Date
July 9, 2025, 1:08 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 26.332102] ================================================================== [ 26.332401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.332705] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311 [ 26.333083] [ 26.333207] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.333254] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.333268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.333289] Call Trace: [ 26.333302] <TASK> [ 26.333317] dump_stack_lvl+0x73/0xb0 [ 26.333357] print_report+0xd1/0x610 [ 26.333378] ? __virt_addr_valid+0x1db/0x2d0 [ 26.333401] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.333438] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.333463] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.333490] kasan_report+0x141/0x180 [ 26.333512] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.333542] kasan_check_range+0x10c/0x1c0 [ 26.333565] __kasan_check_write+0x18/0x20 [ 26.333588] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.333614] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.333641] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.333664] ? trace_hardirqs_on+0x37/0xe0 [ 26.333685] ? kasan_bitops_generic+0x92/0x1c0 [ 26.333720] kasan_bitops_generic+0x121/0x1c0 [ 26.333744] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.333786] ? __pfx_read_tsc+0x10/0x10 [ 26.333817] ? ktime_get_ts64+0x86/0x230 [ 26.333842] kunit_try_run_case+0x1a5/0x480 [ 26.333863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.333895] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.333920] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.333944] ? __kthread_parkme+0x82/0x180 [ 26.333964] ? preempt_count_sub+0x50/0x80 [ 26.333987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.334009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.334034] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.334058] kthread+0x337/0x6f0 [ 26.334078] ? trace_preempt_on+0x20/0xc0 [ 26.334100] ? __pfx_kthread+0x10/0x10 [ 26.334120] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.334142] ? calculate_sigpending+0x7b/0xa0 [ 26.334166] ? __pfx_kthread+0x10/0x10 [ 26.334187] ret_from_fork+0x116/0x1d0 [ 26.334206] ? __pfx_kthread+0x10/0x10 [ 26.334226] ret_from_fork_asm+0x1a/0x30 [ 26.334257] </TASK> [ 26.334269] [ 26.342233] Allocated by task 311: [ 26.342409] kasan_save_stack+0x45/0x70 [ 26.342565] kasan_save_track+0x18/0x40 [ 26.342706] kasan_save_alloc_info+0x3b/0x50 [ 26.342908] __kasan_kmalloc+0xb7/0xc0 [ 26.343104] __kmalloc_cache_noprof+0x189/0x420 [ 26.343318] kasan_bitops_generic+0x92/0x1c0 [ 26.343517] kunit_try_run_case+0x1a5/0x480 [ 26.343703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.343902] kthread+0x337/0x6f0 [ 26.344067] ret_from_fork+0x116/0x1d0 [ 26.344249] ret_from_fork_asm+0x1a/0x30 [ 26.344457] [ 26.344555] The buggy address belongs to the object at ffff8881058a8240 [ 26.344555] which belongs to the cache kmalloc-16 of size 16 [ 26.345073] The buggy address is located 8 bytes inside of [ 26.345073] allocated 9-byte region [ffff8881058a8240, ffff8881058a8249) [ 26.345548] [ 26.345614] The buggy address belongs to the physical page: [ 26.345810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8 [ 26.346041] flags: 0x200000000000000(node=0|zone=2) [ 26.346193] page_type: f5(slab) [ 26.346351] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.346750] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.347146] page dumped because: kasan: bad access detected [ 26.347437] [ 26.347526] Memory state around the buggy address: [ 26.347742] ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.347971] ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 26.348177] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.348453] ^ [ 26.348712] ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.349055] ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.349390] ================================================================== [ 26.424212] ================================================================== [ 26.424548] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.424980] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311 [ 26.425214] [ 26.425292] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.425339] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.425352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.425372] Call Trace: [ 26.425385] <TASK> [ 