Date
May 29, 2025, 7:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.752725] ================================================================== [ 24.752947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 24.753121] Write of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261 [ 24.753601] [ 24.753726] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.754018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.754220] Hardware name: linux,dummy-virt (DT) [ 24.754544] Call trace: [ 24.754607] show_stack+0x20/0x38 (C) [ 24.754869] dump_stack_lvl+0x8c/0xd0 [ 24.755044] print_report+0x118/0x608 [ 24.755339] kasan_report+0xdc/0x128 [ 24.755576] kasan_check_range+0x100/0x1a8 [ 24.755833] __kasan_check_write+0x20/0x30 [ 24.756067] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 24.756529] kasan_bitops_generic+0x110/0x1c8 [ 24.756648] kunit_try_run_case+0x170/0x3f0 [ 24.756831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.757124] kthread+0x328/0x630 [ 24.757441] ret_from_fork+0x10/0x20 [ 24.757565] [ 24.757876] Allocated by task 261: [ 24.757948] kasan_save_stack+0x3c/0x68 [ 24.758061] kasan_save_track+0x20/0x40 [ 24.758243] kasan_save_alloc_info+0x40/0x58 [ 24.758469] __kasan_kmalloc+0xd4/0xd8 [ 24.758678] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.758739] kasan_bitops_generic+0xa0/0x1c8 [ 24.758885] kunit_try_run_case+0x170/0x3f0 [ 24.759082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.759180] kthread+0x328/0x630 [ 24.759249] ret_from_fork+0x10/0x20 [ 24.759333] [ 24.759392] The buggy address belongs to the object at fff00000c66b10e0 [ 24.759392] which belongs to the cache kmalloc-16 of size 16 [ 24.759940] The buggy address is located 8 bytes inside of [ 24.759940] allocated 9-byte region [fff00000c66b10e0, fff00000c66b10e9) [ 24.760274] [ 24.760374] The buggy address belongs to the physical page: [ 24.760597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1 [ 24.760934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.761213] page_type: f5(slab) [ 24.761416] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.761680] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.761800] page dumped because: kasan: bad access detected [ 24.761890] [ 24.762258] Memory state around the buggy address: [ 24.762439] fff00000c66b0f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 24.762540] fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.762652] >fff00000c66b1080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 24.762757] ^ [ 24.763031] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.763281] fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.763609] ================================================================== [ 24.855332] ================================================================== [ 24.855470] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 24.855605] Read of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261 [ 24.855783] [ 24.855931] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.856238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.856309] Hardware name: linux,dummy-virt (DT) [ 24.856600] dump_stack_lvl+0x8c/0xd0 [ 24.856909] kasan_report+0xdc/0x128 [ 24.857783] kunit_try_run_case+0x170/0x3f0 [ 24.858191] ret_from_fork+0x10/0x20 [ 24.858313] [ 24.861377] fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.864449] Write of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261 [ 24.865271] dump_stack_lvl+0x8c/0xd0 [ 24.865789] __kasan_check_write+0x20/0x30 [ 24.866492] kthread+0x328/0x630 [ 24.867045] kasan_save_track+0x20/0x40 [ 24.867263] __kasan_kmalloc+0xd4/0xd8 [ 24.867539] kunit_try_run_case+0x170/0x3f0 [ 24.868377] [ 24.868608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1 [ 24.869527] Memory state around the buggy address: [ 24.870357] fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.872097] ================================================================== [ 24.767294] ================================================================== [ 24.767468] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 24.767622] Read of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261 [ 24.767735] [ 24.767827] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.768137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.768233] Hardware name: linux,dummy-virt (DT) [ 24.768322] Call trace: [ 24.768382] show_stack+0x20/0x38 (C) [ 24.768530] dump_stack_lvl+0x8c/0xd0 [ 24.768657] print_report+0x118/0x608 [ 24.768782] kasan_report+0xdc/0x128 [ 24.768899] __asan_report_load8_noabort+0x20/0x30 [ 24.769032] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 24.769222] kasan_bitops_generic+0x110/0x1c8 [ 24.769389] kunit_try_run_case+0x170/0x3f0 [ 24.769542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.769731] kthread+0x328/0x630 [ 24.769847] ret_from_fork+0x10/0x20 [ 24.769971] [ 24.770026] Allocated by task 261: [ 24.770132] kasan_save_stack+0x3c/0x68 [ 24.770277] kasan_save_track+0x20/0x40 [ 24.770441] kasan_save_alloc_info+0x40/0x58 [ 24.770539] __kasan_kmalloc+0xd4/0xd8 [ 