info+0x3b/0x50 [ 13.768538] __kasan_kmalloc+0xb7/0xc0 [ 13.768771] __kmalloc_cache_noprof+0x189/0x420 [ 13.768985] kasan_bitops_generic+0x92/0x1c0 [ 13.769170] kunit_try_run_case+0x1a5/0x480 [ 13.769316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.769493] kthread+0x337/0x6f0 [ 13.769622] ret_from_fork+0x116/0x1d0 [ 13.769806] ret_from_fork_asm+0x1a/0x30 [ 13.770146] [ 13.770243] The buggy address belongs to the object at ffff888102ae9140 [ 13.770243] which belongs to the cache kmalloc-16 of size 16 [ 13.770855] The buggy address is located 8 bytes inside of [ 13.770855] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.771301] [ 13.771408] The buggy address belongs to the physical page: [ 13.771694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.772255] flags: 0x200000000000000(node=0|zone=2) [ 13.772447] page_type: f5(slab) [ 13.772615] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.773048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.773351] page dumped because: kasan: bad access detected [ 13.773550] [ 13.773620] Memory state around the buggy address: [ 13.773772] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.774074] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.774392] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.774823] ^ [ 13.775177] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.775475] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.775772] ================================================================== [ 13.663478] ================================================================== [ 13.664055] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.664465] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.664781] [ 13.664864] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.664917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.664930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.664951] Call Trace: [ 13.664963] <TASK> [ 13.664976] dump_stack_lvl+0x73/0xb0 [ 13.664999] print_report+0xd1/0x650 [ 13.665021] ? __virt_addr_valid+0x1db/0x2d0 [ 13.665048] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.665075] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.665098] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.665125] kasan_report+0x141/0x180 [ 13.665148] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.665179] kasan_check_range+0x10c/0x1c0 [ 13.665203] __kasan_check_write+0x18/0x20 [ 13.665221] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.665249] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.665277] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.665301] ? trace_hardirqs_on+0x37/0xe0 [ 13.665321] ? kasan_bitops_generic+0x92/0x1c0 [ 13.665348] kasan_bitops_generic+0x121/0x1c0 [ 13.665371] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.665396] ? __pfx_read_tsc+0x10/0x10 [ 13.665415] ? ktime_get_ts64+0x86/0x230 [ 13.665439] kunit_try_run_case+0x1a5/0x480 [ 13.665459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.665478] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.665503] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.665526] ? __kthread_parkme+0x82/0x180 [ 13.665546] ? preempt_count_sub+0x50/0x80 [ 13.665569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.665589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.665614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.665688] kthread+0x337/0x6f0 [ 13.665709] ? trace_preempt_on+0x20/0xc0 [ 13.665731] ? __pfx_kthread+0x10/0x10 [ 13.665750] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.665773] ? calculate_sigpending+0x7b/0xa0 [ 13.665796] ? __pfx_kthread+0x10/0x10 [ 13.665818] ret_from_fork+0x116/0x1d0 [ 13.665835] ? __pfx_kthread+0x10/0x10 [ 13.665855] ret_from_fork_asm+0x1a/0x30 [ 13.665884] </TASK> [ 13.665904] [ 13.674486] Allocated by task 278: [ 13.674673] kasan_save_stack+0x45/0x70 [ 13.675042] kasan_save_track+0x18/0x40 [ 13.675240] kasan_save_alloc_info+0x3b/0x50 [ 13.675428] __kasan_kmalloc+0xb7/0xc0 [ 13.675560] __kmalloc_cache_noprof+0x189/0x420 [ 13.675715] kasan_bitops_generic+0x92/0x1c0 [ 13.675862] kunit_try_run_case+0x1a5/0x480 [ 13.676021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.676279] kthread+0x337/0x6f0 [ 13.676448] ret_from_fork+0x116/0x1d0 [ 13.676638] ret_from_fork_asm+0x1a/0x30 [ 13.677544] [ 13.677676] The buggy address belongs to the object at ffff888102ae9140 [ 13.677676] which belongs to the cache kmalloc-16 of size 16 [ 13.678215] The buggy address is located 8 bytes inside of [ 13.678215] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.678565] [ 13.678638] The buggy address belongs to the physical page: [ 13.678809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.679551] flags: 0x200000000000000(node=0|zone=2) [ 13.680064] page_type: f5(slab) [ 13.680222] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.680527] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.681066] page dumped because: kasan: bad access detected [ 13.681242] [ 13.681310] Memory state around