Date
July 4, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 27.405659] ================================================================== [ 27.406031] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.406873] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310 [ 27.407564] [ 27.407862] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 27.407931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.407944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.407968] Call Trace: [ 27.407989] <TASK> [ 27.408010] dump_stack_lvl+0x73/0xb0 [ 27.408041] print_report+0xd1/0x650 [ 27.408064] ? __virt_addr_valid+0x1db/0x2d0 [ 27.408087] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.408114] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.408139] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.408167] kasan_report+0x141/0x180 [ 27.408189] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.408220] kasan_check_range+0x10c/0x1c0 [ 27.408253] __kasan_check_write+0x18/0x20 [ 27.408276] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.408304] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.408331] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.408356] ? kasan_bitops_generic+0x92/0x1c0 [ 27.408383] kasan_bitops_generic+0x121/0x1c0 [ 27.408420] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.408444] ? __pfx_read_tsc+0x10/0x10 [ 27.408466] ? ktime_get_ts64+0x86/0x230 [ 27.408492] kunit_try_run_case+0x1a5/0x480 [ 27.408518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.408542] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.408567] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.408592] ? __kthread_parkme+0x82/0x180 [ 27.408613] ? preempt_count_sub+0x50/0x80 [ 27.408637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.408662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.408687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.408712] kthread+0x337/0x6f0 [ 27.408733] ? trace_preempt_on+0x20/0xc0 [ 27.408757] ? __pfx_kthread+0x10/0x10 [ 27.408779] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.408801] ? calculate_sigpending+0x7b/0xa0 [ 27.408825] ? __pfx_kthread+0x10/0x10 [ 27.408847] ret_from_fork+0x116/0x1d0 [ 27.408867] ? __pfx_kthread+0x10/0x10 [ 27.408902] ret_from_fork_asm+0x1a/0x30 [ 27.408936] </TASK> [ 27.408948] [ 27.421018] Allocated by task 310: [ 27.421386] kasan_save_stack+0x45/0x70 [ 27.421607] kasan_save_track+0x18/0x40 [ 27.421765] kasan_save_alloc_info+0x3b/0x50 [ 27.422262] __kasan_kmalloc+0xb7/0xc0 [ 27.422466] __kmalloc_cache_noprof+0x189/0x420 [ 27.422801] kasan_bitops_generic+0x92/0x1c0 [ 27.423060] kunit_try_run_case+0x1a5/0x480 [ 27.423553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.423805] kthread+0x337/0x6f0 [ 27.423947] ret_from_fork+0x116/0x1d0 [ 27.424143] ret_from_fork_asm+0x1a/0x30 [ 27.424366] [ 27.424476] The buggy address belongs to the object at ffff88810527f2e0 [ 27.424476] which belongs to the cache kmalloc-16 of size 16 [ 27.424930] The buggy address is located 8 bytes inside of [ 27.424930] allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9) [ 27.425452] [ 27.425554] The buggy address belongs to the physical page: [ 27.425806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f [ 27.426079] flags: 0x200000000000000(node=0|zone=2) [ 27.426438] page_type: f5(slab) [ 27.426589] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 27.426871] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.427274] page dumped because: kasan: bad access detected [ 27.427509] [ 27.427604] Memory state around the buggy address: [ 27.427789] ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.428105] ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.428375] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.428675] ^ [ 27.428989] ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.429206] ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.429517] ================================================================== [ 27.430001] ================================================================== [ 27.430522] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.430999] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310 [ 27.431351] [ 27.431471] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 27.431522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.431535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.431558] Call Trace: [ 27.431577] <TASK> [ 27.431597] dump_stack_lvl+0x73/0xb0 [ 27.431625] print_report+0xd1/0x650 [ 27.431648] ? __virt_addr_valid+0x1db/0x2d0 [ 27.431674] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.431700] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.431726] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.431754] kasan_report+0x141/0x180 [ 27.431777] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.431809] kasan_check_range+0x10c/0x1c0 [ 27.431833] __kasan_check_write+0x18/0x20 [ 27.431856] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.432230] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.432275] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.432301] ? kasan_bitops_generic+0x92/0x1c0 [ 27.432329] kasan_bitops_generic+0x121/0x1c0 [ 27.432354] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.432380] ? __pfx_read_tsc+0x10/0x10 [ 27.432416] ? ktime_get_ts64+0x86/0x230 [ 27.432442] kunit_try_run_case+0x1a5/0x480 [ 27.432468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.432546] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.432576] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.432602] ? __kthread_parkme+0x82/0x180 [ 27.432625] ? preempt_count_sub+0x50/0x80 [ 27.432650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.432676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.432701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.432727] kthread+0x337/0x6f0 [ 27.432747] ? trace_preempt_on+0x20/0xc0 [ 27.432773] ? __pfx_kthread+0x10/0x10 [ 27.432796] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.432819] ? calculate_sigpending+0x7b/0xa0 [ 27.432845] ? __pfx_kthread+0x10/0x10 [ 27.432867] ret_from_fork+0x116/0x1d0 [ 27.432887] ? __pfx_kthread+0x10/0x10 [ 27.432908] ret_from_fork_asm+0x1a/0x30 [ 27.432941] </TASK> [ 27.432954] [ 27.441702] Allocated by task 310: [ 27.441922] kasan_save_stack+0x45/0x70 [ 27.442095] kasan_save_track+0x18/0x40 [ 27.442428] kasan_save_alloc_info+0x3b/0x50 [ 27.442606] __kasan_kmalloc+0xb7/0xc0 [ 27.442748] __kmalloc_cache_noprof+0x189/0x420 [ 27.442904] kasan_bitops_generic+0x92/0x1c0 [ 27.443081] kunit_try_run_case+0x1a5/0x480 [ 27.443297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.443565] kthread+0x337/0x6f0 [ 27.443754] ret_from_fork+0x116/0x1d0 [ 27.443897] ret_from_fork_asm+0x1a/0x30 [ 27.444210] [ 27.444316] The buggy address belongs to the object at ffff88810527f2e0 [ 27.444316] which belongs to the cache kmalloc-16 of size 16 [ 27.444770] The buggy address is located 8 bytes inside of [ 27.444770] allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9) [ 27.445360] [ 27.445493] The buggy address belongs to the physical page: [ 27.445768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f [ 27.446284] flags: 0x200000000000000(node=0|zone=2) [ 27.446549] page_type: f5(slab) [ 27.446732] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 27.447058] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.447382] page dumped because: kasan: bad access detected [ 27.447741] [ 27.447828] Memory state around the buggy address: [ 27.448048] ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.448287] ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.448578] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.448910] ^ [ 27.449442] ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.449771] ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.450310] ================================================================== [ 27.577113] ================================================================== [ 27.577832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.578360] Read of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310 [ 27.578937] [ 27.579038] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 27.579097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.579112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.579138] Call Trace: [ 27.579162] <TASK> [ 27.579184] dump_stack_lvl+0x73/0xb0 [ 27.579217] print_report+0xd1/0x650 [ 27.579241] ? __virt_addr_valid+0x1db/0x2d0 [ 27.579267] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.579296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.579324] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.579353] kasan_report+0x141/0x180 [ 27.579376] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.579421] __asan_report_load8_noabort+0x18/0x20 [ 27.579448] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.579477] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.579507] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.579533] ? kasan_bitops_generic+0x92/0x1c0 [ 27.579562] kasan_bitops_generic+0x121/0x1c0 [ 27.579587] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.579614] ? __pfx_read_tsc+0x10/0x10 [ 27.579639] ? ktime_get_ts64+0x86/0x230 [ 27.579667] kunit_try_run_case+0x1a5/0x480 [ 27.579696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.579722] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.579749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.579777] ? __kthread_parkme+0x82/0x180 [ 27.579800] ? preempt_count_sub+0x50/0x80 [ 27.579826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.579854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.579897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.579925] kthread+0x337/0x6f0 [ 27.579947] ? trace_preempt_on+0x20/0xc0 [ 27.579973] ? __pfx_kthread+0x10/0x10 [ 27.579996] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.580021] ? calculate_sigpending+0x7b/0xa0 [ 27.580047] ? __pfx_kthread+0x10/0x10 [ 27.580071] ret_from_fork+0x116/0x1d0 [ 27.580092] ? __pfx_kthread+0x10/0x10 [ 27.580115] ret_from_fork_asm+0x1a/0x30 [ 27.580159] </TASK> [ 