Date
July 23, 2025, 2:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.765637] ================================================================== [ 17.765772] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 17.765839] Read of size 8 at addr fff00000c59612a8 by task kunit_try_catch/261 [ 17.765966] [ 17.766010] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 17.766106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.766304] Hardware name: linux,dummy-virt (DT) [ 17.766534] Call trace: [ 17.766623] show_stack+0x20/0x38 (C) [ 17.766803] dump_stack_lvl+0x8c/0xd0 [ 17.766990] print_report+0x118/0x5d0 [ 17.767048] kasan_report+0xdc/0x128 [ 17.767096] __asan_report_load8_noabort+0x20/0x30 [ 17.767302] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 17.767539] kasan_bitops_generic+0x110/0x1c8 [ 17.767641] kunit_try_run_case+0x170/0x3f0 [ 17.767795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.768058] kthread+0x328/0x630 [ 17.768153] ret_from_fork+0x10/0x20 [ 17.768694] [ 17.768743] Allocated by task 261: [ 17.768935] kasan_save_stack+0x3c/0x68 [ 17.769227] kasan_save_track+0x20/0x40 [ 17.769299] kasan_save_alloc_info+0x40/0x58 [ 17.770365] ret_from_fork+0x10/0x20 [ 17.771609] page dumped because: kasan: bad access detected [ 17.772844] ^ [ 17.774999] Write of size 8 at addr fff00000c59612a8 by task kunit_try_catch/261 [ 17.776555] kasan_bitops_generic+0x110/0x1c8 [ 17.778920] kthread+0x328/0x630 [ 17.779302] [ 17.779973] page_type: f5(slab) [ 17.780575] [ 17.780923] fff00000c5961180: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 17.782263] ================================================================== [ 17.754714] ================================================================== [ 17.755662] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 17.755749] Write of size 8 at addr fff00000c59612a8 by task kunit_try_catch/261 [ 17.755804] [ 17.755838] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 17.755955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.756143] Hardware name: linux,dummy-virt (DT) [ 17.756516] Call trace: [ 17.756632] show_stack+0x20/0x38 (C) [ 17.756818] dump_stack_lvl+0x8c/0xd0 [ 17.757112] print_report+0x118/0x5d0 [ 17.757228] kasan_report+0xdc/0x128 [ 17.757487] kasan_check_range+0x100/0x1a8 [ 17.757615] __kasan_check_write+0x20/0x30 [ 17.757980] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 17.758142] kasan_bitops_generic+0x110/0x1c8 [ 17.758332] kunit_try_run_case+0x170/0x3f0 [ 17.758442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.758556] kthread+0x328/0x630 [ 17.758632] ret_from_fork+0x10/0x20 [ 17.758681] [ 17.758890] Allocated by task 261: [ 17.759098] kasan_save_stack+0x3c/0x68 [ 17.759262] kasan_save_track+0x20/0x40 [ 17.759364] kasan_save_alloc_info+0x40/0x58 [ 17.759501] __kasan_kmalloc+0xd4/0xd8 [ 17.759589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.759730] kasan_bitops_generic+0xa0/0x1c8 [ 17.759813] kunit_try_run_case+0x170/0x3f0 [ 17.760167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.760451] kthread+0x328/0x630 [ 17.760564] ret_from_fork+0x10/0x20 [ 17.760635] [ 17.760658] The buggy address belongs to the object at fff00000c59612a0 [ 17.760658] which belongs to the cache kmalloc-16 of size 16 [ 17.760963] The buggy address is located 8 bytes inside of [ 17.760963] allocated 9-byte region [fff00000c59612a0, fff00000c59612a9) [ 17.761065] [ 17.761142] The buggy address belongs to the physical page: [ 17.761464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105961 [ 17.761649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.761848] page_type: f5(slab) [ 17.761949] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.762064] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.762148] page dumped because: kasan: bad access detected [ 17.762557] [ 17.762672] Memory state around the buggy address: [ 17.762770] fff00000c5961180: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 17.762918] fff00000c5961200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.763002] >fff00000c5961280: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.763176] ^ [ 17.763223] fff00000c5961300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.763344] fff00000c5961380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.763497] ==================================================================
