Date
June 16, 2025, 7:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.356518] ================================================================== [ 22.357911] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 22.358556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.358597] Hardware name: linux,dummy-virt (DT) [ 22.358641] Call trace: [ 22.358674] show_stack+0x20/0x38 (C) [ 22.358742] dump_stack_lvl+0x8c/0xd0 [ 22.359424] __kasan_check_write+0x20/0x30 [ 22.360558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.360631] kthread+0x328/0x630 [ 22.360688] ret_from_fork+0x10/0x20 [ 22.360753] [ 22.361071] Allocated by task 270: [ 22.361141] kasan_save_stack+0x3c/0x68 [ 22.361213] kasan_save_track+0x20/0x40 [ 22.361514] kasan_bitops_generic+0xa0/0x1c8 [ 22.361981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.362085] kthread+0x328/0x630 [ 22.362544] [ 22.362925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.362992] page_type: f5(slab) [ 22.363049] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.363219] [ 22.364034] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.364145] ================================================================== [ 22.303351] ================================================================== [ 22.303594] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 22.303844] Write of size 8 at addr fff00000c63971e8 by task kunit_try_catch/270 [ 22.304132] [ 22.304352] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.304615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.304654] Hardware name: linux,dummy-virt (DT) [ 22.304965] Call trace: [ 22.305029] show_stack+0x20/0x38 (C) [ 22.305106] dump_stack_lvl+0x8c/0xd0 [ 22.305168] print_report+0x118/0x608 [ 22.305224] kasan_report+0xdc/0x128 [ 22.305413] kasan_check_range+0x100/0x1a8 [ 22.305618] __kasan_check_write+0x20/0x30 [ 22.305733] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 22.305847] kasan_bitops_generic+0x110/0x1c8 [ 22.305913] kunit_try_run_case+0x170/0x3f0 [ 22.306030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.306123] kthread+0x328/0x630 [ 22.306645] ret_from_fork+0x10/0x20 [ 22.306850] [ 22.306887] Allocated by task 270: [ 22.306931] kasan_save_stack+0x3c/0x68 [ 22.307050] kasan_save_track+0x20/0x40 [ 22.307105] kasan_save_alloc_info+0x40/0x58 [ 22.307540] __kasan_kmalloc+0xd4/0xd8 [ 22.307623] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.307745] kasan_bitops_generic+0xa0/0x1c8 [ 22.308074] kunit_try_run_case+0x170/0x3f0 [ 22.308161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.308347] kthread+0x328/0x630 [ 22.308392] ret_from_fork+0x10/0x20 [ 22.308656] [ 22.308740] The buggy address belongs to the object at fff00000c63971e0 [ 22.308740] which belongs to the cache kmalloc-16 of size 16 [ 22.308818] The buggy address is located 8 bytes inside of [ 22.308818] allocated 9-byte region [fff00000c63971e0, fff00000c63971e9) [ 22.308900] [ 22.308929] The buggy address belongs to the physical page: [ 22.309040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 22.309114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.309301] page_type: f5(slab) [ 22.309357] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.309614] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.309848] page dumped because: kasan: bad access detected [ 22.309899] [ 22.309986] Memory state around the buggy address: [ 22.310145] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 22.310209] fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.310278] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 22.310332] ^ [ 22.310385] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.310437] fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.310485] ================================================================== [ 22.325783] ================================================================== [ 22.325886] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 22.325969] Read of size 8 at addr fff00000c63971e8 by task kunit_try_catch/270 [ 22.326037] [ 22.326086] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.326197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.326237] Hardware name: linux,dummy-virt (DT) [ 22.326279] Call trace: [ 22.326314] show_stack+0x20/0x38 (C) [ 22.326413] dump_stack_lvl+0x8c/0xd0 [ 22.326531] print_report+0x118/0x608 [ 22.326613] kasan_report+0xdc/0x128 [ 22.326776] __asan_report_load8_noabort+0x20/0x30 [ 22.326913] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 22.326988] kasan_bitops_generic+0x110/0x1c8 [ 22.327056] kunit_try_run_case+0x170/0x3f0 [ 22.327118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.327188] kthread+0x328/0x630 [ 22.327243] ret_from_fork+0x10/0x20 [ 22.327309] [ 22.327372] Allocated by task 270: [ 22.327429] kasan_save_stack+0x3c/0x68 [ 22.327492] kasan_save_track+0x20/0x40 [ 22.327545] kasan_save_alloc_info+0x40/0x58 [ 22.327595] __kasan_kmalloc+0xd4/0xd8 [ 22.327644] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.327696] kasan_bitops_generic+0xa0/0x1c8 [ 22.327745] kunit_try_run_case+0x170/0x3f0 [ 22.327796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.327863] kthread+0x328/0x630 [ 22.327910] ret_from_fork+0x10/0x20 [ 22.327958] [ 22.327987] The buggy address belongs to the object at fff00000c63971e0 [ 22.327987] which belongs to the cache kmalloc-16 of size 16 [ 22.328060] The buggy address is