Date
June 24, 2025, 11:37 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-x86_64 |
[ 53.764262] ================================================================== [ 53.771573] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 53.779857] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 53.787345] [ 53.788870] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 53.788899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.788908] Hardware name: Thundercomm Dragonboard 845c (DT) [ 53.788918] Call trace: [ 53.788924] show_stack+0x20/0x38 (C) [ 53.788941] dump_stack_lvl+0x8c/0xd0 [ 53.788958] print_report+0x118/0x608 [ 53.788977] kasan_report+0xdc/0x128 [ 53.788995] kasan_check_range+0x100/0x1a8 [ 53.789015] __kasan_check_write+0x20/0x30 [ 53.789032] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 53.789052] kasan_bitops_generic+0x110/0x1c8 [ 53.789071] kunit_try_run_case+0x170/0x3f0 [ 53.789090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.789110] kthread+0x328/0x630 [ 53.789125] ret_from_fork+0x10/0x20 [ 53.789142] [ 53.863792] Allocated by task 359: [ 53.867250] kasan_save_stack+0x3c/0x68 [ 53.871148] kasan_save_track+0x20/0x40 [ 53.875046] kasan_save_alloc_info+0x40/0x58 [ 53.879384] __kasan_kmalloc+0xd4/0xd8 [ 53.883193] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.887795] kasan_bitops_generic+0xa0/0x1c8 [ 53.892136] kunit_try_run_case+0x170/0x3f0 [ 53.896389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.901957] kthread+0x328/0x630 [ 53.905243] ret_from_fork+0x10/0x20 [ 53.908877] [ 53.910400] The buggy address belongs to the object at ffff000080b08100 [ 53.910400] which belongs to the cache kmalloc-16 of size 16 [ 53.922877] The buggy address is located 8 bytes inside of [ 53.922877] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 53.935272] [ 53.936795] The buggy address belongs to the physical page: [ 53.942440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 53.950546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.957154] page_type: f5(slab) [ 53.960353] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 53.968189] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 53.976020] page dumped because: kasan: bad access detected [ 53.981667] [ 53.983190] Memory state around the buggy address: [ 53.988047] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 53.995359] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.002671] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.009981] ^ [ 54.013524] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.020837] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.028147] ================================================================== [ 52.415034] ================================================================== [ 52.422365] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 52.430648] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 52.438143] [ 52.439679] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 52.439711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.439720] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.439732] Call trace: [ 52.439739] show_stack+0x20/0x38 (C) [ 52.439758] dump_stack_lvl+0x8c/0xd0 [ 52.439779] print_report+0x118/0x608 [ 52.439800] kasan_report+0xdc/0x128 [ 52.439819] kasan_check_range+0x100/0x1a8 [ 52.439840] __kasan_check_write+0x20/0x30 [ 52.439856] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 52.439877] kasan_bitops_generic+0x110/0x1c8 [ 52.439896] kunit_try_run_case+0x170/0x3f0 [ 52.439914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.439935] kthread+0x328/0x630 [ 52.439949] ret_from_fork+0x10/0x20 [ 52.439966] [ 52.514598] Allocated by task 359: [ 52.518052] kasan_save_stack+0x3c/0x68 [ 52.521959] kasan_save_track+0x20/0x40 [ 52.525864] kasan_save_alloc_info+0x40/0x58 [ 52.530198] __kasan_kmalloc+0xd4/0xd8 [ 52.534014] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.538613] kasan_bitops_generic+0xa0/0x1c8 [ 52.542948] kunit_try_run_case+0x170/0x3f0 [ 52.547196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.552758] kthread+0x328/0x630 [ 52.556038] ret_from_fork+0x10/0x20 [ 52.559670] [ 52.561194] The buggy address belongs to the object at ffff000080b08100 [ 52.561194] which belongs to the cache kmalloc-16 of size 16 [ 52.573670] The buggy address is located 8 bytes inside of [ 52.573670] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 52.586062] [ 52.587592] The buggy address belongs to the physical page: [ 52.593236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 52.601335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.607945] page_type: f5(slab) [ 52.611145] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 52.618985] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 52.626819] page dumped because: kasan: bad access detected [ 52.632458] [ 52.633980] Memory state around the buggy address: [ 52.638843] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 52.646157] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 52.653472] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.660784] ^ [ 52.664325] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.671638] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.678943] ================================================================== [ 52.686360] ================================================================== [ 52.693678] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 52.701957] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 52.709362] [ 52.710890] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 52.710920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.710929] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.710939] Call trace: [ 52.710945] show_stack+0x20/0x38 (C) [ 52.710962] dump_stack_lvl+0x8c/0xd0 [ 52.710980] print_report+0x118/0x608 [ 52.710999] kasan_report+0xdc/0x128 [ 52.711017] __asan_report_load8_noabort+0x20/0x30 [ 52.711034] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 52.711055] kasan_bitops_generic+0x110/0x1c8 [ 52.711073] kunit_try_run_case+0x170/0x3f0 [ 52.711090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.711111] kthread+0x328/0x630 [ 52.711125] ret_from_fork+0x10/0x20 [ 52.711141] [ 52.782337] Allocated by task 359: [ 52.785791] kasan_save_stack+0x3c/0x68 [ 52.789697] kasan_save_track+0x20/0x40 [ 52.793602] kasan_save_alloc_info+0x40/0x58 [ 52.797935] __kasan_kmalloc+0xd4/0xd8 [ 52.801750] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.806347] kasan_bitops_generic+0xa0/0x1c8 [ 52.810684] kunit_try_run_case+0x170/0x3f0 [ 52.814933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.820492] kthread+0x328/0x630 [ 52.823775] ret_from_fork+0x10/0x20 [ 52.827406] [ 52.828928] The buggy address belongs to the object at ffff000080b08100 [ 52.828928] which belongs to the cache kmalloc-16 of size 16 [ 52.841407] The buggy address is located 8 bytes inside of [ 52.841407] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 52.853799] [ 52.855331] The buggy address belongs to the physical page: [ 52.860970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 52.869067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.875675] page_type: