Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-x86_64 |
[ 46.265200] ================================================================== [ 46.272267] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.281205] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 46.288496] [ 46.289977] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 46.290025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.290040] Hardware name: WinLink E850-96 board (DT) [ 46.290058] Call trace: [ 46.290072] show_stack+0x20/0x38 (C) [ 46.290105] dump_stack_lvl+0x8c/0xd0 [ 46.290141] print_report+0x118/0x608 [ 46.290177] kasan_report+0xdc/0x128 [ 46.290210] __asan_report_load8_noabort+0x20/0x30 [ 46.290244] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 46.290281] kasan_bitops_generic+0x11c/0x1c8 [ 46.290315] kunit_try_run_case+0x170/0x3f0 [ 46.290350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.290390] kthread+0x328/0x630 [ 46.290417] ret_from_fork+0x10/0x20 [ 46.290447] [ 46.359936] Allocated by task 305: [ 46.363322] kasan_save_stack+0x3c/0x68 [ 46.367141] kasan_save_track+0x20/0x40 [ 46.370960] kasan_save_alloc_info+0x40/0x58 [ 46.375214] __kasan_kmalloc+0xd4/0xd8 [ 46.378946] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.383460] kasan_bitops_generic+0xa0/0x1c8 [ 46.387713] kunit_try_run_case+0x170/0x3f0 [ 46.391880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.397349] kthread+0x328/0x630 [ 46.400561] ret_from_fork+0x10/0x20 [ 46.404120] [ 46.405595] The buggy address belongs to the object at ffff00080444cc20 [ 46.405595] which belongs to the cache kmalloc-16 of size 16 [ 46.417922] The buggy address is located 8 bytes inside of [ 46.417922] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 46.430161] [ 46.431636] The buggy address belongs to the physical page: [ 46.437192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 46.445178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.451688] page_type: f5(slab) [ 46.454821] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.462546] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.470264] page dumped because: kasan: bad access detected [ 46.475819] [ 46.477295] Memory state around the buggy address: [ 46.482073] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.489278] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 46.496483] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.503684] ^ [ 46.508201] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.515406] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.522607] ================================================================== [ 44.934513] ================================================================== [ 44.941557] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.950496] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 44.957787] [ 44.959269] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 44.959317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.959334] Hardware name: WinLink E850-96 board (DT) [ 44.959352] Call trace: [ 44.959364] show_stack+0x20/0x38 (C) [ 44.959399] dump_stack_lvl+0x8c/0xd0 [ 44.959435] print_report+0x118/0x608 [ 44.959469] kasan_report+0xdc/0x128 [ 44.959502] __asan_report_load8_noabort+0x20/0x30 [ 44.959533] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 44.959572] kasan_bitops_generic+0x11c/0x1c8 [ 44.959604] kunit_try_run_case+0x170/0x3f0 [ 44.959638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.959680] kthread+0x328/0x630 [ 44.959706] ret_from_fork+0x10/0x20 [ 44.959738] [ 45.029227] Allocated by task 305: [ 45.032613] kasan_save_stack+0x3c/0x68 [ 45.036432] kasan_save_track+0x20/0x40 [ 45.040251] kasan_save_alloc_info+0x40/0x58 [ 45.044505] __kasan_kmalloc+0xd4/0xd8 [ 45.048237] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.052751] kasan_bitops_generic+0xa0/0x1c8 [ 45.057004] kunit_try_run_case+0x170/0x3f0 [ 45.061171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.066639] kthread+0x328/0x630 [ 45.069851] ret_from_fork+0x10/0x20 [ 45.073410] [ 45.074886] The buggy address belongs to the object at ffff00080444cc20 [ 45.074886] which belongs to the cache kmalloc-16 of size 16 [ 45.087213] The buggy address is located 8 bytes inside of [ 45.087213] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 45.099451] [ 45.100927] The buggy address belongs to the physical page: [ 45.106483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 45.114469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.120979] page_type: f5(slab) [ 45.124112] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.131836] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.139555] page dumped because: kasan: bad access detected [ 45.145112] [ 45.146586] Memory state around the buggy address: [ 45.151364] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.158569] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 45.165774] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.172975] ^ [ 45.177492] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.184697] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.191898] ================================================================== [ 44.666269] ================================================================== [ 44.673332] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.682270] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 44.689648] [ 44.691129] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 44.691177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.691193] Hardware name: WinLink E850-96 board (DT) [ 44.691212] Call trace: [ 44.691224] show_stack+0x20/0x38 (C) [ 44.691259] dump_stack_lvl+0x8c/0xd0 [ 44.691293] print_report+0x118/0x608 [ 44.691326] kasan_report+0xdc/0x128 [ 44.691356] kasan_check_range+0x100/0x1a8 [ 44.691391] __kasan_check_write+0x20/0x30 [ 44.691418] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 44.691456] kasan_bitops_generic+0x11c/0x1c8 [ 44.691487] kunit_try_run_case+0x170/0x3f0 [ 44.691523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.691563] kthread+0x328/0x630 [ 44.691588] ret_from_fork+0x10/0x20 [ 44.691618] [ 44.764474] Allocated by task 305: [ 44.767859] kasan_save_stack+0x3c/0x68 [ 44.771678] kasan_save_track+0x20/0x40 [ 44.775498] kasan_save_alloc_info+0x40/0x58 [ 44.779751] __kasan_kmalloc+0xd4/0xd8 [ 44.783484] __kmalloc_cache_noprof+0x15c/0x3c0 [ 44.787998] kasan_bitops_generic+0xa0/0x1c8 [ 44.792251] kunit_try_run_case+0x170/0x3f0 [ 44.796419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.801886] kthread+0x328/0x630 [ 44.805098] ret_from_fork+0x10/0x20 [ 44.808657] [ 44.810132] The buggy address belongs to the object at ffff00080444cc20 [ 44.810132] which belongs to the cache kmalloc-16 of size 16 [ 44.822459] The buggy address is located 8 bytes inside of [ 44.822459] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 44.834698] [ 44.836174] The buggy address belongs to the physical page: [ 44.841730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 44.849716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.856226] page_type: f5(slab) [ 44.859359] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.867083] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.874802] page