Date
July 16, 2025, 12:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.031502] ================================================================== [ 33.031578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 33.031636] Read of size 8 at addr fff00000c6360328 by task kunit_try_catch/292 [ 33.031707] [ 33.031748] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.031866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.031894] Hardware name: linux,dummy-virt (DT) [ 33.031928] Call trace: [ 33.031951] show_stack+0x20/0x38 (C) [ 33.032002] dump_stack_lvl+0x8c/0xd0 [ 33.032051] print_report+0x118/0x5d0 [ 33.032098] kasan_report+0xdc/0x128 [ 33.032142] __asan_report_load8_noabort+0x20/0x30 [ 33.032194] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 33.032249] kasan_bitops_generic+0x110/0x1c8 [ 33.032318] kunit_try_run_case+0x170/0x3f0 [ 33.032368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.032423] kthread+0x328/0x630 [ 33.032571] ret_from_fork+0x10/0x20 [ 33.032704] [ 33.032765] Allocated by task 292: [ 33.033425] kasan_bitops_generic+0xa0/0x1c8 [ 33.035580] >fff00000c6360300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.038031] ret_from_fork+0x10/0x20 [ 33.039043] The buggy address is located 8 bytes inside of [ 33.039043] allocated 9-byte region [fff00000c6360320, fff00000c6360329) [ 33.040473] Hardware name: linux,dummy-virt (DT) [ 33.041680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.042693] ================================================================== [ 33.023416] ================================================================== [ 33.023477] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 33.023560] Write of size 8 at addr fff00000c6360328 by task kunit_try_catch/292 [ 33.023613] [ 33.023645] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.023734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.023763] Hardware name: linux,dummy-virt (DT) [ 33.023796] Call trace: [ 33.023821] show_stack+0x20/0x38 (C) [ 33.023869] dump_stack_lvl+0x8c/0xd0 [ 33.023917] print_report+0x118/0x5d0 [ 33.023963] kasan_report+0xdc/0x128 [ 33.024008] kasan_check_range+0x100/0x1a8 [ 33.024056] __kasan_check_write+0x20/0x30 [ 33.024105] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 33.024159] kasan_bitops_generic+0x110/0x1c8 [ 33.024209] kunit_try_run_case+0x170/0x3f0 [ 33.024258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.024312] kthread+0x328/0x630 [ 33.024354] ret_from_fork+0x10/0x20 [ 33.024403] [ 33.024423] Allocated by task 292: [ 33.024451] kasan_save_stack+0x3c/0x68 [ 33.024491] kasan_save_track+0x20/0x40 [ 33.028618] kasan_save_alloc_info+0x40/0x58 [ 33.028666] __kasan_kmalloc+0xd4/0xd8 [ 33.028706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.028751] kasan_bitops_generic+0xa0/0x1c8 [ 33.028793] kunit_try_run_case+0x170/0x3f0 [ 33.028834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.028880] kthread+0x328/0x630 [ 33.028919] ret_from_fork+0x10/0x20 [ 33.028957] [ 33.028981] The buggy address belongs to the object at fff00000c6360320 [ 33.028981] which belongs to the cache kmalloc-16 of size 16 [ 33.029045] The buggy address is located 8 bytes inside of [ 33.029045] allocated 9-byte region [fff00000c6360320, fff00000c6360329) [ 33.029110] [ 33.029245] The buggy address belongs to the physical page: [ 33.029294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106360 [ 33.029456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.029532] page_type: f5(slab) [ 33.029609] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.029689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.029763] page dumped because: kasan: bad access detected [ 33.029799] [ 33.029848] Memory state around the buggy address: [ 33.029897] fff00000c6360200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.029944] fff00000c6360280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.029990] >fff00000c6360300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.030031] ^ [ 33.030066] fff00000c6360380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.030111] fff00000c6360400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.030203] ==================================================================