f5(slab) [ 52.878874] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 52.886714] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 52.894545] page dumped because: kasan: bad access detected [ 52.900183] [ 52.901706] Memory state around the buggy address: [ 52.906557] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 52.913871] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 52.921184] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.928496] ^ [ 52.932044] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.939360] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.946665] ================================================================== [ 51.870733] ================================================================== [ 51.881940] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 51.890224] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 51.897725] [ 51.899263] CPU: 3 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 51.899293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.899305] Hardware name: Thundercomm Dragonboard 845c (DT) [ 51.899317] Call trace: [ 51.899324] show_stack+0x20/0x38 (C) [ 51.899343] dump_stack_lvl+0x8c/0xd0 [ 51.899364] print_report+0x118/0x608 [ 51.899385] kasan_report+0xdc/0x128 [ 51.899406] kasan_check_range+0x100/0x1a8 [ 51.899427] __kasan_check_write+0x20/0x30 [ 51.899444] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 51.899465] kasan_bitops_generic+0x110/0x1c8 [ 51.899485] kunit_try_run_case+0x170/0x3f0 [ 51.899505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.899529] kthread+0x328/0x630 [ 51.899546] ret_from_fork+0x10/0x20 [ 51.899565] [ 51.974250] Allocated by task 359: [ 51.977716] kasan_save_stack+0x3c/0x68 [ 51.981625] kasan_save_track+0x20/0x40 [ 51.985531] kasan_save_alloc_info+0x40/0x58 [ 51.989878] __kasan_kmalloc+0xd4/0xd8 [ 51.993696] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.998306] kasan_bitops_generic+0xa0/0x1c8 [ 52.002654] kunit_try_run_case+0x170/0x3f0 [ 52.006915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.012485] kthread+0x328/0x630 [ 52.015773] ret_from_fork+0x10/0x20 [ 52.019417] [ 52.020948] The buggy address belongs to the object at ffff000080b08100 [ 52.020948] which belongs to the cache kmalloc-16 of size 16 [ 52.033439] The buggy address is located 8 bytes inside of [ 52.033439] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 52.045844] [ 52.047377] The buggy address belongs to the physical page: [ 52.053022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 52.061126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.067742] page_type: f5(slab) [ 52.070944] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 52.078792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 52.086634] page dumped because: kasan: bad access detected [ 52.092281] [ 52.093812] Memory state around the buggy address: [ 52.098672] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 52.105986] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 52.113303] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.120616] ^ [ 52.124169] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.131487] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.138801] ================================================================== [ 52.146197] ================================================================== [ 52.153518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 52.161812] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 52.169225] [ 52.170760] CPU: 3 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 52.170792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.170802] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.170815] Call trace: [ 52.170823] show_stack+0x20/0x38 (C) [ 52.170841] dump_stack_lvl+0x8c/0xd0 [ 52.170862] print_report+0x118/0x608 [ 52.170882] kasan_report+0xdc/0x128 [ 52.170901] __asan_report_load8_noabort+0x20/0x30 [ 52.170922] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 52.170943] kasan_bitops_generic+0x110/0x1c8 [ 52.170963] kunit_try_run_case+0x170/0x3f0 [ 52.170982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.171005] kthread+0x328/0x630 [ 52.171021] ret_from_fork+0x10/0x20 [ 52.171039] [ 52.242280] Allocated by task 359: [ 52.245742] kasan_save_stack+0x3c/0x68 [ 52.249657] kasan_save_track+0x20/0x40 [ 52.253568] kasan_save_alloc_info+0x40/0x58 [ 52.257910] __kasan_kmalloc+0xd4/0xd8 [ 52.261733] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.266335] kasan_bitops_generic+0xa0/0x1c8 [ 52.270676] kunit_try_run_case+0x170/0x3f0 [ 52.274933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.280503] kthread+0x328/0x630 [ 52.283797] ret_from_fork+0x10/0x20 [ 52.287438] [ 52.288967] The buggy address belongs to the object at ffff000080b08100 [ 52.288967] which belongs to the cache kmalloc-16 of size 16 [ 52.301459] The buggy address is located 8 bytes inside of [ 52.301459] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 52.313858] [ 52.315389] The buggy address belongs to the physical page: [ 52.321036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 52.329152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.335776] page_type: f5(slab) [ 52.338973] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 52.346821] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 52.354663] page dumped because: kasan: bad access detected [ 52.360317] [ 52.361847] Memory state around the buggy address: [ 52.366709] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 52.374027] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 52.381343] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.388656] ^ [ 52.392205] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.399523] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.406836] ================================================================== [ 52.954032] ================================================================== [ 52.961346] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 52.969624] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 52.977111] [ 52.978647] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 52.978676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.978685] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.978696] Call trace: [ 52.978702] show_stack+0x20/0x38 (C) [ 52.978720] dump_stack_lvl+0x8c/0xd0 [ 52.978737] print_report+0x118/0x608 [ 52.978756] kasan_report+0xdc/0x128 [ 52.978774] kasan_check_range+0x100/0x1a8 [ 52.978793] __kasan_check_write+0x20/0x30 [ 52.978810] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 52.978830] kasan_bitops_generic+0x110/0x1c8 [ 52.978849] kunit_try_run_case+0x170/0x3f0 [ 52.978866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.978887] kthread+0x328/0x630 [ 52.978901] ret_from_fork+0x10/0x20 [ 52.978918] [ 53.053565] Allocated by task 359: [ 53.057022] kasan_save_stack+0x3c/0x68 [ 53.060922] kasan_save_track+0x20/0x40 [ 53.064820] kasan_save_alloc_info+0x40/0x58 [ 53.069159] __kasan_kmalloc+0xd4/0xd8 [ 53.072968] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.077570] kasan_bitops_generic+0xa0/0x1c8 [ 53.081910] kunit_try_run_case+0x170/0x3f0 [ 