24.770636] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.770719] kasan_bitops_generic+0xa0/0x1c8 [ 24.770810] kunit_try_run_case+0x170/0x3f0 [ 24.770912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.771029] kthread+0x328/0x630 [ 24.771133] ret_from_fork+0x10/0x20 [ 24.771271] [ 24.771324] The buggy address belongs to the object at fff00000c66b10e0 [ 24.771324] which belongs to the cache kmalloc-16 of size 16 [ 24.771476] The buggy address is located 8 bytes inside of [ 24.771476] allocated 9-byte region [fff00000c66b10e0, fff00000c66b10e9) [ 24.771618] [ 24.771674] The buggy address belongs to the physical page: [ 24.771757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b1 [ 24.771879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.771984] page_type: f5(slab) [ 24.772102] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.772242] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.772391] page dumped because: kasan: bad access detected [ 24.772529] [ 24.772582] Memory state around the buggy address: [ 24.772664] fff00000c66b0f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 24.773081] ^ [ 24.775828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.777168] kunit_try_run_case+0x170/0x3f0 [ 24.777440] kthread+0x328/0x630 [ 24.777537] ret_from_fork+0x10/0x20 [ 24.777645] [ 24.777698] Allocated by task 261: [ 24.777767] kasan_save_stack+0x3c/0x68 [ 24.778243] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.780571] >fff00000c66b1080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 24.782466] [ 24.783008] Call trace: [ 24.783748] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 24.784609] [ 24.785147] __kasan_kmalloc+0xd4/0xd8 [ 24.786126] The buggy address is located 8 bytes inside of [ 24.786126] allocated 9-byte region [fff00000c66b10e0, fff00000c66b10e9) [ 24.789249] fff00000c66b1000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.791381] [ 24.791487] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT [ 24.793607] __kasan_check_write+0x20/0x30 [ 24.794109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.795261] kasan_save_track+0x20/0x40 [ 24.797631] [ 24.798747] page dumped because: kasan: bad access detected [ 24.799100] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.800930] Write of size 8 at addr fff00000c66b10e8 by task kunit_try_catch/261 [ 24.801380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.802265] kasan_report+0xdc/0x128 [ 24.802770] kasan_check_range+0x100/0x1a8 [ 24.803233] kasan_bitops_generic+0x110/0x1c8 [ 24.804490] Allocated by task 261: [ 24.804789] kasan_save_alloc_info+0x40/0x58 [ 24.805802] kthread+0x328/0x630 [ 24.805892] ret_from_fork+0x10/0x20 [ 24.805986] [ 24.806061] The buggy address belongs to the object at fff00000c66b10e0 [ 24.806061] which belongs to the cache kmalloc-16 of size 16 [ 24.807026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.807424] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.809000] fff00000c66b1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.814379] kunit_try_run_case+0x170/0x3f0 [ 24.816489] kthread+0x328/0x630 [ 24.819108] page_type: f5(slab) [ 24.819345] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.821288] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.825413] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 24.826173] [ 24.828028] Call trace: [ 24.828197] show_stack+0x20/0x38 (C) [ 24.828668] print_report+0x118/0x608 [ 24.829734] __kasan_check_write+0x20/0x30 [ 24.830572] kasan_bitops_generic+0x110/0x1c8 [ 24.832298] ret_from_fork+0x10/0x20 [ 24.833179] kasan_save_stack+0x3c/0x68 [ 24.833871] kasan_save_alloc_info+0x40/0x58 [ 24.835090] [ 24.835150] The buggy address belongs to the object at fff00000c66b10e0 [ 24.835150] which belongs to the cache kmalloc-16 of size 16 [ 24.836767] page_type: f5(slab) [ 24.837148] page dumped because: kasan: bad access detected [ 24.838652] fff00000c66b1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.843655] ==================================================================
[ 13.008965] ================================================================== [ 13.009286] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.009641] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 13.009870] [ 13.009978] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.010207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.010220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.010241] Call Trace: [ 13.010255] <TASK> [ 13.010269] dump_stack_lvl+0x73/0xb0 [ 13.010295] print_report+0xd1/0x650 [ 13.010319] ? __virt_addr_valid+0x1db/0x2d0 [ 13.010341] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.010366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.010390] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.010417] kasan_report+0x141/0x180 [ 13.010440] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.010470] kasan_check_range+0x10c/0x1c0 [ 13.010494] __kasan_check_write+0x18/0x20 [ 13.010515] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.010548] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.010575] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.010597] ? trace_hardirqs_on+0x37/0xe0 [ 13.010631] ? kasan_bitops_generic+0x92/0x1c0 [ 13.010655] kasan_bitops_generic+0x116/0x1c0 [ 13.010676] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.010697] ? __pfx_read_tsc+0x10/0x10 [ 13.010718] ? ktime_get_ts64+0x86/0x230 [ 13.010742] kunit_try_run_case+0x1a5/0x480 [ 13.010762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.010783] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.010874] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.010904] ? __kthread_parkme+0x82/0x180 [ 13.010925] ? preempt_count_sub+0x50/0x80 [ 13.010948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.010970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.010995] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.011020] kthread+0x337/0x6f0 [ 13.011040] ? trace_preempt_on+0x20/0xc0 [ 13.011063] ? __pfx_kthread+0x10/0x10 [ 13.011084] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.011107] ? calculate_sigpending+0x7b/0xa0 [ 13.011131] ? __pfx_kthread+0x10/0x10 [ 13.011153] ret_from_fork+0x116/0x1d0 [ 13.011171] ? __pfx_kthread+0x10/0x10 [ 13.011192] ret_from_fork_asm+0x1a/0x30 [ 13.011222] </TASK> [ 13.011232] [ 13.022593] Allocated by task 278: [ 13.022906] kasan_save_stack+0x45/0x70 [ 13.023266] kasan_save_track+0x18/0x40 [ 13.023551] kasan_save_alloc_info+0x3b/0x50 [ 13.023730] __kasan_kmalloc+0xb7/0xc0 [ 13.024110] __kmalloc_cache_noprof+0x189/0x420 [ 13.024474] kasan_bitops_generic+0x92/0x1c0 [ 13.024799] kunit_try_run_case+0x1a5/0x480 [ 13.025062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.025435] kthread+0x337/0x6f0 [ 13.025623] ret_from_fork+0x116/0x1d0 [ 13.026182] ret_from_fork_asm+0x1a/0x30 [ 13.026346] [ 13.026450] The buggy address belongs to the object at ffff888102856080 [ 13.026450] which belongs to the cache kmalloc-16 of size 16 [ 13.027240] The buggy address is located 8 bytes inside of [ 13.027240] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 13.027986] [ 13.028162] The buggy address belongs to the physical page: [ 13.028405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 13.028939] flags: 0x200000000000000(node=0|zone=2) [ 13.029174] page_type: f5(slab) [ 13.029343] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.029698] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.030442] page dumped because: kasan: bad access detected [ 13.030919] [ 13.031030] Memory state around the buggy address: [ 13.031381] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.031701] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.032231] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.032572] ^ [ 13.032761] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.033308] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.033599] ================================================================== [ 12.900181] ================================================================== [ 12.900500] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 12.900880] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 12.901193] [ 12.901307] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 12.901354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.901367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.901388] Call Trace: [ 12.901405] <TASK> [ 12.901421] dump_stack_lvl+0x73/0xb0 [ 12.901445] print_report+0xd1/0x650 [ 12.901468] ? __virt_addr_valid+0x1db/0x2d0 [ 12.901491] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 12.901517] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.901541] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 12.901567] kasan_report+0x141/0x180 [ 12.901590] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 12.901632] kasan_check_range+0x10c/0x1c0 [ 12.901657] __kasan_check_write+0x18/0x20 [ 12.901677] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 12.901703] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 12.901731] ? __kmalloc_cache_noprof+0x189/0x420 [ 12.901752] ? trace_hardirqs_on+0x37/0xe0 [ 12.901775] ? kasan_bitops_generic+0x92/0x1c0 [ 12.901798] kasan_bitops_generic+0x116/0x1c0 [ 12.901819] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 12.901840] ? __pfx_read_tsc+0x10/0x10 [ 12.901861] ? ktime_get_ts64+0x86/0x230 [ 12.901885] kunit_try_run_case+0x1a5/0x480 [ 12.901907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.901927] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.901951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.902034] ? __kthread_parkme+0x82/0x180 [ 12.902058] ? preempt_count_sub+0x50/0x80 [ 12.902082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.902104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.902128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.902153] kthread+0x337/0x6f0 [ 12.902173] ? trace_preempt_on+0x20/0xc0 [ 12.902194] ? __pfx_kthread+0x10/0x10 [ 12.902216] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.902238] ? calculate_sigpending+0x7b/0xa0 [ 12.902263] ? __pfx_kthread+0x10/0x10 [ 12.902284] ret_from_fork+0x116/0x1d0 [ 12.902303] ? __pfx_kthread+0x10/0x10 [ 12.902324] ret_from_fork_asm+0x1a/0x30 [ 12.902355] </TASK> [ 