[ 14.658284] ================================================================== [ 14.658637] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.659019] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.659866] [ 14.659991] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.660035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.660047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.660068] Call Trace: [ 14.660084] <TASK> [ 14.660098] dump_stack_lvl+0x73/0xb0 [ 14.660128] print_report+0xd1/0x610 [ 14.660150] ? __virt_addr_valid+0x1db/0x2d0 [ 14.660172] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.660198] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.660220] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.660245] kasan_report+0x141/0x180 [ 14.660267] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.660297] kasan_check_range+0x10c/0x1c0 [ 14.660321] __kasan_check_write+0x18/0x20 [ 14.660342] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.660369] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.660397] ? ret_from_fork_asm+0x1a/0x30 [ 14.660419] ? kthread+0x337/0x6f0 [ 14.660443] kasan_bitops_generic+0x116/0x1c0 [ 14.660466] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.660491] ? __pfx_read_tsc+0x10/0x10 [ 14.660511] ? ktime_get_ts64+0x86/0x230 [ 14.660536] kunit_try_run_case+0x1a5/0x480 [ 14.660560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.660582] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.660606] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.660629] ? __kthread_parkme+0x82/0x180 [ 14.660649] ? preempt_count_sub+0x50/0x80 [ 14.660672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.660695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.660718] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.660741] kthread+0x337/0x6f0 [ 14.660761] ? trace_preempt_on+0x20/0xc0 [ 14.660783] ? __pfx_kthread+0x10/0x10 [ 14.660804] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.660835] ? calculate_sigpending+0x7b/0xa0 [ 14.660863] ? __pfx_kthread+0x10/0x10 [ 14.660886] ret_from_fork+0x116/0x1d0 [ 14.660904] ? __pfx_kthread+0x10/0x10 [ 14.660925] ret_from_fork_asm+0x1a/0x30 [ 14.660955] </TASK> [ 14.660965] [ 14.668714] Allocated by task 278: [ 14.668888] kasan_save_stack+0x45/0x70 [ 14.669076] kasan_save_track+0x18/0x40 [ 14.669240] kasan_save_alloc_info+0x3b/0x50 [ 14.669391] __kasan_kmalloc+0xb7/0xc0 [ 14.669526] __kmalloc_cache_noprof+0x189/0x420 [ 14.669684] kasan_bitops_generic+0x92/0x1c0 [ 14.669843] kunit_try_run_case+0x1a5/0x480 [ 14.669991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.670167] kthread+0x337/0x6f0 [ 14.670287] ret_from_fork+0x116/0x1d0 [ 14.670478] ret_from_fork_asm+0x1a/0x30 [ 14.670673] [ 14.670767] The buggy address belongs to the object at ffff8881025ca080 [ 14.670767] which belongs to the cache kmalloc-16 of size 16 [ 14.671666] The buggy address is located 8 bytes inside of [ 14.671666] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.672060] [ 14.672132] The buggy address belongs to the physical page: [ 14.672305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.672544] flags: 0x200000000000000(node=0|zone=2) [ 14.672706] page_type: f5(slab) [ 14.672899] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.673435] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.673774] page dumped because: kasan: bad access detected [ 14.674040] [ 14.674165] Memory state around the buggy address: [ 14.674397] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.674717] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.675019] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.675328] ^ [ 14.675508] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.675784] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.676071] ================================================================== [ 14.677063] ================================================================== [ 14.677364] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.677717] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.678004] [ 14.678089] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.678140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.678151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.678172] Call Trace: [ 14.678184] <TASK> [ 14.678197] dump_stack_lvl+0x73/0xb0 [ 14.678224] print_report+0xd1/0x610 [ 14.678246] ? __virt_addr_valid+0x1db/0x2d0 [ 