Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 16.617914] ================================================================== [ 16.619251] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.620080] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.620902] [ 16.621310] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.621417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.621443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.621479] Call Trace: [ 16.621507] <TASK> [ 16.621537] dump_stack_lvl+0x73/0xb0 [ 16.621609] print_report+0xd1/0x650 [ 16.621646] ? __virt_addr_valid+0x1db/0x2d0 [ 16.621685] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.621724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.621759] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.621800] kasan_report+0x141/0x180 [ 16.621828] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.621857] kasan_check_range+0x10c/0x1c0 [ 16.621881] __kasan_check_write+0x18/0x20 [ 16.621900] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 16.621924] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.621950] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.621970] ? kasan_bitops_generic+0x92/0x1c0 [ 16.621995] kasan_bitops_generic+0x121/0x1c0 [ 16.622018] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.622040] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.622066] kunit_try_run_case+0x1a5/0x480 [ 16.622091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.622111] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.622134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.622155] ? __kthread_parkme+0x82/0x180 [ 16.622175] ? preempt_count_sub+0x50/0x80 [ 16.622199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.622239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.622266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.622288] kthread+0x337/0x6f0 [ 16.622307] ? trace_preempt_on+0x20/0xc0 [ 16.622331] ? __pfx_kthread+0x10/0x10 [ 16.622366] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.622389] ? calculate_sigpending+0x7b/0xa0 [ 16.622414] ? __pfx_kthread+0x10/0x10 [ 16.622436] ret_from_fork+0x116/0x1d0 [ 16.622473] ? __pfx_kthread+0x10/0x10 [ 16.622510] ret_from_fork_asm+0x1a/0x30 [ 16.622562] </TASK> [ 16.622583] [ 16.634655] Allocated by task 279: [ 16.634960] kasan_save_stack+0x45/0x70 [ 16.635214] kasan_save_track+0x18/0x40 [ 16.635920] kasan_save_alloc_info+0x3b/0x50 [ 16.636206] __kasan_kmalloc+0xb7/0xc0 [ 16.636646] __kmalloc_cache_noprof+0x189/0x420 [ 16.637009] kasan_bitops_generic+0x92/0x1c0 [ 16.637313] kunit_try_run_case+0x1a5/0x480 [ 16.638061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.638406] kthread+0x337/0x6f0 [ 16.638885] ret_from_fork+0x116/0x1d0 [ 16.639150] ret_from_fork_asm+0x1a/0x30 [ 16.639716] [ 16.639900] The buggy address belongs to the object at ffff8881022a34c0 [ 16.639900] which belongs to the cache kmalloc-16 of size 16 [ 16.640578] The buggy address is located 8 bytes inside of [ 16.640578] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.641399] [ 16.641977] The buggy address belongs to the physical page: [ 16.642390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.642963] flags: 0x200000000000000(node=0|zone=2) [ 16.643342] page_type: f5(slab) [ 16.643824] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.644266] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.644903] page dumped because: kasan: bad access detected [ 16.645159] [ 16.645324] Memory state around the buggy address: [ 16.646002] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.646609] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.646928] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.647420] ^ [ 16.648039] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.648391] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.648973] ================================================================== [ 16.720704] ================================================================== [ 16.721379] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.722140] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.722642] [ 16.722771] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.722839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.722853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.722875] Call Trace: [ 16.722889] <TASK> [ 16.722909] dump_stack_lvl+0x73/0xb0 [ 16.722941] print_report+0xd1/0x650 [ 16.722983] ? __virt_addr_valid+0x1db/0x2d0 [ 16.723008] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.723034] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.723055] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.723080] kasan_report+0x141/0x180 [ 16.723101] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.723149] kasan_check_range+0x10c/0x1c0 [ 16.723172] __kasan_check_write+0x18/0x20 [ 16.723191] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.723216] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.723253] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.723275] ? kasan_bitops_generic+0x92/0x1c0 [ 16.723300] kasan_bitops_generic+0x121/0x1c0 [ 16.723323] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.723345] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.723371] kunit_try_run_case+0x1a5/0x480 [ 16.723410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.723434] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.723565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.723592] ? __kthread_parkme+0x82/0x180 [ 16.723614] ? preempt_count_sub+0x50/0x80 [ 16.723638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.723661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.723684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.723706] kthread+0x337/0x6f0 [ 16.723725] ? trace_preempt_on+0x20/0xc0 [ 16.723748] ? __pfx_kthread+0x10/0x10 [ 16.723769] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.723808] ? calculate_sigpending+0x7b/0xa0 [ 16.723832] ? __pfx_kthread+0x10/0x10 [ 16.723854] ret_from_fork+0x116/0x1d0 [ 16.723873] ? __pfx_kthread+0x10/0x10 [ 16.723892] ret_from_fork_asm+0x1a/0x30 [ 16.723922] </TASK> [ 16.723950] [ 16.731089] Allocated by task 279: [ 16.731194] kasan_save_stack+0x45/0x70 [ 16.731317] kasan_save_track+0x18/0x40 [ 16.731642] kasan_save_alloc_info+0x3b/0x50 [ 16.731759] __kasan_kmalloc+0xb7/0xc0 [ 16.731967] __kmalloc_cache_noprof+0x189/0x420 [ 16.732158] kasan_bitops_generic+0x92/0x1c0 [ 16.732263] kunit_try_run_case+0x1a5/0x480 [ 16.732357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.732768] kthread+0x337/0x6f0 [ 16.732944] ret_from_fork+0x116/0x1d0 [ 16.733120] ret_from_fork_asm+0x1a/0x30 [ 16.733331] [ 16.733575] The buggy address belongs to the object at ffff8881022a34c0 [ 16.733575] which belongs to the cache kmalloc-16 of size 16 [ 16.733960] The buggy address is located 8 bytes inside of [ 16.733960] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.734154] [ 16.734210] The buggy address belongs to the physical page: [ 16.734410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.734919] flags: 0x200000000000000(node=0|zone=2) [ 16.735238] page_type: f5(slab) [ 16.735367] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.735603] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.735934] page dumped because: kasan: bad access detected [ 16.736276] [ 16.736400] Memory state around the buggy address: [ 16.736803] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.737088] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.737216] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.737354] ^ [ 16.737622] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.737999] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.738311] ================================================================== [ 16.757005] ================================================================== [ 16.757405] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.758062] Read of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.758198] [ 16.758285] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.758364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.758378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.758402] Call Trace: [ 16.758423] <TASK> [ 16.758444] dump_stack_lvl+0x73/0xb0 [ 16.758475] print_report+0xd1/0x650 [ 16.758500] ? __virt_addr_valid+0x1db/0x2d0 [ 16.758786] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.758818] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.758841] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.758869] kasan_report+0x141/0x180 [ 16.758897] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.758929] kasan_check_range+0x10c/0x1c0 [ 16.758953] __kasan_check_read+0x15/0x20 [ 16.758974] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.759001] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.759029] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.759052] ? kasan_bitops_generic+0x92/0x1c0 [ 16.759079] kasan_bitops_generic+0x121/0x1c0 [ 16.759103] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.759127] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.759179] kunit_try_run_case+0x1a5/0x480 [ 16.759211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.759261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.759290] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.759314] ? __kthread_parkme+0x82/0x180 [ 16.759345] ? preempt_count_sub+0x50/0x80 [ 16.759370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.759396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.759418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.759439] kthread+0x337/0x6f0 [ 16.759459] ? trace_preempt_on+0x20/0xc0 [ 16.759483] ? __pfx_kthread+0x10/0x10 [ 16.759503] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.759639] ? calculate_sigpending+0x7b/0xa0 [ 16.759665] ? __pfx_kthread+0x10/0x10 [ 16.759688] ret_from_fork+0x116/0x1d0 [ 16.759707] ? __pfx_kthread+0x10/0x10 [ 16.759728] ret_from_fork_asm+0x1a/0x30 [ 