Date
June 23, 2025, 1:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 28.181735] ================================================================== [ 28.182061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 28.182419] Write of size 8 at addr fff00000c5e9de08 by task kunit_try_catch/263 [ 28.182600] [ 28.182700] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.183214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.183679] Hardware name: linux,dummy-virt (DT) [ 28.183852] Call trace: [ 28.183942] show_stack+0x20/0x38 (C) [ 28.184562] dump_stack_lvl+0x8c/0xd0 [ 28.185134] print_report+0x118/0x608 [ 28.185271] kasan_report+0xdc/0x128 [ 28.185836] kasan_check_range+0x100/0x1a8 [ 28.186048] __kasan_check_write+0x20/0x30 [ 28.186198] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 28.186493] kasan_bitops_generic+0x110/0x1c8 [ 28.186647] kunit_try_run_case+0x170/0x3f0 [ 28.186791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.187024] kthread+0x328/0x630 [ 28.187153] ret_from_fork+0x10/0x20 [ 28.187268] [ 28.187321] Allocated by task 263: [ 28.187536] kasan_save_stack+0x3c/0x68 [ 28.187637] kasan_save_track+0x20/0x40 [ 28.187887] kasan_save_alloc_info+0x40/0x58 [ 28.188159] __kasan_kmalloc+0xd4/0xd8 [ 28.188585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.188818] kasan_bitops_generic+0xa0/0x1c8 [ 28.188947] kunit_try_run_case+0x170/0x3f0 [ 28.189773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.190034] kthread+0x328/0x630 [ 28.190163] ret_from_fork+0x10/0x20 [ 28.190463] [ 28.190545] The buggy address belongs to the object at fff00000c5e9de00 [ 28.190545] which belongs to the cache kmalloc-16 of size 16 [ 28.190747] The buggy address is located 8 bytes inside of [ 28.190747] allocated 9-byte region [fff00000c5e9de00, fff00000c5e9de09) [ 28.190899] [ 28.190957] The buggy address belongs to the physical page: [ 28.191999] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.196763] [ 28.196964] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 28.197696] dump_stack_lvl+0x8c/0xd0 [ 28.200372] kasan_save_track+0x20/0x40 [ 28.202324] The buggy address is located 8 bytes inside of [ 28.202324] allocated 9-byte region [fff00000c5e9de00, fff00000c5e9de09) [ 28.204471] page dumped because: kasan: bad access detected [ 28.205623] >fff00000c5e9de00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.210076] print_report+0x118/0x608 [ 28.213020] __kasan_kmalloc+0xd4/0xd8 [ 28.214772] [ 28.216241] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.217416] >fff00000c5e9de00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.218327] ==================================================================
[ 20.314502] ================================================================== [ 20.315720] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 20.316660] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.318554] [ 20.319179] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.319326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.319387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.319466] Call Trace: [ 20.319507] <TASK> [ 20.319554] dump_stack_lvl+0x73/0xb0 [ 20.319670] print_report+0xd1/0x650 [ 20.319754] ? __virt_addr_valid+0x1db/0x2d0 [ 20.319792] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 20.319824] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.319859] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 20.319892] kasan_report+0x141/0x180 [ 20.319927] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 20.319966] kasan_check_range+0x10c/0x1c0 [ 20.319996] __kasan_check_write+0x18/0x20 [ 20.320024] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 20.320056] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.320089] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.320120] ? trace_hardirqs_on+0x37/0xe0 [ 20.320155] ? kasan_bitops_generic+0x92/0x1c0 [ 20.320191] kasan_bitops_generic+0x116/0x1c0 [ 20.320229] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.320282] ? __pfx_read_tsc+0x10/0x10 [ 20.320315] ? ktime_get_ts64+0x86/0x230 [ 20.320353] kunit_try_run_case+0x1a5/0x480 [ 20.320389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.320422] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.320457] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.320492] ? __kthread_parkme+0x82/0x180 [ 20.320525] ? preempt_count_sub+0x50/0x80 [ 20.320564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.320618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.320701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.320785] kthread+0x337/0x6f0 [ 20.320855] ? trace_preempt_on+0x20/0xc0 [ 20.320915] ? __pfx_kthread+0x10/0x10 [ 20.320942] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.320974] ? calculate_sigpending+0x7b/0xa0 [ 20.321007] ? __pfx_kthread+0x10/0x10 [ 20.321032] ret_from_fork+0x41/0x80 [ 20.321063] ? __pfx_kthread+0x10/0x10 [ 