Date
July 10, 2025, 6:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.284116] ================================================================== [ 19.284172] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 19.284228] Write of size 8 at addr fff00000c3eb2548 by task kunit_try_catch/261 [ 19.284279] [ 19.284313] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.284413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.284440] Hardware name: linux,dummy-virt (DT) [ 19.284473] Call trace: [ 19.284497] show_stack+0x20/0x38 (C) [ 19.284547] dump_stack_lvl+0x8c/0xd0 [ 19.284597] print_report+0x118/0x608 [ 19.284647] kasan_report+0xdc/0x128 [ 19.284696] kasan_check_range+0x100/0x1a8 [ 19.284749] __kasan_check_write+0x20/0x30 [ 19.284797] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 19.284851] kasan_bitops_generic+0x110/0x1c8 [ 19.284902] kunit_try_run_case+0x170/0x3f0 [ 19.284952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.285008] kthread+0x328/0x630 [ 19.285052] ret_from_fork+0x10/0x20 [ 19.285102] [ 19.285122] Allocated by task 261: [ 19.285151] kasan_save_stack+0x3c/0x68 [ 19.285194] kasan_save_track+0x20/0x40 [ 19.285236] kasan_save_alloc_info+0x40/0x58 [ 19.286723] kunit_try_run_case+0x170/0x3f0 [ 19.288279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.289018] [ 19.289039] Memory state around the buggy address: [ 19.289072] fff00000c3eb2400: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 19.289565] fff00000c3eb2480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.289611] >fff00000c3eb2500: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 19.289652] ^ [ 19.289691] fff00000c3eb2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.289773] ================================================================== [ 19.210757] ================================================================== [ 19.211004] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.211121] Write of size 8 at addr fff00000c3eb2548 by task kunit_try_catch/261 [ 19.211183] [ 19.211219] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.213106] kasan_check_range+0x100/0x1a8 [ 19.216185] __kasan_kmalloc+0xd4/0xd8 [ 19.217779] The buggy address belongs to the physical page: [ 19.219701] fff00000c3eb2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.222416] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.225555] kasan_save_alloc_info+0x40/0x58 [ 19.228132] [ 19.234715] dump_stack_lvl+0x8c/0xd0 [ 19.236838] kasan_save_stack+0x3c/0x68 [ 19.239182] [ 19.240163] page_type: f5(slab) [ 19.241784] ^ [ 19.244620] kunit_try_run_case+0x170/0x3f0 [ 19.245162] kunit_try_run_case+0x170/0x3f0 [ 19.247171] page_type: f5(slab) [ 19.248246] [ 19.248370] Memory state around the buggy address: [ 19.253558] kthread+0x328/0x630 [ 19.253999] kasan_save_track+0x20/0x40 [ 19.254352] kasan_save_alloc_info+0x40/0x58 [ 19.254419] __kasan_kmalloc+0xd4/0xd8 [ 19.254466] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.254509] kasan_bitops_generic+0xa0/0x1c8 [ 19.254550] kunit_try_run_case+0x170/0x3f0 [ 19.254590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.254637] kthread+0x328/0x630 [ 19.254672] ret_from_fork+0x10/0x20 [ 19.254712] [ 19.254735] The buggy address belongs to the object at fff00000c3eb2540 [ 19.254735] which belongs to the cache kmalloc-16 of size 16 [ 19.254794] The buggy address is located 8 bytes inside of [ 19.254794] allocated 9-byte region [fff00000c3eb2540, fff00000c3eb2549) [ 19.255334] >fff00000c3eb2500: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 19.256609] ^ [ 19.258092] ==================================================================
[ 14.605427] ================================================================== [ 14.605751] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.606448] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.607007] [ 14.607144] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.607189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.607201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.607220] Call Trace: [ 14.607233] <TASK> [ 14.607246] dump_stack_lvl+0x73/0xb0 [ 14.607276] print_report+0xd1/0x650 [ 14.607299] ? __virt_addr_valid+0x1db/0x2d0 [ 14.607322] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.607348] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.607372] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.607398] kasan_report+0x141/0x180 [ 14.607420] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.607451] kasan_check_range+0x10c/0x1c0 [ 14.607475] __kasan_check_write+0x18/0x20 [ 14.607495] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.607522] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.607552] ? ret_from_fork_asm+0x1a/0x30 [ 14.607574] ? kthread+0x337/0x6f0 [ 14.607596] kasan_bitops_generic+0x116/0x1c0 [ 14.607621] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.607647] ? __pfx_read_tsc+0x10/0x10 [ 14.607668] ? ktime_get_ts64+0x86/0x230 [ 