dumped because: kasan: bad access detected [ 44.880359] [ 44.881833] Memory state around the buggy address: [ 44.886611] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.893816] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 44.901021] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.908222] ^ [ 44.912739] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.919944] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.927145] ================================================================== [ 45.199214] ================================================================== [ 45.206311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.215249] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 45.222627] [ 45.224108] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 45.224155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.224171] Hardware name: WinLink E850-96 board (DT) [ 45.224190] Call trace: [ 45.224203] show_stack+0x20/0x38 (C) [ 45.224237] dump_stack_lvl+0x8c/0xd0 [ 45.224272] print_report+0x118/0x608 [ 45.224307] kasan_report+0xdc/0x128 [ 45.224339] kasan_check_range+0x100/0x1a8 [ 45.224374] __kasan_check_write+0x20/0x30 [ 45.224404] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 45.224443] kasan_bitops_generic+0x11c/0x1c8 [ 45.224476] kunit_try_run_case+0x170/0x3f0 [ 45.224512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.224551] kthread+0x328/0x630 [ 45.224578] ret_from_fork+0x10/0x20 [ 45.224609] [ 45.297452] Allocated by task 305: [ 45.300838] kasan_save_stack+0x3c/0x68 [ 45.304657] kasan_save_track+0x20/0x40 [ 45.308476] kasan_save_alloc_info+0x40/0x58 [ 45.312729] __kasan_kmalloc+0xd4/0xd8 [ 45.316462] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.320977] kasan_bitops_generic+0xa0/0x1c8 [ 45.325229] kunit_try_run_case+0x170/0x3f0 [ 45.329396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.334865] kthread+0x328/0x630 [ 45.338077] ret_from_fork+0x10/0x20 [ 45.341636] [ 45.343111] The buggy address belongs to the object at ffff00080444cc20 [ 45.343111] which belongs to the cache kmalloc-16 of size 16 [ 45.355438] The buggy address is located 8 bytes inside of [ 45.355438] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 45.367677] [ 45.369153] The buggy address belongs to the physical page: [ 45.374708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 45.382694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.389204] page_type: f5(slab) [ 45.392337] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.400061] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.407780] page dumped because: kasan: bad access detected [ 45.413337] [ 45.414811] Memory state around the buggy address: [ 45.419589] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.426794] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 45.433999] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.441200] ^ [ 45.445717] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.452922] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.460123] ================================================================== [ 44.133479] ================================================================== [ 44.140528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.149379] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 44.156757] [ 44.158239] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 44.158287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.158304] Hardware name: WinLink E850-96 board (DT) [ 44.158324] Call trace: [ 44.158336] show_stack+0x20/0x38 (C) [ 44.158371] dump_stack_lvl+0x8c/0xd0 [ 44.158404] print_report+0x118/0x608 [ 44.158438] kasan_report+0xdc/0x128 [ 44.158470] kasan_check_range+0x100/0x1a8 [ 44.158506] __kasan_check_write+0x20/0x30 [ 44.158536] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 44.158572] kasan_bitops_generic+0x11c/0x1c8 [ 44.158605] kunit_try_run_case+0x170/0x3f0 [ 44.158640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.158678] kthread+0x328/0x630 [ 44.158707] ret_from_fork+0x10/0x20 [ 44.158738] [ 44.231496] Allocated by task 305: [ 44.234881] kasan_save_stack+0x3c/0x68 [ 44.238701] kasan_save_track+0x20/0x40 [ 44.242520] kasan_save_alloc_info+0x40/0x58 [ 44.246773] __kasan_kmalloc+0xd4/0xd8 [ 44.250506] __kmalloc_cache_noprof+0x15c/0x3c0 [ 44.255020] kasan_bitops_generic+0xa0/0x1c8 [ 44.259273] kunit_try_run_case+0x170/0x3f0 [ 44.263440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.268908] kthread+0x328/0x630 [ 44.272120] ret_from_fork+0x10/0x20 [ 44.275679] [ 44.277155] The buggy address belongs to the object at ffff00080444cc20 [ 44.277155] which belongs to the cache kmalloc-16 of size 16 [ 44.289481] The buggy address is located 8 bytes inside of [ 44.289481] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 44.301721] [ 44.303198] The buggy address belongs to the physical page: [ 44.308752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 44.316738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.323248] page_type: f5(slab) [ 44.326380] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.334105] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.341824] page dumped because: kasan: bad access detected [ 44.347381] [ 44.348855] Memory state around the buggy address: [ 44.353633] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.360838] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 44.368043] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.375244] ^ [ 44.379761] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.386966] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.394167] ================================================================== [ 45.732222] ================================================================== [ 45.739289] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.748227] Write of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 45.755604] [ 45.757086] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 45.757134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.757149] Hardware name: WinLink E850-96 board (DT) [ 45.757168] Call trace: [ 45.757180] show_stack+0x20/0x38 (C) [ 45.757217] dump_stack_lvl+0x8c/0xd0 [ 45.757250] print_report+0x118/0x608 [ 45.757285] kasan_report+0xdc/0x128 [ 45.757317] kasan_check_range+0x100/0x1a8 [ 45.757351] __kasan_check_write+0x20/0x30 [ 45.757381] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 45.757418] kasan_bitops_generic+0x11c/0x1c8 [ 45.757450] kunit_try_run_case+0x170/0x3f0 [ 45.757485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.757523] kthread+0x328/0x630 [ 45.757551] ret_from_fork+0x10/0x20 [ 45.757583] [ 45.830430] Allocated by task 305: [ 45.833816] kasan_save_stack+0x3c/0x68 [ 45.837635] kasan_save_track+0x20/0x40 [ 45.841454] kasan_save_alloc_info+0x40/0x58 [ 45.845707] __kasan_kmalloc+0xd4/0xd8 [ 45.849440] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.853954] kasan_bitops_generic+0xa0/0x1c8 [ 45.858208] kunit_try_run_case+0x170/0x3f0 [ 45.862374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.867843] kthread+0x328/0x630 [ 45.871055] ret_from_fork+0x10/0x20 [ 45.874613] [ 45.876089] The buggy address belongs to the object at