14.678267] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.678292] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.678315] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.678340] kasan_report+0x141/0x180 [ 14.678361] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.678392] kasan_check_range+0x10c/0x1c0 [ 14.678415] __kasan_check_write+0x18/0x20 [ 14.678434] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.678459] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.678486] ? ret_from_fork_asm+0x1a/0x30 [ 14.678508] ? kthread+0x337/0x6f0 [ 14.678531] kasan_bitops_generic+0x116/0x1c0 [ 14.678554] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.678579] ? __pfx_read_tsc+0x10/0x10 [ 14.678599] ? ktime_get_ts64+0x86/0x230 [ 14.678623] kunit_try_run_case+0x1a5/0x480 [ 14.678646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.678669] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.678692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.678715] ? __kthread_parkme+0x82/0x180 [ 14.678735] ? preempt_count_sub+0x50/0x80 [ 14.678757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.678781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.678804] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.678839] kthread+0x337/0x6f0 [ 14.678858] ? trace_preempt_on+0x20/0xc0 [ 14.678881] ? __pfx_kthread+0x10/0x10 [ 14.678901] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.678923] ? calculate_sigpending+0x7b/0xa0 [ 14.678946] ? __pfx_kthread+0x10/0x10 [ 14.678968] ret_from_fork+0x116/0x1d0 [ 14.678985] ? __pfx_kthread+0x10/0x10 [ 14.679006] ret_from_fork_asm+0x1a/0x30 [ 14.679035] </TASK> [ 14.679045] [ 14.687038] Allocated by task 278: [ 14.687390] kasan_save_stack+0x45/0x70 [ 14.687586] kasan_save_track+0x18/0x40 [ 14.687773] kasan_save_alloc_info+0x3b/0x50 [ 14.687978] __kasan_kmalloc+0xb7/0xc0 [ 14.688265] __kmalloc_cache_noprof+0x189/0x420 [ 14.688485] kasan_bitops_generic+0x92/0x1c0 [ 14.688664] kunit_try_run_case+0x1a5/0x480 [ 14.688807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.688994] kthread+0x337/0x6f0 [ 14.689167] ret_from_fork+0x116/0x1d0 [ 14.689357] ret_from_fork_asm+0x1a/0x30 [ 14.689557] [ 14.689649] The buggy address belongs to the object at ffff8881025ca080 [ 14.689649] which belongs to the cache kmalloc-16 of size 16 [ 14.690292] The buggy address is located 8 bytes inside of [ 14.690292] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.690751] [ 14.690832] The buggy address belongs to the physical page: [ 14.691052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.691326] flags: 0x200000000000000(node=0|zone=2) [ 14.691557] page_type: f5(slab) [ 14.691726] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.692059] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.692432] page dumped because: kasan: bad access detected [ 14.692648] [ 14.692743] Memory state around the buggy address: [ 14.692958] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.693286] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.693543] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.693759] ^ [ 14.693893] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.694112] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.694422] ================================================================== [ 14.732343] ================================================================== [ 14.732628] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.733014] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.733393] [ 14.733492] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.733535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.733548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.733569] Call Trace: [ 14.733586] <TASK> [ 14.733600] dump_stack_lvl+0x73/0xb0 [ 14.733628] print_report+0xd1/0x610 [ 14.733649] ? __virt_addr_valid+0x1db/0x2d0 [ 14.733671] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.733696] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.733718] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.733744] kasan_report+0x141/0x180 [ 14.733765] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.733795] kasan_check_range+0x10c/0x1c0 [ 14.733830] __kasan_check_write+0x18/0x20 [ 14.733848] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.733874] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.733901] ? ret_from_fork_asm+0x1a/0x30 [ 14.733923] ? kthread+0x337/0x6f0 [ 