Date
July 17, 2025, 10:12 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 27.925826] ================================================================== [ 27.926326] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.926858] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310 [ 27.927228] [ 27.927305] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 27.927351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.927362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.927383] Call Trace: [ 27.927395] <TASK> [ 27.927408] dump_stack_lvl+0x73/0xb0 [ 27.927458] print_report+0xd1/0x610 [ 27.927479] ? __virt_addr_valid+0x1db/0x2d0 [ 27.927514] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.927549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.927574] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.927611] kasan_report+0x141/0x180 [ 27.927633] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.927665] kasan_check_range+0x10c/0x1c0 [ 27.927687] __kasan_check_write+0x18/0x20 [ 27.927710] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 27.927745] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.927772] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.927795] ? trace_hardirqs_on+0x37/0xe0 [ 27.927827] ? kasan_bitops_generic+0x92/0x1c0 [ 27.927853] kasan_bitops_generic+0x121/0x1c0 [ 27.927876] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.927900] ? __pfx_read_tsc+0x10/0x10 [ 27.927921] ? ktime_get_ts64+0x86/0x230 [ 27.927944] kunit_try_run_case+0x1a5/0x480 [ 27.927967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.927988] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.928011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.928034] ? __kthread_parkme+0x82/0x180 [ 27.928058] ? preempt_count_sub+0x50/0x80 [ 27.928092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.928115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.928138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.928169] kthread+0x337/0x6f0 [ 27.928187] ? trace_preempt_on+0x20/0xc0 [ 27.928209] ? __pfx_kthread+0x10/0x10 [ 27.928239] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.928259] ? calculate_sigpending+0x7b/0xa0 [ 27.928293] ? __pfx_kthread+0x10/0x10 [ 27.928313] ret_from_fork+0x116/0x1d0 [ 27.928331] ? __pfx_kthread+0x10/0x10 [ 27.928350] ret_from_fork_asm+0x1a/0x30 [ 27.928390] </TASK> [ 27.928400] [ 27.936211] Allocated by task 310: [ 27.936452] kasan_save_stack+0x45/0x70 [ 27.936646] kasan_save_track+0x18/0x40 [ 27.936805] kasan_save_alloc_info+0x3b/0x50 [ 27.937009] __kasan_kmalloc+0xb7/0xc0 [ 27.937203] __kmalloc_cache_noprof+0x189/0x420 [ 27.937436] kasan_bitops_generic+0x92/0x1c0 [ 27.937640] kunit_try_run_case+0x1a5/0x480 [ 27.937841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.938074] kthread+0x337/0x6f0 [ 27.938246] ret_from_fork+0x116/0x1d0 [ 27.938423] ret_from_fork_asm+0x1a/0x30 [ 27.938615] [ 27.938678] The buggy address belongs to the object at ffff8881048d1b00 [ 27.938678] which belongs to the cache kmalloc-16 of size 16 [ 27.939019] The buggy address is located 8 bytes inside of [ 27.939019] allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09) [ 27.939529] [ 27.939626] The buggy address belongs to the physical page: [ 27.939841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1 [ 27.940073] flags: 0x200000000000000(node=0|zone=2) [ 27.940234] page_type: f5(slab) [ 27.940347] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.941000] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.941368] page dumped because: kasan: bad access detected [ 27.941635] [ 27.941723] Memory state around the buggy address: [ 27.941963] ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.942199] ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.942756] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.943046] ^ [ 27.943239] ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.943585] ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.943874] ================================================================== [ 27.907758] ================================================================== [ 27.908359] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.908728] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310 [ 27.909040] [ 27.909153] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 27.909198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.909210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.909230] Call Trace: [ 