Date
May 13, 2025, 12:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.579650] ================================================================== [ 21.579733] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 21.579813] Write of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.579875] [ 21.579917] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.580034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.580071] Hardware name: linux,dummy-virt (DT) [ 21.580112] Call trace: [ 21.580141] show_stack+0x20/0x38 (C) [ 21.580202] dump_stack_lvl+0x8c/0xd0 [ 21.580261] print_report+0x118/0x608 [ 21.580317] kasan_report+0xdc/0x128 [ 21.580371] kasan_check_range+0x100/0x1a8 [ 21.580427] __kasan_check_write+0x20/0x30 [ 21.580484] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 21.580547] kasan_bitops_generic+0x11c/0x1c8 [ 21.580602] kunit_try_run_case+0x170/0x3f0 [ 21.580658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.580719] kthread+0x328/0x630 [ 21.580773] ret_from_fork+0x10/0x20 [ 21.580828] [ 21.580855] Allocated by task 261: [ 21.580892] kasan_save_stack+0x3c/0x68 [ 21.580955] kasan_save_track+0x20/0x40 [ 21.581018] kasan_save_alloc_info+0x40/0x58 [ 21.581067] __kasan_kmalloc+0xd4/0xd8 [ 21.581111] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.581158] kasan_bitops_generic+0xa0/0x1c8 [ 21.581204] kunit_try_run_case+0x170/0x3f0 [ 21.581248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.581296] kthread+0x328/0x630 [ 21.581338] ret_from_fork+0x10/0x20 [ 21.581823] [ 21.581857] The buggy address belongs to the object at fff00000c4035140 [ 21.581857] which belongs to the cache kmalloc-16 of size 16 [ 21.581929] The buggy address is located 8 bytes inside of [ 21.581929] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.582108] [ 21.582139] The buggy address belongs to the physical page: [ 21.582190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104035 [ 21.582757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.583055] page_type: f5(slab) [ 21.583115] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.583176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.583312] page dumped because: kasan: bad access detected [ 21.583355] [ 21.583379] Memory state around the buggy address: [ 21.583521] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.583716] fff00000c4035080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.583770] >fff00000c4035100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.584030] ^ [ 21.584126] fff00000c4035180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.584258] fff00000c4035200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.584475] ================================================================== [ 21.585008] ================================================================== [ 21.585073] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 21.585151] Read of size 8 at addr fff00000c4035148 by task kunit_try_catch/261 [ 21.585210] [ 21.585254] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT [ 21.585351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.585386] Hardware name: linux,dummy-virt (DT) [ 21.585425] Call trace: [ 21.585455] show_stack+0x20/0x38 (C) [ 21.585516] dump_stack_lvl+0x8c/0xd0 [ 21.585570] print_report+0x118/0x608 [ 21.585625] kasan_report+0xdc/0x128 [ 21.585679] __asan_report_load8_noabort+0x20/0x30 [ 21.585739] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 21.585847] kasan_bitops_generic+0x11c/0x1c8 [ 21.585917] kunit_try_run_case+0x170/0x3f0 [ 21.586595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.587320] kthread+0x328/0x630 [ 21.587408] ret_from_fork+0x10/0x20 [ 21.587529] [ 21.587593] Allocated by task 261: [ 21.587667] kasan_save_stack+0x3c/0x68 [ 21.587733] kasan_save_track+0x20/0x40 [ 21.587780] kasan_save_alloc_info+0x40/0x58 [ 21.587828] __kasan_kmalloc+0xd4/0xd8 [ 21.587871] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.588335] kasan_bitops_generic+0xa0/0x1c8 [ 21.588392] kunit_try_run_case+0x170/0x3f0 [ 21.588448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.588646] kthread+0x328/0x630 [ 21.588701] ret_from_fork+0x10/0x20 [ 21.588835] [ 21.589100] The buggy address belongs to the object at fff00000c4035140 [ 21.589100] which belongs to the cache kmalloc-16 of size 16 [ 21.589185] The buggy address is located 8 bytes inside of [ 21.589185] allocated 9-byte region [fff00000c4035140, fff00000c4035149) [ 21.589273] [ 21.589633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.590316] [ 21.590541] fff00000c4035000: 00 02 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.590702] ^ [ 21.591943] ==================================================================