16.759760] </TASK> [ 16.759772] [ 16.767214] Allocated by task 279: [ 16.767486] kasan_save_stack+0x45/0x70 [ 16.767752] kasan_save_track+0x18/0x40 [ 16.768251] kasan_save_alloc_info+0x3b/0x50 [ 16.768365] __kasan_kmalloc+0xb7/0xc0 [ 16.768456] __kmalloc_cache_noprof+0x189/0x420 [ 16.768751] kasan_bitops_generic+0x92/0x1c0 [ 16.769040] kunit_try_run_case+0x1a5/0x480 [ 16.769317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.769731] kthread+0x337/0x6f0 [ 16.769898] ret_from_fork+0x116/0x1d0 [ 16.770008] ret_from_fork_asm+0x1a/0x30 [ 16.770101] [ 16.770154] The buggy address belongs to the object at ffff8881022a34c0 [ 16.770154] which belongs to the cache kmalloc-16 of size 16 [ 16.770989] The buggy address is located 8 bytes inside of [ 16.770989] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.771193] [ 16.771260] The buggy address belongs to the physical page: [ 16.771631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.772100] flags: 0x200000000000000(node=0|zone=2) [ 16.772217] page_type: f5(slab) [ 16.772320] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.772617] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.773055] page dumped because: kasan: bad access detected [ 16.773415] [ 16.773585] Memory state around the buggy address: [ 16.773768] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.773897] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.774023] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.774303] ^ [ 16.774652] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.775186] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.775325] ================================================================== [ 16.681207] ================================================================== [ 16.681656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.682254] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.682765] [ 16.683023] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.683107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.683122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.683143] Call Trace: [ 16.683168] <TASK> [ 16.683191] dump_stack_lvl+0x73/0xb0 [ 16.683240] print_report+0xd1/0x650 [ 16.683269] ? __virt_addr_valid+0x1db/0x2d0 [ 16.683294] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.683320] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.683341] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.683366] kasan_report+0x141/0x180 [ 16.683388] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.683418] kasan_check_range+0x10c/0x1c0 [ 16.683440] __kasan_check_write+0x18/0x20 [ 16.683473] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 16.683574] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.683643] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.683668] ? kasan_bitops_generic+0x92/0x1c0 [ 16.683695] kasan_bitops_generic+0x121/0x1c0 [ 16.683718] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.683741] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.683768] kunit_try_run_case+0x1a5/0x480 [ 16.683797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.683818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.683843] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.683865] ? __kthread_parkme+0x82/0x180 [ 16.683886] ? preempt_count_sub+0x50/0x80 [ 16.683909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.683931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.683952] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.683974] kthread+0x337/0x6f0 [ 16.683992] ? trace_preempt_on+0x20/0xc0 [ 16.684016] ? __pfx_kthread+0x10/0x10 [ 16.684036] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.684056] ? calculate_sigpending+0x7b/0xa0 [ 16.684079] ? __pfx_kthread+0x10/0x10 [ 16.684100] ret_from_fork+0x116/0x1d0 [ 16.684118] ? __pfx_kthread+0x10/0x10 [ 16.684138] ret_from_fork_asm+0x1a/0x30 [ 16.684170] </TASK> [ 16.684182] [ 16.693963] Allocated by task 279: [ 16.694281] kasan_save_stack+0x45/0x70 [ 16.694576] kasan_save_track+0x18/0x40 [ 16.694876] kasan_save_alloc_info+0x3b/0x50 [ 16.695107] __kasan_kmalloc+0xb7/0xc0 [ 16.695379] __kmalloc_cache_noprof+0x189/0x420 [ 16.695714] kasan_bitops_generic+0x92/0x1c0 [ 16.695988] kunit_try_run_case+0x1a5/0x480 [ 16.696251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.696682] kthread+0x337/0x6f0 [ 16.696861] ret_from_fork+0x116/0x1d0 [ 16.696966] ret_from_fork_asm+0x1a/0x30 [ 16.697293] [ 16.697408] The buggy address belongs to the object at ffff8881022a34c0 [ 16.697408] which belongs to the cache kmalloc-16 of size 16 [ 16.698112] The buggy address is located 8 bytes inside of [ 16.698112] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.699019] [ 16.699127] The buggy address belongs to the physical page: [ 16.699413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.699853] flags: 0x200000000000000(node=0|zone=2) [ 16.700692] page_type: f5(slab) [ 16.700830] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.700982] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.701113] page