located 8 bytes inside of [ 22.328060] allocated 9-byte region [fff00000c63971e0, fff00000c63971e9) [ 22.328136] [ 22.328164] The buggy address belongs to the physical page: [ 22.328205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 22.328272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.328336] page_type: f5(slab) [ 22.328390] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.329428] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.329625] page dumped because: kasan: bad access detected [ 22.329690] [ 22.329719] Memory state around the buggy address: [ 22.329782] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 22.329876] fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.330034] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 22.330218] ^ [ 22.331331] ================================================================== [ 22.318263] ================================================================== [ 22.318550] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 22.318649] Write of size 8 at addr fff00000c63971e8 by task kunit_try_catch/270 [ 22.318896] [ 22.319008] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.319314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.319491] Hardware name: linux,dummy-virt (DT) [ 22.319549] Call trace: [ 22.319685] show_stack+0x20/0x38 (C) [ 22.319758] dump_stack_lvl+0x8c/0xd0 [ 22.319825] print_report+0x118/0x608 [ 22.319899] kasan_report+0xdc/0x128 [ 22.319959] kasan_check_range+0x100/0x1a8 [ 22.320020] __kasan_check_write+0x20/0x30 [ 22.320076] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 22.320141] kasan_bitops_generic+0x110/0x1c8 [ 22.320202] kunit_try_run_case+0x170/0x3f0 [ 22.320260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.320325] kthread+0x328/0x630 [ 22.320379] ret_from_fork+0x10/0x20 [ 22.320439] [ 22.320471] Allocated by task 270: [ 22.320512] kasan_save_stack+0x3c/0x68 [ 22.320569] kasan_save_track+0x20/0x40 [ 22.320621] kasan_save_alloc_info+0x40/0x58 [ 22.320671] __kasan_kmalloc+0xd4/0xd8 [ 22.320720] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.320771] kasan_bitops_generic+0xa0/0x1c8 [ 22.321188] kunit_try_run_case+0x170/0x3f0 [ 22.321248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.321437] kthread+0x328/0x630 [ 22.321491] ret_from_fork+0x10/0x20 [ 22.321682] [ 22.321722] The buggy address belongs to the object at fff00000c63971e0 [ 22.321722] which belongs to the cache kmalloc-16 of size 16 [ 22.321805] The buggy address is located 8 bytes inside of [ 22.321805] allocated 9-byte region [fff00000c63971e0, fff00000c63971e9) [ 22.321928] [ 22.321978] The buggy address belongs to the physical page: [ 22.322025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 22.322550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.322653] page_type: f5(slab) [ 22.322723] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.323056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.323401] page dumped because: kasan: bad access detected [ 22.323500] [ 22.323531] Memory state around the buggy address: [ 22.323584] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 22.323658] fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.323717] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 22.323771] ^ [ 22.324206] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.324298] fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.324413] ================================================================== [ 22.313776] ================================================================== [ 22.313879] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 22.313966] Read of size 8 at addr fff00000c63971e8 by task kunit_try_catch/270 [ 22.314032] [ 22.314083] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.314195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.314230] Hardware name: linux,dummy-virt (DT) [ 22.314273] Call trace: [ 22.314305] show_stack+0x20/0x38 (C) [ 22.314370] dump_stack_lvl+0x8c/0xd0 [ 22.314431] print_report+0x118/0x608 [ 22.314489] kasan_report+0xdc/0x128 [ 22.314549] __asan_report_load8_noabort+0x20/0x30 [ 22.314610] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 22.314673] kasan_bitops_generic+0x110/0x1c8 [ 22.314734] kunit_try_run_case+0x170/0x3f0 [ 22.314795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.314873] kthread+0x328/0x630 [ 22.314931] ret_from_fork+0x10/0x20 [ 22.314994] [ 22.315023] Allocated by task 270: [ 22.315063] kasan_save_stack+0x3c/0x68 [ 22.315118] kasan_save_track+0x20/0x40 [ 22.315168] kasan_save_alloc_info+0x40/0x58 [ 22.315216] __kasan_kmalloc+0xd4/0xd8 [ 22.315265] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.315316] kasan_bitops_generic+0xa0/0x1c8 [ 22.315366] kunit_try_run_case+0x170/0x3f0 [ 22.315414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.315467] kthread+0x328/0x630 [ 22.315510] ret_from_fork+0x10/0x20 [ 22.315557] [ 22.315584] The buggy address belongs to the object at fff00000c63971e0 [ 22.315584] which belongs to the cache kmalloc-16 of size 16 [ 22.315657] The buggy address is located 8 bytes inside of [ 22.315657] allocated 9-byte region [fff00000c63971e0, fff00000c63971e9) [ 22.315730] [ 22.315758] The buggy address belongs to the physical page: [ 22.315802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 22.316302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.316376] page_type: f5(slab) [ 22.316477] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.316627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.316679] page dumped because: kasan: bad access detected [ 22.316872] [ 22.316919] Memory state around the buggy address: [ 22.316974] fff00000c6397080: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 22.317169] fff00000c6397100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.317294] >fff00000c6397180: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 22.317376] ^ [ 22.317449] fff00000c6397200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.317511] fff00000c6397280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.317563] ==================================================================