12.902365] [ 12.911221] Allocated by task 278: [ 12.911450] kasan_save_stack+0x45/0x70 [ 12.911617] kasan_save_track+0x18/0x40 [ 12.912044] kasan_save_alloc_info+0x3b/0x50 [ 12.912281] __kasan_kmalloc+0xb7/0xc0 [ 12.912469] __kmalloc_cache_noprof+0x189/0x420 [ 12.912675] kasan_bitops_generic+0x92/0x1c0 [ 12.912951] kunit_try_run_case+0x1a5/0x480 [ 12.913143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.913400] kthread+0x337/0x6f0 [ 12.913528] ret_from_fork+0x116/0x1d0 [ 12.913707] ret_from_fork_asm+0x1a/0x30 [ 12.913907] [ 12.914003] The buggy address belongs to the object at ffff888102856080 [ 12.914003] which belongs to the cache kmalloc-16 of size 16 [ 12.914538] The buggy address is located 8 bytes inside of [ 12.914538] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 12.915042] [ 12.915120] The buggy address belongs to the physical page: [ 12.915298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 12.915681] flags: 0x200000000000000(node=0|zone=2) [ 12.915923] page_type: f5(slab) [ 12.916093] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.916371] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.916606] page dumped because: kasan: bad access detected [ 12.917044] [ 12.917206] Memory state around the buggy address: [ 12.917443] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.917874] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 12.918214] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.918435] ^ [ 12.918618] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.919022] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.919347] ================================================================== [ 12.985006] ================================================================== [ 12.985342] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 12.985728] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 12.986005] [ 12.986090] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 12.986220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.986237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.986259] Call Trace: [ 12.986275] <TASK> [ 12.986290] dump_stack_lvl+0x73/0xb0 [ 12.986315] print_report+0xd1/0x650 [ 12.986337] ? __virt_addr_valid+0x1db/0x2d0 [ 12.986360] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 12.986386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.986409] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 12.986435] kasan_report+0x141/0x180 [ 12.986457] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 12.986490] kasan_check_range+0x10c/0x1c0 [ 12.986513] __kasan_check_write+0x18/0x20 [ 12.986539] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 12.986566] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 12.986593] ? __kmalloc_cache_noprof+0x189/0x420 [ 12.986627] ? trace_hardirqs_on+0x37/0xe0 [ 12.986649] ? kasan_bitops_generic+0x92/0x1c0 [ 12.986673] kasan_bitops_generic+0x116/0x1c0 [ 12.986694] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 12.986717] ? __pfx_read_tsc+0x10/0x10 [ 12.986737] ? ktime_get_ts64+0x86/0x230 [ 12.986761] kunit_try_run_case+0x1a5/0x480 [ 12.986782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.986802] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.986827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.986851] ? __kthread_parkme+0x82/0x180 [ 12.986872] ? preempt_count_sub+0x50/0x80 [ 12.986896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.986917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.986941] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.987028] kthread+0x337/0x6f0 [ 12.987050] ? trace_preempt_on+0x20/0xc0 [ 12.987072] ? __pfx_kthread+0x10/0x10 [ 12.987093] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.987116] ? calculate_sigpending+0x7b/0xa0 [ 12.987141] ? __pfx_kthread+0x10/0x10 [ 12.987163] ret_from_fork+0x116/0x1d0 [ 12.987181] ? __pfx_kthread+0x10/0x10 [ 12.987201] ret_from_fork_asm+0x1a/0x30 [ 12.987232] </TASK> [ 12.987242] [ 12.999279] Allocated by task 278: [ 12.999463] kasan_save_stack+0x45/0x70 [ 12.999831] kasan_save_track+0x18/0x40 [ 13.000038] kasan_save_alloc_info+0x3b/0x50 [ 13.000241] __kasan_kmalloc+0xb7/0xc0 [ 13.000423] __kmalloc_cache_noprof+0x189/0x420 [ 13.000643] kasan_bitops_generic+0x92/0x1c0 [ 13.001005] kunit_try_run_case+0x1a5/0x480 [ 13.001179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.001402] kthread+0x337/0x6f0 [ 13.001582] ret_from_fork+0x116/0x1d0 [ 13.001770] ret_from_fork_asm+0x1a/0x30 [ 13.002110] [ 13.002219] The buggy address belongs to the object at ffff888102856080 [ 13.002219] which belongs to the cache kmalloc-16 of size 16 [ 13.002683] The buggy address is located 8 bytes inside of [ 13.002683] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 13.003306] [ 13.003461] The buggy address belongs to the physical page: [ 13.003893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 13.004163] flags: 0x200000000000000(node=0|zone=2) [ 13.004592] page_type: f5(slab) [ 13.004758] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.005219] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.005495] page