[ 13.542717] ================================================================== [ 13.542949] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.543271] Read of size 8 at addr ffff888101d83668 by task kunit_try_catch/278 [ 13.543983] [ 13.544109] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.544155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.544167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.544188] Call Trace: [ 13.544202] <TASK> [ 13.544218] dump_stack_lvl+0x73/0xb0 [ 13.544244] print_report+0xd1/0x650 [ 13.544294] ? __virt_addr_valid+0x1db/0x2d0 [ 13.544327] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.544352] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.544374] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.544399] kasan_report+0x141/0x180 [ 13.544421] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.544452] __asan_report_load8_noabort+0x18/0x20 [ 13.544473] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.544499] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.544528] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.544549] ? trace_hardirqs_on+0x37/0xe0 [ 13.544572] ? kasan_bitops_generic+0x92/0x1c0 [ 13.544597] kasan_bitops_generic+0x121/0x1c0 [ 13.544629] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.544651] ? __pfx_read_tsc+0x10/0x10 [ 13.544671] ? ktime_get_ts64+0x86/0x230 [ 13.544695] kunit_try_run_case+0x1a5/0x480 [ 13.544721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.544743] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.544765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.544788] ? __kthread_parkme+0x82/0x180 [ 13.544828] ? preempt_count_sub+0x50/0x80 [ 13.544853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.544876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.544899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.544922] kthread+0x337/0x6f0 [ 13.544943] ? trace_preempt_on+0x20/0xc0 [ 13.544965] ? __pfx_kthread+0x10/0x10 [ 13.544986] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.545007] ? calculate_sigpending+0x7b/0xa0 [ 13.545031] ? __pfx_kthread+0x10/0x10 [ 13.545054] ret_from_fork+0x116/0x1d0 [ 13.545072] ? __pfx_kthread+0x10/0x10 [ 13.545093] ret_from_fork_asm+0x1a/0x30 [ 13.545126] </TASK> [ 13.545137] [ 13.560534] Allocated by task 278: [ 13.560895] kasan_save_stack+0x45/0x70 [ 13.561177] kasan_save_track+0x18/0x40 [ 13.561328] kasan_save_alloc_info+0x3b/0x50 [ 13.561472] __kasan_kmalloc+0xb7/0xc0 [ 13.561657] __kmalloc_cache_noprof+0x189/0x420 [ 13.561810] kasan_bitops_generic+0x92/0x1c0 [ 13.561956] kunit_try_run_case+0x1a5/0x480 [ 13.562100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.562321] kthread+0x337/0x6f0 [ 13.562501] ret_from_fork+0x116/0x1d0 [ 13.562664] ret_from_fork_asm+0x1a/0x30 [ 13.562827] [ 13.562922] The buggy address belongs to the object at ffff888101d83660 [ 13.562922] which belongs to the cache kmalloc-16 of size 16 [ 13.563354] The buggy address is located 8 bytes inside of [ 13.563354] allocated 9-byte region [ffff888101d83660, ffff888101d83669) [ 13.563995] [ 13.564093] The buggy address belongs to the physical page: [ 13.564411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83 [ 13.564790] flags: 0x200000000000000(node=0|zone=2) [ 13.564999] page_type: f5(slab) [ 13.565135] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.565621] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.565845] page dumped because: kasan: bad access detected [ 13.566287] [ 13.566433] Memory state around the buggy address: [ 13.566736] ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.567026] ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 13.567311] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.567596] ^ [ 13.567801] ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.568069] ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.568385] ================================================================== [ 13.479018] ================================================================== [ 13.479522] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.480189] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278 [ 13.480931] [ 13.481157] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.481205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.481216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.481239] Call Trace: [ 13.481254] <TASK> [ 13.481269] dump_stack_lvl+0x73/0xb0 [ 13.481296] print_report+0xd1/0x650 [ 13.481328] ? __virt_addr_valid+0x1db/0x2d0 [ 13.481352] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.481386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.481408] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.481432] kasan_report+0x141/0x180 [ 13.481464] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.481493] kasan_check_range+0x10c/0x1c0 [ 13.481517] __kasan_check_write+0x18/0x20 [ 13.481555] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.481579] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.481606] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.481637] ? trace_hardirqs_on+0x37/0xe0 [ 13.481659] ? kasan_bitops_generic+0x92/0x1c0 [ 13.481683] kasan_bitops_generic+0x121/0x1c0 [ 13.481703] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.481724] ? __pfx_read_tsc+0x10/0x10 [ 13.481745] ? ktime_get_ts64+0x86/0x230 [ 13.481768] kunit_try_run_case+0x1a5/0x480 [ 