26.425401] dump_stack_lvl+0x73/0xb0 [ 26.425431] print_report+0xd1/0x610 [ 26.425452] ? __virt_addr_valid+0x1db/0x2d0 [ 26.425475] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.425501] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.425527] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.425555] kasan_report+0x141/0x180 [ 26.425576] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.425607] kasan_check_range+0x10c/0x1c0 [ 26.425630] __kasan_check_write+0x18/0x20 [ 26.425653] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.425680] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.425719] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.425742] ? trace_hardirqs_on+0x37/0xe0 [ 26.425763] ? kasan_bitops_generic+0x92/0x1c0 [ 26.425790] kasan_bitops_generic+0x121/0x1c0 [ 26.425813] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.425838] ? __pfx_read_tsc+0x10/0x10 [ 26.425860] ? ktime_get_ts64+0x86/0x230 [ 26.425884] kunit_try_run_case+0x1a5/0x480 [ 26.425906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.425926] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.425949] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.425974] ? __kthread_parkme+0x82/0x180 [ 26.425994] ? preempt_count_sub+0x50/0x80 [ 26.426017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.426039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.426064] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.426090] kthread+0x337/0x6f0 [ 26.426110] ? trace_preempt_on+0x20/0xc0 [ 26.426134] ? __pfx_kthread+0x10/0x10 [ 26.426156] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.426178] ? calculate_sigpending+0x7b/0xa0 [ 26.426202] ? __pfx_kthread+0x10/0x10 [ 26.426224] ret_from_fork+0x116/0x1d0 [ 26.426243] ? __pfx_kthread+0x10/0x10 [ 26.426263] ret_from_fork_asm+0x1a/0x30 [ 26.426295] </TASK> [ 26.426306] [ 26.433873] Allocated by task 311: [ 26.434017] kasan_save_stack+0x45/0x70 [ 26.434205] kasan_save_track+0x18/0x40 [ 26.434389] kasan_save_alloc_info+0x3b/0x50 [ 26.434576] __kasan_kmalloc+0xb7/0xc0 [ 26.434712] __kmalloc_cache_noprof+0x189/0x420 [ 26.434919] kasan_bitops_generic+0x92/0x1c0 [ 26.435124] kunit_try_run_case+0x1a5/0x480 [ 26.435326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.435570] kthread+0x337/0x6f0 [ 26.435728] ret_from_fork+0x116/0x1d0 [ 26.435934] ret_from_fork_asm+0x1a/0x30 [ 26.436107] [ 26.436171] The buggy address belongs to the object at ffff8881058a8240 [ 26.436171] which belongs to the cache kmalloc-16 of size 16 [ 26.436658] The buggy address is located 8 bytes inside of [ 26.436658] allocated 9-byte region [ffff8881058a8240, ffff8881058a8249) [ 26.438717] [ 26.439095] The buggy address belongs to the physical page: [ 26.439583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8 [ 26.440231] flags: 0x200000000000000(node=0|zone=2) [ 26.441074] page_type: f5(slab) [ 26.441518] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.441767] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.442904] page dumped because: kasan: bad access detected [ 26.443487] [ 26.443563] Memory state around the buggy address: [ 26.443728] ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.444384] ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 26.445088] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.445457] ^ [ 26.445957] ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.446298] ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.446945] ================================================================== [ 26.402417] ================================================================== [ 26.402751] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.403269] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311 [ 26.403594] [ 26.403703] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.403750] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.403781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.403801] Call Trace: [ 26.403819] <TASK> [ 26.403835] dump_stack_lvl+0x73/0xb0 [ 26.403862] print_report+0xd1/0x610 [ 26.403884] ? __virt_addr_valid+0x1db/0x2d0 [ 26.403906] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.403933] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.403958] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.403984] kasan_report+0x141/0x180 [ 26.404006] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.404036] kasan_check_range+0x10c/0x1c0 [ 26.404059] __kasan_check_write+0x18/0x20 [ 