Date
June 17, 2025, 3:40 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.872987] ================================================================== [ 24.876131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 24.879298] kasan_report+0xdc/0x128 [ 24.881399] ret_from_fork+0x10/0x20 [ 24.884145] kunit_try_run_case+0x170/0x3f0 [ 24.887104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ac [ 24.889492] fff00000c58ac180: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.890070] ==================================================================
[ 23.325748] ================================================================== [ 23.327598] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 23.328189] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 23.328830] [ 23.329091] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.329194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.329225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.329274] Call Trace: [ 23.330481] <TASK> [ 23.330536] dump_stack_lvl+0x73/0xb0 [ 23.331935] print_report+0xd1/0x650 [ 23.332149] ? __virt_addr_valid+0x1db/0x2d0 [ 23.332223] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 23.332370] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.332453] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 23.332520] kasan_report+0x141/0x180 [ 23.332575] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 23.332640] kasan_check_range+0x10c/0x1c0 [ 23.332688] __kasan_check_write+0x18/0x20 [ 23.332737] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 23.332794] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.332881] kasan_bitops_generic+0x121/0x1c0 [ 23.332935] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.333550] ? __pfx_read_tsc+0x10/0x10 [ 23.333617] ? ktime_get_ts64+0x86/0x230 [ 23.333693] kunit_try_run_case+0x1a5/0x480 [ 23.333768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.333841] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.333910] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.333993] ? __kthread_parkme+0x82/0x180 [ 23.334061] ? preempt_count_sub+0x50/0x80 [ 23.334134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.334211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.334283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.334382] kthread+0x337/0x6f0 [ 23.334448] ? trace_preempt_on+0x20/0xc0 [ 23.334522] ? __pfx_kthread+0x10/0x10 [ 23.334581] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.334651] ? calculate_sigpending+0x7b/0xa0 [ 23.334723] ? __pfx_kthread+0x10/0x10 [ 23.334786] ret_from_fork+0x41/0x80 [ 23.334849] ? __pfx_kthread+0x10/0x10 [ 23.334902] ret_from_fork_asm+0x1a/0x30 [ 23.334984] </TASK> [ 23.335015] [ 23.356809] Allocated by task 281: [ 23.357267] kasan_save_stack+0x45/0x70 [ 23.357964] kasan_save_track+0x18/0x40 [ 23.358480] kasan_save_alloc_info+0x3b/0x50 [ 23.358811] __kasan_kmalloc+0xb7/0xc0 [ 23.359177] __kmalloc_cache_noprof+0x189/0x420 [ 23.359785] kasan_bitops_generic+0x92/0x1c0 [ 23.360572] kunit_try_run_case+0x1a5/0x480 [ 23.361045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.361605] kthread+0x337/0x6f0 [ 23.361954] ret_from_fork+0x41/0x80 [ 23.362572] ret_from_fork_asm+0x1a/0x30 [ 23.362924] [ 23.363869] The buggy address belongs to the object at ffff8881026cd0c0 [ 23.363869] which belongs to the cache kmalloc-16 of size 16 [ 23.365634] The buggy address is located 8 bytes inside of [ 23.365634] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 23.366487] [ 23.366717] The buggy address belongs to the physical page: [ 23.367156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 23.368697] flags: 0x200000000000000(node=0|zone=2) [ 23.369032] page_type: f5(slab) [ 23.369728] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.370868] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.371674] page dumped because: kasan: bad access detected [ 23.372838] [ 23.373019] Memory state around the buggy address: [ 23.373745] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.374764] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.375663] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.376246] ^ [ 23.376759] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.377549] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.378793] ================================================================== [ 23.227363] ================================================================== [ 23.229253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 23.230020] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 23.230596] [ 23.230880] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.231018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.231060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.231122] Call Trace: [ 23.231166] <TASK> [ 23.231221] dump_stack_lvl+0x73/0xb0 [ 23.231424] print_report+0xd1/0x650 [ 23.231512] ? __virt_addr_valid+0x1db/0x2d0 [ 23.231585] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 