14.607691] kunit_try_run_case+0x1a5/0x480 [ 14.607716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.607739] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.607764] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.607788] ? __kthread_parkme+0x82/0x180 [ 14.607808] ? preempt_count_sub+0x50/0x80 [ 14.607832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.607857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.607882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.607908] kthread+0x337/0x6f0 [ 14.607927] ? trace_preempt_on+0x20/0xc0 [ 14.608160] ? __pfx_kthread+0x10/0x10 [ 14.608183] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.608205] ? calculate_sigpending+0x7b/0xa0 [ 14.608230] ? __pfx_kthread+0x10/0x10 [ 14.608251] ret_from_fork+0x116/0x1d0 [ 14.608271] ? __pfx_kthread+0x10/0x10 [ 14.608292] ret_from_fork_asm+0x1a/0x30 [ 14.608322] </TASK> [ 14.608333] [ 14.615805] Allocated by task 278: [ 14.615983] kasan_save_stack+0x45/0x70 [ 14.616193] kasan_save_track+0x18/0x40 [ 14.616565] kasan_save_alloc_info+0x3b/0x50 [ 14.616716] __kasan_kmalloc+0xb7/0xc0 [ 14.616846] __kmalloc_cache_noprof+0x189/0x420 [ 14.617199] kasan_bitops_generic+0x92/0x1c0 [ 14.617412] kunit_try_run_case+0x1a5/0x480 [ 14.617622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.617842] kthread+0x337/0x6f0 [ 14.618025] ret_from_fork+0x116/0x1d0 [ 14.618203] ret_from_fork_asm+0x1a/0x30 [ 14.618342] [ 14.618413] The buggy address belongs to the object at ffff888101debea0 [ 14.618413] which belongs to the cache kmalloc-16 of size 16 [ 14.618814] The buggy address is located 8 bytes inside of [ 14.618814] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.619340] [ 14.619524] The buggy address belongs to the physical page: [ 14.619775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.620095] flags: 0x200000000000000(node=0|zone=2) [ 14.620259] page_type: f5(slab) [ 14.620377] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.620790] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.621380] page dumped because: kasan: bad access detected [ 14.621639] [ 14.621731] Memory state around the buggy address: [ 14.621903] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.622128] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.622379] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.622687] ^ [ 14.622896] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.623360] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.623569] ================================================================== [ 14.643397] ================================================================== [ 14.643703] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.644068] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.644399] [ 14.644509] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.644551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.644562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.644582] Call Trace: [ 14.644596] <TASK> [ 14.644611] dump_stack_lvl+0x73/0xb0 [ 14.644638] print_report+0xd1/0x650 [ 14.644660] ? __virt_addr_valid+0x1db/0x2d0 [ 14.644682] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.644709] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.644732] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.644759] kasan_report+0x141/0x180 [ 14.644781] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.644811] kasan_check_range+0x10c/0x1c0 [ 14.644836] __kasan_check_write+0x18/0x20 [ 14.644855] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.644882] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.644911] ? ret_from_fork_asm+0x1a/0x30 [ 14.644956] ? kthread+0x337/0x6f0 [ 14.644979] kasan_bitops_generic+0x116/0x1c0 [ 14.645003] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.645037] ? __pfx_read_tsc+0x10/0x10 [ 14.645059] ? ktime_get_ts64+0x86/0x230 [ 14.645083] kunit_try_run_case+0x1a5/0x480 [ 14.645106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.645129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.645154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.645177] ? __kthread_parkme+0x82/0x180 [ 14.645198] ? preempt_count_sub+0x50/0x80 [ 14.645220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.645245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.645269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.645294] kthread+0x337/0x6f0 [ 14.645313] ? trace_preempt_on+0x20/0xc0 [ 14.645335] ? __pfx_kthread+0x10/0x10 [ 14.645356] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.645378] ? calculate_sigpending+0x7b/0xa0 [ 14.645402] ? __pfx_kthread+0x10/0x10 [ 14.645423] ret_from_fork+0x116/0x1d0 [ 14.645441] ? __pfx_kthread+0x10/0x10 [ 14.645462] ret_from_fork_asm+0x1a/0x30 [ 14.645492] </TASK> [ 14.645502] [ 14.652832] Allocated by task 278: [ 14.652979] kasan_save_stack+0x45/0x70 [ 14.653139] kasan_save_track+0x18/0x40 [ 14.653307] kasan_save_alloc_info+0x3b/0x50 [ 14.653490] __kasan_kmalloc+0xb7/0xc0 [ 14.653655] __kmalloc_cache_noprof+0x189/0x420 [ 14.653849] kasan_bitops_generic+0x92/0x1c0 [ 14.654025] kunit_try_run_case+0x1a5/0x480 [ 14.654182] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.654357] kthread+0x337/0x6f0 [ 14.654492] ret_from_fork+0x116/0x1d0 [ 14.654674] ret_from_fork_asm+0x1a/0x30 [ 14.654867] [ 14.654983] The buggy address belongs to the object at ffff888101debea0 [ 14.654983] which belongs to the cache kmalloc-16 of size 16 [ 14.655506] The buggy address is located 8 bytes inside of [ 14.655506] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.655999] [ 14.656092] The buggy address belongs to the physical page: [ 14.656345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.656588] flags: 0x200000000000000(node=0|zone=2) [ 14.656749] page_type: f5(slab) [ 14.656912] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.657277] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.657628] page dumped because: kasan: bad access detected [ 14.657852] [ 14.657969] Memory state around the buggy address: [ 14.658172] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.658454] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.658758] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.659062] ^ [ 14.659249] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.659535] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.659817] ================================================================== [ 14.660690] ================================================================== [ 14.661106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.661562] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.661899] [ 14.662023] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.662074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.662087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.662106] Call Trace: [ 14.662120] <TASK> [ 14.662134] dump_stack_lvl+0x73/0xb0 [ 14.662163] print_report+0xd1/0x650 [ 14.662186] ? __virt_addr_valid+0x1db/0x2d0 [ 14.662208] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.662235] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.662258] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.662285] kasan_report+0x141/0x180 [ 14.662306] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.662338] kasan_check_range+0x10c/0x1c0 [ 14.662361] __kasan_check_write+0x18/0x20 [ 14.662381] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.662407] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.662437] ? ret_from_fork_asm+0x1a/0x30 [ 14.662460] ? kthread+0x337/0x6f0 [ 14.662482] kasan_bitops_generic+0x116/0x1c0 [ 14.662507] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.662532] ? __pfx_read_tsc+0x10/0x10 [ 14.662555] ? ktime_get_ts64+0x86/0x230 [ 14.662578] kunit_try_run_case+0x1a5/0x480 [ 14.662602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.662626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.662649] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.662673] ? __kthread_parkme+0x82/0x180 [ 14.662693] ? preempt_count_sub+0x50/0x80 [ 14.662716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.662740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.662765] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.662790] kthread+0x337/0x6f0 [ 14.662808] ? trace_preempt_on+0x20/0xc0 [ 14.662831] ? __pfx_kthread+0x10/0x10 [ 14.662851] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.662873] ? calculate_sigpending+0x7b/0xa0 [ 14.662896] ? __pfx_kthread+0x10/0x10 [ 14.662938] ret_from_fork+0x116/0x1d0 [ 14.662958] ? __pfx_kthread+0x10/0x10 [ 14.662978] ret_from_fork_asm+0x1a/0x30 [ 14.663007] </TASK> [ 14.663017] [ 14.672651] Allocated by task 278: [ 14.672828] kasan_save_stack+0x45/0x70 [ 14.673260] kasan_save_track+0x18/0x40 [ 14.673524] kasan_save_alloc_info+0x3b/0x50 [ 14.673734] __kasan_kmalloc+0xb7/0xc0 [ 14.673913] __kmalloc_cache_noprof+0x189/0x420 [ 14.674304] kasan_bitops_generic+0x92/0x1c0 [ 14.674526] kunit_try_run_case+0x1a5/0x480 [ 14.674711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.675137] kthread+0x337/0x6f0 [ 14.675291] ret_from_fork+0x116/0x1d0 [ 14.675465] ret_from_fork_asm+0x1a/0x30 [ 14.675828] [ 14.675941] The buggy address belongs to the object at ffff888101debea0 [ 14.675941] which belongs to the cache kmalloc-16 of size 16 [ 14.676561] The buggy address is located 8 bytes inside of [ 14.676561] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.677269] [ 14.677363] The buggy address belongs to the physical page: [ 14.677714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.678148] flags: 0x200000000000000(node=0|zone=2) [ 14.678460] page_type: f5(slab) [ 14.678593] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.679048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.679369] page dumped because: kasan: bad access detected [ 14.679610] [ 14.679689] Memory state around the buggy address: [ 