Date
June 17, 2025, 6:35 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 21.683947] ================================================================== [ 21.685261] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.685930] Read of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.686480] [ 21.686731] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.686874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.686913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.686972] Call Trace: [ 21.687020] <TASK> [ 21.687098] dump_stack_lvl+0x73/0xb0 [ 21.687184] print_report+0xd1/0x650 [ 21.687259] ? __virt_addr_valid+0x1db/0x2d0 [ 21.687334] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.687413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.687482] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.687574] kasan_report+0x141/0x180 [ 21.687649] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.687718] __asan_report_load8_noabort+0x18/0x20 [ 21.687758] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 21.687801] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.687868] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.687907] ? trace_hardirqs_on+0x37/0xe0 [ 21.687939] ? kasan_bitops_generic+0x92/0x1c0 [ 21.687978] kasan_bitops_generic+0x121/0x1c0 [ 21.688012] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.688048] ? __pfx_read_tsc+0x10/0x10 [ 21.688079] ? ktime_get_ts64+0x86/0x230 [ 21.688116] kunit_try_run_case+0x1a5/0x480 [ 21.688152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.688185] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.688223] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.688282] ? __kthread_parkme+0x82/0x180 [ 21.688311] ? preempt_count_sub+0x50/0x80 [ 21.688345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.688381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.688414] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.688447] kthread+0x337/0x6f0 [ 21.688476] ? trace_preempt_on+0x20/0xc0 [ 21.688507] ? __pfx_kthread+0x10/0x10 [ 21.688536] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.688569] ? calculate_sigpending+0x7b/0xa0 [ 21.688604] ? __pfx_kthread+0x10/0x10 [ 21.688634] ret_from_fork+0x116/0x1d0 [ 21.688660] ? __pfx_kthread+0x10/0x10 [ 21.688687] ret_from_fork_asm+0x1a/0x30 [ 21.688730] </TASK> [ 21.688744] [ 21.704595] Allocated by task 288: [ 21.705055] kasan_save_stack+0x45/0x70 [ 21.705565] kasan_save_track+0x18/0x40 [ 21.706059] kasan_save_alloc_info+0x3b/0x50 [ 21.706531] __kasan_kmalloc+0xb7/0xc0 [ 21.707010] __kmalloc_cache_noprof+0x189/0x420 [ 21.707567] kasan_bitops_generic+0x92/0x1c0 [ 21.708092] kunit_try_run_case+0x1a5/0x480 [ 21.708503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.709117] kthread+0x337/0x6f0 [ 21.709505] ret_from_fork+0x116/0x1d0 [ 21.709918] ret_from_fork_asm+0x1a/0x30 [ 21.710344] [ 21.710504] The buggy address belongs to the object at ffff888102264580 [ 21.710504] which belongs to the cache kmalloc-16 of size 16 [ 21.711547] The buggy address is located 8 bytes inside of [ 21.711547] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.712614] [ 21.712827] The buggy address belongs to the physical page: [ 21.713398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.714040] flags: 0x200000000000000(node=0|zone=2) [ 21.714401] page_type: f5(slab) [ 21.714653] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.715377] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.716085] page dumped because: kasan: bad access detected [ 21.716682] [ 21.716932] Memory state around the buggy address: [ 21.717497] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.718166] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.719022] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.719727] ^ [ 21.720178] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.721164] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.721786] ================================================================== [ 21.512496] ================================================================== [ 21.512923] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.513866] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.514764] [ 21.515122] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.515277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.515321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.515399] Call Trace: [ 21.515453] <TASK> [ 21.515523] dump_stack_lvl+0x73/0xb0 [ 21.515623] print_report+0xd1/0x650 [ 21.515696] ? __virt_addr_valid+0x1db/0x2d0 [ 21.515772] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.515873] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.515992] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.516099] kasan_report+0x141/0x180 [ 21.516203] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.516343] kasan_check_range+0x10c/0x1c0 [ 21.516423] __kasan_check_write+0x18/0x20 [ 21.516514] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 21.516629] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.516702] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.516740] ? trace_hardirqs_on+0x37/0xe0 [ 21.516770] ? kasan_bitops_generic+0x92/0x1c0 [ 21.516812] kasan_bitops_generic+0x121/0x1c0 [ 21.516905] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.516983] ? __pfx_read_tsc+0x10/0x10 [ 21.517075] ? ktime_get_ts64+0x86/0x230 [ 21.517184] kunit_try_run_case+0x1a5/0x480 [ 21.517328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.517430] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.517503] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.517574] ? __kthread_parkme+0x82/0x180 [ 21.517605] ? preempt_count_sub+0x50/0x80 [ 21.517640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.517676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.517709] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.517742] kthread+0x337/0x6f0 [ 21.517768] ? trace_preempt_on+0x20/0xc0 [ 21.517800] ? __pfx_kthread+0x10/0x10 [ 21.517853] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.517901] ? calculate_sigpending+0x7b/0xa0 [ 21.517940] ? __pfx_kthread+0x10/0x10 [ 21.517974] ret_from_fork+0x116/0x1d0 [ 21.518003] ? __pfx_kthread+0x10/0x10 [ 21.518034] ret_from_fork_asm+0x1a/0x30 [ 21.518078] </TASK> [ 21.518092] [ 21.537928] Allocated by task 288: [ 21.539278] kasan_save_stack+0x45/0x70 [ 21.539592] kasan_save_track+0x18/0x40 [ 21.539997] kasan_save_alloc_info+0x3b/0x50 [ 21.540638] __kasan_kmalloc+0xb7/0xc0 [ 21.541018] __kmalloc_cache_noprof+0x189/0x420 [ 21.541437] kasan_bitops_generic+0x92/0x1c0 [ 21.541855] kunit_try_run_case+0x1a5/0x480 [ 21.542220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.542655] kthread+0x337/0x6f0 [ 21.543180] ret_from_fork+0x116/0x1d0 [ 21.543479] ret_from_fork_asm+0x1a/0x30 [ 21.543859] [ 21.544032] The buggy address belongs to the object at ffff888102264580 [ 21.544032] which belongs to the cache kmalloc-16 of size 16 [ 21.545176] The buggy address is located 8 bytes inside of [ 21.545176] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.546261] [ 21.546423] The buggy address belongs to the physical page: [ 21.546999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.547917] flags: 0x200000000000000(node=0|zone=2) [ 21.548387] page_type: f5(slab) [ 21.548765] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.549601] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.550189] page dumped because: kasan: bad access detected [ 21.550752] [ 21.551033] Memory state around the buggy address: [ 21.551501] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.552050] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.552865] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.553482] ^ [ 21.553959] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.554502] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.555045] ================================================================== [ 21.599916] ================================================================== [ 21.600449] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.602157] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.603457] [ 21.603637] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.603707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.603726] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.603756] Call Trace: [ 21.603779] <TASK> [ 21.603799] dump_stack_lvl+0x73/0xb0 [ 21.603871] print_report+0xd1/0x650 [ 21.603950] ? __virt_addr_valid+0x1db/0x2d0 [ 21.604062] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.604153] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.604227] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.604318] kasan_report+0x141/0x180 [ 21.604392] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.604630] kasan_check_range+0x10c/0x1c0 [ 21.604702] __kasan_check_write+0x18/0x20 [ 21.604734] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 21.604775] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.604816] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.604879] ? trace_hardirqs_on+0x37/0xe0 [ 21.604913] ? kasan_bitops_generic+0x92/0x1c0 [ 21.604951] kasan_bitops_generic+0x121/0x1c0 [ 21.604984] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.605020] ? __pfx_read_tsc+0x10/0x10 [ 21.605050] ? ktime_get_ts64+0x86/0x230 [ 21.605084] kunit_try_run_case+0x1a5/0x480 [ 21.605119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.605152] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.605179] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.605241] ? __kthread_parkme+0x82/0x180 [ 21.605289] ? preempt_count_sub+0x50/0x80 [ 21.605326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.605360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.605393] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.605425] kthread+0x337/0x6f0 [ 21.605454] ? trace_preempt_on+0x20/0xc0 [ 21.605485] ? __pfx_kthread+0x10/0x10 [ 21.605514] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.605549] ? calculate_sigpending+0x7b/0xa0 [ 21.605583] ? __pfx_kthread+0x10/0x10 [ 21.605612] ret_from_fork+0x116/0x1d0 [ 21.605638] ? __pfx_kthread+0x10/0x10 [ 21.605665] ret_from_fork_asm+0x1a/0x30 [ 21.605704] </TASK> [ 21.605718] [ 21.622638] Allocated by task 288: [ 21.623006] kasan_save_stack+0x45/0x70 [ 21.623441] kasan_save_track+0x18/0x40 [ 21.623903] kasan_save_alloc_info+0x3b/0x50 [ 21.624302] __kasan_kmalloc+0xb7/0xc0 [ 21.624580] __kmalloc_cache_noprof+0x189/0x420 [ 21.624958] kasan_bitops_generic+0x92/0x1c0 [ 21.625493] kunit_try_run_case+0x1a5/0x480 [ 21.625988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.626547] kthread+0x337/0x6f0 [ 21.626942] ret_from_fork+0x116/0x1d0 [ 21.627409] ret_from_fork_asm+0x1a/0x30 [ 21.627810] [ 21.628070] The buggy address belongs to the object at ffff888102264580 [ 21.628070] which belongs to the cache kmalloc-16 of size 16 [ 21.629021] The buggy address is located 8 bytes inside of [ 21.629021] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.629723] [ 21.629982] The buggy address belongs to the physical page: [ 21.630527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.631324] flags: 0x200000000000000(node=0|zone=2) [ 21.631766] page_type: f5(slab) [ 21.632161] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.632730] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.633391] page dumped because: kasan: bad access detected [ 21.633917] [ 21.634125] Memory state around the buggy address: [ 21.634600] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.635038] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.635696] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.637120] ^ [ 21.638911] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.639819] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.640641] ================================================================== [ 21.340012] ================================================================== [ 21.341801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.343607] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.344134] [ 21.344332] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.344458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.344496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.344553] Call Trace: [ 21.344601] <TASK> [ 21.344650] dump_stack_lvl+0x73/0xb0 [ 21.344726] print_report+0xd1/0x650 [ 21.344798] ? __virt_addr_valid+0x1db/0x2d0 [ 21.344895] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.344974] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.345045] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.345126] kasan_report+0x141/0x180 [ 21.345197] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.345580] kasan_check_range+0x10c/0x1c0 [ 21.345791] __kasan_check_write+0x18/0x20 [ 21.345887] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.345976] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.346060] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.346140] ? trace_hardirqs_on+0x37/0xe0 [ 21.346213] ? kasan_bitops_generic+0x92/0x1c0 [ 21.346302] kasan_bitops_generic+0x121/0x1c0 [ 21.346386] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.346453] ? __pfx_read_tsc+0x10/0x10 [ 21.346488] ? ktime_get_ts64+0x86/0x230 [ 21.346525] kunit_try_run_case+0x1a5/0x480 [ 21.346560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.346594] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.346623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.346661] ? __kthread_parkme+0x82/0x180 [ 21.346690] ? preempt_count_sub+0x50/0x80 [ 21.346723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.346758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.346792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.346825] kthread+0x337/0x6f0 [ 21.346884] ? trace_preempt_on+0x20/0xc0 [ 21.346919] ? __pfx_kthread+0x10/0x10 [ 21.346949] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.346983] ? calculate_sigpending+0x7b/0xa0 [ 21.347018] ? __pfx_kthread+0x10/0x10 [ 21.347048] ret_from_fork+0x116/0x1d0 [ 21.347073] ? __pfx_kthread+0x10/0x10 [ 21.347103] ret_from_fork_asm+0x1a/0x30 [ 21.347145] </TASK> [ 21.347161] [ 21.365952] Allocated by task 288: [ 21.366508] kasan_save_stack+0x45/0x70 [ 21.366936] kasan_save_track+0x18/0x40 [ 21.367319] kasan_save_alloc_info+0x3b/0x50 [ 21.367720] __kasan_kmalloc+0xb7/0xc0 [ 21.368171] __kmalloc_cache_noprof+0x189/0x420 [ 21.369042] kasan_bitops_generic+0x92/0x1c0 [ 21.369726] kunit_try_run_case+0x1a5/0x480 [ 21.370117] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.370688] kthread+0x337/0x6f0 [ 21.371137] ret_from_fork+0x116/0x1d0 [ 21.371468] ret_from_fork_asm+0x1a/0x30 [ 21.372018] [ 21.372225] The buggy address belongs to the object at ffff888102264580 [ 21.372225] which belongs to the cache kmalloc-16 of size 16 [ 21.373180] The buggy address is located 8 bytes inside of [ 21.373180] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.374024] [ 21.374181] The buggy address belongs to the physical page: [ 21.374679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.375162] flags: 0x200000000000000(node=0|zone=2) [ 21.375714] page_type: f5(slab) [ 