20.321090] ret_from_fork_asm+0x1a/0x30 [ 20.321133] </TASK> [ 20.321148] [ 20.341557] Allocated by task 282: [ 20.342333] kasan_save_stack+0x45/0x70 [ 20.342769] kasan_save_track+0x18/0x40 [ 20.343194] kasan_save_alloc_info+0x3b/0x50 [ 20.344039] __kasan_kmalloc+0xb7/0xc0 [ 20.344498] __kmalloc_cache_noprof+0x189/0x420 [ 20.345401] kasan_bitops_generic+0x92/0x1c0 [ 20.346117] kunit_try_run_case+0x1a5/0x480 [ 20.346594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.347238] kthread+0x337/0x6f0 [ 20.347583] ret_from_fork+0x41/0x80 [ 20.348371] ret_from_fork_asm+0x1a/0x30 [ 20.348911] [ 20.349124] The buggy address belongs to the object at ffff8881025ebc60 [ 20.349124] which belongs to the cache kmalloc-16 of size 16 [ 20.350068] The buggy address is located 8 bytes inside of [ 20.350068] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.351191] [ 20.351581] The buggy address belongs to the physical page: [ 20.352407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.353200] flags: 0x200000000000000(node=0|zone=2) [ 20.353781] page_type: f5(slab) [ 20.354212] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.355008] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.356435] page dumped because: kasan: bad access detected [ 20.356913] [ 20.357257] Memory state around the buggy address: [ 20.357838] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.358407] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.359176] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.359760] ^ [ 20.360468] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.361581] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.362565] ================================================================== [ 20.364082] ================================================================== [ 20.364579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 20.365181] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.365762] [ 20.365988] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.366166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.366208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.366263] Call Trace: [ 20.366297] <TASK> [ 20.366331] dump_stack_lvl+0x73/0xb0 [ 20.366394] print_report+0xd1/0x650 [ 20.366454] ? __virt_addr_valid+0x1db/0x2d0 [ 20.366513] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 20.366575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.366661] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 20.366903] kasan_report+0x141/0x180 [ 20.366991] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 20.367078] kasan_check_range+0x10c/0x1c0 [ 20.367158] __kasan_check_write+0x18/0x20 [ 20.367409] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 20.367496] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.367579] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.367669] ? trace_hardirqs_on+0x37/0xe0 [ 20.367745] ? kasan_bitops_generic+0x92/0x1c0 [ 20.367871] kasan_bitops_generic+0x116/0x1c0 [ 20.367946] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.368020] ? __pfx_read_tsc+0x10/0x10 [ 20.368086] ? ktime_get_ts64+0x86/0x230 [ 20.368173] kunit_try_run_case+0x1a5/0x480 [ 20.368258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.368324] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.368364] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.368402] ? __kthread_parkme+0x82/0x180 [ 20.368434] ? preempt_count_sub+0x50/0x80 [ 20.368470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.368504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.368538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.368572] kthread+0x337/0x6f0 [ 20.368596] ? trace_preempt_on+0x20/0xc0 [ 20.368691] ? __pfx_kthread+0x10/0x10 [ 20.368750] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.368784] ? calculate_sigpending+0x7b/0xa0 [ 20.368816] ? __pfx_kthread+0x10/0x10 [ 20.368842] ret_from_fork+0x41/0x80 [ 20.368874] ? __pfx_kthread+0x10/0x10 [ 20.368899] ret_from_fork_asm+0x1a/0x30 [ 20.368941] </TASK> [ 20.368954] [ 20.388572] Allocated by task 282: [ 20.389126] kasan_save_stack+0x45/0x70 [ 20.391196] kasan_save_track+0x18/0x40 [ 20.392172] kasan_save_alloc_info+0x3b/0x50 [ 20.392563] __kasan_kmalloc+0xb7/0xc0 [ 20.393187] __kmalloc_cache_noprof+0x189/0x420 [ 20.394035] kasan_bitops_generic+0x92/0x1c0 [ 20.394828] kunit_try_run_case+0x1a5/0x480 [ 20.395301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.395858] kthread+0x337/0x6f0 [ 20.396217] ret_from_fork+0x41/0x80 [ 20.396598] ret_from_fork_asm+0x1a/0x30 [ 20.396975] [ 20.397156] The buggy address belongs to the object at ffff8881025ebc60 [ 20.397156] which belongs to the cache kmalloc-16 of size 16 [ 20.398348] The buggy address is located 8 bytes inside of [ 20.398348] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.399736] [ 20.399967] The buggy address belongs to the physical page: [ 20.400822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.402177] flags: 