27.909255] <TASK> [ 27.909268] dump_stack_lvl+0x73/0xb0 [ 27.909296] print_report+0xd1/0x610 [ 27.909338] ? __virt_addr_valid+0x1db/0x2d0 [ 27.909360] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.909386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.909411] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.909448] kasan_report+0x141/0x180 [ 27.909470] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.909502] kasan_check_range+0x10c/0x1c0 [ 27.909535] __kasan_check_write+0x18/0x20 [ 27.909558] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 27.909585] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.909612] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.909644] ? trace_hardirqs_on+0x37/0xe0 [ 27.909666] ? kasan_bitops_generic+0x92/0x1c0 [ 27.909693] kasan_bitops_generic+0x121/0x1c0 [ 27.909726] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.909749] ? __pfx_read_tsc+0x10/0x10 [ 27.909769] ? ktime_get_ts64+0x86/0x230 [ 27.909801] kunit_try_run_case+0x1a5/0x480 [ 27.909823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.909845] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.909878] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.909901] ? __kthread_parkme+0x82/0x180 [ 27.909929] ? preempt_count_sub+0x50/0x80 [ 27.909951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.909983] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.910006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.910028] kthread+0x337/0x6f0 [ 27.910057] ? trace_preempt_on+0x20/0xc0 [ 27.910089] ? __pfx_kthread+0x10/0x10 [ 27.910109] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.910129] ? calculate_sigpending+0x7b/0xa0 [ 27.910160] ? __pfx_kthread+0x10/0x10 [ 27.910181] ret_from_fork+0x116/0x1d0 [ 27.910199] ? __pfx_kthread+0x10/0x10 [ 27.910228] ret_from_fork_asm+0x1a/0x30 [ 27.910259] </TASK> [ 27.910269] [ 27.918237] Allocated by task 310: [ 27.918462] kasan_save_stack+0x45/0x70 [ 27.918607] kasan_save_track+0x18/0x40 [ 27.918793] kasan_save_alloc_info+0x3b/0x50 [ 27.919013] __kasan_kmalloc+0xb7/0xc0 [ 27.919178] __kmalloc_cache_noprof+0x189/0x420 [ 27.919402] kasan_bitops_generic+0x92/0x1c0 [ 27.919606] kunit_try_run_case+0x1a5/0x480 [ 27.919797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.919989] kthread+0x337/0x6f0 [ 27.920170] ret_from_fork+0x116/0x1d0 [ 27.920366] ret_from_fork_asm+0x1a/0x30 [ 27.920549] [ 27.920649] The buggy address belongs to the object at ffff8881048d1b00 [ 27.920649] which belongs to the cache kmalloc-16 of size 16 [ 27.921140] The buggy address is located 8 bytes inside of [ 27.921140] allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09) [ 27.921632] [ 27.921697] The buggy address belongs to the physical page: [ 27.921860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1 [ 27.922105] flags: 0x200000000000000(node=0|zone=2) [ 27.922258] page_type: f5(slab) [ 27.922412] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.922755] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.923089] page dumped because: kasan: bad access detected [ 27.923372] [ 27.923456] Memory state around the buggy address: [ 27.923648] ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.923920] ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.924137] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.924340] ^ [ 27.924453] ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.924812] ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.925160] ================================================================== [ 27.999587] ================================================================== [ 28.000056] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.000419] Read of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310 [ 28.000642] [ 28.000719] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.000765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.000777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.000798] Call Trace: [ 28.000810] <TASK> [ 28.000825] dump_stack_lvl+0x73/0xb0 [ 28.000853] print_report+0xd1/0x610 [ 28.000875] ? __virt_addr_valid+0x1db/0x2d0 [ 28.000897] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.000923] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.000949] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.000975] kasan_report+0x141/0x180 [ 28.000997] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.001028] kasan_check_range+0x10c/0x1c0 [ 28.001051] __kasan_check_read+0x15/0x20 [ 