27.580173] [ 27.588900] Allocated by task 310: [ 27.589049] kasan_save_stack+0x45/0x70 [ 27.589206] kasan_save_track+0x18/0x40 [ 27.589423] kasan_save_alloc_info+0x3b/0x50 [ 27.589645] __kasan_kmalloc+0xb7/0xc0 [ 27.589877] __kmalloc_cache_noprof+0x189/0x420 [ 27.590177] kasan_bitops_generic+0x92/0x1c0 [ 27.590380] kunit_try_run_case+0x1a5/0x480 [ 27.590549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.590737] kthread+0x337/0x6f0 [ 27.590865] ret_from_fork+0x116/0x1d0 [ 27.591152] ret_from_fork_asm+0x1a/0x30 [ 27.591496] [ 27.591600] The buggy address belongs to the object at ffff88810527f2e0 [ 27.591600] which belongs to the cache kmalloc-16 of size 16 [ 27.592213] The buggy address is located 8 bytes inside of [ 27.592213] allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9) [ 27.592699] [ 27.592777] The buggy address belongs to the physical page: [ 27.592965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f [ 27.593226] flags: 0x200000000000000(node=0|zone=2) [ 27.593414] page_type: f5(slab) [ 27.593600] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 27.594144] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.594582] page dumped because: kasan: bad access detected [ 27.594918] [ 27.595035] Memory state around the buggy address: [ 27.595254] ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.595731] ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.596052] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.596494] ^ [ 27.596797] ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.597099] ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.597329] ================================================================== [ 27.450855] ================================================================== [ 27.451441] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.451775] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310 [ 27.452036] [ 27.452156] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 27.452210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.452233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.452258] Call Trace: [ 27.452277] <TASK> [ 27.452295] dump_stack_lvl+0x73/0xb0 [ 27.452324] print_report+0xd1/0x650 [ 27.452348] ? __virt_addr_valid+0x1db/0x2d0 [ 27.452374] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.452413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.452441] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.452470] kasan_report+0x141/0x180 [ 27.452494] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.452527] kasan_check_range+0x10c/0x1c0 [ 27.452611] __kasan_check_write+0x18/0x20 [ 27.452636] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.452665] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.452695] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.452722] ? kasan_bitops_generic+0x92/0x1c0 [ 27.452753] kasan_bitops_generic+0x121/0x1c0 [ 27.452777] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.452804] ? __pfx_read_tsc+0x10/0x10 [ 27.452827] ? ktime_get_ts64+0x86/0x230 [ 27.452855] kunit_try_run_case+0x1a5/0x480 [ 27.452881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.452908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.452935] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.452963] ? __kthread_parkme+0x82/0x180 [ 27.452987] ? preempt_count_sub+0x50/0x80 [ 27.453013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.453041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.453068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.453094] kthread+0x337/0x6f0 [ 27.453134] ? trace_preempt_on+0x20/0xc0 [ 27.453328] ? __pfx_kthread+0x10/0x10 [ 27.453362] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.453388] ? calculate_sigpending+0x7b/0xa0 [ 27.453429] ? __pfx_kthread+0x10/0x10 [ 27.453453] ret_from_fork+0x116/0x1d0 [ 27.453475] ? __pfx_kthread+0x10/0x10 [ 27.453498] ret_from_fork_asm+0x1a/0x30 [ 27.453531] </TASK> [ 27.453544] [ 27.462518] Allocated by task 310: [ 27.462890] kasan_save_stack+0x45/0x70 [ 27.463341] kasan_save_track+0x18/0x40 [ 27.463508] kasan_save_alloc_info+0x3b/0x50 [ 27.463667] __kasan_kmalloc+0xb7/0xc0 [ 27.463811] __kmalloc_cache_noprof+0x189/0x420 [ 27.464329] kasan_bitops_generic+0x92/0x1c0 [ 27.464582] kunit_try_run_case+0x1a5/0x480 [ 27.464806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.465244] kthread+0x337/0x6f0 [ 27.465434] ret_from_fork+0x116/0x1d0 [ 27.465614] ret_from_fork_asm+0x1a/0x30 [ 27.465795] [ 27.465868] The buggy address belongs to the object at ffff88810527f2e0 [ 27.465868] which belongs to the cache kmalloc-16 of size 16 [ 27.466611] The buggy address is located 8 bytes inside of [ 27.466611] allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9) [ 27.467129] [ 27.467252] The buggy address belongs to the physical page: [ 27.467523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f [ 27.467877] flags: 0x200000000000000(node=0|zone=2) [ 27.468204] page_type: f5(slab) [ 27.468371] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 27.468710] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.468968] page