the buggy address: [ 13.681506] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.682230] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.682532] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.682807] ^ [ 13.683106] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.683326] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.683647] ================================================================== [ 13.643628] ================================================================== [ 13.644073] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.644372] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.644757] [ 13.644862] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.644920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.644932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.644952] Call Trace: [ 13.644964] <TASK> [ 13.644976] dump_stack_lvl+0x73/0xb0 [ 13.644999] print_report+0xd1/0x650 [ 13.645021] ? __virt_addr_valid+0x1db/0x2d0 [ 13.645049] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.645077] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.645098] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.645169] kasan_report+0x141/0x180 [ 13.645193] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.645224] kasan_check_range+0x10c/0x1c0 [ 13.645248] __kasan_check_write+0x18/0x20 [ 13.645267] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.645294] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.645322] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.645347] ? trace_hardirqs_on+0x37/0xe0 [ 13.645367] ? kasan_bitops_generic+0x92/0x1c0 [ 13.645394] kasan_bitops_generic+0x121/0x1c0 [ 13.645417] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.645442] ? __pfx_read_tsc+0x10/0x10 [ 13.645462] ? ktime_get_ts64+0x86/0x230 [ 13.645484] kunit_try_run_case+0x1a5/0x480 [ 13.645504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.645524] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.645549] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.645572] ? __kthread_parkme+0x82/0x180 [ 13.645592] ? preempt_count_sub+0x50/0x80 [ 13.645615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.645636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.645660] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.645684] kthread+0x337/0x6f0 [ 13.645702] ? trace_preempt_on+0x20/0xc0 [ 13.645724] ? __pfx_kthread+0x10/0x10 [ 13.645745] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.645766] ? calculate_sigpending+0x7b/0xa0 [ 13.645789] ? __pfx_kthread+0x10/0x10 [ 13.645810] ret_from_fork+0x116/0x1d0 [ 13.645828] ? __pfx_kthread+0x10/0x10 [ 13.645848] ret_from_fork_asm+0x1a/0x30 [ 13.645876] </TASK> [ 13.645887] [ 13.655358] Allocated by task 278: [ 13.655510] kasan_save_stack+0x45/0x70 [ 13.655702] kasan_save_track+0x18/0x40 [ 13.655911] kasan_save_alloc_info+0x3b/0x50 [ 13.656112] __kasan_kmalloc+0xb7/0xc0 [ 13.656290] __kmalloc_cache_noprof+0x189/0x420 [ 13.656487] kasan_bitops_generic+0x92/0x1c0 [ 13.656777] kunit_try_run_case+0x1a5/0x480 [ 13.657005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.657252] kthread+0x337/0x6f0 [ 13.657405] ret_from_fork+0x116/0x1d0 [ 13.657559] ret_from_fork_asm+0x1a/0x30 [ 13.657783] [ 13.657882] The buggy address belongs to the object at ffff888102ae9140 [ 13.657882] which belongs to the cache kmalloc-16 of size 16 [ 13.658404] The buggy address is located 8 bytes inside of [ 13.658404] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.658906] [ 13.659016] The buggy address belongs to the physical page: [ 13.659296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.659603] flags: 0x200000000000000(node=0|zone=2) [ 13.659834] page_type: f5(slab) [ 13.659990] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.660321] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.660615] page dumped because: kasan: bad access detected [ 13.660862] [ 13.660961] Memory state around the buggy address: [ 13.661312] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.661553] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.661768] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.662034] ^ [ 13.662526] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.662784] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.663010] ================================================================== [ 13.795423] ================================================================== [ 13.795756] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.796357] Read of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.796838] [ 13.796960] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.797003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.797014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.797035] Call Trace: [ 13.797055] <TASK> [ 13.797069] dump_stack_lvl+0x73/0xb0 [ 13.797094] print_report+0xd1/0x650 [ 13.797116] ? __virt_addr_valid+0x1db/0x2d0 [ 