Date
July 10, 2025, 9:07 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 27.468631] ================================================================== [ 27.469044] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.469737] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.470232] [ 27.470340] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.470537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.470550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.470573] Call Trace: [ 27.470590] <TASK> [ 27.470606] dump_stack_lvl+0x73/0xb0 [ 27.470643] print_report+0xd1/0x610 [ 27.470667] ? __virt_addr_valid+0x1db/0x2d0 [ 27.470691] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.470728] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.470754] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.470781] kasan_report+0x141/0x180 [ 27.470803] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.470835] kasan_check_range+0x10c/0x1c0 [ 27.470858] __kasan_check_write+0x18/0x20 [ 27.470881] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.470909] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.470936] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.470960] ? trace_hardirqs_on+0x37/0xe0 [ 27.470983] ? kasan_bitops_generic+0x92/0x1c0 [ 27.471009] kasan_bitops_generic+0x121/0x1c0 [ 27.471032] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.471058] ? trace_hardirqs_on+0x37/0xe0 [ 27.471079] ? __pfx_read_tsc+0x10/0x10 [ 27.471101] ? ktime_get_ts64+0x86/0x230 [ 27.471122] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.471148] kunit_try_run_case+0x1a5/0x480 [ 27.471171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.471193] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.471217] ? __kthread_parkme+0x82/0x180 [ 27.471238] ? preempt_count_sub+0x50/0x80 [ 27.471262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.471284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.471310] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.471335] kthread+0x337/0x6f0 [ 27.471356] ? trace_preempt_on+0x20/0xc0 [ 27.471378] ? __pfx_kthread+0x10/0x10 [ 27.471400] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.471422] ? calculate_sigpending+0x7b/0xa0 [ 27.471446] ? __pfx_kthread+0x10/0x10 [ 27.471468] ret_from_fork+0x116/0x1d0 [ 27.471516] ? __pfx_kthread+0x10/0x10 [ 27.471539] ret_from_fork_asm+0x1a/0x30 [ 27.471570] </TASK> [ 27.471581] [ 27.483451] Allocated by task 309: [ 27.483741] kasan_save_stack+0x45/0x70 [ 27.484043] kasan_save_track+0x18/0x40 [ 27.484412] kasan_save_alloc_info+0x3b/0x50 [ 27.484785] __kasan_kmalloc+0xb7/0xc0 [ 27.484979] __kmalloc_cache_noprof+0x189/0x420 [ 27.485180] kasan_bitops_generic+0x92/0x1c0 [ 27.485375] kunit_try_run_case+0x1a5/0x480 [ 27.485911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.486209] kthread+0x337/0x6f0 [ 27.486471] ret_from_fork+0x116/0x1d0 [ 27.486869] ret_from_fork_asm+0x1a/0x30 [ 27.487169] [ 27.487384] The buggy address belongs to the object at ffff888105807fa0 [ 27.487384] which belongs to the cache kmalloc-16 of size 16 [ 27.488011] The buggy address is located 8 bytes inside of [ 27.488011] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.488722] [ 27.488817] The buggy address belongs to the physical page: [ 27.489252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.489954] flags: 0x200000000000000(node=0|zone=2) [ 27.490296] page_type: f5(slab) [ 27.490464] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.491120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.491436] page dumped because: kasan: bad access detected [ 27.491993] [ 27.492078] Memory state around the buggy address: [ 27.492503] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.492984] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.493292] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.493923] ^ [ 27.494196] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.494684] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.495180] ================================================================== [ 27.445060] ================================================================== [ 27.445366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.445854] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.446107] [ 27.446188] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.446235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.446247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.446268] Call Trace: [ 