dumped because: kasan: bad access detected [ 13.006023] [ 13.006117] Memory state around the buggy address: [ 13.006583] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.006989] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.007232] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.007537] ^ [ 13.007728] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.008196] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.008472] ================================================================== [ 13.034406] ================================================================== [ 13.034735] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.035152] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 13.036065] [ 13.036177] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 13.036225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.036238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.036259] Call Trace: [ 13.036278] <TASK> [ 13.036294] dump_stack_lvl+0x73/0xb0 [ 13.036472] print_report+0xd1/0x650 [ 13.036496] ? __virt_addr_valid+0x1db/0x2d0 [ 13.036519] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.036545] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.036568] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.036595] kasan_report+0x141/0x180 [ 13.036632] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.036663] kasan_check_range+0x10c/0x1c0 [ 13.036688] __kasan_check_write+0x18/0x20 [ 13.036708] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.036734] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.036831] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.036853] ? trace_hardirqs_on+0x37/0xe0 [ 13.036874] ? kasan_bitops_generic+0x92/0x1c0 [ 13.036899] kasan_bitops_generic+0x116/0x1c0 [ 13.036920] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.036941] ? __pfx_read_tsc+0x10/0x10 [ 13.036962] ? ktime_get_ts64+0x86/0x230 [ 13.036990] kunit_try_run_case+0x1a5/0x480 [ 13.037012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.037032] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.037057] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.037082] ? __kthread_parkme+0x82/0x180 [ 13.037103] ? preempt_count_sub+0x50/0x80 [ 13.037126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.037147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.037172] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.037197] kthread+0x337/0x6f0 [ 13.037216] ? trace_preempt_on+0x20/0xc0 [ 13.037238] ? __pfx_kthread+0x10/0x10 [ 13.037260] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.037282] ? calculate_sigpending+0x7b/0xa0 [ 13.037306] ? __pfx_kthread+0x10/0x10 [ 13.037328] ret_from_fork+0x116/0x1d0 [ 13.037347] ? __pfx_kthread+0x10/0x10 [ 13.037369] ret_from_fork_asm+0x1a/0x30 [ 13.037399] </TASK> [ 13.037410] [ 13.049315] Allocated by task 278: [ 13.049568] kasan_save_stack+0x45/0x70 [ 13.049990] kasan_save_track+0x18/0x40 [ 13.050201] kasan_save_alloc_info+0x3b/0x50 [ 13.050370] __kasan_kmalloc+0xb7/0xc0 [ 13.050575] __kmalloc_cache_noprof+0x189/0x420 [ 13.051123] kasan_bitops_generic+0x92/0x1c0 [ 13.051406] kunit_try_run_case+0x1a5/0x480 [ 13.051683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.052067] kthread+0x337/0x6f0 [ 13.052249] ret_from_fork+0x116/0x1d0 [ 13.052428] ret_from_fork_asm+0x1a/0x30 [ 13.052593] [ 13.052702] The buggy address belongs to the object at ffff888102856080 [ 13.052702] which belongs to the cache kmalloc-16 of size 16 [ 13.053587] The buggy address is located 8 bytes inside of [ 13.053587] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 13.054171] [ 13.054600] The buggy address belongs to the physical page: [ 13.054836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 13.055404] flags: 0x200000000000000(node=0|zone=2) [ 13.055715] page_type: f5(slab) [ 13.055952] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.056493] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.056971] page dumped because: kasan: bad access detected [ 13.057225] [ 13.057304] Memory state around the buggy address: [ 13.057518] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.058245] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.058544] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.059038] ^ [ 13.059198] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.059627] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.060067] ================================================================== [ 12.940295] ================================================================== [ 12.940653] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 12.941238] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 12.941564] [ 12.941676] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 12.941723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.941757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.941778] Call Trace: [ 12.941792] <TASK> [ 12.941807] dump_stack_lvl+0x73/0xb0 [ 12.941917] print_report+0xd1/0x650 [ 12.941942] ? __virt_addr_valid+0x1db/0x2d0 [ 12.942071] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 