dumped because: kasan: bad access detected [ 16.701214] [ 16.701279] Memory state around the buggy address: [ 16.701536] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.701737] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.701861] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.702162] ^ [ 16.702424] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.702674] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.703029] ================================================================== [ 16.776045] ================================================================== [ 16.776197] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.776700] Read of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.777027] [ 16.777460] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.777533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.777547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.777570] Call Trace: [ 16.777593] <TASK> [ 16.777712] dump_stack_lvl+0x73/0xb0 [ 16.777745] print_report+0xd1/0x650 [ 16.777787] ? __virt_addr_valid+0x1db/0x2d0 [ 16.777814] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.777840] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.777862] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.777887] kasan_report+0x141/0x180 [ 16.777925] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.777960] __asan_report_load8_noabort+0x18/0x20 [ 16.777981] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.778007] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.778034] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.778074] ? kasan_bitops_generic+0x92/0x1c0 [ 16.778102] kasan_bitops_generic+0x121/0x1c0 [ 16.778125] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.778148] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.778176] kunit_try_run_case+0x1a5/0x480 [ 16.778201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.778241] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.778268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.778290] ? __kthread_parkme+0x82/0x180 [ 16.778311] ? preempt_count_sub+0x50/0x80 [ 16.778342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.778368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.778391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.778415] kthread+0x337/0x6f0 [ 16.778434] ? trace_preempt_on+0x20/0xc0 [ 16.778483] ? __pfx_kthread+0x10/0x10 [ 16.778504] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.778526] ? calculate_sigpending+0x7b/0xa0 [ 16.778620] ? __pfx_kthread+0x10/0x10 [ 16.778662] ret_from_fork+0x116/0x1d0 [ 16.778685] ? __pfx_kthread+0x10/0x10 [ 16.778705] ret_from_fork_asm+0x1a/0x30 [ 16.778736] </TASK> [ 16.778748] [ 16.785198] Allocated by task 279: [ 16.785309] kasan_save_stack+0x45/0x70 [ 16.785804] kasan_save_track+0x18/0x40 [ 16.786144] kasan_save_alloc_info+0x3b/0x50 [ 16.786427] __kasan_kmalloc+0xb7/0xc0 [ 16.786671] __kmalloc_cache_noprof+0x189/0x420 [ 16.786772] kasan_bitops_generic+0x92/0x1c0 [ 16.786870] kunit_try_run_case+0x1a5/0x480 [ 16.787102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.787570] kthread+0x337/0x6f0 [ 16.787805] ret_from_fork+0x116/0x1d0 [ 16.787968] ret_from_fork_asm+0x1a/0x30 [ 16.788061] [ 16.788115] The buggy address belongs to the object at ffff8881022a34c0 [ 16.788115] which belongs to the cache kmalloc-16 of size 16 [ 16.788752] The buggy address is located 8 bytes inside of [ 16.788752] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.788950] [ 16.789005] The buggy address belongs to the physical page: [ 16.789108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.789259] flags: 0x200000000000000(node=0|zone=2) [ 16.789579] page_type: f5(slab) [ 16.789799] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.790239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.790700] page dumped because: kasan: bad access detected [ 16.790859] [ 16.790912] Memory state around the buggy address: [ 16.791008] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.791134] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.791697] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.792156] ^ [ 16.792572] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.792856] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.793095] ================================================================== [ 16.650175] ================================================================== [ 16.650919] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.651419] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.652060] [ 16.652324] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.652424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.652449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.652700] Call Trace: [ 16.652744] <TASK> [ 16.652808] dump_stack_lvl+0x73/0xb0 [ 16.652888] print_report+0xd1/0x650 [ 16.652929] ? __virt_addr_valid+0x1db/0x2d0 [ 