0x200000000000000(node=0|zone=2) [ 20.402575] page_type: f5(slab) [ 20.403798] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.404652] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.405944] page dumped because: kasan: bad access detected [ 20.406516] [ 20.407053] Memory state around the buggy address: [ 20.407373] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.408075] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.408689] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.409454] ^ [ 20.410187] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.411258] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.411788] ================================================================== [ 20.413103] ================================================================== [ 20.413762] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 20.415008] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.415543] [ 20.415775] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.416001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.416043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.416097] Call Trace: [ 20.416148] <TASK> [ 20.416197] dump_stack_lvl+0x73/0xb0 [ 20.416275] print_report+0xd1/0x650 [ 20.416352] ? __virt_addr_valid+0x1db/0x2d0 [ 20.416428] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 20.416526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.416726] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 20.416810] kasan_report+0x141/0x180 [ 20.416884] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 20.416966] kasan_check_range+0x10c/0x1c0 [ 20.417034] __kasan_check_write+0x18/0x20 [ 20.417102] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 20.417177] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.417266] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.417342] ? trace_hardirqs_on+0x37/0xe0 [ 20.417418] ? kasan_bitops_generic+0x92/0x1c0 [ 20.417496] kasan_bitops_generic+0x116/0x1c0 [ 20.417567] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.417661] ? __pfx_read_tsc+0x10/0x10 [ 20.417730] ? ktime_get_ts64+0x86/0x230 [ 20.417822] kunit_try_run_case+0x1a5/0x480 [ 20.417905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.417986] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.418066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.418105] ? __kthread_parkme+0x82/0x180 [ 20.418138] ? preempt_count_sub+0x50/0x80 [ 20.418176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.418215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.418279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.418316] kthread+0x337/0x6f0 [ 20.418340] ? trace_preempt_on+0x20/0xc0 [ 20.418372] ? __pfx_kthread+0x10/0x10 [ 20.418397] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.418427] ? calculate_sigpending+0x7b/0xa0 [ 20.418457] ? __pfx_kthread+0x10/0x10 [ 20.418481] ret_from_fork+0x41/0x80 [ 20.418512] ? __pfx_kthread+0x10/0x10 [ 20.418539] ret_from_fork_asm+0x1a/0x30 [ 20.418581] </TASK> [ 20.418597] [ 20.439353] Allocated by task 282: [ 20.440019] kasan_save_stack+0x45/0x70 [ 20.440928] kasan_save_track+0x18/0x40 [ 20.441379] kasan_save_alloc_info+0x3b/0x50 [ 20.442039] __kasan_kmalloc+0xb7/0xc0 [ 20.442552] __kmalloc_cache_noprof+0x189/0x420 [ 20.443236] kasan_bitops_generic+0x92/0x1c0 [ 20.443793] kunit_try_run_case+0x1a5/0x480 [ 20.444157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.445124] kthread+0x337/0x6f0 [ 20.445541] ret_from_fork+0x41/0x80 [ 20.446119] ret_from_fork_asm+0x1a/0x30 [ 20.446857] [ 20.447104] The buggy address belongs to the object at ffff8881025ebc60 [ 20.447104] which belongs to the cache kmalloc-16 of size 16 [ 20.447995] The buggy address is located 8 bytes inside of [ 20.447995] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.449021] [ 20.449652] The buggy address belongs to the physical page: [ 20.450207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.451254] flags: 0x200000000000000(node=0|zone=2) [ 20.451995] page_type: f5(slab) [ 20.452466] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.453549] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.454370] page dumped because: kasan: bad access detected [ 20.455025] [ 20.455413] Memory state around the buggy address: [ 20.456099] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.456864] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.457508] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.458499] ^ [ 20.459104] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.459768] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.460362] ================================================================== [ 20.512715] ================================================================== [ 20.513192] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 20.514155] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.515569] [ 