14.733947] kasan_bitops_generic+0x116/0x1c0 [ 14.733969] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.733994] ? __pfx_read_tsc+0x10/0x10 [ 14.734014] ? ktime_get_ts64+0x86/0x230 [ 14.734038] kunit_try_run_case+0x1a5/0x480 [ 14.734061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.734083] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.734106] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.734129] ? __kthread_parkme+0x82/0x180 [ 14.734149] ? preempt_count_sub+0x50/0x80 [ 14.734171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.734195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.734218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.734241] kthread+0x337/0x6f0 [ 14.734260] ? trace_preempt_on+0x20/0xc0 [ 14.734282] ? __pfx_kthread+0x10/0x10 [ 14.734302] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.734323] ? calculate_sigpending+0x7b/0xa0 [ 14.734347] ? __pfx_kthread+0x10/0x10 [ 14.734367] ret_from_fork+0x116/0x1d0 [ 14.734386] ? __pfx_kthread+0x10/0x10 [ 14.734405] ret_from_fork_asm+0x1a/0x30 [ 14.734435] </TASK> [ 14.734444] [ 14.742579] Allocated by task 278: [ 14.742766] kasan_save_stack+0x45/0x70 [ 14.742979] kasan_save_track+0x18/0x40 [ 14.743172] kasan_save_alloc_info+0x3b/0x50 [ 14.743365] __kasan_kmalloc+0xb7/0xc0 [ 14.743518] __kmalloc_cache_noprof+0x189/0x420 [ 14.743747] kasan_bitops_generic+0x92/0x1c0 [ 14.743965] kunit_try_run_case+0x1a5/0x480 [ 14.744180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.744398] kthread+0x337/0x6f0 [ 14.744523] ret_from_fork+0x116/0x1d0 [ 14.744657] ret_from_fork_asm+0x1a/0x30 [ 14.744797] [ 14.744906] The buggy address belongs to the object at ffff8881025ca080 [ 14.744906] which belongs to the cache kmalloc-16 of size 16 [ 14.745431] The buggy address is located 8 bytes inside of [ 14.745431] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.745962] [ 14.746035] The buggy address belongs to the physical page: [ 14.746435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.746742] flags: 0x200000000000000(node=0|zone=2) [ 14.746963] page_type: f5(slab) [ 14.747088] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.747505] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.747853] page dumped because: kasan: bad access detected [ 14.748106] [ 14.748217] Memory state around the buggy address: [ 14.748452] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.748745] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.749038] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.749367] ^ [ 14.749547] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.749826] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.750089] ================================================================== [ 14.592181] ================================================================== [ 14.592574] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.592854] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.593082] [ 14.593172] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.593216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.593227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.593250] Call Trace: [ 14.593262] <TASK> [ 14.593276] dump_stack_lvl+0x73/0xb0 [ 14.593305] print_report+0xd1/0x610 [ 14.593327] ? __virt_addr_valid+0x1db/0x2d0 [ 14.593350] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.593374] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.593397] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.593422] kasan_report+0x141/0x180 [ 14.593443] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.593472] kasan_check_range+0x10c/0x1c0 [ 14.593496] __kasan_check_write+0x18/0x20 [ 14.593515] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.593540] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.593567] ? ret_from_fork_asm+0x1a/0x30 [ 14.593589] ? kthread+0x337/0x6f0 [ 14.593613] kasan_bitops_generic+0x116/0x1c0 [ 14.593636] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.593661] ? __pfx_read_tsc+0x10/0x10 [ 14.593682] ? ktime_get_ts64+0x86/0x230 [ 14.593706] kunit_try_run_case+0x1a5/0x480 [ 14.593731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.593753] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.593778] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.593801] ? __kthread_parkme+0x82/0x180 [ 14.593832] ? preempt_count_sub+0x50/0x80 [ 