26.404082] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.404109] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.404137] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.404159] ? trace_hardirqs_on+0x37/0xe0 [ 26.404181] ? kasan_bitops_generic+0x92/0x1c0 [ 26.404208] kasan_bitops_generic+0x121/0x1c0 [ 26.404231] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.404255] ? __pfx_read_tsc+0x10/0x10 [ 26.404276] ? ktime_get_ts64+0x86/0x230 [ 26.404300] kunit_try_run_case+0x1a5/0x480 [ 26.404321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.404342] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.404365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.404389] ? __kthread_parkme+0x82/0x180 [ 26.404409] ? preempt_count_sub+0x50/0x80 [ 26.404432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.404453] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.404478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.404503] kthread+0x337/0x6f0 [ 26.404522] ? trace_preempt_on+0x20/0xc0 [ 26.404544] ? __pfx_kthread+0x10/0x10 [ 26.404565] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.404586] ? calculate_sigpending+0x7b/0xa0 [ 26.404609] ? __pfx_kthread+0x10/0x10 [ 26.404631] ret_from_fork+0x116/0x1d0 [ 26.404650] ? __pfx_kthread+0x10/0x10 [ 26.404670] ret_from_fork_asm+0x1a/0x30 [ 26.405243] </TASK> [ 26.405264] [ 26.415898] Allocated by task 311: [ 26.416083] kasan_save_stack+0x45/0x70 [ 26.416283] kasan_save_track+0x18/0x40 [ 26.416449] kasan_save_alloc_info+0x3b/0x50 [ 26.416627] __kasan_kmalloc+0xb7/0xc0 [ 26.416790] __kmalloc_cache_noprof+0x189/0x420 [ 26.416954] kasan_bitops_generic+0x92/0x1c0 [ 26.417160] kunit_try_run_case+0x1a5/0x480 [ 26.417357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.417608] kthread+0x337/0x6f0 [ 26.417810] ret_from_fork+0x116/0x1d0 [ 26.417960] ret_from_fork_asm+0x1a/0x30 [ 26.418136] [ 26.418225] The buggy address belongs to the object at ffff8881058a8240 [ 26.418225] which belongs to the cache kmalloc-16 of size 16 [ 26.418594] The buggy address is located 8 bytes inside of [ 26.418594] allocated 9-byte region [ffff8881058a8240, ffff8881058a8249) [ 26.419063] [ 26.419153] The buggy address belongs to the physical page: [ 26.419398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8 [ 26.419665] flags: 0x200000000000000(node=0|zone=2) [ 26.419859] page_type: f5(slab) [ 26.419979] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.420313] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.420648] page dumped because: kasan: bad access detected [ 26.420934] [ 26.421020] Memory state around the buggy address: [ 26.421185] ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.421474] ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 26.421780] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.422059] ^ [ 26.422250] ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.422502] ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.422836] ================================================================== [ 26.469008] ================================================================== [ 26.469638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.470212] Read of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311 [ 26.470511] [ 26.470590] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.470639] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.470652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.470672] Call Trace: [ 26.470686] <TASK> [ 26.470712] dump_stack_lvl+0x73/0xb0 [ 26.470740] print_report+0xd1/0x610 [ 26.470761] ? __virt_addr_valid+0x1db/0x2d0 [ 26.470784] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.470812] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.470838] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.470865] kasan_report+0x141/0x180 [ 26.470887] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.470918] __asan_report_load8_noabort+0x18/0x20 [ 26.470942] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.470980] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.471007] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.471042] ? trace_hardirqs_on+0x37/0xe0 [ 26.471064] ? kasan_bitops_generic+0x92/0x1c0 [ 26.471091] kasan_bitops_generic+0x121/0x1c0 [ 26.471113] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.471138] ? __pfx_read_tsc+0x10/0x10 [ 26.471159] ? ktime_get_ts64+0x86/0x230 [ 26.471185] kunit_try_run_case+0x1a5/0x480 [ 