Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-x86_64 |
[ 42.277191] ================================================================== [ 42.284306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.292463] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 42.299754] [ 42.301236] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 42.301289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.301308] Hardware name: WinLink E850-96 board (DT) [ 42.301328] Call trace: [ 42.301340] show_stack+0x20/0x38 (C) [ 42.301376] dump_stack_lvl+0x8c/0xd0 [ 42.301413] print_report+0x118/0x608 [ 42.301448] kasan_report+0xdc/0x128 [ 42.301479] __asan_report_load8_noabort+0x20/0x30 [ 42.301512] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 42.301547] kasan_bitops_generic+0x110/0x1c8 [ 42.301581] kunit_try_run_case+0x170/0x3f0 [ 42.301614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.301653] kthread+0x328/0x630 [ 42.301683] ret_from_fork+0x10/0x20 [ 42.301715] [ 42.370412] Allocated by task 305: [ 42.373798] kasan_save_stack+0x3c/0x68 [ 42.377617] kasan_save_track+0x20/0x40 [ 42.381437] kasan_save_alloc_info+0x40/0x58 [ 42.385690] __kasan_kmalloc+0xd4/0xd8 [ 42.389423] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.393937] kasan_bitops_generic+0xa0/0x1c8 [ 42.398190] kunit_try_run_case+0x170/0x3f0 [ 42.402356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.407825] kthread+0x328/0x630 [ 42.411037] ret_from_fork+0x10/0x20 [ 42.414596] [ 42.416071] The buggy address belongs to the object at ffff00080444cc20 [ 42.416071] which belongs to the cache kmalloc-16 of size 16 [ 42.428398] The buggy address is located 8 bytes inside of [ 42.428398] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 42.440638] [ 42.442113] The buggy address belongs to the physical page: [ 42.447669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 42.455657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.462165] page_type: f5(slab) [ 42.465299] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.473022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.480741] page dumped because: kasan: bad access detected [ 42.486296] [ 42.487772] Memory state around the buggy address: [ 42.492550] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.499754] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 42.506959] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.514160] ^ [ 42.518678] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.525883] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.533084] ================================================================== [ 42.807042] ================================================================== [ 42.814158] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.822316] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 42.829694] [ 42.831177] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 42.831228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.831246] Hardware name: WinLink E850-96 board (DT) [ 42.831264] Call trace: [ 42.831276] show_stack+0x20/0x38 (C) [ 42.831313] dump_stack_lvl+0x8c/0xd0 [ 42.831349] print_report+0x118/0x608 [ 42.831384] kasan_report+0xdc/0x128 [ 42.831415] kasan_check_range+0x100/0x1a8 [ 42.831452] __kasan_check_write+0x20/0x30 [ 42.831483] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 42.831518] kasan_bitops_generic+0x110/0x1c8 [ 42.831550] kunit_try_run_case+0x170/0x3f0 [ 42.831583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.831622] kthread+0x328/0x630 [ 42.831647] ret_from_fork+0x10/0x20 [ 42.831677] [ 42.903738] Allocated by task 305: [ 42.907124] kasan_save_stack+0x3c/0x68 [ 42.910943] kasan_save_track+0x20/0x40 [ 42.914762] kasan_save_alloc_info+0x40/0x58 [ 42.919015] __kasan_kmalloc+0xd4/0xd8 [ 42.922748] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.927262] kasan_bitops_generic+0xa0/0x1c8 [ 42.931515] kunit_try_run_case+0x170/0x3f0 [ 42.935682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.941150] kthread+0x328/0x630 [ 42.944362] ret_from_fork+0x10/0x20 [ 42.947921] [ 42.949397] The buggy address belongs to the object at ffff00080444cc20 [ 42.949397] which belongs to the cache kmalloc-16 of size 16 [ 42.961725] The buggy address is located 8 bytes inside of [ 42.961725] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 42.973963] [ 42.975439] The buggy address belongs to the physical page: [ 42.980994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 42.988981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.995490] page_type: f5(slab) [ 42.998624] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.006347] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.014066] page dumped because: kasan: bad access detected [ 43.019623] [ 43.021097] Memory state around the buggy address: [ 43.025875] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.033080] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 43.040285] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.047486] ^ [ 43.052003] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.059208] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.066409] ================================================================== [ 41.478615] ================================================================== [ 41.487792] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.495948] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 41.503325] [ 41.504811] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 41.504865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.504884] Hardware name: WinLink E850-96 board (DT) [ 41.504903] Call trace: [ 41.504918] show_stack+0x20/0x38 (C) [ 41.504956] dump_stack_lvl+0x8c/0xd0 [ 41.504996] print_report+0x118/0x608 [ 41.505036] kasan_report+0xdc/0x128 [ 41.505068] kasan_check_range+0x100/0x1a8 [ 41.505109] __kasan_check_write+0x20/0x30 [ 41.505138] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 41.505174] kasan_bitops_generic+0x110/0x1c8 [ 41.505208] kunit_try_run_case+0x170/0x3f0 [ 41.505247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.505287] kthread+0x328/0x630 [ 41.505315] ret_from_fork+0x10/0x20 [ 41.505354] [ 41.577369] Allocated by task 305: [ 41.580758] kasan_save_stack+0x3c/0x68 [ 41.584574] kasan_save_track+0x20/0x40 [ 41.588393] kasan_save_alloc_info+0x40/0x58 [ 41.592647] __kasan_kmalloc+0xd4/0xd8 [ 41.596379] __kmalloc_cache_noprof+0x15c/0x3c0 [ 41.600893] kasan_bitops_generic+0xa0/0x1c8 [ 41.605146] kunit_try_run_case+0x170/0x3f0 [ 41.609313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.614782] kthread+0x328/0x630 [ 41.617993] ret_from_fork+0x10/0x20 [ 41.621552] [ 41.623030] The buggy address belongs to the object at ffff00080444cc20 [ 41.623030] which belongs to the cache kmalloc-16 of size 16 [ 41.635357] The buggy address is located 8 bytes inside of [ 41.635357] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 41.647593] [ 41.649074] The buggy address belongs to the physical page: [ 41.654629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 41.662615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.669123] page_type: f5(slab) [ 