dumped because: kasan: bad access detected [ 27.469148] [ 27.469218] Memory state around the buggy address: [ 27.469382] ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.469688] ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.470490] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.470854] ^ [ 27.471249] ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.471568] ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.471845] ================================================================== [ 27.472599] ================================================================== [ 27.472944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.473385] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310 [ 27.473651] [ 27.473751] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 27.473804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.473817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.473843] Call Trace: [ 27.473863] <TASK> [ 27.473892] dump_stack_lvl+0x73/0xb0 [ 27.473923] print_report+0xd1/0x650 [ 27.473948] ? __virt_addr_valid+0x1db/0x2d0 [ 27.473977] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.474007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.474036] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.474066] kasan_report+0x141/0x180 [ 27.474093] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.474128] kasan_check_range+0x10c/0x1c0 [ 27.474164] __kasan_check_write+0x18/0x20 [ 27.474190] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.474221] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.474251] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.474279] ? kasan_bitops_generic+0x92/0x1c0 [ 27.474308] kasan_bitops_generic+0x121/0x1c0 [ 27.474334] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.474361] ? __pfx_read_tsc+0x10/0x10 [ 27.474384] ? ktime_get_ts64+0x86/0x230 [ 27.474427] kunit_try_run_case+0x1a5/0x480 [ 27.474455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.474481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.474507] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.474535] ? __kthread_parkme+0x82/0x180 [ 27.474557] ? preempt_count_sub+0x50/0x80 [ 27.474584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.474611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.474637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.474664] kthread+0x337/0x6f0 [ 27.474685] ? trace_preempt_on+0x20/0xc0 [ 27.474711] ? __pfx_kthread+0x10/0x10 [ 27.474735] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.474760] ? calculate_sigpending+0x7b/0xa0 [ 27.474789] ? __pfx_kthread+0x10/0x10 [ 27.474812] ret_from_fork+0x116/0x1d0 [ 27.474834] ? __pfx_kthread+0x10/0x10 [ 27.474857] ret_from_fork_asm+0x1a/0x30 [ 27.474891] </TASK> [ 27.474904] [ 27.484238] Allocated by task 310: [ 27.484447] kasan_save_stack+0x45/0x70 [ 27.484668] kasan_save_track+0x18/0x40 [ 27.484874] kasan_save_alloc_info+0x3b/0x50 [ 27.485458] __kasan_kmalloc+0xb7/0xc0 [ 27.485612] __kmalloc_cache_noprof+0x189/0x420 [ 27.485777] kasan_bitops_generic+0x92/0x1c0 [ 27.485933] kunit_try_run_case+0x1a5/0x480 [ 27.486367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.486668] kthread+0x337/0x6f0 [ 27.486855] ret_from_fork+0x116/0x1d0 [ 27.487064] ret_from_fork_asm+0x1a/0x30 [ 27.487277] [ 27.487371] The buggy address belongs to the object at ffff88810527f2e0 [ 27.487371] which belongs to the cache kmalloc-16 of size 16 [ 27.487977] The buggy address is located 8 bytes inside of [ 27.487977] allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9) [ 27.488679] [ 27.488768] The buggy address belongs to the physical page: [ 27.489128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f [ 27.489630] flags: 0x200000000000000(node=0|zone=2) [ 27.489915] page_type: f5(slab) [ 27.490052] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 27.490525] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.490858] page dumped because: kasan: bad access detected [ 27.491117] [ 27.491223] Memory state around the buggy address: [ 27.491460] ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.491727] ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.492004] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.492419] ^ [ 27.492635] ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.493344] ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.493685] ================================================================== [ 27.494143] ================================================================== [ 27.494542] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.495106] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310 [ 27.495430] [ 27.495532] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 27.495591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.495605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.495630] Call Trace: [ 27.495654] <TASK> [ 27.495678] dump_stack_lvl+0x73/0xb0 [ 27.495711] print_report+0xd1/0x650 [ 27.495738] ? __virt_addr_valid+0x1db/0x2d0 [ 