[ 25.393929] ================================================================== [ 25.394260] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.394552] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310 [ 25.394889] [ 25.395154] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 25.395206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.395219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.395240] Call Trace: [ 25.395261] <TASK> [ 25.395276] dump_stack_lvl+0x73/0xb0 [ 25.395318] print_report+0xd1/0x610 [ 25.395341] ? __virt_addr_valid+0x1db/0x2d0 [ 25.395364] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.395389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.395415] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.395440] kasan_report+0x141/0x180 [ 25.395462] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.395492] kasan_check_range+0x10c/0x1c0 [ 25.395515] __kasan_check_write+0x18/0x20 [ 25.395540] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.395565] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.395606] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.395630] ? finish_task_switch.isra.0+0x156/0x700 [ 25.395652] ? kasan_bitops_generic+0x92/0x1c0 [ 25.395679] kasan_bitops_generic+0x116/0x1c0 [ 25.395702] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.395726] ? __pfx_read_tsc+0x10/0x10 [ 25.395749] ? ktime_get_ts64+0x86/0x230 [ 25.395775] kunit_try_run_case+0x1a5/0x480 [ 25.395799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.395821] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.395843] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.395865] ? __kthread_parkme+0x82/0x180 [ 25.395885] ? preempt_count_sub+0x50/0x80 [ 25.395907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.395929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.395956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.395983] kthread+0x337/0x6f0 [ 25.396002] ? trace_preempt_on+0x20/0xc0 [ 25.396025] ? __pfx_kthread+0x10/0x10 [ 25.396045] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.396066] ? calculate_sigpending+0x7b/0xa0 [ 25.396091] ? __pfx_kthread+0x10/0x10 [ 25.396113] ret_from_fork+0x116/0x1d0 [ 25.396132] ? __pfx_kthread+0x10/0x10 [ 25.396152] ret_from_fork_asm+0x1a/0x30 [ 25.396182] </TASK> [ 25.396193] [ 25.404714] Allocated by task 310: [ 25.404910] kasan_save_stack+0x45/0x70 [ 25.405118] kasan_save_track+0x18/0x40 [ 25.405246] kasan_save_alloc_info+0x3b/0x50 [ 25.405467] __kasan_kmalloc+0xb7/0xc0 [ 25.405612] __kmalloc_cache_noprof+0x189/0x420 [ 25.405802] kasan_bitops_generic+0x92/0x1c0 [ 25.406008] kunit_try_run_case+0x1a5/0x480 [ 25.406208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.406470] kthread+0x337/0x6f0 [ 25.406633] ret_from_fork+0x116/0x1d0 [ 25.406812] ret_from_fork_asm+0x1a/0x30 [ 25.406959] [ 25.407023] The buggy address belongs to the object at ffff888105376d80 [ 25.407023] which belongs to the cache kmalloc-16 of size 16 [ 25.407559] The buggy address is located 8 bytes inside of [ 25.407559] allocated 9-byte region [ffff888105376d80, ffff888105376d89) [ 25.408739] [ 25.408814] The buggy address belongs to the physical page: [ 25.409321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376 [ 25.409660] flags: 0x200000000000000(node=0|zone=2) [ 25.409900] page_type: f5(slab) [ 25.410043] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.410350] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.410710] page dumped because: kasan: bad access detected [ 25.410921] [ 25.410995] Memory state around the buggy address: [ 25.411206] ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.411499] ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.411760] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.411965] ^ [ 25.412082] ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.412293] ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.412575] ================================================================== [ 25.374433] ================================================================== [ 25.375033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.375361] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310 [ 25.375640] [ 25.375729] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 25.375783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.375796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.375818] Call Trace: [ 25.375857] <TASK> [ 25.376101] dump_stack_lvl+0x73/0xb0 [ 25.376141] print_report+0xd1/0x610 [ 25.376165] ? __virt_addr_valid+0x1db/0x2d0 [ 25.376191] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.376217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.376243] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.376268] kasan_report+0x141/0x180 [ 