12.942098] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.942121] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 12.942165] kasan_report+0x141/0x180 [ 12.942188] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 12.942218] kasan_check_range+0x10c/0x1c0 [ 12.942243] __kasan_check_write+0x18/0x20 [ 12.942263] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 12.942291] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 12.942318] ? __kmalloc_cache_noprof+0x189/0x420 [ 12.942340] ? trace_hardirqs_on+0x37/0xe0 [ 12.942361] ? kasan_bitops_generic+0x92/0x1c0 [ 12.942385] kasan_bitops_generic+0x116/0x1c0 [ 12.942425] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 12.942447] ? __pfx_read_tsc+0x10/0x10 [ 12.942468] ? ktime_get_ts64+0x86/0x230 [ 12.942492] kunit_try_run_case+0x1a5/0x480 [ 12.942513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.942540] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.942564] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.942589] ? __kthread_parkme+0x82/0x180 [ 12.942621] ? preempt_count_sub+0x50/0x80 [ 12.942644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.942665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.942689] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.942714] kthread+0x337/0x6f0 [ 12.942733] ? trace_preempt_on+0x20/0xc0 [ 12.942816] ? __pfx_kthread+0x10/0x10 [ 12.942838] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.942862] ? calculate_sigpending+0x7b/0xa0 [ 12.942884] ? __pfx_kthread+0x10/0x10 [ 12.942907] ret_from_fork+0x116/0x1d0 [ 12.942925] ? __pfx_kthread+0x10/0x10 [ 12.942947] ret_from_fork_asm+0x1a/0x30 [ 12.942977] </TASK> [ 12.942987] [ 12.955239] Allocated by task 278: [ 12.955505] kasan_save_stack+0x45/0x70 [ 12.955703] kasan_save_track+0x18/0x40 [ 12.956151] kasan_save_alloc_info+0x3b/0x50 [ 12.956404] __kasan_kmalloc+0xb7/0xc0 [ 12.956599] __kmalloc_cache_noprof+0x189/0x420 [ 12.957079] kasan_bitops_generic+0x92/0x1c0 [ 12.957381] kunit_try_run_case+0x1a5/0x480 [ 12.957558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.958192] kthread+0x337/0x6f0 [ 12.958359] ret_from_fork+0x116/0x1d0 [ 12.958559] ret_from_fork_asm+0x1a/0x30 [ 12.958752] [ 12.958863] The buggy address belongs to the object at ffff888102856080 [ 12.958863] which belongs to the cache kmalloc-16 of size 16 [ 12.959337] The buggy address is located 8 bytes inside of [ 12.959337] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 12.959957] [ 12.960070] The buggy address belongs to the physical page: [ 12.960288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 12.960604] flags: 0x200000000000000(node=0|zone=2) [ 12.960910] page_type: f5(slab) [ 12.961074] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.961511] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.961875] page dumped because: kasan: bad access detected [ 12.962085] [ 12.962183] Memory state around the buggy address: [ 12.962402] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.962682] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 12.963101] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.963386] ^ [ 12.963555] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.963830] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.964149] ================================================================== [ 12.919835] ================================================================== [ 12.920104] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 12.920444] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 12.920911] [ 12.921396] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 12.921443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.921456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.921476] Call Trace: [ 12.921487] <TASK> [ 12.921500] dump_stack_lvl+0x73/0xb0 [ 12.921526] print_report+0xd1/0x650 [ 12.921548] ? __virt_addr_valid+0x1db/0x2d0 [ 12.921571] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 12.921597] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.921636] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 12.921663] kasan_report+0x141/0x180 [ 12.921686] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 12.921717] kasan_check_range+0x10c/0x1c0 [ 12.921742] __kasan_check_write+0x18/0x20 [ 12.921775] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 12.921802] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 12.921829] ? __kmalloc_cache_noprof+0x189/0x420 [ 12.921850] ? trace_hardirqs_on+0x37/0xe0 [ 12.921872] ? kasan_bitops_generic+0x92/0x1c0 [ 12.921897] kasan_bitops_generic+0x116/0x1c0 [ 12.921919] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 12.921941] ? __pfx_read_tsc+0x10/0x10 [ 12.921962] ? ktime_get_ts64+0x86/0x230 [ 12.921986] kunit_try_run_case+0x1a5/0x480 [ 12.922007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.922027] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.922051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.922076] ? __kthread_parkme+0x82/0x180 [ 12.922095] ? preempt_count_sub+0x50/0x80 [ 