28.001074] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.001111] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.001139] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.001162] ? trace_hardirqs_on+0x37/0xe0 [ 28.001184] ? kasan_bitops_generic+0x92/0x1c0 [ 28.001211] kasan_bitops_generic+0x121/0x1c0 [ 28.001233] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.001257] ? __pfx_read_tsc+0x10/0x10 [ 28.001278] ? ktime_get_ts64+0x86/0x230 [ 28.001301] kunit_try_run_case+0x1a5/0x480 [ 28.001324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.001346] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.001368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.001439] ? __kthread_parkme+0x82/0x180 [ 28.001462] ? preempt_count_sub+0x50/0x80 [ 28.001484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.001519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.001542] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.001564] kthread+0x337/0x6f0 [ 28.001583] ? trace_preempt_on+0x20/0xc0 [ 28.001606] ? __pfx_kthread+0x10/0x10 [ 28.001626] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.001647] ? calculate_sigpending+0x7b/0xa0 [ 28.001669] ? __pfx_kthread+0x10/0x10 [ 28.001690] ret_from_fork+0x116/0x1d0 [ 28.001708] ? __pfx_kthread+0x10/0x10 [ 28.001729] ret_from_fork_asm+0x1a/0x30 [ 28.001759] </TASK> [ 28.001769] [ 28.014161] Allocated by task 310: [ 28.014353] kasan_save_stack+0x45/0x70 [ 28.014750] kasan_save_track+0x18/0x40 [ 28.015132] kasan_save_alloc_info+0x3b/0x50 [ 28.015322] __kasan_kmalloc+0xb7/0xc0 [ 28.015609] __kmalloc_cache_noprof+0x189/0x420 [ 28.015941] kasan_bitops_generic+0x92/0x1c0 [ 28.016094] kunit_try_run_case+0x1a5/0x480 [ 28.016232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.016732] kthread+0x337/0x6f0 [ 28.017044] ret_from_fork+0x116/0x1d0 [ 28.017414] ret_from_fork_asm+0x1a/0x30 [ 28.017787] [ 28.017952] The buggy address belongs to the object at ffff8881048d1b00 [ 28.017952] which belongs to the cache kmalloc-16 of size 16 [ 28.019114] The buggy address is located 8 bytes inside of [ 28.019114] allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09) [ 28.019744] [ 28.019901] The buggy address belongs to the physical page: [ 28.020409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1 [ 28.021071] flags: 0x200000000000000(node=0|zone=2) [ 28.021548] page_type: f5(slab) [ 28.021799] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.022031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.022260] page dumped because: kasan: bad access detected [ 28.022744] [ 28.022907] Memory state around the buggy address: [ 28.023373] ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.023967] ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.024585] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.025198] ^ [ 28.025571] ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.026058] ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.026401] ================================================================== [ 27.882587] ================================================================== [ 27.883076] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.883928] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310 [ 27.884828] [ 27.885051] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 27.885111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.885124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.885145] Call Trace: [ 27.885159] <TASK> [ 27.885175] dump_stack_lvl+0x73/0xb0 [ 27.885204] print_report+0xd1/0x610 [ 27.885226] ? __virt_addr_valid+0x1db/0x2d0 [ 27.885249] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.885276] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.885334] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.885362] kasan_report+0x141/0x180 [ 27.885384] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.885427] kasan_check_range+0x10c/0x1c0 [ 27.885449] __kasan_check_write+0x18/0x20 [ 27.885472] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 27.885499] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.885527] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.885549] ? trace_hardirqs_on+0x37/0xe0 [ 27.885571] ? kasan_bitops_generic+0x92/0x1c0 [ 27.885598] kasan_bitops_generic+0x121/0x1c0 [ 27.885620] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.885645] ? __pfx_read_tsc+0x10/0x10 [ 27.885667] ? ktime_get_ts64+0x86/0x230 [ 27.885690] kunit_try_run_case+0x1a5/0x480 [ 