Date
June 20, 2025, 12:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 35.334830] ================================================================== [ 35.334966] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 35.335761] Call trace: [ 35.337683] ret_from_fork+0x10/0x20 [ 35.341698] ==================================================================
[ 28.488213] ================================================================== [ 28.488655] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.489291] Read of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290 [ 28.490044] [ 28.490276] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.490377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.490404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.490457] Call Trace: [ 28.490496] <TASK> [ 28.490533] dump_stack_lvl+0x73/0xb0 [ 28.490590] print_report+0xd1/0x650 [ 28.490626] ? __virt_addr_valid+0x1db/0x2d0 [ 28.490663] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.490707] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.490754] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.490808] kasan_report+0x141/0x180 [ 28.490850] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.490918] __asan_report_load8_noabort+0x18/0x20 [ 28.490973] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.491027] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.491079] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.491124] ? trace_hardirqs_on+0x37/0xe0 [ 28.491207] ? kasan_bitops_generic+0x92/0x1c0 [ 28.491265] kasan_bitops_generic+0x121/0x1c0 [ 28.491317] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.491368] ? __pfx_read_tsc+0x10/0x10 [ 28.491410] ? ktime_get_ts64+0x86/0x230 [ 28.491476] kunit_try_run_case+0x1a5/0x480 [ 28.491529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.491570] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.491622] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.491674] ? __kthread_parkme+0x82/0x180 [ 28.491724] ? preempt_count_sub+0x50/0x80 [ 28.491780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.491835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.491890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.491943] kthread+0x337/0x6f0 [ 28.491988] ? trace_preempt_on+0x20/0xc0 [ 28.492036] ? __pfx_kthread+0x10/0x10 [ 28.492083] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.492133] ? calculate_sigpending+0x7b/0xa0 [ 28.492221] ? __pfx_kthread+0x10/0x10 [ 28.492268] ret_from_fork+0x116/0x1d0 [ 28.492314] ? __pfx_kthread+0x10/0x10 [ 28.492361] ret_from_fork_asm+0x1a/0x30 [ 28.492434] </TASK> [ 28.492474] [ 28.502403] Allocated by task 290: [ 28.502770] kasan_save_stack+0x45/0x70 [ 28.503187] kasan_save_track+0x18/0x40 [ 28.503512] kasan_save_alloc_info+0x3b/0x50 [ 28.503858] __kasan_kmalloc+0xb7/0xc0 [ 28.504171] __kmalloc_cache_noprof+0x189/0x420 [ 28.504559] kasan_bitops_generic+0x92/0x1c0 [ 28.504812] kunit_try_run_case+0x1a5/0x480 [ 28.505171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.505410] kthread+0x337/0x6f0 [ 28.505713] ret_from_fork+0x116/0x1d0 [ 28.505887] ret_from_fork_asm+0x1a/0x30 [ 28.506084] [ 28.506223] The buggy address belongs to the object at ffff8881022cf740 [ 28.506223] which belongs to the cache kmalloc-16 of size 16 [ 28.506898] The buggy address is located 8 bytes inside of [ 28.506898] allocated 9-byte region [ffff8881022cf740, ffff8881022cf749) [ 28.507704] [ 28.507817] The buggy address belongs to the physical page: [ 28.508250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf [ 28.508597] flags: 0x200000000000000(node=0|zone=2) [ 28.508987] page_type: f5(slab) [ 28.509202] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.509653] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.510048] page dumped because: kasan: bad access detected [ 28.510318] [ 28.510424] Memory state around the buggy address: [ 28.510715] ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.511247] ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.511637] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 28.511895] ^ [ 28.512115] ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.512410] ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.512932] ================================================================== [ 28.459846] ================================================================== [ 28.460153] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.461392] Read of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290 [ 28.462003] [ 