ffff00080444cc20 [ 45.876089] which belongs to the cache kmalloc-16 of size 16 [ 45.888416] The buggy address is located 8 bytes inside of [ 45.888416] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 45.900655] [ 45.902131] The buggy address belongs to the physical page: [ 45.907687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 45.915672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.922182] page_type: f5(slab) [ 45.925315] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.933040] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.940758] page dumped because: kasan: bad access detected [ 45.946314] [ 45.947789] Memory state around the buggy address: [ 45.952567] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.959772] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 45.966977] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.974178] ^ [ 45.978695] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.985900] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.993101] ================================================================== [ 45.467467] ================================================================== [ 45.474534] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.483474] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 45.490765] [ 45.492246] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 45.492293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.492310] Hardware name: WinLink E850-96 board (DT) [ 45.492329] Call trace: [ 45.492340] show_stack+0x20/0x38 (C) [ 45.492374] dump_stack_lvl+0x8c/0xd0 [ 45.492409] print_report+0x118/0x608 [ 45.492442] kasan_report+0xdc/0x128 [ 45.492476] __asan_report_load8_noabort+0x20/0x30 [ 45.492506] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 45.492543] kasan_bitops_generic+0x11c/0x1c8 [ 45.492577] kunit_try_run_case+0x170/0x3f0 [ 45.492609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.492647] kthread+0x328/0x630 [ 45.492674] ret_from_fork+0x10/0x20 [ 45.492705] [ 45.562205] Allocated by task 305: [ 45.565591] kasan_save_stack+0x3c/0x68 [ 45.569410] kasan_save_track+0x20/0x40 [ 45.573229] kasan_save_alloc_info+0x40/0x58 [ 45.577482] __kasan_kmalloc+0xd4/0xd8 [ 45.581215] __kmalloc_cache_noprof+0x15c/0x3c0 [ 45.585729] kasan_bitops_generic+0xa0/0x1c8 [ 45.589983] kunit_try_run_case+0x170/0x3f0 [ 45.594149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.599618] kthread+0x328/0x630 [ 45.602829] ret_from_fork+0x10/0x20 [ 45.606388] [ 45.607865] The buggy address belongs to the object at ffff00080444cc20 [ 45.607865] which belongs to the cache kmalloc-16 of size 16 [ 45.620190] The buggy address is located 8 bytes inside of [ 45.620190] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 45.632430] [ 45.633906] The buggy address belongs to the physical page: [ 45.639461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 45.647447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.653957] page_type: f5(slab) [ 45.657091] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.664814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.672533] page dumped because: kasan: bad access detected [ 45.678090] [ 45.679564] Memory state around the buggy address: [ 45.684342] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.691547] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 45.698752] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.705953] ^ [ 45.710470] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.717675] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.724876] ================================================================== [ 44.401545] ================================================================== [ 44.408579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.417518] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 44.424809] [ 44.426291] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 44.426339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.426354] Hardware name: WinLink E850-96 board (DT) [ 44.426375] Call trace: [ 44.426387] show_stack+0x20/0x38 (C) [ 44.426417] dump_stack_lvl+0x8c/0xd0 [ 44.426454] print_report+0x118/0x608 [ 44.426486] kasan_report+0xdc/0x128 [ 44.426519] __asan_report_load8_noabort+0x20/0x30 [ 44.426550] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 44.426590] kasan_bitops_generic+0x11c/0x1c8 [ 44.426622] kunit_try_run_case+0x170/0x3f0 [ 44.426658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.426696] kthread+0x328/0x630 [ 44.426724] ret_from_fork+0x10/0x20 [ 44.426754] [ 44.496249] Allocated by task 305: [ 44.499634] kasan_save_stack+0x3c/0x68 [ 44.503454] kasan_save_track+0x20/0x40 [ 44.507273] kasan_save_alloc_info+0x40/0x58 [ 44.511526] __kasan_kmalloc+0xd4/0xd8 [ 44.515259] __kmalloc_cache_noprof+0x15c/0x3c0 [ 44.519773] kasan_bitops_generic+0xa0/0x1c8 [ 44.524026] kunit_try_run_case+0x170/0x3f0 [ 44.528193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.533661] kthread+0x328/0x630 [ 44.536873] ret_from_fork+0x10/0x20 [ 44.540432] [ 44.541909] The buggy address belongs to the object at ffff00080444cc20 [ 44.541909] which belongs to the cache kmalloc-16 of size 16 [ 44.554235] The buggy address is located 8 bytes inside of [ 44.554235] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 44.566473] [ 44.567949] The buggy address belongs to the physical page: [ 44.573505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 44.581491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.588001] page_type: f5(slab) [ 44.591134] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.598858] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.606577] page dumped because: kasan: bad access detected [ 44.612134] [ 44.613608] Memory state around the buggy address: [ 44.618388] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.625590] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 44.632795] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.639997] ^ [ 44.644514] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.651719] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.658920] ================================================================== [ 46.000472] ================================================================== [ 46.007514] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 46.016452] Read of size 8 at addr ffff00080444cc28 by task kunit_try_catch/305 [ 46.023743] [ 46.025224] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 46.025272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.025288] Hardware name: WinLink E850-96 board (DT) [ 46.025308] Call trace: [ 46.025321] show_stack+0x20/0x38 (C) [ 46.025355] dump_stack_lvl+0x8c/0xd0 [ 46.025387] print_report+0x118/0x608 [ 46.025422] kasan_report+0xdc/0x128 [ 46.025455] __asan_report_load8_noabort+0x20/0x30 [ 46.025486] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 46.025523] kasan_bitops_generic+0x11c/0x1c8 [ 46.025558] kunit_try_run_case+0x170/0x3f0 [ 46.025592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.025630] kthread+0x328/0x630 [ 46.025656] ret_from_fork+0x10/0x20 [ 46.025687] [ 46.095183] Allocated by task 305: [ 46.098569] kasan_save_stack+0x3c/0x68 [ 46.102388] kasan_save_track+0x20/0x40 [ 