27.885713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.885734] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.885757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.885779] ? __kthread_parkme+0x82/0x180 [ 27.885802] ? preempt_count_sub+0x50/0x80 [ 27.885825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.885847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.885870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.885893] kthread+0x337/0x6f0 [ 27.885911] ? trace_preempt_on+0x20/0xc0 [ 27.885938] ? __pfx_kthread+0x10/0x10 [ 27.885958] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.885978] ? calculate_sigpending+0x7b/0xa0 [ 27.886001] ? __pfx_kthread+0x10/0x10 [ 27.886022] ret_from_fork+0x116/0x1d0 [ 27.886040] ? __pfx_kthread+0x10/0x10 [ 27.886060] ret_from_fork_asm+0x1a/0x30 [ 27.886099] </TASK> [ 27.886109] [ 27.898751] Allocated by task 310: [ 27.898872] kasan_save_stack+0x45/0x70 [ 27.899008] kasan_save_track+0x18/0x40 [ 27.899145] kasan_save_alloc_info+0x3b/0x50 [ 27.899290] __kasan_kmalloc+0xb7/0xc0 [ 27.899634] __kmalloc_cache_noprof+0x189/0x420 [ 27.900031] kasan_bitops_generic+0x92/0x1c0 [ 27.900416] kunit_try_run_case+0x1a5/0x480 [ 27.900690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.900942] kthread+0x337/0x6f0 [ 27.901266] ret_from_fork+0x116/0x1d0 [ 27.901620] ret_from_fork_asm+0x1a/0x30 [ 27.901804] [ 27.901888] The buggy address belongs to the object at ffff8881048d1b00 [ 27.901888] which belongs to the cache kmalloc-16 of size 16 [ 27.902983] The buggy address is located 8 bytes inside of [ 27.902983] allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09) [ 27.903574] [ 27.903640] The buggy address belongs to the physical page: [ 27.903805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1 [ 27.904035] flags: 0x200000000000000(node=0|zone=2) [ 27.904220] page_type: f5(slab) [ 27.904411] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.904691] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.904942] page dumped because: kasan: bad access detected [ 27.905220] [ 27.905319] Memory state around the buggy address: [ 27.905560] ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.905839] ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.906056] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.906403] ^ [ 27.906575] ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.906816] ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.907145] ================================================================== [ 27.981695] ================================================================== [ 27.982063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.982542] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310 [ 27.982881] [ 27.982967] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 27.983013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.983025] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.983046] Call Trace: [ 27.983058] <TASK> [ 27.983070] dump_stack_lvl+0x73/0xb0 [ 27.983110] print_report+0xd1/0x610 [ 27.983133] ? __virt_addr_valid+0x1db/0x2d0 [ 27.983156] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.983182] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.983208] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.983234] kasan_report+0x141/0x180 [ 27.983256] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.983298] kasan_check_range+0x10c/0x1c0 [ 27.983321] __kasan_check_write+0x18/0x20 [ 27.983343] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 27.983371] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.983398] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.983421] ? trace_hardirqs_on+0x37/0xe0 [ 27.983443] ? kasan_bitops_generic+0x92/0x1c0 [ 27.983471] kasan_bitops_generic+0x121/0x1c0 [ 27.983493] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.983518] ? __pfx_read_tsc+0x10/0x10 [ 27.983538] ? ktime_get_ts64+0x86/0x230 [ 27.983561] kunit_try_run_case+0x1a5/0x480 [ 27.983584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.983606] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.983628] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.983651] ? __kthread_parkme+0x82/0x180 [ 27.983675] ? preempt_count_sub+0x50/0x80 [ 27.983698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.983721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.983743] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.983765] kthread+0x337/0x6f0 [ 27.983783] ? trace_preempt_on+0x20/0xc0 [ 