Date
June 16, 2025, 7:07 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.742993] ================================================================== [ 13.743301] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.744227] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.745066] [ 13.745180] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.745224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.745236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.745256] Call Trace: [ 13.745272] <TASK> [ 13.745286] dump_stack_lvl+0x73/0xb0 [ 13.745315] print_report+0xd1/0x650 [ 13.745336] ? __virt_addr_valid+0x1db/0x2d0 [ 13.745357] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.745383] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.745666] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.745702] kasan_report+0x141/0x180 [ 13.745725] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.745755] kasan_check_range+0x10c/0x1c0 [ 13.745778] __kasan_check_write+0x18/0x20 [ 13.745796] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.745822] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.745849] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.745872] ? trace_hardirqs_on+0x37/0xe0 [ 13.745893] ? kasan_bitops_generic+0x92/0x1c0 [ 13.745918] kasan_bitops_generic+0x121/0x1c0 [ 13.745952] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.745976] ? __pfx_read_tsc+0x10/0x10 [ 13.745996] ? ktime_get_ts64+0x86/0x230 [ 13.746020] kunit_try_run_case+0x1a5/0x480 [ 13.746043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.746065] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.746087] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.746108] ? __kthread_parkme+0x82/0x180 [ 13.746128] ? preempt_count_sub+0x50/0x80 [ 13.746150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.746173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.746195] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.746217] kthread+0x337/0x6f0 [ 13.746236] ? trace_preempt_on+0x20/0xc0 [ 13.746257] ? __pfx_kthread+0x10/0x10 [ 13.746277] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.746298] ? calculate_sigpending+0x7b/0xa0 [ 13.746322] ? __pfx_kthread+0x10/0x10 [ 13.746343] ret_from_fork+0x116/0x1d0 [ 13.746361] ? __pfx_kthread+0x10/0x10 [ 13.746381] ret_from_fork_asm+0x1a/0x30 [ 13.746465] </TASK> [ 13.746476] [ 13.757250] Allocated by task 286: [ 13.757862] kasan_save_stack+0x45/0x70 [ 13.758046] kasan_save_track+0x18/0x40 [ 13.758208] kasan_save_alloc_info+0x3b/0x50 [ 13.758573] __kasan_kmalloc+0xb7/0xc0 [ 13.758766] __kmalloc_cache_noprof+0x189/0x420 [ 13.758981] kasan_bitops_generic+0x92/0x1c0 [ 13.759175] kunit_try_run_case+0x1a5/0x480 [ 13.759362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.759662] kthread+0x337/0x6f0 [ 13.759815] ret_from_fork+0x116/0x1d0 [ 13.759990] ret_from_fork_asm+0x1a/0x30 [ 13.760166] [ 13.760251] The buggy address belongs to the object at ffff8881025394a0 [ 13.760251] which belongs to the cache kmalloc-16 of size 16 [ 13.761238] The buggy address is located 8 bytes inside of [ 13.761238] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.761979] [ 13.762078] The buggy address belongs to the physical page: [ 13.762310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.762832] flags: 0x200000000000000(node=0|zone=2) [ 13.763078] page_type: f5(slab) [ 13.763232] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.763651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.763968] page dumped because: kasan: bad access detected [ 13.764202] [ 13.764285] Memory state around the buggy address: [ 13.764547] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.764833] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.765123] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.765459] ^ [ 13.765657] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.765940] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.766165] ================================================================== [ 13.789240] ================================================================== [ 13.789661] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.790084] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.790355] [ 13.790519] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.790564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.790574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.790594] Call Trace: [ 13.790611] <TASK> [ 13.790627] dump_stack_lvl+0x73/0xb0 [ 13.790655] print_report+0xd1/0x650 [ 13.790675] ? __virt_addr_valid+0x1db/0x2d0 [ 13.790697] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.790723] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.790744] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.790770] kasan_report+0x141/0x180 [ 13.790790] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.790821] kasan_check_range+0x10c/0x1c0 [ 13.790843] __kasan_check_write+0x18/0x20 [ 13.790861] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.790888] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.790915] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.790949] ? trace_hardirqs_on+0x37/0xe0 [ 13.790971] ? kasan_bitops_generic+0x92/0x1c0 [ 13.790997] kasan_bitops_generic+0x121/0x1c0 [ 13.791020] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.791044] ? __pfx_read_tsc+0x10/0x10 [ 13.791064] ? ktime_get_ts64+0x86/0x230 [ 13.791097] kunit_try_run_case+0x1a5/0x480 [ 13.791122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.791143] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.791166] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.791187] ? __kthread_parkme+0x82/0x180 [ 13.791206] ? preempt_count_sub+0x50/0x80 [ 13.791229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.791252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.791274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.791296] kthread+0x337/0x6f0 [ 13.791315] ? trace_preempt_on+0x20/0xc0 [ 13.791336] ? __pfx_kthread+0x10/0x10 [ 13.791357] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.791376] ? calculate_sigpending+0x7b/0xa0 [ 13.791399] ? __pfx_kthread+0x10/0x10 [ 13.791419] ret_from_fork+0x116/0x1d0 [ 13.791437] ? __pfx_kthread+0x10/0x10 [ 13.791456] ret_from_fork_asm+0x1a/0x30 [ 13.791486] </TASK> [ 13.791496] [ 13.800053] Allocated by task 286: [ 13.800174] kasan_save_stack+0x45/0x70 [ 13.800307] kasan_save_track+0x18/0x40 [ 13.800642] kasan_save_alloc_info+0x3b/0x50 [ 13.800852] __kasan_kmalloc+0xb7/0xc0 [ 13.801051] __kmalloc_cache_noprof+0x189/0x420 [ 13.801267] kasan_bitops_generic+0x92/0x1c0 [ 13.801588] kunit_try_run_case+0x1a5/0x480 [ 13.801892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.802150] kthread+0x337/0x6f0 [ 13.802266] ret_from_fork+0x116/0x1d0 [ 13.802494] ret_from_fork_asm+0x1a/0x30 [ 13.802704] [ 13.802789] The buggy address belongs to the object at ffff8881025394a0 [ 13.802789] which belongs to the cache kmalloc-16 of size 16 [ 13.803237] The buggy address is located 8 bytes inside of [ 13.803237] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.803717] [ 13.803807] The buggy address belongs to the physical page: [ 13.804076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.804391] flags: 0x200000000000000(node=0|zone=2) [ 13.804612] page_type: f5(slab) [ 13.804739] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.805077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.805294] page dumped because: kasan: bad access detected [ 13.805616] [ 13.805706] Memory state around the buggy address: [ 13.805959] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.806212] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.806419] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.806989] ^ [ 13.807145] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.807500] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.807764] ================================================================== [ 13.827591] ================================================================== [ 13.827951] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.828270] Read of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.829331] [ 13.829579] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.829638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.829650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.829673] Call Trace: [ 13.829696] <TASK> [ 13.829714] dump_stack_lvl+0x73/0xb0 [ 13.829746] print_report+0xd1/0x650 [ 13.829767] ? __virt_addr_valid+0x1db/0x2d0 [ 13.829789] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.829815] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.829835] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.829862] kasan_report+0x141/0x180 [ 13.829883] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.829914] kasan_check_range+0x10c/0x1c0 [ 13.829946] __kasan_check_read+0x15/0x20 [ 13.829964] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.829991] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.830018] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.830041] ? trace_hardirqs_on+0x37/0xe0 [ 13.830063] ? kasan_bitops_generic+0x92/0x1c0 [ 13.830089] kasan_bitops_generic+0x121/0x1c0 [ 13.830112] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.830135] ? __pfx_read_tsc+0x10/0x10 [ 13.830156] ? ktime_get_ts64+0x86/0x230 [ 13.830181] kunit_try_run_case+0x1a5/0x480 [ 13.830205] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.830226] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.830249] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.830271] ? __kthread_parkme+0x82/0x180 [ 13.830291] ? preempt_count_sub+0x50/0x80 [ 13.830314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.830336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.830358] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.830513] kthread+0x337/0x6f0 [ 13.830540] ? trace_preempt_on+0x20/0xc0 [ 13.830563] ? __pfx_kthread+0x10/0x10 [ 13.830583] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.830603] ? calculate_sigpending+0x7b/0xa0 [ 13.830628] ? __pfx_kthread+0x10/0x10 [ 13.830691] ret_from_fork+0x116/0x1d0 [ 