46.106207] kasan_save_alloc_info+0x40/0x58 [ 46.110461] __kasan_kmalloc+0xd4/0xd8 [ 46.114193] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.118707] kasan_bitops_generic+0xa0/0x1c8 [ 46.122960] kunit_try_run_case+0x170/0x3f0 [ 46.127127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.132596] kthread+0x328/0x630 [ 46.135807] ret_from_fork+0x10/0x20 [ 46.139366] [ 46.140844] The buggy address belongs to the object at ffff00080444cc20 [ 46.140844] which belongs to the cache kmalloc-16 of size 16 [ 46.153169] The buggy address is located 8 bytes inside of [ 46.153169] allocated 9-byte region [ffff00080444cc20, ffff00080444cc29) [ 46.165407] [ 46.166884] The buggy address belongs to the physical page: [ 46.172439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88444c [ 46.180425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.186935] page_type: f5(slab) [ 46.190068] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.197792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.205511] page dumped because: kasan: bad access detected [ 46.211067] [ 46.212542] Memory state around the buggy address: [ 46.217321] ffff00080444cb00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.224525] ffff00080444cb80: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 46.231730] >ffff00080444cc00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.238931] ^ [ 46.243448] ffff00080444cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.250653] ffff00080444cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.257854] ==================================================================
[ 21.973512] ================================================================== [ 21.973988] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.974735] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 21.975647] [ 21.975913] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 21.976061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.976100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.976162] Call Trace: [ 21.976211] <TASK> [ 21.976256] dump_stack_lvl+0x73/0xb0 [ 21.976338] print_report+0xd1/0x650 [ 21.976417] ? __virt_addr_valid+0x1db/0x2d0 [ 21.976498] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.976580] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.976650] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.977102] kasan_report+0x141/0x180 [ 21.977161] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.977334] kasan_check_range+0x10c/0x1c0 [ 21.977400] __kasan_check_write+0x18/0x20 [ 21.977472] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 21.977553] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.977668] kasan_bitops_generic+0x121/0x1c0 [ 21.977745] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.977827] ? __pfx_read_tsc+0x10/0x10 [ 21.977905] ? ktime_get_ts64+0x86/0x230 [ 21.978017] kunit_try_run_case+0x1a5/0x480 [ 21.978100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.978171] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.978260] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.978350] ? __kthread_parkme+0x82/0x180 [ 21.978429] ? preempt_count_sub+0x50/0x80 [ 21.978509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.978585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.978666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.978755] kthread+0x337/0x6f0 [ 21.978833] ? trace_preempt_on+0x20/0xc0 [ 21.978914] ? __pfx_kthread+0x10/0x10 [ 21.979141] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.979322] ? calculate_sigpending+0x7b/0xa0 [ 21.979409] ? __pfx_kthread+0x10/0x10 [ 21.979487] ret_from_fork+0x116/0x1d0 [ 21.979532] ? __pfx_kthread+0x10/0x10 [ 21.979567] ret_from_fork_asm+0x1a/0x30 [ 21.979612] </TASK> [ 21.979628] [ 21.999039] Allocated by task 278: [ 21.999771] kasan_save_stack+0x45/0x70 [ 22.000510] kasan_save_track+0x18/0x40 [ 22.000982] kasan_save_alloc_info+0x3b/0x50 [ 22.001594] __kasan_kmalloc+0xb7/0xc0 [ 22.002112] __kmalloc_cache_noprof+0x189/0x420 [ 22.002718] kasan_bitops_generic+0x92/0x1c0 [ 22.003498] kunit_try_run_case+0x1a5/0x480 [ 22.003945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.004778] kthread+0x337/0x6f0 [ 22.005314] ret_from_fork+0x116/0x1d0 [ 22.005730] ret_from_fork_asm+0x1a/0x30 [ 22.006379] [ 22.006585] The buggy address belongs to the object at ffff888100fa0f20 [ 22.006585] which belongs to the cache kmalloc-16 of size 16 [ 22.007559] The buggy address is located 8 bytes inside of [ 22.007559] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 22.008605] [ 22.009568] The buggy address belongs to the physical page: [ 22.010530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 22.011282] flags: 0x200000000000000(node=0|zone=2) [ 22.011648] page_type: f5(slab) [ 22.012214] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.012918] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.014085] page dumped because: kasan: bad access detected [ 22.014626] [ 22.015075] Memory state around the buggy address: [ 22.015537] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.016521] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 22.017207] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.018028] ^ [ 22.018453] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.019971] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 22.020563] ================================================================== [ 22.290474] ================================================================== [ 22.291107] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 22.293365] Read of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 22.293951] [ 22.294423] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.294887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.294908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.294969] Call Trace: [ 22.294991] <TASK> [ 22.295012] dump_stack_lvl+0x73/0xb0 [ 22.295054] print_report+0xd1/0x650 [ 22.295088] ? __virt_addr_valid+0x1db/0x2d0 [ 22.295123] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 22.295158] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.295278] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 22.295318] kasan_report+0x141/0x180 [ 22.295352] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 22.295392] kasan_check_range+0x10c/0x1c0 [ 22.295427] __kasan_check_read+0x15/0x20 [ 22.295454] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 22.295488] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.295539] kasan_bitops_generic+0x121/0x1c0 [ 22.295567] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.295596] ? __pfx_read_tsc+0x10/0x10 [ 22.295628] ? ktime_get_ts64+0x86/0x230 [ 22.295693] kunit_try_run_case+0x1a5/0x480 [ 22.295726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.295754] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.295791] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.295825] ? __kthread_parkme+0x82/0x180 [ 22.295856] ? preempt_count_sub+0x50/0x80 [ 22.295890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.295942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.295984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.296021] kthread+0x337/0x6f0 [ 