41.672260] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.679978] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.687699] page dumped because: kasan: bad access detected [ 41.693254] [ 41.694728] Memory state around the buggy address: [ 41.699511] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 41.706711] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 41.713917] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.721117] ^ [ 41.725634] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.732839] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.740040] ================================================================== [ 42.540388] ================================================================== [ 42.547496] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.555653] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 42.563031] [ 42.564513] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 42.564565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.564582] Hardware name: WinLink E850-96 board (DT) [ 42.564602] Call trace: [ 42.564614] show_stack+0x20/0x38 (C) [ 42.564648] dump_stack_lvl+0x8c/0xd0 [ 42.564685] print_report+0x118/0x608 [ 42.564720] kasan_report+0xdc/0x128 [ 42.564752] kasan_check_range+0x100/0x1a8 [ 42.564786] __kasan_check_write+0x20/0x30 [ 42.564817] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 42.564853] kasan_bitops_generic+0x110/0x1c8 [ 42.564884] kunit_try_run_case+0x170/0x3f0 [ 42.564919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.564957] kthread+0x328/0x630 [ 42.564982] ret_from_fork+0x10/0x20 [ 42.565015] [ 42.637075] Allocated by task 305: [ 42.640460] kasan_save_stack+0x3c/0x68 [ 42.644280] kasan_save_track+0x20/0x40 [ 42.648100] kasan_save_alloc_info+0x40/0x58 [ 42.652353] __kasan_kmalloc+0xd4/0xd8 [ 42.656086] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.660599] kasan_bitops_generic+0xa0/0x1c8 [ 42.664853] kunit_try_run_case+0x170/0x3f0 [ 42.669019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.674488] kthread+0x328/0x630 [ 42.677700] ret_from_fork+0x10/0x20 [ 42.681259] [ 42.682734] The buggy address belongs to the object at ffff00080444cc20 [ 42.682734] which belongs to the cache kmalloc-16 of size 16 [ 42.695061] The buggy address is located 8 bytes inside of [ 42.695061] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 42.707300] [ 42.708775] The buggy address belongs to the physical page: [ 42.714332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 42.722319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.728827] page_type: f5(slab) [ 42.731962] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.739685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.747403] page dumped because: kasan: bad access detected [ 42.752960] [ 42.754434] Memory state around the buggy address: [ 42.759213] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.766417] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 42.773622] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.780823] ^ [ 42.785341] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.792546] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.799746] ================================================================== [ 41.747347] ================================================================== [ 41.754454] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.762609] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 41.769901] [ 41.771387] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 41.771444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.771463] Hardware name: WinLink E850-96 board (DT) [ 41.771483] Call trace: [ 41.771497] show_stack+0x20/0x38 (C) [ 41.771530] dump_stack_lvl+0x8c/0xd0 [ 41.771568] print_report+0x118/0x608 [ 41.771605] kasan_report+0xdc/0x128 [ 41.771638] __asan_report_load8_noabort+0x20/0x30 [ 41.771671] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 41.771710] kasan_bitops_generic+0x110/0x1c8 [ 41.771744] kunit_try_run_case+0x170/0x3f0 [ 41.771780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.771822] kthread+0x328/0x630 [ 41.771848] ret_from_fork+0x10/0x20 [ 41.771883] [ 41.840559] Allocated by task 305: [ 41.843947] kasan_save_stack+0x3c/0x68 [ 41.847764] kasan_save_track+0x20/0x40 [ 41.851584] kasan_save_alloc_info+0x40/0x58 [ 41.855837] __kasan_kmalloc+0xd4/0xd8 [ 41.859570] __kmalloc_cache_noprof+0x15c/0x3c0 [ 41.864083] kasan_bitops_generic+0xa0/0x1c8 [ 41.868337] kunit_try_run_case+0x170/0x3f0 [ 41.872503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.877972] kthread+0x328/0x630 [ 41.881184] ret_from_fork+0x10/0x20 [ 41.884743] [ 41.886218] The buggy address belongs to the object at ffff00080444cc20 [ 41.886218] which belongs to the cache kmalloc-16 of size 16 [ 41.898548] The buggy address is located 8 bytes inside of [ 41.898548] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 41.910784] [ 41.912260] The buggy address belongs to the physical page: [ 41.917816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 41.925803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.932313] page_type: f5(slab) [ 41.935446] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 41.943169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.950887] page dumped because: kasan: bad access detected [ 41.956444] [ 41.957918] Memory state around the buggy address: [ 41.962696] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 41.969902] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 41.977108] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 41.984307] ^ [ 41.988825] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.996030] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.003231] ================================================================== [ 42.010615] ================================================================== [ 42.017645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 42.025800] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 42.033178] [ 42.034660] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 42.034715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.034734] Hardware name: WinLink E850-96 board (DT) [ 42.034753] Call trace: [ 42.034763] show_stack+0x20/0x38 (C) [ 42.034800] dump_stack_lvl+0x8c/0xd0 [ 42.034840] print_report+0x118/0x608 [ 42.034876] kasan_report+0xdc/0x128 [ 42.034908] kasan_check_range+0x100/0x1a8 [ 42.034946] __kasan_check_write+0x20/0x30 [ 42.034976] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 42.035015] kasan_bitops_generic+0x110/0x1c8 [ 42.035046] kunit_try_run_case+0x170/0x3f0 [ 42.035079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.035120] kthread+0x328/0x630 [ 42.035146] ret_from_fork+0x10/0x20 [ 42.035181] [ 42.107222] Allocated by task 305: [ 42.110609] kasan_save_stack+0x3c/0x68 [ 42.114427] kasan_save_track+0x20/0x40 [ 42.118246] kasan_save_alloc_info+0x40/0x58 [ 42.122500] __kasan_kmalloc+0xd4/0xd8 [ 42.126232] __kmalloc_cache_noprof+0x15c/0x3c0 [ 42.130746] kasan_bitops_generic+0xa0/0x1c8 [ 42.134999] kunit_try_run_case+0x170/0x3f0 [ 42.139166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.144635] kthread+0x328/0x630 [ 42.147846] ret_from_fork+0x10/0x20 [ 42.151406] [ 