Date
July 23, 2025, 3:10 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 27.502905] ================================================================== [ 27.503199] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.503731] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310 [ 27.504060] [ 27.504179] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.504228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.504241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.504263] Call Trace: [ 27.504282] <TASK> [ 27.504299] dump_stack_lvl+0x73/0xb0 [ 27.504328] print_report+0xd1/0x640 [ 27.504350] ? __virt_addr_valid+0x1db/0x2d0 [ 27.504376] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.504403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.504429] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.504456] kasan_report+0x141/0x180 [ 27.504478] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.504509] kasan_check_range+0x10c/0x1c0 [ 27.504533] __kasan_check_write+0x18/0x20 [ 27.504556] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.504584] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.504611] ? ret_from_fork_asm+0x1a/0x30 [ 27.504634] ? kthread+0x337/0x6f0 [ 27.504659] kasan_bitops_generic+0x121/0x1c0 [ 27.504682] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.504707] ? __pfx_read_tsc+0x10/0x10 [ 27.504730] ? ktime_get_ts64+0x86/0x230 [ 27.504756] kunit_try_run_case+0x1a5/0x480 [ 27.504780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.504803] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.504829] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.504855] ? __kthread_parkme+0x82/0x180 [ 27.504875] ? preempt_count_sub+0x50/0x80 [ 27.504898] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.504922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.505135] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.505186] kthread+0x337/0x6f0 [ 27.505210] ? trace_preempt_on+0x20/0xc0 [ 27.505235] ? __pfx_kthread+0x10/0x10 [ 27.505258] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.505283] ? calculate_sigpending+0x7b/0xa0 [ 27.505308] ? __pfx_kthread+0x10/0x10 [ 27.505330] ret_from_fork+0x116/0x1d0 [ 27.505350] ? __pfx_kthread+0x10/0x10 [ 27.505420] ret_from_fork_asm+0x1a/0x30 [ 27.505455] </TASK> [ 27.505467] [ 27.513418] Allocated by task 310: [ 27.513548] kasan_save_stack+0x45/0x70 [ 27.513685] kasan_save_track+0x18/0x40 [ 27.513924] kasan_save_alloc_info+0x3b/0x50 [ 27.514137] __kasan_kmalloc+0xb7/0xc0 [ 27.514327] __kmalloc_cache_noprof+0x189/0x420 [ 27.514544] kasan_bitops_generic+0x92/0x1c0 [ 27.514718] kunit_try_run_case+0x1a5/0x480 [ 27.514956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.515178] kthread+0x337/0x6f0 [ 27.515336] ret_from_fork+0x116/0x1d0 [ 27.515580] ret_from_fork_asm+0x1a/0x30 [ 27.515756] [ 27.515849] The buggy address belongs to the object at ffff8881049630a0 [ 27.515849] which belongs to the cache kmalloc-16 of size 16 [ 27.516360] The buggy address is located 8 bytes inside of [ 27.516360] allocated 9-byte region [ffff8881049630a0, ffff8881049630a9) [ 27.516707] [ 27.516773] The buggy address belongs to the physical page: [ 27.516950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963 [ 27.517363] flags: 0x200000000000000(node=0|zone=2) [ 27.517733] page_type: f5(slab) [ 27.517893] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.518230] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.518553] page dumped because: kasan: bad access detected [ 27.518754] [ 27.518817] Memory state around the buggy address: [ 27.518968] ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.519189] ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.519808] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.520294] ^ [ 27.520616] ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.520930] ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.521263] ================================================================== [ 27.631272] ================================================================== [ 27.631508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.632513] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310 [ 27.632877] [ 27.633015] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.633068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.633081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.633103] Call Trace: [ 27.633122] <TASK> [ 27.633142] dump_stack_lvl+0x73/0xb0 [ 27.633184] print_report+0xd1/0x640 [ 27.633206] ? __virt_addr_valid+0x1db/0x2d0 [ 27.633230] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.633257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.633283] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.633311] kasan_report+0x141/0x180 [ 27.633333] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.633365] kasan_check_range+0x10c/0x1c0 [ 27.633450] __kasan_check_write+0x18/0x20 [ 27.633474] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.633501] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.633530] ? ret_from_fork_asm+0x1a/0x30 [ 27.633553] ? kthread+0x337/0x6f0 [ 27.633576] kasan_bitops_generic+0x121/0x1c0 [ 27.633600] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.633625] ? __pfx_read_tsc+0x10/0x10 [ 27.633647] ? ktime_get_ts64+0x86/0x230 [ 27.633672] kunit_try_run_case+0x1a5/0x480 [ 27.633697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.633723] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.633750] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.633775] ? __kthread_parkme+0x82/0x180 [ 27.633795] ? preempt_count_sub+0x50/0x80 [ 27.633818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.633841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.633878] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.633901] kthread+0x337/0x6f0 [ 27.633921] ? trace_preempt_on+0x20/0xc0 [ 27.633955] ? __pfx_kthread+0x10/0x10 [ 27.633976] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.633999] ? calculate_sigpending+0x7b/0xa0 [ 27.634023] ? __pfx_kthread+0x10/0x10 [ 27.634045] ret_from_fork+0x116/0x1d0 [ 27.634065] ? __pfx_kthread+0x10/0x10 [ 27.634086] ret_from_fork_asm+0x1a/0x30 [ 27.634116] </TASK> [ 27.634129] [ 27.642241] Allocated by task 310: [ 27.642466] kasan_save_stack+0x45/0x70 [ 27.642657] kasan_save_track+0x18/0x40 [ 27.642818] kasan_save_alloc_info+0x3b/0x50 [ 27.643042] __kasan_kmalloc+0xb7/0xc0 [ 27.643246] __kmalloc_cache_noprof+0x189/0x420 [ 27.643420] kasan_bitops_generic+0x92/0x1c0 [ 27.643661] kunit_try_run_case+0x1a5/0x480 [ 27.643804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.643974] kthread+0x337/0x6f0 [ 27.644369] ret_from_fork+0x116/0x1d0 [ 27.644560] ret_from_fork_asm+0x1a/0x30 [ 27.644823] [ 27.644923] The buggy address belongs to the object at ffff8881049630a0 [ 27.644923] which belongs to the cache kmalloc-16 of size 16 [ 27.645436] The buggy address is located 8 bytes inside of [ 27.645436] allocated 9-byte region [ffff8881049630a0, ffff8881049630a9) [ 27.645903] [ 27.645971] The buggy address belongs to the physical page: [ 27.646158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963 [ 27.646397] flags: 0x200000000000000(node=0|zone=2) [ 27.646555] page_type: f5(slab) [ 27.646672] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.647302] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.647882] page dumped because: kasan: bad access detected [ 27.648048] [ 27.648112] Memory state around the buggy address: [ 27.648612] ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.648917] ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.649218] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.649547] ^ [ 27.649726] ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.649949] ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.650274] ================================================================== [ 27.670316] ================================================================== [ 27.671171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.671681] Read of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310 [ 27.672114] [ 27.672223] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.672271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.672283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.672305] Call Trace: [ 27.672321] <TASK> [ 27.672337] dump_stack_lvl+0x73/0xb0 [ 27.672365] print_report+0xd1/0x640 [ 27.672438] ? __virt_addr_valid+0x1db/0x2d0 [ 27.672462] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.672490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.672516] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.672544] kasan_report+0x141/0x180 [ 27.672566] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.672598] __asan_report_load8_noabort+0x18/0x20 [ 