14.679896] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.680488] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.680870] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.681282] ^ [ 14.681531] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.681935] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.682287] ================================================================== [ 14.580097] ================================================================== [ 14.580349] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.580699] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.581320] [ 14.581447] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.581489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.581502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.581521] Call Trace: [ 14.581537] <TASK> [ 14.581552] dump_stack_lvl+0x73/0xb0 [ 14.581582] print_report+0xd1/0x650 [ 14.581603] ? __virt_addr_valid+0x1db/0x2d0 [ 14.581627] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.581654] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.581678] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.581704] kasan_report+0x141/0x180 [ 14.581726] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.581757] kasan_check_range+0x10c/0x1c0 [ 14.581781] __kasan_check_write+0x18/0x20 [ 14.581801] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.581827] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.581856] ? ret_from_fork_asm+0x1a/0x30 [ 14.581879] ? kthread+0x337/0x6f0 [ 14.581902] kasan_bitops_generic+0x116/0x1c0 [ 14.581926] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.581952] ? __pfx_read_tsc+0x10/0x10 [ 14.581974] ? ktime_get_ts64+0x86/0x230 [ 14.582115] kunit_try_run_case+0x1a5/0x480 [ 14.582142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.582166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.582190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.582215] ? __kthread_parkme+0x82/0x180 [ 14.582235] ? preempt_count_sub+0x50/0x80 [ 14.582259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.582284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.582309] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.582334] kthread+0x337/0x6f0 [ 14.582353] ? trace_preempt_on+0x20/0xc0 [ 14.582376] ? __pfx_kthread+0x10/0x10 [ 14.582396] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.582418] ? calculate_sigpending+0x7b/0xa0 [ 14.582442] ? __pfx_kthread+0x10/0x10 [ 14.582463] ret_from_fork+0x116/0x1d0 [ 14.582483] ? __pfx_kthread+0x10/0x10 [ 14.582504] ret_from_fork_asm+0x1a/0x30 [ 14.582534] </TASK> [ 14.582545] [ 14.592746] Allocated by task 278: [ 14.593212] kasan_save_stack+0x45/0x70 [ 14.593382] kasan_save_track+0x18/0x40 [ 14.593730] kasan_save_alloc_info+0x3b/0x50 [ 14.594166] __kasan_kmalloc+0xb7/0xc0 [ 14.594323] __kmalloc_cache_noprof+0x189/0x420 [ 14.594731] kasan_bitops_generic+0x92/0x1c0 [ 14.595187] kunit_try_run_case+0x1a5/0x480 [ 14.595366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.595790] kthread+0x337/0x6f0 [ 14.596144] ret_from_fork+0x116/0x1d0 [ 14.596342] ret_from_fork_asm+0x1a/0x30 [ 14.596527] [ 14.596614] The buggy address belongs to the object at ffff888101debea0 [ 14.596614] which belongs to the cache kmalloc-16 of size 16 [ 14.597417] The buggy address is located 8 bytes inside of [ 14.597417] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.598151] [ 14.598389] The buggy address belongs to the physical page: [ 14.598698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.599293] flags: 0x200000000000000(node=0|zone=2) [ 14.599613] page_type: f5(slab) [ 14.599768] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.600329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.600724] page dumped because: kasan: bad access detected [ 14.601234] [ 14.601315] Memory state around the buggy address: [ 14.601697] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.602116] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.602389] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.602705] ^ [ 14.602909] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.603569] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.604166] ================================================================== [ 14.531553] ================================================================== [ 14.532536] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.533083] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.533388] [ 14.533492] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.533534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.533545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.533567] Call Trace: [ 14.533582] <TASK> [ 14.533598] dump_stack_lvl+0x73/0xb0 [ 14.533626] print_report+0xd1/0x650 [ 14.533649] ? __virt_addr_valid+0x1db/0x2d0 [ 14.533672] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.533699] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.533723] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.533750] kasan_report+0x141/0x180 [ 14.533772] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.533803] kasan_check_range+0x10c/0x1c0 [ 14.533956] __kasan_check_write+0x18/0x20 [ 14.533977] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.534004] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.534047] ? ret_from_fork_asm+0x1a/0x30 [ 14.534070] ? kthread+0x337/0x6f0 [ 14.534093] kasan_bitops_generic+0x116/0x1c0 [ 14.534118] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.534144] ? __pfx_read_tsc+0x10/0x10 [ 14.534165] ? ktime_get_ts64+0x86/0x230 [ 14.534189] kunit_try_run_case+0x1a5/0x480 [ 14.534214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.534238] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.534262] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.534286] ? __kthread_parkme+0x82/0x180 [ 14.534307] ? preempt_count_sub+0x50/0x80 [ 14.534330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.534355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.534379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.534405] kthread+0x337/0x6f0 [ 14.534424] ? trace_preempt_on+0x20/0xc0 [ 14.534448] ? __pfx_kthread+0x10/0x10 [ 14.534469] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.534491] ? calculate_sigpending+0x7b/0xa0 [ 14.534515] ? __pfx_kthread+0x10/0x10 [ 14.534536] ret_from_fork+0x116/0x1d0 [ 14.534554] ? __pfx_kthread+0x10/0x10 [ 14.534574] ret_from_fork_asm+0x1a/0x30 [ 14.534604] </TASK> [ 14.534614] [ 14.542726] Allocated by task 278: [ 14.542861] kasan_save_stack+0x45/0x70 [ 14.543314] kasan_save_track+0x18/0x40 [ 14.543638] kasan_save_alloc_info+0x3b/0x50 [ 14.543836] __kasan_kmalloc+0xb7/0xc0 [ 14.544092] __kmalloc_cache_noprof+0x189/0x420 [ 14.544289] kasan_bitops_generic+0x92/0x1c0 [ 14.544500] kunit_try_run_case+0x1a5/0x480 [ 14.544712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.545050] kthread+0x337/0x6f0 [ 14.545194] ret_from_fork+0x116/0x1d0 [ 14.545360] ret_from_fork_asm+0x1a/0x30 [ 14.545518] [ 14.545611] The buggy address belongs to the object at ffff888101debea0 [ 14.545611] which belongs to the cache kmalloc-16 of size 16 [ 14.546208] The buggy address is located 8 bytes inside of [ 14.546208] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.546567] [ 14.546639] The buggy address belongs to the physical page: [ 14.546810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.547168] flags: 0x200000000000000(node=0|zone=2) [ 14.547727] page_type: f5(slab) [ 14.547902] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.548259] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.548491] page dumped because: kasan: bad access detected [ 14.548697] [ 14.548789] Memory state around the buggy address: [ 14.549140] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.549470] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.549796] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.550245] ^ [ 14.550455] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.550734] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.551785] ================================================================== [ 14.508043] ================================================================== [ 14.508505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.508825] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.509146] [ 14.509291] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.509336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.509348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.509368] Call Trace: [ 14.509382] <TASK> [ 14.509397] dump_stack_lvl+0x73/0xb0 [ 14.509427] print_report+0xd1/0x650 [ 14.509450] ? __virt_addr_valid+0x1db/0x2d0 [ 14.509476] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.509502] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.509525] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.509553] kasan_report+0x141/0x180 [ 14.509574] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.509606] kasan_check_range+0x10c/0x1c0 [ 14.509630] __kasan_check_write+0x18/0x20 [ 14.509650] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.509676] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.509706] ? ret_from_fork_asm+0x1a/0x30 [ 14.509729] ? kthread+0x337/0x6f0 [ 14.509752] kasan_bitops_generic+0x116/0x1c0 [ 14.509777] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.509803] ? __pfx_read_tsc+0x10/0x10 [ 14.509824] ? ktime_get_ts64+0x86/0x230 [ 14.509850] kunit_try_run_case+0x1a5/0x480 [ 14.509875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.509898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.509922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.510117] ? __kthread_parkme+0x82/0x180 [ 14.510151] ? preempt_count_sub+0x50/0x80 [ 14.510177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.510202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.510228] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.510253] kthread+0x337/0x6f0 [ 14.510272] ? trace_preempt_on+0x20/0xc0 [ 14.510294] ? __pfx_kthread+0x10/0x10 [ 14.510316] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.510337] ? calculate_sigpending+0x7b/0xa0 [ 14.510361] ? __pfx_kthread+0x10/0x10 [ 14.510382] ret_from_fork+0x116/0x1d0 [ 14.510401] ? __pfx_kthread+0x10/0x10 [ 14.510421] ret_from_fork_asm+0x1a/0x30 [ 14.510452] </TASK> [ 14.510462] [ 14.518941] Allocated by task 278: [ 14.519153] kasan_save_stack+0x45/0x70 [ 14.519309] kasan_save_track+0x18/0x40 [ 14.519446] kasan_save_alloc_info+0x3b/0x50 [ 14.519597] __kasan_kmalloc+0xb7/0xc0 [ 14.519776] __kmalloc_cache_noprof+0x189/0x420 [ 14.520685] kasan_bitops_generic+0x92/0x1c0 [ 14.520851] kunit_try_run_case+0x1a5/0x480 [ 14.521331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.521620] kthread+0x337/0x6f0 [ 14.521781] ret_from_fork+0x116/0x1d0 [ 14.522295] ret_from_fork_asm+0x1a/0x30 [ 14.522491] [ 14.522586] The buggy address belongs to the object at ffff888101debea0 [ 14.522586] which belongs to the cache kmalloc-16 of size 16 [ 14.523584] The buggy address is located 8 bytes inside of [ 14.523584] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.524448] [ 14.524553] The buggy address belongs to the physical page: [ 14.524787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.525461] flags: 0x200000000000000(node=0|zone=2) [ 14.525759] page_type: f5(slab) [ 14.526198] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.526670] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.527188] page dumped because: kasan: bad access detected [ 14.527635] [ 14.527734] Memory state around the buggy address: [ 14.528127] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.528441] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.528726] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.529309] ^ [ 14.529640] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.530511] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.531102] ================================================================== [ 14.624939] ================================================================== [ 14.625304] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.625674] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.626318] [ 14.626447] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.626490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.626502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.626522] Call Trace: [ 14.626537] <TASK> [ 14.626550] dump_stack_lvl+0x73/0xb0 [ 14.626579] print_report+0xd1/0x650 [ 14.626601] ? __virt_addr_valid+0x1db/0x2d0 [ 14.626624] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.626650] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.626673] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.626699] kasan_report+0x141/0x180 [ 14.626721] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.626753] kasan_check_range+0x10c/0x1c0 [ 14.626776] __kasan_check_write+0x18/0x20 [ 14.626795] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.626832] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.626861] ? ret_from_fork_asm+0x1a/0x30 [ 14.626883] ? kthread+0x337/0x6f0 [ 14.626906] kasan_bitops_generic+0x116/0x1c0 [ 14.626938] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.626965] ? __pfx_read_tsc+0x10/0x10 [ 14.626986] ? ktime_get_ts64+0x86/0x230 [ 14.627010] kunit_try_run_case+0x1a5/0x480 [ 14.627046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.627070] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.627094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.627119] ? __kthread_parkme+0x82/0x180 [ 14.627138] ? preempt_count_sub+0x50/0x80 [ 14.627161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.627186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.627210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.627235] kthread+0x337/0x6f0 [ 14.627254] ? trace_preempt_on+0x20/0xc0 [ 14.627276] ? __pfx_kthread+0x10/0x10 [ 14.627297] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.627319] ? calculate_sigpending+0x7b/0xa0 [ 14.627342] ? __pfx_kthread+0x10/0x10 [ 14.627364] ret_from_fork+0x116/0x1d0 [ 14.627382] ? __pfx_kthread+0x10/0x10 [ 14.627403] ret_from_fork_asm+0x1a/0x30 [ 14.627432] </TASK> [ 14.627442] [ 14.634699] Allocated by task 278: [ 14.634827] kasan_save_stack+0x45/0x70 [ 14.634970] kasan_save_track+0x18/0x40 [ 14.635401] kasan_save_alloc_info+0x3b/0x50 [ 14.636127] __kasan_kmalloc+0xb7/0xc0 [ 14.636298] __kmalloc_cache_noprof+0x189/0x420 [ 14.636474] kasan_bitops_generic+0x92/0x1c0 [ 14.636625] kunit_try_run_case+0x1a5/0x480 [ 14.636832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.637124] kthread+0x337/0x6f0 [ 14.637268] ret_from_fork+0x116/0x1d0 [ 14.637422] ret_from_fork_asm+0x1a/0x30 [ 14.637618] [ 14.637714] The buggy address belongs to the object at ffff888101debea0 [ 14.637714] which belongs to the cache kmalloc-16 of size 16 [ 14.638232] The buggy