Date
June 23, 2025, 7:07 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 24.227104] ================================================================== [ 24.227702] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.228435] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290 [ 24.228710] [ 24.228869] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.228946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.228964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.228987] Call Trace: [ 24.229005] <TASK> [ 24.229023] dump_stack_lvl+0x73/0xb0 [ 24.229052] print_report+0xd1/0x650 [ 24.229070] ? __virt_addr_valid+0x1db/0x2d0 [ 24.229091] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.229127] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.229170] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.229215] kasan_report+0x141/0x180 [ 24.229254] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.229305] kasan_check_range+0x10c/0x1c0 [ 24.229336] __kasan_check_write+0x18/0x20 [ 24.229364] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.229415] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.229450] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.229480] ? trace_hardirqs_on+0x37/0xe0 [ 24.229510] ? kasan_bitops_generic+0x92/0x1c0 [ 24.229546] kasan_bitops_generic+0x121/0x1c0 [ 24.229577] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.229620] ? __pfx_read_tsc+0x10/0x10 [ 24.229651] ? ktime_get_ts64+0x86/0x230 [ 24.229701] kunit_try_run_case+0x1a5/0x480 [ 24.229743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.229781] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.229821] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.229854] ? __kthread_parkme+0x82/0x180 [ 24.229886] ? preempt_count_sub+0x50/0x80 [ 24.229927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.229969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.230018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.230095] kthread+0x337/0x6f0 [ 24.230131] ? trace_preempt_on+0x20/0xc0 [ 24.230160] ? __pfx_kthread+0x10/0x10 [ 24.230189] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.230218] ? calculate_sigpending+0x7b/0xa0 [ 24.230247] ? __pfx_kthread+0x10/0x10 [ 24.230274] ret_from_fork+0x116/0x1d0 [ 24.230302] ? __pfx_kthread+0x10/0x10 [ 24.230329] ret_from_fork_asm+0x1a/0x30 [ 24.230398] </TASK> [ 24.230418] [ 24.239462] Allocated by task 290: [ 24.239698] kasan_save_stack+0x45/0x70 [ 24.239945] kasan_save_track+0x18/0x40 [ 24.240276] kasan_save_alloc_info+0x3b/0x50 [ 24.240521] __kasan_kmalloc+0xb7/0xc0 [ 24.240790] __kmalloc_cache_noprof+0x189/0x420 [ 24.241055] kasan_bitops_generic+0x92/0x1c0 [ 24.241280] kunit_try_run_case+0x1a5/0x480 [ 24.241534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.241717] kthread+0x337/0x6f0 [ 24.241859] ret_from_fork+0x116/0x1d0 [ 24.242135] ret_from_fork_asm+0x1a/0x30 [ 24.242444] [ 24.242605] The buggy address belongs to the object at ffff888101bb7fa0 [ 24.242605] which belongs to the cache kmalloc-16 of size 16 [ 24.243473] The buggy address is located 8 bytes inside of [ 24.243473] allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9) [ 24.243817] [ 24.243902] The buggy address belongs to the physical page: [ 24.244249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7 [ 24.244794] flags: 0x200000000000000(node=0|zone=2) [ 24.245178] page_type: f5(slab) [ 24.245351] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.245596] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.245880] page dumped because: kasan: bad access detected [ 24.246277] [ 24.246467] Memory state around the buggy address: [ 24.246828] ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.247220] ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.247448] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.247650] ^ [ 24.247803] ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.248257] ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 24.248755] ================================================================== [ 24.353668] ================================================================== [ 24.354118] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.354447] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290 [ 24.354689] [ 24.354798] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.354912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.354939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.354978] Call Trace: [ 24.355005] <TASK> [ 24.355034] dump_stack_lvl+0x73/0xb0 [ 24.355082] print_report+0xd1/0x650 [ 24.355121] ? __virt_addr_valid+0x1db/0x2d0 [ 24.355160] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.355206] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.355250] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.355297] kasan_report+0x141/0x180 [ 24.355336] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.355396] kasan_check_range+0x10c/0x1c0 [ 24.355432] __kasan_check_write+0x18/0x20 [ 24.355463] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.355502] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.355544] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.355579] ? trace_hardirqs_on+0x37/0xe0 [ 24.355608] ? kasan_bitops_generic+0x92/0x1c0 [ 24.355651] kasan_bitops_generic+0x121/0x1c0 [ 24.355689] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.355731] ? __pfx_read_tsc+0x10/0x10 [ 24.355767] ? ktime_get_ts64+0x86/0x230 [ 24.355810] kunit_try_run_case+0x1a5/0x480 [ 24.355887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.355927] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.355967] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.356008] ? __kthread_parkme+0x82/0x180 [ 24.356045] ? preempt_count_sub+0x50/0x80 [ 24.356088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.356130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.356164] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.356196] kthread+0x337/0x6f0 [ 24.356224] ? trace_preempt_on+0x20/0xc0 [ 24.356259] ? __pfx_kthread+0x10/0x10 [ 24.356290] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.356327] ? calculate_sigpending+0x7b/0xa0 [ 24.356366] ? __pfx_kthread+0x10/0x10 [ 24.356419] ret_from_fork+0x116/0x1d0 [ 24.356455] ? __pfx_kthread+0x10/0x10 [ 24.356493] ret_from_fork_asm+0x1a/0x30 [ 24.356552] </TASK> [ 24.356573] [ 24.366048] Allocated by task 290: [ 24.366273] kasan_save_stack+0x45/0x70 [ 24.366452] kasan_save_track+0x18/0x40 [ 24.366610] kasan_save_alloc_info+0x3b/0x50 [ 24.366936] __kasan_kmalloc+0xb7/0xc0 [ 24.367183] __kmalloc_cache_noprof+0x189/0x420 [ 24.367501] kasan_bitops_generic+0x92/0x1c0 [ 24.367680] kunit_try_run_case+0x1a5/0x480 [ 24.367980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.368185] kthread+0x337/0x6f0 [ 24.368427] ret_from_fork+0x116/0x1d0 [ 24.368619] ret_from_fork_asm+0x1a/0x30 [ 24.368794] [ 24.368906] The buggy address belongs to the object at ffff888101bb7fa0 [ 24.368906] which belongs to the cache kmalloc-16 of size 16 [ 24.369492] The buggy address is located 8 bytes inside of [ 24.369492] allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9) [ 24.370105] [ 24.370205] The buggy address belongs to the physical page: [ 24.370395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7 [ 24.370634] flags: 0x200000000000000(node=0|zone=2) [ 24.370810] page_type: f5(slab) [ 24.370974] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.371395] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.371819] page dumped because: kasan: bad access detected [ 24.372173] [ 24.372301] Memory state around the buggy address: [ 24.372601] ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.373057] ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.373477] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.373817] ^ [ 24.374082] ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.374308] ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 24.374776] ================================================================== [ 24.196522] ================================================================== [ 24.196881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.197706] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290 [ 24.198262] [ 24.198396] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.198479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.198615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.198675] Call Trace: [ 24.198702] <TASK> [ 24.198862] dump_stack_lvl+0x73/0xb0 [ 24.198924] print_report+0xd1/0x650 [ 24.198966] ? __virt_addr_valid+0x1db/0x2d0 [ 24.199002] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.199079] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.199133] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.199178] kasan_report+0x141/0x180 [ 24.199212] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.199262] kasan_check_range+0x10c/0x1c0 [ 24.199541] __kasan_check_write+0x18/0x20 [ 24.199751] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.199792] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.199817] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.199855] ? trace_hardirqs_on+0x37/0xe0 [ 24.199876] ? kasan_bitops_generic+0x92/0x1c0 [ 24.199900] kasan_bitops_generic+0x121/0x1c0 [ 24.199919] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.199940] ? __pfx_read_tsc+0x10/0x10 [ 24.199957] ? ktime_get_ts64+0x86/0x230 [ 24.199978] kunit_try_run_case+0x1a5/0x480 [ 24.199998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.200018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.200037] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.200087] ? __kthread_parkme+0x82/0x180 [ 24.200117] ? preempt_count_sub+0x50/0x80 [ 24.200147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.200179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.200207] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.200228] kthread+0x337/0x6f0 [ 24.200244] ? trace_preempt_on+0x20/0xc0 [ 24.200264] ? __pfx_kthread+0x10/0x10 [ 24.200282] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.200299] ? calculate_sigpending+0x7b/0xa0 [ 24.200319] ? __pfx_kthread+0x10/0x10 [ 24.200337] ret_from_fork+0x116/0x1d0 [ 24.200353] ? __pfx_kthread+0x10/0x10 [ 24.200370] ret_from_fork_asm+0x1a/0x30 [ 24.200416] </TASK> [ 24.200427] [ 24.212200] Allocated by task 290: [ 24.212350] kasan_save_stack+0x45/0x70 [ 24.212666] kasan_save_track+0x18/0x40 [ 24.213009] kasan_save_alloc_info+0x3b/0x50 [ 24.213456] __kasan_kmalloc+0xb7/0xc0 [ 24.214139] __kmalloc_cache_noprof+0x189/0x420 [ 24.214570] kasan_bitops_generic+0x92/0x1c0 [ 24.214747] kunit_try_run_case+0x1a5/0x480 [ 24.214916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.215103] kthread+0x337/0x6f0 [ 24.215234] ret_from_fork+0x116/0x1d0 [ 24.215387] ret_from_fork_asm+0x1a/0x30 [ 24.215672] [ 24.215810] The buggy address belongs to the object at ffff888101bb7fa0 [ 24.215810] which belongs to the cache kmalloc-16 of size 16 [ 24.216563] The buggy address is located 8 bytes inside of [ 24.216563] allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9) [ 24.218030] [ 24.218326] The buggy address belongs to the physical page: [ 24.218772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7 [ 24.219341] flags: 0x200000000000000(node=0|zone=2) [ 24.219765] page_type: f5(slab) [ 24.220241] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.220628] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.221487] page dumped because: kasan: bad access detected [ 24.221775] [ 24.221965] Memory state around the buggy address: [ 24.222594] ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.223168] ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.223403] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.223910] ^ [ 24.224350] ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.225051] ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 24.225615] ================================================================== [ 24.303623] ================================================================== [ 24.304710] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.305264] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290 [ 24.305679] [ 24.305919] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.306029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.306056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.306096] Call Trace: [ 24.306123] <TASK> [ 24.306153] dump_stack_lvl+0x73/0xb0 [ 24.306206] print_report+0xd1/0x650 [ 24.306243] ? __virt_addr_valid+0x1db/0x2d0 [ 24.306283] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.306367] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.306447] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.306498] kasan_report+0x141/0x180 [ 24.306542] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.306601] kasan_check_range+0x10c/0x1c0 [ 24.306647] __kasan_check_write+0x18/0x20 [ 24.306684] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.306714] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.306739] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.306762] ? trace_hardirqs_on+0x37/0xe0 [ 24.306782] ? kasan_bitops_generic+0x92/0x1c0 [ 24.306805] kasan_bitops_generic+0x121/0x1c0 [ 24.306837] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.306878] ? __pfx_read_tsc+0x10/0x10 [ 24.306897] ? ktime_get_ts64+0x86/0x230 [ 24.306920] kunit_try_run_case+0x1a5/0x480 [ 24.306943] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.306961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.306979] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.306999] ? __kthread_parkme+0x82/0x180 [ 24.307016] ? preempt_count_sub+0x50/0x80 [ 24.307035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.307055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.307074] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.307093] kthread+0x337/0x6f0 [ 24.307110] ? trace_preempt_on+0x20/0xc0 [ 24.307128] ? __pfx_kthread+0x10/0x10 [ 24.307145] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.307163] ? calculate_sigpending+0x7b/0xa0 [ 24.307182] ? __pfx_kthread+0x10/0x10 [ 24.307200] ret_from_fork+0x116/0x1d0 [ 24.307216] ? __pfx_kthread+0x10/0x10 [ 24.307233] ret_from_fork_asm+0x1a/0x30 [ 24.307260] </TASK> [ 24.307271] [ 24.319107] Allocated by task 290: [ 24.319281] kasan_save_stack+0x45/0x70 [ 24.319475] kasan_save_track+0x18/0x40 [ 24.319642] kasan_save_alloc_info+0x3b/0x50 [ 24.319828] __kasan_kmalloc+0xb7/0xc0 [ 24.320625] __kmalloc_cache_noprof+0x189/0x420 [ 24.320787] kasan_bitops_generic+0x92/0x1c0 [ 24.321012] kunit_try_run_case+0x1a5/0x480 [ 24.321246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.321496] kthread+0x337/0x6f0 [ 24.321684] ret_from_fork+0x116/0x1d0 [ 24.321904] ret_from_fork_asm+0x1a/0x30 [ 24.322131] [ 24.322277] The buggy address belongs to the object at ffff888101bb7fa0 [ 24.322277] which belongs to the cache kmalloc-16 of size 16 [ 24.322778] The buggy address is located 8 bytes inside of [ 24.322778] allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9) [ 24.323179] [ 24.323356] The buggy address belongs to the physical page: [ 24.323797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7 [ 24.324400] flags: 0x200000000000000(node=0|zone=2) [ 24.324791] page_type: f5(slab) [ 24.325096] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.325602] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.326085] page dumped because: kasan: bad access detected [ 24.326316] [ 24.326494] Memory state around the buggy address: [ 24.326857] ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.327097] ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.327613] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.328144] ^ [ 24.328420] ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.328793] ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 24.329296] ================================================================== [ 24.404673] ================================================================== [ 24.405646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.406466] Read of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290 [ 24.406829] [ 24.407473] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.407667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.407681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.407698] Call Trace: [ 24.407712] <TASK> [ 24.407727] dump_stack_lvl+0x73/0xb0 [ 24.407756] print_report+0xd1/0x650 [ 24.407775] ? __virt_addr_valid+0x1db/0x2d0 [ 24.407793] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.407816] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.407858] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.407882] kasan_report+0x141/0x180 [ 24.407900] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.407926] __asan_report_load8_noabort+0x18/0x20 [ 24.407946] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.407968] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.407991] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.408011] ? trace_hardirqs_on+0x37/0xe0 [ 24.408029] ? kasan_bitops_generic+0x92/0x1c0 [ 24.408051] kasan_bitops_generic+0x121/0x1c0 [ 24.408070] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.408091] ? __pfx_read_tsc+0x10/0x10 [ 24.408108] ? ktime_get_ts64+0x86/0x230 [ 24.408128] kunit_try_run_case+0x1a5/0x480 [ 24.408149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.408167] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.408185] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.408204] ? __kthread_parkme+0x82/0x180 [ 24.408221] ? preempt_count_sub+0x50/0x80 [ 24.408240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.408260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.408279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.408298] kthread+0x337/0x6f0 [ 24.408314] ? trace_preempt_on+0x20/0xc0 [ 