13.797139] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.797166] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.797189] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.797217] kasan_report+0x141/0x180 [ 13.797239] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.797271] __asan_report_load8_noabort+0x18/0x20 [ 13.797292] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.797319] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.797348] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.797372] ? trace_hardirqs_on+0x37/0xe0 [ 13.797393] ? kasan_bitops_generic+0x92/0x1c0 [ 13.797420] kasan_bitops_generic+0x121/0x1c0 [ 13.797444] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.797519] ? __pfx_read_tsc+0x10/0x10 [ 13.797540] ? ktime_get_ts64+0x86/0x230 [ 13.797564] kunit_try_run_case+0x1a5/0x480 [ 13.797585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.797603] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.797629] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.797654] ? __kthread_parkme+0x82/0x180 [ 13.797674] ? preempt_count_sub+0x50/0x80 [ 13.797697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.797718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.797742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.797766] kthread+0x337/0x6f0 [ 13.797786] ? trace_preempt_on+0x20/0xc0 [ 13.797809] ? __pfx_kthread+0x10/0x10 [ 13.797830] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.797852] ? calculate_sigpending+0x7b/0xa0 [ 13.797876] ? __pfx_kthread+0x10/0x10 [ 13.797921] ret_from_fork+0x116/0x1d0 [ 13.797939] ? __pfx_kthread+0x10/0x10 [ 13.797971] ret_from_fork_asm+0x1a/0x30 [ 13.798001] </TASK> [ 13.798012] [ 13.806955] Allocated by task 278: [ 13.807141] kasan_save_stack+0x45/0x70 [ 13.807343] kasan_save_track+0x18/0x40 [ 13.807507] kasan_save_alloc_info+0x3b/0x50 [ 13.807661] __kasan_kmalloc+0xb7/0xc0 [ 13.807792] __kmalloc_cache_noprof+0x189/0x420 [ 13.809232] kasan_bitops_generic+0x92/0x1c0 [ 13.809430] kunit_try_run_case+0x1a5/0x480 [ 13.809688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.810051] kthread+0x337/0x6f0 [ 13.810210] ret_from_fork+0x116/0x1d0 [ 13.810404] ret_from_fork_asm+0x1a/0x30 [ 13.810575] [ 13.810699] The buggy address belongs to the object at ffff888102ae9140 [ 13.810699] which belongs to the cache kmalloc-16 of size 16 [ 13.811274] The buggy address is located 8 bytes inside of [ 13.811274] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.811784] [ 13.811911] The buggy address belongs to the physical page: [ 13.812216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.812524] flags: 0x200000000000000(node=0|zone=2) [ 13.812802] page_type: f5(slab) [ 13.812995] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.813298] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.813843] page dumped because: kasan: bad access detected [ 13.814174] [ 13.814273] Memory state around the buggy address: [ 13.814472] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.814804] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.815213] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.815496] ^ [ 13.815791] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.816148] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.816481] ================================================================== [ 13.623162] ================================================================== [ 13.623490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.623862] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.624227] [ 13.624325] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.624367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.624378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.624398] Call Trace: [ 13.624412] <TASK> [ 13.624425] dump_stack_lvl+0x73/0xb0 [ 13.624449] print_report+0xd1/0x650 [ 13.624471] ? __virt_addr_valid+0x1db/0x2d0 [ 13.624493] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.624520] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.624543] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.624571] kasan_report+0x141/0x180 [ 13.624593] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.624625] kasan_check_range+0x10c/0x1c0 [ 13.624880] __kasan_check_write+0x18/0x20 [ 13.624918] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.625178] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.625214] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.625238] ? trace_hardirqs_on+0x37/0xe0 [ 13.625259] ? kasan_bitops_generic+0x92/0x1c0 [ 13.625287] kasan_bitops_generic+0x121/0x1c0 [ 13.625311] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.625336] ? __pfx_read_tsc+0x10/0x10 [ 13.625357] ? ktime_get_ts64+0x86/0x230 [ 13.625379] kunit_try_run_case+0x1a5/0x480 [ 13.625400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.625419] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.625443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.625467] ? __kthread_parkme+0x82/0x180 [ 13.625487] ? preempt_count_sub+0x50/0x80 [ 