20.515805] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.515925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.515963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.516018] Call Trace: [ 20.516165] <TASK> [ 20.516220] dump_stack_lvl+0x73/0xb0 [ 20.516376] print_report+0xd1/0x650 [ 20.516510] ? __virt_addr_valid+0x1db/0x2d0 [ 20.516781] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 20.516861] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.516935] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 20.517007] kasan_report+0x141/0x180 [ 20.517077] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 20.517122] kasan_check_range+0x10c/0x1c0 [ 20.517154] __kasan_check_write+0x18/0x20 [ 20.517184] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 20.517262] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.517323] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.517355] ? trace_hardirqs_on+0x37/0xe0 [ 20.517390] ? kasan_bitops_generic+0x92/0x1c0 [ 20.517425] kasan_bitops_generic+0x116/0x1c0 [ 20.517454] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.517486] ? __pfx_read_tsc+0x10/0x10 [ 20.517514] ? ktime_get_ts64+0x86/0x230 [ 20.517548] kunit_try_run_case+0x1a5/0x480 [ 20.517585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.517688] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.517767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.517807] ? __kthread_parkme+0x82/0x180 [ 20.517839] ? preempt_count_sub+0x50/0x80 [ 20.517877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.517914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.517950] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.517986] kthread+0x337/0x6f0 [ 20.518011] ? trace_preempt_on+0x20/0xc0 [ 20.518044] ? __pfx_kthread+0x10/0x10 [ 20.518069] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.518102] ? calculate_sigpending+0x7b/0xa0 [ 20.518133] ? __pfx_kthread+0x10/0x10 [ 20.518159] ret_from_fork+0x41/0x80 [ 20.518188] ? __pfx_kthread+0x10/0x10 [ 20.518238] ret_from_fork_asm+0x1a/0x30 [ 20.518300] </TASK> [ 20.518315] [ 20.542116] Allocated by task 282: [ 20.542598] kasan_save_stack+0x45/0x70 [ 20.543002] kasan_save_track+0x18/0x40 [ 20.543531] kasan_save_alloc_info+0x3b/0x50 [ 20.543894] __kasan_kmalloc+0xb7/0xc0 [ 20.544268] __kmalloc_cache_noprof+0x189/0x420 [ 20.544745] kasan_bitops_generic+0x92/0x1c0 [ 20.545168] kunit_try_run_case+0x1a5/0x480 [ 20.545955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.546999] kthread+0x337/0x6f0 [ 20.547740] ret_from_fork+0x41/0x80 [ 20.548114] ret_from_fork_asm+0x1a/0x30 [ 20.548529] [ 20.548898] The buggy address belongs to the object at ffff8881025ebc60 [ 20.548898] which belongs to the cache kmalloc-16 of size 16 [ 20.550141] The buggy address is located 8 bytes inside of [ 20.550141] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.551185] [ 20.551454] The buggy address belongs to the physical page: [ 20.551945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.552575] flags: 0x200000000000000(node=0|zone=2) [ 20.553898] page_type: f5(slab) [ 20.554188] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.555470] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.556172] page dumped because: kasan: bad access detected [ 20.556916] [ 20.557262] Memory state around the buggy address: [ 20.557993] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.558892] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.559688] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.560342] ^ [ 20.561158] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.561874] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.562932] ================================================================== [ 20.650249] ================================================================== [ 20.651039] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 20.651594] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.652288] [ 20.652556] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.652844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.652881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.652935] Call Trace: [ 20.652983] <TASK> [ 20.653026] dump_stack_lvl+0x73/0xb0 [ 20.653099] print_report+0xd1/0x650 [ 20.653172] ? __virt_addr_valid+0x1db/0x2d0 [ 20.653289] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 20.653357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.653431] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 20.653502] kasan_report+0x141/0x180 [ 20.653575] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 20.653805] kasan_check_range+0x10c/0x1c0 [ 20.653902] __kasan_check_write+0x18/0x20 [ 20.654004] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 20.654131] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.654270] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.654348] ? trace_hardirqs_on+0x37/0xe0 [ 