13.830710] ? __pfx_kthread+0x10/0x10 [ 13.830730] ret_from_fork_asm+0x1a/0x30 [ 13.830760] </TASK> [ 13.830772] [ 13.841332] Allocated by task 286: [ 13.841497] kasan_save_stack+0x45/0x70 [ 13.841672] kasan_save_track+0x18/0x40 [ 13.841806] kasan_save_alloc_info+0x3b/0x50 [ 13.842057] __kasan_kmalloc+0xb7/0xc0 [ 13.842349] __kmalloc_cache_noprof+0x189/0x420 [ 13.842582] kasan_bitops_generic+0x92/0x1c0 [ 13.842815] kunit_try_run_case+0x1a5/0x480 [ 13.843056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.843225] kthread+0x337/0x6f0 [ 13.843414] ret_from_fork+0x116/0x1d0 [ 13.843597] ret_from_fork_asm+0x1a/0x30 [ 13.843772] [ 13.843859] The buggy address belongs to the object at ffff8881025394a0 [ 13.843859] which belongs to the cache kmalloc-16 of size 16 [ 13.844307] The buggy address is located 8 bytes inside of [ 13.844307] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.844781] [ 13.844850] The buggy address belongs to the physical page: [ 13.845029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.845332] flags: 0x200000000000000(node=0|zone=2) [ 13.845592] page_type: f5(slab) [ 13.845912] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.846236] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.846492] page dumped because: kasan: bad access detected [ 13.846657] [ 13.846720] Memory state around the buggy address: [ 13.846866] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.847159] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.847470] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.847782] ^ [ 13.848022] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.848451] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.848678] ================================================================== [ 13.690259] ================================================================== [ 13.691204] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.693186] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.693621] [ 13.694636] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.694696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.694708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.694731] Call Trace: [ 13.694751] <TASK> [ 13.694770] dump_stack_lvl+0x73/0xb0 [ 13.694803] print_report+0xd1/0x650 [ 13.694826] ? __virt_addr_valid+0x1db/0x2d0 [ 13.694850] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.694876] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.694898] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.694923] kasan_report+0x141/0x180 [ 13.694963] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.694994] kasan_check_range+0x10c/0x1c0 [ 13.695016] __kasan_check_write+0x18/0x20 [ 13.695035] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.695062] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.695088] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.695111] ? trace_hardirqs_on+0x37/0xe0 [ 13.695135] ? kasan_bitops_generic+0x92/0x1c0 [ 13.695161] kasan_bitops_generic+0x121/0x1c0 [ 13.695183] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.695208] ? __pfx_read_tsc+0x10/0x10 [ 13.695230] ? ktime_get_ts64+0x86/0x230 [ 13.695256] kunit_try_run_case+0x1a5/0x480 [ 13.695280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.695302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.695324] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.695346] ? __kthread_parkme+0x82/0x180 [ 13.695366] ? preempt_count_sub+0x50/0x80 [ 13.695460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.695483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.695506] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.695529] kthread+0x337/0x6f0 [ 13.695548] ? trace_preempt_on+0x20/0xc0 [ 13.695570] ? __pfx_kthread+0x10/0x10 [ 13.695590] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.695610] ? calculate_sigpending+0x7b/0xa0 [ 13.695634] ? __pfx_kthread+0x10/0x10 [ 13.695654] ret_from_fork+0x116/0x1d0 [ 13.695672] ? __pfx_kthread+0x10/0x10 [ 13.695692] ret_from_fork_asm+0x1a/0x30 [ 13.695722] </TASK> [ 13.695734] [ 13.705331] Allocated by task 286: [ 13.705572] kasan_save_stack+0x45/0x70 [ 13.705764] kasan_save_track+0x18/0x40 [ 13.705920] kasan_save_alloc_info+0x3b/0x50 [ 13.706080] __kasan_kmalloc+0xb7/0xc0 [ 13.706205] __kmalloc_cache_noprof+0x189/0x420 [ 13.706357] kasan_bitops_generic+0x92/0x1c0 [ 13.706863] kunit_try_run_case+0x1a5/0x480 [ 13.707088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.707257] kthread+0x337/0x6f0 [ 13.707371] ret_from_fork+0x116/0x1d0 [ 13.708015] ret_from_fork_asm+0x1a/0x30 [ 13.708221] [ 13.708313] The buggy address belongs to the object at ffff8881025394a0 [ 13.708313] which belongs to the cache kmalloc-16 of size 16 [ 13.709789] The buggy address is located 8 bytes inside of [ 13.709789] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.710274] [ 13.710371] The buggy address belongs to the physical page: [ 13.710607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.710976] flags: 0x200000000000000(node=0|zone=2) [ 13.711183] page_type: f5(slab) [ 