13.481792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.481814] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.481836] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.481858] ? __kthread_parkme+0x82/0x180 [ 13.481878] ? preempt_count_sub+0x50/0x80 [ 13.481903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.481926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.481948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.481972] kthread+0x337/0x6f0 [ 13.481992] ? trace_preempt_on+0x20/0xc0 [ 13.482014] ? __pfx_kthread+0x10/0x10 [ 13.482035] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.482055] ? calculate_sigpending+0x7b/0xa0 [ 13.482079] ? __pfx_kthread+0x10/0x10 [ 13.482100] ret_from_fork+0x116/0x1d0 [ 13.482118] ? __pfx_kthread+0x10/0x10 [ 13.482139] ret_from_fork_asm+0x1a/0x30 [ 13.482170] </TASK> [ 13.482186] [ 13.496020] Allocated by task 278: [ 13.496349] kasan_save_stack+0x45/0x70 [ 13.496777] kasan_save_track+0x18/0x40 [ 13.497139] kasan_save_alloc_info+0x3b/0x50 [ 13.497638] __kasan_kmalloc+0xb7/0xc0 [ 13.497987] __kmalloc_cache_noprof+0x189/0x420 [ 13.498267] kasan_bitops_generic+0x92/0x1c0 [ 13.498413] kunit_try_run_case+0x1a5/0x480 [ 13.498690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.499158] kthread+0x337/0x6f0 [ 13.499472] ret_from_fork+0x116/0x1d0 [ 13.500052] ret_from_fork_asm+0x1a/0x30 [ 13.500229] [ 13.500318] The buggy address belongs to the object at ffff888101d83660 [ 13.500318] which belongs to the cache kmalloc-16 of size 16 [ 13.501371] The buggy address is located 8 bytes inside of [ 13.501371] allocated 9-byte region [ffff888101d83660, ffff888101d83669) [ 13.502311] [ 13.502485] The buggy address belongs to the physical page: [ 13.503072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83 [ 13.503474] flags: 0x200000000000000(node=0|zone=2) [ 13.503963] page_type: f5(slab) [ 13.504257] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.504491] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.505137] page dumped because: kasan: bad access detected [ 13.505724] [ 13.506090] Memory state around the buggy address: [ 13.506545] ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.507086] ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 13.507642] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.508197] ^ [ 13.508400] ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.508690] ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.509303] ================================================================== [ 13.379131] ================================================================== [ 13.379597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.379997] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278 [ 13.380711] [ 13.381269] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.381327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.381339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.381361] Call Trace: [ 13.381375] <TASK> [ 13.381390] dump_stack_lvl+0x73/0xb0 [ 13.381427] print_report+0xd1/0x650 [ 13.381450] ? __virt_addr_valid+0x1db/0x2d0 [ 13.381473] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.381497] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.381519] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.381594] kasan_report+0x141/0x180 [ 13.381627] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.381656] kasan_check_range+0x10c/0x1c0 [ 13.381680] __kasan_check_write+0x18/0x20 [ 13.381699] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.381722] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.381750] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.381770] ? trace_hardirqs_on+0x37/0xe0 [ 13.381793] ? kasan_bitops_generic+0x92/0x1c0 [ 13.381817] kasan_bitops_generic+0x121/0x1c0 [ 13.381836] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.381857] ? __pfx_read_tsc+0x10/0x10 [ 13.381879] ? ktime_get_ts64+0x86/0x230 [ 13.381904] kunit_try_run_case+0x1a5/0x480 [ 13.381927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.381948] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.381970] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.381992] ? __kthread_parkme+0x82/0x180 [ 13.382011] ? preempt_count_sub+0x50/0x80 [ 13.382036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.382060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.382082] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.382105] kthread+0x337/0x6f0 [ 13.382125] ? trace_preempt_on+0x20/0xc0 [ 13.382147] ? __pfx_kthread+0x10/0x10 [ 13.382169] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.382226] ? calculate_sigpending+0x7b/0xa0 [ 13.382249] ? __pfx_kthread+0x10/0x10 [ 13.382271] ret_from_fork+0x116/0x1d0 [ 13.382290] ? __pfx_kthread+0x10/0x10 [ 13.382310] ret_from_fork_asm+0x1a/0x30 [ 13.382342] </TASK> [ 13.382353] [ 13.396805] Allocated by task 278: [ 13.397078] kasan_save_stack+0x45/0x70 [ 13.397298] kasan_save_track+0x18/0x40 [ 13.397483] kasan_save_alloc_info+0x3b/0x50 [ 13.397979] __kasan_kmalloc+0xb7/0xc0 [ 13.398246] __kmalloc_cache_noprof+0x189/0x420 [ 13.398466] kasan_bitops_generic+0x92/0x1c0 [ 13.398827] kunit_try_run_case+0x1a5/0x480 [ 13.399170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.399648] kthread+0x337/0x6f0 [ 13.399825] ret_from_fork+0x116/0x1d0 [ 13.400097] ret_from_fork_asm+0x1a/0x30 [ 13.400438] [ 13.400658] The buggy address belongs to the object at ffff888101d83660 [ 13.400658] which belongs to the cache kmalloc-16 of size 16 [ 13.401726] The buggy address is located 8 bytes inside of [ 13.401726] allocated 9-byte region [ffff888101d83660, ffff888101d83669) [ 13.402482] [ 13.402724] The buggy address belongs to the physical page: [ 13.403078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83 [ 13.403668] flags: 0x200000000000000(node=0|zone=2) [ 13.403975] page_type: f5(slab) [ 13.404153] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.404434] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.404793] page dumped because: kasan: bad access detected [ 13.405008] [ 13.405148] Memory state around the buggy address: [ 13.405435] ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.405786] ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 13.406164] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.406430] ^ [ 13.406776] ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.407089] ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.407370] ================================================================== [ 13.407772] ================================================================== [ 13.408172] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.408477] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278 [ 13.408933] [ 13.409043] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.409090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.409101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.409122] Call Trace: [ 13.409135] <TASK> [ 13.409150] dump_stack_lvl+0x73/0xb0 [ 13.409176] print_report+0xd1/0x650 [ 13.409206] ? __virt_addr_valid+0x1db/0x2d0 [ 13.409229] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.409252] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.409275] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.409298] kasan_report+0x141/0x180 [ 13.409322] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.409351] kasan_check_range+0x10c/0x1c0 [ 13.409375] __kasan_check_write+0x18/0x20 [ 13.409395] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.409419] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.409447] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.409467] ? trace_hardirqs_on+0x37/0xe0 [ 13.409490] ? kasan_bitops_generic+0x92/0x1c0 [ 13.409513] kasan_bitops_generic+0x121/0x1c0 [ 13.409533] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.409555] ? __pfx_read_tsc+0x10/0x10 [ 13.409576] ? ktime_get_ts64+0x86/0x230 [ 13.409600] kunit_try_run_case+0x1a5/0x480 [ 13.409635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.409656] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.409678] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.409701] ? __kthread_parkme+0x82/0x180 [ 13.409721] ? preempt_count_sub+0x50/0x80 [ 13.409746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.409769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.409792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.409829] kthread+0x337/0x6f0 [ 13.409849] ? trace_preempt_on+0x20/0xc0 [ 13.409871] ? __pfx_kthread+0x10/0x10 [ 13.409893] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.409913] ? calculate_sigpending+0x7b/0xa0 [ 13.409937] ? __pfx_kthread+0x10/0x10 [ 13.409959] ret_from_fork+0x116/0x1d0 [ 13.409977] ? __pfx_kthread+0x10/0x10 [ 13.409998] ret_from_fork_asm+0x1a/0x30 [ 13.410030] </TASK> [ 13.410040] [ 13.422991] Allocated by task 278: [ 13.423395] kasan_save_stack+0x45/0x70 [ 13.424079] kasan_save_track+0x18/0x40 [ 13.424694] kasan_save_alloc_info+0x3b/0x50 [ 13.424869] __kasan_kmalloc+0xb7/0xc0 [ 13.425005] __kmalloc_cache_noprof+0x189/0x420 [ 13.425160] kasan_bitops_generic+0x92/0x1c0 [ 13.425315] kunit_try_run_case+0x1a5/0x480 [ 13.425462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.426215] kthread+0x337/0x6f0 [ 13.426756] ret_from_fork+0x116/0x1d0 [ 13.427397] ret_from_fork_asm+0x1a/0x30 [ 13.427924] [ 13.428294] The buggy address belongs to the object at ffff888101d83660 [ 13.428294] which belongs to the cache kmalloc-16 of size 16 [ 13.430091] The buggy address is located 8 bytes inside of [ 13.430091] allocated 9-byte region [ffff888101d83660, ffff888101d83669) [ 13.432073] [ 13.432326] The buggy address belongs to the physical page: [ 13.433024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83 [ 13.433876] flags: 0x200000000000000(node=0|zone=2) [ 13.434437] page_type: f5(slab) [ 13.434845] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.435485] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.436419] page dumped because: kasan: bad access detected [ 13.436986] [ 13.437064] Memory state around the buggy address: [ 13.437430] ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.438429] ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 