26.471208] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.471248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.471272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.471307] ? __kthread_parkme+0x82/0x180 [ 26.471327] ? preempt_count_sub+0x50/0x80 [ 26.471350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.471372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.471397] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.471423] kthread+0x337/0x6f0 [ 26.471442] ? trace_preempt_on+0x20/0xc0 [ 26.471463] ? __pfx_kthread+0x10/0x10 [ 26.471484] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.471506] ? calculate_sigpending+0x7b/0xa0 [ 26.471530] ? __pfx_kthread+0x10/0x10 [ 26.471551] ret_from_fork+0x116/0x1d0 [ 26.471570] ? __pfx_kthread+0x10/0x10 [ 26.471591] ret_from_fork_asm+0x1a/0x30 [ 26.471622] </TASK> [ 26.471633] [ 26.480143] Allocated by task 311: [ 26.480484] kasan_save_stack+0x45/0x70 [ 26.480946] kasan_save_track+0x18/0x40 [ 26.481118] kasan_save_alloc_info+0x3b/0x50 [ 26.481833] __kasan_kmalloc+0xb7/0xc0 [ 26.482162] __kmalloc_cache_noprof+0x189/0x420 [ 26.482640] kasan_bitops_generic+0x92/0x1c0 [ 26.482840] kunit_try_run_case+0x1a5/0x480 [ 26.483228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.483729] kthread+0x337/0x6f0 [ 26.484710] ret_from_fork+0x116/0x1d0 [ 26.485133] ret_from_fork_asm+0x1a/0x30 [ 26.485384] [ 26.485450] The buggy address belongs to the object at ffff8881058a8240 [ 26.485450] which belongs to the cache kmalloc-16 of size 16 [ 26.485838] The buggy address is located 8 bytes inside of [ 26.485838] allocated 9-byte region [ffff8881058a8240, ffff8881058a8249) [ 26.486290] [ 26.486356] The buggy address belongs to the physical page: [ 26.486608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8 [ 26.486863] flags: 0x200000000000000(node=0|zone=2) [ 26.487061] page_type: f5(slab) [ 26.487258] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.487596] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.488008] page dumped because: kasan: bad access detected [ 26.488234] [ 26.488297] Memory state around the buggy address: [ 26.488444] ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.488662] ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 26.489041] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.489331] ^ [ 26.489567] ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.489890] ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.490297] ================================================================== [ 26.385616] ================================================================== [ 26.386117] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.386485] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311 [ 26.386825] [ 26.386933] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.386992] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.387005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.387038] Call Trace: [ 26.387050] <TASK> [ 26.387065] dump_stack_lvl+0x73/0xb0 [ 26.387094] print_report+0xd1/0x610 [ 26.387123] ? __virt_addr_valid+0x1db/0x2d0 [ 26.387146] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.387182] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.387208] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.387234] kasan_report+0x141/0x180 [ 26.387265] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.387298] kasan_check_range+0x10c/0x1c0 [ 26.387323] __kasan_check_write+0x18/0x20 [ 26.387356] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.387382] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.387418] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.387442] ? trace_hardirqs_on+0x37/0xe0 [ 26.387463] ? kasan_bitops_generic+0x92/0x1c0 [ 26.387502] kasan_bitops_generic+0x121/0x1c0 [ 26.387525] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.387549] ? __pfx_read_tsc+0x10/0x10 [ 26.387580] ? ktime_get_ts64+0x86/0x230 [ 26.387605] kunit_try_run_case+0x1a5/0x480 [ 26.387627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.387647] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.387670] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.387702] ? __kthread_parkme+0x82/0x180 [ 26.387722] ? preempt_count_sub+0x50/0x80 [ 26.387745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.387785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.387811] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.387839] kthread+0x337/0x6f0 [ 26.387859] ? trace_preempt_on+0x20/0xc0 [ 26.387881] ? __pfx_kthread+0x10/0x10 [ 