27.446285] <TASK> [ 27.446302] dump_stack_lvl+0x73/0xb0 [ 27.446329] print_report+0xd1/0x610 [ 27.446352] ? __virt_addr_valid+0x1db/0x2d0 [ 27.446375] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.446400] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.446426] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.446453] kasan_report+0x141/0x180 [ 27.446474] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.446537] kasan_check_range+0x10c/0x1c0 [ 27.446561] __kasan_check_write+0x18/0x20 [ 27.446585] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.446612] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.446640] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.446663] ? trace_hardirqs_on+0x37/0xe0 [ 27.446685] ? kasan_bitops_generic+0x92/0x1c0 [ 27.446725] kasan_bitops_generic+0x121/0x1c0 [ 27.446749] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.446772] ? trace_hardirqs_on+0x37/0xe0 [ 27.446793] ? __pfx_read_tsc+0x10/0x10 [ 27.446815] ? ktime_get_ts64+0x86/0x230 [ 27.446836] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.446863] kunit_try_run_case+0x1a5/0x480 [ 27.446885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.446907] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.446936] ? __kthread_parkme+0x82/0x180 [ 27.446960] ? preempt_count_sub+0x50/0x80 [ 27.446985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.447008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.447033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.447058] kthread+0x337/0x6f0 [ 27.447078] ? trace_preempt_on+0x20/0xc0 [ 27.447101] ? __pfx_kthread+0x10/0x10 [ 27.447122] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.447144] ? calculate_sigpending+0x7b/0xa0 [ 27.447168] ? __pfx_kthread+0x10/0x10 [ 27.447192] ret_from_fork+0x116/0x1d0 [ 27.447211] ? __pfx_kthread+0x10/0x10 [ 27.447232] ret_from_fork_asm+0x1a/0x30 [ 27.447263] </TASK> [ 27.447275] [ 27.456462] Allocated by task 309: [ 27.456660] kasan_save_stack+0x45/0x70 [ 27.456817] kasan_save_track+0x18/0x40 [ 27.456950] kasan_save_alloc_info+0x3b/0x50 [ 27.457095] __kasan_kmalloc+0xb7/0xc0 [ 27.457222] __kmalloc_cache_noprof+0x189/0x420 [ 27.457375] kasan_bitops_generic+0x92/0x1c0 [ 27.457583] kunit_try_run_case+0x1a5/0x480 [ 27.457780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.458000] kthread+0x337/0x6f0 [ 27.458153] ret_from_fork+0x116/0x1d0 [ 27.458322] ret_from_fork_asm+0x1a/0x30 [ 27.458893] [ 27.458973] The buggy address belongs to the object at ffff888105807fa0 [ 27.458973] which belongs to the cache kmalloc-16 of size 16 [ 27.460402] The buggy address is located 8 bytes inside of [ 27.460402] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.460845] [ 27.460916] The buggy address belongs to the physical page: [ 27.461086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.461321] flags: 0x200000000000000(node=0|zone=2) [ 27.462098] page_type: f5(slab) [ 27.462421] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.463446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.463943] page dumped because: kasan: bad access detected [ 27.464362] [ 27.464457] Memory state around the buggy address: [ 27.464948] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.465263] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.465722] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.466230] ^ [ 27.466712] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.467015] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.467314] ================================================================== [ 27.360396] ================================================================== [ 27.360638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.361397] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.362016] [ 27.362246] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.362315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.362328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.362351] Call Trace: [ 27.362371] <TASK> [ 27.362389] dump_stack_lvl+0x73/0xb0 [ 27.362418] print_report+0xd1/0x610 [ 27.362441] ? __virt_addr_valid+0x1db/0x2d0 [ 27.362465] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.362503] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.362531] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.362558] kasan_report+0x141/0x180 [ 27.362580] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.362612] kasan_check_range+0x10c/0x1c0 [ 27.362635] __kasan_check_write+0x18/0x20 [ 