27.672622] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.672650] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.672679] ? ret_from_fork_asm+0x1a/0x30 [ 27.672703] ? kthread+0x337/0x6f0 [ 27.672727] kasan_bitops_generic+0x121/0x1c0 [ 27.672752] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.672776] ? __pfx_read_tsc+0x10/0x10 [ 27.672798] ? ktime_get_ts64+0x86/0x230 [ 27.672823] kunit_try_run_case+0x1a5/0x480 [ 27.672848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.672870] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.672896] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.672922] ? __kthread_parkme+0x82/0x180 [ 27.672953] ? preempt_count_sub+0x50/0x80 [ 27.672978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.673002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.673026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.673051] kthread+0x337/0x6f0 [ 27.673071] ? trace_preempt_on+0x20/0xc0 [ 27.673095] ? __pfx_kthread+0x10/0x10 [ 27.673117] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.673140] ? calculate_sigpending+0x7b/0xa0 [ 27.673177] ? __pfx_kthread+0x10/0x10 [ 27.673199] ret_from_fork+0x116/0x1d0 [ 27.673219] ? __pfx_kthread+0x10/0x10 [ 27.673240] ret_from_fork_asm+0x1a/0x30 [ 27.673271] </TASK> [ 27.673283] [ 27.681544] Allocated by task 310: [ 27.681682] kasan_save_stack+0x45/0x70 [ 27.681824] kasan_save_track+0x18/0x40 [ 27.682089] kasan_save_alloc_info+0x3b/0x50 [ 27.682310] __kasan_kmalloc+0xb7/0xc0 [ 27.682759] __kmalloc_cache_noprof+0x189/0x420 [ 27.682998] kasan_bitops_generic+0x92/0x1c0 [ 27.683195] kunit_try_run_case+0x1a5/0x480 [ 27.683356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.683593] kthread+0x337/0x6f0 [ 27.683749] ret_from_fork+0x116/0x1d0 [ 27.683906] ret_from_fork_asm+0x1a/0x30 [ 27.684112] [ 27.684215] The buggy address belongs to the object at ffff8881049630a0 [ 27.684215] which belongs to the cache kmalloc-16 of size 16 [ 27.684666] The buggy address is located 8 bytes inside of [ 27.684666] allocated 9-byte region [ffff8881049630a0, ffff8881049630a9) [ 27.685184] [ 27.685251] The buggy address belongs to the physical page: [ 27.685424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963 [ 27.685661] flags: 0x200000000000000(node=0|zone=2) [ 27.685821] page_type: f5(slab) [ 27.685936] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.686276] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.686660] page dumped because: kasan: bad access detected [ 27.686905] [ 27.686992] Memory state around the buggy address: [ 27.687215] ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.687680] ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.687895] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.688347] ^ [ 27.688578] ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.688829] ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.689154] ================================================================== [ 27.580774] ================================================================== [ 27.581197] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.581879] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310 [ 27.582214] [ 27.582300] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.582348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.582360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.582391] Call Trace: [ 27.582408] <TASK> [ 27.582425] dump_stack_lvl+0x73/0xb0 [ 27.582452] print_report+0xd1/0x640 [ 27.582474] ? __virt_addr_valid+0x1db/0x2d0 [ 27.582498] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.582525] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.582551] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.582578] kasan_report+0x141/0x180 [ 27.582600] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.582631] kasan_check_range+0x10c/0x1c0 [ 27.582656] __kasan_check_write+0x18/0x20 [ 27.582680] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.582707] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.582735] ? ret_from_fork_asm+0x1a/0x30 [ 27.582757] ? kthread+0x337/0x6f0 [ 27.582782] kasan_bitops_generic+0x121/0x1c0 [ 27.582806] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.582830] ? __pfx_read_tsc+0x10/0x10 [ 27.582852] ? ktime_get_ts64+0x86/0x230 [ 27.582877] kunit_try_run_case+0x1a5/0x480 [ 