[ 13.632064] ================================================================== [ 13.632535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.632892] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.633154] [ 13.633234] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.633279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.633290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.633310] Call Trace: [ 13.633327] <TASK> [ 13.633342] dump_stack_lvl+0x73/0xb0 [ 13.633369] print_report+0xd1/0x650 [ 13.633390] ? __virt_addr_valid+0x1db/0x2d0 [ 13.633411] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.633435] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.633457] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.633481] kasan_report+0x141/0x180 [ 13.633503] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.633531] kasan_check_range+0x10c/0x1c0 [ 13.633553] __kasan_check_write+0x18/0x20 [ 13.633572] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.633596] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.633621] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.633644] ? trace_hardirqs_on+0x37/0xe0 [ 13.633667] ? kasan_bitops_generic+0x92/0x1c0 [ 13.633706] kasan_bitops_generic+0x116/0x1c0 [ 13.633729] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.633753] ? __pfx_read_tsc+0x10/0x10 [ 13.633773] ? ktime_get_ts64+0x86/0x230 [ 13.633798] kunit_try_run_case+0x1a5/0x480 [ 13.633820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.633842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.633864] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.633885] ? __kthread_parkme+0x82/0x180 [ 13.633905] ? preempt_count_sub+0x50/0x80 [ 13.633937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.634137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.634165] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.634189] kthread+0x337/0x6f0 [ 13.634209] ? trace_preempt_on+0x20/0xc0 [ 13.634231] ? __pfx_kthread+0x10/0x10 [ 13.634250] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.634271] ? calculate_sigpending+0x7b/0xa0 [ 13.634297] ? __pfx_kthread+0x10/0x10 [ 13.634318] ret_from_fork+0x116/0x1d0 [ 13.634336] ? __pfx_kthread+0x10/0x10 [ 13.634356] ret_from_fork_asm+0x1a/0x30 [ 13.634386] </TASK> [ 13.634446] [ 13.643468] Allocated by task 286: [ 13.643655] kasan_save_stack+0x45/0x70 [ 13.643852] kasan_save_track+0x18/0x40 [ 13.644046] kasan_save_alloc_info+0x3b/0x50 [ 13.644226] __kasan_kmalloc+0xb7/0xc0 [ 13.644356] __kmalloc_cache_noprof+0x189/0x420 [ 13.645079] kasan_bitops_generic+0x92/0x1c0 [ 13.645302] kunit_try_run_case+0x1a5/0x480 [ 13.645736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.645921] kthread+0x337/0x6f0 [ 13.646048] ret_from_fork+0x116/0x1d0 [ 13.646215] ret_from_fork_asm+0x1a/0x30 [ 13.646386] [ 13.646890] The buggy address belongs to the object at ffff8881025394a0 [ 13.646890] which belongs to the cache kmalloc-16 of size 16 [ 13.647884] The buggy address is located 8 bytes inside of [ 13.647884] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.648507] [ 13.648612] The buggy address belongs to the physical page: [ 13.648794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.649149] flags: 0x200000000000000(node=0|zone=2) [ 13.649326] page_type: f5(slab) [ 13.649527] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.650061] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.650399] page dumped because: kasan: bad access detected [ 13.650613] [ 13.650700] Memory state around the buggy address: [ 13.650893] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.651127] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.651416] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.651712] ^ [ 13.651857] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.652183] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.652526] ================================================================== [ 13.613500] ================================================================== [ 13.613789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.614046] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.614263] [ 13.614342] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.614571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.614589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.614610] Call Trace: [ 13.614627] <TASK> [ 13.614642] dump_stack_lvl+0x73/0xb0 [ 13.614672] print_report+0xd1/0x650 [ 13.614694] ? __virt_addr_valid+0x1db/0x2d0 [ 13.614715] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.614739] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.614760] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.614783] kasan_report+0x141/0x180 [ 13.614805] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.614834] kasan_check_range+0x10c/0x1c0 [ 13.614856] __kasan_check_write+0x18/0x20 [ 13.614874] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.614898] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.614923] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.614961] ? trace_hardirqs_on+0x37/0xe0 [ 13.614983] ? kasan_bitops_generic+0x92/0x1c0 [ 13.615009] kasan_bitops_generic+0x116/0x1c0 [ 13.615031] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.615055] ? __pfx_read_tsc+0x10/0x10 [ 13.615074] ? ktime_get_ts64+0x86/0x230 [ 13.615099] kunit_try_run_case+0x1a5/0x480 [ 13.615123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.615144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.615167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.615188] ? __kthread_parkme+0x82/0x180 [ 13.615208] ? preempt_count_sub+0x50/0x80 [ 13.615230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.615252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.615274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.615296] kthread+0x337/0x6f0 [ 13.615314] ? trace_preempt_on+0x20/0xc0 [ 13.615336] ? __pfx_kthread+0x10/0x10 [ 13.615355] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.615375] ? calculate_sigpending+0x7b/0xa0 [ 13.615398] ? __pfx_kthread+0x10/0x10 [ 13.615477] ret_from_fork+0x116/0x1d0 [ 13.615496] ? __pfx_kthread+0x10/0x10 [ 13.615516] ret_from_fork_asm+0x1a/0x30 [ 13.615545] </TASK> [ 13.615555] [ 13.624139] Allocated by task 286: [ 13.624319] kasan_save_stack+0x45/0x70 [ 13.624548] kasan_save_track+0x18/0x40 [ 13.624788] kasan_save_alloc_info+0x3b/0x50 [ 13.625018] __kasan_kmalloc+0xb7/0xc0 [ 13.625161] __kmalloc_cache_noprof+0x189/0x420 [ 13.625357] kasan_bitops_generic+0x92/0x1c0 [ 13.625531] kunit_try_run_case+0x1a5/0x480 [ 13.625721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.626083] kthread+0x337/0x6f0 [ 13.626249] ret_from_fork+0x116/0x1d0 [ 13.626440] ret_from_fork_asm+0x1a/0x30 [ 13.626617] [ 13.626701] The buggy address belongs to the object at ffff8881025394a0 [ 13.626701] which belongs to the cache kmalloc-16 of size 16 [ 13.627169] The buggy address is located 8 bytes inside of [ 13.627169] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.627758] [ 13.627839] The buggy address belongs to the physical page: [ 13.628021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.628257] flags: 0x200000000000000(node=0|zone=2) [ 13.628425] page_type: f5(slab) [ 13.628766] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.629116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.629551] page dumped because: kasan: bad access detected [ 13.629817] [ 13.629906] Memory state around the buggy address: [ 13.630140] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.630516] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.630730] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.630945] ^ [ 13.631087] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.631294] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.631564] ================================================================== [ 13.536783] ================================================================== [ 13.537307] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.537698] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.538043] [ 13.538148] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.538192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.538203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.538223] Call Trace: [ 13.538235] <TASK> [ 13.538249] dump_stack_lvl+0x73/0xb0 [ 13.538275] print_report+0xd1/0x650 [ 13.538296] ? __virt_addr_valid+0x1db/0x2d0 [ 13.538319] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.538344] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.538365] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.538389] kasan_report+0x141/0x180 [ 13.538410] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.538438] kasan_check_range+0x10c/0x1c0 [ 13.538460] __kasan_check_write+0x18/0x20 [ 13.538479] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.538503] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.538528] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.538550] ? trace_hardirqs_on+0x37/0xe0 [ 13.538574] ? kasan_bitops_generic+0x92/0x1c0 [ 13.538599] kasan_bitops_generic+0x116/0x1c0 [ 13.538621] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.538644] ? __pfx_read_tsc+0x10/0x10 [ 13.538664] ? ktime_get_ts64+0x86/0x230 [ 13.538690] kunit_try_run_case+0x1a5/0x480 [ 13.538713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.538734] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.538755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.538776] ? __kthread_parkme+0x82/0x180 [ 13.538795] ? preempt_count_sub+0x50/0x80 [ 13.538817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.538839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.538861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.538882] kthread+0x337/0x6f0 [ 13.538900] ? trace_preempt_on+0x20/0xc0 [ 13.538921] ? __pfx_kthread+0x10/0x10 [ 13.539046] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.539067] ? calculate_sigpending+0x7b/0xa0 [ 13.539090] ? __pfx_kthread+0x10/0x10 [ 13.539111] ret_from_fork+0x116/0x1d0 [ 13.539129] ? __pfx_kthread+0x10/0x10 [ 13.539148] ret_from_fork_asm+0x1a/0x30 [ 13.539178] </TASK> [ 13.539188] [ 13.546916] Allocated by task 286: [ 13.547102] kasan_save_stack+0x45/0x70 [ 13.547300] kasan_save_track+0x18/0x40 [ 13.547556] kasan_save_alloc_info+0x3b/0x50 [ 13.547768] __kasan_kmalloc+0xb7/0xc0 [ 13.547959] __kmalloc_cache_noprof+0x189/0x420 [ 13.548174] kasan_bitops_generic+0x92/0x1c0 [ 13.548370] kunit_try_run_case+0x1a5/0x480 [ 13.548842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.549047] kthread+0x337/0x6f0 [ 13.549164] ret_from_fork+0x116/0x1d0 [ 13.549346] ret_from_fork_asm+0x1a/0x30 [ 13.549534] [ 13.549627] The buggy address belongs to the object at ffff8881025394a0 [ 13.549627] which belongs to the cache kmalloc-16 of size 16 [ 13.550222] The buggy address is located 8 bytes inside of [ 13.550222] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.550752] [ 13.550847] The buggy address belongs to the physical page: [ 13.551075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.551333] flags: 0x200000000000000(node=0|zone=2) [ 13.551556] page_type: f5(slab) [ 13.551717] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.552073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.552409] page dumped because: kasan: bad access detected [ 13.552662] [ 13.552750] Memory state around the buggy address: [ 13.552951] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.553224] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.553474] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.553680] ^ [ 13.553854] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.554370] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.554755] ================================================================== [ 13.516688] ================================================================== [ 13.517888] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.518945] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.519871] [ 13.520002] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.520053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.520066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.520087] Call Trace: [ 13.520101] <TASK> [ 13.520119] dump_stack_lvl+0x73/0xb0 [ 13.520154] print_report+0xd1/0x650 [ 13.520176] ? __virt_addr_valid+0x1db/0x2d0 [ 13.520200] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.520225] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.520246] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.520271] kasan_report+0x141/0x180 [ 13.520292] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.520323] kasan_check_range+0x10c/0x1c0 [ 13.520345] __kasan_check_write+0x18/0x20 [ 13.520364] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.520414] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.520440] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.520464] ? trace_hardirqs_on+0x37/0xe0 [ 13.520486] ? kasan_bitops_generic+0x92/0x1c0 [ 13.520513] kasan_bitops_generic+0x116/0x1c0 [ 13.520536] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.520559] ? __pfx_read_tsc+0x10/0x10 [ 13.520580] ? ktime_get_ts64+0x86/0x230 [ 13.520605] kunit_try_run_case+0x1a5/0x480 [ 13.520630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.520651] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.520674] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.520695] ? __kthread_parkme+0x82/0x180 [ 13.520716] ? preempt_count_sub+0x50/0x80 [ 13.520739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.520761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.520783] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.520804] kthread+0x337/0x6f0 [ 13.520823] ? trace_preempt_on+0x20/0xc0 [ 13.520844] ? __pfx_kthread+0x10/0x10 [ 13.520863] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.520883] ? calculate_sigpending+0x7b/0xa0 [ 13.520906] ? __pfx_kthread+0x10/0x10 [ 13.520927] ret_from_fork+0x116/0x1d0 [ 13.520954] ? __pfx_kthread+0x10/0x10 [ 13.520974] ret_from_fork_asm+0x1a/0x30 [ 13.521004] </TASK> [ 13.521015] [ 13.528797] Allocated by task 286: [ 13.528968] kasan_save_stack+0x45/0x70 [ 13.529106] kasan_save_track+0x18/0x40 [ 13.529230] kasan_save_alloc_info+0x3b/0x50 [ 13.529431] __kasan_kmalloc+0xb7/0xc0 [ 13.529702] __kmalloc_cache_noprof+0x189/0x420 [ 13.529941] kasan_bitops_generic+0x92/0x1c0 [ 13.530144] kunit_try_run_case+0x1a5/0x480 [ 13.530346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.530585] kthread+0x337/0x6f0 [ 13.530704] ret_from_fork+0x116/0x1d0 [ 13.530825] ret_from_fork_asm+0x1a/0x30 [ 13.530973] [ 13.531062] The buggy address belongs to the object at ffff8881025394a0 [ 13.531062] which belongs to the cache kmalloc-16 of size 16 [ 13.531663] The buggy address is located 8 bytes inside of [ 13.531663] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.532097] [ 13.532164] The buggy address belongs to the physical page: [ 13.532324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.532821] flags: 0x200000000000000(node=0|zone=2) [ 13.533074] page_type: f5(slab) [ 13.533239] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.533649] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.533992] page dumped because: kasan: bad access detected [ 13.534214] [ 13.534283] Memory state around the buggy address: [ 