27.983805] ? __pfx_kthread+0x10/0x10 [ 27.983825] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.983846] ? calculate_sigpending+0x7b/0xa0 [ 27.983868] ? __pfx_kthread+0x10/0x10 [ 27.983889] ret_from_fork+0x116/0x1d0 [ 27.983907] ? __pfx_kthread+0x10/0x10 [ 27.983927] ret_from_fork_asm+0x1a/0x30 [ 27.983959] </TASK> [ 27.983968] [ 27.991572] Allocated by task 310: [ 27.991744] kasan_save_stack+0x45/0x70 [ 27.991897] kasan_save_track+0x18/0x40 [ 27.992103] kasan_save_alloc_info+0x3b/0x50 [ 27.992275] __kasan_kmalloc+0xb7/0xc0 [ 27.992462] __kmalloc_cache_noprof+0x189/0x420 [ 27.992674] kasan_bitops_generic+0x92/0x1c0 [ 27.992869] kunit_try_run_case+0x1a5/0x480 [ 27.993004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.993176] kthread+0x337/0x6f0 [ 27.993310] ret_from_fork+0x116/0x1d0 [ 27.993507] ret_from_fork_asm+0x1a/0x30 [ 27.993692] [ 27.993775] The buggy address belongs to the object at ffff8881048d1b00 [ 27.993775] which belongs to the cache kmalloc-16 of size 16 [ 27.994292] The buggy address is located 8 bytes inside of [ 27.994292] allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09) [ 27.994756] [ 27.994819] The buggy address belongs to the physical page: [ 27.994989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1 [ 27.995384] flags: 0x200000000000000(node=0|zone=2) [ 27.995634] page_type: f5(slab) [ 27.995817] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.996130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.996527] page dumped because: kasan: bad access detected [ 27.996740] [ 27.996831] Memory state around the buggy address: [ 27.997033] ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.997332] ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.997615] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.997893] ^ [ 27.998063] ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.998393] ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.998705] ================================================================== [ 28.027138] ================================================================== [ 28.028027] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.028975] Read of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310 [ 28.029819] [ 28.030018] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 28.030066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.030087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.030108] Call Trace: [ 28.030120] <TASK> [ 28.030134] dump_stack_lvl+0x73/0xb0 [ 28.030164] print_report+0xd1/0x610 [ 28.030195] ? __virt_addr_valid+0x1db/0x2d0 [ 28.030218] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.030243] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.030280] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.030309] kasan_report+0x141/0x180 [ 28.030331] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.030362] __asan_report_load8_noabort+0x18/0x20 [ 28.030387] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.030413] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.030441] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.030464] ? trace_hardirqs_on+0x37/0xe0 [ 28.030487] ? kasan_bitops_generic+0x92/0x1c0 [ 28.030514] kasan_bitops_generic+0x121/0x1c0 [ 28.030537] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.030561] ? __pfx_read_tsc+0x10/0x10 [ 28.030580] ? ktime_get_ts64+0x86/0x230 [ 28.030604] kunit_try_run_case+0x1a5/0x480 [ 28.030627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.030648] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.030671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.030694] ? __kthread_parkme+0x82/0x180 [ 28.030716] ? preempt_count_sub+0x50/0x80 [ 28.030740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.030763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.030785] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.030807] kthread+0x337/0x6f0 [ 28.030826] ? trace_preempt_on+0x20/0xc0 [ 28.030847] ? __pfx_kthread+0x10/0x10 [ 28.030868] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.030888] ? calculate_sigpending+0x7b/0xa0 [ 28.030910] ? __pfx_kthread+0x10/0x10 [ 28.030931] ret_from_fork+0x116/0x1d0 [ 28.030949] ? __pfx_kthread+0x10/0x10 [ 28.030969] ret_from_fork_asm+0x1a/0x30 [ 28.030999] </TASK> [ 28.031009] [ 28.039661] Allocated by task 310: [ 28.039860] kasan_save_stack+0x45/0x70 [ 28.040091] kasan_save_track+0x18/0x40 [ 28.040258] kasan_save_alloc_info+0x3b/0x50 [ 28.040400] __kasan_kmalloc+0xb7/0xc0 [ 