27.362658] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.362685] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.362730] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.362753] ? trace_hardirqs_on+0x37/0xe0 [ 27.362776] ? kasan_bitops_generic+0x92/0x1c0 [ 27.363286] kasan_bitops_generic+0x121/0x1c0 [ 27.363314] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.363338] ? trace_hardirqs_on+0x37/0xe0 [ 27.363361] ? __pfx_read_tsc+0x10/0x10 [ 27.363383] ? ktime_get_ts64+0x86/0x230 [ 27.363405] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.363432] kunit_try_run_case+0x1a5/0x480 [ 27.363454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.363479] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.363506] ? __kthread_parkme+0x82/0x180 [ 27.363526] ? preempt_count_sub+0x50/0x80 [ 27.363550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.363572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.363598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.363624] kthread+0x337/0x6f0 [ 27.363643] ? trace_preempt_on+0x20/0xc0 [ 27.363665] ? __pfx_kthread+0x10/0x10 [ 27.363686] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.363724] ? calculate_sigpending+0x7b/0xa0 [ 27.363749] ? __pfx_kthread+0x10/0x10 [ 27.363831] ret_from_fork+0x116/0x1d0 [ 27.363861] ? __pfx_kthread+0x10/0x10 [ 27.363883] ret_from_fork_asm+0x1a/0x30 [ 27.363915] </TASK> [ 27.363927] [ 27.374597] Allocated by task 309: [ 27.374862] kasan_save_stack+0x45/0x70 [ 27.375171] kasan_save_track+0x18/0x40 [ 27.375364] kasan_save_alloc_info+0x3b/0x50 [ 27.375551] __kasan_kmalloc+0xb7/0xc0 [ 27.375758] __kmalloc_cache_noprof+0x189/0x420 [ 27.376055] kasan_bitops_generic+0x92/0x1c0 [ 27.376224] kunit_try_run_case+0x1a5/0x480 [ 27.376422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.376961] kthread+0x337/0x6f0 [ 27.377159] ret_from_fork+0x116/0x1d0 [ 27.377365] ret_from_fork_asm+0x1a/0x30 [ 27.377636] [ 27.377740] The buggy address belongs to the object at ffff888105807fa0 [ 27.377740] which belongs to the cache kmalloc-16 of size 16 [ 27.378345] The buggy address is located 8 bytes inside of [ 27.378345] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.378940] [ 27.379061] The buggy address belongs to the physical page: [ 27.379312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.379642] flags: 0x200000000000000(node=0|zone=2) [ 27.379813] page_type: f5(slab) [ 27.379935] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.380450] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.381330] page dumped because: kasan: bad access detected [ 27.381562] [ 27.381652] Memory state around the buggy address: [ 27.381841] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.382148] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.382453] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.382958] ^ [ 27.383161] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.383451] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.383773] ================================================================== [ 27.425098] ================================================================== [ 27.425439] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.426194] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.426564] [ 27.426725] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.426799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.426824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.426845] Call Trace: [ 27.426869] <TASK> [ 27.426886] dump_stack_lvl+0x73/0xb0 [ 27.426913] print_report+0xd1/0x610 [ 27.426935] ? __virt_addr_valid+0x1db/0x2d0 [ 27.426957] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.426984] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.427009] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.427037] kasan_report+0x141/0x180 [ 27.427059] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.427090] kasan_check_range+0x10c/0x1c0 [ 27.427113] __kasan_check_write+0x18/0x20 [ 27.427136] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.427164] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.427191] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.427216] ? trace_hardirqs_on+0x37/0xe0 [ 27.427238] ? kasan_bitops_generic+0x92/0x1c0 [ 27.427264] kasan_bitops_generic+0x121/0x1c0 [ 27.427288] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.427311] ? trace_hardirqs_on+0x37/0xe0 [ 27.427333] ? __pfx_read_tsc+0x10/0x10 [ 27.427354] ? ktime_get_ts64+0x86/0x230 [ 