42.152882] The buggy address belongs to the object at ffff00080444cc20 [ 42.152882] which belongs to the cache kmalloc-16 of size 16 [ 42.165208] The buggy address is located 8 bytes inside of [ 42.165208] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 42.177447] [ 42.178923] The buggy address belongs to the physical page: [ 42.184479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 42.192466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.198974] page_type: f5(slab) [ 42.202108] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.209831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.217550] page dumped because: kasan: bad access detected [ 42.223107] [ 42.224581] Memory state around the buggy address: [ 42.229362] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.236564] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 42.243768] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 42.250970] ^ [ 42.255487] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.262692] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.269893] ================================================================== [ 43.073711] ================================================================== [ 43.080821] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 43.088978] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 43.096270] [ 43.097753] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 43.097804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.097821] Hardware name: WinLink E850-96 board (DT) [ 43.097844] Call trace: [ 43.097856] show_stack+0x20/0x38 (C) [ 43.097890] dump_stack_lvl+0x8c/0xd0 [ 43.097926] print_report+0x118/0x608 [ 43.097961] kasan_report+0xdc/0x128 [ 43.097997] __asan_report_load8_noabort+0x20/0x30 [ 43.098029] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 43.098065] kasan_bitops_generic+0x110/0x1c8 [ 43.098097] kunit_try_run_case+0x170/0x3f0 [ 43.098129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.098167] kthread+0x328/0x630 [ 43.098193] ret_from_fork+0x10/0x20 [ 43.098225] [ 43.166928] Allocated by task 305: [ 43.170314] kasan_save_stack+0x3c/0x68 [ 43.174133] kasan_save_track+0x20/0x40 [ 43.177952] kasan_save_alloc_info+0x40/0x58 [ 43.182206] __kasan_kmalloc+0xd4/0xd8 [ 43.185939] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.190452] kasan_bitops_generic+0xa0/0x1c8 [ 43.194706] kunit_try_run_case+0x170/0x3f0 [ 43.198872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.204341] kthread+0x328/0x630 [ 43.207553] ret_from_fork+0x10/0x20 [ 43.211111] [ 43.212589] The buggy address belongs to the object at ffff00080444cc20 [ 43.212589] which belongs to the cache kmalloc-16 of size 16 [ 43.224914] The buggy address is located 8 bytes inside of [ 43.224914] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 43.237153] [ 43.238629] The buggy address belongs to the physical page: [ 43.244185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 43.252170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.258680] page_type: f5(slab) [ 43.261813] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.269538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.277256] page dumped because: kasan: bad access detected [ 43.282813] [ 43.284288] Memory state around the buggy address: [ 43.289067] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.296270] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 43.303475] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.310676] ^ [ 43.315194] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.322398] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.329600] ================================================================== [ 43.603562] ================================================================== [ 43.610675] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.618831] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 43.626210] [ 43.627691] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 43.627740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.627758] Hardware name: WinLink E850-96 board (DT) [ 43.627775] Call trace: [ 43.627788] show_stack+0x20/0x38 (C) [ 43.627824] dump_stack_lvl+0x8c/0xd0 [ 43.627857] print_report+0x118/0x608 [ 43.627890] kasan_report+0xdc/0x128 [ 43.627922] kasan_check_range+0x100/0x1a8 [ 43.627958] __kasan_check_write+0x20/0x30 [ 43.627987] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 43.628023] kasan_bitops_generic+0x110/0x1c8 [ 43.628057] kunit_try_run_case+0x170/0x3f0 [ 43.628089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.628128] kthread+0x328/0x630 [ 43.628156] ret_from_fork+0x10/0x20 [ 43.628189] [ 43.700254] Allocated by task 305: [ 43.703640] kasan_save_stack+0x3c/0x68 [ 43.707459] kasan_save_track+0x20/0x40 [ 43.711278] kasan_save_alloc_info+0x40/0x58 [ 43.715531] __kasan_kmalloc+0xd4/0xd8 [ 43.719264] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.723778] kasan_bitops_generic+0xa0/0x1c8 [ 43.728031] kunit_try_run_case+0x170/0x3f0 [ 43.732199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.737667] kthread+0x328/0x630 [ 43.740878] ret_from_fork+0x10/0x20 [ 43.744437] [ 43.745912] The buggy address belongs to the object at ffff00080444cc20 [ 43.745912] which belongs to the cache kmalloc-16 of size 16 [ 43.758240] The buggy address is located 8 bytes inside of [ 43.758240] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 43.770478] [ 43.771954] The buggy address belongs to the physical page: [ 43.777510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 43.785495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.792006] page_type: f5(slab) [ 43.795139] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.802863] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.810582] page dumped because: kasan: bad access detected [ 43.816139] [ 43.817613] Memory state around the buggy address: [ 43.822391] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.829596] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 43.836800] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.844002] ^ [ 43.848519] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.855724] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.862925] ================================================================== [ 43.336895] ================================================================== [ 43.344012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.352169] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 43.359547] [ 43.361030] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 43.361079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.361098] Hardware name: WinLink E850-96 board (DT) [ 43.361118] Call trace: [ 43.361130] show_stack+0x20/0x38 (C) [ 43.361166] dump_stack_lvl+0x8c/0xd0 [ 43.361200] print_report+0x118/0x608 [ 43.361236] kasan_report+0xdc/0x128 [ 43.361269] kasan_check_range+0x100/0x1a8 [ 43.361307] __kasan_check_write+0x20/0x30 [ 43.361337] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 43.361372] kasan_bitops_generic+0x110/0x1c8 [ 43.361405] kunit_try_run_case+0x170/0x3f0 [ 43.361438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.361475] kthread+0x328/0x630 [ 43.361504] ret_from_fork+0x10/0x20 [ 43.361538] [ 43.433591] Allocated by task 305: [ 43.436977] kasan_save_stack+0x3c/0x68 [ 43.440795] kasan_save_track+0x20/0x40 [ 43.444615] kasan_save_alloc_info+0x40/0x58 [ 43.448869] __kasan_kmalloc+0xd4/0xd8 [ 43.452601] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.457115] kasan_bitops_generic+0xa0/0x1c8 [ 43.461369] kunit_try_run_case+0x170/0x3f0 [ 43.465535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.471004] kthread+0x328/0x630 [ 43.474216] ret_from_fork+0x10/0x20 [ 43.477774] [ 43.479250] The buggy address belongs to the object at ffff00080444cc20 [ 43.479250] which belongs to the cache kmalloc-16 of size 16 [ 43.491577] The buggy address is located 8 bytes inside of [ 43.491577] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 43.503816] [ 43.505291] The buggy address belongs to the physical page: [ 43.510847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 43.518835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.525343] page_type: f5(slab) [ 43.528479] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.536200] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.543919] page dumped because: kasan: bad access detected [ 43.549474] [ 43.550950] Memory state around the buggy address: [ 43.555728] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.562933] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 43.570138] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 43.577339] ^ [ 43.581856] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.589061] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.596262] ================================================================== [ 43.870278] ================================================================== [ 43.877340] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.885494] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 43.892785] [ 43.894268] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 43.894316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.894334] Hardware name: WinLink E850-96 board (DT) [ 43.894354] Call trace: [ 43.894368] show_stack+0x20/0x38 (C) [ 43.894402] dump_stack_lvl+0x8c/0xd0 [ 43.894437] print_report+0x118/0x608 [ 43.894472] kasan_report+0xdc/0x128 [ 43.894506] __asan_report_load8_noabort+0x20/0x30 [ 43.894535] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 43.894571] kasan_bitops_generic+0x110/0x1c8 [ 43.894604] kunit_try_run_case+0x170/0x3f0 [ 43.894637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.894677] kthread+0x328/0x630 [ 43.894706] ret_from_fork+0x10/0x20 [ 43.894737] [ 43.963444] Allocated by task 305: [ 43.966830] kasan_save_stack+0x3c/0x68 [ 43.970649] kasan_save_track+0x20/0x40 [ 43.974468] kasan_save_alloc_info+0x40/0x58 [ 43.978722] __kasan_kmalloc+0xd4/0xd8 [ 43.982454] __kmalloc_cache_noprof+0x15c/0x3c0 [ 43.986968] kasan_bitops_generic+0xa0/0x1c8 [ 43.991222] kunit_try_run_case+0x170/0x3f0 [ 43.995388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.000857] kthread+0x328/0x630 [ 44.004069] ret_from_fork+0x10/0x20 [ 44.007628] [ 44.009103] The buggy address belongs to the object at ffff00080444cc20 [ 44.009103] which belongs to the cache kmalloc-16 of size 16 [ 44.021430] The buggy address is located 8 bytes inside of [ 44.021430] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 44.033669] [ 44.035145] The buggy address belongs to the physical page: [ 44.040701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 44.048687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.055196] page_type: f5(slab) [ 44.058329] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.066054] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.073773] page dumped because: kasan: bad access detected [ 44.079329] [ 44.080803] Memory state around the buggy address: [ 44.085583] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.092786] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 44.099991] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.107192] ^ [ 44.111709] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.118914] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.126116] ==================================================================
[ 21.550845] ================================================================== [ 21.551663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.552141] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 21.553625] [ 21.553819] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 21.553922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.553986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.554035] Call Trace: [ 21.554072] <TASK> [ 21.554109] dump_stack_lvl+0x73/0xb0 [ 21.554168] print_report+0xd1/0x650 [ 21.554221] ? __virt_addr_valid+0x1db/0x2d0 [ 21.554286] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.554346] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.554398] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.554458] kasan_report+0x141/0x180 [ 21.554510] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.554576] kasan_check_range+0x10c/0x1c0 [ 21.554633] __kasan_check_write+0x18/0x20 [ 21.554683] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.554745] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.554806] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.554853] ? trace_hardirqs_on+0x37/0xe0 [ 21.554904] ? kasan_bitops_generic+0x92/0x1c0 [ 21.557131] kasan_bitops_generic+0x116/0x1c0 [ 21.558068] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.558145] ? __pfx_read_tsc+0x10/0x10 [ 21.558215] ? ktime_get_ts64+0x86/0x230 [ 21.558332] kunit_try_run_case+0x1a5/0x480 [ 21.558422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.558990] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.559072] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.559270] ? __kthread_parkme+0x82/0x180 [ 21.559336] ? preempt_count_sub+0x50/0x80 [ 21.559401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.559450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.559511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.559577] kthread+0x337/0x6f0 [ 21.559632] ? trace_preempt_on+0x20/0xc0 [ 21.559725] ? __pfx_kthread+0x10/0x10 [ 21.559777] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.559830] ? calculate_sigpending+0x7b/0xa0 [ 21.559883] ? __pfx_kthread+0x10/0x10 [ 21.559930] ret_from_fork+0x116/0x1d0 [ 21.559995] ? __pfx_kthread+0x10/0x10 [ 21.560042] ret_from_fork_asm+0x1a/0x30 [ 21.560111] </TASK> [ 21.560136] [ 21.575789] Allocated by task 278: [ 21.576051] kasan_save_stack+0x45/0x70 [ 21.576444] kasan_save_track+0x18/0x40 [ 21.576792] kasan_save_alloc_info+0x3b/0x50 [ 21.577233] __kasan_kmalloc+0xb7/0xc0 [ 21.577618] __kmalloc_cache_noprof+0x189/0x420 [ 21.578282] kasan_bitops_generic+0x92/0x1c0 [ 21.578627] kunit_try_run_case+0x1a5/0x480 [ 21.579061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.579680] kthread+0x337/0x6f0 [ 21.579914] ret_from_fork+0x116/0x1d0 [ 21.580282] ret_from_fork_asm+0x1a/0x30 [ 21.580719] [ 21.580864] The buggy address belongs to the object at ffff888100fa0f20 [ 21.580864] which belongs to the cache kmalloc-16 