13.439267] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.439826] ^ [ 13.440027] ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.440627] ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.441632] ================================================================== [ 13.334265] ================================================================== [ 13.334626] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.335018] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278 [ 13.335473] [ 13.335678] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.335727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.335738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.335759] Call Trace: [ 13.335772] <TASK> [ 13.335786] dump_stack_lvl+0x73/0xb0 [ 13.335812] print_report+0xd1/0x650 [ 13.335835] ? __virt_addr_valid+0x1db/0x2d0 [ 13.335858] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.335882] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.335905] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.335929] kasan_report+0x141/0x180 [ 13.335952] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.335981] kasan_check_range+0x10c/0x1c0 [ 13.336005] __kasan_check_write+0x18/0x20 [ 13.336025] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.336049] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.336078] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.336098] ? trace_hardirqs_on+0x37/0xe0 [ 13.336120] ? kasan_bitops_generic+0x92/0x1c0 [ 13.336145] kasan_bitops_generic+0x121/0x1c0 [ 13.336165] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.336187] ? __pfx_read_tsc+0x10/0x10 [ 13.336207] ? ktime_get_ts64+0x86/0x230 [ 13.336232] kunit_try_run_case+0x1a5/0x480 [ 13.336255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.336277] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.336299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.336322] ? __kthread_parkme+0x82/0x180 [ 13.336342] ? preempt_count_sub+0x50/0x80 [ 13.336367] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.336390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.336414] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.336437] kthread+0x337/0x6f0 [ 13.336456] ? trace_preempt_on+0x20/0xc0 [ 13.336478] ? __pfx_kthread+0x10/0x10 [ 13.336499] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.336520] ? calculate_sigpending+0x7b/0xa0 [ 13.336586] ? __pfx_kthread+0x10/0x10 [ 13.336609] ret_from_fork+0x116/0x1d0 [ 13.336639] ? __pfx_kthread+0x10/0x10 [ 13.336661] ret_from_fork_asm+0x1a/0x30 [ 13.336693] </TASK> [ 13.336703] [ 13.345001] Allocated by task 278: [ 13.345157] kasan_save_stack+0x45/0x70 [ 13.345359] kasan_save_track+0x18/0x40 [ 13.345495] kasan_save_alloc_info+0x3b/0x50 [ 13.345779] __kasan_kmalloc+0xb7/0xc0 [ 13.345980] __kmalloc_cache_noprof+0x189/0x420 [ 13.346162] kasan_bitops_generic+0x92/0x1c0 [ 13.346372] kunit_try_run_case+0x1a5/0x480 [ 13.346525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.347653] kthread+0x337/0x6f0 [ 13.348347] ret_from_fork+0x116/0x1d0 [ 13.348886] ret_from_fork_asm+0x1a/0x30 [ 13.349279] [ 13.349445] The buggy address belongs to the object at ffff888101d83660 [ 13.349445] which belongs to the cache kmalloc-16 of size 16 [ 13.350636] The buggy address is located 8 bytes inside of [ 13.350636] allocated 9-byte region [ffff888101d83660, ffff888101d83669) [ 13.350995] [ 13.351070] The buggy address belongs to the physical page: [ 13.351381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83 [ 13.352236] flags: 0x200000000000000(node=0|zone=2) [ 13.352855] page_type: f5(slab) [ 13.353277] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.354048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.354911] page dumped because: kasan: bad access detected [ 13.355463] [ 13.355702] Memory state around the buggy address: [ 13.356035] ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.356409] ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 13.357284] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.357806] ^ [ 13.358010] ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.358250] ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.358525] ================================================================== [ 13.510323] ================================================================== [ 13.511264] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.511864] Read of size 8 at addr ffff888101d83668 by task kunit_try_catch/278 [ 13.512091] [ 13.512178] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.512223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.512235] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.512257] Call Trace: [ 13.512270] <TASK> [ 13.512295] dump_stack_lvl+0x73/0xb0 [ 13.512321] print_report+0xd1/0x650 [ 13.512343] ? __virt_addr_valid+0x1db/0x2d0 [ 13.512367] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.512390] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.512413] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.512437] kasan_report+0x141/0x180 [ 