28.040590] __kmalloc_cache_noprof+0x189/0x420 [ 28.040838] kasan_bitops_generic+0x92/0x1c0 [ 28.041026] kunit_try_run_case+0x1a5/0x480 [ 28.041195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.041363] kthread+0x337/0x6f0 [ 28.041499] ret_from_fork+0x116/0x1d0 [ 28.041702] ret_from_fork_asm+0x1a/0x30 [ 28.041891] [ 28.042009] The buggy address belongs to the object at ffff8881048d1b00 [ 28.042009] which belongs to the cache kmalloc-16 of size 16 [ 28.042647] The buggy address is located 8 bytes inside of [ 28.042647] allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09) [ 28.043153] [ 28.043241] The buggy address belongs to the physical page: [ 28.043488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1 [ 28.043819] flags: 0x200000000000000(node=0|zone=2) [ 28.044043] page_type: f5(slab) [ 28.044216] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.044569] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.044894] page dumped because: kasan: bad access detected [ 28.045127] [ 28.045214] Memory state around the buggy address: [ 28.045448] ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.045718] ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.045985] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.046266] ^ [ 28.046457] ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.046769] ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.046977] ================================================================== [ 27.962589] ================================================================== [ 27.963383] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.963793] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310 [ 27.964149] [ 27.964228] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 27.964289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.964300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.964321] Call Trace: [ 27.964336] <TASK> [ 27.964349] dump_stack_lvl+0x73/0xb0 [ 27.964389] print_report+0xd1/0x610 [ 27.964410] ? __virt_addr_valid+0x1db/0x2d0 [ 27.964446] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.964472] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.964498] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.964535] kasan_report+0x141/0x180 [ 27.964557] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.964588] kasan_check_range+0x10c/0x1c0 [ 27.964611] __kasan_check_write+0x18/0x20 [ 27.964633] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 27.964661] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.964688] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.964711] ? trace_hardirqs_on+0x37/0xe0 [ 27.964733] ? kasan_bitops_generic+0x92/0x1c0 [ 27.964760] kasan_bitops_generic+0x121/0x1c0 [ 27.964783] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.964807] ? __pfx_read_tsc+0x10/0x10 [ 27.964827] ? ktime_get_ts64+0x86/0x230 [ 27.964850] kunit_try_run_case+0x1a5/0x480 [ 27.964883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.964905] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.964929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.964962] ? __kthread_parkme+0x82/0x180 [ 27.964985] ? preempt_count_sub+0x50/0x80 [ 27.965007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.965038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.965060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.965099] kthread+0x337/0x6f0 [ 27.965118] ? trace_preempt_on+0x20/0xc0 [ 27.965140] ? __pfx_kthread+0x10/0x10 [ 27.965160] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.965182] ? calculate_sigpending+0x7b/0xa0 [ 27.965213] ? __pfx_kthread+0x10/0x10 [ 27.965234] ret_from_fork+0x116/0x1d0 [ 27.965252] ? __pfx_kthread+0x10/0x10 [ 27.965271] ret_from_fork_asm+0x1a/0x30 [ 27.965321] </TASK> [ 27.965331] [ 27.973482] Allocated by task 310: [ 27.973630] kasan_save_stack+0x45/0x70 [ 27.973821] kasan_save_track+0x18/0x40 [ 27.973990] kasan_save_alloc_info+0x3b/0x50 [ 27.974188] __kasan_kmalloc+0xb7/0xc0 [ 27.974396] __kmalloc_cache_noprof+0x189/0x420 [ 27.974600] kasan_bitops_generic+0x92/0x1c0 [ 27.974778] kunit_try_run_case+0x1a5/0x480 [ 27.974915] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.975201] kthread+0x337/0x6f0 [ 27.975400] ret_from_fork+0x116/0x1d0 [ 27.975577] ret_from_fork_asm+0x1a/0x30 [ 27.975752] [ 27.975837] The buggy address belongs to the object at ffff8881048d1b00 [ 27.975837] which belongs to the cache kmalloc-16 of size 16 [ 27.976343] The buggy address is located 8 bytes inside of [ 