14.593855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.593878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.593901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.593925] kthread+0x337/0x6f0 [ 14.593944] ? trace_preempt_on+0x20/0xc0 [ 14.593967] ? __pfx_kthread+0x10/0x10 [ 14.593987] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.594008] ? calculate_sigpending+0x7b/0xa0 [ 14.594031] ? __pfx_kthread+0x10/0x10 [ 14.594051] ret_from_fork+0x116/0x1d0 [ 14.594071] ? __pfx_kthread+0x10/0x10 [ 14.594090] ret_from_fork_asm+0x1a/0x30 [ 14.594119] </TASK> [ 14.594130] [ 14.603526] Allocated by task 278: [ 14.603720] kasan_save_stack+0x45/0x70 [ 14.603973] kasan_save_track+0x18/0x40 [ 14.604269] kasan_save_alloc_info+0x3b/0x50 [ 14.604490] __kasan_kmalloc+0xb7/0xc0 [ 14.604703] __kmalloc_cache_noprof+0x189/0x420 [ 14.605003] kasan_bitops_generic+0x92/0x1c0 [ 14.605232] kunit_try_run_case+0x1a5/0x480 [ 14.605412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.605671] kthread+0x337/0x6f0 [ 14.605915] ret_from_fork+0x116/0x1d0 [ 14.606229] ret_from_fork_asm+0x1a/0x30 [ 14.606373] [ 14.606473] The buggy address belongs to the object at ffff8881025ca080 [ 14.606473] which belongs to the cache kmalloc-16 of size 16 [ 14.607234] The buggy address is located 8 bytes inside of [ 14.607234] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.607723] [ 14.607830] The buggy address belongs to the physical page: [ 14.608234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.608604] flags: 0x200000000000000(node=0|zone=2) [ 14.608864] page_type: f5(slab) [ 14.609042] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.609375] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.609684] page dumped because: kasan: bad access detected [ 14.609962] [ 14.610058] Memory state around the buggy address: [ 14.610261] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.610638] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.610933] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.611331] ^ [ 14.611506] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.611788] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.612158] ================================================================== [ 14.695484] ================================================================== [ 14.695850] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.696397] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.696731] [ 14.696856] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.696898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.696911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.696932] Call Trace: [ 14.696945] <TASK> [ 14.696960] dump_stack_lvl+0x73/0xb0 [ 14.696986] print_report+0xd1/0x610 [ 14.697007] ? __virt_addr_valid+0x1db/0x2d0 [ 14.697029] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.697054] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.697076] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.697113] kasan_report+0x141/0x180 [ 14.697135] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.697164] kasan_check_range+0x10c/0x1c0 [ 14.697188] __kasan_check_write+0x18/0x20 [ 14.697207] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.697232] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.697259] ? ret_from_fork_asm+0x1a/0x30 [ 14.697280] ? kthread+0x337/0x6f0 [ 14.697304] kasan_bitops_generic+0x116/0x1c0 [ 14.697328] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.697353] ? __pfx_read_tsc+0x10/0x10 [ 14.697373] ? ktime_get_ts64+0x86/0x230 [ 14.697396] kunit_try_run_case+0x1a5/0x480 [ 14.697420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.697442] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.697466] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.697490] ? __kthread_parkme+0x82/0x180 [ 14.697510] ? preempt_count_sub+0x50/0x80 [ 14.697533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.697557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.697580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.697603] kthread+0x337/0x6f0 [ 14.697622] ? trace_preempt_on+0x20/0xc0 [ 14.697643] ? __pfx_kthread+0x10/0x10 [ 14.697664] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.697685] ? calculate_sigpending+0x7b/0xa0 [ 14.697708] ? __pfx_kthread+0x10/0x10 [ 14.697728] ret_from_fork+0x116/0x1d0 [ 14.697747] ? __pfx_kthread+0x10/0x10 [ 14.697767] ret_from_fork_asm+0x1a/0x30 [ 14.697796] </TASK> [ 14.697806] [ 14.705555] Allocated by