27.582900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.582923] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.582948] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.582973] ? __kthread_parkme+0x82/0x180 [ 27.582998] ? preempt_count_sub+0x50/0x80 [ 27.583025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.583048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.583073] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.583096] kthread+0x337/0x6f0 [ 27.583116] ? trace_preempt_on+0x20/0xc0 [ 27.583141] ? __pfx_kthread+0x10/0x10 [ 27.583173] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.583197] ? calculate_sigpending+0x7b/0xa0 [ 27.583220] ? __pfx_kthread+0x10/0x10 [ 27.583242] ret_from_fork+0x116/0x1d0 [ 27.583261] ? __pfx_kthread+0x10/0x10 [ 27.583282] ret_from_fork_asm+0x1a/0x30 [ 27.583313] </TASK> [ 27.583323] [ 27.595244] Allocated by task 310: [ 27.595465] kasan_save_stack+0x45/0x70 [ 27.595616] kasan_save_track+0x18/0x40 [ 27.595752] kasan_save_alloc_info+0x3b/0x50 [ 27.595896] __kasan_kmalloc+0xb7/0xc0 [ 27.596080] __kmalloc_cache_noprof+0x189/0x420 [ 27.596522] kasan_bitops_generic+0x92/0x1c0 [ 27.596895] kunit_try_run_case+0x1a5/0x480 [ 27.597255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.597593] kthread+0x337/0x6f0 [ 27.597827] ret_from_fork+0x116/0x1d0 [ 27.598033] ret_from_fork_asm+0x1a/0x30 [ 27.598201] [ 27.598270] The buggy address belongs to the object at ffff8881049630a0 [ 27.598270] which belongs to the cache kmalloc-16 of size 16 [ 27.599028] The buggy address is located 8 bytes inside of [ 27.599028] allocated 9-byte region [ffff8881049630a0, ffff8881049630a9) [ 27.599624] [ 27.599732] The buggy address belongs to the physical page: [ 27.599988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963 [ 27.600256] flags: 0x200000000000000(node=0|zone=2) [ 27.600421] page_type: f5(slab) [ 27.600541] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.601332] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.602122] page dumped because: kasan: bad access detected [ 27.602621] [ 27.602816] Memory state around the buggy address: [ 27.603255] ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.603799] ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.604360] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.605079] ^ [ 27.605305] ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.605908] ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.606369] ================================================================== [ 27.560654] ================================================================== [ 27.560949] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.561328] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310 [ 27.561699] [ 27.561786] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.561834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.561847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.561868] Call Trace: [ 27.561887] <TASK> [ 27.561905] dump_stack_lvl+0x73/0xb0 [ 27.561934] print_report+0xd1/0x640 [ 27.561956] ? __virt_addr_valid+0x1db/0x2d0 [ 27.561979] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.562007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.562032] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.562060] kasan_report+0x141/0x180 [ 27.562082] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.562112] kasan_check_range+0x10c/0x1c0 [ 27.562136] __kasan_check_write+0x18/0x20 [ 27.562173] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.562200] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.562230] ? ret_from_fork_asm+0x1a/0x30 [ 27.562254] ? kthread+0x337/0x6f0 [ 27.562279] kasan_bitops_generic+0x121/0x1c0 [ 27.562302] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.562327] ? __pfx_read_tsc+0x10/0x10 [ 27.562350] ? ktime_get_ts64+0x86/0x230 [ 27.562376] kunit_try_run_case+0x1a5/0x480 [ 27.562399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.562422] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.562447] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.562472] ? __kthread_parkme+0x82/0x180 [ 27.562492] ? preempt_count_sub+0x50/0x80 [ 27.562515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.562539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.562562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.562585] kthread+0x337/0x6f0 [ 27.562605] ? trace_preempt_on+0x20/0xc0 [ 27.562629] ? __pfx_kthread+0x10/0x10 [ 