28.462323] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.462439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.462479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.462559] Call Trace: [ 28.462617] <TASK> [ 28.462663] dump_stack_lvl+0x73/0xb0 [ 28.462736] print_report+0xd1/0x650 [ 28.462763] ? __virt_addr_valid+0x1db/0x2d0 [ 28.462791] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.462822] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.462850] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.462882] kasan_report+0x141/0x180 [ 28.462906] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.462941] kasan_check_range+0x10c/0x1c0 [ 28.462967] __kasan_check_read+0x15/0x20 [ 28.462991] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.463021] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.463052] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.463079] ? trace_hardirqs_on+0x37/0xe0 [ 28.463103] ? kasan_bitops_generic+0x92/0x1c0 [ 28.463132] kasan_bitops_generic+0x121/0x1c0 [ 28.463185] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.463219] ? __pfx_read_tsc+0x10/0x10 [ 28.463244] ? ktime_get_ts64+0x86/0x230 [ 28.463275] kunit_try_run_case+0x1a5/0x480 [ 28.463304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.463329] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.463355] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.463381] ? __kthread_parkme+0x82/0x180 [ 28.463405] ? preempt_count_sub+0x50/0x80 [ 28.463431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.463478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.463504] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.463529] kthread+0x337/0x6f0 [ 28.463552] ? trace_preempt_on+0x20/0xc0 [ 28.463576] ? __pfx_kthread+0x10/0x10 [ 28.463599] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.463622] ? calculate_sigpending+0x7b/0xa0 [ 28.463649] ? __pfx_kthread+0x10/0x10 [ 28.463673] ret_from_fork+0x116/0x1d0 [ 28.463694] ? __pfx_kthread+0x10/0x10 [ 28.463717] ret_from_fork_asm+0x1a/0x30 [ 28.463752] </TASK> [ 28.463767] [ 28.475979] Allocated by task 290: [ 28.476411] kasan_save_stack+0x45/0x70 [ 28.476837] kasan_save_track+0x18/0x40 [ 28.477226] kasan_save_alloc_info+0x3b/0x50 [ 28.477559] __kasan_kmalloc+0xb7/0xc0 [ 28.477801] __kmalloc_cache_noprof+0x189/0x420 [ 28.478022] kasan_bitops_generic+0x92/0x1c0 [ 28.478361] kunit_try_run_case+0x1a5/0x480 [ 28.478682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.478948] kthread+0x337/0x6f0 [ 28.479259] ret_from_fork+0x116/0x1d0 [ 28.479571] ret_from_fork_asm+0x1a/0x30 [ 28.479812] [ 28.479929] The buggy address belongs to the object at ffff8881022cf740 [ 28.479929] which belongs to the cache kmalloc-16 of size 16 [ 28.480625] The buggy address is located 8 bytes inside of [ 28.480625] allocated 9-byte region [ffff8881022cf740, ffff8881022cf749) [ 28.481316] [ 28.481502] The buggy address belongs to the physical page: [ 28.481776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf [ 28.482076] flags: 0x200000000000000(node=0|zone=2) [ 28.482468] page_type: f5(slab) [ 28.482738] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.483293] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.483760] page dumped because: kasan: bad access detected [ 28.484071] [ 28.484257] Memory state around the buggy address: [ 28.484577] ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.484993] ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.485474] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 28.485761] ^ [ 28.486172] ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.486494] ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.486940] ================================================================== [ 28.428458] ================================================================== [ 28.429098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 28.429764] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290 [ 28.430221] [ 28.430382] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.430499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.430526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.430573] Call Trace: [ 28.430870] <TASK> [ 28.430914] dump_stack_lvl+0x73/0xb0 [ 28.430991] print_report+0xd1/0x650 [ 28.431042] ? __virt_addr_valid+0x1db/0x2d0 [ 28.431096] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 28.431152] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.431208] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 28.431268] kasan_report+0x141/0x180 [ 28.431319] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 28.431375] kasan_check_range+0x10c/0x1c0 [ 28.431402] __kasan_check_write+0x18/0x20 [ 28.431429] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 28.431490] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.431542] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.431583] ? trace_hardirqs_on+0x37/0xe0 [ 28.431628] ? kasan_bitops_generic+0x92/0x1c0 [ 28.431687] kasan_bitops_generic+0x121/0x1c0 [ 28.431741] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.431796] ? __pfx_read_tsc+0x10/0x10 [ 28.431838] ? ktime_get_ts64+0x86/0x230 [ 28.431897] kunit_try_run_case+0x1a5/0x480 [ 28.431955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.432005] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.432058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.432112] ? __kthread_parkme+0x82/0x180 [ 28.432159] ? preempt_count_sub+0x50/0x80 [ 28.432211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.432268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.432322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.432365] kthread+0x337/0x6f0 [ 28.432389] ? trace_preempt_on+0x20/0xc0 [ 28.432415] ? __pfx_kthread+0x10/0x10 [ 28.432438] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.432479] ? calculate_sigpending+0x7b/0xa0 [ 28.432507] ? __pfx_kthread+0x10/0x10 [ 28.432532] ret_from_fork+0x116/0x1d0 [ 28.432554] ? __pfx_kthread+0x10/0x10 [ 28.432576] ret_from_fork_asm+0x1a/0x30 [ 28.432613] </TASK> [ 28.432627] [ 28.445578] Allocated by task 290: [ 28.446022] kasan_save_stack+0x45/0x70 [ 28.446541] kasan_save_track+0x18/0x40 [ 28.446902] kasan_save_alloc_info+0x3b/0x50 [ 28.447126] __kasan_kmalloc+0xb7/0xc0 [ 28.447479] __kmalloc_cache_noprof+0x189/0x420 [ 28.447757] kasan_bitops_generic+0x92/0x1c0 [ 28.448148] kunit_try_run_case+0x1a5/0x480 [ 28.448571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.449047] kthread+0x337/0x6f0 [ 28.449394] ret_from_fork+0x116/0x1d0 [ 28.449775] ret_from_fork_asm+0x1a/0x30 [ 28.450059] [ 28.450169] The buggy address belongs to the object at ffff8881022cf740 [ 28.450169] which belongs to the cache kmalloc-16 of size 16 [ 28.450604] The buggy address is located 8 bytes inside of [ 28.450604] allocated 9-byte region [ffff8881022cf740, ffff8881022cf749) [ 28.451113] [ 28.451888] The buggy address belongs to the physical page: [ 28.452684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf [ 28.453222] flags: 0x200000000000000(node=0|zone=2) [ 28.453580] page_type: f5(slab) [ 28.453811] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.454592] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.454861] page dumped because: kasan: bad access detected [ 28.455228] [ 28.455557] Memory state around the buggy address: [ 28.455869] ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.456319] ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.456723] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 28.457095] ^ [ 28.457943] ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.458480] ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.458829] ================================================================== [ 28.363546] ================================================================== [ 28.364790] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 28.366921] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290 [ 28.367501] [ 28.367685] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.367787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.367811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.367851] Call Trace: [ 28.367891] <TASK> [ 28.367929] dump_stack_lvl+0x73/0xb0 [ 28.367997] print_report+0xd1/0x650 [ 28.368038] ? __virt_addr_valid+0x1db/0x2d0 [ 28.368080] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 28.368128] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.368202] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 28.368253] kasan_report+0x141/0x180 [ 28.368295] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 28.368357] kasan_check_range+0x10c/0x1c0 [ 28.368400] __kasan_check_write+0x18/0x20 [ 28.368453] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 28.368503] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.368550] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.368588] ? trace_hardirqs_on+0x37/0xe0 [ 28.368626] ? kasan_bitops_generic+0x92/0x1c0 [ 28.368671] kasan_bitops_generic+0x121/0x1c0 [ 28.368714] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.368761] ? __pfx_read_tsc+0x10/0x10 [ 28.368803] ? ktime_get_ts64+0x86/0x230 [ 28.368844] kunit_try_run_case+0x1a5/0x480 [ 28.368883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.368952] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.369005] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.369054] ? __kthread_parkme+0x82/0x180 [ 28.369096] ? preempt_count_sub+0x50/0x80 [ 28.369145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.369187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.369240] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.369292] kthread+0x337/0x6f0 [ 28.369334] ? trace_preempt_on+0x20/0xc0 [ 28.369374] ? __pfx_kthread+0x10/0x10 [ 28.369409] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.369466] ? calculate_sigpending+0x7b/0xa0 [ 28.369518] ? __pfx_kthread+0x10/0x10 [ 28.369563] ret_from_fork+0x116/0x1d0 [ 28.369608] ? __pfx_kthread+0x10/0x10 [ 28.369649] ret_from_fork_asm+0x1a/0x30 [ 28.369713] </TASK> [ 28.369743] [ 28.382434] Allocated by task 290: [ 28.382830] kasan_save_stack+0x45/0x70 [ 28.383151] kasan_save_track+0x18/0x40 [ 28.383360] kasan_save_alloc_info+0x3b/0x50 [ 28.383594] __kasan_kmalloc+0xb7/0xc0 [ 28.383789] __kmalloc_cache_noprof+0x189/0x420 [ 28.384019] kasan_bitops_generic+0x92/0x1c0 [ 28.384380] kunit_try_run_case+0x1a5/0x480 [ 28.384790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.385204] kthread+0x337/0x6f0 [ 28.385597] ret_from_fork+0x116/0x1d0 [ 28.385925] ret_from_fork_asm+0x1a/0x30 [ 28.386276] [ 28.386614] The buggy address belongs to the object at ffff8881022cf740 [ 28.386614] which belongs to the cache kmalloc-16 of size 16 [ 28.387990] The buggy address is located 8 bytes inside of [ 28.387990] allocated 9-byte region [ffff8881022cf740, ffff8881022cf749) [ 28.388589] [ 28.388706] The buggy address belongs to the physical page: [ 28.388923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf [ 28.390050] flags: 0x200000000000000(node=0|zone=2) [ 28.390613] page_type: f5(slab) [ 28.391140] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.391743] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.392402] page dumped because: kasan: bad access detected [ 28.392806] [ 28.392914] Memory state around the buggy address: [ 28.393627] ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.393888] ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.394539] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 28.394981] ^ [ 28.395477] ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.396071] ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.396602] ================================================================== [ 28.316238] ================================================================== [ 28.317050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 28.318626] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290 [ 28.319841] [ 28.320128] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.320413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.320500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.320564] Call Trace: [ 28.320608] <TASK> [ 28.320655] dump_stack_lvl+0x73/0xb0 [ 28.320728] print_report+0xd1/0x650 [ 28.320773] ? __virt_addr_valid+0x1db/0x2d0 [ 28.320819] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 28.320869] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.320920] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 28.320989] kasan_report+0x141/0x180 [ 28.321045] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 28.321117] kasan_check_range+0x10c/0x1c0 [ 28.321199] __kasan_check_write+0x18/0x20 [ 28.321243] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 28.321296] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.321366] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.321426] ? trace_hardirqs_on+0x37/0xe0 [ 28.321490] ? kasan_bitops_generic+0x92/0x1c0 [ 28.321549] kasan_bitops_generic+0x121/0x1c0 [ 28.321594] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.321640] ? __pfx_read_tsc+0x10/0x10 [ 28.321683] ? ktime_get_ts64+0x86/0x230 [ 28.321746] kunit_try_run_case+0x1a5/0x480 [ 28.321811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.321867] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.321914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.321961] ? __kthread_parkme+0x82/0x180 [ 28.322001] ? preempt_count_sub+0x50/0x80 [ 28.322058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.322104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.322190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.322254] kthread+0x337/0x6f0 [ 28.322301] ? trace_preempt_on+0x20/0xc0 [ 28.322352] ? __pfx_kthread+0x10/0x10 [ 28.322392] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.322433] ? calculate_sigpending+0x7b/0xa0 [ 28.322486] ? __pfx_kthread+0x10/0x10 [ 28.322525] ret_from_fork+0x116/0x1d0 [ 28.322557] ? __pfx_kthread+0x10/0x10 [ 28.322593] ret_from_fork_asm+0x1a/0x30 [ 28.322653] </TASK> [ 28.322681] [ 28.338138] Allocated by task 290: [ 28.338410] kasan_save_stack+0x45/0x70 [ 28.338650] kasan_save_track+0x18/0x40 [ 28.338829] kasan_save_alloc_info+0x3b/0x50 [ 28.339000] __kasan_kmalloc+0xb7/0xc0 [ 28.339211] __kmalloc_cache_noprof+0x189/0x420 [ 28.339399] kasan_bitops_generic+0x92/0x1c0 [ 28.339712] kunit_try_run_case+0x1a5/0x480 [ 28.340043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.341372] kthread+0x337/0x6f0 [ 28.341766] ret_from_fork+0x116/0x1d0 [ 28.342122] ret_from_fork_asm+0x1a/0x30 [ 28.343498] [ 28.343690] The buggy address belongs to the object at ffff8881022cf740 [ 28.343690] which belongs to the cache kmalloc-16 of size 16 [ 28.346632] The buggy address is located 8 bytes inside of [ 28.346632] allocated 9-byte region [ffff8881022cf740, ffff8881022cf749) [ 28.347094] [ 28.350079] The buggy address belongs to the physical page: [ 28.350591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf [ 28.351208] flags: 0x200000000000000(node=0|zone=2) [ 28.352292] page_type: f5(slab) [ 28.353530] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.354019] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.354963] page dumped because: kasan: bad access detected [ 28.355258] [ 28.355369] Memory state around the buggy address: [ 28.357097] ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.358417] ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.359746] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 28.360018] ^ [ 28.360395] ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.360675] ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.360917] ================================================================== [ 28.268191] ================================================================== [ 28.268514] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 28.269458] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290 [ 28.269999] [ 28.270603] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.270706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.270728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.270766] Call Trace: [ 28.270804] <TASK> [ 28.270838] dump_stack_lvl+0x73/0xb0 [ 28.270895] print_report+0xd1/0x650 [ 28.270929] ? __virt_addr_valid+0x1db/0x2d0 [ 28.270966] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 28.271007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.271049] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 28.271127] kasan_report+0x141/0x180 [ 28.271219] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 28.271276] kasan_check_range+0x10c/0x1c0 [ 28.271318] __kasan_check_write+0x18/0x20 [ 28.271635] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 28.271697] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.271757] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.271810] ? trace_hardirqs_on+0x37/0xe0 [ 28.271850] ? kasan_bitops_generic+0x92/0x1c0 [ 28.271901] kasan_bitops_generic+0x121/0x1c0 [ 28.271952] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.272008] ? __pfx_read_tsc+0x10/0x10 [ 28.272057] ? ktime_get_ts64+0x86/0x230 [ 28.272122] kunit_try_run_case+0x1a5/0x480 [ 28.272668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.272707] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.272746] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.272781] ? __kthread_parkme+0x82/0x180 [ 28.272814] ? preempt_count_sub+0x50/0x80 [ 28.272852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.272889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.272928] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.272973] kthread+0x337/0x6f0 [ 28.273010] ? trace_preempt_on+0x20/0xc0 [ 28.273049] ? __pfx_kthread+0x10/0x10 [ 28.273087] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.273128] ? calculate_sigpending+0x7b/0xa0 [ 28.273212] ? __pfx_kthread+0x10/0x10 [ 28.273293] ret_from_fork+0x116/0x1d0 [ 28.273329] ? __pfx_kthread+0x10/0x10 [ 28.273370] ret_from_fork_asm+0x1a/0x30 [ 28.273448] </TASK> [ 28.273480] [ 28.303844] Allocated by task 290: [ 28.304193] kasan_save_stack+0x45/0x70 [ 28.304632] kasan_save_track+0x18/0x40 [ 