13.711325] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.711657] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.712002] page dumped because: kasan: bad access detected [ 13.712235] [ 13.712309] Memory state around the buggy address: [ 13.712791] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.713041] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.713364] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.713698] ^ [ 13.713912] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.714213] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.714600] ================================================================== [ 13.766766] ================================================================== [ 13.767122] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.767577] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.767802] [ 13.767880] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.767925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.767948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.767970] Call Trace: [ 13.767988] <TASK> [ 13.768004] dump_stack_lvl+0x73/0xb0 [ 13.768032] print_report+0xd1/0x650 [ 13.768053] ? __virt_addr_valid+0x1db/0x2d0 [ 13.768075] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.768101] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.768122] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.768148] kasan_report+0x141/0x180 [ 13.768169] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.768200] kasan_check_range+0x10c/0x1c0 [ 13.768222] __kasan_check_write+0x18/0x20 [ 13.768241] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.768266] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.768293] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.768317] ? trace_hardirqs_on+0x37/0xe0 [ 13.768339] ? kasan_bitops_generic+0x92/0x1c0 [ 13.768365] kasan_bitops_generic+0x121/0x1c0 [ 13.768388] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.768413] ? __pfx_read_tsc+0x10/0x10 [ 13.768435] ? ktime_get_ts64+0x86/0x230 [ 13.768459] kunit_try_run_case+0x1a5/0x480 [ 13.768483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.768504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.768526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.768549] ? __kthread_parkme+0x82/0x180 [ 13.768568] ? preempt_count_sub+0x50/0x80 [ 13.768592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.768614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.768636] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.768658] kthread+0x337/0x6f0 [ 13.768677] ? trace_preempt_on+0x20/0xc0 [ 13.768698] ? __pfx_kthread+0x10/0x10 [ 13.768719] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.768738] ? calculate_sigpending+0x7b/0xa0 [ 13.768761] ? __pfx_kthread+0x10/0x10 [ 13.768781] ret_from_fork+0x116/0x1d0 [ 13.768799] ? __pfx_kthread+0x10/0x10 [ 13.768818] ret_from_fork_asm+0x1a/0x30 [ 13.768849] </TASK> [ 13.768859] [ 13.780950] Allocated by task 286: [ 13.781168] kasan_save_stack+0x45/0x70 [ 13.781366] kasan_save_track+0x18/0x40 [ 13.781587] kasan_save_alloc_info+0x3b/0x50 [ 13.781737] __kasan_kmalloc+0xb7/0xc0 [ 13.781999] __kmalloc_cache_noprof+0x189/0x420 [ 13.782222] kasan_bitops_generic+0x92/0x1c0 [ 13.782436] kunit_try_run_case+0x1a5/0x480 [ 13.782708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.783007] kthread+0x337/0x6f0 [ 13.783153] ret_from_fork+0x116/0x1d0 [ 13.783404] ret_from_fork_asm+0x1a/0x30 [ 13.783581] [ 13.783662] The buggy address belongs to the object at ffff8881025394a0 [ 13.783662] which belongs to the cache kmalloc-16 of size 16 [ 13.784130] The buggy address is located 8 bytes inside of [ 13.784130] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.784470] [ 13.784598] The buggy address belongs to the physical page: [ 13.784849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.785324] flags: 0x200000000000000(node=0|zone=2) [ 13.785541] page_type: f5(slab) [ 13.785672] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.785982] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.786202] page dumped because: kasan: bad access detected [ 13.786364] [ 13.786426] Memory state around the buggy address: [ 13.786571] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.787051] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.787693] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.787965] ^ [ 13.788173] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.788385] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.788693] ================================================================== [ 13.715055] ================================================================== [ 13.715387] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.716086] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.716886] [ 13.717019] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.717072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.717083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.717103] Call Trace: [ 13.717120] <TASK> [ 13.717135] dump_stack_lvl+0x73/0xb0 [ 13.717165] print_report+0xd1/0x650 [ 13.717186] ? __virt_addr_valid+0x1db/0x2d0 [ 13.717208] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.717233] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.717254] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.717282] kasan_report+0x141/0x180 [ 13.717302] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.717333] kasan_check_range+0x10c/0x1c0 [ 13.717356] __kasan_check_write+0x18/0x20 [ 13.717374] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.717503] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.717538] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.717564] ? trace_hardirqs_on+0x37/0xe0 [ 13.717587] ? kasan_bitops_generic+0x92/0x1c0 [ 13.717613] kasan_bitops_generic+0x121/0x1c0 [ 13.717636] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.717706] ? __pfx_read_tsc+0x10/0x10 [ 13.717726] ? ktime_get_ts64+0x86/0x230 [ 13.717752] kunit_try_run_case+0x1a5/0x480 [ 13.717775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.717796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.717818] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.717840] ? __kthread_parkme+0x82/0x180 [ 13.717859] ? preempt_count_sub+0x50/0x80 [ 13.717882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.717904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.717927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.717959] kthread+0x337/0x6f0 [ 13.717978] ? trace_preempt_on+0x20/0xc0 [ 13.718000] ? __pfx_kthread+0x10/0x10 [ 13.718020] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.718040] ? calculate_sigpending+0x7b/0xa0 [ 13.718064] ? __pfx_kthread+0x10/0x10 [ 13.718085] ret_from_fork+0x116/0x1d0 [ 13.718103] ? __pfx_kthread+0x10/0x10 [ 13.718123] ret_from_fork_asm+0x1a/0x30 [ 13.718153] </TASK> [ 13.718165] [ 13.730330] Allocated by task 286: [ 13.730598] kasan_save_stack+0x45/0x70 [ 13.730790] kasan_save_track+0x18/0x40 [ 13.730977] kasan_save_alloc_info+0x3b/0x50 [ 13.731170] __kasan_kmalloc+0xb7/0xc0 [ 13.731341] __kmalloc_cache_noprof+0x189/0x420 [ 13.731585] kasan_bitops_generic+0x92/0x1c0 [ 13.731775] kunit_try_run_case+0x1a5/0x480 [ 13.731971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.732201] kthread+0x337/0x6f0 [ 13.732351] ret_from_fork+0x116/0x1d0 [ 13.733262] ret_from_fork_asm+0x1a/0x30 [ 13.733762] [ 13.733876] The buggy address belongs to the object at ffff8881025394a0 [ 13.733876] which belongs to the cache kmalloc-16 of size 16 [ 13.734832] The buggy address is located 8 bytes inside of [ 13.734832] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.735328] [ 13.735762] The buggy address belongs to the physical page: [ 13.736099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.736785] flags: 0x200000000000000(node=0|zone=2) [ 13.737240] page_type: f5(slab) [ 13.737581] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.737906] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.738214] page dumped because: kasan: bad access detected [ 13.738754] [ 13.739012] Memory state around the buggy address: [ 13.739349] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.739716] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.740019] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.740297] ^ [ 13.740946] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.741376] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.742094] ================================================================== [ 13.671087] ================================================================== [ 13.671605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.671978] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.672250] [ 13.672351] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.672393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.672456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.672476] Call Trace: [ 13.672489] <TASK> [ 13.672504] dump_stack_lvl+0x73/0xb0 [ 13.672529] print_report+0xd1/0x650 [ 13.672550] ? __virt_addr_valid+0x1db/0x2d0 [ 13.672571] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.672597] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.672617] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.672644] kasan_report+0x141/0x180 [ 13.672665] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.672696] kasan_check_range+0x10c/0x1c0 [ 13.672719] __kasan_check_write+0x18/0x20 [ 13.672737] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.672763] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.672791] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.672814] ? trace_hardirqs_on+0x37/0xe0 [ 13.672835] ? kasan_bitops_generic+0x92/0x1c0 [ 13.672861] kasan_bitops_generic+0x121/0x1c0 [ 13.672884] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.672908] ? __pfx_read_tsc+0x10/0x10 [ 13.672928] ? ktime_get_ts64+0x86/0x230 [ 13.672966] kunit_try_run_case+0x1a5/0x480 [ 13.672989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.673010] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.673032] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.673054] ? __kthread_parkme+0x82/0x180 [ 13.673074] ? preempt_count_sub+0x50/0x80 [ 13.673096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.673119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.673141] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.673163] kthread+0x337/0x6f0 [ 13.673182] ? trace_preempt_on+0x20/0xc0 [ 13.673203] ? __pfx_kthread+0x10/0x10 [ 13.673224] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.673243] ? calculate_sigpending+0x7b/0xa0 [ 13.673267] ? __pfx_kthread+0x10/0x10 [ 13.673288] ret_from_fork+0x116/0x1d0 [ 13.673305] ? __pfx_kthread+0x10/0x10 [ 13.673325] ret_from_fork_asm+0x1a/0x30 [ 13.673355] </TASK> [ 13.673366] [ 13.681699] Allocated by task 286: [ 13.681856] kasan_save_stack+0x45/0x70 [ 13.682010] kasan_save_track+0x18/0x40 [ 13.682140] kasan_save_alloc_info+0x3b/0x50 [ 13.682280] __kasan_kmalloc+0xb7/0xc0 [ 13.682403] __kmalloc_cache_noprof+0x189/0x420 [ 13.682778] kasan_bitops_generic+0x92/0x1c0 [ 13.683004] kunit_try_run_case+0x1a5/0x480 [ 13.683211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.683450] kthread+0x337/0x6f0 [ 13.683615] ret_from_fork+0x116/0x1d0 [ 13.683768] ret_from_fork_asm+0x1a/0x30 [ 13.683900] [ 13.683972] The buggy address belongs to the object at ffff8881025394a0 [ 13.683972] which belongs to the cache kmalloc-16 of size 16 [ 13.684336] The buggy address is located 8 bytes inside of [ 13.684336] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.685747] [ 13.685844] The buggy address belongs to the physical page: [ 13.686090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.686489] flags: 0x200000000000000(node=0|zone=2) [ 13.686659] page_type: f5(slab) [ 13.686778] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.687104] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.687502] page dumped because: kasan: bad access detected [ 13.687726] [ 13.687791] Memory state around the buggy address: [ 13.687998] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.688207] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.688501] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.688825] ^ [ 13.689052] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.689372] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.689797] ================================================================== [ 13.849143] ================================================================== [ 13.849425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.849701] Read of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.849992] [ 13.850095] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.850138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.850148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.850167] Call Trace: [ 13.850183] <TASK> [ 13.850197] dump_stack_lvl+0x73/0xb0 [ 13.850222] print_report+0xd1/0x650 [ 13.850244] ? __virt_addr_valid+0x1db/0x2d0 [ 13.850266] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.850293] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.850315] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.850341] kasan_report+0x141/0x180 [ 13.850362] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.850418] __asan_report_load8_noabort+0x18/0x20 [ 13.850442] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.850468] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.850495] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.850518] ? trace_hardirqs_on+0x37/0xe0 [ 13.850541] ? kasan_bitops_generic+0x92/0x1c0 [ 13.850567] kasan_bitops_generic+0x121/0x1c0 [ 13.850589] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.850613] ? __pfx_read_tsc+0x10/0x10 [ 13.850633] ? ktime_get_ts64+0x86/0x230 [ 13.850657] kunit_try_run_case+0x1a5/0x480 [ 13.850680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.850701] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.850723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.850744] ? __kthread_parkme+0x82/0x180 [ 13.850763] ? preempt_count_sub+0x50/0x80 [ 13.850787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.850809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.850831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.850853] kthread+0x337/0x6f0 [ 13.850872] ? trace_preempt_on+0x20/0xc0 [ 13.850894] ? __pfx_kthread+0x10/0x10 [ 13.850913] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.850941] ? calculate_sigpending+0x7b/0xa0 [ 13.850965] ? __pfx_kthread+0x10/0x10 [ 13.850986] ret_from_fork+0x116/0x1d0 [ 13.851004] ? __pfx_kthread+0x10/0x10 [ 13.851024] ret_from_fork_asm+0x1a/0x30 [ 13.851054] </TASK> [ 13.851064] [ 13.859273] Allocated by task 286: [ 13.859515] kasan_save_stack+0x45/0x70 [ 13.859703] kasan_save_track+0x18/0x40 [ 13.859877] kasan_save_alloc_info+0x3b/0x50 [ 13.860051] __kasan_kmalloc+0xb7/0xc0 [ 13.860176] __kmalloc_cache_noprof+0x189/0x420 [ 13.860323] kasan_bitops_generic+0x92/0x1c0 [ 13.860464] kunit_try_run_case+0x1a5/0x480 [ 13.860669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.860911] kthread+0x337/0x6f0 [ 13.861083] ret_from_fork+0x116/0x1d0 [ 13.861274] ret_from_fork_asm+0x1a/0x30 [ 