21.375994] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.376935] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.377938] page dumped because: kasan: bad access detected [ 21.378542] [ 21.378945] Memory state around the buggy address: [ 21.379342] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.379979] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.380608] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.381200] ^ [ 21.381534] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.382096] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.382777] ================================================================== [ 21.384124] ================================================================== [ 21.384654] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.385444] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.386189] [ 21.386479] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.386602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.386638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.386694] Call Trace: [ 21.386737] <TASK> [ 21.386782] dump_stack_lvl+0x73/0xb0 [ 21.386877] print_report+0xd1/0x650 [ 21.386952] ? __virt_addr_valid+0x1db/0x2d0 [ 21.387021] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.387089] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.387155] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.387264] kasan_report+0x141/0x180 [ 21.387334] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.387430] kasan_check_range+0x10c/0x1c0 [ 21.387558] __kasan_check_write+0x18/0x20 [ 21.387632] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.387717] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.387805] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.387969] ? trace_hardirqs_on+0x37/0xe0 [ 21.388080] ? kasan_bitops_generic+0x92/0x1c0 [ 21.388169] kasan_bitops_generic+0x121/0x1c0 [ 21.388292] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.388375] ? __pfx_read_tsc+0x10/0x10 [ 21.388442] ? ktime_get_ts64+0x86/0x230 [ 21.388526] kunit_try_run_case+0x1a5/0x480 [ 21.388600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.388674] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.388750] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.388842] ? __kthread_parkme+0x82/0x180 [ 21.388912] ? preempt_count_sub+0x50/0x80 [ 21.388987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.389061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.389103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.389137] kthread+0x337/0x6f0 [ 21.389165] ? trace_preempt_on+0x20/0xc0 [ 21.389196] ? __pfx_kthread+0x10/0x10 [ 21.389272] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.389311] ? calculate_sigpending+0x7b/0xa0 [ 21.389349] ? __pfx_kthread+0x10/0x10 [ 21.389379] ret_from_fork+0x116/0x1d0 [ 21.389405] ? __pfx_kthread+0x10/0x10 [ 21.389433] ret_from_fork_asm+0x1a/0x30 [ 21.389476] </TASK> [ 21.389490] [ 21.409688] Allocated by task 288: [ 21.409990] kasan_save_stack+0x45/0x70 [ 21.410433] kasan_save_track+0x18/0x40 [ 21.410859] kasan_save_alloc_info+0x3b/0x50 [ 21.411302] __kasan_kmalloc+0xb7/0xc0 [ 21.411610] __kmalloc_cache_noprof+0x189/0x420 [ 21.412088] kasan_bitops_generic+0x92/0x1c0 [ 21.412574] kunit_try_run_case+0x1a5/0x480 [ 21.413047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.413589] kthread+0x337/0x6f0 [ 21.413870] ret_from_fork+0x116/0x1d0 [ 21.414324] ret_from_fork_asm+0x1a/0x30 [ 21.414728] [ 21.414928] The buggy address belongs to the object at ffff888102264580 [ 21.414928] which belongs to the cache kmalloc-16 of size 16 [ 21.415785] The buggy address is located 8 bytes inside of [ 21.415785] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.416790] [ 21.417048] The buggy address belongs to the physical page: [ 21.417511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.418151] flags: 0x200000000000000(node=0|zone=2) [ 21.418683] page_type: f5(slab) [ 21.419077] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.419727] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.420298] page dumped because: kasan: bad access detected [ 21.420676] [ 21.420905] Memory state around the buggy address: [ 21.421385] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.422055] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.422672] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.423114] ^ [ 21.423522] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.424171] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.424747] ================================================================== [ 21.556544] ================================================================== [ 21.557048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.558670] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.560239] [ 21.560684] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.560864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.560898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.560956] Call Trace: [ 21.560993] <TASK> [ 21.561040] dump_stack_lvl+0x73/0xb0 [ 21.561117] print_report+0xd1/0x650 [ 21.561154] ? __virt_addr_valid+0x1db/0x2d0 [ 21.561185] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.561271] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.561309] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.561350] kasan_report+0x141/0x180 [ 21.561380] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.561424] kasan_check_range+0x10c/0x1c0 [ 21.561457] __kasan_check_write+0x18/0x20 [ 21.561484] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 21.561523] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.561563] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.561599] ? trace_hardirqs_on+0x37/0xe0 [ 21.561632] ? kasan_bitops_generic+0x92/0x1c0 [ 21.561669] kasan_bitops_generic+0x121/0x1c0 [ 21.561703] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.561740] ? __pfx_read_tsc+0x10/0x10 [ 21.561769] ? ktime_get_ts64+0x86/0x230 [ 21.561802] kunit_try_run_case+0x1a5/0x480 [ 21.561860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.561897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.561925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.561961] ? __kthread_parkme+0x82/0x180 [ 21.561988] ? preempt_count_sub+0x50/0x80 [ 21.562021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.562054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.562086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.562119] kthread+0x337/0x6f0 [ 21.562145] ? trace_preempt_on+0x20/0xc0 [ 21.562177] ? __pfx_kthread+0x10/0x10 [ 21.562206] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.562265] ? calculate_sigpending+0x7b/0xa0 [ 21.562304] ? __pfx_kthread+0x10/0x10 [ 21.562334] ret_from_fork+0x116/0x1d0 [ 21.562359] ? __pfx_kthread+0x10/0x10 [ 21.562388] ret_from_fork_asm+0x1a/0x30 [ 21.562428] </TASK> [ 21.562442] [ 21.581714] Allocated by task 288: [ 21.581988] kasan_save_stack+0x45/0x70 [ 21.582494] kasan_save_track+0x18/0x40 [ 21.582890] kasan_save_alloc_info+0x3b/0x50 [ 21.583454] __kasan_kmalloc+0xb7/0xc0 [ 21.583930] __kmalloc_cache_noprof+0x189/0x420 [ 21.584498] kasan_bitops_generic+0x92/0x1c0 [ 21.584810] kunit_try_run_case+0x1a5/0x480 [ 21.585261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.585757] kthread+0x337/0x6f0 [ 21.586119] ret_from_fork+0x116/0x1d0 [ 21.586616] ret_from_fork_asm+0x1a/0x30 [ 21.587059] [ 21.587364] The buggy address belongs to the object at ffff888102264580 [ 21.587364] which belongs to the cache kmalloc-16 of size 16 [ 21.589177] The buggy address is located 8 bytes inside of [ 21.589177] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.590006] [ 21.590212] The buggy address belongs to the physical page: [ 21.590682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.591477] flags: 0x200000000000000(node=0|zone=2) [ 21.591935] page_type: f5(slab) [ 21.592195] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.592741] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.593495] page dumped because: kasan: bad access detected [ 21.593990] [ 21.594310] Memory state around the buggy address: [ 21.594704] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.595160] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.595892] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.596694] ^ [ 21.597052] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.597610] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.598398] ================================================================== [ 21.463647] ================================================================== [ 21.464443] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.465274] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.466628] [ 21.466826] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.466969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.467009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.467067] Call Trace: [ 21.467117] <TASK> [ 21.467166] dump_stack_lvl+0x73/0xb0 [ 21.467250] print_report+0xd1/0x650 [ 21.467329] ? __virt_addr_valid+0x1db/0x2d0 [ 21.467401] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.467487] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.467572] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.467659] kasan_report+0x141/0x180 [ 21.467738] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.467850] kasan_check_range+0x10c/0x1c0 [ 21.467932] __kasan_check_write+0x18/0x20 [ 21.468007] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 21.468091] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.468162] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.468318] ? trace_hardirqs_on+0x37/0xe0 [ 21.468388] ? kasan_bitops_generic+0x92/0x1c0 [ 21.468470] kasan_bitops_generic+0x121/0x1c0 [ 21.468545] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.468622] ? __pfx_read_tsc+0x10/0x10 [ 21.468688] ? ktime_get_ts64+0x86/0x230 [ 21.468765] kunit_try_run_case+0x1a5/0x480 [ 21.468858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.468931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.468997] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.469074] ? __kthread_parkme+0x82/0x180 [ 