27.976343] allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09) [ 27.976677] [ 27.976738] The buggy address belongs to the physical page: [ 27.976896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1 [ 27.977149] flags: 0x200000000000000(node=0|zone=2) [ 27.977389] page_type: f5(slab) [ 27.977547] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.978128] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.978341] page dumped because: kasan: bad access detected [ 27.978498] [ 27.978557] Memory state around the buggy address: [ 27.978696] ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.979151] ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.979487] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.979824] ^ [ 27.980013] ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.980543] ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.980886] ================================================================== [ 27.857327] ================================================================== [ 27.858008] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.858433] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310 [ 27.858732] [ 27.858814] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 27.858859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.858871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.858891] Call Trace: [ 27.858904] <TASK> [ 27.858917] dump_stack_lvl+0x73/0xb0 [ 27.858945] print_report+0xd1/0x610 [ 27.858967] ? __virt_addr_valid+0x1db/0x2d0 [ 27.858989] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.859015] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.859040] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.859067] kasan_report+0x141/0x180 [ 27.859103] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.859134] kasan_check_range+0x10c/0x1c0 [ 27.859157] __kasan_check_write+0x18/0x20 [ 27.859180] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 27.859209] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.859239] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.859262] ? trace_hardirqs_on+0x37/0xe0 [ 27.859284] ? kasan_bitops_generic+0x92/0x1c0 [ 27.859311] kasan_bitops_generic+0x121/0x1c0 [ 27.859334] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.859358] ? __pfx_read_tsc+0x10/0x10 [ 27.859379] ? ktime_get_ts64+0x86/0x230 [ 27.859402] kunit_try_run_case+0x1a5/0x480 [ 27.859426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.859448] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.859471] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.859494] ? __kthread_parkme+0x82/0x180 [ 27.859517] ? preempt_count_sub+0x50/0x80 [ 27.859540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.859562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.859585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.859607] kthread+0x337/0x6f0 [ 27.859625] ? trace_preempt_on+0x20/0xc0 [ 27.859647] ? __pfx_kthread+0x10/0x10 [ 27.859667] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.859688] ? calculate_sigpending+0x7b/0xa0 [ 27.859710] ? __pfx_kthread+0x10/0x10 [ 27.859751] ret_from_fork+0x116/0x1d0 [ 27.859769] ? __pfx_kthread+0x10/0x10 [ 27.859789] ret_from_fork_asm+0x1a/0x30 [ 27.859820] </TASK> [ 27.859831] [ 27.871561] Allocated by task 310: [ 27.871748] kasan_save_stack+0x45/0x70 [ 27.871936] kasan_save_track+0x18/0x40 [ 27.872066] kasan_save_alloc_info+0x3b/0x50 [ 27.872283] __kasan_kmalloc+0xb7/0xc0 [ 27.872480] __kmalloc_cache_noprof+0x189/0x420 [ 27.872680] kasan_bitops_generic+0x92/0x1c0 [ 27.872821] kunit_try_run_case+0x1a5/0x480 [ 27.872958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.873143] kthread+0x337/0x6f0 [ 27.873274] ret_from_fork+0x116/0x1d0 [ 27.873452] ret_from_fork_asm+0x1a/0x30 [ 27.873640] [ 27.873725] The buggy address belongs to the object at ffff8881048d1b00 [ 27.873725] which belongs to the cache kmalloc-16 of size 16 [ 27.874253] The buggy address is located 8 bytes inside of [ 27.874253] allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09) [ 27.874709] [ 27.874787] The buggy address belongs to the physical page: [ 27.875002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1 [ 27.875786] flags: 0x200000000000000(node=0|zone=2) [ 27.875953] page_type: f5(slab) [ 27.876068] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.877179] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.877771] page dumped because: kasan: bad access detected [ 27.878017] [ 27.878117] Memory state around the