16.652963] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.653003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.653034] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.653060] kasan_report+0x141/0x180 [ 16.653082] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.653113] kasan_check_range+0x10c/0x1c0 [ 16.653135] __kasan_check_write+0x18/0x20 [ 16.653155] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 16.653181] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.653206] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.653248] ? kasan_bitops_generic+0x92/0x1c0 [ 16.653278] kasan_bitops_generic+0x121/0x1c0 [ 16.653301] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.653324] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.653352] kunit_try_run_case+0x1a5/0x480 [ 16.653377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.653399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.653423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.653444] ? __kthread_parkme+0x82/0x180 [ 16.653517] ? preempt_count_sub+0x50/0x80 [ 16.653563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.653599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.653637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.653673] kthread+0x337/0x6f0 [ 16.653704] ? trace_preempt_on+0x20/0xc0 [ 16.653745] ? __pfx_kthread+0x10/0x10 [ 16.653779] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.653831] ? calculate_sigpending+0x7b/0xa0 [ 16.653857] ? __pfx_kthread+0x10/0x10 [ 16.653878] ret_from_fork+0x116/0x1d0 [ 16.653898] ? __pfx_kthread+0x10/0x10 [ 16.653918] ret_from_fork_asm+0x1a/0x30 [ 16.653950] </TASK> [ 16.653963] [ 16.667248] Allocated by task 279: [ 16.667823] kasan_save_stack+0x45/0x70 [ 16.668158] kasan_save_track+0x18/0x40 [ 16.668653] kasan_save_alloc_info+0x3b/0x50 [ 16.669029] __kasan_kmalloc+0xb7/0xc0 [ 16.669255] __kmalloc_cache_noprof+0x189/0x420 [ 16.669923] kasan_bitops_generic+0x92/0x1c0 [ 16.670288] kunit_try_run_case+0x1a5/0x480 [ 16.670835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.671239] kthread+0x337/0x6f0 [ 16.671688] ret_from_fork+0x116/0x1d0 [ 16.671857] ret_from_fork_asm+0x1a/0x30 [ 16.672169] [ 16.672338] The buggy address belongs to the object at ffff8881022a34c0 [ 16.672338] which belongs to the cache kmalloc-16 of size 16 [ 16.673017] The buggy address is located 8 bytes inside of [ 16.673017] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.673538] [ 16.673732] The buggy address belongs to the physical page: [ 16.674743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.675105] flags: 0x200000000000000(node=0|zone=2) [ 16.675736] page_type: f5(slab) [ 16.675975] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.676373] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.676876] page dumped because: kasan: bad access detected [ 16.677287] [ 16.677418] Memory state around the buggy address: [ 16.678033] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.678306] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.678754] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.679026] ^ [ 16.679986] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.680266] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.680489] ================================================================== [ 16.738956] ================================================================== [ 16.739262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.739627] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.739946] [ 16.740098] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.740151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.740164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.740185] Call Trace: [ 16.740207] <TASK> [ 16.740237] dump_stack_lvl+0x73/0xb0 [ 16.740269] print_report+0xd1/0x650 [ 16.740294] ? __virt_addr_valid+0x1db/0x2d0 [ 16.740318] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.740366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.740391] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.740417] kasan_report+0x141/0x180 [ 16.740438] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.740467] kasan_check_range+0x10c/0x1c0 [ 16.740489] __kasan_check_write+0x18/0x20 [ 16.740508] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.740533] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.740559] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.740579] ? kasan_bitops_generic+0x92/0x1c0 [ 16.740605] kasan_bitops_generic+0x121/0x1c0 [ 16.740628] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.740650] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.740677] kunit_try_run_case+0x1a5/0x480 [ 16.740702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.740725] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.740747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.741022] ? __kthread_parkme+0x82/0x180 [ 16.741055] ? preempt_count_sub+0x50/0x80 [ 16.741081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.741105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.741128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.741149] kthread+0x337/0x6f0 [ 16.741167] ? trace_preempt_on+0x20/0xc0 [ 16.741193] ? __pfx_kthread+0x10/0x10 [ 16.741259] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.741281] ? calculate_sigpending+0x7b/0xa0 [ 16.741305] ? __pfx_kthread+0x10/0x10 [ 16.741326] ret_from_fork+0x116/0x1d0 [ 16.741344] ? __pfx_kthread+0x10/0x10 [ 16.741363] ret_from_fork_asm+0x1a/0x30 [ 16.741395] </TASK> [ 16.741408] [ 16.748891] Allocated by task 279: [ 16.749008] kasan_save_stack+0x45/0x70 [ 16.749294] kasan_save_track+0x18/0x40 [ 16.749548] kasan_save_alloc_info+0x3b/0x50 [ 16.749646] __kasan_kmalloc+0xb7/0xc0 [ 16.749732] __kmalloc_cache_noprof+0x189/0x420 [ 16.749852] kasan_bitops_generic+0x92/0x1c0 [ 16.750112] kunit_try_run_case+0x1a5/0x480 [ 16.750528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.750819] kthread+0x337/0x6f0 [ 16.750908] ret_from_fork+0x116/0x1d0 [ 16.751131] ret_from_fork_asm+0x1a/0x30 [ 16.751499] [ 16.751555] The buggy address belongs to the object at ffff8881022a34c0 [ 16.751555] which belongs to the cache kmalloc-16 of size 16 [ 16.751957] The buggy address is located 8 bytes inside of [ 16.751957] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.752155] [ 16.752209] The buggy address belongs to the physical page: [ 16.752324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.752809] flags: 0x200000000000000(node=0|zone=2) [ 16.753156] page_type: f5(slab) [ 16.753395] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.753591] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.753720] page dumped because: kasan: bad access detected [ 16.753818] [ 16.753866] Memory state around the buggy address: [ 16.753994] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.754846] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.755292] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.755684] ^ [ 16.755911] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.756210] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.756429] ================================================================== [ 16.703445] ================================================================== [ 16.703857] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.704296] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.704616] [ 16.704740] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.704792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.704804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.704878] Call Trace: [ 16.704901] <TASK> [ 16.704923] dump_stack_lvl+0x73/0xb0 [ 16.704951] print_report+0xd1/0x650 [ 16.704975] ? __virt_addr_valid+0x1db/0x2d0 [ 16.704997] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.705022] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.705044] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.705069] kasan_report+0x141/0x180 [ 16.705091] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.705121] kasan_check_range+0x10c/0x1c0 [ 16.705144] __kasan_check_write+0x18/0x20 [ 16.705164] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 16.705190] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.705216] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.705250] ? kasan_bitops_generic+0x92/0x1c0 [ 16.705277] kasan_bitops_generic+0x121/0x1c0 [ 16.705300] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.705323] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.705351] kunit_try_run_case+0x1a5/0x480 [ 16.705377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.705399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.705422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.705443] ? __kthread_parkme+0x82/0x180 [ 16.705464] ? preempt_count_sub+0x50/0x80 [ 16.705498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.705523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.705546] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.705585] kthread+0x337/0x6f0 [ 16.705604] ? trace_preempt_on+0x20/0xc0 [ 16.705658] ? __pfx_kthread+0x10/0x10 [ 16.705679] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.705701] ? calculate_sigpending+0x7b/0xa0 [ 16.705724] ? __pfx_kthread+0x10/0x10 [ 16.705745] ret_from_fork+0x116/0x1d0 [ 16.705764] ? __pfx_kthread+0x10/0x10 [ 16.705785] ret_from_fork_asm+0x1a/0x30 [ 16.705816] </TASK> [ 16.705828] [ 16.712726] Allocated by task 279: [ 16.712929] kasan_save_stack+0x45/0x70 [ 16.713129] kasan_save_track+0x18/0x40 [ 16.713299] kasan_save_alloc_info+0x3b/0x50 [ 16.713395] __kasan_kmalloc+0xb7/0xc0 [ 16.713547] __kmalloc_cache_noprof+0x189/0x420 [ 16.713708] kasan_bitops_generic+0x92/0x1c0 [ 16.713953] kunit_try_run_case+0x1a5/0x480 [ 16.714181] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.714748] kthread+0x337/0x6f0 [ 16.714978] ret_from_fork+0x116/0x1d0 [ 16.715174] ret_from_fork_asm+0x1a/0x30 [ 16.715279] [ 16.715334] The buggy address belongs to the object at ffff8881022a34c0 [ 16.715334] which belongs to the cache kmalloc-16 of