13.625511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.625532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.625555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.625579] kthread+0x337/0x6f0 [ 13.625599] ? trace_preempt_on+0x20/0xc0 [ 13.625620] ? __pfx_kthread+0x10/0x10 [ 13.625654] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.625676] ? calculate_sigpending+0x7b/0xa0 [ 13.625700] ? __pfx_kthread+0x10/0x10 [ 13.625721] ret_from_fork+0x116/0x1d0 [ 13.625739] ? __pfx_kthread+0x10/0x10 [ 13.625759] ret_from_fork_asm+0x1a/0x30 [ 13.625788] </TASK> [ 13.625797] [ 13.634837] Allocated by task 278: [ 13.635142] kasan_save_stack+0x45/0x70 [ 13.635310] kasan_save_track+0x18/0x40 [ 13.635446] kasan_save_alloc_info+0x3b/0x50 [ 13.635594] __kasan_kmalloc+0xb7/0xc0 [ 13.635781] __kmalloc_cache_noprof+0x189/0x420 [ 13.636018] kasan_bitops_generic+0x92/0x1c0 [ 13.636338] kunit_try_run_case+0x1a5/0x480 [ 13.636595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.636850] kthread+0x337/0x6f0 [ 13.637078] ret_from_fork+0x116/0x1d0 [ 13.637221] ret_from_fork_asm+0x1a/0x30 [ 13.637361] [ 13.637431] The buggy address belongs to the object at ffff888102ae9140 [ 13.637431] which belongs to the cache kmalloc-16 of size 16 [ 13.637836] The buggy address is located 8 bytes inside of [ 13.637836] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.638379] [ 13.638473] The buggy address belongs to the physical page: [ 13.638938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.639412] flags: 0x200000000000000(node=0|zone=2) [ 13.639585] page_type: f5(slab) [ 13.639745] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.640258] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.640485] page dumped because: kasan: bad access detected [ 13.640905] [ 13.641147] Memory state around the buggy address: [ 13.641382] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.641744] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.642124] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.642369] ^ [ 13.642542] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.642831] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.643167] ================================================================== [ 13.703841] ================================================================== [ 13.704195] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.704557] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.704831] [ 13.706264] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.706313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.706326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.706346] Call Trace: [ 13.706360] <TASK> [ 13.706373] dump_stack_lvl+0x73/0xb0 [ 13.706400] print_report+0xd1/0x650 [ 13.706423] ? __virt_addr_valid+0x1db/0x2d0 [ 13.706446] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.706473] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.706496] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.706524] kasan_report+0x141/0x180 [ 13.706546] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.706578] kasan_check_range+0x10c/0x1c0 [ 13.706883] __kasan_check_write+0x18/0x20 [ 13.706916] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.707006] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.707035] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.707060] ? trace_hardirqs_on+0x37/0xe0 [ 13.707080] ? kasan_bitops_generic+0x92/0x1c0 [ 13.707108] kasan_bitops_generic+0x121/0x1c0 [ 13.707132] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.707156] ? __pfx_read_tsc+0x10/0x10 [ 13.707177] ? ktime_get_ts64+0x86/0x230 [ 13.707200] kunit_try_run_case+0x1a5/0x480 [ 13.707220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.707240] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.707265] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.707290] ? __kthread_parkme+0x82/0x180 [ 13.707310] ? preempt_count_sub+0x50/0x80 [ 13.707332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.707353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.707377] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.707401] kthread+0x337/0x6f0 [ 13.707420] ? trace_preempt_on+0x20/0xc0 [ 13.707441] ? __pfx_kthread+0x10/0x10 [ 13.707461] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.707483] ? calculate_sigpending+0x7b/0xa0 [ 13.707507] ? __pfx_kthread+0x10/0x10 [ 13.707527] ret_from_fork+0x116/0x1d0 [ 13.707545] ? __pfx_kthread+0x10/0x10 [ 13.707565] ret_from_fork_asm+0x1a/0x30 [ 13.707594] </TASK> [ 13.707604] [ 13.719051] Allocated by task 278: [ 13.719222] kasan_save_stack+0x45/0x70 [ 13.719406] kasan_save_track+0x18/0x40 [ 13.719603] kasan_save_alloc_info+0x3b/0x50 [ 13.719801] __kasan_kmalloc+0xb7/0xc0 [ 13.720594] __kmalloc_cache_noprof+0x189/0x420 [ 13.720923] kasan_bitops_generic+0x92/0x1c0 [ 13.721467] kunit_try_run_case+0x1a5/0x480 [ 13.721754] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.722168] kthread+0x337/0x6f0 [ 13.722343] ret_from_fork+0x116/0x1d0 [ 13.722661] ret_from_fork_asm+0x1a/0x30 [ 13.723005] [ 13.723099] The buggy address belongs