27.495765] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.495794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.495823] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.495853] kasan_report+0x141/0x180 [ 27.495876] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.495910] kasan_check_range+0x10c/0x1c0 [ 27.495936] __kasan_check_write+0x18/0x20 [ 27.495961] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.495991] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.496020] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.496048] ? kasan_bitops_generic+0x92/0x1c0 [ 27.496077] kasan_bitops_generic+0x121/0x1c0 [ 27.496102] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.496128] ? __pfx_read_tsc+0x10/0x10 [ 27.496153] ? ktime_get_ts64+0x86/0x230 [ 27.496180] kunit_try_run_case+0x1a5/0x480 [ 27.496209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.496244] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.496272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.496300] ? __kthread_parkme+0x82/0x180 [ 27.496323] ? preempt_count_sub+0x50/0x80 [ 27.496349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.496376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.496414] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.496441] kthread+0x337/0x6f0 [ 27.496463] ? trace_preempt_on+0x20/0xc0 [ 27.496488] ? __pfx_kthread+0x10/0x10 [ 27.496512] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.496538] ? calculate_sigpending+0x7b/0xa0 [ 27.496565] ? __pfx_kthread+0x10/0x10 [ 27.496590] ret_from_fork+0x116/0x1d0 [ 27.496612] ? __pfx_kthread+0x10/0x10 [ 27.496636] ret_from_fork_asm+0x1a/0x30 [ 27.496672] </TASK> [ 27.496686] [ 27.506569] Allocated by task 310: [ 27.506768] kasan_save_stack+0x45/0x70 [ 27.506996] kasan_save_track+0x18/0x40 [ 27.507290] kasan_save_alloc_info+0x3b/0x50 [ 27.507532] __kasan_kmalloc+0xb7/0xc0 [ 27.507715] __kmalloc_cache_noprof+0x189/0x420 [ 27.507879] kasan_bitops_generic+0x92/0x1c0 [ 27.508033] kunit_try_run_case+0x1a5/0x480 [ 27.508212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.508622] kthread+0x337/0x6f0 [ 27.508811] ret_from_fork+0x116/0x1d0 [ 27.508979] ret_from_fork_asm+0x1a/0x30 [ 27.509128] [ 27.509201] The buggy address belongs to the object at ffff88810527f2e0 [ 27.509201] which belongs to the cache kmalloc-16 of size 16 [ 27.510377] The buggy address is located 8 bytes inside of [ 27.510377] allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9) [ 27.510841] [ 27.510921] The buggy address belongs to the physical page: [ 27.511109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f [ 27.511432] flags: 0x200000000000000(node=0|zone=2) [ 27.511768] page_type: f5(slab) [ 27.512029] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 27.512701] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.513299] page dumped because: kasan: bad access detected [ 27.513502] [ 27.513577] Memory state around the buggy address: [ 27.513747] ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.513983] ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.514308] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.515207] ^ [ 27.515587] ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.515907] ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.516149] ================================================================== [ 27.542204] ================================================================== [ 27.543027] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.543713] Read of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310 [ 27.544438] [ 27.544692] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 27.544756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.544771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.544805] Call Trace: [ 27.544828] <TASK> [ 27.544850] dump_stack_lvl+0x73/0xb0 [ 27.544884] print_report+0xd1/0x650 [ 27.544908] ? __virt_addr_valid+0x1db/0x2d0 [ 27.544935] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.544964] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.544993] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.545023] kasan_report+0x141/0x180 [ 27.545047] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.545083] kasan_check_range+0x10c/0x1c0 [ 27.545109] __kasan_check_read+0x15/0x20 [ 27.545133] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.545278] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.545311] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.545339] ? kasan_bitops_generic+0x92/0x1c0 [ 27.545368] kasan_bitops_generic+0x121/0x1c0 [ 27.545444] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.545473] ? __pfx_read_tsc+0x10/0x10 [ 27.545498] ? ktime_get_ts64+0x86/0x230 [ 27.545526] kunit_try_run_case+0x1a5/0x480 [ 27.545554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.545579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.545607] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.545634] ? __kthread_parkme+0x82/0x180 [ 27.545656] ? preempt_count_sub+0x50/0x80 [ 