20.654420] ? kasan_bitops_generic+0x92/0x1c0 [ 20.654496] kasan_bitops_generic+0x116/0x1c0 [ 20.654567] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.654997] ? __pfx_read_tsc+0x10/0x10 [ 20.655114] ? ktime_get_ts64+0x86/0x230 [ 20.655196] kunit_try_run_case+0x1a5/0x480 [ 20.655293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.655352] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.655406] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.655459] ? __kthread_parkme+0x82/0x180 [ 20.655509] ? preempt_count_sub+0x50/0x80 [ 20.655565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.655743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.655803] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.655855] kthread+0x337/0x6f0 [ 20.655892] ? trace_preempt_on+0x20/0xc0 [ 20.655942] ? __pfx_kthread+0x10/0x10 [ 20.655982] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.656029] ? calculate_sigpending+0x7b/0xa0 [ 20.656076] ? __pfx_kthread+0x10/0x10 [ 20.656116] ret_from_fork+0x41/0x80 [ 20.656161] ? __pfx_kthread+0x10/0x10 [ 20.656200] ret_from_fork_asm+0x1a/0x30 [ 20.656307] </TASK> [ 20.656331] [ 20.682158] Allocated by task 282: [ 20.682595] kasan_save_stack+0x45/0x70 [ 20.683477] kasan_save_track+0x18/0x40 [ 20.683847] kasan_save_alloc_info+0x3b/0x50 [ 20.684848] __kasan_kmalloc+0xb7/0xc0 [ 20.685741] __kmalloc_cache_noprof+0x189/0x420 [ 20.687589] kasan_bitops_generic+0x92/0x1c0 [ 20.688076] kunit_try_run_case+0x1a5/0x480 [ 20.688737] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.689657] kthread+0x337/0x6f0 [ 20.689988] ret_from_fork+0x41/0x80 [ 20.690265] ret_from_fork_asm+0x1a/0x30 [ 20.690515] [ 20.690965] The buggy address belongs to the object at ffff8881025ebc60 [ 20.690965] which belongs to the cache kmalloc-16 of size 16 [ 20.693149] The buggy address is located 8 bytes inside of [ 20.693149] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.693826] [ 20.693962] The buggy address belongs to the physical page: [ 20.694318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.695570] flags: 0x200000000000000(node=0|zone=2) [ 20.696464] page_type: f5(slab) [ 20.696811] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.697882] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.699014] page dumped because: kasan: bad access detected [ 20.699745] [ 20.700143] Memory state around the buggy address: [ 20.701085] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.702059] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.702892] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.703658] ^ [ 20.704490] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.705533] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.706258] ================================================================== [ 20.563784] ================================================================== [ 20.564642] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 20.566087] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.566504] [ 20.566751] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.566872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.566910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.566963] Call Trace: [ 20.567017] <TASK> [ 20.567066] dump_stack_lvl+0x73/0xb0 [ 20.567218] print_report+0xd1/0x650 [ 20.567305] ? __virt_addr_valid+0x1db/0x2d0 [ 20.567642] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 20.567727] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.567989] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 20.568072] kasan_report+0x141/0x180 [ 20.568152] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 20.568652] kasan_check_range+0x10c/0x1c0 [ 20.568742] __kasan_check_write+0x18/0x20 [ 20.568787] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 20.568825] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.568862] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.568893] ? trace_hardirqs_on+0x37/0xe0 [ 20.568928] ? kasan_bitops_generic+0x92/0x1c0 [ 20.568963] kasan_bitops_generic+0x116/0x1c0 [ 20.568993] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.569024] ? __pfx_read_tsc+0x10/0x10 [ 20.569054] ? ktime_get_ts64+0x86/0x230 [ 20.569089] kunit_try_run_case+0x1a5/0x480 [ 20.569127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.569161] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.569197] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.569259] ? __kthread_parkme+0x82/0x180 [ 20.569295] ? preempt_count_sub+0x50/0x80 [ 20.569332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.569367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.569401] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.569437] kthread+0x337/0x6f0 [ 20.569460] ? trace_preempt_on+0x20/0xc0 [ 20.569494] ? __pfx_kthread+0x10/0x10 [ 20.569518] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.569550] ? calculate_sigpending+0x7b/0xa0 [ 20.569582] ? __pfx_kthread+0x10/0x10 [ 20.569654] ret_from_fork+0x41/0x80 [ 20.569727] ? __pfx_kthread+0x10/0x10 [ 20.569804] ret_from_fork_asm+0x1a/0x30 [ 20.569888] </TASK> [ 20.569926] [ 20.591938] Allocated by task 282: [ 20.592274] kasan_save_stack+0x45/0x70 [ 20.592684] kasan_save_track+0x18/0x40 [ 20.592922] kasan_save_alloc_info+0x3b/0x50 [ 20.593178] __kasan_kmalloc+0xb7/0xc0 [ 20.594085] __kmalloc_cache_noprof+0x189/0x420 [ 20.594756] kasan_bitops_generic+0x92/0x1c0 [ 20.595133] kunit_try_run_case+0x1a5/0x480 [ 20.595570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.596249] kthread+0x337/0x6f0 [ 20.596486] ret_from_fork+0x41/0x80 [ 20.596936] ret_from_fork_asm+0x1a/0x30 [ 20.597429] [ 20.598050] The buggy address belongs to the object at ffff8881025ebc60 [ 20.598050] which belongs to the cache kmalloc-16 of size 16 [ 20.599095] The buggy address is located 8 bytes inside of [ 20.599095] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.599811] [ 20.599945] The buggy address belongs to the physical page: [ 20.600240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.600721] flags: 0x200000000000000(node=0|zone=2) [ 20.601002] page_type: f5(slab) [ 20.601241] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.601900] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.602315] page dumped because: kasan: bad access detected [ 20.602656] [ 20.603052] Memory state around the buggy address: [ 20.603586] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.604178] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.604948] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.605403] ^ [ 20.605839] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.606284] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.607341] ================================================================== [ 20.461306] ================================================================== [ 20.462125] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 20.463029] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.463743] [ 20.464575] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.464888] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.464925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.464983] Call Trace: [ 20.465029] <TASK> [ 20.465052] dump_stack_lvl+0x73/0xb0 [ 20.465088] print_report+0xd1/0x650 [ 20.465122] ? __virt_addr_valid+0x1db/0x2d0 [ 20.465158] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 20.465266] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.465366] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 20.465472] kasan_report+0x141/0x180 [ 20.465551] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 20.465971] kasan_check_range+0x10c/0x1c0 [ 20.466034] __kasan_check_write+0x18/0x20 [ 20.466075] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 20.466126] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.466165] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.466197] ? trace_hardirqs_on+0x37/0xe0 [ 20.466256] ? kasan_bitops_generic+0x92/0x1c0 [ 20.466296] kasan_bitops_generic+0x116/0x1c0 [ 20.466327] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.466359] ? __pfx_read_tsc+0x10/0x10 [ 20.466387] ? ktime_get_ts64+0x86/0x230 [ 20.466423] kunit_try_run_case+0x1a5/0x480 [ 20.466460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.466493] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.466527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.466563] ? __kthread_parkme+0x82/0x180 [ 20.466595] ? preempt_count_sub+0x50/0x80 [ 20.466697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.466759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.466795] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.466830] kthread+0x337/0x6f0 [ 20.466854] ? trace_preempt_on+0x20/0xc0 [ 20.466887] ? __pfx_kthread+0x10/0x10 [ 20.466913] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.466945] ? calculate_sigpending+0x7b/0xa0 [ 20.466977] ? __pfx_kthread+0x10/0x10 [ 20.467004] ret_from_fork+0x41/0x80 [ 20.467034] ? __pfx_kthread+0x10/0x10 [ 20.467058] ret_from_fork_asm+0x1a/0x30 [ 20.467101] </TASK> [ 20.467115] [ 20.488594] Allocated by task 282: [ 20.489992] kasan_save_stack+0x45/0x70 [ 20.490347] kasan_save_track+0x18/0x40 [ 20.490678] kasan_save_alloc_info+0x3b/0x50 [ 20.490930] __kasan_kmalloc+0xb7/0xc0 [ 20.491090] __kmalloc_cache_noprof+0x189/0x420 [ 20.491262] kasan_bitops_generic+0x92/0x1c0 [ 20.491428] kunit_try_run_case+0x1a5/0x480 [ 20.491594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.492686] kthread+0x337/0x6f0 [ 20.493406] ret_from_fork+0x41/0x80 [ 20.494443] ret_from_fork_asm+0x1a/0x30 [ 20.495204] [ 20.495708] The buggy address belongs to the object at ffff8881025ebc60 [ 20.495708] which belongs to the cache kmalloc-16 of size 16 [ 20.497734] The buggy address is located 8 bytes inside of [ 20.497734] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.500380] [ 20.500944] The