22.296049] ? trace_preempt_on+0x20/0xc0 [ 22.296082] ? __pfx_kthread+0x10/0x10 [ 22.296113] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.296147] ? calculate_sigpending+0x7b/0xa0 [ 22.296410] ? __pfx_kthread+0x10/0x10 [ 22.296449] ret_from_fork+0x116/0x1d0 [ 22.296479] ? __pfx_kthread+0x10/0x10 [ 22.296509] ret_from_fork_asm+0x1a/0x30 [ 22.296594] </TASK> [ 22.296611] [ 22.318139] Allocated by task 278: [ 22.318611] kasan_save_stack+0x45/0x70 [ 22.319790] kasan_save_track+0x18/0x40 [ 22.320277] kasan_save_alloc_info+0x3b/0x50 [ 22.320894] __kasan_kmalloc+0xb7/0xc0 [ 22.321271] __kmalloc_cache_noprof+0x189/0x420 [ 22.321953] kasan_bitops_generic+0x92/0x1c0 [ 22.322563] kunit_try_run_case+0x1a5/0x480 [ 22.323068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.323866] kthread+0x337/0x6f0 [ 22.324185] ret_from_fork+0x116/0x1d0 [ 22.324499] ret_from_fork_asm+0x1a/0x30 [ 22.325548] [ 22.325793] The buggy address belongs to the object at ffff888100fa0f20 [ 22.325793] which belongs to the cache kmalloc-16 of size 16 [ 22.326828] The buggy address is located 8 bytes inside of [ 22.326828] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 22.328297] [ 22.328720] The buggy address belongs to the physical page: [ 22.329527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 22.331046] flags: 0x200000000000000(node=0|zone=2) [ 22.331952] page_type: f5(slab) [ 22.332631] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.332943] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.333522] page dumped because: kasan: bad access detected [ 22.334745] [ 22.335605] Memory state around the buggy address: [ 22.336069] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.337105] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 22.337975] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.339261] ^ [ 22.339621] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.340566] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 22.341369] ================================================================== [ 21.929574] ================================================================== [ 21.930833] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.931812] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 21.932911] [ 21.933171] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 21.933305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.933342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.933406] Call Trace: [ 21.933427] <TASK> [ 21.933453] dump_stack_lvl+0x73/0xb0 [ 21.933525] print_report+0xd1/0x650 [ 21.933563] ? __virt_addr_valid+0x1db/0x2d0 [ 21.933597] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.933631] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.934114] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.934169] kasan_report+0x141/0x180 [ 21.934338] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.934382] kasan_check_range+0x10c/0x1c0 [ 21.934421] __kasan_check_write+0x18/0x20 [ 21.934450] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 21.934485] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.934537] kasan_bitops_generic+0x121/0x1c0 [ 21.934565] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.934595] ? __pfx_read_tsc+0x10/0x10 [ 21.934628] ? ktime_get_ts64+0x86/0x230 [ 21.934697] kunit_try_run_case+0x1a5/0x480 [ 21.934734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.934763] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.934801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.934836] ? __kthread_parkme+0x82/0x180 [ 21.934866] ? preempt_count_sub+0x50/0x80 [ 21.934899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.934953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.934996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.935034] kthread+0x337/0x6f0 [ 21.935061] ? trace_preempt_on+0x20/0xc0 [ 21.935094] ? __pfx_kthread+0x10/0x10 [ 21.935123] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.935155] ? calculate_sigpending+0x7b/0xa0 [ 21.935219] ? __pfx_kthread+0x10/0x10 [ 21.935251] ret_from_fork+0x116/0x1d0 [ 21.935279] ? __pfx_kthread+0x10/0x10 [ 21.935309] ret_from_fork_asm+0x1a/0x30 [ 21.935351] </TASK> [ 21.935368] [ 21.953480] Allocated by task 278: [ 21.953870] kasan_save_stack+0x45/0x70 [ 21.954348] kasan_save_track+0x18/0x40 [ 21.954771] kasan_save_alloc_info+0x3b/0x50 [ 21.955242] __kasan_kmalloc+0xb7/0xc0 [ 21.956036] __kmalloc_cache_noprof+0x189/0x420 [ 21.956430] kasan_bitops_generic+0x92/0x1c0 [ 21.956768] kunit_try_run_case+0x1a5/0x480 [ 21.957605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.958156] kthread+0x337/0x6f0 [ 21.958659] ret_from_fork+0x116/0x1d0 [ 21.959007] ret_from_fork_asm+0x1a/0x30 [ 21.959554] [ 21.960221] The buggy address belongs to the object at ffff888100fa0f20 [ 21.960221] which belongs to the cache kmalloc-16 of size 16 [ 21.961075] The buggy address is located 8 bytes inside of [ 21.961075] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 21.961911] [ 21.962187] The buggy address belongs to the physical page: [ 21.962702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 21.963402] flags: 0x200000000000000(node=0|zone=2) [ 21.964578] page_type: f5(slab) [ 21.965012] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.965606] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.966104] page dumped because: kasan: bad access detected [ 21.966532] [ 21.967003] Memory state around the buggy address: [ 21.967455] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.968098] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 21.969412] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 21.970371] ^ [ 21.970815] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.971408] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 21.972150] ================================================================== [ 22.022179] ================================================================== [ 22.023040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 22.024174] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 22.024807] [ 22.025179] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.025310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.025349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.025409] Call Trace: [ 22.025462] <TASK> [ 22.025516] dump_stack_lvl+0x73/0xb0 [ 22.025599] print_report+0xd1/0x650 [ 22.025780] ? __virt_addr_valid+0x1db/0x2d0 [ 22.025866] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 22.025970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.026083] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 22.026173] kasan_report+0x141/0x180 [ 22.026364] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 22.026458] kasan_check_range+0x10c/0x1c0 [ 22.026541] __kasan_check_write+0x18/0x20 [ 22.026614] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 22.026714] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.026829] kasan_bitops_generic+0x121/0x1c0 [ 22.026907] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.027003] ? __pfx_read_tsc+0x10/0x10 [ 22.027084] ? ktime_get_ts64+0x86/0x230 [ 22.027171] kunit_try_run_case+0x1a5/0x480 [ 