buggy address: [ 27.878575] ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.879062] ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.879533] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.879828] ^ [ 27.879983] ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.880535] ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.881037] ================================================================== [ 27.944449] ================================================================== [ 27.945069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.945525] Write of size 8 at addr ffff8881048d1b08 by task kunit_try_catch/310 [ 27.945817] [ 27.945898] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT(voluntary) [ 27.945956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.945967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.945999] Call Trace: [ 27.946012] <TASK> [ 27.946025] dump_stack_lvl+0x73/0xb0 [ 27.946053] print_report+0xd1/0x610 [ 27.946105] ? __virt_addr_valid+0x1db/0x2d0 [ 27.946127] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.946152] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.946177] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.946204] kasan_report+0x141/0x180 [ 27.946226] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.946258] kasan_check_range+0x10c/0x1c0 [ 27.946292] __kasan_check_write+0x18/0x20 [ 27.946314] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 27.946341] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.946369] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.946391] ? trace_hardirqs_on+0x37/0xe0 [ 27.946414] ? kasan_bitops_generic+0x92/0x1c0 [ 27.946441] kasan_bitops_generic+0x121/0x1c0 [ 27.946463] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.946488] ? __pfx_read_tsc+0x10/0x10 [ 27.946508] ? ktime_get_ts64+0x86/0x230 [ 27.946532] kunit_try_run_case+0x1a5/0x480 [ 27.946555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.946576] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.946599] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.946622] ? __kthread_parkme+0x82/0x180 [ 27.946646] ? preempt_count_sub+0x50/0x80 [ 27.946668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.946691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.946714] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.946737] kthread+0x337/0x6f0 [ 27.946755] ? trace_preempt_on+0x20/0xc0 [ 27.946776] ? __pfx_kthread+0x10/0x10 [ 27.946796] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.946816] ? calculate_sigpending+0x7b/0xa0 [ 27.946838] ? __pfx_kthread+0x10/0x10 [ 27.946859] ret_from_fork+0x116/0x1d0 [ 27.946877] ? __pfx_kthread+0x10/0x10 [ 27.946897] ret_from_fork_asm+0x1a/0x30 [ 27.946927] </TASK> [ 27.946937] [ 27.954976] Allocated by task 310: [ 27.955119] kasan_save_stack+0x45/0x70 [ 27.955335] kasan_save_track+0x18/0x40 [ 27.955517] kasan_save_alloc_info+0x3b/0x50 [ 27.955716] __kasan_kmalloc+0xb7/0xc0 [ 27.955893] __kmalloc_cache_noprof+0x189/0x420 [ 27.956111] kasan_bitops_generic+0x92/0x1c0 [ 27.956344] kunit_try_run_case+0x1a5/0x480 [ 27.956551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.956793] kthread+0x337/0x6f0 [ 27.956951] ret_from_fork+0x116/0x1d0 [ 27.957090] ret_from_fork_asm+0x1a/0x30 [ 27.957222] [ 27.957284] The buggy address belongs to the object at ffff8881048d1b00 [ 27.957284] which belongs to the cache kmalloc-16 of size 16 [ 27.958225] The buggy address is located 8 bytes inside of [ 27.958225] allocated 9-byte region [ffff8881048d1b00, ffff8881048d1b09) [ 27.958586] [ 27.958648] The buggy address belongs to the physical page: [ 27.958900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1048d1 [ 27.959246] flags: 0x200000000000000(node=0|zone=2) [ 27.959426] page_type: f5(slab) [ 27.959537] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.959752] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.960052] page dumped because: kasan: bad access detected [ 27.960332] [ 27.960425] Memory state around the buggy address: [ 27.960654] ffff8881048d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.960968] ffff8881048d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.961257] >ffff8881048d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.961513] ^ [ 27.961625] ffff8881048d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.961822] ffff8881048d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.962027] ==================================================================