27.545683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.545711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.545739] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.545766] kthread+0x337/0x6f0 [ 27.545788] ? trace_preempt_on+0x20/0xc0 [ 27.545815] ? __pfx_kthread+0x10/0x10 [ 27.545838] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.545864] ? calculate_sigpending+0x7b/0xa0 [ 27.545890] ? __pfx_kthread+0x10/0x10 [ 27.545915] ret_from_fork+0x116/0x1d0 [ 27.545936] ? __pfx_kthread+0x10/0x10 [ 27.545960] ret_from_fork_asm+0x1a/0x30 [ 27.545995] </TASK> [ 27.546009] [ 27.560537] Allocated by task 310: [ 27.560749] kasan_save_stack+0x45/0x70 [ 27.561426] kasan_save_track+0x18/0x40 [ 27.561689] kasan_save_alloc_info+0x3b/0x50 [ 27.562006] __kasan_kmalloc+0xb7/0xc0 [ 27.562673] __kmalloc_cache_noprof+0x189/0x420 [ 27.563091] kasan_bitops_generic+0x92/0x1c0 [ 27.563537] kunit_try_run_case+0x1a5/0x480 [ 27.563911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.564365] kthread+0x337/0x6f0 [ 27.564563] ret_from_fork+0x116/0x1d0 [ 27.564754] ret_from_fork_asm+0x1a/0x30 [ 27.565316] [ 27.565490] The buggy address belongs to the object at ffff88810527f2e0 [ 27.565490] which belongs to the cache kmalloc-16 of size 16 [ 27.566636] The buggy address is located 8 bytes inside of [ 27.566636] allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9) [ 27.567870] [ 27.568091] The buggy address belongs to the physical page: [ 27.568696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f [ 27.569512] flags: 0x200000000000000(node=0|zone=2) [ 27.569781] page_type: f5(slab) [ 27.570403] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 27.570754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.571478] page dumped because: kasan: bad access detected [ 27.572144] [ 27.572241] Memory state around the buggy address: [ 27.572830] ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.573414] ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.574010] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.574589] ^ [ 27.575095] ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.575610] ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.576183] ================================================================== [ 27.516764] ================================================================== [ 27.517134] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.517592] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310 [ 27.517966] [ 27.518070] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 27.518128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.518142] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.518168] Call Trace: [ 27.518191] <TASK> [ 27.518215] dump_stack_lvl+0x73/0xb0 [ 27.518246] print_report+0xd1/0x650 [ 27.518271] ? __virt_addr_valid+0x1db/0x2d0 [ 27.518300] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.518330] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.518360] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.518403] kasan_report+0x141/0x180 [ 27.518427] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.518463] kasan_check_range+0x10c/0x1c0 [ 27.518489] __kasan_check_write+0x18/0x20 [ 27.518514] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.518544] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.518575] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.518604] ? kasan_bitops_generic+0x92/0x1c0 [ 27.518633] kasan_bitops_generic+0x121/0x1c0 [ 27.518660] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.518687] ? __pfx_read_tsc+0x10/0x10 [ 27.518712] ? ktime_get_ts64+0x86/0x230 [ 27.518740] kunit_try_run_case+0x1a5/0x480 [ 27.518770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.518796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.518825] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.518853] ? __kthread_parkme+0x82/0x180 [ 27.518877] ? preempt_count_sub+0x50/0x80 [ 27.519205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.519240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.519270] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.519298] kthread+0x337/0x6f0 [ 27.519322] ? trace_preempt_on+0x20/0xc0 [ 27.519351] ? __pfx_kthread+0x10/0x10 [ 27.519375] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.519415] ? calculate_sigpending+0x7b/0xa0 [ 27.519443] ? __pfx_kthread+0x10/0x10 [ 27.519469] ret_from_fork+0x116/0x1d0 [ 27.519491] ? __pfx_kthread+0x10/0x10 [ 27.519515] ret_from_fork_asm+0x1a/0x30 [ 27.519552] </TASK> [ 27.519567] [ 27.529526] Allocated by task 310: [ 27.529753] kasan_save_stack+0x45/0x70 [ 27.530124] kasan_save_track+0x18/0x40 [ 27.530439] kasan_save_alloc_info+0x3b/0x50 [ 27.530646] __kasan_kmalloc+0xb7/0xc0 [ 27.530838] __kmalloc_cache_noprof+0x189/0x420 [ 27.531063] kasan_bitops_generic+0x92/0x1c0 [ 27.531337] kunit_try_run_case+0x1a5/0x480 [ 27.531550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.531817] kthread+0x337/0x6f0 [ 27.532005] ret_from_fork+0x116/0x1d0 [ 27.532210] ret_from_fork_asm+0x1a/0x30 [ 27.532422] [ 27.532515] The buggy address belongs to the object at ffff88810527f2e0 [ 27.532515] which belongs to the cache kmalloc-16 