24.408332] ? __pfx_kthread+0x10/0x10 [ 24.408349] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.408367] ? calculate_sigpending+0x7b/0xa0 [ 24.408404] ? __pfx_kthread+0x10/0x10 [ 24.408424] ret_from_fork+0x116/0x1d0 [ 24.408440] ? __pfx_kthread+0x10/0x10 [ 24.408457] ret_from_fork_asm+0x1a/0x30 [ 24.408484] </TASK> [ 24.408495] [ 24.420305] Allocated by task 290: [ 24.420563] kasan_save_stack+0x45/0x70 [ 24.420836] kasan_save_track+0x18/0x40 [ 24.421534] kasan_save_alloc_info+0x3b/0x50 [ 24.421705] __kasan_kmalloc+0xb7/0xc0 [ 24.422206] __kmalloc_cache_noprof+0x189/0x420 [ 24.422586] kasan_bitops_generic+0x92/0x1c0 [ 24.423096] kunit_try_run_case+0x1a5/0x480 [ 24.423330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.423570] kthread+0x337/0x6f0 [ 24.423788] ret_from_fork+0x116/0x1d0 [ 24.424285] ret_from_fork_asm+0x1a/0x30 [ 24.424605] [ 24.424756] The buggy address belongs to the object at ffff888101bb7fa0 [ 24.424756] which belongs to the cache kmalloc-16 of size 16 [ 24.425594] The buggy address is located 8 bytes inside of [ 24.425594] allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9) [ 24.426561] [ 24.426698] The buggy address belongs to the physical page: [ 24.426996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7 [ 24.427641] flags: 0x200000000000000(node=0|zone=2) [ 24.428029] page_type: f5(slab) [ 24.428176] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.428581] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.429268] page dumped because: kasan: bad access detected [ 24.429513] [ 24.429613] Memory state around the buggy address: [ 24.430034] ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.430588] ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.431142] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.431621] ^ [ 24.431757] ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.432346] ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 24.432682] ================================================================== [ 24.249529] ================================================================== [ 24.249857] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.250476] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290 [ 24.250817] [ 24.250998] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.251097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.251126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.251158] Call Trace: [ 24.251195] <TASK> [ 24.251222] dump_stack_lvl+0x73/0xb0 [ 24.251274] print_report+0xd1/0x650 [ 24.251314] ? __virt_addr_valid+0x1db/0x2d0 [ 24.251352] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.251408] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.251451] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.251492] kasan_report+0x141/0x180 [ 24.251528] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.251587] kasan_check_range+0x10c/0x1c0 [ 24.251629] __kasan_check_write+0x18/0x20 [ 24.251687] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.251731] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.251793] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.251834] ? trace_hardirqs_on+0x37/0xe0 [ 24.251876] ? kasan_bitops_generic+0x92/0x1c0 [ 24.251922] kasan_bitops_generic+0x121/0x1c0 [ 24.251967] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.252010] ? __pfx_read_tsc+0x10/0x10 [ 24.252066] ? ktime_get_ts64+0x86/0x230 [ 24.252109] kunit_try_run_case+0x1a5/0x480 [ 24.252167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.252206] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.252247] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.252284] ? __kthread_parkme+0x82/0x180 [ 24.252318] ? preempt_count_sub+0x50/0x80 [ 24.252357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.252421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.252476] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.252509] kthread+0x337/0x6f0 [ 24.252528] ? trace_preempt_on+0x20/0xc0 [ 24.252548] ? __pfx_kthread+0x10/0x10 [ 24.252566] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.252584] ? calculate_sigpending+0x7b/0xa0 [ 24.252604] ? __pfx_kthread+0x10/0x10 [ 24.252622] ret_from_fork+0x116/0x1d0 [ 24.252639] ? __pfx_kthread+0x10/0x10 [ 24.252656] ret_from_fork_asm+0x1a/0x30 [ 24.252683] </TASK> [ 24.252694] [ 24.262109] Allocated by task 290: [ 24.262423] kasan_save_stack+0x45/0x70 [ 24.262717] kasan_save_track+0x18/0x40 [ 24.263046] kasan_save_alloc_info+0x3b/0x50 [ 