13.512459] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.512488] kasan_check_range+0x10c/0x1c0 [ 13.512512] __kasan_check_read+0x15/0x20 [ 13.512531] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.512555] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.512583] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.512603] ? trace_hardirqs_on+0x37/0xe0 [ 13.512682] ? kasan_bitops_generic+0x92/0x1c0 [ 13.512709] kasan_bitops_generic+0x121/0x1c0 [ 13.512729] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.512751] ? __pfx_read_tsc+0x10/0x10 [ 13.512771] ? ktime_get_ts64+0x86/0x230 [ 13.512796] kunit_try_run_case+0x1a5/0x480 [ 13.512819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.512842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.512865] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.512888] ? __kthread_parkme+0x82/0x180 [ 13.512909] ? preempt_count_sub+0x50/0x80 [ 13.512933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.512957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.512980] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.513003] kthread+0x337/0x6f0 [ 13.513022] ? trace_preempt_on+0x20/0xc0 [ 13.513045] ? __pfx_kthread+0x10/0x10 [ 13.513066] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.513086] ? calculate_sigpending+0x7b/0xa0 [ 13.513110] ? __pfx_kthread+0x10/0x10 [ 13.513132] ret_from_fork+0x116/0x1d0 [ 13.513151] ? __pfx_kthread+0x10/0x10 [ 13.513172] ret_from_fork_asm+0x1a/0x30 [ 13.513215] </TASK> [ 13.513225] [ 13.528424] Allocated by task 278: [ 13.528809] kasan_save_stack+0x45/0x70 [ 13.529176] kasan_save_track+0x18/0x40 [ 13.529390] kasan_save_alloc_info+0x3b/0x50 [ 13.529721] __kasan_kmalloc+0xb7/0xc0 [ 13.530078] __kmalloc_cache_noprof+0x189/0x420 [ 13.530554] kasan_bitops_generic+0x92/0x1c0 [ 13.531005] kunit_try_run_case+0x1a5/0x480 [ 13.531198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.531401] kthread+0x337/0x6f0 [ 13.531767] ret_from_fork+0x116/0x1d0 [ 13.532119] ret_from_fork_asm+0x1a/0x30 [ 13.532499] [ 13.532711] The buggy address belongs to the object at ffff888101d83660 [ 13.532711] which belongs to the cache kmalloc-16 of size 16 [ 13.533414] The buggy address is located 8 bytes inside of [ 13.533414] allocated 9-byte region [ffff888101d83660, ffff888101d83669) [ 13.533931] [ 13.534094] The buggy address belongs to the physical page: [ 13.534807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83 [ 13.535506] flags: 0x200000000000000(node=0|zone=2) [ 13.535988] page_type: f5(slab) [ 13.536351] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.537102] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.537827] page dumped because: kasan: bad access detected [ 13.538128] [ 13.538199] Memory state around the buggy address: [ 13.538582] ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.539322] ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 13.540041] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.540275] ^ [ 13.540852] ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.541551] ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.542312] ================================================================== [ 13.442779] ================================================================== [ 13.444111] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.444736] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278 [ 13.445672] [ 13.445984] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.446035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.446049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.446071] Call Trace: [ 13.446086] <TASK> [ 13.446101] dump_stack_lvl+0x73/0xb0 [ 13.446129] print_report+0xd1/0x650 [ 13.446152] ? __virt_addr_valid+0x1db/0x2d0 [ 13.446176] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.446200] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.446222] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.446245] kasan_report+0x141/0x180 [ 13.446267] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.446296] kasan_check_range+0x10c/0x1c0 [ 13.446319] __kasan_check_write+0x18/0x20 [ 13.446338] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.446362] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.446389] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.446410] ? trace_hardirqs_on+0x37/0xe0 [ 13.446432] ? kasan_bitops_generic+0x92/0x1c0 [ 13.446456] kasan_bitops_generic+0x121/0x1c0 [ 13.446480] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.446501] ? __pfx_read_tsc+0x10/0x10 [ 13.446641] ? ktime_get_ts64+0x86/0x230 [ 13.446675] kunit_try_run_case+0x1a5/0x480 [ 13.446700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.446735] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.446757] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.446811] ? __kthread_parkme+0x82/0x180 [ 13.446832] ? preempt_count_sub+0x50/0x80 [ 13.446857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.446881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.446903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.446926] kthread+0x337/0x6f0 [ 13.446946] ? trace_preempt_on+0x20/0xc0 [ 13.446968] ? __pfx_kthread+0x10/0x10 [ 13.446989] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.447010] ? calculate_sigpending+0x7b/0xa0 [ 13.447034] ? __pfx_kthread+0x10/0x10 [ 13.447056] ret_from_fork+0x116/0x1d0 [ 13.447073] ? __pfx_kthread+0x10/0x10 [ 13.447094] ret_from_fork_asm+0x1a/0x30 [ 13.447126] </TASK> [ 13.447135] [ 13.464711] Allocated by task 278: [ 13.465050] kasan_save_stack+0x45/0x70 [ 13.465198] kasan_save_track+0x18/0x40 [ 13.465335] kasan_save_alloc_info+0x3b/0x50 [ 13.465479] __kasan_kmalloc+0xb7/0xc0 [ 13.465642] __kmalloc_cache_noprof+0x189/0x420 [ 13.466132] kasan_bitops_generic+0x92/0x1c0 [ 13.466632] kunit_try_run_case+0x1a5/0x480 [ 13.467043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.467608] kthread+0x337/0x6f0 [ 13.467799] ret_from_fork+0x116/0x1d0 [ 13.467935] ret_from_fork_asm+0x1a/0x30 [ 13.468075] [ 13.468146] The buggy address belongs to the object at ffff888101d83660 [ 13.468146] which belongs to the cache kmalloc-16 of size 16 [ 13.469336] The buggy address is located 8 bytes inside of [ 13.469336] allocated 9-byte region [ffff888101d83660, ffff888101d83669) [ 13.470557] [ 13.470768] The buggy address belongs to the physical page: [ 13.471145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83 [ 13.471907] flags: 0x200000000000000(node=0|zone=2) [ 13.472205] page_type: f5(slab) [ 13.472621] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.472987] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.473274] page dumped because: kasan: bad access detected [ 13.473921] [ 13.474148] Memory state around the buggy address: [ 13.474657] ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.475315] ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 13.475869] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.476128] ^ [ 13.476718] ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.477391] ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.478136] ================================================================== [ 13.359001] ================================================================== [ 13.359351] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.359799] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278 [ 13.360139] [ 13.360235] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.360279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.360292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.360313] Call Trace: [ 13.360327] <TASK> [ 13.360340] dump_stack_lvl+0x73/0xb0 [ 13.360366] print_report+0xd1/0x650 [ 13.360389] ? __virt_addr_valid+0x1db/0x2d0 [ 13.360411] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.360435] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.360476] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.360500] kasan_report+0x141/0x180 [ 13.360522] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.360551] kasan_check_range+0x10c/0x1c0 [ 13.360575] __kasan_check_write+0x18/0x20 [ 13.360595] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.360628] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.360656] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.360678] ? trace_hardirqs_on+0x37/0xe0 [ 13.360701] ? kasan_bitops_generic+0x92/0x1c0 [ 13.360725] kasan_bitops_generic+0x121/0x1c0 [ 13.360745] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.360767] ? __pfx_read_tsc+0x10/0x10 [ 13.360787] ? ktime_get_ts64+0x86/0x230 [ 13.360812] kunit_try_run_case+0x1a5/0x480 [ 13.360836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.360858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.360880] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.360902] ? __kthread_parkme+0x82/0x180 [ 13.360922] ? preempt_count_sub+0x50/0x80 [ 13.360947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.360970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.360993] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.361016] kthread+0x337/0x6f0 [ 13.361035] ? trace_preempt_on+0x20/0xc0 [ 13.361058] ? __pfx_kthread+0x10/0x10 [ 13.361080] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.361101] ? calculate_sigpending+0x7b/0xa0 [ 13.361124] ? __pfx_kthread+0x10/0x10 [ 13.361146] ret_from_fork+0x116/0x1d0 [ 13.361164] ? __pfx_kthread+0x10/0x10 [ 13.361185] ret_from_fork_asm+0x1a/0x30 [ 13.361217] </TASK> [ 13.361227] [ 13.369801] Allocated by task 278: [ 13.369931] kasan_save_stack+0x45/0x70 [ 13.370075] kasan_save_track+0x18/0x40 [ 13.370395] kasan_save_alloc_info+0x3b/0x50 [ 13.371006] __kasan_kmalloc+0xb7/0xc0 [ 13.371194] __kmalloc_cache_noprof+0x189/0x420 [ 13.371361] kasan_bitops_generic+0x92/0x1c0 [ 13.371507] kunit_try_run_case+0x1a5/0x480 [ 13.371670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.371925] kthread+0x337/0x6f0 [ 13.372112] ret_from_fork+0x116/0x1d0 [ 13.372466] ret_from_fork_asm+0x1a/0x30 [ 13.372767] [ 13.372865] The buggy address belongs to the object at ffff888101d83660 [ 13.372865] which belongs to the cache kmalloc-16 of size 16 [ 13.373470] The buggy