task 278: [ 14.705731] kasan_save_stack+0x45/0x70 [ 14.705942] kasan_save_track+0x18/0x40 [ 14.706116] kasan_save_alloc_info+0x3b/0x50 [ 14.706300] __kasan_kmalloc+0xb7/0xc0 [ 14.706461] __kmalloc_cache_noprof+0x189/0x420 [ 14.706663] kasan_bitops_generic+0x92/0x1c0 [ 14.706850] kunit_try_run_case+0x1a5/0x480 [ 14.707053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.707303] kthread+0x337/0x6f0 [ 14.707468] ret_from_fork+0x116/0x1d0 [ 14.707602] ret_from_fork_asm+0x1a/0x30 [ 14.707743] [ 14.707826] The buggy address belongs to the object at ffff8881025ca080 [ 14.707826] which belongs to the cache kmalloc-16 of size 16 [ 14.708544] The buggy address is located 8 bytes inside of [ 14.708544] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.709042] [ 14.709115] The buggy address belongs to the physical page: [ 14.709289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.709616] flags: 0x200000000000000(node=0|zone=2) [ 14.709941] page_type: f5(slab) [ 14.710108] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.710538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.710767] page dumped because: kasan: bad access detected [ 14.710952] [ 14.711023] Memory state around the buggy address: [ 14.711232] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.711552] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.711878] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.712168] ^ [ 14.712292] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.712508] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.712958] ================================================================== [ 14.613017] ================================================================== [ 14.613311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.614209] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.614567] [ 14.614679] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.614724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.614756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.614777] Call Trace: [ 14.614791] <TASK> [ 14.614832] dump_stack_lvl+0x73/0xb0 [ 14.614860] print_report+0xd1/0x610 [ 14.614882] ? __virt_addr_valid+0x1db/0x2d0 [ 14.614903] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.614929] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.614951] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.614977] kasan_report+0x141/0x180 [ 14.614998] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.615029] kasan_check_range+0x10c/0x1c0 [ 14.615053] __kasan_check_write+0x18/0x20 [ 14.615072] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.615108] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.615136] ? ret_from_fork_asm+0x1a/0x30 [ 14.615159] ? kthread+0x337/0x6f0 [ 14.615182] kasan_bitops_generic+0x116/0x1c0 [ 14.615226] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.615251] ? __pfx_read_tsc+0x10/0x10 [ 14.615271] ? ktime_get_ts64+0x86/0x230 [ 14.615295] kunit_try_run_case+0x1a5/0x480 [ 14.615319] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.615341] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.615365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.615389] ? __kthread_parkme+0x82/0x180 [ 14.615424] ? preempt_count_sub+0x50/0x80 [ 14.615447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.615472] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.615495] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.615519] kthread+0x337/0x6f0 [ 14.615537] ? trace_preempt_on+0x20/0xc0 [ 14.615561] ? __pfx_kthread+0x10/0x10 [ 14.615581] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.615603] ? calculate_sigpending+0x7b/0xa0 [ 14.615626] ? __pfx_kthread+0x10/0x10 [ 14.615647] ret_from_fork+0x116/0x1d0 [ 14.615665] ? __pfx_kthread+0x10/0x10 [ 14.615686] ret_from_fork_asm+0x1a/0x30 [ 14.615715] </TASK> [ 14.615726] [ 14.626482] Allocated by task 278: [ 14.626855] kasan_save_stack+0x45/0x70 [ 14.627070] kasan_save_track+0x18/0x40 [ 14.627338] kasan_save_alloc_info+0x3b/0x50 [ 14.627548] __kasan_kmalloc+0xb7/0xc0 [ 14.627730] __kmalloc_cache_noprof+0x189/0x420 [ 14.627956] kasan_bitops_generic+0x92/0x1c0 [ 14.628480] kunit_try_run_case+0x1a5/0x480 [ 14.628684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.629026] kthread+0x337/0x6f0 [ 14.629371] ret_from_fork+0x116/0x1d0 [ 14.629623] ret_from_fork_asm+0x1a/0x30 [ 14.629923] [ 14.630025] The buggy address belongs to the object