27.562649] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.562673] ? calculate_sigpending+0x7b/0xa0 [ 27.562697] ? __pfx_kthread+0x10/0x10 [ 27.562718] ret_from_fork+0x116/0x1d0 [ 27.562738] ? __pfx_kthread+0x10/0x10 [ 27.562807] ret_from_fork_asm+0x1a/0x30 [ 27.562841] </TASK> [ 27.562852] [ 27.571471] Allocated by task 310: [ 27.571624] kasan_save_stack+0x45/0x70 [ 27.571811] kasan_save_track+0x18/0x40 [ 27.572031] kasan_save_alloc_info+0x3b/0x50 [ 27.572216] __kasan_kmalloc+0xb7/0xc0 [ 27.572347] __kmalloc_cache_noprof+0x189/0x420 [ 27.572865] kasan_bitops_generic+0x92/0x1c0 [ 27.573218] kunit_try_run_case+0x1a5/0x480 [ 27.573513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.573717] kthread+0x337/0x6f0 [ 27.573885] ret_from_fork+0x116/0x1d0 [ 27.574079] ret_from_fork_asm+0x1a/0x30 [ 27.574231] [ 27.574329] The buggy address belongs to the object at ffff8881049630a0 [ 27.574329] which belongs to the cache kmalloc-16 of size 16 [ 27.575101] The buggy address is located 8 bytes inside of [ 27.575101] allocated 9-byte region [ffff8881049630a0, ffff8881049630a9) [ 27.575706] [ 27.575808] The buggy address belongs to the physical page: [ 27.576092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963 [ 27.576469] flags: 0x200000000000000(node=0|zone=2) [ 27.576654] page_type: f5(slab) [ 27.576820] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.577134] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.577710] page dumped because: kasan: bad access detected [ 27.577968] [ 27.578076] Memory state around the buggy address: [ 27.578513] ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.578730] ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.578935] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.579137] ^ [ 27.579352] ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.579971] ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.580343] ================================================================== [ 27.650820] ================================================================== [ 27.651165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.651784] Read of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310 [ 27.652089] [ 27.652188] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.652236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.652249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.652271] Call Trace: [ 27.652288] <TASK> [ 27.652306] dump_stack_lvl+0x73/0xb0 [ 27.652334] print_report+0xd1/0x640 [ 27.652357] ? __virt_addr_valid+0x1db/0x2d0 [ 27.652381] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.652408] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.652434] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.652463] kasan_report+0x141/0x180 [ 27.652486] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.652517] kasan_check_range+0x10c/0x1c0 [ 27.652540] __kasan_check_read+0x15/0x20 [ 27.652624] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.652657] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.652687] ? ret_from_fork_asm+0x1a/0x30 [ 27.652710] ? kthread+0x337/0x6f0 [ 27.652734] kasan_bitops_generic+0x121/0x1c0 [ 27.652758] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.652782] ? __pfx_read_tsc+0x10/0x10 [ 27.652805] ? ktime_get_ts64+0x86/0x230 [ 27.652829] kunit_try_run_case+0x1a5/0x480 [ 27.652855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.652876] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.652902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.652927] ? __kthread_parkme+0x82/0x180 [ 27.652960] ? preempt_count_sub+0x50/0x80 [ 27.652983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.653008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.653031] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.653055] kthread+0x337/0x6f0 [ 27.653075] ? trace_preempt_on+0x20/0xc0 [ 27.653100] ? __pfx_kthread+0x10/0x10 [ 27.653121] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.653156] ? calculate_sigpending+0x7b/0xa0 [ 27.653181] ? __pfx_kthread+0x10/0x10 [ 27.653202] ret_from_fork+0x116/0x1d0 [ 27.653223] ? __pfx_kthread+0x10/0x10 [ 27.653244] ret_from_fork_asm+0x1a/0x30 [ 27.653274] </TASK> [ 27.653285] [ 27.661679] Allocated by task 310: [ 27.661866] kasan_save_stack+0x45/0x70 [ 27.662118] kasan_save_track+0x18/0x40 [ 27.662379] kasan_save_alloc_info+0x3b/0x50 [ 27.662588] __kasan_kmalloc+0xb7/0xc0 [ 27.662739] __kmalloc_cache_noprof+0x189/0x420 [ 