22.027510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.027543] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.027582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.027618] ? __kthread_parkme+0x82/0x180 [ 22.027665] ? preempt_count_sub+0x50/0x80 [ 22.027720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.027752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.027789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.027825] kthread+0x337/0x6f0 [ 22.027854] ? trace_preempt_on+0x20/0xc0 [ 22.027887] ? __pfx_kthread+0x10/0x10 [ 22.027918] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.027984] ? calculate_sigpending+0x7b/0xa0 [ 22.028022] ? __pfx_kthread+0x10/0x10 [ 22.028052] ret_from_fork+0x116/0x1d0 [ 22.028078] ? __pfx_kthread+0x10/0x10 [ 22.028107] ret_from_fork_asm+0x1a/0x30 [ 22.028150] </TASK> [ 22.028171] [ 22.044449] Allocated by task 278: [ 22.044802] kasan_save_stack+0x45/0x70 [ 22.045278] kasan_save_track+0x18/0x40 [ 22.045768] kasan_save_alloc_info+0x3b/0x50 [ 22.046258] __kasan_kmalloc+0xb7/0xc0 [ 22.046672] __kmalloc_cache_noprof+0x189/0x420 [ 22.047667] kasan_bitops_generic+0x92/0x1c0 [ 22.048101] kunit_try_run_case+0x1a5/0x480 [ 22.048624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.049059] kthread+0x337/0x6f0 [ 22.049488] ret_from_fork+0x116/0x1d0 [ 22.049899] ret_from_fork_asm+0x1a/0x30 [ 22.050683] [ 22.050953] The buggy address belongs to the object at ffff888100fa0f20 [ 22.050953] which belongs to the cache kmalloc-16 of size 16 [ 22.053643] The buggy address is located 8 bytes inside of [ 22.053643] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 22.055695] [ 22.055940] The buggy address belongs to the physical page: [ 22.057361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 22.058071] flags: 0x200000000000000(node=0|zone=2) [ 22.058807] page_type: f5(slab) [ 22.059135] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.059758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.060361] page dumped because: kasan: bad access detected [ 22.060801] [ 22.061507] Memory state around the buggy address: [ 22.061913] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.062855] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 22.063604] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.064164] ^ [ 22.065005] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.066131] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 22.066900] ================================================================== [ 22.342896] ================================================================== [ 22.343509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 22.345480] Read of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 22.345908] [ 22.346147] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.346273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.346312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.346368] Call Trace: [ 22.346411] <TASK> [ 22.346452] dump_stack_lvl+0x73/0xb0 [ 22.346517] print_report+0xd1/0x650 [ 22.346585] ? __virt_addr_valid+0x1db/0x2d0 [ 22.346650] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 22.346714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.346775] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 22.346839] kasan_report+0x141/0x180 [ 22.346897] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 22.347004] __asan_report_load8_noabort+0x18/0x20 [ 22.347084] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 22.347168] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.347280] kasan_bitops_generic+0x121/0x1c0 [ 22.347360] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.347441] ? __pfx_read_tsc+0x10/0x10 [ 22.347518] ? ktime_get_ts64+0x86/0x230 [ 22.347605] kunit_try_run_case+0x1a5/0x480 [ 22.347681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.347753] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.347842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.348810] ? __kthread_parkme+0x82/0x180 [ 22.348894] ? preempt_count_sub+0x50/0x80 [ 22.348992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.349057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.349124] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.349309] kthread+0x337/0x6f0 [ 22.349385] ? trace_preempt_on+0x20/0xc0 [ 22.349456] ? __pfx_kthread+0x10/0x10 [ 22.349524] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.349592] ? calculate_sigpending+0x7b/0xa0 [ 22.349664] ? __pfx_kthread+0x10/0x10 [ 22.349729] ret_from_fork+0x116/0x1d0 [ 22.349787] ? __pfx_kthread+0x10/0x10 [ 22.349852] ret_from_fork_asm+0x1a/0x30 [ 22.349960] </TASK> [ 22.350000] [ 22.374196] Allocated by task 278: [ 22.375019] kasan_save_stack+0x45/0x70 [ 22.375832] kasan_save_track+0x18/0x40 [ 22.376424] kasan_save_alloc_info+0x3b/0x50 [ 22.377038] __kasan_kmalloc+0xb7/0xc0 [ 22.378559] __kmalloc_cache_noprof+0x189/0x420 [ 22.379123] kasan_bitops_generic+0x92/0x1c0 [ 22.379451] kunit_try_run_case+0x1a5/0x480 [ 22.379974] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.380517] kthread+0x337/0x6f0 [ 22.381045] ret_from_fork+0x116/0x1d0 [ 22.381602] ret_from_fork_asm+0x1a/0x30 [ 22.382548] [ 22.382794] The buggy address belongs to the object at ffff888100fa0f20 [ 22.382794] which belongs to the cache kmalloc-16 of size 16 [ 22.384669] The buggy address is located 8 bytes inside of [ 22.384669] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 22.386010] [ 22.386385] The buggy address belongs to the physical page: [ 22.386952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 22.387620] flags: 0x200000000000000(node=0|zone=2) [ 22.388627] page_type: f5(slab) [ 22.389096] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.390156] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.390937] page dumped because: kasan: bad access detected [ 22.391338] [ 22.391574] Memory state around the buggy address: [ 22.392018] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.393275] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 22.394032] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.394874] ^ [ 22.395356] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.396169] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 22.397130] ================================================================== [ 22.067776] ================================================================== [ 22.068831] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 22.069657] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 22.070285] [ 22.070527] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.070660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.070699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.070760] Call Trace: [ 22.070811] <TASK> [ 22.070861] dump_stack_lvl+0x73/0xb0 [ 22.071107] print_report+0xd1/0x650 [ 22.071294] ? __virt_addr_valid+0x1db/0x2d0 [ 22.071380] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 22.071469] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.071556] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 22.071645] kasan_report+0x141/0x180 [ 22.071723] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 22.071815] kasan_check_range+0x10c/0x1c0 [ 22.071902] __kasan_check_write+0x18/0x20 [ 