of size 16 [ 21.581537] The buggy address is located 8 bytes inside of [ 21.581537] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 21.582482] [ 21.582728] The buggy address belongs to the physical page: [ 21.583626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 21.584334] flags: 0x200000000000000(node=0|zone=2) [ 21.584623] page_type: f5(slab) [ 21.584858] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.585253] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.585623] page dumped because: kasan: bad access detected [ 21.585908] [ 21.586263] Memory state around the buggy address: [ 21.586534] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.587016] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.587879] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 21.588794] ^ [ 21.589387] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.589784] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 21.590587] ================================================================== [ 21.703694] ================================================================== [ 21.704666] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.705221] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 21.706959] [ 21.707228] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 21.707363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.707405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.707464] Call Trace: [ 21.707493] <TASK> [ 21.707516] dump_stack_lvl+0x73/0xb0 [ 21.707556] print_report+0xd1/0x650 [ 21.707628] ? __virt_addr_valid+0x1db/0x2d0 [ 21.707988] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.708084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.708130] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.708199] kasan_report+0x141/0x180 [ 21.708289] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.708363] kasan_check_range+0x10c/0x1c0 [ 21.708398] __kasan_check_write+0x18/0x20 [ 21.708427] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.708465] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.708503] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.708532] ? trace_hardirqs_on+0x37/0xe0 [ 21.708565] ? kasan_bitops_generic+0x92/0x1c0 [ 21.708598] kasan_bitops_generic+0x116/0x1c0 [ 21.708625] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.708670] ? __pfx_read_tsc+0x10/0x10 [ 21.708719] ? ktime_get_ts64+0x86/0x230 [ 21.708754] kunit_try_run_case+0x1a5/0x480 [ 21.708786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.708813] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.708849] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.708885] ? __kthread_parkme+0x82/0x180 [ 21.708914] ? preempt_count_sub+0x50/0x80 [ 21.708977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.709010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.709047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.709082] kthread+0x337/0x6f0 [ 21.709111] ? trace_preempt_on+0x20/0xc0 [ 21.709141] ? __pfx_kthread+0x10/0x10 [ 21.709189] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.709268] ? calculate_sigpending+0x7b/0xa0 [ 21.709317] ? __pfx_kthread+0x10/0x10 [ 21.709347] ret_from_fork+0x116/0x1d0 [ 21.709373] ? __pfx_kthread+0x10/0x10 [ 21.709402] ret_from_fork_asm+0x1a/0x30 [ 21.709447] </TASK> [ 21.709463] [ 21.735880] Allocated by task 278: [ 21.736979] kasan_save_stack+0x45/0x70 [ 21.737327] kasan_save_track+0x18/0x40 [ 21.737641] kasan_save_alloc_info+0x3b/0x50 [ 21.737844] __kasan_kmalloc+0xb7/0xc0 [ 21.738025] __kmalloc_cache_noprof+0x189/0x420 [ 21.738283] kasan_bitops_generic+0x92/0x1c0 [ 21.740103] kunit_try_run_case+0x1a5/0x480 [ 21.740892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.741305] kthread+0x337/0x6f0 [ 21.742065] ret_from_fork+0x116/0x1d0 [ 21.742905] ret_from_fork_asm+0x1a/0x30 [ 21.743326] [ 21.743943] The buggy address belongs to the object at ffff888100fa0f20 [ 21.743943] which belongs to the cache kmalloc-16 of size 16 [ 21.745242] The buggy address is located 8 bytes inside of [ 21.745242] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 21.746235] [ 21.746491] The buggy address belongs to the physical page: [ 21.747801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 21.748748] flags: 0x200000000000000(node=0|zone=2) [ 21.749707] page_type: f5(slab) [ 21.750106] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.751107] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.752182] page dumped because: kasan: bad access detected [ 21.752953] [ 21.753764] Memory state around the buggy address: [ 21.754176] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.754791] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.755642] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 21.756437] ^ [ 21.756644] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.756916] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 21.757423] ================================================================== [ 21.759893] ================================================================== [ 21.760511] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.761519] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 21.762721] [ 21.762912] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 21.763002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.763022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.763055] Call Trace: [ 21.763076] <TASK> [ 21.763097] dump_stack_lvl+0x73/0xb0 [ 21.763135] print_report+0xd1/0x650 [ 21.763182] ? __virt_addr_valid+0x1db/0x2d0 [ 21.763237] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.763279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.763311] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.763349] kasan_report+0x141/0x180 [ 21.763381] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.763425] kasan_check_range+0x10c/0x1c0 [ 21.763459] __kasan_check_write+0x18/0x20 [ 21.763487] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.763526] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.763566] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.763594] ? trace_hardirqs_on+0x37/0xe0 [ 21.763626] ? kasan_bitops_generic+0x92/0x1c0 [ 21.763677] kasan_bitops_generic+0x116/0x1c0 [ 21.763721] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.763753] ? __pfx_read_tsc+0x10/0x10 [ 21.763785] ? ktime_get_ts64+0x86/0x230 [ 21.763820] kunit_try_run_case+0x1a5/0x480 [ 21.763851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.763877] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.763913] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.764004] ? __kthread_parkme+0x82/0x180 [ 21.764078] ? preempt_count_sub+0x50/0x80 [ 21.764630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.764695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.764736] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.764772] kthread+0x337/0x6f0 [ 21.764801] ? trace_preempt_on+0x20/0xc0 [ 21.764831] ? __pfx_kthread+0x10/0x10 [ 21.764861] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.764894] ? calculate_sigpending+0x7b/0xa0 [ 21.764953] ? __pfx_kthread+0x10/0x10 [ 21.764986] ret_from_fork+0x116/0x1d0 [ 21.765011] ? __pfx_kthread+0x10/0x10 [ 21.765042] ret_from_fork_asm+0x1a/0x30 [ 21.765087] </TASK> [ 21.765102] [ 21.789767] Allocated by task 278: [ 21.791051] kasan_save_stack+0x45/0x70 [ 21.791540] kasan_save_track+0x18/0x40 [ 21.791874] kasan_save_alloc_info+0x3b/0x50 [ 21.793070] __kasan_kmalloc+0xb7/0xc0 [ 21.793795] __kmalloc_cache_noprof+0x189/0x420 [ 21.794171] kasan_bitops_generic+0x92/0x1c0 [ 21.794908] kunit_try_run_case+0x1a5/0x480 [ 21.795788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.796396] kthread+0x337/0x6f0 [ 21.796689] ret_from_fork+0x116/0x1d0 [ 21.797022] ret_from_fork_asm+0x1a/0x30 [ 21.797703] [ 21.797873] The buggy address belongs to the object at ffff888100fa0f20 [ 21.797873] which belongs to the cache kmalloc-16 of size 16 [ 21.799609] The buggy address is located 8 bytes inside of [ 21.799609] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 21.800603] [ 21.801008] The buggy address belongs to the physical page: [ 21.801828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 21.802893] flags: 0x200000000000000(node=0|zone=2) [ 21.803235] page_type: f5(slab) [ 21.803956] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.804530] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.805622] page dumped because: kasan: bad access detected [ 21.806010] [ 21.806347] Memory state around the buggy address: [ 21.807081] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.807898] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.808504] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 21.809990] ^ [ 21.812032] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.812981] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 21.813634] ================================================================== [ 21.814593] ================================================================== [ 21.816142] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.818423] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 21.819045] [ 21.819385] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 21.819496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.819530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.819584] Call Trace: [ 21.819625] <TASK> [ 21.819707] dump_stack_lvl+0x73/0xb0 [ 21.819786] print_report+0xd1/0x650 [ 21.819859] ? __virt_addr_valid+0x1db/0x2d0 [ 21.819966] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.820059] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.820143] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.820248] kasan_report+0x141/0x180 [ 21.820332] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.820430] kasan_check_range+0x10c/0x1c0 [ 21.820517] __kasan_check_write+0x18/0x20 [ 21.820581] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.820654] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.820737] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.820815] ? trace_hardirqs_on+0x37/0xe0 [ 21.820894] ? kasan_bitops_generic+0x92/0x1c0 [ 21.821782] kasan_bitops_generic+0x116/0x1c0 [ 21.821839] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.821895] ? __pfx_read_tsc+0x10/0x10 [ 21.821984] ? ktime_get_ts64+0x86/0x230 [ 21.822049] kunit_try_run_case+0x1a5/0x480 [ 21.822104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.822297] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.822392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.822474] ? __kthread_parkme+0x82/0x180 [ 21.822534] ? preempt_count_sub+0x50/0x80 [ 21.822614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.822880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.822972] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.823043] kthread+0x337/0x6f0 [ 21.823099] ? trace_preempt_on+0x20/0xc0 [ 21.823283] ? __pfx_kthread+0x10/0x10 [ 21.823349] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.823405] ? calculate_sigpending+0x7b/0xa0 [ 21.823460] ? __pfx_kthread+0x10/0x10 [ 21.823515] ret_from_fork+0x116/0x1d0 [ 21.823569] ? __pfx_kthread+0x10/0x10 [ 21.823621] ret_from_fork_asm+0x1a/0x30 [ 21.823738] </TASK> [ 21.823767] [ 21.847346] Allocated by task 278: [ 21.847740] kasan_save_stack+0x45/0x70 [ 21.848199] kasan_save_track+0x18/0x40 [ 21.848604] kasan_save_alloc_info+0x3b/0x50 [ 21.849351] __kasan_kmalloc+0xb7/0xc0 [ 21.850077] __kmalloc_cache_noprof+0x189/0x420 [ 21.850693] kasan_bitops_generic+0x92/0x1c0 [ 21.851302] kunit_try_run_case+0x1a5/0x480 [ 21.852116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.853153] kthread+0x337/0x6f0 [ 21.853805] ret_from_fork+0x116/0x1d0 [ 21.854193] ret_from_fork_asm+0x1a/0x30 [ 21.854920] [ 21.855701] The buggy address belongs to the object at ffff888100fa0f20 [ 21.855701] which belongs to the cache kmalloc-16 of size 16 [ 21.856718] The buggy address is located 8 bytes inside of [ 21.856718] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 21.858453] [ 21.858666] The buggy address belongs to the physical page: [ 21.859362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 21.860706] flags: 0x200000000000000(node=0|zone=2) [ 21.861152] page_type: f5(slab) [ 21.861948] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.862901] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.863496] page dumped because: kasan: bad access detected [ 21.863994] [ 21.864227] Memory state around the buggy address: [ 21.864675] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.866008] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.866804] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 21.867542] ^ [ 21.868322] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.869036] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 21.870160] ================================================================== [ 21.647917] ================================================================== [ 21.648636] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.649785] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 21.650634] [ 21.650923] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 21.651079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.651120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.651220] Call Trace: [ 21.651278] <TASK> [ 21.651330] dump_stack_lvl+0x73/0xb0 [ 21.651422] print_report+0xd1/0x650 [ 21.651506] ? __virt_addr_valid+0x1db/0x2d0 [ 21.651874] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.651920] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.652007] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.652096] kasan_report+0x141/0x180 [ 21.652221] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.652322] kasan_check_range+0x10c/0x1c0 [ 21.652411] __kasan_check_write+0x18/0x20 [ 21.652609] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.652717] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.652792] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.652824] ? trace_hardirqs_on+0x37/0xe0 [ 21.652857] ? kasan_bitops_generic+0x92/0x1c0 [ 21.652893] kasan_bitops_generic+0x116/0x1c0 [ 21.652924] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.652986] ? __pfx_read_tsc+0x10/0x10 [ 21.653019] ? ktime_get_ts64+0x86/0x230 [ 21.653055] kunit_try_run_case+0x1a5/0x480 [ 