27.427376] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.427402] kunit_try_run_case+0x1a5/0x480 [ 27.427424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.427447] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.427470] ? __kthread_parkme+0x82/0x180 [ 27.427491] ? preempt_count_sub+0x50/0x80 [ 27.427514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.427536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.427561] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.427586] kthread+0x337/0x6f0 [ 27.427606] ? trace_preempt_on+0x20/0xc0 [ 27.427628] ? __pfx_kthread+0x10/0x10 [ 27.427651] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.427672] ? calculate_sigpending+0x7b/0xa0 [ 27.427708] ? __pfx_kthread+0x10/0x10 [ 27.427731] ret_from_fork+0x116/0x1d0 [ 27.427751] ? __pfx_kthread+0x10/0x10 [ 27.427772] ret_from_fork_asm+0x1a/0x30 [ 27.427803] </TASK> [ 27.427815] [ 27.436201] Allocated by task 309: [ 27.436418] kasan_save_stack+0x45/0x70 [ 27.436637] kasan_save_track+0x18/0x40 [ 27.436834] kasan_save_alloc_info+0x3b/0x50 [ 27.437047] __kasan_kmalloc+0xb7/0xc0 [ 27.437225] __kmalloc_cache_noprof+0x189/0x420 [ 27.437437] kasan_bitops_generic+0x92/0x1c0 [ 27.437588] kunit_try_run_case+0x1a5/0x480 [ 27.437735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.437908] kthread+0x337/0x6f0 [ 27.438223] ret_from_fork+0x116/0x1d0 [ 27.438430] ret_from_fork_asm+0x1a/0x30 [ 27.438638] [ 27.438742] The buggy address belongs to the object at ffff888105807fa0 [ 27.438742] which belongs to the cache kmalloc-16 of size 16 [ 27.439318] The buggy address is located 8 bytes inside of [ 27.439318] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.440214] [ 27.440315] The buggy address belongs to the physical page: [ 27.440665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.441024] flags: 0x200000000000000(node=0|zone=2) [ 27.441251] page_type: f5(slab) [ 27.441409] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.441764] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.441989] page dumped because: kasan: bad access detected [ 27.442158] [ 27.442221] Memory state around the buggy address: [ 27.442372] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.442925] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.443241] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.443629] ^ [ 27.443858] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.444140] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.444440] ================================================================== [ 27.406094] ================================================================== [ 27.406438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.406767] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.406981] [ 27.407057] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.407103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.407114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.407135] Call Trace: [ 27.407151] <TASK> [ 27.407167] dump_stack_lvl+0x73/0xb0 [ 27.407193] print_report+0xd1/0x610 [ 27.407215] ? __virt_addr_valid+0x1db/0x2d0 [ 27.407237] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.407262] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.407288] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.407314] kasan_report+0x141/0x180 [ 27.407334] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.407365] kasan_check_range+0x10c/0x1c0 [ 27.407387] __kasan_check_write+0x18/0x20 [ 27.407409] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.407436] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.407462] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.407510] ? trace_hardirqs_on+0x37/0xe0 [ 27.407531] ? kasan_bitops_generic+0x92/0x1c0 [ 27.407558] kasan_bitops_generic+0x121/0x1c0 [ 27.407581] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.407619] ? trace_hardirqs_on+0x37/0xe0 [ 27.407640] ? __pfx_read_tsc+0x10/0x10 [ 27.407673] ? ktime_get_ts64+0x86/0x230 [ 27.407716] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.407978] kunit_try_run_case+0x1a5/0x480 [ 27.408002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.408026] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.408049] ? __kthread_parkme+0x82/0x180 [ 27.408070] ? preempt_count_sub+0x50/0x80 [ 27.408119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.408142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.408168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.408194] kthread+0x337/0x6f0 [ 27.408214] ? trace_preempt_on+0x20/0xc0 [ 27.408238] ? __pfx_kthread+0x10/0x10 [ 27.408258] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.408298] ? calculate_sigpending+0x7b/0xa0 [ 27.408321] ? __pfx_kthread+0x10/0x10 [ 27.408344] ret_from_fork+0x116/0x1d0 [ 27.408362] ? __pfx_kthread+0x10/0x10 [ 27.408383] ret_from_fork_asm+0x1a/0x30 [ 27.408414] </TASK> [ 27.408425] [ 27.417353] Allocated by task 309: [ 27.417543] kasan_save_stack+0x45/0x70 [ 27.417741] kasan_save_track+0x18/0x40 [ 27.417921] kasan_save_alloc_info+0x3b/0x50 [ 27.418104] __kasan_kmalloc+0xb7/0xc0 [ 27.418296] __kmalloc_cache_noprof+0x189/0x420 [ 27.418487] kasan_bitops_generic+0x92/0x1c0 [ 27.418722] kunit_try_run_case+0x1a5/0x480 [ 27.418913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.419116] kthread+0x337/0x6f0 [ 27.419283] ret_from_fork+0x116/0x1d0 [ 27.419468] ret_from_fork_asm+0x1a/0x30 [ 27.419674] [ 27.419760] The buggy address belongs to the object at ffff888105807fa0 [ 27.419760] which belongs to the cache kmalloc-16 of size 16 [ 27.420248] The buggy address is located 8 bytes inside of [ 27.420248] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.420732] [ 27.420827] The buggy address belongs to the physical page: [ 27.421079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.421392] flags: 0x200000000000000(node=0|zone=2) [ 27.421667] page_type: f5(slab) [ 27.421837] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.422227] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.422596] page dumped because: kasan: bad access detected [ 27.422848] [ 27.422934] Memory state around the buggy address: [ 27.423166] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.423435] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.423639] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.423854] ^ [ 27.423999] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.424219] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.424574] ================================================================== [ 27.515516] ================================================================== [ 27.515964] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.516362] Read of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.516728] [ 27.516854] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.516911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.516924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.516946] Call Trace: [ 27.516963] <TASK> [ 27.516979] dump_stack_lvl+0x73/0xb0 [ 27.517006] print_report+0xd1/0x610 [ 27.517028] ? __virt_addr_valid+0x1db/0x2d0 [ 27.517053] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.517080] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.517106] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.517133] kasan_report+0x141/0x180 [ 27.517155] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.517186] __asan_report_load8_noabort+0x18/0x20 [ 27.517210] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 27.517237] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.517265] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.517288] ? trace_hardirqs_on+0x37/0xe0 [ 27.517310] ? kasan_bitops_generic+0x92/0x1c0 [ 27.517337] kasan_bitops_generic+0x121/0x1c0 [ 27.517361] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.517383] ? trace_hardirqs_on+0x37/0xe0 [ 27.517405] ? __pfx_read_tsc+0x10/0x10 [ 27.517426] ? ktime_get_ts64+0x86/0x230 [ 27.517448] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.517474] kunit_try_run_case+0x1a5/0x480 [ 27.517506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.517529] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.517552] ? __kthread_parkme+0x82/0x180 [ 27.517572] ? preempt_count_sub+0x50/0x80 [ 27.517596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.517619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.517644] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.517670] kthread+0x337/0x6f0 [ 27.517690] ? trace_preempt_on+0x20/0xc0 [ 27.517723] ? __pfx_kthread+0x10/0x10 [ 27.517744] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.517764] ? calculate_sigpending+0x7b/0xa0 [ 27.517789] ? __pfx_kthread+0x10/0x10 [ 27.517810] ret_from_fork+0x116/0x1d0 [ 27.517828] ? __pfx_kthread+0x10/0x10 [ 27.517850] ret_from_fork_asm+0x1a/0x30 [ 27.517880] </TASK> [ 27.517891] [ 27.525853] Allocated by task 309: [ 27.526034] kasan_save_stack+0x45/0x70 [ 27.526173] kasan_save_track+0x18/0x40 [ 27.526302] kasan_save_alloc_info+0x3b/0x50 [ 27.526446] __kasan_kmalloc+0xb7/0xc0 [ 27.526649] __kmalloc_cache_noprof+0x189/0x420 [ 27.526878] kasan_bitops_generic+0x92/0x1c0 [ 27.527084] kunit_try_run_case+0x1a5/0x480 [ 27.527415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.527645] kthread+0x337/0x6f0 [ 27.527818] ret_from_fork+0x116/0x1d0 [ 27.527992] ret_from_fork_asm+0x1a/0x30 [ 27.528135] [ 27.528201] The buggy address belongs to the object at ffff888105807fa0 [ 27.528201] which belongs to the cache kmalloc-16 of size 16 [ 27.528811] The buggy address is located 8 bytes inside of [ 27.528811] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.529220] [ 27.529287] The buggy address belongs to the physical page: [ 27.529455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.529690] flags: 0x200000000000000(node=0|zone=2) [ 27.529943] page_type: f5(slab) [ 27.530105] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.530446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.530784] page dumped because: kasan: bad access detected [ 27.531234] [ 27.531300] Memory state around the buggy address: [ 27.531451] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.531663] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.532164] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.532473] ^ [ 27.532671] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.532890] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.533101] ================================================================== [ 27.331772] ================================================================== [ 27.332545] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.333835] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.334150] [ 27.334257] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.334308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.334320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.334341] Call Trace: [ 27.334358] <TASK> [ 27.334377] dump_stack_lvl+0x73/0xb0 [ 27.334405] print_report+0xd1/0x610 [ 27.334429] ? __virt_addr_valid+0x1db/0x2d0 [ 27.334452] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.334493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.334519] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.334547] kasan_report+0x141/0x180 [ 27.334568] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.334600] kasan_check_range+0x10c/0x1c0 [ 27.334623] __kasan_check_write+0x18/0x20 [ 27.334646] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.334673] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.334712] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.334736] ? trace_hardirqs_on+0x37/0xe0 [ 27.334759] ? kasan_bitops_generic+0x92/0x1c0 [ 27.334786] kasan_bitops_generic+0x121/0x1c0 [ 27.334810] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.334832] ? trace_hardirqs_on+0x37/0xe0 [ 27.334854] ? __pfx_read_tsc+0x10/0x10 [ 27.334875] ? ktime_get_ts64+0x86/0x230 [ 27.334896] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.334923] kunit_try_run_case+0x1a5/0x480 [ 27.334944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.334967] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.334990] ? __kthread_parkme+0x82/0x180 [ 27.335011] ? preempt_count_sub+0x50/0x80 [ 27.335033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.335055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.335081] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.335105] kthread+0x337/0x6f0 [ 27.335125] ? trace_preempt_on+0x20/0xc0 [ 27.335148] ? __pfx_kthread+0x10/0x10 [ 27.335169] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.335191] ? calculate_sigpending+0x7b/0xa0 [ 27.335216] ? __pfx_kthread+0x10/0x10 [ 27.335238] ret_from_fork+0x116/0x1d0 [ 27.335258] ? __pfx_kthread+0x10/0x10 [ 27.335278] ret_from_fork_asm+0x1a/0x30 [ 27.335309] </TASK> [ 27.335320] [ 27.347901] Allocated by task 309: [ 27.348060] kasan_save_stack+0x45/0x70 [ 27.348405] kasan_save_track+0x18/0x40 [ 27.348711] kasan_save_alloc_info+0x3b/0x50 [ 27.349116] __kasan_kmalloc+0xb7/0xc0 [ 27.349381] __kmalloc_cache_noprof+0x189/0x420 [ 27.349709] kasan_bitops_generic+0x92/0x1c0 [ 27.350106] kunit_try_run_case+0x1a5/0x480 [ 27.350392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.351070] kthread+0x337/0x6f0 [ 27.351251] ret_from_fork+0x116/0x1d0 [ 27.351406] ret_from_fork_asm+0x1a/0x30 [ 27.351625] [ 27.351735] The buggy address belongs to the object at ffff888105807fa0 [ 27.351735] which belongs to the cache kmalloc-16 