of size 16 [ 27.533064] The buggy address is located 8 bytes inside of [ 27.533064] allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9) [ 27.533665] [ 27.534143] The buggy address belongs to the physical page: [ 27.534476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f [ 27.534779] flags: 0x200000000000000(node=0|zone=2) [ 27.534972] page_type: f5(slab) [ 27.535108] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 27.535368] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.535756] page dumped because: kasan: bad access detected [ 27.536445] [ 27.536539] Memory state around the buggy address: [ 27.536716] ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.537438] ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.537811] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.539133] ^ [ 27.539382] ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.540229] ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.540609] ================================================================== [ 27.372112] ================================================================== [ 27.372483] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.372830] Write of size 8 at addr ffff88810527f2e8 by task kunit_try_catch/310 [ 27.373402] [ 27.373532] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250704 #1 PREEMPT(voluntary) [ 27.373589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.373603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.373627] Call Trace: [ 27.373648] <TASK> [ 27.373667] dump_stack_lvl+0x73/0xb0 [ 27.373698] print_report+0xd1/0x650 [ 27.373721] ? __virt_addr_valid+0x1db/0x2d0 [ 27.373746] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.373773] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.373800] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.373828] kasan_report+0x141/0x180 [ 27.373850] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.373882] kasan_check_range+0x10c/0x1c0 [ 27.373906] __kasan_check_write+0x18/0x20 [ 27.373930] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.373958] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.373986] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.374010] ? kasan_bitops_generic+0x92/0x1c0 [ 27.374064] kasan_bitops_generic+0x121/0x1c0 [ 27.374088] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.374113] ? __pfx_read_tsc+0x10/0x10 [ 27.374210] ? ktime_get_ts64+0x86/0x230 [ 27.374242] kunit_try_run_case+0x1a5/0x480 [ 27.374270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.374294] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.374321] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.374347] ? __kthread_parkme+0x82/0x180 [ 27.374369] ? preempt_count_sub+0x50/0x80 [ 27.374404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.374431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.374456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.374483] kthread+0x337/0x6f0 [ 27.374504] ? trace_preempt_on+0x20/0xc0 [ 27.374530] ? __pfx_kthread+0x10/0x10 [ 27.374552] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.374575] ? calculate_sigpending+0x7b/0xa0 [ 27.374601] ? __pfx_kthread+0x10/0x10 [ 27.374624] ret_from_fork+0x116/0x1d0 [ 27.374645] ? __pfx_kthread+0x10/0x10 [ 27.374666] ret_from_fork_asm+0x1a/0x30 [ 27.374699] </TASK> [ 27.374711] [ 27.391365] Allocated by task 310: [ 27.391571] kasan_save_stack+0x45/0x70 [ 27.391791] kasan_save_track+0x18/0x40 [ 27.392321] kasan_save_alloc_info+0x3b/0x50 [ 27.392622] __kasan_kmalloc+0xb7/0xc0 [ 27.392816] __kmalloc_cache_noprof+0x189/0x420 [ 27.393332] kasan_bitops_generic+0x92/0x1c0 [ 27.393671] kunit_try_run_case+0x1a5/0x480 [ 27.393961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.394183] kthread+0x337/0x6f0 [ 27.394622] ret_from_fork+0x116/0x1d0 [ 27.394811] ret_from_fork_asm+0x1a/0x30 [ 27.395084] [ 27.395167] The buggy address belongs to the object at ffff88810527f2e0 [ 27.395167] which belongs to the cache kmalloc-16 of size 16 [ 27.396269] The buggy address is located 8 bytes inside of [ 27.396269] allocated 9-byte region [ffff88810527f2e0, ffff88810527f2e9) [ 27.396977] [ 27.397146] The buggy address belongs to the physical page: [ 27.397554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f [ 27.398448] flags: 0x200000000000000(node=0|zone=2) [ 27.398883] page_type: f5(slab) [ 27.399485] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 27.399795] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.400519] page dumped because: kasan: bad access detected [ 27.401215] [ 27.401378] Memory state around the buggy address: [ 27.401759] ffff88810527f180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.402053] ffff88810527f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.402958] >ffff88810527f280: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.403698] ^ [ 27.404444] ffff88810527f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.404670] ffff88810527f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.404884] ==================================================================