24.263227] __kasan_kmalloc+0xb7/0xc0 [ 24.263373] __kmalloc_cache_noprof+0x189/0x420 [ 24.263644] kasan_bitops_generic+0x92/0x1c0 [ 24.263946] kunit_try_run_case+0x1a5/0x480 [ 24.264287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.264562] kthread+0x337/0x6f0 [ 24.264676] ret_from_fork+0x116/0x1d0 [ 24.264922] ret_from_fork_asm+0x1a/0x30 [ 24.265312] [ 24.265468] The buggy address belongs to the object at ffff888101bb7fa0 [ 24.265468] which belongs to the cache kmalloc-16 of size 16 [ 24.266173] The buggy address is located 8 bytes inside of [ 24.266173] allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9) [ 24.266765] [ 24.266968] The buggy address belongs to the physical page: [ 24.267261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7 [ 24.267630] flags: 0x200000000000000(node=0|zone=2) [ 24.267853] page_type: f5(slab) [ 24.268149] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.268406] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.268629] page dumped because: kasan: bad access detected [ 24.268800] [ 24.268881] Memory state around the buggy address: [ 24.269039] ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.269252] ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.269621] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.270182] ^ [ 24.270536] ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.271083] ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 24.271547] ================================================================== [ 24.329917] ================================================================== [ 24.330357] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.330715] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290 [ 24.331259] [ 24.331452] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.331535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.331559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.331594] Call Trace: [ 24.331620] <TASK> [ 24.331647] dump_stack_lvl+0x73/0xb0 [ 24.331698] print_report+0xd1/0x650 [ 24.331730] ? __virt_addr_valid+0x1db/0x2d0 [ 24.331764] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.331803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.331902] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.331960] kasan_report+0x141/0x180 [ 24.332002] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.332075] kasan_check_range+0x10c/0x1c0 [ 24.332117] __kasan_check_write+0x18/0x20 [ 24.332170] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.332215] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.332286] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.332343] ? trace_hardirqs_on+0x37/0xe0 [ 24.332396] ? kasan_bitops_generic+0x92/0x1c0 [ 24.332441] kasan_bitops_generic+0x121/0x1c0 [ 24.332474] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.332496] ? __pfx_read_tsc+0x10/0x10 [ 24.332515] ? ktime_get_ts64+0x86/0x230 [ 24.332535] kunit_try_run_case+0x1a5/0x480 [ 24.332556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.332574] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.332593] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.332621] ? __kthread_parkme+0x82/0x180 [ 24.332651] ? preempt_count_sub+0x50/0x80 [ 24.332691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.332731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.332771] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.332809] kthread+0x337/0x6f0 [ 24.332875] ? trace_preempt_on+0x20/0xc0 [ 24.332913] ? __pfx_kthread+0x10/0x10 [ 24.332964] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.333005] ? calculate_sigpending+0x7b/0xa0 [ 24.333047] ? __pfx_kthread+0x10/0x10 [ 24.333088] ret_from_fork+0x116/0x1d0 [ 24.333122] ? __pfx_kthread+0x10/0x10 [ 24.333144] ret_from_fork_asm+0x1a/0x30 [ 24.333171] </TASK> [ 24.333183] [ 24.342654] Allocated by task 290: [ 24.342967] kasan_save_stack+0x45/0x70 [ 24.343262] kasan_save_track+0x18/0x40 [ 24.343471] kasan_save_alloc_info+0x3b/0x50 [ 24.343710] __kasan_kmalloc+0xb7/0xc0 [ 24.343983] __kmalloc_cache_noprof+0x189/0x420 [ 24.344274] kasan_bitops_generic+0x92/0x1c0 [ 24.344572] kunit_try_run_case+0x1a5/0x480 [ 24.344847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.345168] kthread+0x337/0x6f0 [ 24.345440] ret_from_fork+0x116/0x1d0 [ 24.345630] ret_from_fork_asm+0x1a/0x30 [ 24.345768] [ 24.345950] The buggy address belongs to the object at ffff888101bb7fa0 [ 24.345950] which belongs to the cache kmalloc-16 of size 16 [ 24.346488] The