25.376290] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.376336] kasan_check_range+0x10c/0x1c0 [ 25.376360] __kasan_check_write+0x18/0x20 [ 25.376383] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.376408] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.376434] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.376460] ? finish_task_switch.isra.0+0x156/0x700 [ 25.376483] ? kasan_bitops_generic+0x92/0x1c0 [ 25.376511] kasan_bitops_generic+0x116/0x1c0 [ 25.376533] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.376558] ? __pfx_read_tsc+0x10/0x10 [ 25.376580] ? ktime_get_ts64+0x86/0x230 [ 25.376606] kunit_try_run_case+0x1a5/0x480 [ 25.376631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.376654] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.376678] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.376699] ? __kthread_parkme+0x82/0x180 [ 25.376720] ? preempt_count_sub+0x50/0x80 [ 25.376742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.376765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.376792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.376819] kthread+0x337/0x6f0 [ 25.376837] ? trace_preempt_on+0x20/0xc0 [ 25.376861] ? __pfx_kthread+0x10/0x10 [ 25.376945] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.376966] ? calculate_sigpending+0x7b/0xa0 [ 25.376990] ? __pfx_kthread+0x10/0x10 [ 25.377011] ret_from_fork+0x116/0x1d0 [ 25.377032] ? __pfx_kthread+0x10/0x10 [ 25.377052] ret_from_fork_asm+0x1a/0x30 [ 25.377085] </TASK> [ 25.377095] [ 25.385087] Allocated by task 310: [ 25.385265] kasan_save_stack+0x45/0x70 [ 25.385471] kasan_save_track+0x18/0x40 [ 25.385661] kasan_save_alloc_info+0x3b/0x50 [ 25.385864] __kasan_kmalloc+0xb7/0xc0 [ 25.386042] __kmalloc_cache_noprof+0x189/0x420 [ 25.386346] kasan_bitops_generic+0x92/0x1c0 [ 25.386730] kunit_try_run_case+0x1a5/0x480 [ 25.387019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.387311] kthread+0x337/0x6f0 [ 25.387459] ret_from_fork+0x116/0x1d0 [ 25.387617] ret_from_fork_asm+0x1a/0x30 [ 25.387796] [ 25.387861] The buggy address belongs to the object at ffff888105376d80 [ 25.387861] which belongs to the cache kmalloc-16 of size 16 [ 25.388444] The buggy address is located 8 bytes inside of [ 25.388444] allocated 9-byte region [ffff888105376d80, ffff888105376d89) [ 25.388833] [ 25.388904] The buggy address belongs to the physical page: [ 25.389070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376 [ 25.389316] flags: 0x200000000000000(node=0|zone=2) [ 25.389567] page_type: f5(slab) [ 25.389827] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.390156] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.390477] page dumped because: kasan: bad access detected [ 25.390641] [ 25.390704] Memory state around the buggy address: [ 25.390854] ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.391062] ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.391549] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.391913] ^ [ 25.392151] ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.392491] ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.392948] ================================================================== [ 25.444214] ================================================================== [ 25.444467] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.444918] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310 [ 25.445266] [ 25.445394] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 25.445447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.445460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.445484] Call Trace: [ 25.445504] <TASK> [ 25.445522] dump_stack_lvl+0x73/0xb0 [ 25.445550] print_report+0xd1/0x610 [ 25.445573] ? __virt_addr_valid+0x1db/0x2d0 [ 25.445771] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.445799] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.445836] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.445861] kasan_report+0x141/0x180 [ 25.445932] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.445963] kasan_check_range+0x10c/0x1c0 [ 25.445987] __kasan_check_write+0x18/0x20 [ 25.446011] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.446036] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.446062] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.446086] ? finish_task_switch.isra.0+0x156/0x700 [ 25.446109] ? kasan_bitops_generic+0x92/0x1c0 [ 25.446136] kasan_bitops_generic+0x116/0x1c0 [ 25.446159] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.446182] ? __pfx_read_tsc+0x10/0x10 [ 