22.071999] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 22.072084] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.072191] kasan_bitops_generic+0x121/0x1c0 [ 22.072272] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.072345] ? __pfx_read_tsc+0x10/0x10 [ 22.072422] ? ktime_get_ts64+0x86/0x230 [ 22.072505] kunit_try_run_case+0x1a5/0x480 [ 22.072582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.072614] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.072961] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.073049] ? __kthread_parkme+0x82/0x180 [ 22.073088] ? preempt_count_sub+0x50/0x80 [ 22.073123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.073152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.073191] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.073225] kthread+0x337/0x6f0 [ 22.073253] ? trace_preempt_on+0x20/0xc0 [ 22.073285] ? __pfx_kthread+0x10/0x10 [ 22.073314] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.073347] ? calculate_sigpending+0x7b/0xa0 [ 22.073383] ? __pfx_kthread+0x10/0x10 [ 22.073413] ret_from_fork+0x116/0x1d0 [ 22.073439] ? __pfx_kthread+0x10/0x10 [ 22.073469] ret_from_fork_asm+0x1a/0x30 [ 22.073513] </TASK> [ 22.073528] [ 22.101032] Allocated by task 278: [ 22.101406] kasan_save_stack+0x45/0x70 [ 22.102572] kasan_save_track+0x18/0x40 [ 22.103072] kasan_save_alloc_info+0x3b/0x50 [ 22.103989] __kasan_kmalloc+0xb7/0xc0 [ 22.104283] __kmalloc_cache_noprof+0x189/0x420 [ 22.105231] kasan_bitops_generic+0x92/0x1c0 [ 22.106145] kunit_try_run_case+0x1a5/0x480 [ 22.106597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.107495] kthread+0x337/0x6f0 [ 22.108120] ret_from_fork+0x116/0x1d0 [ 22.108704] ret_from_fork_asm+0x1a/0x30 [ 22.109054] [ 22.109295] The buggy address belongs to the object at ffff888100fa0f20 [ 22.109295] which belongs to the cache kmalloc-16 of size 16 [ 22.111077] The buggy address is located 8 bytes inside of [ 22.111077] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 22.111986] [ 22.112086] The buggy address belongs to the physical page: [ 22.113051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 22.114080] flags: 0x200000000000000(node=0|zone=2) [ 22.115008] page_type: f5(slab) [ 22.115616] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.116198] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.116741] page dumped because: kasan: bad access detected [ 22.117723] [ 22.118440] Memory state around the buggy address: [ 22.118822] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.119782] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 22.120912] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.121841] ^ [ 22.122846] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.124100] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 22.125016] ================================================================== [ 22.235617] ================================================================== [ 22.236683] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 22.238515] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 22.239692] [ 22.239876] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.239992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.240033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.240092] Call Trace: [ 22.240146] <TASK> [ 22.240284] dump_stack_lvl+0x73/0xb0 [ 22.240376] print_report+0xd1/0x650 [ 22.240414] ? __virt_addr_valid+0x1db/0x2d0 [ 22.240487] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 22.240532] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.240565] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 22.240600] kasan_report+0x141/0x180 [ 22.240640] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 22.240887] kasan_check_range+0x10c/0x1c0 [ 22.240953] __kasan_check_write+0x18/0x20 [ 22.240986] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 22.241020] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.241072] kasan_bitops_generic+0x121/0x1c0 [ 22.241101] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.241131] ? __pfx_read_tsc+0x10/0x10 [ 22.241161] ? ktime_get_ts64+0x86/0x230 [ 22.241422] kunit_try_run_case+0x1a5/0x480 [ 22.241460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.241491] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.241527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.241564] ? __kthread_parkme+0x82/0x180 [ 22.241593] ? preempt_count_sub+0x50/0x80 [ 22.241627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.241689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.241729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.241765] kthread+0x337/0x6f0 [ 22.241810] ? trace_preempt_on+0x20/0xc0 [ 22.241843] ? __pfx_kthread+0x10/0x10 [ 22.241871] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.241905] ? calculate_sigpending+0x7b/0xa0 [ 22.241969] ? __pfx_kthread+0x10/0x10 [ 22.242001] ret_from_fork+0x116/0x1d0 [ 22.242027] ? __pfx_kthread+0x10/0x10 [ 22.242056] ret_from_fork_asm+0x1a/0x30 [ 22.242097] </TASK> [ 22.242113] [ 22.264819] Allocated by task 278: [ 22.265816] kasan_save_stack+0x45/0x70 [ 22.266177] kasan_save_track+0x18/0x40 [ 22.266831] kasan_save_alloc_info+0x3b/0x50 [ 22.267730] __kasan_kmalloc+0xb7/0xc0 [ 22.268065] __kmalloc_cache_noprof+0x189/0x420 [ 22.268973] kasan_bitops_generic+0x92/0x1c0 [ 22.269391] kunit_try_run_case+0x1a5/0x480 [ 22.269860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.270356] kthread+0x337/0x6f0 [ 22.271468] ret_from_fork+0x116/0x1d0 [ 22.271833] ret_from_fork_asm+0x1a/0x30 [ 22.272426] [ 22.272629] The buggy address belongs to the object at ffff888100fa0f20 [ 22.272629] which belongs to the cache kmalloc-16 of size 16 [ 22.274282] The buggy address is located 8 bytes inside of [ 22.274282] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 22.276549] [ 22.276806] The buggy address belongs to the physical page: [ 22.277360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 22.278274] flags: 0x200000000000000(node=0|zone=2) [ 22.279761] page_type: f5(slab) [ 22.280153] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.281317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.282110] page dumped because: kasan: bad access detected [ 22.282757] [ 22.283013] Memory state around the buggy address: [ 22.284199] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.284900] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 22.285897] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.287036] ^ [ 22.287596] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.288652] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 22.289388] ================================================================== [ 22.180046] ================================================================== [ 22.181117] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 22.182183] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 22.183042] [ 22.183509] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.183672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.183742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.183804] Call Trace: [ 22.183856] <TASK> [ 22.183909] dump_stack_lvl+0x73/0xb0 [ 22.184011] print_report+0xd1/0x650 [ 