21.469142] ? preempt_count_sub+0x50/0x80 [ 21.469203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.469265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.469337] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.469408] kthread+0x337/0x6f0 [ 21.469474] ? trace_preempt_on+0x20/0xc0 [ 21.469549] ? __pfx_kthread+0x10/0x10 [ 21.469623] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.469696] ? calculate_sigpending+0x7b/0xa0 [ 21.469769] ? __pfx_kthread+0x10/0x10 [ 21.470040] ret_from_fork+0x116/0x1d0 [ 21.470277] ? __pfx_kthread+0x10/0x10 [ 21.470998] ret_from_fork_asm+0x1a/0x30 [ 21.471090] </TASK> [ 21.471126] [ 21.490895] Allocated by task 288: [ 21.493205] kasan_save_stack+0x45/0x70 [ 21.493921] kasan_save_track+0x18/0x40 [ 21.494697] kasan_save_alloc_info+0x3b/0x50 [ 21.495570] __kasan_kmalloc+0xb7/0xc0 [ 21.496239] __kmalloc_cache_noprof+0x189/0x420 [ 21.497030] kasan_bitops_generic+0x92/0x1c0 [ 21.497809] kunit_try_run_case+0x1a5/0x480 [ 21.498244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.498685] kthread+0x337/0x6f0 [ 21.499052] ret_from_fork+0x116/0x1d0 [ 21.499939] ret_from_fork_asm+0x1a/0x30 [ 21.500423] [ 21.500639] The buggy address belongs to the object at ffff888102264580 [ 21.500639] which belongs to the cache kmalloc-16 of size 16 [ 21.501664] The buggy address is located 8 bytes inside of [ 21.501664] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.502576] [ 21.502851] The buggy address belongs to the physical page: [ 21.503340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.503925] flags: 0x200000000000000(node=0|zone=2) [ 21.504404] page_type: f5(slab) [ 21.504703] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.505336] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.505970] page dumped because: kasan: bad access detected [ 21.506462] [ 21.506717] Memory state around the buggy address: [ 21.507153] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.507788] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.508451] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.508971] ^ [ 21.509417] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.509909] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.510515] ================================================================== [ 21.641514] ================================================================== [ 21.642715] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.644206] Read of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.645133] [ 21.645495] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.645618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.645656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.645713] Call Trace: [ 21.645790] <TASK> [ 21.645853] dump_stack_lvl+0x73/0xb0 [ 21.645936] print_report+0xd1/0x650 [ 21.646014] ? __virt_addr_valid+0x1db/0x2d0 [ 21.646078] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.646121] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.646152] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.646191] kasan_report+0x141/0x180 [ 21.646252] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.646310] kasan_check_range+0x10c/0x1c0 [ 21.646347] __kasan_check_read+0x15/0x20 [ 21.646374] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 21.646412] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.646453] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.646486] ? trace_hardirqs_on+0x37/0xe0 [ 21.646517] ? kasan_bitops_generic+0x92/0x1c0 [ 21.646555] kasan_bitops_generic+0x121/0x1c0 [ 21.646592] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.646627] ? __pfx_read_tsc+0x10/0x10 [ 21.646655] ? ktime_get_ts64+0x86/0x230 [ 21.646689] kunit_try_run_case+0x1a5/0x480 [ 21.646721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.646753] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.646781] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.646817] ? __kthread_parkme+0x82/0x180 [ 21.646869] ? preempt_count_sub+0x50/0x80 [ 21.646906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.646941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.646974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.647005] kthread+0x337/0x6f0 [ 21.647032] ? trace_preempt_on+0x20/0xc0 [ 21.647062] ? __pfx_kthread+0x10/0x10 [ 21.647092] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.647126] ? calculate_sigpending+0x7b/0xa0 [ 21.647159] ? __pfx_kthread+0x10/0x10 [ 21.647188] ret_from_fork+0x116/0x1d0 [ 21.647216] ? __pfx_kthread+0x10/0x10 [ 21.647272] ret_from_fork_asm+0x1a/0x30 [ 21.647315] </TASK> [ 21.647328] [ 21.664363] Allocated by task 288: [ 21.664624] kasan_save_stack+0x45/0x70 [ 21.664965] kasan_save_track+0x18/0x40 [ 21.665568] kasan_save_alloc_info+0x3b/0x50 [ 21.666160] __kasan_kmalloc+0xb7/0xc0 [ 21.666642] __kmalloc_cache_noprof+0x189/0x420 [ 21.667110] kasan_bitops_generic+0x92/0x1c0 [ 21.667641] kunit_try_run_case+0x1a5/0x480 [ 21.668155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.668553] kthread+0x337/0x6f0 [ 21.668808] ret_from_fork+0x116/0x1d0 [ 21.669323] ret_from_fork_asm+0x1a/0x30 [ 21.669701] [ 21.669970] The buggy address belongs to the object at ffff888102264580 [ 21.669970] which belongs to the cache kmalloc-16 of size 16 [ 21.671164] The buggy address is located 8 bytes inside of [ 21.671164] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.672134] [ 21.672428] The buggy address belongs to the physical page: [ 21.673086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.673869] flags: 0x200000000000000(node=0|zone=2) [ 21.674202] page_type: f5(slab) [ 21.674585] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.675382] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.676043] page dumped because: kasan: bad access detected [ 21.676491] [ 21.676646] Memory state around the buggy address: [ 21.677026] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.677719] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.679013] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.679975] ^ [ 21.680524] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.681456] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.682031] ================================================================== [ 21.425821] ================================================================== [ 21.426638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.427167] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.428112] [ 21.428429] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.428557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.428595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.428652] Call Trace: [ 21.428698] <TASK> [ 21.428804] dump_stack_lvl+0x73/0xb0 [ 21.428907] print_report+0xd1/0x650 [ 21.428975] ? __virt_addr_valid+0x1db/0x2d0 [ 21.429044] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.429118] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.429186] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.429302] kasan_report+0x141/0x180 [ 21.429379] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.429471] kasan_check_range+0x10c/0x1c0 [ 21.429548] __kasan_check_write+0x18/0x20 [ 21.429614] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 21.429695] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.429779] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.429865] ? trace_hardirqs_on+0x37/0xe0 [ 21.429933] ? kasan_bitops_generic+0x92/0x1c0 [ 21.430014] kasan_bitops_generic+0x121/0x1c0 [ 21.430137] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.430260] ? __pfx_read_tsc+0x10/0x10 [ 21.430371] ? ktime_get_ts64+0x86/0x230 [ 21.430451] kunit_try_run_case+0x1a5/0x480 [ 21.430527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.430599] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.430668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.430793] ? __kthread_parkme+0x82/0x180 [ 21.430879] ? preempt_count_sub+0x50/0x80 [ 21.430961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.431072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.431155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.431265] kthread+0x337/0x6f0 [ 21.431338] ? trace_preempt_on+0x20/0xc0 [ 21.431408] ? __pfx_kthread+0x10/0x10 [ 21.431518] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.431608] ? calculate_sigpending+0x7b/0xa0 [ 21.431690] ? __pfx_kthread+0x10/0x10 [ 21.431796] ret_from_fork+0x116/0x1d0 [ 21.431887] ? __pfx_kthread+0x10/0x10 [ 21.431954] ret_from_fork_asm+0x1a/0x30 [ 21.432036] </TASK> [ 21.432055] [ 21.448414] Allocated by task 288: [ 21.448755] kasan_save_stack+0x45/0x70 [ 21.449157] kasan_save_track+0x18/0x40 [ 21.449564] kasan_save_alloc_info+0x3b/0x50 [ 21.449951] __kasan_kmalloc+0xb7/0xc0 [ 21.450272] __kmalloc_cache_noprof+0x189/0x420 [ 21.450594] kasan_bitops_generic+0x92/0x1c0 [ 21.450944] kunit_try_run_case+0x1a5/0x480 [ 21.451419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.451947] kthread+0x337/0x6f0 [ 21.452343] ret_from_fork+0x116/0x1d0 [ 21.452732] ret_from_fork_asm+0x1a/0x30 [ 21.453159] [ 21.453395] The buggy address belongs to the object at ffff888102264580 [ 21.453395] which belongs to the cache kmalloc-16 of size 16 [ 21.454193] The buggy address is located 8 bytes inside of [ 21.454193] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.454937] [ 21.455143] The buggy address belongs to the physical page: [ 21.455667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.456397] flags: 0x200000000000000(node=0|zone=2) [ 21.456856] page_type: f5(slab) [ 21.457257] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.457703] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.458338] page dumped because: kasan: bad access detected [ 21.458754] [ 21.458969] Memory state around the buggy address: [ 21.459439] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.459977] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.460539] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.460960] ^ [ 21.461254] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.461673] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.462298] ==================================================================