23.231663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.231743] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 23.231824] kasan_report+0x141/0x180 [ 23.231961] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 23.232045] kasan_check_range+0x10c/0x1c0 [ 23.232120] __kasan_check_write+0x18/0x20 [ 23.232194] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 23.232333] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.232437] kasan_bitops_generic+0x121/0x1c0 [ 23.232509] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.232585] ? __pfx_read_tsc+0x10/0x10 [ 23.232659] ? ktime_get_ts64+0x86/0x230 [ 23.232719] kunit_try_run_case+0x1a5/0x480 [ 23.232761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.232796] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.232833] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.232867] ? __kthread_parkme+0x82/0x180 [ 23.232900] ? preempt_count_sub+0x50/0x80 [ 23.232935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.233005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.233090] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.233135] kthread+0x337/0x6f0 [ 23.233163] ? trace_preempt_on+0x20/0xc0 [ 23.233202] ? __pfx_kthread+0x10/0x10 [ 23.233228] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.233261] ? calculate_sigpending+0x7b/0xa0 [ 23.233321] ? __pfx_kthread+0x10/0x10 [ 23.233351] ret_from_fork+0x41/0x80 [ 23.233387] ? __pfx_kthread+0x10/0x10 [ 23.233416] ret_from_fork_asm+0x1a/0x30 [ 23.233460] </TASK> [ 23.233476] [ 23.252153] Allocated by task 281: [ 23.252675] kasan_save_stack+0x45/0x70 [ 23.253387] kasan_save_track+0x18/0x40 [ 23.253835] kasan_save_alloc_info+0x3b/0x50 [ 23.254540] __kasan_kmalloc+0xb7/0xc0 [ 23.254872] __kmalloc_cache_noprof+0x189/0x420 [ 23.255406] kasan_bitops_generic+0x92/0x1c0 [ 23.255964] kunit_try_run_case+0x1a5/0x480 [ 23.256894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.257547] kthread+0x337/0x6f0 [ 23.257834] ret_from_fork+0x41/0x80 [ 23.258230] ret_from_fork_asm+0x1a/0x30 [ 23.258727] [ 23.259087] The buggy address belongs to the object at ffff8881026cd0c0 [ 23.259087] which belongs to the cache kmalloc-16 of size 16 [ 23.260469] The buggy address is located 8 bytes inside of [ 23.260469] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 23.261224] [ 23.261627] The buggy address belongs to the physical page: [ 23.262344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 23.263334] flags: 0x200000000000000(node=0|zone=2) [ 23.263717] page_type: f5(slab) [ 23.264030] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.264777] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.265814] page dumped because: kasan: bad access detected [ 23.266181] [ 23.266378] Memory state around the buggy address: [ 23.266939] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.267745] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.268876] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.269765] ^ [ 23.270485] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.271248] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.271704] ================================================================== [ 23.175890] ================================================================== [ 23.177492] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 23.178198] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 23.179681] [ 23.180370] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.180444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.180463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.180491] Call Trace: [ 23.180515] <TASK> [ 23.180540] dump_stack_lvl+0x73/0xb0 [ 23.180580] print_report+0xd1/0x650 [ 23.180616] ? __virt_addr_valid+0x1db/0x2d0 [ 23.180649] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 23.180686] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.180719] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 23.180753] kasan_report+0x141/0x180 [ 23.180786] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 23.180826] kasan_check_range+0x10c/0x1c0 [ 23.180855] __kasan_check_write+0x18/0x20 [ 23.180884] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 23.180918] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.180963] kasan_bitops_generic+0x121/0x1c0 [ 23.180993] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.181024] ? __pfx_read_tsc+0x10/0x10 [ 23.181056] ? ktime_get_ts64+0x86/0x230 [ 23.181093] kunit_try_run_case+0x1a5/0x480 [ 23.181130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.181163] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.181197] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.181230] ? __kthread_parkme+0x82/0x180 [ 23.181262] ? preempt_count_sub+0x50/0x80 [ 23.181429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.181483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.181521] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.181558] kthread+0x337/0x6f0 [ 23.181583] ? trace_preempt_on+0x20/0xc0 [ 23.181619] ? __pfx_kthread+0x10/0x10 [ 23.181645] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.181677] ? calculate_sigpending+0x7b/0xa0 [ 23.181707] ? __pfx_kthread+0x10/0x10 [ 23.181733] ret_from_fork+0x41/0x80 [ 23.181766] ? __pfx_kthread+0x10/0x10 [ 23.181792] ret_from_fork_asm+0x1a/0x30 [ 23.181836] </TASK> [ 23.181853] [ 23.204964] Allocated by task 281: [ 23.205780] kasan_save_stack+0x45/0x70 [ 23.206401] kasan_save_track+0x18/0x40 [ 23.206948] kasan_save_alloc_info+0x3b/0x50 [ 23.207686] __kasan_kmalloc+0xb7/0xc0 [ 23.208609] __kmalloc_cache_noprof+0x189/0x420 [ 23.209028] kasan_bitops_generic+0x92/0x1c0 [ 23.210034] kunit_try_run_case+0x1a5/0x480 [ 23.210514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.210939] kthread+0x337/0x6f0 [ 23.211591] ret_from_fork+0x41/0x80 [ 23.211915] ret_from_fork_asm+0x1a/0x30 [ 23.212748] [ 23.213055] The buggy address belongs to the object at ffff8881026cd0c0 [ 23.213055] which belongs to the cache kmalloc-16 of size 16 [ 23.214236] The buggy address is located 8 bytes inside of [ 23.214236] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 23.215487] [ 23.215723] The buggy address belongs to the physical page: [ 23.216242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 23.217314] flags: 0x200000000000000(node=0|zone=2) [ 23.217660] page_type: f5(slab) [ 23.218254] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.219180] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.219726] page dumped because: kasan: bad access detected [ 23.220801] [ 23.221029] Memory state around the buggy address: [ 23.221609] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.222151] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.222887] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.223579] ^ [ 23.224549] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.225442] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.226015] ================================================================== [ 23.273687] ================================================================== [ 23.274428] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 23.275311] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 23.276439] [ 23.276694] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.276870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.276911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.277253] Call Trace: [ 23.277329] <TASK> [ 23.277384] dump_stack_lvl+0x73/0xb0 [ 23.277472] print_report+0xd1/0x650 [ 23.277662] ? __virt_addr_valid+0x1db/0x2d0 [ 23.277829] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 23.277930] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.278032] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 23.278214] kasan_report+0x141/0x180 [ 23.278257] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 23.278338] kasan_check_range+0x10c/0x1c0 [ 23.278414] __kasan_check_write+0x18/0x20 [ 23.278489] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 23.278569] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.278689] kasan_bitops_generic+0x121/0x1c0 [ 23.278792] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.278867] ? __pfx_read_tsc+0x10/0x10 [ 23.278939] ? ktime_get_ts64+0x86/0x230 [ 23.279020] kunit_try_run_case+0x1a5/0x480 [ 23.279112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.279156] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.279195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.279231] ? __kthread_parkme+0x82/0x180 [ 23.279264] ? preempt_count_sub+0x50/0x80 [ 23.279326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.279367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.279402] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.279437] kthread+0x337/0x6f0 [ 23.279461] ? trace_preempt_on+0x20/0xc0 [ 23.279496] ? __pfx_kthread+0x10/0x10 [ 23.279521] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.279553] ? calculate_sigpending+0x7b/0xa0 [ 23.279583] ? __pfx_kthread+0x10/0x10 [ 23.279607] ret_from_fork+0x41/0x80 [ 23.279639] ? __pfx_kthread+0x10/0x10 [ 23.279664] ret_from_fork_asm+0x1a/0x30 [ 23.279708] </TASK> [ 23.279725] [ 23.302174] Allocated by task 281: [ 23.302589] kasan_save_stack+0x45/0x70 [ 23.303330] kasan_save_track+0x18/0x40 [ 23.303862] kasan_save_alloc_info+0x3b/0x50 [ 23.304709] __kasan_kmalloc+0xb7/0xc0 [ 23.305052] __kmalloc_cache_noprof+0x189/0x420 [ 23.305566] kasan_bitops_generic+0x92/0x1c0 [ 23.306015] kunit_try_run_case+0x1a5/0x480 [ 23.306574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.307393] kthread+0x337/0x6f0 [ 23.307934] ret_from_fork+0x41/0x80 [ 23.308718] ret_from_fork_asm+0x1a/0x30 [ 23.309432] [ 23.309620] The buggy address belongs to the object at ffff8881026cd0c0 [ 23.309620] which belongs to the cache kmalloc-16 of size 16 [ 23.310923] The buggy address is located 8 bytes inside of [ 23.310923] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 