at ffff8881025ca080 [ 14.630025] which belongs to the cache kmalloc-16 of size 16 [ 14.630780] The buggy address is located 8 bytes inside of [ 14.630780] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.631536] [ 14.631829] The buggy address belongs to the physical page: [ 14.632090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.632505] flags: 0x200000000000000(node=0|zone=2) [ 14.632730] page_type: f5(slab) [ 14.633072] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.633442] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.633866] page dumped because: kasan: bad access detected [ 14.634182] [ 14.634261] Memory state around the buggy address: [ 14.634669] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.634998] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.635526] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.635942] ^ [ 14.636226] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.636638] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.637019] ================================================================== [ 14.713967] ================================================================== [ 14.714361] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.714709] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.715021] [ 14.715145] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.715187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.715199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.715220] Call Trace: [ 14.715235] <TASK> [ 14.715249] dump_stack_lvl+0x73/0xb0 [ 14.715276] print_report+0xd1/0x610 [ 14.715298] ? __virt_addr_valid+0x1db/0x2d0 [ 14.715319] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.715344] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.715366] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.715392] kasan_report+0x141/0x180 [ 14.715414] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.715447] kasan_check_range+0x10c/0x1c0 [ 14.715471] __kasan_check_write+0x18/0x20 [ 14.715491] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.715517] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.715545] ? ret_from_fork_asm+0x1a/0x30 [ 14.715567] ? kthread+0x337/0x6f0 [ 14.715591] kasan_bitops_generic+0x116/0x1c0 [ 14.715616] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.715640] ? __pfx_read_tsc+0x10/0x10 [ 14.715660] ? ktime_get_ts64+0x86/0x230 [ 14.715683] kunit_try_run_case+0x1a5/0x480 [ 14.715707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.715729] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.715752] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.715776] ? __kthread_parkme+0x82/0x180 [ 14.715795] ? preempt_count_sub+0x50/0x80 [ 14.715829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.715852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.715875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.715899] kthread+0x337/0x6f0 [ 14.715917] ? trace_preempt_on+0x20/0xc0 [ 14.715940] ? __pfx_kthread+0x10/0x10 [ 14.715960] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.715981] ? calculate_sigpending+0x7b/0xa0 [ 14.716003] ? __pfx_kthread+0x10/0x10 [ 14.716025] ret_from_fork+0x116/0x1d0 [ 14.716043] ? __pfx_kthread+0x10/0x10 [ 14.716063] ret_from_fork_asm+0x1a/0x30 [ 14.716093] </TASK> [ 14.716102] [ 14.723713] Allocated by task 278: [ 14.723902] kasan_save_stack+0x45/0x70 [ 14.724075] kasan_save_track+0x18/0x40 [ 14.724254] kasan_save_alloc_info+0x3b/0x50 [ 14.724457] __kasan_kmalloc+0xb7/0xc0 [ 14.724628] __kmalloc_cache_noprof+0x189/0x420 [ 14.724841] kasan_bitops_generic+0x92/0x1c0 [ 14.725037] kunit_try_run_case+0x1a5/0x480 [ 14.725246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.725492] kthread+0x337/0x6f0 [ 14.725646] ret_from_fork+0x116/0x1d0 [ 14.725839] ret_from_fork_asm+0x1a/0x30 [ 14.726020] [ 14.726105] The buggy address belongs to the object at ffff8881025ca080 [ 14.726105] which belongs to the cache kmalloc-16 of size 16 [ 14.726484] The buggy address is located 8 bytes inside of [ 14.726484] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.726864] [ 14.726974] The buggy address belongs to the physical page: [ 14.727228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.727662] flags: 0x200000000000000(node=0|zone=2) [ 14.727908] page_type: f5(slab) [ 14.728078] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.728412] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.728641] page