22.184089] ? __virt_addr_valid+0x1db/0x2d0 [ 22.184168] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 22.184249] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.184325] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 22.184607] kasan_report+0x141/0x180 [ 22.184697] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 22.185042] kasan_check_range+0x10c/0x1c0 [ 22.185138] __kasan_check_write+0x18/0x20 [ 22.185278] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 22.185335] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.185388] kasan_bitops_generic+0x121/0x1c0 [ 22.185417] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.185449] ? __pfx_read_tsc+0x10/0x10 [ 22.185483] ? ktime_get_ts64+0x86/0x230 [ 22.185518] kunit_try_run_case+0x1a5/0x480 [ 22.185550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.185578] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.185613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.185685] ? __kthread_parkme+0x82/0x180 [ 22.185721] ? preempt_count_sub+0x50/0x80 [ 22.185755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.185784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.185821] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.185858] kthread+0x337/0x6f0 [ 22.185885] ? trace_preempt_on+0x20/0xc0 [ 22.185941] ? __pfx_kthread+0x10/0x10 [ 22.185975] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.186010] ? calculate_sigpending+0x7b/0xa0 [ 22.186047] ? __pfx_kthread+0x10/0x10 [ 22.186077] ret_from_fork+0x116/0x1d0 [ 22.186104] ? __pfx_kthread+0x10/0x10 [ 22.186135] ret_from_fork_asm+0x1a/0x30 [ 22.186195] </TASK> [ 22.186235] [ 22.210202] Allocated by task 278: [ 22.210840] kasan_save_stack+0x45/0x70 [ 22.211553] kasan_save_track+0x18/0x40 [ 22.212080] kasan_save_alloc_info+0x3b/0x50 [ 22.212822] __kasan_kmalloc+0xb7/0xc0 [ 22.213051] __kmalloc_cache_noprof+0x189/0x420 [ 22.213577] kasan_bitops_generic+0x92/0x1c0 [ 22.214345] kunit_try_run_case+0x1a5/0x480 [ 22.214569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.215728] kthread+0x337/0x6f0 [ 22.216051] ret_from_fork+0x116/0x1d0 [ 22.216727] ret_from_fork_asm+0x1a/0x30 [ 22.217135] [ 22.217954] The buggy address belongs to the object at ffff888100fa0f20 [ 22.217954] which belongs to the cache kmalloc-16 of size 16 [ 22.219540] The buggy address is located 8 bytes inside of [ 22.219540] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 22.221070] [ 22.221500] The buggy address belongs to the physical page: [ 22.222149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 22.223121] flags: 0x200000000000000(node=0|zone=2) [ 22.223997] page_type: f5(slab) [ 22.224832] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.225549] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.226665] page dumped because: kasan: bad access detected [ 22.227381] [ 22.227976] Memory state around the buggy address: [ 22.228371] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.229964] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 22.230515] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.231087] ^ [ 22.231987] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.232839] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 22.233903] ================================================================== [ 22.126024] ================================================================== [ 22.127772] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 22.128836] Write of size 8 at addr ffff888100fa0f28 by task kunit_try_catch/278 [ 22.129912] [ 22.130149] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 22.131001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.131023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.131055] Call Trace: [ 22.131078] <TASK> [ 22.131102] dump_stack_lvl+0x73/0xb0 [ 22.131141] print_report+0xd1/0x650 [ 22.131195] ? __virt_addr_valid+0x1db/0x2d0 [ 22.131245] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 22.131281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.131315] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 22.131348] kasan_report+0x141/0x180 [ 22.131379] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 22.131418] kasan_check_range+0x10c/0x1c0 [ 22.131452] __kasan_check_write+0x18/0x20 [ 22.131480] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 22.131514] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 22.131563] kasan_bitops_generic+0x121/0x1c0 [ 22.131591] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.131620] ? __pfx_read_tsc+0x10/0x10 [ 22.131757] ? ktime_get_ts64+0x86/0x230 [ 22.131803] kunit_try_run_case+0x1a5/0x480 [ 22.131837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.131866] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.131901] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.131964] ? __kthread_parkme+0x82/0x180 [ 22.131998] ? preempt_count_sub+0x50/0x80 [ 22.132031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.132061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.132096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.132132] kthread+0x337/0x6f0 [ 22.132166] ? trace_preempt_on+0x20/0xc0 [ 22.132314] ? __pfx_kthread+0x10/0x10 [ 22.132346] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.132381] ? calculate_sigpending+0x7b/0xa0 [ 22.132417] ? __pfx_kthread+0x10/0x10 [ 22.132447] ret_from_fork+0x116/0x1d0 [ 22.132474] ? __pfx_kthread+0x10/0x10 [ 22.132506] ret_from_fork_asm+0x1a/0x30 [ 22.132549] </TASK> [ 22.132565] [ 22.155962] Allocated by task 278: [ 22.157036] kasan_save_stack+0x45/0x70 [ 22.157675] kasan_save_track+0x18/0x40 [ 22.158458] kasan_save_alloc_info+0x3b/0x50 [ 22.159050] __kasan_kmalloc+0xb7/0xc0 [ 22.159602] __kmalloc_cache_noprof+0x189/0x420 [ 22.160262] kasan_bitops_generic+0x92/0x1c0 [ 22.161074] kunit_try_run_case+0x1a5/0x480 [ 22.161630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.162878] kthread+0x337/0x6f0 [ 22.163565] ret_from_fork+0x116/0x1d0 [ 22.163907] ret_from_fork_asm+0x1a/0x30 [ 22.164463] [ 22.165029] The buggy address belongs to the object at ffff888100fa0f20 [ 22.165029] which belongs to the cache kmalloc-16 of size 16 [ 22.165993] The buggy address is located 8 bytes inside of [ 22.165993] allocated 9-byte region [ffff888100fa0f20, ffff888100fa0f29) [ 22.167177] [ 22.167426] The buggy address belongs to the physical page: [ 22.167855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa0 [ 22.168474] flags: 0x200000000000000(node=0|zone=2) [ 22.170030] page_type: f5(slab) [ 22.170737] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.171608] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.172844] page dumped because: kasan: bad access detected [ 22.173504] [ 22.173736] Memory state around the buggy address: [ 22.174709] ffff888100fa0e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.175759] ffff888100fa0e80: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 22.176462] >ffff888100fa0f00: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.177228] ^ [ 22.177664] ffff888100fa0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.178312] ffff888100fa1000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 22.178968] ==================================================================