23.312674] [ 23.312994] The buggy address belongs to the physical page: [ 23.313618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 23.314407] flags: 0x200000000000000(node=0|zone=2) [ 23.314871] page_type: f5(slab) [ 23.315336] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.316101] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.317505] page dumped because: kasan: bad access detected [ 23.318667] [ 23.319124] Memory state around the buggy address: [ 23.319574] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.319825] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.320611] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.322171] ^ [ 23.322727] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.323626] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.324838] ================================================================== [ 23.426489] ================================================================== [ 23.427336] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 23.428174] Read of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 23.429238] [ 23.429482] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.429601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.429636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.429694] Call Trace: [ 23.429744] <TASK> [ 23.429794] dump_stack_lvl+0x73/0xb0 [ 23.429838] print_report+0xd1/0x650 [ 23.429875] ? __virt_addr_valid+0x1db/0x2d0 [ 23.429910] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 23.429972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.430054] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 23.430977] kasan_report+0x141/0x180 [ 23.431075] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 23.431171] __asan_report_load8_noabort+0x18/0x20 [ 23.431245] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 23.431345] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.431447] kasan_bitops_generic+0x121/0x1c0 [ 23.431517] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.431587] ? __pfx_read_tsc+0x10/0x10 [ 23.431658] ? ktime_get_ts64+0x86/0x230 [ 23.431736] kunit_try_run_case+0x1a5/0x480 [ 23.431818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.431902] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.431987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.432108] ? __kthread_parkme+0x82/0x180 [ 23.432147] ? preempt_count_sub+0x50/0x80 [ 23.432187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.432226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.432264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.432324] kthread+0x337/0x6f0 [ 23.432357] ? trace_preempt_on+0x20/0xc0 [ 23.432396] ? __pfx_kthread+0x10/0x10 [ 23.432423] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.432455] ? calculate_sigpending+0x7b/0xa0 [ 23.432489] ? __pfx_kthread+0x10/0x10 [ 23.432518] ret_from_fork+0x41/0x80 [ 23.432552] ? __pfx_kthread+0x10/0x10 [ 23.432580] ret_from_fork_asm+0x1a/0x30 [ 23.432627] </TASK> [ 23.432642] [ 23.455375] Allocated by task 281: [ 23.455823] kasan_save_stack+0x45/0x70 [ 23.456432] kasan_save_track+0x18/0x40 [ 23.456853] kasan_save_alloc_info+0x3b/0x50 [ 23.457237] __kasan_kmalloc+0xb7/0xc0 [ 23.457612] __kmalloc_cache_noprof+0x189/0x420 [ 23.458018] kasan_bitops_generic+0x92/0x1c0 [ 23.458553] kunit_try_run_case+0x1a5/0x480 [ 23.458993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.459428] kthread+0x337/0x6f0 [ 23.459936] ret_from_fork+0x41/0x80 [ 23.460510] ret_from_fork_asm+0x1a/0x30 [ 23.460918] [ 23.461493] The buggy address belongs to the object at ffff8881026cd0c0 [ 23.461493] which belongs to the cache kmalloc-16 of size 16 [ 23.462479] The buggy address is located 8 bytes inside of [ 23.462479] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 23.463937] [ 23.464254] The buggy address belongs to the physical page: [ 23.464884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 23.465721] flags: 0x200000000000000(node=0|zone=2) [ 23.466338] page_type: f5(slab) [ 23.466735] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.467660] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.468191] page dumped because: kasan: bad access detected [ 23.468818] [ 23.469338] Memory state around the buggy address: [ 23.470162] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.470705] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.471564] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.472354] ^ [ 23.472931] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.473538] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.474283] ================================================================== [ 23.379856] ================================================================== [ 23.380539] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 23.381370] Read of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 23.382127] [ 