12.922118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.922140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.922165] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.922190] kthread+0x337/0x6f0 [ 12.922209] ? trace_preempt_on+0x20/0xc0 [ 12.922231] ? __pfx_kthread+0x10/0x10 [ 12.922252] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.922275] ? calculate_sigpending+0x7b/0xa0 [ 12.922298] ? __pfx_kthread+0x10/0x10 [ 12.922320] ret_from_fork+0x116/0x1d0 [ 12.922338] ? __pfx_kthread+0x10/0x10 [ 12.922360] ret_from_fork_asm+0x1a/0x30 [ 12.922389] </TASK> [ 12.922399] [ 12.931091] Allocated by task 278: [ 12.931247] kasan_save_stack+0x45/0x70 [ 12.931431] kasan_save_track+0x18/0x40 [ 12.931572] kasan_save_alloc_info+0x3b/0x50 [ 12.931930] __kasan_kmalloc+0xb7/0xc0 [ 12.932201] __kmalloc_cache_noprof+0x189/0x420 [ 12.932428] kasan_bitops_generic+0x92/0x1c0 [ 12.932654] kunit_try_run_case+0x1a5/0x480 [ 12.932972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.933211] kthread+0x337/0x6f0 [ 12.933390] ret_from_fork+0x116/0x1d0 [ 12.933562] ret_from_fork_asm+0x1a/0x30 [ 12.933773] [ 12.933855] The buggy address belongs to the object at ffff888102856080 [ 12.933855] which belongs to the cache kmalloc-16 of size 16 [ 12.934218] The buggy address is located 8 bytes inside of [ 12.934218] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 12.934686] [ 12.934780] The buggy address belongs to the physical page: [ 12.935034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 12.935485] flags: 0x200000000000000(node=0|zone=2) [ 12.935951] page_type: f5(slab) [ 12.936122] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.936449] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.936770] page dumped because: kasan: bad access detected [ 12.937024] [ 12.937216] Memory state around the buggy address: [ 12.937383] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.937685] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 12.938195] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.938410] ^ [ 12.938544] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.939119] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.939535] ================================================================== [ 12.879714] ================================================================== [ 12.880366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 12.880745] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 12.881305] [ 12.881420] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 12.881467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.881480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.881502] Call Trace: [ 12.881514] <TASK> [ 12.881529] dump_stack_lvl+0x73/0xb0 [ 12.881556] print_report+0xd1/0x650 [ 12.881579] ? __virt_addr_valid+0x1db/0x2d0 [ 12.881602] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 12.881641] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.881665] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 12.881691] kasan_report+0x141/0x180 [ 12.881714] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 12.881746] kasan_check_range+0x10c/0x1c0 [ 12.881770] __kasan_check_write+0x18/0x20 [ 12.881856] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 12.881882] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 12.881909] ? __kmalloc_cache_noprof+0x189/0x420 [ 12.881932] ? trace_hardirqs_on+0x37/0xe0 [ 12.881954] ? kasan_bitops_generic+0x92/0x1c0 [ 12.881977] kasan_bitops_generic+0x116/0x1c0 [ 12.881998] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 12.882019] ? __pfx_read_tsc+0x10/0x10 [ 12.882040] ? ktime_get_ts64+0x86/0x230 [ 12.882064] kunit_try_run_case+0x1a5/0x480 [ 12.882086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.882106] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.882130] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.882155] ? __kthread_parkme+0x82/0x180 [ 12.882175] ? preempt_count_sub+0x50/0x80 [ 12.882199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.882220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.882244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.882269] kthread+0x337/0x6f0 [ 12.882288] ? trace_preempt_on+0x20/0xc0 [ 12.882311] ? __pfx_kthread+0x10/0x10 [ 12.882332] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.882355] ? calculate_sigpending+0x7b/0xa0 [ 12.882379] ? __pfx_kthread+0x10/0x10 [ 12.882400] ret_from_fork+0x116/0x1d0 [ 12.882419] ? __pfx_kthread+0x10/0x10 [ 12.882440] ret_from_fork_asm+0x1a/0x30 [ 12.882470] </TASK> [ 12.882481] [ 12.891243] Allocated by task 278: [ 12.891418] kasan_save_stack+0x45/0x70 [ 12.891571] kasan_save_track+0x18/0x40 [ 12.891726] kasan_save_alloc_info+0x3b/0x50 [ 12.892108] __kasan_kmalloc+0xb7/0xc0 [ 12.892320] __kmalloc_cache_noprof+0x189/0x420 [ 12.892542] kasan_bitops_generic+0x92/0x1c0 [ 12.892774] kunit_try_run_case+0x1a5/0x480 [ 12.892962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.893291] kthread+0x337/0x6f0 [ 12.893421] ret_from_fork+0x116/0x1d0 [ 12.893628] ret_from_fork_asm+0x1a/0x30 [ 12.893927] [ 12.894022] The buggy address belongs to the object at ffff888102856080 [ 12.894022] which belongs to the cache kmalloc-16 of size 