address is located 8 bytes inside of [ 13.373470] allocated 9-byte region [ffff888101d83660, ffff888101d83669) [ 13.373977] [ 13.374053] The buggy address belongs to the physical page: [ 13.374375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83 [ 13.374720] flags: 0x200000000000000(node=0|zone=2) [ 13.374884] page_type: f5(slab) [ 13.375006] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.375445] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.375792] page dumped because: kasan: bad access detected [ 13.376000] [ 13.376070] Memory state around the buggy address: [ 13.376346] ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.377084] ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 13.377463] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.377814] ^ [ 13.378116] ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.378418] ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.378775] ================================================================== [ 13.312019] ================================================================== [ 13.312415] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.313395] Write of size 8 at addr ffff888101d83668 by task kunit_try_catch/278 [ 13.313980] [ 13.314089] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) [ 13.314166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.314188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.314209] Call Trace: [ 13.314222] <TASK> [ 13.314236] dump_stack_lvl+0x73/0xb0 [ 13.314264] print_report+0xd1/0x650 [ 13.314286] ? __virt_addr_valid+0x1db/0x2d0 [ 13.314310] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.314333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.314356] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.314380] kasan_report+0x141/0x180 [ 13.314404] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.314432] kasan_check_range+0x10c/0x1c0 [ 13.314456] __kasan_check_write+0x18/0x20 [ 13.314481] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.314505] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.314551] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.314572] ? trace_hardirqs_on+0x37/0xe0 [ 13.314594] ? kasan_bitops_generic+0x92/0x1c0 [ 13.314685] kasan_bitops_generic+0x121/0x1c0 [ 13.314723] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.314758] ? __pfx_read_tsc+0x10/0x10 [ 13.314779] ? ktime_get_ts64+0x86/0x230 [ 13.314804] kunit_try_run_case+0x1a5/0x480 [ 13.314828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.314850] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.314873] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.314896] ? __kthread_parkme+0x82/0x180 [ 13.314916] ? preempt_count_sub+0x50/0x80 [ 13.314942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.314966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.314990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.315013] kthread+0x337/0x6f0 [ 13.315033] ? trace_preempt_on+0x20/0xc0 [ 13.315056] ? __pfx_kthread+0x10/0x10 [ 13.315077] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.315098] ? calculate_sigpending+0x7b/0xa0 [ 13.315122] ? __pfx_kthread+0x10/0x10 [ 13.315144] ret_from_fork+0x116/0x1d0 [ 13.315162] ? __pfx_kthread+0x10/0x10 [ 13.315194] ret_from_fork_asm+0x1a/0x30 [ 13.315243] </TASK> [ 13.315254] [ 13.324800] Allocated by task 278: [ 13.324994] kasan_save_stack+0x45/0x70 [ 13.325194] kasan_save_track+0x18/0x40 [ 13.325393] kasan_save_alloc_info+0x3b/0x50 [ 13.325734] __kasan_kmalloc+0xb7/0xc0 [ 13.325927] __kmalloc_cache_noprof+0x189/0x420 [ 13.326167] kasan_bitops_generic+0x92/0x1c0 [ 13.326402] kunit_try_run_case+0x1a5/0x480 [ 13.326701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.327094] kthread+0x337/0x6f0 [ 13.327277] ret_from_fork+0x116/0x1d0 [ 13.327413] ret_from_fork_asm+0x1a/0x30 [ 13.327552] [ 13.327634] The buggy address belongs to the object at ffff888101d83660 [ 13.327634] which belongs to the cache kmalloc-16 of size 16 [ 13.328596] The buggy address is located 8 bytes inside of [ 13.328596] allocated 9-byte region [ffff888101d83660, ffff888101d83669) [ 13.329167] [ 13.329278] The buggy address belongs to the physical page: [ 13.329742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d83 [ 13.330144] flags: 0x200000000000000(node=0|zone=2) [ 13.330390] page_type: f5(slab) [ 13.330661] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.330995] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.331412] page dumped because: kasan: bad access detected [ 13.331717] [ 13.331837] Memory state around the buggy address: [ 13.332002] ffff888101d83500: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 13.332219] ffff888101d83580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 13.332578] >ffff888101d83600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.332919] ^ [ 13.333218] ffff888101d83680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.333502] ffff888101d83700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.333868] ==================================================================