buggy address belongs to the physical page: [ 20.501562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.502374] flags: 0x200000000000000(node=0|zone=2) [ 20.502856] page_type: f5(slab) [ 20.503352] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.504184] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.504964] page dumped because: kasan: bad access detected [ 20.505642] [ 20.506092] Memory state around the buggy address: [ 20.507053] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.507939] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.508209] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.508735] ^ [ 20.509998] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.510821] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.511358] ================================================================== [ 20.608524] ================================================================== [ 20.609303] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 20.610435] Write of size 8 at addr ffff8881025ebc68 by task kunit_try_catch/282 [ 20.611321] [ 20.611593] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 20.611853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.611890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.611945] Call Trace: [ 20.611993] <TASK> [ 20.612036] dump_stack_lvl+0x73/0xb0 [ 20.612109] print_report+0xd1/0x650 [ 20.612181] ? __virt_addr_valid+0x1db/0x2d0 [ 20.612309] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 20.612416] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.612493] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 20.612572] kasan_report+0x141/0x180 [ 20.612824] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 20.612912] kasan_check_range+0x10c/0x1c0 [ 20.612985] __kasan_check_write+0x18/0x20 [ 20.613053] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 20.613129] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.613202] ? __kmalloc_cache_noprof+0x189/0x420 [ 20.613286] ? trace_hardirqs_on+0x37/0xe0 [ 20.613358] ? kasan_bitops_generic+0x92/0x1c0 [ 20.613432] kasan_bitops_generic+0x116/0x1c0 [ 20.613487] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.613542] ? __pfx_read_tsc+0x10/0x10 [ 20.613627] ? ktime_get_ts64+0x86/0x230 [ 20.614067] kunit_try_run_case+0x1a5/0x480 [ 20.614159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.614281] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.614360] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.614462] ? __kthread_parkme+0x82/0x180 [ 20.614558] ? preempt_count_sub+0x50/0x80 [ 20.614780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.614858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.614935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.615010] kthread+0x337/0x6f0 [ 20.615070] ? trace_preempt_on+0x20/0xc0 [ 20.615140] ? __pfx_kthread+0x10/0x10 [ 20.615184] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.615269] ? calculate_sigpending+0x7b/0xa0 [ 20.615319] ? __pfx_kthread+0x10/0x10 [ 20.615360] ret_from_fork+0x41/0x80 [ 20.615408] ? __pfx_kthread+0x10/0x10 [ 20.615451] ret_from_fork_asm+0x1a/0x30 [ 20.615526] </TASK> [ 20.615551] [ 20.631879] Allocated by task 282: [ 20.632359] kasan_save_stack+0x45/0x70 [ 20.632850] kasan_save_track+0x18/0x40 [ 20.633325] kasan_save_alloc_info+0x3b/0x50 [ 20.633962] __kasan_kmalloc+0xb7/0xc0 [ 20.634449] __kmalloc_cache_noprof+0x189/0x420 [ 20.635082] kasan_bitops_generic+0x92/0x1c0 [ 20.635329] kunit_try_run_case+0x1a5/0x480 [ 20.635725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.636033] kthread+0x337/0x6f0 [ 20.636496] ret_from_fork+0x41/0x80 [ 20.637053] ret_from_fork_asm+0x1a/0x30 [ 20.637524] [ 20.637924] The buggy address belongs to the object at ffff8881025ebc60 [ 20.637924] which belongs to the cache kmalloc-16 of size 16 [ 20.639228] The buggy address is located 8 bytes inside of [ 20.639228] allocated 9-byte region [ffff8881025ebc60, ffff8881025ebc69) [ 20.639844] [ 20.639980] The buggy address belongs to the physical page: [ 20.640249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025eb [ 20.641158] flags: 0x200000000000000(node=0|zone=2) [ 20.641877] page_type: f5(slab) [ 20.642320] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.643003] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.643856] page dumped because: kasan: bad access detected [ 20.644381] [ 20.644789] Memory state around the buggy address: [ 20.645159] ffff8881025ebb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 20.646069] ffff8881025ebb80: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.646554] >ffff8881025ebc00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.647193] ^ [ 20.647547] ffff8881025ebc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.648349] ffff8881025ebd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.648963] ==================================================================