28.304818] kasan_save_alloc_info+0x3b/0x50 [ 28.304996] __kasan_kmalloc+0xb7/0xc0 [ 28.305195] __kmalloc_cache_noprof+0x189/0x420 [ 28.305397] kasan_bitops_generic+0x92/0x1c0 [ 28.305585] kunit_try_run_case+0x1a5/0x480 [ 28.305778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.305972] kthread+0x337/0x6f0 [ 28.306191] ret_from_fork+0x116/0x1d0 [ 28.306351] ret_from_fork_asm+0x1a/0x30 [ 28.306530] [ 28.306618] The buggy address belongs to the object at ffff8881022cf740 [ 28.306618] which belongs to the cache kmalloc-16 of size 16 [ 28.306991] The buggy address is located 8 bytes inside of [ 28.306991] allocated 9-byte region [ffff8881022cf740, ffff8881022cf749) [ 28.307423] [ 28.307548] The buggy address belongs to the physical page: [ 28.307763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf [ 28.308058] flags: 0x200000000000000(node=0|zone=2) [ 28.308313] page_type: f5(slab) [ 28.308494] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.309036] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.309628] page dumped because: kasan: bad access detected [ 28.310060] [ 28.310257] Memory state around the buggy address: [ 28.310646] ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.311195] ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.311748] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 28.313402] ^ [ 28.313694] ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.313966] ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.314255] ================================================================== [ 28.399005] ================================================================== [ 28.399490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 28.400489] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290 [ 28.400817] [ 28.400974] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.401039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.401055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.401081] Call Trace: [ 28.401108] <TASK> [ 28.401132] dump_stack_lvl+0x73/0xb0 [ 28.401186] print_report+0xd1/0x650 [ 28.401225] ? __virt_addr_valid+0x1db/0x2d0 [ 28.401271] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 28.401326] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.401377] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 28.401434] kasan_report+0x141/0x180 [ 28.401494] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 28.401561] kasan_check_range+0x10c/0x1c0 [ 28.401612] __kasan_check_write+0x18/0x20 [ 28.401663] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 28.401716] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.401766] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.401812] ? trace_hardirqs_on+0x37/0xe0 [ 28.401857] ? kasan_bitops_generic+0x92/0x1c0 [ 28.401918] kasan_bitops_generic+0x121/0x1c0 [ 28.401972] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.402040] ? __pfx_read_tsc+0x10/0x10 [ 28.402091] ? ktime_get_ts64+0x86/0x230 [ 28.402153] kunit_try_run_case+0x1a5/0x480 [ 28.402210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.402252] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.402296] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.402325] ? __kthread_parkme+0x82/0x180 [ 28.402349] ? preempt_count_sub+0x50/0x80 [ 28.402376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.402401] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.402428] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.402476] kthread+0x337/0x6f0 [ 28.402510] ? trace_preempt_on+0x20/0xc0 [ 28.402542] ? __pfx_kthread+0x10/0x10 [ 28.402564] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.402588] ? calculate_sigpending+0x7b/0xa0 [ 28.402616] ? __pfx_kthread+0x10/0x10 [ 28.402640] ret_from_fork+0x116/0x1d0 [ 28.402661] ? __pfx_kthread+0x10/0x10 [ 28.402684] ret_from_fork_asm+0x1a/0x30 [ 28.402719] </TASK> [ 28.402734] [ 28.414757] Allocated by task 290: [ 28.415036] kasan_save_stack+0x45/0x70 [ 28.415510] kasan_save_track+0x18/0x40 [ 28.415827] kasan_save_alloc_info+0x3b/0x50 [ 28.416128] __kasan_kmalloc+0xb7/0xc0 [ 28.416479] __kmalloc_cache_noprof+0x189/0x420 [ 28.416825] kasan_bitops_generic+0x92/0x1c0 [ 28.417257] kunit_try_run_case+0x1a5/0x480 [ 28.417463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.417970] kthread+0x337/0x6f0 [ 28.418345] ret_from_fork+0x116/0x1d0 [ 28.418636] ret_from_fork_asm+0x1a/0x30 [ 28.418866] [ 28.418994] The buggy address belongs to the object at ffff8881022cf740 [ 28.418994] which belongs to the cache kmalloc-16 of size 16 [ 28.419962] The