26.387902] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.387924] ? calculate_sigpending+0x7b/0xa0 [ 26.387948] ? __pfx_kthread+0x10/0x10 [ 26.387969] ret_from_fork+0x116/0x1d0 [ 26.387988] ? __pfx_kthread+0x10/0x10 [ 26.388009] ret_from_fork_asm+0x1a/0x30 [ 26.388040] </TASK> [ 26.388051] [ 26.395276] Allocated by task 311: [ 26.395426] kasan_save_stack+0x45/0x70 [ 26.395595] kasan_save_track+0x18/0x40 [ 26.395818] kasan_save_alloc_info+0x3b/0x50 [ 26.396000] __kasan_kmalloc+0xb7/0xc0 [ 26.396148] __kmalloc_cache_noprof+0x189/0x420 [ 26.396340] kasan_bitops_generic+0x92/0x1c0 [ 26.396521] kunit_try_run_case+0x1a5/0x480 [ 26.396703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.396963] kthread+0x337/0x6f0 [ 26.397110] ret_from_fork+0x116/0x1d0 [ 26.397250] ret_from_fork_asm+0x1a/0x30 [ 26.397431] [ 26.397507] The buggy address belongs to the object at ffff8881058a8240 [ 26.397507] which belongs to the cache kmalloc-16 of size 16 [ 26.398004] The buggy address is located 8 bytes inside of [ 26.398004] allocated 9-byte region [ffff8881058a8240, ffff8881058a8249) [ 26.398462] [ 26.398531] The buggy address belongs to the physical page: [ 26.398798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8 [ 26.399124] flags: 0x200000000000000(node=0|zone=2) [ 26.399319] page_type: f5(slab) [ 26.399465] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.399758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.400096] page dumped because: kasan: bad access detected [ 26.400287] [ 26.400351] Memory state around the buggy address: [ 26.400565] ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.400853] ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 26.401157] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.401426] ^ [ 26.401598] ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.401838] ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.402046] ================================================================== [ 26.367852] ================================================================== [ 26.368233] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.368638] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311 [ 26.368980] [ 26.369087] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.369133] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.369147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.369178] Call Trace: [ 26.369192] <TASK> [ 26.369205] dump_stack_lvl+0x73/0xb0 [ 26.369234] print_report+0xd1/0x610 [ 26.369264] ? __virt_addr_valid+0x1db/0x2d0 [ 26.369287] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.369323] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.369350] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.369376] kasan_report+0x141/0x180 [ 26.369407] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.369438] kasan_check_range+0x10c/0x1c0 [ 26.369460] __kasan_check_write+0x18/0x20 [ 26.369494] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.369521] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.369558] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.369582] ? trace_hardirqs_on+0x37/0xe0 [ 26.369603] ? kasan_bitops_generic+0x92/0x1c0 [ 26.369629] kasan_bitops_generic+0x121/0x1c0 [ 26.369652] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.369676] ? __pfx_read_tsc+0x10/0x10 [ 26.369705] ? ktime_get_ts64+0x86/0x230 [ 26.369730] kunit_try_run_case+0x1a5/0x480 [ 26.369751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.369791] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.369814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.369838] ? __kthread_parkme+0x82/0x180 [ 26.369867] ? preempt_count_sub+0x50/0x80 [ 26.369891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.369912] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.369947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.369972] kthread+0x337/0x6f0 [ 26.369991] ? trace_preempt_on+0x20/0xc0 [ 26.370013] ? __pfx_kthread+0x10/0x10 [ 26.370034] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.370056] ? calculate_sigpending+0x7b/0xa0 [ 26.370080] ? __pfx_kthread+0x10/0x10 [ 26.370101] ret_from_fork+0x116/0x1d0 [ 26.370120] ? __pfx_kthread+0x10/0x10 [ 26.370140] ret_from_fork_asm+0x1a/0x30 [ 26.370171] </TASK> [ 26.370182] [ 26.378121] Allocated by task 311: [ 26.378289] kasan_save_stack+0x45/0x70 [ 26.378472] kasan_save_track+0x18/0x40 [ 26.378651] kasan_save_alloc_info+0x3b/0x50 [ 26.378870] __kasan_kmalloc+0xb7/0xc0 [ 26.379065] __kmalloc_cache_noprof+0x189/0x420 [ 26.379238] kasan_bitops_generic+0x92/0x1c0 [ 26.379379] kunit_try_run_case+0x1a5/0x480 [ 26.379515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.379683] kthread+0x337/0x6f0 [ 26.379832] ret_from_fork+0x116/0x1d0 [ 26.379958] ret_from_fork_asm+0x1a/0x30 [ 26.380090] [ 26.380192] The buggy address belongs to the object at ffff8881058a8240 [ 26.380192] which belongs to the cache kmalloc-16 of size 16 [ 26.380723] The buggy address is located 8 bytes inside of [ 26.380723] allocated 9-byte region [ffff8881058a8240, ffff8881058a8249) [ 26.381253] [ 26.381342] The buggy address belongs to the physical page: [ 26.381536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8 [ 26.381801] flags: 0x200000000000000(node=0|zone=2) [ 26.381955] page_type: f5(slab) [ 26.382069] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.382293] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.382586] page dumped because: kasan: bad access detected [ 26.382886] [ 26.382989] Memory state around the buggy address: [ 26.383247] ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.383599] ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 26.383980] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.384289] ^ [ 26.384534] ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.384893] ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.385164] ================================================================== [ 26.312298] ================================================================== [ 26.312629] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.314746] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311 [ 26.315049] [ 26.315179] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.315230] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.315243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.315264] Call Trace: [ 26.315280] <TASK> [ 26.315297] dump_stack_lvl+0x73/0xb0 [ 26.315339] print_report+0xd1/0x610 [ 26.315361] ? __virt_addr_valid+0x1db/0x2d0 [ 26.315384] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.315422] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.315447] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.315474] kasan_report+0x141/0x180 [ 26.315504] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.315535] kasan_check_range+0x10c/0x1c0 [ 26.315568] __kasan_check_write+0x18/0x20 [ 26.315591] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.315618] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.315645] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.315668] ? trace_hardirqs_on+0x37/0xe0 [ 26.315699] ? kasan_bitops_generic+0x92/0x1c0 [ 26.315728] kasan_bitops_generic+0x121/0x1c0 [ 26.315752] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.315798] ? __pfx_read_tsc+0x10/0x10 [ 26.315834] ? ktime_get_ts64+0x86/0x230 [ 26.315859] kunit_try_run_case+0x1a5/0x480 [ 26.315881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.315915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.315938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.315962] ? __kthread_parkme+0x82/0x180 [ 26.315982] ? preempt_count_sub+0x50/0x80 [ 26.316016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.316038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.316074] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.316100] kthread+0x337/0x6f0 [ 26.316120] ? trace_preempt_on+0x20/0xc0 [ 26.316144] ? __pfx_kthread+0x10/0x10 [ 26.316165] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.316187] ? calculate_sigpending+0x7b/0xa0 [ 26.316211] ? __pfx_kthread+0x10/0x10 [ 26.316233] ret_from_fork+0x116/0x1d0 [ 26.316252] ? __pfx_kthread+0x10/0x10 [ 26.316272] ret_from_fork_asm+0x1a/0x30 [ 26.316302] </TASK> [ 26.316314] [ 26.324255] Allocated by task 311: [ 26.324422] kasan_save_stack+0x45/0x70 [ 26.324603] kasan_save_track+0x18/0x40 [ 26.324836] kasan_save_alloc_info+0x3b/0x50 [ 26.324980] __kasan_kmalloc+0xb7/0xc0 [ 26.325116] __kmalloc_cache_noprof+0x189/0x420 [ 26.325351] kasan_bitops_generic+0x92/0x1c0 [ 26.325578] kunit_try_run_case+0x1a5/0x480 [ 26.325798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.325998] kthread+0x337/0x6f0 [ 26.326159] ret_from_fork+0x116/0x1d0 [ 26.326334] ret_from_fork_asm+0x1a/0x30 [ 26.326520] [ 26.326624] The buggy address belongs to the object at ffff8881058a8240 [ 26.326624] which belongs to the cache kmalloc-16 of size 16 [ 26.327121] The buggy address is located 8 bytes inside of [ 26.327121] allocated 9-byte region [ffff8881058a8240, ffff8881058a8249) [ 26.327616] [ 26.327710] The buggy address belongs to the physical page: [ 26.328000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8 [ 26.328248] flags: 0x200000000000000(node=0|zone=2) [ 26.328405] page_type: f5(slab) [ 26.328518] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.328798] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.329146] page dumped because: kasan: bad access detected [ 26.329386] [ 26.329472] Memory state around the buggy address: [ 26.329682] ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.329972] ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 26.330186] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.330420] ^ [ 26.330690] ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.331036] ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.331368] ================================================================== [ 26.447560] ================================================================== [ 26.447902] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.448680] Read of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311 [ 26.449304] [ 26.449404] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.449465] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.449479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.449499] Call Trace: [ 26.449526] <TASK> [ 26.449551] dump_stack_lvl+0x73/0xb0 [ 26.449581] print_report+0xd1/0x610 [ 26.449603] ? __virt_addr_valid+0x1db/0x2d0 [ 26.449637] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.449663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.449689] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.449725] kasan_report+0x141/0x180 [ 26.449747] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.449787] kasan_check_range+0x10c/0x1c0 [ 26.449811] __kasan_check_read+0x15/0x20 [ 26.449833] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.449861] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.449889] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.449912] ? trace_hardirqs_on+0x37/0xe0 [ 26.449934] ? kasan_bitops_generic+0x92/0x1c0 [ 26.449960] kasan_bitops_generic+0x121/0x1c0 [ 26.449983] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.450008] ? __pfx_read_tsc+0x10/0x10 [ 26.450028] ? ktime_get_ts64+0x86/0x230 [ 26.450053] kunit_try_run_case+0x1a5/0x480 [ 26.450075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.450095] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.450118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.450142] ? __kthread_parkme+0x82/0x180 [ 26.450163] ? preempt_count_sub+0x50/0x80 [ 26.450186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.450208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.450234] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.450260] kthread+0x337/0x6f0 [ 26.450280] ? trace_preempt_on+0x20/0xc0 [ 26.450304] ? __pfx_kthread+0x10/0x10 [ 26.450326] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.450348] ? calculate_sigpending+0x7b/0xa0 [ 26.450372] ? __pfx_kthread+0x10/0x10 [ 26.450393] ret_from_fork+0x116/0x1d0 [ 26.450412] ? __pfx_kthread+0x10/0x10 [ 26.450433] ret_from_fork_asm+0x1a/0x30 [ 26.450463] </TASK> [ 26.450474] [ 26.460920] Allocated by task 311: [ 26.461058] kasan_save_stack+0x45/0x70 [ 26.461193] kasan_save_track+0x18/0x40 [ 26.461366] kasan_save_alloc_info+0x3b/0x50 [ 26.461594] __kasan_kmalloc+0xb7/0xc0 [ 26.461779] __kmalloc_cache_noprof+0x189/0x420 [ 26.462189] kasan_bitops_generic+0x92/0x1c0 [ 26.462391] kunit_try_run_case+0x1a5/0x480 [ 26.462539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.462836] kthread+0x337/0x6f0 [ 26.462961] ret_from_fork+0x116/0x1d0 [ 26.463086] ret_from_fork_asm+0x1a/0x30 [ 26.463218] [ 26.463307] The buggy address belongs to the object at ffff8881058a8240 [ 26.463307] which belongs to the cache kmalloc-16 of size 16 [ 26.463992] The buggy address is located 8 bytes inside of [ 26.463992] allocated 9-byte region [ffff8881058a8240, ffff8881058a8249) [ 26.464471] [ 26.464549] The buggy address belongs to the physical page: [ 26.464802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8 [ 26.465138] flags: 0x200000000000000(node=0|zone=2) [ 26.465346] page_type: f5(slab) [ 26.465530] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.465846] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.466186] page dumped because: kasan: bad access detected [ 26.466451] [ 26.466530] Memory state around the buggy address: [ 26.466712] ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.467167] ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 26.467461] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.467785] ^ [ 26.467975] ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.468184] ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.468388] ================================================================== [ 26.350163] ================================================================== [ 26.350550] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.350988] Write of size 8 at addr ffff8881058a8248 by task kunit_try_catch/311 [ 26.351300] [ 26.351408] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5-next-20250709 #1 PREEMPT(voluntary) [ 26.351456] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.351480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.351499] Call Trace: [ 26.351514] <TASK> [ 26.351529] dump_stack_lvl+0x73/0xb0 [ 26.351568] print_report+0xd1/0x610 [ 26.351590] ? __virt_addr_valid+0x1db/0x2d0 [ 26.351613] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.351639] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.351664] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.351691] kasan_report+0x141/0x180 [ 26.351720] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.351752] kasan_check_range+0x10c/0x1c0 [ 26.351794] __kasan_check_write+0x18/0x20 [ 26.351823] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.351852] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.351879] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.351903] ? trace_hardirqs_on+0x37/0xe0 [ 26.351925] ? kasan_bitops_generic+0x92/0x1c0 [ 26.351951] kasan_bitops_generic+0x121/0x1c0 [ 26.351974] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.351999] ? __pfx_read_tsc+0x10/0x10 [ 26.352019] ? ktime_get_ts64+0x86/0x230 [ 26.352042] kunit_try_run_case+0x1a5/0x480 [ 26.352064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.352084] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.352108] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.352131] ? __kthread_parkme+0x82/0x180 [ 26.352152] ? preempt_count_sub+0x50/0x80 [ 26.352175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.352196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.352231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.352256] kthread+0x337/0x6f0 [ 26.352275] ? trace_preempt_on+0x20/0xc0 [ 26.352309] ? __pfx_kthread+0x10/0x10 [ 26.352330] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.352351] ? calculate_sigpending+0x7b/0xa0 [ 26.352386] ? __pfx_kthread+0x10/0x10 [ 26.352408] ret_from_fork+0x116/0x1d0 [ 26.352427] ? __pfx_kthread+0x10/0x10 [ 26.352459] ret_from_fork_asm+0x1a/0x30 [ 26.352490] </TASK> [ 26.352502] [ 26.360264] Allocated by task 311: [ 26.360430] kasan_save_stack+0x45/0x70 [ 26.360620] kasan_save_track+0x18/0x40 [ 26.360826] kasan_save_alloc_info+0x3b/0x50 [ 26.361029] __kasan_kmalloc+0xb7/0xc0 [ 26.361202] __kmalloc_cache_noprof+0x189/0x420 [ 26.361349] kasan_bitops_generic+0x92/0x1c0 [ 26.361523] kunit_try_run_case+0x1a5/0x480 [ 26.361743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.362006] kthread+0x337/0x6f0 [ 26.362165] ret_from_fork+0x116/0x1d0 [ 26.362306] ret_from_fork_asm+0x1a/0x30 [ 26.362495] [ 26.362583] The buggy address belongs to the object at ffff8881058a8240 [ 26.362583] which belongs to the cache kmalloc-16 of size 16 [ 26.363107] The buggy address is located 8 bytes inside of [ 26.363107] allocated 9-byte region [ffff8881058a8240, ffff8881058a8249) [ 26.363495] [ 26.363560] The buggy address belongs to the physical page: [ 26.363736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a8 [ 26.363990] flags: 0x200000000000000(node=0|zone=2) [ 26.364218] page_type: f5(slab) [ 26.364397] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.364736] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.365079] page dumped because: kasan: bad access detected [ 26.365244] [ 26.365305] Memory state around the buggy address: [ 26.365452] ffff8881058a8100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.365661] ffff8881058a8180: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 26.365926] >ffff8881058a8200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.366239] ^ [ 26.366510] ffff8881058a8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.366856] ffff8881058a8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.367184] ==================================================================