25.446205] ? ktime_get_ts64+0x86/0x230 [ 25.446229] kunit_try_run_case+0x1a5/0x480 [ 25.446254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.446276] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.446314] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.446338] ? __kthread_parkme+0x82/0x180 [ 25.446358] ? preempt_count_sub+0x50/0x80 [ 25.446380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.446403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.446429] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.446456] kthread+0x337/0x6f0 [ 25.446476] ? trace_preempt_on+0x20/0xc0 [ 25.446499] ? __pfx_kthread+0x10/0x10 [ 25.446520] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.446542] ? calculate_sigpending+0x7b/0xa0 [ 25.446565] ? __pfx_kthread+0x10/0x10 [ 25.446586] ret_from_fork+0x116/0x1d0 [ 25.446605] ? __pfx_kthread+0x10/0x10 [ 25.446625] ret_from_fork_asm+0x1a/0x30 [ 25.446655] </TASK> [ 25.446666] [ 25.455097] Allocated by task 310: [ 25.455283] kasan_save_stack+0x45/0x70 [ 25.455498] kasan_save_track+0x18/0x40 [ 25.455780] kasan_save_alloc_info+0x3b/0x50 [ 25.455926] __kasan_kmalloc+0xb7/0xc0 [ 25.456053] __kmalloc_cache_noprof+0x189/0x420 [ 25.456236] kasan_bitops_generic+0x92/0x1c0 [ 25.456450] kunit_try_run_case+0x1a5/0x480 [ 25.456646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.456974] kthread+0x337/0x6f0 [ 25.457123] ret_from_fork+0x116/0x1d0 [ 25.457249] ret_from_fork_asm+0x1a/0x30 [ 25.457533] [ 25.457613] The buggy address belongs to the object at ffff888105376d80 [ 25.457613] which belongs to the cache kmalloc-16 of size 16 [ 25.458112] The buggy address is located 8 bytes inside of [ 25.458112] allocated 9-byte region [ffff888105376d80, ffff888105376d89) [ 25.460440] [ 25.461001] The buggy address belongs to the physical page: [ 25.461205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376 [ 25.462956] flags: 0x200000000000000(node=0|zone=2) [ 25.463609] page_type: f5(slab) [ 25.464469] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.464864] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.465229] page dumped because: kasan: bad access detected [ 25.465583] [ 25.465727] Memory state around the buggy address: [ 25.465886] ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.466843] ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.467555] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.468434] ^ [ 25.468596] ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.468911] ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.469123] ================================================================== [ 25.413378] ================================================================== [ 25.413774] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.414127] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310 [ 25.414679] [ 25.415095] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 25.415161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.415175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.415198] Call Trace: [ 25.415219] <TASK> [ 25.415237] dump_stack_lvl+0x73/0xb0 [ 25.415268] print_report+0xd1/0x610 [ 25.415290] ? __virt_addr_valid+0x1db/0x2d0 [ 25.415324] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.415351] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.415872] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.415903] kasan_report+0x141/0x180 [ 25.415927] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.415958] kasan_check_range+0x10c/0x1c0 [ 25.415982] __kasan_check_write+0x18/0x20 [ 25.416014] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.416041] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.416067] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.416091] ? finish_task_switch.isra.0+0x156/0x700 [ 25.416115] ? kasan_bitops_generic+0x92/0x1c0 [ 25.416142] kasan_bitops_generic+0x116/0x1c0 [ 25.416165] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.416189] ? __pfx_read_tsc+0x10/0x10 [ 25.416215] ? ktime_get_ts64+0x86/0x230 [ 25.416241] kunit_try_run_case+0x1a5/0x480 [ 25.416266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.416288] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.416323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.416346] ? __kthread_parkme+0x82/0x180 [ 25.416366] ? preempt_count_sub+0x50/0x80 [ 25.416389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.416412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.416438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.416465] kthread+0x337/0x6f0 [ 25.416484] ? trace_preempt_on+0x20/0xc0 [ 25.416508] ? __pfx_kthread+0x10/0x10 [ 25.416528] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.416548] ? calculate_sigpending+0x7b/0xa0 [ 25.416572] ? __pfx_kthread+0x10/0x10 [ 25.416634] ret_from_fork+0x116/0x1d0 [ 25.416652] ? __pfx_kthread+0x10/0x10 [ 25.416673] ret_from_fork_asm+0x1a/0x30 [ 25.416704] </TASK> [ 25.416715] [ 25.430403] Allocated by task 310: [ 25.430578] kasan_save_stack+0x45/0x70 [ 25.430764] kasan_save_track+0x18/0x40 [ 25.431020] kasan_save_alloc_info+0x3b/0x50 [ 25.431212] __kasan_kmalloc+0xb7/0xc0 [ 25.431388] __kmalloc_cache_noprof+0x189/0x420 [ 25.431586] kasan_bitops_generic+0x92/0x1c0 [ 25.431777] kunit_try_run_case+0x1a5/0x480 [ 25.431957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.432179] kthread+0x337/0x6f0 [ 25.432781] ret_from_fork+0x116/0x1d0 [ 25.433421] ret_from_fork_asm+0x1a/0x30 [ 25.433772] [ 25.434011] The buggy address belongs to the object at ffff888105376d80 [ 25.434011] which belongs to the cache kmalloc-16 of size 16 [ 25.434894] The buggy address is located 8 bytes inside of [ 25.434894] allocated 9-byte region [ffff888105376d80, ffff888105376d89) [ 25.436007] [ 25.436242] The buggy address belongs to the physical page: [ 25.436508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376 [ 25.437087] flags: 0x200000000000000(node=0|zone=2) [ 25.437856] page_type: f5(slab) [ 25.438220] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.438793] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.439371] page dumped because: kasan: bad access detected [ 25.439845] [ 25.440116] Memory state around the buggy address: [ 25.440449] ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.441119] ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.441852] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.442371] ^ [ 25.442536] ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.443284] ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.443738] ================================================================== [ 25.469752] ================================================================== [ 25.469996] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.471675] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310 [ 25.472719] [ 25.473004] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 25.473072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.473086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.473109] Call Trace: [ 25.473132] <TASK> [ 25.473155] dump_stack_lvl+0x73/0xb0 [ 25.473193] print_report+0xd1/0x610 [ 25.473218] ? __virt_addr_valid+0x1db/0x2d0 [ 25.473242] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.473268] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.473294] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.473332] kasan_report+0x141/0x180 [ 25.473354] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.473382] kasan_check_range+0x10c/0x1c0 [ 25.473406] __kasan_check_write+0x18/0x20 [ 25.473430] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.473454] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.473480] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.473505] ? finish_task_switch.isra.0+0x156/0x700 [ 25.473527] ? kasan_bitops_generic+0x92/0x1c0 [ 25.473553] kasan_bitops_generic+0x116/0x1c0 [ 25.473582] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.473612] ? __pfx_read_tsc+0x10/0x10 [ 25.473636] ? ktime_get_ts64+0x86/0x230 [ 25.473663] kunit_try_run_case+0x1a5/0x480 [ 25.473687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.473709] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.473732] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.473755] ? __kthread_parkme+0x82/0x180 [ 25.473774] ? preempt_count_sub+0x50/0x80 [ 25.473798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.473821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.473847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.473874] kthread+0x337/0x6f0 [ 25.473893] ? trace_preempt_on+0x20/0xc0 [ 25.473916] ? __pfx_kthread+0x10/0x10 [ 25.473936] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.473957] ? calculate_sigpending+0x7b/0xa0 [ 25.473980] ? __pfx_kthread+0x10/0x10 [ 25.474001] ret_from_fork+0x116/0x1d0 [ 25.474020] ? __pfx_kthread+0x10/0x10 [ 25.474041] ret_from_fork_asm+0x1a/0x30 [ 25.474072] </TASK> [ 25.474082] [ 25.489356] Allocated by task 310: [ 25.489504] kasan_save_stack+0x45/0x70 [ 25.489844] kasan_save_track+0x18/0x40 [ 25.490269] kasan_save_alloc_info+0x3b/0x50 [ 25.490778] __kasan_kmalloc+0xb7/0xc0 [ 25.491179] __kmalloc_cache_noprof+0x189/0x420 [ 25.491704] kasan_bitops_generic+0x92/0x1c0 [ 25.492129] kunit_try_run_case+0x1a5/0x480 [ 25.492543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.492733] kthread+0x337/0x6f0 [ 25.492850] ret_from_fork+0x116/0x1d0 [ 25.493223] ret_from_fork_asm+0x1a/0x30 [ 25.493682] [ 25.493876] The buggy address belongs to the object at ffff888105376d80 [ 25.493876] which belongs to the cache kmalloc-16 of size 16 [ 25.495069] The buggy address is located 8 bytes inside of [ 25.495069] allocated 9-byte region [ffff888105376d80, ffff888105376d89) [ 25.495621] [ 25.495698] The buggy address belongs to the physical page: [ 25.496043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376 [ 25.496803] flags: 0x200000000000000(node=0|zone=2) [ 25.497343] page_type: f5(slab) [ 25.497681] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.498602] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.499160] page dumped because: kasan: bad access detected [ 25.499347] [ 25.499416] Memory state around the buggy address: [ 25.499569] ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.499778] ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.500516] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.501221] ^ [ 25.501570] ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.502281] ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.503102] ================================================================== [ 25.533753] ================================================================== [ 25.534010] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.534408] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310 [ 25.534820] [ 25.534920] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 25.534973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.534986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.535007] Call Trace: [ 25.535029] <TASK> [ 25.535049] dump_stack_lvl+0x73/0xb0 [ 25.535078] print_report+0xd1/0x610 [ 25.535102] ? __virt_addr_valid+0x1db/0x2d0 [ 25.535125] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.535150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.535176] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.535201] kasan_report+0x141/0x180 [ 25.535222] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.535251] kasan_check_range+0x10c/0x1c0 [ 25.535274] __kasan_check_write+0x18/0x20 [ 25.535296] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.535334] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.535360] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.535384] ? finish_task_switch.isra.0+0x156/0x700 [ 25.535407] ? kasan_bitops_generic+0x92/0x1c0 [ 25.535432] kasan_bitops_generic+0x116/0x1c0 [ 25.535455] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.535479] ? __pfx_read_tsc+0x10/0x10 [ 25.535502] ? ktime_get_ts64+0x86/0x230 [ 25.535526] kunit_try_run_case+0x1a5/0x480 [ 25.535551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.535573] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.535669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.535693] ? __kthread_parkme+0x82/0x180 [ 25.535713] ? preempt_count_sub+0x50/0x80 [ 25.535736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.535760] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.535788] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.535814] kthread+0x337/0x6f0 [ 25.535834] ? trace_preempt_on+0x20/0xc0 [ 25.535857] ? __pfx_kthread+0x10/0x10 [ 25.535878] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.535898] ? calculate_sigpending+0x7b/0xa0 [ 25.535922] ? __pfx_kthread+0x10/0x10 [ 25.535943] ret_from_fork+0x116/0x1d0 [ 25.535963] ? __pfx_kthread+0x10/0x10 [ 25.535984] ret_from_fork_asm+0x1a/0x30 [ 25.536016] </TASK> [ 25.536027] [ 25.544240] Allocated by task 310: [ 25.544385] kasan_save_stack+0x45/0x70 [ 25.544532] kasan_save_track+0x18/0x40 [ 25.544660] kasan_save_alloc_info+0x3b/0x50 [ 25.545039] __kasan_kmalloc+0xb7/0xc0 [ 25.545235] __kmalloc_cache_noprof+0x189/0x420 [ 25.545463] kasan_bitops_generic+0x92/0x1c0 [ 25.545773] kunit_try_run_case+0x1a5/0x480 [ 25.545964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.546135] kthread+0x337/0x6f0 [ 25.546249] ret_from_fork+0x116/0x1d0 [ 25.546385] ret_from_fork_asm+0x1a/0x30 [ 25.546568] [ 25.546998] The buggy address belongs to the object at ffff888105376d80 [ 25.546998] which belongs to the cache kmalloc-16 of size 16 [ 25.547541] The buggy