27.662956] kasan_bitops_generic+0x92/0x1c0 [ 27.663295] kunit_try_run_case+0x1a5/0x480 [ 27.663548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.663841] kthread+0x337/0x6f0 [ 27.664036] ret_from_fork+0x116/0x1d0 [ 27.664231] ret_from_fork_asm+0x1a/0x30 [ 27.664466] [ 27.664552] The buggy address belongs to the object at ffff8881049630a0 [ 27.664552] which belongs to the cache kmalloc-16 of size 16 [ 27.665023] The buggy address is located 8 bytes inside of [ 27.665023] allocated 9-byte region [ffff8881049630a0, ffff8881049630a9) [ 27.665375] [ 27.665443] The buggy address belongs to the physical page: [ 27.665617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963 [ 27.665851] flags: 0x200000000000000(node=0|zone=2) [ 27.666008] page_type: f5(slab) [ 27.666123] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.666823] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.667434] page dumped because: kasan: bad access detected [ 27.667688] [ 27.667775] Memory state around the buggy address: [ 27.668041] ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.668308] ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.668519] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.668732] ^ [ 27.668882] ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.669367] ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.669709] ================================================================== [ 27.607139] ================================================================== [ 27.607432] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.607903] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310 [ 27.608212] [ 27.608363] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.608457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.608469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.608491] Call Trace: [ 27.608511] <TASK> [ 27.608542] dump_stack_lvl+0x73/0xb0 [ 27.608574] print_report+0xd1/0x640 [ 27.608597] ? __virt_addr_valid+0x1db/0x2d0 [ 27.608633] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.608660] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.608687] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.608714] kasan_report+0x141/0x180 [ 27.608745] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.608776] kasan_check_range+0x10c/0x1c0 [ 27.608811] __kasan_check_write+0x18/0x20 [ 27.608835] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.608862] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.608891] ? ret_from_fork_asm+0x1a/0x30 [ 27.608915] ? kthread+0x337/0x6f0 [ 27.608950] kasan_bitops_generic+0x121/0x1c0 [ 27.608974] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.609008] ? __pfx_read_tsc+0x10/0x10 [ 27.609030] ? ktime_get_ts64+0x86/0x230 [ 27.609066] kunit_try_run_case+0x1a5/0x480 [ 27.609091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.609114] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.609139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.609174] ? __kthread_parkme+0x82/0x180 [ 27.609194] ? preempt_count_sub+0x50/0x80 [ 27.609218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.609242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.609266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.609289] kthread+0x337/0x6f0 [ 27.609308] ? trace_preempt_on+0x20/0xc0 [ 27.609333] ? __pfx_kthread+0x10/0x10 [ 27.609353] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.609377] ? calculate_sigpending+0x7b/0xa0 [ 27.609400] ? __pfx_kthread+0x10/0x10 [ 27.609423] ret_from_fork+0x116/0x1d0 [ 27.609443] ? __pfx_kthread+0x10/0x10 [ 27.609464] ret_from_fork_asm+0x1a/0x30 [ 27.609504] </TASK> [ 27.609516] [ 27.620503] Allocated by task 310: [ 27.620647] kasan_save_stack+0x45/0x70 [ 27.620796] kasan_save_track+0x18/0x40 [ 27.621028] kasan_save_alloc_info+0x3b/0x50 [ 27.621467] __kasan_kmalloc+0xb7/0xc0 [ 27.621656] __kmalloc_cache_noprof+0x189/0x420 [ 27.621811] kasan_bitops_generic+0x92/0x1c0 [ 27.621955] kunit_try_run_case+0x1a5/0x480 [ 27.622153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.622424] kthread+0x337/0x6f0 [ 27.622627] ret_from_fork+0x116/0x1d0 [ 27.622872] ret_from_fork_asm+0x1a/0x30 [ 27.623237] [ 27.623578] The buggy address belongs to the object at ffff8881049630a0 [ 27.623578] which belongs to the cache kmalloc-16 of size 16 [ 27.624070] The buggy address is located 8 bytes inside of [ 27.624070] allocated 9-byte region [ffff8881049630a0, ffff8881049630a9) [ 27.624896] [ 27.625034] The buggy address belongs to the physical page: [ 27.625299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963 [ 27.625807] flags: 0x200000000000000(node=0|zone=2) [ 27.625967] page_type: f5(slab) [ 27.626131] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.626659] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.627526] page dumped because: kasan: bad access detected [ 27.627795] [ 27.627884] Memory state around the buggy address: [ 27.628417] ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.628713] ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.629033] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.629442] ^ [ 27.629761] ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.630220] ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.630715] ================================================================== [ 27.541066] ================================================================== [ 27.541321] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.542010] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310 [ 27.542248] [ 27.542334] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.542381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.542394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.542415] Call Trace: [ 27.542435] <TASK> [ 27.542453] dump_stack_lvl+0x73/0xb0 [ 27.542482] print_report+0xd1/0x640 [ 27.542503] ? __virt_addr_valid+0x1db/0x2d0 [ 27.542527] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.542554] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.542579] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.542606] kasan_report+0x141/0x180 [ 27.542628] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.542659] kasan_check_range+0x10c/0x1c0 [ 27.542725] __kasan_check_write+0x18/0x20 [ 27.542749] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.542776] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.542805] ? ret_from_fork_asm+0x1a/0x30 [ 27.542828] ? kthread+0x337/0x6f0 [ 27.542851] kasan_bitops_generic+0x121/0x1c0 [ 27.542875] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.542899] ? __pfx_read_tsc+0x10/0x10 [ 27.542921] ? ktime_get_ts64+0x86/0x230 [ 27.542946] kunit_try_run_case+0x1a5/0x480 [ 27.542971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.542994] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.543020] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.543045] ? __kthread_parkme+0x82/0x180 [ 27.543066] ? preempt_count_sub+0x50/0x80 [ 27.543089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.543113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.543137] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.543174] kthread+0x337/0x6f0 [ 27.543194] ? trace_preempt_on+0x20/0xc0 [ 27.543218] ? __pfx_kthread+0x10/0x10 [ 27.543239] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.543262] ? calculate_sigpending+0x7b/0xa0 [ 27.543287] ? __pfx_kthread+0x10/0x10 [ 27.543308] ret_from_fork+0x116/0x1d0 [ 27.543328] ? __pfx_kthread+0x10/0x10 [ 27.543349] ret_from_fork_asm+0x1a/0x30 [ 27.543380] </TASK> [ 27.543392] [ 27.551831] Allocated by task 310: [ 27.552025] kasan_save_stack+0x45/0x70 [ 27.552237] kasan_save_track+0x18/0x40 [ 27.552488] kasan_save_alloc_info+0x3b/0x50 [ 27.552692] __kasan_kmalloc+0xb7/0xc0 [ 27.552872] __kmalloc_cache_noprof+0x189/0x420 [ 27.553191] kasan_bitops_generic+0x92/0x1c0 [ 27.553342] kunit_try_run_case+0x1a5/0x480 [ 27.553735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.554066] kthread+0x337/0x6f0 [ 27.554223] ret_from_fork+0x116/0x1d0 [ 27.554463] ret_from_fork_asm+0x1a/0x30 [ 27.554625] [ 27.554716] The buggy address belongs to the object at ffff8881049630a0 [ 27.554716] which belongs to the cache kmalloc-16 of size 16 [ 27.555186] The buggy address is located 8 bytes inside of [ 27.555186] allocated 9-byte region [ffff8881049630a0, ffff8881049630a9) [ 27.555654] [ 27.555733] The buggy address belongs to the physical page: [ 27.555911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963 [ 27.556288] flags: 0x200000000000000(node=0|zone=2) [ 27.556512] page_type: f5(slab) [ 27.556674] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.557022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.557508] page dumped because: kasan: bad access detected [ 27.557701] [ 27.557788] Memory state around the buggy address: [ 27.558076] ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.558363] ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.558645] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.558918] ^ [ 27.559318] ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.559843] ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.560156] ================================================================== [ 27.521764] ================================================================== [ 27.522134] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.522768] Write of size 8 at addr ffff8881049630a8 by task kunit_try_catch/310 [ 27.523091] [ 27.523191] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 27.523239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.523252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.523273] Call Trace: [ 27.523288] <TASK> [ 27.523304] dump_stack_lvl+0x73/0xb0 [ 27.523330] print_report+0xd1/0x640 [ 27.523352] ? __virt_addr_valid+0x1db/0x2d0 [ 27.523389] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.523415] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.523441] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.523468] kasan_report+0x141/0x180 [ 27.523490] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.523522] kasan_check_range+0x10c/0x1c0 [ 27.523545] __kasan_check_write+0x18/0x20 [ 27.523568] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.523596] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.523628] ? ret_from_fork_asm+0x1a/0x30 [ 27.523652] ? kthread+0x337/0x6f0 [ 27.523676] kasan_bitops_generic+0x121/0x1c0 [ 27.523700] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.523724] ? __pfx_read_tsc+0x10/0x10 [ 27.523747] ? ktime_get_ts64+0x86/0x230 [ 27.523772] kunit_try_run_case+0x1a5/0x480 [ 27.523797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.523819] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.523844] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.523871] ? __kthread_parkme+0x82/0x180 [ 27.523891] ? preempt_count_sub+0x50/0x80 [ 27.523914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.523939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.524012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.524036] kthread+0x337/0x6f0 [ 27.524056] ? trace_preempt_on+0x20/0xc0 [ 27.524081] ? __pfx_kthread+0x10/0x10 [ 27.524102] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.524125] ? calculate_sigpending+0x7b/0xa0 [ 27.524159] ? __pfx_kthread+0x10/0x10 [ 27.524181] ret_from_fork+0x116/0x1d0 [ 27.524201] ? __pfx_kthread+0x10/0x10 [ 27.524222] ret_from_fork_asm+0x1a/0x30 [ 27.524253] </TASK> [ 27.524265] [ 27.532112] Allocated by task 310: [ 27.532254] kasan_save_stack+0x45/0x70 [ 27.532401] kasan_save_track+0x18/0x40 [ 27.532697] kasan_save_alloc_info+0x3b/0x50 [ 27.532903] __kasan_kmalloc+0xb7/0xc0 [ 27.533282] __kmalloc_cache_noprof+0x189/0x420 [ 27.533497] kasan_bitops_generic+0x92/0x1c0 [ 27.533698] kunit_try_run_case+0x1a5/0x480 [ 27.533899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.534119] kthread+0x337/0x6f0 [ 27.534248] ret_from_fork+0x116/0x1d0 [ 27.534381] ret_from_fork_asm+0x1a/0x30 [ 27.534516] [ 27.534580] The buggy address belongs to the object at ffff8881049630a0 [ 27.534580] which belongs to the cache kmalloc-16 of size 16 [ 27.535372] The buggy address is located 8 bytes inside of [ 27.535372] allocated 9-byte region [ffff8881049630a0, ffff8881049630a9) [ 27.535947] [ 27.536040] The buggy address belongs to the physical page: [ 27.536312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104963 [ 27.536650] flags: 0x200000000000000(node=0|zone=2) [ 27.536815] page_type: f5(slab) [ 27.536933] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.537285] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.537946] page dumped because: kasan: bad access detected [ 27.538124] [ 27.538199] Memory state around the buggy address: [ 27.538353] ffff888104962f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.538620] ffff888104963000: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.538934] >ffff888104963080: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.539740] ^ [ 27.539982] ffff888104963100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.540285] ffff888104963180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.540578] ==================================================================