16 [ 12.894472] The buggy address is located 8 bytes inside of [ 12.894472] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 12.895150] [ 12.895262] The buggy address belongs to the physical page: [ 12.895465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 12.895728] flags: 0x200000000000000(node=0|zone=2) [ 12.895899] page_type: f5(slab) [ 12.896062] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.896408] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.897073] page dumped because: kasan: bad access detected [ 12.897265] [ 12.897338] Memory state around the buggy address: [ 12.897500] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.897943] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 12.898281] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.898626] ^ [ 12.898899] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.899236] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.899532] ================================================================== [ 12.964513] ================================================================== [ 12.965100] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 12.965406] Write of size 8 at addr ffff888102856088 by task kunit_try_catch/278 [ 12.965755] [ 12.965917] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250529 #1 PREEMPT(voluntary) [ 12.965962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.965975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.965996] Call Trace: [ 12.966012] <TASK> [ 12.966025] dump_stack_lvl+0x73/0xb0 [ 12.966051] print_report+0xd1/0x650 [ 12.966073] ? __virt_addr_valid+0x1db/0x2d0 [ 12.966096] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 12.966122] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.966145] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 12.966172] kasan_report+0x141/0x180 [ 12.966195] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 12.966226] kasan_check_range+0x10c/0x1c0 [ 12.966250] __kasan_check_write+0x18/0x20 [ 12.966270] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 12.966296] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 12.966323] ? __kmalloc_cache_noprof+0x189/0x420 [ 12.966345] ? trace_hardirqs_on+0x37/0xe0 [ 12.966365] ? kasan_bitops_generic+0x92/0x1c0 [ 12.966390] kasan_bitops_generic+0x116/0x1c0 [ 12.966410] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 12.966431] ? __pfx_read_tsc+0x10/0x10 [ 12.966452] ? ktime_get_ts64+0x86/0x230 [ 12.966476] kunit_try_run_case+0x1a5/0x480 [ 12.966497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.966517] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.966547] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.966573] ? __kthread_parkme+0x82/0x180 [ 12.966594] ? preempt_count_sub+0x50/0x80 [ 12.966628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.966650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.966675] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.966700] kthread+0x337/0x6f0 [ 12.966719] ? trace_preempt_on+0x20/0xc0 [ 12.966742] ? __pfx_kthread+0x10/0x10 [ 12.966762] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.966785] ? calculate_sigpending+0x7b/0xa0 [ 12.966809] ? __pfx_kthread+0x10/0x10 [ 12.966830] ret_from_fork+0x116/0x1d0 [ 12.966850] ? __pfx_kthread+0x10/0x10 [ 12.966871] ret_from_fork_asm+0x1a/0x30 [ 12.966901] </TASK> [ 12.966912] [ 12.975493] Allocated by task 278: [ 12.975745] kasan_save_stack+0x45/0x70 [ 12.976142] kasan_save_track+0x18/0x40 [ 12.976323] kasan_save_alloc_info+0x3b/0x50 [ 12.976515] __kasan_kmalloc+0xb7/0xc0 [ 12.976712] __kmalloc_cache_noprof+0x189/0x420 [ 12.976968] kasan_bitops_generic+0x92/0x1c0 [ 12.977120] kunit_try_run_case+0x1a5/0x480 [ 12.977383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.977872] kthread+0x337/0x6f0 [ 12.978004] ret_from_fork+0x116/0x1d0 [ 12.978146] ret_from_fork_asm+0x1a/0x30 [ 12.978347] [ 12.978446] The buggy address belongs to the object at ffff888102856080 [ 12.978446] which belongs to the cache kmalloc-16 of size 16 [ 12.979076] The buggy address is located 8 bytes inside of [ 12.979076] allocated 9-byte region [ffff888102856080, ffff888102856089) [ 12.979489] [ 12.979562] The buggy address belongs to the physical page: [ 12.979753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856 [ 12.980098] flags: 0x200000000000000(node=0|zone=2) [ 12.980334] page_type: f5(slab) [ 12.980801] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 12.981463] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 12.981719] page dumped because: kasan: bad access detected [ 12.982099] [ 12.982203] Memory state around the buggy address: [ 12.982543] ffff888102855f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.982930] ffff888102856000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 12.983186] >ffff888102856080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.983447] ^ [ 12.983634] ffff888102856100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.984369] ffff888102856180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.984629] ==================================================================