13.534553] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.534805] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.535084] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.535374] ^ [ 13.535652] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.535888] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.536097] ================================================================== [ 13.555232] ================================================================== [ 13.555553] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.555898] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.556231] [ 13.556330] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.556372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.556384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.556404] Call Trace: [ 13.556484] <TASK> [ 13.556505] dump_stack_lvl+0x73/0xb0 [ 13.556533] print_report+0xd1/0x650 [ 13.556554] ? __virt_addr_valid+0x1db/0x2d0 [ 13.556575] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.556599] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.556621] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.556645] kasan_report+0x141/0x180 [ 13.556666] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.556695] kasan_check_range+0x10c/0x1c0 [ 13.556718] __kasan_check_write+0x18/0x20 [ 13.556736] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.556760] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.556786] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.556808] ? trace_hardirqs_on+0x37/0xe0 [ 13.556831] ? kasan_bitops_generic+0x92/0x1c0 [ 13.556857] kasan_bitops_generic+0x116/0x1c0 [ 13.556879] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.556903] ? __pfx_read_tsc+0x10/0x10 [ 13.556924] ? ktime_get_ts64+0x86/0x230 [ 13.556960] kunit_try_run_case+0x1a5/0x480 [ 13.556982] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.557003] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.557025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.557046] ? __kthread_parkme+0x82/0x180 [ 13.557064] ? preempt_count_sub+0x50/0x80 [ 13.557088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.557111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.557133] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.557154] kthread+0x337/0x6f0 [ 13.557173] ? trace_preempt_on+0x20/0xc0 [ 13.557194] ? __pfx_kthread+0x10/0x10 [ 13.557215] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.557234] ? calculate_sigpending+0x7b/0xa0 [ 13.557257] ? __pfx_kthread+0x10/0x10 [ 13.557277] ret_from_fork+0x116/0x1d0 [ 13.557295] ? __pfx_kthread+0x10/0x10 [ 13.557314] ret_from_fork_asm+0x1a/0x30 [ 13.557345] </TASK> [ 13.557355] [ 13.565313] Allocated by task 286: [ 13.565655] kasan_save_stack+0x45/0x70 [ 13.565874] kasan_save_track+0x18/0x40 [ 13.566073] kasan_save_alloc_info+0x3b/0x50 [ 13.566277] __kasan_kmalloc+0xb7/0xc0 [ 13.566520] __kmalloc_cache_noprof+0x189/0x420 [ 13.566677] kasan_bitops_generic+0x92/0x1c0 [ 13.566881] kunit_try_run_case+0x1a5/0x480 [ 13.567090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.567333] kthread+0x337/0x6f0 [ 13.567551] ret_from_fork+0x116/0x1d0 [ 13.567714] ret_from_fork_asm+0x1a/0x30 [ 13.567866] [ 13.567943] The buggy address belongs to the object at ffff8881025394a0 [ 13.567943] which belongs to the cache kmalloc-16 of size 16 [ 13.568530] The buggy address is located 8 bytes inside of [ 13.568530] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.569001] [ 13.569078] The buggy address belongs to the physical page: [ 13.569299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.569801] flags: 0x200000000000000(node=0|zone=2) [ 13.570014] page_type: f5(slab) [ 13.570133] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.570355] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.570670] page dumped because: kasan: bad access detected [ 13.570917] [ 13.571014] Memory state around the buggy address: [ 13.571223] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.571597] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.571907] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.572130] ^ [ 13.572269] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.572544] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.572852] ================================================================== [ 13.573307] ================================================================== [ 13.573838] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.574231] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.574644] [ 13.574748] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.574791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.574803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.574822] Call Trace: [ 13.574835] <TASK> [ 13.574849] dump_stack_lvl+0x73/0xb0 [ 13.574875] print_report+0xd1/0x650 [ 13.574896] ? __virt_addr_valid+0x1db/0x2d0 [ 13.574917] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.574952] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.574975] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.574999] kasan_report+0x141/0x180 [ 13.575020] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.575049] kasan_check_range+0x10c/0x1c0 [ 13.575071] __kasan_check_write+0x18/0x20 [ 13.575090] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.575114] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.575139] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.575162] ? trace_hardirqs_on+0x37/0xe0 [ 