size 16 [ 16.715953] The buggy address is located 8 bytes inside of [ 16.715953] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.716147] [ 16.716200] The buggy address belongs to the physical page: [ 16.716313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.716540] flags: 0x200000000000000(node=0|zone=2) [ 16.716766] page_type: f5(slab) [ 16.716971] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.717279] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.717702] page dumped because: kasan: bad access detected [ 16.718011] [ 16.718144] Memory state around the buggy address: [ 16.718393] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.718892] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.719174] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.719386] ^ [ 16.719668] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.719925] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.720107] ================================================================== [ 16.585357] ================================================================== [ 16.586180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.586648] Write of size 8 at addr ffff8881022a34c8 by task kunit_try_catch/279 [ 16.586895] [ 16.587039] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) [ 16.587759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.587785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.587836] Call Trace: [ 16.587878] <TASK> [ 16.587915] dump_stack_lvl+0x73/0xb0 [ 16.587973] print_report+0xd1/0x650 [ 16.588020] ? __virt_addr_valid+0x1db/0x2d0 [ 16.588065] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.588124] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.588186] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.588243] kasan_report+0x141/0x180 [ 16.588272] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.588303] kasan_check_range+0x10c/0x1c0 [ 16.588326] __kasan_check_write+0x18/0x20 [ 16.588345] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 16.588383] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.588430] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.588468] ? kasan_bitops_generic+0x92/0x1c0 [ 16.588513] kasan_bitops_generic+0x121/0x1c0 [ 16.588652] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.588694] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.588747] kunit_try_run_case+0x1a5/0x480 [ 16.588796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.588830] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.589045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.589085] ? __kthread_parkme+0x82/0x180 [ 16.589125] ? preempt_count_sub+0x50/0x80 [ 16.589151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.589175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.589199] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.589243] kthread+0x337/0x6f0 [ 16.589268] ? trace_preempt_on+0x20/0xc0 [ 16.589293] ? __pfx_kthread+0x10/0x10 [ 16.589314] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.589334] ? calculate_sigpending+0x7b/0xa0 [ 16.589360] ? __pfx_kthread+0x10/0x10 [ 16.589380] ret_from_fork+0x116/0x1d0 [ 16.589399] ? __pfx_kthread+0x10/0x10 [ 16.589419] ret_from_fork_asm+0x1a/0x30 [ 16.589448] </TASK> [ 16.589478] [ 16.603944] Allocated by task 279: [ 16.604455] kasan_save_stack+0x45/0x70 [ 16.605281] kasan_save_track+0x18/0x40 [ 16.605496] kasan_save_alloc_info+0x3b/0x50 [ 16.605966] __kasan_kmalloc+0xb7/0xc0 [ 16.606430] __kmalloc_cache_noprof+0x189/0x420 [ 16.606734] kasan_bitops_generic+0x92/0x1c0 [ 16.607055] kunit_try_run_case+0x1a5/0x480 [ 16.607251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.607442] kthread+0x337/0x6f0 [ 16.607746] ret_from_fork+0x116/0x1d0 [ 16.608042] ret_from_fork_asm+0x1a/0x30 [ 16.608349] [ 16.608520] The buggy address belongs to the object at ffff8881022a34c0 [ 16.608520] which belongs to the cache kmalloc-16 of size 16 [ 16.609231] The buggy address is located 8 bytes inside of [ 16.609231] allocated 9-byte region [ffff8881022a34c0, ffff8881022a34c9) [ 16.609604] [ 16.609792] The buggy address belongs to the physical page: [ 16.610234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022a3 [ 16.611006] flags: 0x200000000000000(node=0|zone=2) [ 16.611383] page_type: f5(slab) [ 16.611695] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.611961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.612463] page dumped because: kasan: bad access detected [ 16.612860] [ 16.613047] Memory state around the buggy address: [ 16.613517] ffff8881022a3380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 16.613714] ffff8881022a3400: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 16.614265] >ffff8881022a3480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.614556] ^ [ 16.614766] ffff8881022a3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.615265] ffff8881022a3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.615922] ==================================================================