to the object at ffff888102ae9140 [ 13.723099] which belongs to the cache kmalloc-16 of size 16 [ 13.723569] The buggy address is located 8 bytes inside of [ 13.723569] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.724157] [ 13.724254] The buggy address belongs to the physical page: [ 13.724467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.724815] flags: 0x200000000000000(node=0|zone=2) [ 13.725127] page_type: f5(slab) [ 13.725291] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.725550] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.725917] page dumped because: kasan: bad access detected [ 13.726303] [ 13.726400] Memory state around the buggy address: [ 13.726592] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.726946] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.727229] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.727507] ^ [ 13.727739] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.728006] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.728328] ================================================================== [ 13.684113] ================================================================== [ 13.684434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.684815] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.685172] [ 13.685280] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.685322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.685333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.685353] Call Trace: [ 13.685366] <TASK> [ 13.685378] dump_stack_lvl+0x73/0xb0 [ 13.685402] print_report+0xd1/0x650 [ 13.685423] ? __virt_addr_valid+0x1db/0x2d0 [ 13.685447] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.685474] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.685497] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.685525] kasan_report+0x141/0x180 [ 13.685547] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.685579] kasan_check_range+0x10c/0x1c0 [ 13.685602] __kasan_check_write+0x18/0x20 [ 13.685622] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.685650] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.685730] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.685755] ? trace_hardirqs_on+0x37/0xe0 [ 13.685777] ? kasan_bitops_generic+0x92/0x1c0 [ 13.685804] kasan_bitops_generic+0x121/0x1c0 [ 13.685828] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.685853] ? __pfx_read_tsc+0x10/0x10 [ 13.685874] ? ktime_get_ts64+0x86/0x230 [ 13.685910] kunit_try_run_case+0x1a5/0x480 [ 13.685933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.685986] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.686012] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.686036] ? __kthread_parkme+0x82/0x180 [ 13.686056] ? preempt_count_sub+0x50/0x80 [ 13.686080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.686101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.686125] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.686149] kthread+0x337/0x6f0 [ 13.686168] ? trace_preempt_on+0x20/0xc0 [ 13.686190] ? __pfx_kthread+0x10/0x10 [ 13.686209] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.686231] ? calculate_sigpending+0x7b/0xa0 [ 13.686255] ? __pfx_kthread+0x10/0x10 [ 13.686276] ret_from_fork+0x116/0x1d0 [ 13.686294] ? __pfx_kthread+0x10/0x10 [ 13.686314] ret_from_fork_asm+0x1a/0x30 [ 13.686343] </TASK> [ 13.686353] [ 13.695127] Allocated by task 278: [ 13.695259] kasan_save_stack+0x45/0x70 [ 13.695460] kasan_save_track+0x18/0x40 [ 13.695662] kasan_save_alloc_info+0x3b/0x50 [ 13.695874] __kasan_kmalloc+0xb7/0xc0 [ 13.696094] __kmalloc_cache_noprof+0x189/0x420 [ 13.696310] kasan_bitops_generic+0x92/0x1c0 [ 13.696495] kunit_try_run_case+0x1a5/0x480 [ 13.696696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.697159] kthread+0x337/0x6f0 [ 13.697326] ret_from_fork+0x116/0x1d0 [ 13.697486] ret_from_fork_asm+0x1a/0x30 [ 13.697702] [ 13.697775] The buggy address belongs to the object at ffff888102ae9140 [ 13.697775] which belongs to the cache kmalloc-16 of size 16 [ 13.698187] The buggy address is located 8 bytes inside of [ 13.698187] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.698543] [ 13.698618] The buggy address belongs to the physical page: [ 13.698916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.699558] flags: 0x200000000000000(node=0|zone=2) [ 13.699864] page_type: f5(slab) [ 13.699996] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.700229] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.700453] page dumped because: kasan: bad access detected [ 13.700624] [ 13.700787] Memory state around the buggy address: [ 13.701166] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.701492] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.702200] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.702525] ^ [ 13.702965] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.703239] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.703499] ==================================================================