address is located 8 bytes inside of [ 25.547541] allocated 9-byte region [ffff888105376d80, ffff888105376d89) [ 25.548121] [ 25.548218] The buggy address belongs to the physical page: [ 25.548459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376 [ 25.548819] flags: 0x200000000000000(node=0|zone=2) [ 25.549079] page_type: f5(slab) [ 25.549203] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.549512] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.549855] page dumped because: kasan: bad access detected [ 25.550295] [ 25.550407] Memory state around the buggy address: [ 25.550622] ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.550836] ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.551096] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.551415] ^ [ 25.551645] ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.552103] ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.552422] ================================================================== [ 25.503984] ================================================================== [ 25.504744] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.505283] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310 [ 25.505520] [ 25.505612] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 25.505664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.505676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.505698] Call Trace: [ 25.505720] <TASK> [ 25.505739] dump_stack_lvl+0x73/0xb0 [ 25.505769] print_report+0xd1/0x610 [ 25.505792] ? __virt_addr_valid+0x1db/0x2d0 [ 25.505815] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.505840] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.505867] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.505902] kasan_report+0x141/0x180 [ 25.505924] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.505955] kasan_check_range+0x10c/0x1c0 [ 25.505979] __kasan_check_write+0x18/0x20 [ 25.506001] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.506026] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.506052] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.506076] ? finish_task_switch.isra.0+0x156/0x700 [ 25.506099] ? kasan_bitops_generic+0x92/0x1c0 [ 25.506125] kasan_bitops_generic+0x116/0x1c0 [ 25.506148] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.506172] ? __pfx_read_tsc+0x10/0x10 [ 25.506195] ? ktime_get_ts64+0x86/0x230 [ 25.506219] kunit_try_run_case+0x1a5/0x480 [ 25.506244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.506266] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.506289] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.506324] ? __kthread_parkme+0x82/0x180 [ 25.506343] ? preempt_count_sub+0x50/0x80 [ 25.506366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.506389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.506415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.506441] kthread+0x337/0x6f0 [ 25.506460] ? trace_preempt_on+0x20/0xc0 [ 25.506485] ? __pfx_kthread+0x10/0x10 [ 25.506505] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.506526] ? calculate_sigpending+0x7b/0xa0 [ 25.506550] ? __pfx_kthread+0x10/0x10 [ 25.506571] ret_from_fork+0x116/0x1d0 [ 25.506608] ? __pfx_kthread+0x10/0x10 [ 25.506629] ret_from_fork_asm+0x1a/0x30 [ 25.506660] </TASK> [ 25.506671] [ 25.520431] Allocated by task 310: [ 25.520583] kasan_save_stack+0x45/0x70 [ 25.520733] kasan_save_track+0x18/0x40 [ 25.521011] kasan_save_alloc_info+0x3b/0x50 [ 25.521412] __kasan_kmalloc+0xb7/0xc0 [ 25.521748] __kmalloc_cache_noprof+0x189/0x420 [ 25.522132] kasan_bitops_generic+0x92/0x1c0 [ 25.522597] kunit_try_run_case+0x1a5/0x480 [ 25.522991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.523508] kthread+0x337/0x6f0 [ 25.523830] ret_from_fork+0x116/0x1d0 [ 25.524224] ret_from_fork_asm+0x1a/0x30 [ 25.524660] [ 25.524830] The buggy address belongs to the object at ffff888105376d80 [ 25.524830] which belongs to the cache kmalloc-16 of size 16 [ 25.526101] The buggy address is located 8 bytes inside of [ 25.526101] allocated 9-byte region [ffff888105376d80, ffff888105376d89) [ 25.526482] [ 25.526555] The buggy address belongs to the physical page: [ 25.527020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376 [ 25.527808] flags: 0x200000000000000(node=0|zone=2) [ 25.528274] page_type: f5(slab) [ 25.528639] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.529493] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.529903] page dumped because: kasan: bad access detected [ 25.530074] [ 