address is located 8 bytes inside of [ 14.638232] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.638612] [ 14.638707] The buggy address belongs to the physical page: [ 14.638989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.639349] flags: 0x200000000000000(node=0|zone=2) [ 14.639547] page_type: f5(slab) [ 14.639713] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.640054] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.640363] page dumped because: kasan: bad access detected [ 14.640534] [ 14.640603] Memory state around the buggy address: [ 14.640827] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.641167] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.641453] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.641702] ^ [ 14.641934] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.642242] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.642495] ================================================================== [ 14.552647] ================================================================== [ 14.553212] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.553540] Write of size 8 at addr ffff888101debea8 by task kunit_try_catch/278 [ 14.554362] [ 14.554478] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.554525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.554538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.554558] Call Trace: [ 14.554571] <TASK> [ 14.554585] dump_stack_lvl+0x73/0xb0 [ 14.554615] print_report+0xd1/0x650 [ 14.554637] ? __virt_addr_valid+0x1db/0x2d0 [ 14.554659] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.554762] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.554787] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.555003] kasan_report+0x141/0x180 [ 14.555049] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.555082] kasan_check_range+0x10c/0x1c0 [ 14.555106] __kasan_check_write+0x18/0x20 [ 14.555127] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.555154] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.555183] ? ret_from_fork_asm+0x1a/0x30 [ 14.555206] ? kthread+0x337/0x6f0 [ 14.555230] kasan_bitops_generic+0x116/0x1c0 [ 14.555255] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.555281] ? __pfx_read_tsc+0x10/0x10 [ 14.555303] ? ktime_get_ts64+0x86/0x230 [ 14.555329] kunit_try_run_case+0x1a5/0x480 [ 14.555355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.555379] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.555403] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.555428] ? __kthread_parkme+0x82/0x180 [ 14.555448] ? preempt_count_sub+0x50/0x80 [ 14.555472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.555497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.555523] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.555549] kthread+0x337/0x6f0 [ 14.555569] ? trace_preempt_on+0x20/0xc0 [ 14.555592] ? __pfx_kthread+0x10/0x10 [ 14.555613] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.555635] ? calculate_sigpending+0x7b/0xa0 [ 14.555659] ? __pfx_kthread+0x10/0x10 [ 14.555681] ret_from_fork+0x116/0x1d0 [ 14.555700] ? __pfx_kthread+0x10/0x10 [ 14.555721] ret_from_fork_asm+0x1a/0x30 [ 14.555752] </TASK> [ 14.555761] [ 14.568284] Allocated by task 278: [ 14.568481] kasan_save_stack+0x45/0x70 [ 14.568633] kasan_save_track+0x18/0x40 [ 14.568770] kasan_save_alloc_info+0x3b/0x50 [ 14.568919] __kasan_kmalloc+0xb7/0xc0 [ 14.569161] __kmalloc_cache_noprof+0x189/0x420 [ 14.569393] kasan_bitops_generic+0x92/0x1c0 [ 14.569609] kunit_try_run_case+0x1a5/0x480 [ 14.569885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.570159] kthread+0x337/0x6f0 [ 14.570337] ret_from_fork+0x116/0x1d0 [ 14.570541] ret_from_fork_asm+0x1a/0x30 [ 14.570677] [ 14.570769] The buggy address belongs to the object at ffff888101debea0 [ 14.570769] which belongs to the cache kmalloc-16 of size 16 [ 14.573235] The buggy address is located 8 bytes inside of [ 14.573235] allocated 9-byte region [ffff888101debea0, ffff888101debea9) [ 14.573621] [ 14.573710] The buggy address belongs to the physical page: [ 14.574179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101deb [ 14.574542] flags: 0x200000000000000(node=0|zone=2) [ 14.574777] page_type: f5(slab) [ 14.574930] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.575928] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.576354] page dumped because: kasan: bad access detected [ 14.576554] [ 14.576625] Memory state around the buggy address: [ 14.576813] ffff888101debd80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.577225] ffff888101debe00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.577587] >ffff888101debe80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.578166] ^ [ 14.578394] ffff888101debf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.578794] ffff888101debf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.579306] ==================================================================