of size 16 [ 27.352249] The buggy address is located 8 bytes inside of [ 27.352249] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.352751] [ 27.352831] The buggy address belongs to the physical page: [ 27.353069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.353413] flags: 0x200000000000000(node=0|zone=2) [ 27.353638] page_type: f5(slab) [ 27.354516] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.355206] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.355725] page dumped because: kasan: bad access detected [ 27.356275] [ 27.356368] Memory state around the buggy address: [ 27.356775] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.357262] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.357691] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.358166] ^ [ 27.358467] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.359350] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.359738] ================================================================== [ 27.496959] ================================================================== [ 27.497275] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.497608] Read of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.497921] [ 27.498017] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.498328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.498348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.498371] Call Trace: [ 27.498389] <TASK> [ 27.498405] dump_stack_lvl+0x73/0xb0 [ 27.498434] print_report+0xd1/0x610 [ 27.498457] ? __virt_addr_valid+0x1db/0x2d0 [ 27.498481] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.498524] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.498550] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.498577] kasan_report+0x141/0x180 [ 27.498599] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.498631] kasan_check_range+0x10c/0x1c0 [ 27.498655] __kasan_check_read+0x15/0x20 [ 27.498680] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 27.498721] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.498749] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.498773] ? trace_hardirqs_on+0x37/0xe0 [ 27.498795] ? kasan_bitops_generic+0x92/0x1c0 [ 27.498823] kasan_bitops_generic+0x121/0x1c0 [ 27.498846] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.498869] ? trace_hardirqs_on+0x37/0xe0 [ 27.498891] ? __pfx_read_tsc+0x10/0x10 [ 27.498911] ? ktime_get_ts64+0x86/0x230 [ 27.498934] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.498961] kunit_try_run_case+0x1a5/0x480 [ 27.498983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.499005] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.499029] ? __kthread_parkme+0x82/0x180 [ 27.499050] ? preempt_count_sub+0x50/0x80 [ 27.499074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.499096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.499122] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.499147] kthread+0x337/0x6f0 [ 27.499167] ? trace_preempt_on+0x20/0xc0 [ 27.499189] ? __pfx_kthread+0x10/0x10 [ 27.499210] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.499232] ? calculate_sigpending+0x7b/0xa0 [ 27.499256] ? __pfx_kthread+0x10/0x10 [ 27.499278] ret_from_fork+0x116/0x1d0 [ 27.499297] ? __pfx_kthread+0x10/0x10 [ 27.499318] ret_from_fork_asm+0x1a/0x30 [ 27.499349] </TASK> [ 27.499360] [ 27.507383] Allocated by task 309: [ 27.507559] kasan_save_stack+0x45/0x70 [ 27.507747] kasan_save_track+0x18/0x40 [ 27.507883] kasan_save_alloc_info+0x3b/0x50 [ 27.508025] __kasan_kmalloc+0xb7/0xc0 [ 27.508338] __kmalloc_cache_noprof+0x189/0x420 [ 27.508649] kasan_bitops_generic+0x92/0x1c0 [ 27.508871] kunit_try_run_case+0x1a5/0x480 [ 27.509073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.509274] kthread+0x337/0x6f0 [ 27.509391] ret_from_fork+0x116/0x1d0 [ 27.509520] ret_from_fork_asm+0x1a/0x30 [ 27.509656] [ 27.509774] The buggy address belongs to the object at ffff888105807fa0 [ 27.509774] which belongs to the cache kmalloc-16 of size 16 [ 27.510293] The buggy address is located 8 bytes inside of [ 27.510293] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.510718] [ 27.510786] The buggy address belongs to the physical page: [ 27.510957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.511412] flags: 0x200000000000000(node=0|zone=2) [ 27.511861] page_type: f5(slab) [ 27.512032] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.512371] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.512690] page