21.653088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.653117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.653154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.653268] ? __kthread_parkme+0x82/0x180 [ 21.653315] ? preempt_count_sub+0x50/0x80 [ 21.653350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.653380] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.653416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.653452] kthread+0x337/0x6f0 [ 21.653479] ? trace_preempt_on+0x20/0xc0 [ 21.653511] ? __pfx_kthread+0x10/0x10 [ 21.653539] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.653572] ? calculate_sigpending+0x7b/0xa0 [ 21.653606] ? __pfx_kthread+0x10/0x10 [ 21.653636] ret_from_fork+0x116/0x1d0 [ 21.653706] ? __pfx_kthread+0x10/0x10 [ 21.653743] ret_from_fork_asm+0x1a/0x30 [ 21.653785] </TASK> [ 21.653800] [ 21.679431] Allocated by task 278: [ 21.679721] kasan_save_stack+0x45/0x70 [ 21.680584] kasan_save_track+0x18/0x40 [ 21.681147] kasan_save_alloc_info+0x3b/0x50 [ 21.681861] __kasan_kmalloc+0xb7/0xc0 [ 21.682732] __kmalloc_cache_noprof+0x189/0x420 [ 21.683110] kasan_bitops_generic+0x92/0x1c0 [ 21.684289] kunit_try_run_case+0x1a5/0x480 [ 21.684632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.685084] kthread+0x337/0x6f0 [ 21.685962] ret_from_fork+0x116/0x1d0 [ 21.686970] ret_from_fork_asm+0x1a/0x30 [ 21.687292] [ 21.687424] The buggy address belongs to the object at ffff888100fa0f20 [ 21.687424] which belongs to the cache kmalloc-16 of size 16 [ 21.688795] The buggy address is located 8 bytes inside of [ 21.688795] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 21.689520] [ 21.689780] The buggy address belongs to the physical page: [ 21.691137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 21.692058] flags: 0x200000000000000(node=0|zone=2) [ 21.692753] page_type: f5(slab) [ 21.693786] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.694559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.695431] page dumped because: kasan: bad access detected [ 21.696281] [ 21.696614] Memory state around the buggy address: [ 21.697590] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.698731] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.699240] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 21.700197] ^ [ 21.700656] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.701652] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 21.702870] ================================================================== [ 21.496179] ================================================================== [ 21.497586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.498482] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 21.499173] [ 21.499612] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 21.499750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.499794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.499860] Call Trace: [ 21.499903] <TASK> [ 21.499976] dump_stack_lvl+0x73/0xb0 [ 21.500067] print_report+0xd1/0x650 [ 21.500320] ? __virt_addr_valid+0x1db/0x2d0 [ 21.500414] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.500498] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.500572] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.500615] kasan_report+0x141/0x180 [ 21.500651] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.500737] kasan_check_range+0x10c/0x1c0 [ 21.500773] __kasan_check_write+0x18/0x20 [ 21.500801] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.500838] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.500879] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.500911] ? trace_hardirqs_on+0x37/0xe0 [ 21.500970] ? kasan_bitops_generic+0x92/0x1c0 [ 21.501005] kasan_bitops_generic+0x116/0x1c0 [ 21.501034] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.501064] ? __pfx_read_tsc+0x10/0x10 [ 21.501098] ? ktime_get_ts64+0x86/0x230 [ 21.501133] kunit_try_run_case+0x1a5/0x480 [ 21.501166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.501232] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.501323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.501409] ? __kthread_parkme+0x82/0x180 [ 21.501481] ? preempt_count_sub+0x50/0x80 [ 21.501518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.501547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.501583] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.501619] kthread+0x337/0x6f0 [ 21.501645] ? trace_preempt_on+0x20/0xc0 [ 21.501706] ? __pfx_kthread+0x10/0x10 [ 21.501739] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.501773] ? calculate_sigpending+0x7b/0xa0 [ 21.501808] ? __pfx_kthread+0x10/0x10 [ 21.501837] ret_from_fork+0x116/0x1d0 [ 21.501863] ? __pfx_kthread+0x10/0x10 [ 21.501891] ret_from_fork_asm+0x1a/0x30 [ 21.501957] </TASK> [ 21.501977] [ 21.524347] Allocated by task 278: [ 21.524868] kasan_save_stack+0x45/0x70 [ 21.525733] kasan_save_track+0x18/0x40 [ 21.526675] kasan_save_alloc_info+0x3b/0x50 [ 21.527481] __kasan_kmalloc+0xb7/0xc0 [ 21.528115] __kmalloc_cache_noprof+0x189/0x420 [ 21.529163] kasan_bitops_generic+0x92/0x1c0 [ 21.529561] kunit_try_run_case+0x1a5/0x480 [ 21.530029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.530485] kthread+0x337/0x6f0 [ 21.531570] ret_from_fork+0x116/0x1d0 [ 21.531820] ret_from_fork_asm+0x1a/0x30 [ 21.532057] [ 21.532151] The buggy address belongs to the object at ffff888100fa0f20 [ 21.532151] which belongs to the cache kmalloc-16 of size 16 [ 21.534406] The buggy address is located 8 bytes inside of [ 21.534406] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 21.536021] [ 21.536417] The buggy address belongs to the physical page: [ 21.536959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 21.538025] flags: 0x200000000000000(node=0|zone=2) [ 21.538376] page_type: f5(slab) [ 21.539168] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.539808] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.541374] page dumped because: kasan: bad access detected [ 21.541730] [ 21.541896] Memory state around the buggy address: [ 21.542774] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.544567] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.545383] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 21.546197] ^ [ 21.547467] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.549533] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 21.549993] ================================================================== [ 21.592096] ================================================================== [ 21.592792] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.595702] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 21.597107] [ 21.597416] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 21.597529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.597556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.597599] Call Trace: [ 21.597634] <TASK> [ 21.597673] dump_stack_lvl+0x73/0xb0 [ 21.597763] print_report+0xd1/0x650 [ 21.597820] ? __virt_addr_valid+0x1db/0x2d0 [ 21.597881] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.597955] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.598009] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.598075] kasan_report+0x141/0x180 [ 21.599510] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.599619] kasan_check_range+0x10c/0x1c0 [ 21.599722] __kasan_check_write+0x18/0x20 [ 21.599801] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.599890] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.600034] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.600113] ? trace_hardirqs_on+0x37/0xe0 [ 21.600215] ? kasan_bitops_generic+0x92/0x1c0 [ 21.600301] kasan_bitops_generic+0x116/0x1c0 [ 21.600379] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.600452] ? __pfx_read_tsc+0x10/0x10 [ 21.600542] ? ktime_get_ts64+0x86/0x230 [ 21.600626] kunit_try_run_case+0x1a5/0x480 [ 21.600718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.600787] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.600867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.601277] ? __kthread_parkme+0x82/0x180 [ 21.601361] ? preempt_count_sub+0x50/0x80 [ 21.601445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.601524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.601611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.601739] kthread+0x337/0x6f0 [ 21.601816] ? trace_preempt_on+0x20/0xc0 [ 21.601877] ? __pfx_kthread+0x10/0x10 [ 21.601969] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.602028] ? calculate_sigpending+0x7b/0xa0 [ 21.602079] ? __pfx_kthread+0x10/0x10 [ 21.602127] ret_from_fork+0x116/0x1d0 [ 21.602298] ? __pfx_kthread+0x10/0x10 [ 21.602363] ret_from_fork_asm+0x1a/0x30 [ 21.602431] </TASK> [ 21.602456] [ 21.626611] Allocated by task 278: [ 21.627147] kasan_save_stack+0x45/0x70 [ 21.627741] kasan_save_track+0x18/0x40 [ 21.628102] kasan_save_alloc_info+0x3b/0x50 [ 21.628555] __kasan_kmalloc+0xb7/0xc0 [ 21.629560] __kmalloc_cache_noprof+0x189/0x420 [ 21.630066] kasan_bitops_generic+0x92/0x1c0 [ 21.630649] kunit_try_run_case+0x1a5/0x480 [ 21.631100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.631650] kthread+0x337/0x6f0 [ 21.632074] ret_from_fork+0x116/0x1d0 [ 21.632719] ret_from_fork_asm+0x1a/0x30 [ 21.633098] [ 21.633453] The buggy address belongs to the object at ffff888100fa0f20 [ 21.633453] which belongs to the cache kmalloc-16 of size 16 [ 21.634923] The buggy address is located 8 bytes inside of [ 21.634923] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 21.636086] [ 21.636309] The buggy address belongs to the physical page: [ 21.637032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 21.637697] flags: 0x200000000000000(node=0|zone=2) [ 21.638086] page_type: f5(slab) [ 21.638571] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.639736] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.640648] page dumped because: kasan: bad access detected [ 21.641138] [ 21.641369] Memory state around the buggy address: [ 21.641893] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.642601] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.643284] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 21.644484] ^ [ 21.645000] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.645578] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 21.646370] ================================================================== [ 21.871847] ================================================================== [ 21.873266] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.874301] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 21.875801] [ 21.876042] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 21.876579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.876602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.876634] Call Trace: [ 21.876674] <TASK> [ 21.876707] dump_stack_lvl+0x73/0xb0 [ 21.876749] print_report+0xd1/0x650 [ 21.876784] ? __virt_addr_valid+0x1db/0x2d0 [ 21.876817] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.876855] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.876887] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.876949] kasan_report+0x141/0x180 [ 21.876987] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.877033] kasan_check_range+0x10c/0x1c0 [ 21.877067] __kasan_check_write+0x18/0x20 [ 21.877095] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.877135] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.877410] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.877456] ? trace_hardirqs_on+0x37/0xe0 [ 21.877494] ? kasan_bitops_generic+0x92/0x1c0 [ 21.877528] kasan_bitops_generic+0x116/0x1c0 [ 21.877558] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.877590] ? __pfx_read_tsc+0x10/0x10 [ 21.877622] ? ktime_get_ts64+0x86/0x230 [ 21.877681] kunit_try_run_case+0x1a5/0x480 [ 21.877725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.877754] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.877791] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.877827] ? __kthread_parkme+0x82/0x180 [ 21.877857] ? preempt_count_sub+0x50/0x80 [ 21.877890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.877921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.878011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.878052] kthread+0x337/0x6f0 [ 21.878082] ? trace_preempt_on+0x20/0xc0 [ 21.878115] ? __pfx_kthread+0x10/0x10 [ 21.878144] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.878219] ? calculate_sigpending+0x7b/0xa0 [ 21.878272] ? __pfx_kthread+0x10/0x10 [ 21.878305] ret_from_fork+0x116/0x1d0 [ 21.878332] ? __pfx_kthread+0x10/0x10 [ 21.878362] ret_from_fork_asm+0x1a/0x30 [ 21.878407] </TASK> [ 21.878422] [ 21.904650] Allocated by task 278: [ 21.905576] kasan_save_stack+0x45/0x70 [ 21.905987] kasan_save_track+0x18/0x40 [ 21.906402] kasan_save_alloc_info+0x3b/0x50 [ 21.907577] __kasan_kmalloc+0xb7/0xc0 [ 21.908162] __kmalloc_cache_noprof+0x189/0x420 [ 21.909052] kasan_bitops_generic+0x92/0x1c0 [ 21.910132] kunit_try_run_case+0x1a5/0x480 [ 21.910585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.911286] kthread+0x337/0x6f0 [ 21.911995] ret_from_fork+0x116/0x1d0 [ 21.912330] ret_from_fork_asm+0x1a/0x30 [ 21.912749] [ 21.913536] The buggy address belongs to the object at ffff888100fa0f20 [ 21.913536] which belongs to the cache kmalloc-16 of size 16 [ 21.914693] The buggy address is located 8 bytes inside of [ 21.914693] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 21.916341] [ 21.916505] The buggy address belongs to the physical page: [ 21.916869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 21.918017] flags: 0x200000000000000(node=0|zone=2) [ 21.918813] page_type: f5(slab) [ 21.919209] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.920367] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.920967] page dumped because: kasan: bad access detected [ 21.921725] [ 21.922017] Memory state around the buggy address: [ 21.922782] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.923389] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.923957] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 21.924474] ^ [ 21.925133] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.925974] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 21.926722] ==================================================================