13.575184] ? kasan_bitops_generic+0x92/0x1c0 [ 13.575211] kasan_bitops_generic+0x116/0x1c0 [ 13.575233] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.575257] ? __pfx_read_tsc+0x10/0x10 [ 13.575276] ? ktime_get_ts64+0x86/0x230 [ 13.575301] kunit_try_run_case+0x1a5/0x480 [ 13.575323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.575345] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.575367] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.575387] ? __kthread_parkme+0x82/0x180 [ 13.575407] ? preempt_count_sub+0x50/0x80 [ 13.575500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.575525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.575547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.575569] kthread+0x337/0x6f0 [ 13.575588] ? trace_preempt_on+0x20/0xc0 [ 13.575609] ? __pfx_kthread+0x10/0x10 [ 13.575629] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.575648] ? calculate_sigpending+0x7b/0xa0 [ 13.575672] ? __pfx_kthread+0x10/0x10 [ 13.575693] ret_from_fork+0x116/0x1d0 [ 13.575710] ? __pfx_kthread+0x10/0x10 [ 13.575730] ret_from_fork_asm+0x1a/0x30 [ 13.575759] </TASK> [ 13.575769] [ 13.586308] Allocated by task 286: [ 13.586619] kasan_save_stack+0x45/0x70 [ 13.586812] kasan_save_track+0x18/0x40 [ 13.586992] kasan_save_alloc_info+0x3b/0x50 [ 13.587180] __kasan_kmalloc+0xb7/0xc0 [ 13.587342] __kmalloc_cache_noprof+0x189/0x420 [ 13.587983] kasan_bitops_generic+0x92/0x1c0 [ 13.588151] kunit_try_run_case+0x1a5/0x480 [ 13.588315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.588836] kthread+0x337/0x6f0 [ 13.589006] ret_from_fork+0x116/0x1d0 [ 13.589174] ret_from_fork_asm+0x1a/0x30 [ 13.589343] [ 13.589656] The buggy address belongs to the object at ffff8881025394a0 [ 13.589656] which belongs to the cache kmalloc-16 of size 16 [ 13.590138] The buggy address is located 8 bytes inside of [ 13.590138] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.590654] [ 13.590742] The buggy address belongs to the physical page: [ 13.590961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.591198] flags: 0x200000000000000(node=0|zone=2) [ 13.591353] page_type: f5(slab) [ 13.591468] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.591967] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.592283] page dumped because: kasan: bad access detected [ 13.592645] [ 13.592730] Memory state around the buggy address: [ 13.592917] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.593183] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.593391] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.593709] ^ [ 13.593920] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.594479] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.594767] ================================================================== [ 13.653034] ================================================================== [ 13.653298] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.653701] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.654005] [ 13.654109] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.654153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.654165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.654185] Call Trace: [ 13.654202] <TASK> [ 13.654218] dump_stack_lvl+0x73/0xb0 [ 13.654245] print_report+0xd1/0x650 [ 13.654267] ? __virt_addr_valid+0x1db/0x2d0 [ 13.654288] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.654312] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.654333] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.654357] kasan_report+0x141/0x180 [ 13.654379] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.654407] kasan_check_range+0x10c/0x1c0 [ 13.654430] __kasan_check_write+0x18/0x20 [ 13.654448] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.654473] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.654498] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.654521] ? trace_hardirqs_on+0x37/0xe0 [ 13.654542] ? kasan_bitops_generic+0x92/0x1c0 [ 13.654568] kasan_bitops_generic+0x116/0x1c0 [ 13.654590] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.654614] ? __pfx_read_tsc+0x10/0x10 [ 13.654635] ? ktime_get_ts64+0x86/0x230 [ 13.654660] kunit_try_run_case+0x1a5/0x480 [ 13.654683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.654704] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.654726] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.654748] ? __kthread_parkme+0x82/0x180 [ 13.654767] ? preempt_count_sub+0x50/0x80 [ 13.654790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.654813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.654834] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.654857] kthread+0x337/0x6f0 [ 13.654875] ? trace_preempt_on+0x20/0xc0 [ 13.654897] ? __pfx_kthread+0x10/0x10 [ 13.654917] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.654947] ? calculate_sigpending+0x7b/0xa0 [ 13.654971] ? __pfx_kthread+0x10/0x10 [ 13.654992] ret_from_fork+0x116/0x1d0 [ 13.655010] ? __pfx_kthread+0x10/0x10 [ 13.655030] ret_from_fork_asm+0x1a/0x30 [ 13.655059] </TASK> [ 13.655070] [ 13.662592] Allocated by task 286: [ 13.662819] kasan_save_stack+0x45/0x70 [ 13.663030] kasan_save_track+0x18/0x40 [ 13.663217] kasan_save_alloc_info+0x3b/0x50 [ 13.663421] __kasan_kmalloc+0xb7/0xc0 [ 13.663619] __kmalloc_cache_noprof+0x189/0x420 [ 13.663924] kasan_bitops_generic+0x92/0x1c0 [ 13.664337] kunit_try_run_case+0x1a5/0x480 [ 13.664511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.664681] kthread+0x337/0x6f0 [ 13.664793] ret_from_fork+0x116/0x1d0 [ 13.664916] ret_from_fork_asm+0x1a/0x30 [ 13.665174] [ 13.665266] The buggy address belongs to the object at ffff8881025394a0 [ 13.665266] which belongs to the cache kmalloc-16 of size 16 [ 13.666233] The buggy address is located 8 bytes inside of [ 13.666233] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.666702] [ 13.666771] The buggy address belongs to the physical page: [ 13.666947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.667179] flags: 0x200000000000000(node=0|zone=2) [ 13.667561] page_type: f5(slab) [ 13.667744] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.668103] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.668434] page dumped because: kasan: bad access detected [ 13.668736] [ 13.668815] Memory state around the buggy address: [ 13.669009] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.669274] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.669625] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.669914] ^ [ 13.670096] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.670301] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.670548] ================================================================== [ 13.595187] ================================================================== [ 13.595513] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.596005] Write of size 8 at addr ffff8881025394a8 by task kunit_try_catch/286 [ 13.596230] [ 13.596310] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.596356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.596367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.596387] Call Trace: [ 13.596404] <TASK> [ 13.596420] dump_stack_lvl+0x73/0xb0 [ 13.596447] print_report+0xd1/0x650 [ 13.596469] ? __virt_addr_valid+0x1db/0x2d0 [ 13.596491] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.596515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.596537] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.596577] kasan_report+0x141/0x180 [ 13.596598] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.596626] kasan_check_range+0x10c/0x1c0 [ 13.596649] __kasan_check_write+0x18/0x20 [ 13.596667] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.596691] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.596717] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.596739] ? trace_hardirqs_on+0x37/0xe0 [ 13.596762] ? kasan_bitops_generic+0x92/0x1c0 [ 13.596787] kasan_bitops_generic+0x116/0x1c0 [ 13.596809] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.596833] ? __pfx_read_tsc+0x10/0x10 [ 13.596853] ? ktime_get_ts64+0x86/0x230 [ 13.596877] kunit_try_run_case+0x1a5/0x480 [ 13.596901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.596922] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.596952] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.596974] ? __kthread_parkme+0x82/0x180 [ 13.596993] ? preempt_count_sub+0x50/0x80 [ 13.597016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.597039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.597062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.597084] kthread+0x337/0x6f0 [ 13.597102] ? trace_preempt_on+0x20/0xc0 [ 13.597124] ? __pfx_kthread+0x10/0x10 [ 13.597143] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.597163] ? calculate_sigpending+0x7b/0xa0 [ 13.597186] ? __pfx_kthread+0x10/0x10 [ 13.597207] ret_from_fork+0x116/0x1d0 [ 13.597224] ? __pfx_kthread+0x10/0x10 [ 13.597244] ret_from_fork_asm+0x1a/0x30 [ 13.597274] </TASK> [ 13.597285] [ 13.605751] Allocated by task 286: [ 13.605948] kasan_save_stack+0x45/0x70 [ 13.606127] kasan_save_track+0x18/0x40 [ 13.606302] kasan_save_alloc_info+0x3b/0x50 [ 13.606563] __kasan_kmalloc+0xb7/0xc0 [ 13.606744] __kmalloc_cache_noprof+0x189/0x420 [ 13.606942] kasan_bitops_generic+0x92/0x1c0 [ 13.607086] kunit_try_run_case+0x1a5/0x480 [ 13.607254] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.607611] kthread+0x337/0x6f0 [ 13.607771] ret_from_fork+0x116/0x1d0 [ 13.607898] ret_from_fork_asm+0x1a/0x30 [ 13.608100] [ 13.608192] The buggy address belongs to the object at ffff8881025394a0 [ 13.608192] which belongs to the cache kmalloc-16 of size 16 [ 13.608741] The buggy address is located 8 bytes inside of [ 13.608741] allocated 9-byte region [ffff8881025394a0, ffff8881025394a9) [ 13.609210] [ 13.609298] The buggy address belongs to the physical page: [ 13.609703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102539 [ 13.610077] flags: 0x200000000000000(node=0|zone=2) [ 13.610259] page_type: f5(slab) [ 13.610419] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.610712] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.611028] page dumped because: kasan: bad access detected [ 13.611248] [ 13.611327] Memory state around the buggy address: [ 13.611475] ffff888102539380: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.611682] ffff888102539400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.611890] >ffff888102539480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 13.612166] ^ [ 13.612382] ffff888102539500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.612739] ffff888102539580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.613055] ==================================================================