dumped because: kasan: bad access detected [ 27.512938] [ 27.513006] Memory state around the buggy address: [ 27.513201] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.513456] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.513871] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.514241] ^ [ 27.514415] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.514809] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.515023] ================================================================== [ 27.384311] ================================================================== [ 27.384671] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.385151] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.385434] [ 27.385588] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.385637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.385650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.385692] Call Trace: [ 27.385718] <TASK> [ 27.385734] dump_stack_lvl+0x73/0xb0 [ 27.385762] print_report+0xd1/0x610 [ 27.385836] ? __virt_addr_valid+0x1db/0x2d0 [ 27.385883] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.385912] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.385938] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.385965] kasan_report+0x141/0x180 [ 27.385987] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.386018] kasan_check_range+0x10c/0x1c0 [ 27.386058] __kasan_check_write+0x18/0x20 [ 27.386094] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.386122] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.386150] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.386190] ? trace_hardirqs_on+0x37/0xe0 [ 27.386226] ? kasan_bitops_generic+0x92/0x1c0 [ 27.386253] kasan_bitops_generic+0x121/0x1c0 [ 27.386289] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.386326] ? trace_hardirqs_on+0x37/0xe0 [ 27.386360] ? __pfx_read_tsc+0x10/0x10 [ 27.386381] ? ktime_get_ts64+0x86/0x230 [ 27.386404] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.386430] kunit_try_run_case+0x1a5/0x480 [ 27.386452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.386475] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.386510] ? __kthread_parkme+0x82/0x180 [ 27.386531] ? preempt_count_sub+0x50/0x80 [ 27.386554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.386576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.386602] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.386627] kthread+0x337/0x6f0 [ 27.386647] ? trace_preempt_on+0x20/0xc0 [ 27.386670] ? __pfx_kthread+0x10/0x10 [ 27.386691] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.386725] ? calculate_sigpending+0x7b/0xa0 [ 27.386749] ? __pfx_kthread+0x10/0x10 [ 27.386771] ret_from_fork+0x116/0x1d0 [ 27.386923] ? __pfx_kthread+0x10/0x10 [ 27.386946] ret_from_fork_asm+0x1a/0x30 [ 27.386995] </TASK> [ 27.387007] [ 27.396085] Allocated by task 309: [ 27.396358] kasan_save_stack+0x45/0x70 [ 27.396555] kasan_save_track+0x18/0x40 [ 27.396749] kasan_save_alloc_info+0x3b/0x50 [ 27.396995] __kasan_kmalloc+0xb7/0xc0 [ 27.397117] __kmalloc_cache_noprof+0x189/0x420 [ 27.397598] kasan_bitops_generic+0x92/0x1c0 [ 27.397816] kunit_try_run_case+0x1a5/0x480 [ 27.398008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.398289] kthread+0x337/0x6f0 [ 27.398473] ret_from_fork+0x116/0x1d0 [ 27.398643] ret_from_fork_asm+0x1a/0x30 [ 27.399006] [ 27.399121] The buggy address belongs to the object at ffff888105807fa0 [ 27.399121] which belongs to the cache kmalloc-16 of size 16 [ 27.399609] The buggy address is located 8 bytes inside of [ 27.399609] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.400210] [ 27.400305] The buggy address belongs to the physical page: [ 27.400605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.400908] flags: 0x200000000000000(node=0|zone=2) [ 27.401260] page_type: f5(slab) [ 27.401397] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.401804] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.402018] page dumped because: kasan: bad access detected [ 27.402177] [ 27.402240] Memory state around the buggy address: [ 27.402448] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.403300] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.403664] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.404174] ^ [ 27.404404] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.404650] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.405299] ==================================================================