13.861471] [ 13.861560] The buggy address belongs to the object at ffff8881025394a0 [ 13.861560] which belongs to the cache kmalloc-16 of size 16 [ 13.862193] The buggy address is located 8 bytes inside of [ 13.862193] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.862650] [ 13.862741] The buggy address belongs to the physical page: [ 13.862977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.863251] flags: 0x200000000000000(node=0|zone=2) [ 13.863587] page_type: f5(slab) [ 13.863729] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.864016] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.864401] page dumped because: kasan: bad access detected [ 13.864563] [ 13.864668] Memory state around the buggy address: [ 13.865011] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.865276] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.865609] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.865831] ^ [ 13.866162] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.866483] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.866716] ================================================================== [ 13.808171] ================================================================== [ 13.808396] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.808657] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.808868] [ 13.808957] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.808998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.809020] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.809041] Call Trace: [ 13.809056] <TASK> [ 13.809072] dump_stack_lvl+0x73/0xb0 [ 13.809098] print_report+0xd1/0x650 [ 13.809119] ? __virt_addr_valid+0x1db/0x2d0 [ 13.809142] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.809167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.809189] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.809215] kasan_report+0x141/0x180 [ 13.809236] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.809267] kasan_check_range+0x10c/0x1c0 [ 13.809289] __kasan_check_write+0x18/0x20 [ 13.809308] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.809334] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.809361] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.809384] ? trace_hardirqs_on+0x37/0xe0 [ 13.809406] ? kasan_bitops_generic+0x92/0x1c0 [ 13.809431] kasan_bitops_generic+0x121/0x1c0 [ 13.809453] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.809477] ? __pfx_read_tsc+0x10/0x10 [ 13.809497] ? ktime_get_ts64+0x86/0x230 [ 13.809521] kunit_try_run_case+0x1a5/0x480 [ 13.809544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.809566] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.809587] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.809608] ? __kthread_parkme+0x82/0x180 [ 13.809628] ? preempt_count_sub+0x50/0x80 [ 13.809651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.809674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.809702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.809725] kthread+0x337/0x6f0 [ 13.809743] ? trace_preempt_on+0x20/0xc0 [ 13.809764] ? __pfx_kthread+0x10/0x10 [ 13.809784] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.809804] ? calculate_sigpending+0x7b/0xa0 [ 13.809827] ? __pfx_kthread+0x10/0x10 [ 13.809848] ret_from_fork+0x116/0x1d0 [ 13.809865] ? __pfx_kthread+0x10/0x10 [ 13.809885] ret_from_fork_asm+0x1a/0x30 [ 13.809914] </TASK> [ 13.809925] [ 13.818796] Allocated by task 286: [ 13.818982] kasan_save_stack+0x45/0x70 [ 13.819179] kasan_save_track+0x18/0x40 [ 13.819366] kasan_save_alloc_info+0x3b/0x50 [ 13.819573] __kasan_kmalloc+0xb7/0xc0 [ 13.819763] __kmalloc_cache_noprof+0x189/0x420 [ 13.819992] kasan_bitops_generic+0x92/0x1c0 [ 13.820219] kunit_try_run_case+0x1a5/0x480 [ 13.820423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.820668] kthread+0x337/0x6f0 [ 13.820831] ret_from_fork+0x116/0x1d0 [ 13.821031] ret_from_fork_asm+0x1a/0x30 [ 13.821231] [ 13.821321] The buggy address belongs to the object at ffff8881025394a0 [ 13.821321] which belongs to the cache kmalloc-16 of size 16 [ 13.821882] The buggy address is located 8 bytes inside of [ 13.821882] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.822231] [ 13.822296] The buggy address belongs to the physical page: [ 13.822460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.822688] flags: 0x200000000000000(node=0|zone=2) [ 13.822838] page_type: f5(slab) [ 13.822976] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.823389] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.823875] page dumped because: kasan: bad access detected [ 13.824126] [ 13.824210] Memory state around the buggy address: [ 13.824421] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.824724] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.824956] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.825162] ^ [ 13.825300] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.825604] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.825906] ==================================================================