53.086162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.091733] kthread+0x328/0x630 [ 53.095019] ret_from_fork+0x10/0x20 [ 53.098655] [ 53.100179] The buggy address belongs to the object at ffff000080b08100 [ 53.100179] which belongs to the cache kmalloc-16 of size 16 [ 53.112657] The buggy address is located 8 bytes inside of [ 53.112657] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 53.125052] [ 53.126575] The buggy address belongs to the physical page: [ 53.132222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 53.140329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.146937] page_type: f5(slab) [ 53.150136] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 53.157973] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 53.165805] page dumped because: kasan: bad access detected [ 53.171453] [ 53.172986] Memory state around the buggy address: [ 53.177841] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 53.185155] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 53.192467] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.199776] ^ [ 53.203319] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.210630] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.217940] ================================================================== [ 54.306819] ================================================================== [ 54.314129] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 54.322414] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 54.329815] [ 54.331341] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 54.331369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.331377] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.331388] Call trace: [ 54.331393] show_stack+0x20/0x38 (C) [ 54.331410] dump_stack_lvl+0x8c/0xd0 [ 54.331428] print_report+0x118/0x608 [ 54.331446] kasan_report+0xdc/0x128 [ 54.331465] __asan_report_load8_noabort+0x20/0x30 [ 54.331482] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 54.331500] kasan_bitops_generic+0x110/0x1c8 [ 54.331518] kunit_try_run_case+0x170/0x3f0 [ 54.331535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.331555] kthread+0x328/0x630 [ 54.331569] ret_from_fork+0x10/0x20 [ 54.331585] [ 54.402780] Allocated by task 359: [ 54.406236] kasan_save_stack+0x3c/0x68 [ 54.410135] kasan_save_track+0x20/0x40 [ 54.414034] kasan_save_alloc_info+0x40/0x58 [ 54.418374] __kasan_kmalloc+0xd4/0xd8 [ 54.422184] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.426785] kasan_bitops_generic+0xa0/0x1c8 [ 54.431126] kunit_try_run_case+0x170/0x3f0 [ 54.435379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.440947] kthread+0x328/0x630 [ 54.444233] ret_from_fork+0x10/0x20 [ 54.447869] [ 54.449392] The buggy address belongs to the object at ffff000080b08100 [ 54.449392] which belongs to the cache kmalloc-16 of size 16 [ 54.461869] The buggy address is located 8 bytes inside of [ 54.461869] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 54.474262] [ 54.475785] The buggy address belongs to the physical page: [ 54.481430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 54.489535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.496142] page_type: f5(slab) [ 54.499341] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.507177] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.515008] page dumped because: kasan: bad access detected [ 54.520653] [ 54.522175] Memory state around the buggy address: [ 54.527031] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 54.534343] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.541654] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.548964] ^ [ 54.552508] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.559820] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.567129] ================================================================== [ 54.035551] ================================================================== [ 54.042865] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 54.051151] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 54.058640] [ 54.060166] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 54.060195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.060205] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.060216] Call trace: [ 54.060223] show_stack+0x20/0x38 (C) [ 54.060239] dump_stack_lvl+0x8c/0xd0 [ 54.060257] print_report+0x118/0x608 [ 54.060276] kasan_report+0xdc/0x128 [ 54.060295] kasan_check_range+0x100/0x1a8 [ 54.060315] __kasan_check_write+0x20/0x30 [ 54.060332] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 54.060351] kasan_bitops_generic+0x110/0x1c8 [ 54.060369] kunit_try_run_case+0x170/0x3f0 [ 54.060388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.060410] kthread+0x328/0x630 [ 54.060424] ret_from_fork+0x10/0x20 [ 54.060441] [ 54.135089] Allocated by task 359: [ 54.138545] kasan_save_stack+0x3c/0x68 [ 54.142444] kasan_save_track+0x20/0x40 [ 54.146342] kasan_save_alloc_info+0x40/0x58 [ 54.150680] __kasan_kmalloc+0xd4/0xd8 [ 54.154490] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.159091] kasan_bitops_generic+0xa0/0x1c8 [ 54.163433] kunit_try_run_case+0x170/0x3f0 [ 54.167687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.173255] kthread+0x328/0x630 [ 54.176541] ret_from_fork+0x10/0x20 [ 54.180176] [ 54.181698] The buggy address belongs to the object at ffff000080b08100 [ 54.181698] which belongs to the cache kmalloc-16 of size 16 [ 54.194177] The buggy address is located 8 bytes inside of [ 54.194177] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 54.206572] [ 54.208096] The buggy address belongs to the physical page: [ 54.213741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 54.221846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.228453] page_type: f5(slab) [ 54.231651] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.239488] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.247320] page dumped because: kasan: bad access detected [ 54.252965] [ 54.254487] Memory state around the buggy address: [ 54.259341] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 54.266654] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.273966] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.281276] ^ [ 54.284818] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.292129] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.299438] ================================================================== [ 53.225326] ================================================================== [ 53.232638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 53.240924] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 53.248413] [ 53.249940] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 53.249971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.249980] Hardware name: Thundercomm Dragonboard 845c (DT) [ 53.249989] Call trace: [ 53.249995] show_stack+0x20/0x38 (C) [ 53.250013] dump_stack_lvl+0x8c/0xd0 [ 53.250032] print_report+0x118/0x608 [ 53.250051] kasan_report+0xdc/0x128 [ 53.250070] kasan_check_range+0x100/0x1a8 [ 53.250090] __kasan_check_write+0x20/0x30 [ 53.250106] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 53.250125] kasan_bitops_generic+0x110/0x1c8 [ 53.250143] kunit_try_run_case+0x170/0x3f0 [ 53.250160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.250182] kthread+0x328/0x630 [ 53.250195] ret_from_fork+0x10/0x20 [ 53.250212] [ 53.324862] Allocated by task 359: [ 53.328318] kasan_save_stack+0x3c/0x68 [ 53.332218] kasan_save_track+0x20/0x40 [ 53.336115] kasan_save_alloc_info+0x40/0x58 [ 53.340452] __kasan_kmalloc+0xd4/0xd8 [ 53.344262] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.348863] kasan_bitops_generic+0xa0/0x1c8 [ 53.353204] kunit_try_run_case+0x170/0x3f0 [ 53.357458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.363026] kthread+0x328/0x630 [ 53.366313] ret_from_fork+0x10/0x20 [ 53.369947] [ 53.371470] The buggy address belongs to the object at ffff000080b08100 [ 53.371470] which belongs to the cache kmalloc-16 of size 16 [ 53.383948] The buggy address is located 8 bytes inside of [ 53.383948] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 53.396336] [ 53.397858] The buggy address belongs to the physical page: [ 53.403504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 53.411610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.418220] page_type: f5(slab) [ 53.421418] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 53.429254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 53.437087] page dumped because: kasan: bad access detected [ 53.442733] [ 53.444256] Memory state around the buggy address: [ 53.449111] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 53.456422] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 53.463736] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.471045] ^ [ 53.474589] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.481902] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.489213] ================================================================== [ 53.496579] ================================================================== [ 53.503889] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 53.512175] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 53.519576] [ 53.521102] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 53.521131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.521140] Hardware name: Thundercomm Dragonboard 845c (DT) [ 53.521150] Call trace: [ 53.521156] show_stack+0x20/0x38 (C) [ 53.521174] dump_stack_lvl+0x8c/0xd0 [ 53.521192] print_report+0x118/0x608 [ 53.521212] kasan_report+0xdc/0x128 [ 53.521230] __asan_report_load8_noabort+0x20/0x30 [ 53.521248] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 53.521267] kasan_bitops_generic+0x110/0x1c8 [ 53.521286] kunit_try_run_case+0x170/0x3f0 [ 53.521303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.521326] kthread+0x328/0x630 [ 53.521339] ret_from_fork+0x10/0x20 [ 53.521356] [ 53.592551] Allocated by task 359: [ 53.596006] kasan_save_stack+0x3c/0x68 [ 53.599905] kasan_save_track+0x20/0x40 [ 53.603801] kasan_save_alloc_info+0x40/0x58 [ 53.608139] __kasan_kmalloc+0xd4/0xd8 [ 53.611948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.616549] kasan_bitops_generic+0xa0/0x1c8 [ 53.620890] kunit_try_run_case+0x170/0x3f0 [ 53.625142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.630710] kthread+0x328/0x630 [ 53.633995] ret_from_fork+0x10/0x20 [ 53.637629] [ 53.639151] The buggy address belongs to the object at ffff000080b08100 [ 53.639151] which belongs to the cache kmalloc-16 of size 16 [ 53.651627] The buggy address is located 8 bytes inside of [ 53.651627] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 53.664020] [ 53.665544] The buggy address belongs to the physical page: [ 53.671189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 53.679296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.685903] page_type: f5(slab) [ 53.689101] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 53.696939] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 53.704771] page dumped because: kasan: bad access detected [ 53.710416] [ 53.711939] Memory state around the buggy address: [ 53.716793] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 53.724104] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 53.731415] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.738725] ^ [ 53.742268] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.749579] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.756888] ==================================================================
[ 31.904290] ================================================================== [ 31.905592] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 31.906534] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 31.907020] [ 31.907412] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 31.907534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.907582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.907683] Call Trace: [ 31.907728] <TASK> [ 31.907771] dump_stack_lvl+0x73/0xb0 [ 31.907896] print_report+0xd1/0x650 [ 31.907971] ? __virt_addr_valid+0x1db/0x2d0 [ 31.908036] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 31.908253] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.908325] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 31.908397] kasan_report+0x141/0x180 [ 31.908457] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 31.908499] kasan_check_range+0x10c/0x1c0 [ 31.908532] __kasan_check_write+0x18/0x20 [ 31.908585] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 31.908619] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.908681] ? __kmalloc_cache_noprof+0x189/0x420 [ 31.908714] ? trace_hardirqs_on+0x37/0xe0 [ 31.908746] ? kasan_bitops_generic+0x92/0x1c0 [ 31.908781] kasan_bitops_generic+0x116/0x1c0 [ 31.908812] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.908845] ? __pfx_read_tsc+0x10/0x10 [ 31.908875] ? ktime_get_ts64+0x86/0x230 [ 31.908907] kunit_try_run_case+0x1a5/0x480 [ 31.908939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.908969] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 31.909002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.909034] ? __kthread_parkme+0x82/0x180 [ 31.909089] ? preempt_count_sub+0x50/0x80 [ 31.909151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.909200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.909247] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.909295] kthread+0x337/0x6f0 [ 31.909333] ? trace_preempt_on+0x20/0xc0 [ 31.909378] ? __pfx_kthread+0x10/0x10 [ 31.909417] ? _raw_spin_unlock_irq+0x47/0x80 [ 31.909465] ? calculate_sigpending+0x7b/0xa0 [ 31.909511] ? __pfx_kthread+0x10/0x10 [ 31.909573] ret_from_fork+0x116/0x1d0 [ 31.909617] ? __pfx_kthread+0x10/0x10 [ 31.909670] ret_from_fork_asm+0x1a/0x30 [ 31.909714] </TASK> [ 31.909729] [ 31.929789] Allocated by task 291: [ 31.930578] kasan_save_stack+0x45/0x70 [ 31.931197] kasan_save_track+0x18/0x40 [ 31.931674] kasan_save_alloc_info+0x3b/0x50 [ 31.932220] __kasan_kmalloc+0xb7/0xc0 [ 31.932485] __kmalloc_cache_noprof+0x189/0x420 [ 31.932823] kasan_bitops_generic+0x92/0x1c0 [ 31.933323] kunit_try_run_case+0x1a5/0x480 [ 31.933851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.934783] kthread+0x337/0x6f0 [ 31.935325] ret_from_fork+0x116/0x1d0 [ 31.935772] ret_from_fork_asm+0x1a/0x30 [ 31.936346] [ 31.936594] The buggy address belongs to the object at ffff8881010ffca0 [ 31.936594] which belongs to the cache kmalloc-16 of size 16 [ 31.937768] The buggy address is located 8 bytes inside of [ 31.937768] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 31.939245] [ 31.939455] The buggy address belongs to the physical page: [ 31.939976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 31.940757] flags: 0x200000000000000(node=0|zone=2) [ 31.941376] page_type: f5(slab) [ 31.941771] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.942702] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.943425] page dumped because: kasan: bad access detected [ 31.943857] [ 31.944198] Memory state around the buggy address: [ 31.944722] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.945498] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 31.946155] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.946832] ^ [ 31.947328] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.948086] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.948669] ================================================================== [ 31.815726] ================================================================== [ 31.816393] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 31.818007] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 31.818461] [ 31.818879] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 31.818999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.819033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.819081] Call Trace: [ 31.819234] <TASK> [ 31.819286] dump_stack_lvl+0x73/0xb0 [ 31.819372] print_report+0xd1/0x650 [ 31.819415] ? __virt_addr_valid+0x1db/0x2d0 [ 31.819453] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 31.819487] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.819522] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 31.819578] kasan_report+0x141/0x180 [ 31.819608] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 31.819661] kasan_check_range+0x10c/0x1c0 [ 31.819695] __kasan_check_write+0x18/0x20 [ 31.819725] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 31.819758] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.819793] ? __kmalloc_cache_noprof+0x189/0x420 [ 31.819836] ? trace_hardirqs_on+0x37/0xe0 [ 31.819868] ? kasan_bitops_generic+0x92/0x1c0 [ 31.819903] kasan_bitops_generic+0x116/0x1c0 [ 31.819935] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.819966] ? __pfx_read_tsc+0x10/0x10 [ 31.819997] ? ktime_get_ts64+0x86/0x230 [ 31.820030] kunit_try_run_case+0x1a5/0x480 [ 31.820080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.820132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 31.820190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.820237] ? __kthread_parkme+0x82/0x180 [ 31.820268] ? preempt_count_sub+0x50/0x80 [ 31.820300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.820333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.820366] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.820398] kthread+0x337/0x6f0 [ 31.820425] ? trace_preempt_on+0x20/0xc0 [ 31.820454] ? __pfx_kthread+0x10/0x10 [ 31.820481] ? _raw_spin_unlock_irq+0x47/0x80 [ 31.820512] ? calculate_sigpending+0x7b/0xa0 [ 31.820564] ? __pfx_kthread+0x10/0x10 [ 31.820594] ret_from_fork+0x116/0x1d0 [ 31.820621] ? __pfx_kthread+0x10/0x10 [ 31.820683] ret_from_fork_asm+0x1a/0x30 [ 31.820727] </TASK> [ 31.820744] [ 31.840095] Allocated by task 291: [ 31.840490] kasan_save_stack+0x45/0x70 [ 31.840813] kasan_save_track+0x18/0x40 [ 31.841066] kasan_save_alloc_info+0x3b/0x50 [ 31.841486] __kasan_kmalloc+0xb7/0xc0 [ 31.842487] __kmalloc_cache_noprof+0x189/0x420 [ 31.843019] kasan_bitops_generic+0x92/0x1c0 [ 31.843571] kunit_try_run_case+0x1a5/0x480 [ 31.844190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.844576] kthread+0x337/0x6f0 [ 31.844993] ret_from_fork+0x116/0x1d0 [ 31.845435] ret_from_fork_asm+0x1a/0x30 [ 31.845972] [ 31.846484] The buggy address belongs to the object at ffff8881010ffca0 [ 31.846484] which belongs to the cache kmalloc-16 of size 16 [ 31.848293] The buggy address is located 8 bytes inside of [ 31.848293] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 31.849633] [ 31.849949] The buggy address belongs to the physical page: [ 31.850197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 31.851370] flags: 0x200000000000000(node=0|zone=2) [ 31.852096] page_type: f5(slab) [ 31.852361] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.853505] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.854474] page dumped because: kasan: bad access detected [ 31.855000] [ 31.855141] Memory state around the buggy address: [ 31.856025] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.856662] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 31.857516] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.858237] ^ [ 31.858989] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.859724] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.860431] ================================================================== [ 32.117234] ================================================================== [ 32.118046] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 32.119038] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 32.119693] [ 32.119999] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 32.120112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.120143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.120194] Call Trace: [ 32.120227] <TASK> [ 32.120266] dump_stack_lvl+0x73/0xb0 [ 32.120342] print_report+0xd1/0x650 [ 32.120826] ? __virt_addr_valid+0x1db/0x2d0 [ 32.120916] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 32.120956] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.120993] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 32.121027] kasan_report+0x141/0x180 [ 32.121064] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 32.121164] kasan_check_range+0x10c/0x1c0 [ 32.121223] __kasan_check_write+0x18/0x20 [ 32.121259] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 32.121295] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 32.121330] ? __kmalloc_cache_noprof+0x189/0x420 [ 32.121364] ? trace_hardirqs_on+0x37/0xe0 [ 32.121397] ? kasan_bitops_generic+0x92/0x1c0 [ 32.121431] kasan_bitops_generic+0x116/0x1c0 [ 32.121462] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.121495] ? __pfx_read_tsc+0x10/0x10 [ 32.121523] ? ktime_get_ts64+0x86/0x230 [ 32.121579] kunit_try_run_case+0x1a5/0x480 [ 32.121616] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.121681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.121716] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.121749] ? __kthread_parkme+0x82/0x180 [ 32.121777] ? preempt_count_sub+0x50/0x80 [ 32.121808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.121839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.121870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.121901] kthread+0x337/0x6f0 [ 32.121928] ? trace_preempt_on+0x20/0xc0 [ 32.121958] ? __pfx_kthread+0x10/0x10 [ 32.121985] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.122014] ? calculate_sigpending+0x7b/0xa0 [ 32.122045] ? __pfx_kthread+0x10/0x10 [ 32.122091] ret_from_fork+0x116/0x1d0 [ 32.122136] ? __pfx_kthread+0x10/0x10 [ 32.122178] ret_from_fork_asm+0x1a/0x30 [ 32.122220] </TASK> [ 32.122235] [ 32.141358] Allocated by task 291: [ 32.141824] kasan_save_stack+0x45/0x70 [ 32.142313] kasan_save_track+0x18/0x40 [ 32.142796] kasan_save_alloc_info+0x3b/0x50 [ 32.143321] __kasan_kmalloc+0xb7/0xc0 [ 32.143767] __kmalloc_cache_noprof+0x189/0x420 [ 32.144727] kasan_bitops_generic+0x92/0x1c0 [ 32.145189] kunit_try_run_case+0x1a5/0x480 [ 32.145530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.146416] kthread+0x337/0x6f0 [ 32.146822] ret_from_fork+0x116/0x1d0 [ 32.147300] ret_from_fork_asm+0x1a/0x30 [ 32.147808] [ 32.147990] The buggy address belongs to the object at ffff8881010ffca0 [ 32.147990] which belongs to the cache kmalloc-16 of size 16 [ 32.149491] The buggy address is located 8 bytes inside of [ 32.149491] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.150483] [ 32.150754] The buggy address belongs to the physical page: [ 32.151291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.151963] flags: 0x200000000000000(node=0|zone=2) [ 32.152782] page_type: f5(slab) [ 32.153305] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.153892] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.154453] page dumped because: kasan: bad access detected [ 32.154881] [ 32.155047] Memory state around the buggy address: [ 32.155401] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.156584] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.157334] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.158123] ^ [ 32.158861] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.159528] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.160298] ================================================================== [ 32.036411] ================================================================== [ 32.036935] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 32.037416] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 32.038009] [ 32.038263] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 32.038376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.038406] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.038451] Call Trace: [ 32.038487] <TASK> [ 32.038551] dump_stack_lvl+0x73/0xb0 [ 32.038624] print_report+0xd1/0x650 [ 32.038683] ? __virt_addr_valid+0x1db/0x2d0 [ 32.038744] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 32.038805] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.038866] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 32.038927] kasan_report+0x141/0x180 [ 32.038989] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 32.039069] kasan_check_range+0x10c/0x1c0 [ 32.039135] __kasan_check_write+0x18/0x20 [ 32.039200] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 32.039271] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 32.039342] ? __kmalloc_cache_noprof+0x189/0x420 [ 32.039409] ? trace_hardirqs_on+0x37/0xe0 [ 32.039473] ? kasan_bitops_generic+0x92/0x1c0 [ 32.039584] kasan_bitops_generic+0x116/0x1c0 [ 32.039652] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.039710] ? __pfx_read_tsc+0x10/0x10 [ 32.039761] ? ktime_get_ts64+0x86/0x230 [ 32.039817] kunit_try_run_case+0x1a5/0x480 [ 32.039885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.039937] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.039996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.040029] ? __kthread_parkme+0x82/0x180 [ 32.040063] ? preempt_count_sub+0x50/0x80 [ 32.040134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.040184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.040219] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.040251] kthread+0x337/0x6f0 [ 32.040279] ? trace_preempt_on+0x20/0xc0 [ 32.040310] ? __pfx_kthread+0x10/0x10 [ 32.040337] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.040367] ? calculate_sigpending+0x7b/0xa0 [ 32.040400] ? __pfx_kthread+0x10/0x10 [ 32.040428] ret_from_fork+0x116/0x1d0 [ 32.040453] ? __pfx_kthread+0x10/0x10 [ 32.040480] ret_from_fork_asm+0x1a/0x30 [ 32.040520] </TASK> [ 32.040534] [ 32.055457] Allocated by task 291: [ 32.055888] kasan_save_stack+0x45/0x70 [ 32.056323] kasan_save_track+0x18/0x40 [ 32.056711] kasan_save_alloc_info+0x3b/0x50 [ 32.057021] __kasan_kmalloc+0xb7/0xc0 [ 32.057404] __kmalloc_cache_noprof+0x189/0x420 [ 32.058008] kasan_bitops_generic+0x92/0x1c0 [ 32.058285] kunit_try_run_case+0x1a5/0x480 [ 32.058560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.059060] kthread+0x337/0x6f0 [ 32.059463] ret_from_fork+0x116/0x1d0 [ 32.059905] ret_from_fork_asm+0x1a/0x30 [ 32.060266] [ 32.060455] The buggy address belongs to the object at ffff8881010ffca0 [ 32.060455] which belongs to the cache kmalloc-16 of size 16 [ 32.061220] The buggy address is located 8 bytes inside of [ 32.061220] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.061904] [ 32.062113] The buggy address belongs to the physical page: [ 32.062652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.063331] flags: 0x200000000000000(node=0|zone=2) [ 32.063919] page_type: f5(slab) [ 32.064141] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.064497] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.065165] page dumped because: kasan: bad access detected [ 32.066661] [ 32.066863] Memory state around the buggy address: [ 32.067420] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.068087] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.068629] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.068973] ^ [ 32.069253] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.070614] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.071351] ================================================================== [ 31.861898] ================================================================== [ 31.863117] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 31.863656] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 31.864734] [ 31.865562] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 31.865639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.865663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.865690] Call Trace: [ 31.865708] <TASK> [ 31.865732] dump_stack_lvl+0x73/0xb0 [ 31.865779] print_report+0xd1/0x650 [ 31.865812] ? __virt_addr_valid+0x1db/0x2d0 [ 31.865845] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 31.865878] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.865912] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 31.865946] kasan_report+0x141/0x180 [ 31.865974] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 31.866012] kasan_check_range+0x10c/0x1c0 [ 31.866041] __kasan_check_write+0x18/0x20 [ 31.866092] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 31.866148] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.866197] ? __kmalloc_cache_noprof+0x189/0x420 [ 31.866246] ? trace_hardirqs_on+0x37/0xe0 [ 31.866294] ? kasan_bitops_generic+0x92/0x1c0 [ 31.866350] kasan_bitops_generic+0x116/0x1c0 [ 31.866401] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.866685] ? __pfx_read_tsc+0x10/0x10 [ 31.866779] ? ktime_get_ts64+0x86/0x230 [ 31.866841] kunit_try_run_case+0x1a5/0x480 [ 31.866883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.866915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 31.866949] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.866993] ? __kthread_parkme+0x82/0x180 [ 31.867036] ? preempt_count_sub+0x50/0x80 [ 31.867103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.867137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.867170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.867202] kthread+0x337/0x6f0 [ 31.867228] ? trace_preempt_on+0x20/0xc0 [ 31.867259] ? __pfx_kthread+0x10/0x10 [ 31.867286] ? _raw_spin_unlock_irq+0x47/0x80 [ 31.867316] ? calculate_sigpending+0x7b/0xa0 [ 31.867347] ? __pfx_kthread+0x10/0x10 [ 31.867375] ret_from_fork+0x116/0x1d0 [ 31.867401] ? __pfx_kthread+0x10/0x10 [ 31.867429] ret_from_fork_asm+0x1a/0x30 [ 31.867468] </TASK> [ 31.867482] [ 31.885040] Allocated by task 291: [ 31.885614] kasan_save_stack+0x45/0x70 [ 31.886255] kasan_save_track+0x18/0x40 [ 31.886607] kasan_save_alloc_info+0x3b/0x50 [ 31.886915] __kasan_kmalloc+0xb7/0xc0 [ 31.887673] __kmalloc_cache_noprof+0x189/0x420 [ 31.888294] kasan_bitops_generic+0x92/0x1c0 [ 31.888800] kunit_try_run_case+0x1a5/0x480 [ 31.889232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.889899] kthread+0x337/0x6f0 [ 31.890414] ret_from_fork+0x116/0x1d0 [ 31.891056] ret_from_fork_asm+0x1a/0x30 [ 31.891622] [ 31.891839] The buggy address belongs to the object at ffff8881010ffca0 [ 31.891839] which belongs to the cache kmalloc-16 of size 16 [ 31.893063] The buggy address is located 8 bytes inside of [ 31.893063] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 31.895006] [ 31.895272] The buggy address belongs to the physical page: [ 31.896151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 31.896905] flags: 0x200000000000000(node=0|zone=2) [ 31.897373] page_type: f5(slab) [ 31.897824] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.898393] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.899021] page dumped because: kasan: bad access detected [ 31.899288] [ 31.899491] Memory state around the buggy address: [ 31.899977] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.900450] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 31.901462] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.901758] ^ [ 31.901912] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.902313] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.902987] ================================================================== [ 31.949767] ================================================================== [ 31.950692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 31.951294] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 31.952267] [ 31.952456] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 31.952589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.952655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.952735] Call Trace: [ 31.952777] <TASK> [ 31.952815] dump_stack_lvl+0x73/0xb0 [ 31.952920] print_report+0xd1/0x650 [ 31.952983] ? __virt_addr_valid+0x1db/0x2d0 [ 31.953261] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 31.953357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.953432] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 31.953504] kasan_report+0x141/0x180 [ 31.953577] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 31.953680] kasan_check_range+0x10c/0x1c0 [ 31.953750] __kasan_check_write+0x18/0x20 [ 31.953793] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 31.953828] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.953864] ? __kmalloc_cache_noprof+0x189/0x420 [ 31.953897] ? trace_hardirqs_on+0x37/0xe0 [ 31.953928] ? kasan_bitops_generic+0x92/0x1c0 [ 31.953963] kasan_bitops_generic+0x116/0x1c0 [ 31.953993] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.954025] ? __pfx_read_tsc+0x10/0x10 [ 31.954097] ? ktime_get_ts64+0x86/0x230 [ 31.954154] kunit_try_run_case+0x1a5/0x480 [ 31.954210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.954306] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 31.954365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.954412] ? __kthread_parkme+0x82/0x180 [ 31.954442] ? preempt_count_sub+0x50/0x80 [ 31.954475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.954508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.954564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.954598] kthread+0x337/0x6f0 [ 31.954625] ? trace_preempt_on+0x20/0xc0 [ 31.954678] ? __pfx_kthread+0x10/0x10 [ 31.954706] ? _raw_spin_unlock_irq+0x47/0x80 [ 31.954737] ? calculate_sigpending+0x7b/0xa0 [ 31.954769] ? __pfx_kthread+0x10/0x10 [ 31.954797] ret_from_fork+0x116/0x1d0 [ 31.954823] ? __pfx_kthread+0x10/0x10 [ 31.954852] ret_from_fork_asm+0x1a/0x30 [ 31.954892] </TASK> [ 31.954906] [ 31.973311] Allocated by task 291: [ 31.973705] kasan_save_stack+0x45/0x70 [ 31.974393] kasan_save_track+0x18/0x40 [ 31.974830] kasan_save_alloc_info+0x3b/0x50 [ 31.975491] __kasan_kmalloc+0xb7/0xc0 [ 31.975951] __kmalloc_cache_noprof+0x189/0x420 [ 31.976328] kasan_bitops_generic+0x92/0x1c0 [ 31.976791] kunit_try_run_case+0x1a5/0x480 [ 31.977497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.978327] kthread+0x337/0x6f0 [ 31.978585] ret_from_fork+0x116/0x1d0 [ 31.978978] ret_from_fork_asm+0x1a/0x30 [ 31.979557] [ 31.979759] The buggy address belongs to the object at ffff8881010ffca0 [ 31.979759] which belongs to the cache kmalloc-16 of size 16 [ 31.980533] The buggy address is located 8 bytes inside of [ 31.980533] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 31.981687] [ 31.981834] The buggy address belongs to the physical page: [ 31.982688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 31.983519] flags: 0x200000000000000(node=0|zone=2) [ 31.983890] page_type: f5(slab) [ 31.984111] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.985417] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.986043] page dumped because: kasan: bad access detected [ 31.986489] [ 31.986811] Memory state around the buggy address: [ 31.987562] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.988094] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 31.988678] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.989821] ^ [ 31.990135] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.990734] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.991399] ================================================================== [ 32.072279] ================================================================== [ 32.072929] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 32.073326] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 32.074490] [ 32.074759] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 32.074870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.074902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.074953] Call Trace: [ 32.074995] <TASK> [ 32.075035] dump_stack_lvl+0x73/0xb0 [ 32.075105] print_report+0xd1/0x650 [ 32.075160] ? __virt_addr_valid+0x1db/0x2d0 [ 32.075222] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 