25.530139] Memory state around the buggy address: [ 25.530293] ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.530518] ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.531088] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.531722] ^ [ 25.532086] ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.532611] ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.533238] ================================================================== [ 25.354356] ================================================================== [ 25.354832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.355295] Write of size 8 at addr ffff888105376d88 by task kunit_try_catch/310 [ 25.355631] [ 25.355726] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 25.355780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.355795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.355818] Call Trace: [ 25.355833] <TASK> [ 25.355852] dump_stack_lvl+0x73/0xb0 [ 25.355896] print_report+0xd1/0x610 [ 25.355920] ? __virt_addr_valid+0x1db/0x2d0 [ 25.355944] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.355970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.355996] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.356021] kasan_report+0x141/0x180 [ 25.356044] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.356073] kasan_check_range+0x10c/0x1c0 [ 25.356097] __kasan_check_write+0x18/0x20 [ 25.356121] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.356147] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.356172] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.356197] ? finish_task_switch.isra.0+0x156/0x700 [ 25.356220] ? kasan_bitops_generic+0x92/0x1c0 [ 25.356246] kasan_bitops_generic+0x116/0x1c0 [ 25.356269] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.356293] ? __pfx_read_tsc+0x10/0x10 [ 25.356326] ? ktime_get_ts64+0x86/0x230 [ 25.356352] kunit_try_run_case+0x1a5/0x480 [ 25.356376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.356400] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.356423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.356445] ? __kthread_parkme+0x82/0x180 [ 25.356465] ? preempt_count_sub+0x50/0x80 [ 25.356488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.356511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.356537] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.356563] kthread+0x337/0x6f0 [ 25.356583] ? trace_preempt_on+0x20/0xc0 [ 25.356607] ? __pfx_kthread+0x10/0x10 [ 25.356628] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.356648] ? calculate_sigpending+0x7b/0xa0 [ 25.356673] ? __pfx_kthread+0x10/0x10 [ 25.356695] ret_from_fork+0x116/0x1d0 [ 25.356714] ? __pfx_kthread+0x10/0x10 [ 25.356735] ret_from_fork_asm+0x1a/0x30 [ 25.356766] </TASK> [ 25.356777] [ 25.365329] Allocated by task 310: [ 25.365498] kasan_save_stack+0x45/0x70 [ 25.365708] kasan_save_track+0x18/0x40 [ 25.365895] kasan_save_alloc_info+0x3b/0x50 [ 25.366281] __kasan_kmalloc+0xb7/0xc0 [ 25.366415] __kmalloc_cache_noprof+0x189/0x420 [ 25.366624] kasan_bitops_generic+0x92/0x1c0 [ 25.366908] kunit_try_run_case+0x1a5/0x480 [ 25.367115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.367310] kthread+0x337/0x6f0 [ 25.367428] ret_from_fork+0x116/0x1d0 [ 25.367657] ret_from_fork_asm+0x1a/0x30 [ 25.368111] [ 25.368204] The buggy address belongs to the object at ffff888105376d80 [ 25.368204] which belongs to the cache kmalloc-16 of size 16 [ 25.368734] The buggy address is located 8 bytes inside of [ 25.368734] allocated 9-byte region [ffff888105376d80, ffff888105376d89) [ 25.369269] [ 25.369353] The buggy address belongs to the physical page: [ 25.369525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105376 [ 25.369769] flags: 0x200000000000000(node=0|zone=2) [ 25.369951] page_type: f5(slab) [ 25.370120] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.370461] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.371200] page dumped because: kasan: bad access detected [ 25.371454] [ 25.371519] Memory state around the buggy address: [ 25.371674] ffff888105376c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.371884] ffff888105376d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.372092] >ffff888105376d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.372552] ^ [ 25.373118] ffff888105376e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.373476] ffff888105376e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.374021] ==================================================================