23.382381] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.382527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.382569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.382686] Call Trace: [ 23.382738] <TASK> [ 23.382789] dump_stack_lvl+0x73/0xb0 [ 23.382868] print_report+0xd1/0x650 [ 23.382981] ? __virt_addr_valid+0x1db/0x2d0 [ 23.383106] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 23.383246] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.383349] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 23.383493] kasan_report+0x141/0x180 [ 23.383576] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 23.383669] kasan_check_range+0x10c/0x1c0 [ 23.383732] __kasan_check_read+0x15/0x20 [ 23.383767] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 23.383804] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.383868] kasan_bitops_generic+0x121/0x1c0 [ 23.384000] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.384125] ? __pfx_read_tsc+0x10/0x10 [ 23.384251] ? ktime_get_ts64+0x86/0x230 [ 23.384359] kunit_try_run_case+0x1a5/0x480 [ 23.384450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.384520] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.384653] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.384726] ? __kthread_parkme+0x82/0x180 [ 23.384765] ? preempt_count_sub+0x50/0x80 [ 23.384802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.384838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.384873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.384908] kthread+0x337/0x6f0 [ 23.384934] ? trace_preempt_on+0x20/0xc0 [ 23.385026] ? __pfx_kthread+0x10/0x10 [ 23.385099] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.385173] ? calculate_sigpending+0x7b/0xa0 [ 23.385247] ? __pfx_kthread+0x10/0x10 [ 23.385331] ret_from_fork+0x41/0x80 [ 23.385427] ? __pfx_kthread+0x10/0x10 [ 23.385535] ret_from_fork_asm+0x1a/0x30 [ 23.385587] </TASK> [ 23.385603] [ 23.404015] Allocated by task 281: [ 23.404481] kasan_save_stack+0x45/0x70 [ 23.404917] kasan_save_track+0x18/0x40 [ 23.405685] kasan_save_alloc_info+0x3b/0x50 [ 23.406492] __kasan_kmalloc+0xb7/0xc0 [ 23.406868] __kmalloc_cache_noprof+0x189/0x420 [ 23.407815] kasan_bitops_generic+0x92/0x1c0 [ 23.408702] kunit_try_run_case+0x1a5/0x480 [ 23.410362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.411011] kthread+0x337/0x6f0 [ 23.411397] ret_from_fork+0x41/0x80 [ 23.411912] ret_from_fork_asm+0x1a/0x30 [ 23.412795] [ 23.413188] The buggy address belongs to the object at ffff8881026cd0c0 [ 23.413188] which belongs to the cache kmalloc-16 of size 16 [ 23.414752] The buggy address is located 8 bytes inside of [ 23.414752] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 23.416205] [ 23.416464] The buggy address belongs to the physical page: [ 23.416969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 23.417667] flags: 0x200000000000000(node=0|zone=2) [ 23.418155] page_type: f5(slab) [ 23.418598] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.419338] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.420212] page dumped because: kasan: bad access detected [ 23.420815] [ 23.421162] Memory state around the buggy address: [ 23.421680] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.422310] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.422911] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.423562] ^ [ 23.424186] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.424757] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.425415] ================================================================== [ 23.080864] ================================================================== [ 23.081866] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 23.082855] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 23.083720] [ 23.084334] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.084450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.084490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.084546] Call Trace: [ 23.084603] <TASK> [ 23.084659] dump_stack_lvl+0x73/0xb0 [ 23.084751] print_report+0xd1/0x650 [ 23.084834] ? __virt_addr_valid+0x1db/0x2d0 [ 23.084910] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 23.085462] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.085547] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 23.085629] kasan_report+0x141/0x180 [ 23.085708] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 23.085790] kasan_check_range+0x10c/0x1c0 [ 23.085827] __kasan_check_write+0x18/0x20 [ 23.085861] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 23.085901] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.085973] kasan_bitops_generic+0x121/0x1c0 [ 23.086043] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.086104] ? __pfx_read_tsc+0x10/0x10 [ 23.086140] ? ktime_get_ts64+0x86/0x230 [ 23.086181] kunit_try_run_case+0x1a5/0x480 [ 23.086222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.086257] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.086323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.086421] ? __kthread_parkme+0x82/0x180 [ 23.086498] ? preempt_count_sub+0x50/0x80 [ 23.086559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.086599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.086636] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.086672] kthread+0x337/0x6f0 [ 23.086698] ? trace_preempt_on+0x20/0xc0 [ 23.086736] ? __pfx_kthread+0x10/0x10 [ 23.086763] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.086796] ? calculate_sigpending+0x7b/0xa0 [ 23.086830] ? __pfx_kthread+0x10/0x10 [ 23.086858] ret_from_fork+0x41/0x80 [ 23.086893] ? __pfx_kthread+0x10/0x10 [ 23.086922] ret_from_fork_asm+0x1a/0x30 [ 23.087018] </TASK> [ 23.087063] [ 23.107476] Allocated by task 281: [ 23.107769] kasan_save_stack+0x45/0x70 [ 23.108602] kasan_save_track+0x18/0x40 [ 23.108893] kasan_save_alloc_info+0x3b/0x50 [ 23.109519] __kasan_kmalloc+0xb7/0xc0 [ 23.109922] __kmalloc_cache_noprof+0x189/0x420 [ 23.110500] kasan_bitops_generic+0x92/0x1c0 [ 23.110948] kunit_try_run_case+0x1a5/0x480 [ 23.112095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.112564] kthread+0x337/0x6f0 [ 23.112908] ret_from_fork+0x41/0x80 [ 23.113392] ret_from_fork_asm+0x1a/0x30 [ 23.113841] [ 23.114182] The buggy address belongs to the object at ffff8881026cd0c0 [ 23.114182] which belongs to the cache kmalloc-16 of size 16 [ 23.115332] The buggy address is located 8 bytes inside of [ 23.115332] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 23.116189] [ 23.116599] The buggy address belongs to the physical page: [ 23.117304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 23.117900] flags: 0x200000000000000(node=0|zone=2) [ 23.118370] page_type: f5(slab) [ 23.118876] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.119976] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.120802] page dumped because: kasan: bad access detected [ 23.121624] [ 23.121872] Memory state around the buggy address: [ 23.122443] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.123096] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.124494] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.125097] ^ [ 23.125594] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.126221] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.126849] ================================================================== [ 23.128597] ================================================================== [ 23.129122] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 23.129695] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 23.130506] [ 23.130961] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.131376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.131413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.131476] Call Trace: [ 23.131527] <TASK> [ 23.131577] dump_stack_lvl+0x73/0xb0 [ 23.131664] print_report+0xd1/0x650 [ 23.131746] ? __virt_addr_valid+0x1db/0x2d0 [ 23.131820] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 23.131907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.132088] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 23.132176] kasan_report+0x141/0x180 [ 23.132261] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 23.132370] kasan_check_range+0x10c/0x1c0 [ 23.132446] __kasan_check_write+0x18/0x20 [ 23.132521] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 23.132602] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.132707] kasan_bitops_generic+0x121/0x1c0 [ 23.132783] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.132833] ? __pfx_read_tsc+0x10/0x10 [ 23.132909] ? ktime_get_ts64+0x86/0x230 [ 23.133091] kunit_try_run_case+0x1a5/0x480 [ 23.133188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.133264] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.133367] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.133447] ? __kthread_parkme+0x82/0x180 [ 23.133525] ? preempt_count_sub+0x50/0x80 [ 23.133615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.133695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.133763] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.133805] kthread+0x337/0x6f0 [ 23.133833] ? trace_preempt_on+0x20/0xc0 [ 23.133873] ? __pfx_kthread+0x10/0x10 [ 23.133901] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.133935] ? calculate_sigpending+0x7b/0xa0 [ 23.134079] ? __pfx_kthread+0x10/0x10 [ 23.134115] ret_from_fork+0x41/0x80 [ 23.134151] ? __pfx_kthread+0x10/0x10 [ 23.134182] ret_from_fork_asm+0x1a/0x30 [ 23.134229] </TASK> [ 23.134245] [ 23.152083] Allocated by task 281: [ 23.152451] kasan_save_stack+0x45/0x70 [ 23.153804] kasan_save_track+0x18/0x40 [ 23.154580] kasan_save_alloc_info+0x3b/0x50 [ 23.155106] __kasan_kmalloc+0xb7/0xc0 [ 23.155543] __kmalloc_cache_noprof+0x189/0x420 [ 23.155963] kasan_bitops_generic+0x92/0x1c0 [ 23.156782] kunit_try_run_case+0x1a5/0x480 [ 23.157397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.157873] kthread+0x337/0x6f0 [ 23.158551] ret_from_fork+0x41/0x80 [ 23.158957] ret_from_fork_asm+0x1a/0x30 [ 23.159333] [ 23.159523] The buggy address belongs to the object at ffff8881026cd0c0 [ 23.159523] which belongs to the cache kmalloc-16 of size 16 [ 23.161273] The buggy address is located 8 bytes inside of [ 23.161273] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 23.162499] [ 23.162687] The buggy address belongs to the physical page: [ 23.163076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 23.163761] flags: 0x200000000000000(node=0|zone=2) [ 23.164752] page_type: f5(slab) [ 23.165283] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.165817] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.166607] page dumped because: kasan: bad access detected [ 23.167229] [ 23.168099] Memory state around the buggy address: [ 23.168543] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.169133] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.171377] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.172257] ^ [ 23.172722] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.173569] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.174885] ================================================================== [ 23.022753] ================================================================== [ 23.023755] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 23.024666] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 23.025183] [ 23.026138] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 23.026270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.026328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.026389] Call Trace: [ 23.026431] <TASK> [ 23.026469] dump_stack_lvl+0x73/0xb0 [ 23.026511] print_report+0xd1/0x650 [ 23.026550] ? __virt_addr_valid+0x1db/0x2d0 [ 23.026585] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 23.026621] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.026658] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 23.026695] kasan_report+0x141/0x180 [ 23.026730] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 23.026774] kasan_check_range+0x10c/0x1c0 [ 23.026805] __kasan_check_write+0x18/0x20 [ 23.026835] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 23.026871] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 23.026917] kasan_bitops_generic+0x121/0x1c0 [ 23.026958] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.027037] ? __pfx_read_tsc+0x10/0x10 [ 23.027148] ? ktime_get_ts64+0x86/0x230 [ 23.027203] kunit_try_run_case+0x1a5/0x480 [ 23.027244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.027279] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.027345] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.027383] ? __kthread_parkme+0x82/0x180 [ 23.027418] ? preempt_count_sub+0x50/0x80 [ 23.027456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.027493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.027528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.027564] kthread+0x337/0x6f0 [ 23.027590] ? trace_preempt_on+0x20/0xc0 [ 23.027627] ? __pfx_kthread+0x10/0x10 [ 23.027654] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.027687] ? calculate_sigpending+0x7b/0xa0 [ 23.027720] ? __pfx_kthread+0x10/0x10 [ 23.027748] ret_from_fork+0x41/0x80 [ 23.027781] ? __pfx_kthread+0x10/0x10 [ 23.027808] ret_from_fork_asm+0x1a/0x30 [ 23.027853] </TASK> [ 23.027870] [ 23.052146] Allocated by task 281: [ 23.052585] kasan_save_stack+0x45/0x70 [ 23.052974] kasan_save_track+0x18/0x40 [ 23.054602] kasan_save_alloc_info+0x3b/0x50 [ 23.054952] __kasan_kmalloc+0xb7/0xc0 [ 23.055635] __kmalloc_cache_noprof+0x189/0x420 [ 23.056008] kasan_bitops_generic+0x92/0x1c0 [ 23.056819] kunit_try_run_case+0x1a5/0x480 [ 23.057587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.058011] kthread+0x337/0x6f0 [ 23.058814] ret_from_fork+0x41/0x80 [ 23.059779] ret_from_fork_asm+0x1a/0x30 [ 23.060177] [ 23.061487] The buggy address belongs to the object at ffff8881026cd0c0 [ 23.061487] which belongs to the cache kmalloc-16 of size 16 [ 23.062654] The buggy address is located 8 bytes inside of [ 23.062654] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 23.063806] [ 23.063969] The buggy address belongs to the physical page: [ 23.064261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 23.066707] flags: 0x200000000000000(node=0|zone=2) [ 23.067631] page_type: f5(slab) [ 23.067913] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.070959] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.071659] page dumped because: kasan: bad access detected [ 23.072086] [ 23.072230] Memory state around the buggy address: [ 23.074532] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.074917] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.076567] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.077541] ^ [ 23.077998] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.078881] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.079600] ==================================================================