32.075281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.075346] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 32.075406] kasan_report+0x141/0x180 [ 32.075465] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 32.075535] kasan_check_range+0x10c/0x1c0 [ 32.075619] __kasan_check_write+0x18/0x20 [ 32.075804] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 32.075895] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 32.075956] ? __kmalloc_cache_noprof+0x189/0x420 [ 32.076007] ? trace_hardirqs_on+0x37/0xe0 [ 32.076064] ? kasan_bitops_generic+0x92/0x1c0 [ 32.076130] kasan_bitops_generic+0x116/0x1c0 [ 32.076188] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.076255] ? __pfx_read_tsc+0x10/0x10 [ 32.076314] ? ktime_get_ts64+0x86/0x230 [ 32.076386] kunit_try_run_case+0x1a5/0x480 [ 32.076452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.076514] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.076603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.076672] ? __kthread_parkme+0x82/0x180 [ 32.076729] ? preempt_count_sub+0x50/0x80 [ 32.076795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.076864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.076934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.077000] kthread+0x337/0x6f0 [ 32.077425] ? trace_preempt_on+0x20/0xc0 [ 32.077514] ? __pfx_kthread+0x10/0x10 [ 32.077597] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.077660] ? calculate_sigpending+0x7b/0xa0 [ 32.077722] ? __pfx_kthread+0x10/0x10 [ 32.077775] ret_from_fork+0x116/0x1d0 [ 32.077832] ? __pfx_kthread+0x10/0x10 [ 32.077883] ret_from_fork_asm+0x1a/0x30 [ 32.077958] </TASK> [ 32.077988] [ 32.095655] Allocated by task 291: [ 32.095947] kasan_save_stack+0x45/0x70 [ 32.096389] kasan_save_track+0x18/0x40 [ 32.096978] kasan_save_alloc_info+0x3b/0x50 [ 32.097319] __kasan_kmalloc+0xb7/0xc0 [ 32.097939] __kmalloc_cache_noprof+0x189/0x420 [ 32.098271] kasan_bitops_generic+0x92/0x1c0 [ 32.099589] kunit_try_run_case+0x1a5/0x480 [ 32.100002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.100424] kthread+0x337/0x6f0 [ 32.100904] ret_from_fork+0x116/0x1d0 [ 32.101330] ret_from_fork_asm+0x1a/0x30 [ 32.101937] [ 32.102144] The buggy address belongs to the object at ffff8881010ffca0 [ 32.102144] which belongs to the cache kmalloc-16 of size 16 [ 32.103567] The buggy address is located 8 bytes inside of [ 32.103567] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.104955] [ 32.105203] The buggy address belongs to the physical page: [ 32.105747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.106781] flags: 0x200000000000000(node=0|zone=2) [ 32.107561] page_type: f5(slab) [ 32.107959] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.108792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.109203] page dumped because: kasan: bad access detected [ 32.110045] [ 32.110248] Memory state around the buggy address: [ 32.110930] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.111855] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.112351] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.112995] ^ [ 32.113348] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.114027] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.114773] ================================================================== [ 31.992399] ================================================================== [ 31.992769] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 31.993205] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 31.994249] [ 31.994461] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 31.994597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.994644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.994697] Call Trace: [ 31.994737] <TASK> [ 31.994781] dump_stack_lvl+0x73/0xb0 [ 31.994857] print_report+0xd1/0x650 [ 31.994919] ? __virt_addr_valid+0x1db/0x2d0 [ 31.994987] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 31.995057] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.995129] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 31.995200] kasan_report+0x141/0x180 [ 31.995257] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 31.995328] kasan_check_range+0x10c/0x1c0 [ 31.995390] __kasan_check_write+0x18/0x20 [ 31.995448] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 31.995506] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.995584] ? __kmalloc_cache_noprof+0x189/0x420 [ 31.995646] ? trace_hardirqs_on+0x37/0xe0 [ 31.995704] ? kasan_bitops_generic+0x92/0x1c0 [ 31.995792] kasan_bitops_generic+0x116/0x1c0 [ 31.995855] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.995889] ? __pfx_read_tsc+0x10/0x10 [ 31.995922] ? ktime_get_ts64+0x86/0x230 [ 31.995954] kunit_try_run_case+0x1a5/0x480 [ 31.995988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.996018] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 31.996065] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.996190] ? __kthread_parkme+0x82/0x180 [ 31.996246] ? preempt_count_sub+0x50/0x80 [ 31.996309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.996379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.996445] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.996482] kthread+0x337/0x6f0 [ 31.996510] ? trace_preempt_on+0x20/0xc0 [ 31.996569] ? __pfx_kthread+0x10/0x10 [ 31.996598] ? _raw_spin_unlock_irq+0x47/0x80 [ 31.996635] ? calculate_sigpending+0x7b/0xa0 [ 31.996693] ? __pfx_kthread+0x10/0x10 [ 31.996723] ret_from_fork+0x116/0x1d0 [ 31.996750] ? __pfx_kthread+0x10/0x10 [ 31.996779] ret_from_fork_asm+0x1a/0x30 [ 31.996820] </TASK> [ 31.996837] [ 32.016598] Allocated by task 291: [ 32.016902] kasan_save_stack+0x45/0x70 [ 32.017494] kasan_save_track+0x18/0x40 [ 32.017771] kasan_save_alloc_info+0x3b/0x50 [ 32.018417] __kasan_kmalloc+0xb7/0xc0 [ 32.018981] __kmalloc_cache_noprof+0x189/0x420 [ 32.019872] kasan_bitops_generic+0x92/0x1c0 [ 32.020375] kunit_try_run_case+0x1a5/0x480 [ 32.020967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.021736] kthread+0x337/0x6f0 [ 32.022115] ret_from_fork+0x116/0x1d0 [ 32.022874] ret_from_fork_asm+0x1a/0x30 [ 32.023435] [ 32.023596] The buggy address belongs to the object at ffff8881010ffca0 [ 32.023596] which belongs to the cache kmalloc-16 of size 16 [ 32.025178] The buggy address is located 8 bytes inside of [ 32.025178] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.026048] [ 32.026191] The buggy address belongs to the physical page: [ 32.027232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.027983] flags: 0x200000000000000(node=0|zone=2) [ 32.028394] page_type: f5(slab) [ 32.028834] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.029783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.030527] page dumped because: kasan: bad access detected [ 32.031136] [ 32.031365] Memory state around the buggy address: [ 32.031933] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.032917] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.033617] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.033816] ^ [ 32.033946] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.034576] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.035071] ==================================================================