buggy address is located 8 bytes inside of [ 28.419962] allocated 9-byte region [ffff8881022cf740, ffff8881022cf749) [ 28.420701] [ 28.420825] The buggy address belongs to the physical page: [ 28.421038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf [ 28.421751] flags: 0x200000000000000(node=0|zone=2) [ 28.422203] page_type: f5(slab) [ 28.422518] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.422882] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.423226] page dumped because: kasan: bad access detected [ 28.423453] [ 28.423552] Memory state around the buggy address: [ 28.423783] ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.424322] ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.424876] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 28.425431] ^ [ 28.425752] ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.426000] ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.426487] ================================================================== [ 28.237794] ================================================================== [ 28.238374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 28.239121] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290 [ 28.239716] [ 28.239918] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.240026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.240053] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.240102] Call Trace: [ 28.240136] <TASK> [ 28.240212] dump_stack_lvl+0x73/0xb0 [ 28.240285] print_report+0xd1/0x650 [ 28.240337] ? __virt_addr_valid+0x1db/0x2d0 [ 28.240395] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 28.240467] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.240528] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 28.240587] kasan_report+0x141/0x180 [ 28.240640] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 28.240713] kasan_check_range+0x10c/0x1c0 [ 28.240770] __kasan_check_write+0x18/0x20 [ 28.240824] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 28.240887] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.240944] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.240991] ? trace_hardirqs_on+0x37/0xe0 [ 28.241036] ? kasan_bitops_generic+0x92/0x1c0 [ 28.241085] kasan_bitops_generic+0x121/0x1c0 [ 28.241129] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.241218] ? __pfx_read_tsc+0x10/0x10 [ 28.241266] ? ktime_get_ts64+0x86/0x230 [ 28.241326] kunit_try_run_case+0x1a5/0x480 [ 28.241387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.241438] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.241502] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.241559] ? __kthread_parkme+0x82/0x180 [ 28.241609] ? preempt_count_sub+0x50/0x80 [ 28.241665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.241719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.241766] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.241808] kthread+0x337/0x6f0 [ 28.241849] ? trace_preempt_on+0x20/0xc0 [ 28.241893] ? __pfx_kthread+0x10/0x10 [ 28.241933] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.241971] ? calculate_sigpending+0x7b/0xa0 [ 28.242016] ? __pfx_kthread+0x10/0x10 [ 28.242073] ret_from_fork+0x116/0x1d0 [ 28.242113] ? __pfx_kthread+0x10/0x10 [ 28.242187] ret_from_fork_asm+0x1a/0x30 [ 28.242254] </TASK> [ 28.242283] [ 28.255449] Allocated by task 290: [ 28.256355] kasan_save_stack+0x45/0x70 [ 28.256682] kasan_save_track+0x18/0x40 [ 28.256995] kasan_save_alloc_info+0x3b/0x50 [ 28.257263] __kasan_kmalloc+0xb7/0xc0 [ 28.257562] __kmalloc_cache_noprof+0x189/0x420 [ 28.257805] kasan_bitops_generic+0x92/0x1c0 [ 28.258047] kunit_try_run_case+0x1a5/0x480 [ 28.258298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.258724] kthread+0x337/0x6f0 [ 28.258914] ret_from_fork+0x116/0x1d0 [ 28.259092] ret_from_fork_asm+0x1a/0x30 [ 28.259310] [ 28.259421] The buggy address belongs to the object at ffff8881022cf740 [ 28.259421] which belongs to the cache kmalloc-16 of size 16 [ 28.260327] The buggy address is located 8 bytes inside of [ 28.260327] allocated 9-byte region [ffff8881022cf740, ffff8881022cf749) [ 28.261310] [ 28.261485] The buggy address belongs to the physical page: [ 28.261798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf [ 28.262263] flags: 0x200000000000000(node=0|zone=2) [ 28.262627] page_type: f5(slab) [ 28.262909] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.263323] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.263819] page dumped because: kasan: bad access detected [ 28.264256] [ 