dumped because: kasan: bad access detected [ 14.728821] [ 14.728897] Memory state around the buggy address: [ 14.729162] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.729489] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.729820] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.730115] ^ [ 14.730253] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.730526] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.730790] ================================================================== [ 14.639075] ================================================================== [ 14.639517] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.639935] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278 [ 14.640450] [ 14.640630] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.640675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.640792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.640827] Call Trace: [ 14.640842] <TASK> [ 14.640863] dump_stack_lvl+0x73/0xb0 [ 14.640892] print_report+0xd1/0x610 [ 14.640913] ? __virt_addr_valid+0x1db/0x2d0 [ 14.640936] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.640961] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.640982] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.641008] kasan_report+0x141/0x180 [ 14.641029] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.641059] kasan_check_range+0x10c/0x1c0 [ 14.641082] __kasan_check_write+0x18/0x20 [ 14.641113] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.641139] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.641166] ? ret_from_fork_asm+0x1a/0x30 [ 14.641187] ? kthread+0x337/0x6f0 [ 14.641212] kasan_bitops_generic+0x116/0x1c0 [ 14.641236] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.641261] ? __pfx_read_tsc+0x10/0x10 [ 14.641281] ? ktime_get_ts64+0x86/0x230 [ 14.641304] kunit_try_run_case+0x1a5/0x480 [ 14.641329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.641352] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.641375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.641398] ? __kthread_parkme+0x82/0x180 [ 14.641418] ? preempt_count_sub+0x50/0x80 [ 14.641441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.641464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.641488] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.641511] kthread+0x337/0x6f0 [ 14.641530] ? trace_preempt_on+0x20/0xc0 [ 14.641553] ? __pfx_kthread+0x10/0x10 [ 14.641574] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.641595] ? calculate_sigpending+0x7b/0xa0 [ 14.641620] ? __pfx_kthread+0x10/0x10 [ 14.641641] ret_from_fork+0x116/0x1d0 [ 14.641659] ? __pfx_kthread+0x10/0x10 [ 14.641680] ret_from_fork_asm+0x1a/0x30 [ 14.641709] </TASK> [ 14.641720] [ 14.650325] Allocated by task 278: [ 14.650511] kasan_save_stack+0x45/0x70 [ 14.650691] kasan_save_track+0x18/0x40 [ 14.650839] kasan_save_alloc_info+0x3b/0x50 [ 14.651032] __kasan_kmalloc+0xb7/0xc0 [ 14.651347] __kmalloc_cache_noprof+0x189/0x420 [ 14.651569] kasan_bitops_generic+0x92/0x1c0 [ 14.651762] kunit_try_run_case+0x1a5/0x480 [ 14.651950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.652203] kthread+0x337/0x6f0 [ 14.652349] ret_from_fork+0x116/0x1d0 [ 14.652516] ret_from_fork_asm+0x1a/0x30 [ 14.652684] [ 14.652780] The buggy address belongs to the object at ffff8881025ca080 [ 14.652780] which belongs to the cache kmalloc-16 of size 16 [ 14.653249] The buggy address is located 8 bytes inside of [ 14.653249] allocated 9-byte region [ffff8881025ca080, ffff8881025ca089) [ 14.653690] [ 14.653776] The buggy address belongs to the physical page: [ 14.654048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca [ 14.654494] flags: 0x200000000000000(node=0|zone=2) [ 14.654677] page_type: f5(slab) [ 14.654799] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.655041] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.655269] page dumped because: kasan: bad access detected [ 14.655479] [ 14.655573] Memory state around the buggy address: [ 14.655797] ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.656177] ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.656492] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.656807] ^ [ 14.656993] ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.657259] ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.657475] ==================================================================