buggy address is located 8 bytes inside of [ 24.346488] allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9) [ 24.346888] [ 24.346982] The buggy address belongs to the physical page: [ 24.347164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7 [ 24.347422] flags: 0x200000000000000(node=0|zone=2) [ 24.347769] page_type: f5(slab) [ 24.348048] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.348558] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.349056] page dumped because: kasan: bad access detected [ 24.349452] [ 24.349602] Memory state around the buggy address: [ 24.349951] ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.350435] ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.350805] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.351172] ^ [ 24.351371] ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.352874] ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 24.353100] ================================================================== [ 24.274220] ================================================================== [ 24.274535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.275645] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290 [ 24.275898] [ 24.276002] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.276081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.276105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.276140] Call Trace: [ 24.276165] <TASK> [ 24.276193] dump_stack_lvl+0x73/0xb0 [ 24.276244] print_report+0xd1/0x650 [ 24.276285] ? __virt_addr_valid+0x1db/0x2d0 [ 24.276326] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.276372] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.276432] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.276480] kasan_report+0x141/0x180 [ 24.276520] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.276576] kasan_check_range+0x10c/0x1c0 [ 24.276620] __kasan_check_write+0x18/0x20 [ 24.276660] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.276708] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.276756] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.276799] ? trace_hardirqs_on+0x37/0xe0 [ 24.276837] ? kasan_bitops_generic+0x92/0x1c0 [ 24.276886] kasan_bitops_generic+0x121/0x1c0 [ 24.276928] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.276971] ? __pfx_read_tsc+0x10/0x10 [ 24.277008] ? ktime_get_ts64+0x86/0x230 [ 24.277051] kunit_try_run_case+0x1a5/0x480 [ 24.277093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.277134] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.277173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.277215] ? __kthread_parkme+0x82/0x180 [ 24.277253] ? preempt_count_sub+0x50/0x80 [ 24.277291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.277324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.277361] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.277414] kthread+0x337/0x6f0 [ 24.277450] ? trace_preempt_on+0x20/0xc0 [ 24.277491] ? __pfx_kthread+0x10/0x10 [ 24.277530] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.277566] ? calculate_sigpending+0x7b/0xa0 [ 24.277608] ? __pfx_kthread+0x10/0x10 [ 24.277650] ret_from_fork+0x116/0x1d0 [ 24.277676] ? __pfx_kthread+0x10/0x10 [ 24.277720] ret_from_fork_asm+0x1a/0x30 [ 24.277790] </TASK> [ 24.277815] [ 24.291495] Allocated by task 290: [ 24.291650] kasan_save_stack+0x45/0x70 [ 24.292020] kasan_save_track+0x18/0x40 [ 24.292362] kasan_save_alloc_info+0x3b/0x50 [ 24.292726] __kasan_kmalloc+0xb7/0xc0 [ 24.293083] __kmalloc_cache_noprof+0x189/0x420 [ 24.293398] kasan_bitops_generic+0x92/0x1c0 [ 24.293715] kunit_try_run_case+0x1a5/0x480 [ 24.294018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.294455] kthread+0x337/0x6f0 [ 24.294737] ret_from_fork+0x116/0x1d0 [ 24.294937] ret_from_fork_asm+0x1a/0x30 [ 24.295097] [ 24.295182] The buggy address belongs to the object at ffff888101bb7fa0 [ 24.295182] which belongs to the cache kmalloc-16 of size 16 [ 24.296170] The buggy address is located 8 bytes inside of [ 24.296170] allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9) [ 24.297021] [ 24.297171] The buggy address belongs to the physical page: [ 24.297348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7 [ 24.297947] flags: 0x200000000000000(node=0|zone=2) [ 24.298419] page_type: f5(slab) [ 24.298614] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.298927] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.299473] page dumped because: kasan: bad access detected [ 24.299858] [ 24.300033] Memory state around the buggy address: [ 24.300224] ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.300457] ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.301064] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.301557] ^ [ 24.301944] ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.302186] ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 24.302558] ================================================================== [ 24.375692] ================================================================== [ 24.376040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.376434] Read of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290 [ 24.376654] [ 24.376758] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) [ 24.376861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.376887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.376923] Call Trace: [ 24.376951] <TASK> [ 24.376979] dump_stack_lvl+0x73/0xb0 [ 24.377029] print_report+0xd1/0x650 [ 24.377068] ? __virt_addr_valid+0x1db/0x2d0 [ 24.377109] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.377155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.377200] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.377248] kasan_report+0x141/0x180 [ 24.377281] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.377323] kasan_check_range+0x10c/0x1c0 [ 24.377356] __kasan_check_read+0x15/0x20 [ 24.377402] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.377443] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.377489] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.377530] ? trace_hardirqs_on+0x37/0xe0 [ 24.377568] ? kasan_bitops_generic+0x92/0x1c0 [ 24.377616] kasan_bitops_generic+0x121/0x1c0 [ 24.377658] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.377701] ? __pfx_read_tsc+0x10/0x10 [ 24.377739] ? ktime_get_ts64+0x86/0x230 [ 24.377784] kunit_try_run_case+0x1a5/0x480 [ 24.377857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.377900] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.377941] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.377985] ? __kthread_parkme+0x82/0x180 [ 24.378033] ? preempt_count_sub+0x50/0x80 [ 24.378081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.378129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.378174] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.378220] kthread+0x337/0x6f0 [ 24.378259] ? trace_preempt_on+0x20/0xc0 [ 24.378303] ? __pfx_kthread+0x10/0x10 [ 24.378344] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.378397] ? calculate_sigpending+0x7b/0xa0 [ 24.378441] ? __pfx_kthread+0x10/0x10 [ 24.378473] ret_from_fork+0x116/0x1d0 [ 24.378502] ? __pfx_kthread+0x10/0x10 [ 24.378534] ret_from_fork_asm+0x1a/0x30 [ 24.378591] </TASK> [ 24.378612] [ 24.391567] Allocated by task 290: [ 24.391751] kasan_save_stack+0x45/0x70 [ 24.391890] kasan_save_track+0x18/0x40 [ 24.392528] kasan_save_alloc_info+0x3b/0x50 [ 24.392692] __kasan_kmalloc+0xb7/0xc0 [ 24.393231] __kmalloc_cache_noprof+0x189/0x420 [ 24.393496] kasan_bitops_generic+0x92/0x1c0 [ 24.394056] kunit_try_run_case+0x1a5/0x480 [ 24.394222] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.394793] kthread+0x337/0x6f0 [ 24.395247] ret_from_fork+0x116/0x1d0 [ 24.395442] ret_from_fork_asm+0x1a/0x30 [ 24.395622] [ 24.395716] The buggy address belongs to the object at ffff888101bb7fa0 [ 24.395716] which belongs to the cache kmalloc-16 of size 16 [ 24.396704] The buggy address is located 8 bytes inside of [ 24.396704] allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9) [ 24.397442] [ 24.397588] The buggy address belongs to the physical page: [ 24.398261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7 [ 24.398562] flags: 0x200000000000000(node=0|zone=2) [ 24.398879] page_type: f5(slab) [ 24.399196] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.399511] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.399797] page dumped because: kasan: bad access detected [ 24.400764] [ 24.400892] Memory state around the buggy address: [ 24.401072] ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.401334] ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.401864] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.402270] ^ [ 24.402523] ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.402861] ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 24.403715] ==================================================================