28.264428] Memory state around the buggy address: [ 28.264662] ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.265056] ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.265614] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 28.266087] ^ [ 28.266477] ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.266752] ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.267006] ================================================================== [ 28.212034] ================================================================== [ 28.212890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 28.213407] Write of size 8 at addr ffff8881022cf748 by task kunit_try_catch/290 [ 28.213772] [ 28.213972] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) [ 28.214094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.214122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.214172] Call Trace: [ 28.214214] <TASK> [ 28.214254] dump_stack_lvl+0x73/0xb0 [ 28.214351] print_report+0xd1/0x650 [ 28.214402] ? __virt_addr_valid+0x1db/0x2d0 [ 28.214461] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 28.214536] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.214587] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 28.214639] kasan_report+0x141/0x180 [ 28.214685] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 28.214755] kasan_check_range+0x10c/0x1c0 [ 28.214809] __kasan_check_write+0x18/0x20 [ 28.214853] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 28.214908] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.214989] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.215040] ? trace_hardirqs_on+0x37/0xe0 [ 28.215083] ? kasan_bitops_generic+0x92/0x1c0 [ 28.215143] kasan_bitops_generic+0x121/0x1c0 [ 28.215187] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.215260] ? __pfx_read_tsc+0x10/0x10 [ 28.215304] ? ktime_get_ts64+0x86/0x230 [ 28.215358] kunit_try_run_case+0x1a5/0x480 [ 28.215412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.215475] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.215526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.215565] ? __kthread_parkme+0x82/0x180 [ 28.215594] ? preempt_count_sub+0x50/0x80 [ 28.215619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.215647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.215674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.215700] kthread+0x337/0x6f0 [ 28.215722] ? trace_preempt_on+0x20/0xc0 [ 28.215747] ? __pfx_kthread+0x10/0x10 [ 28.215769] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.215793] ? calculate_sigpending+0x7b/0xa0 [ 28.215820] ? __pfx_kthread+0x10/0x10 [ 28.215844] ret_from_fork+0x116/0x1d0 [ 28.215865] ? __pfx_kthread+0x10/0x10 [ 28.215888] ret_from_fork_asm+0x1a/0x30 [ 28.215922] </TASK> [ 28.215936] [ 28.226381] Allocated by task 290: [ 28.226645] kasan_save_stack+0x45/0x70 [ 28.226906] kasan_save_track+0x18/0x40 [ 28.227090] kasan_save_alloc_info+0x3b/0x50 [ 28.227469] __kasan_kmalloc+0xb7/0xc0 [ 28.227776] __kmalloc_cache_noprof+0x189/0x420 [ 28.228040] kasan_bitops_generic+0x92/0x1c0 [ 28.228365] kunit_try_run_case+0x1a5/0x480 [ 28.228535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.228935] kthread+0x337/0x6f0 [ 28.229236] ret_from_fork+0x116/0x1d0 [ 28.229407] ret_from_fork_asm+0x1a/0x30 [ 28.229607] [ 28.229765] The buggy address belongs to the object at ffff8881022cf740 [ 28.229765] which belongs to the cache kmalloc-16 of size 16 [ 28.230570] The buggy address is located 8 bytes inside of [ 28.230570] allocated 9-byte region [ffff8881022cf740, ffff8881022cf749) [ 28.230964] [ 28.231078] The buggy address belongs to the physical page: [ 28.231334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022cf [ 28.231806] flags: 0x200000000000000(node=0|zone=2) [ 28.232257] page_type: f5(slab) [ 28.232538] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.233122] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.233404] page dumped because: kasan: bad access detected [ 28.233819] [ 28.233980] Memory state around the buggy address: [ 28.234195] ffff8881022cf600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.234496] ffff8881022cf680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.234998] >ffff8881022cf700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 28.235556] ^ [ 28.235780] ffff8881022cf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.236041] ffff8881022cf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.236318] ==================================================================