Date
June 26, 2025, 9:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 53.785737] ================================================================== [ 53.793056] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 53.801330] Write of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 53.808821] [ 53.810347] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 53.810375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.810383] Hardware name: Thundercomm Dragonboard 845c (DT) [ 53.810393] Call trace: [ 53.810399] show_stack+0x20/0x38 (C) [ 53.810416] dump_stack_lvl+0x8c/0xd0 [ 53.810434] print_report+0x118/0x608 [ 53.810453] kasan_report+0xdc/0x128 [ 53.810472] kasan_check_range+0x100/0x1a8 [ 53.810492] __kasan_check_write+0x20/0x30 [ 53.810507] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 53.810527] kasan_bitops_generic+0x110/0x1c8 [ 53.810545] kunit_try_run_case+0x170/0x3f0 [ 53.810562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.810582] kthread+0x328/0x630 [ 53.810596] ret_from_fork+0x10/0x20 [ 53.810613] [ 53.885238] Allocated by task 347: [ 53.888688] kasan_save_stack+0x3c/0x68 [ 53.892590] kasan_save_track+0x20/0x40 [ 53.896493] kasan_save_alloc_info+0x40/0x58 [ 53.900827] __kasan_kmalloc+0xd4/0xd8 [ 53.904640] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.909236] kasan_bitops_generic+0xa0/0x1c8 [ 53.913572] kunit_try_run_case+0x170/0x3f0 [ 53.917820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.923383] kthread+0x328/0x630 [ 53.926667] ret_from_fork+0x10/0x20 [ 53.930307] [ 53.931836] The buggy address belongs to the object at ffff000093276b80 [ 53.931836] which belongs to the cache kmalloc-16 of size 16 [ 53.944311] The buggy address is located 8 bytes inside of [ 53.944311] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 53.956704] [ 53.958226] The buggy address belongs to the physical page: [ 53.963872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 53.971979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.978594] page_type: f5(slab) [ 53.981788] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 53.989625] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 53.997456] page dumped because: kasan: bad access detected [ 54.003099] [ 54.004628] Memory state around the buggy address: [ 54.009488] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 54.016801] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.024115] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.031428] ^ [ 54.034968] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.042282] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.049594] ================================================================== [ 54.056995] ================================================================== [ 54.064310] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 54.072589] Read of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 54.079994] [ 54.081519] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 54.081548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.081556] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.081566] Call trace: [ 54.081573] show_stack+0x20/0x38 (C) [ 54.081591] dump_stack_lvl+0x8c/0xd0 [ 54.081610] print_report+0x118/0x608 [ 54.081628] kasan_report+0xdc/0x128 [ 54.081646] __asan_report_load8_noabort+0x20/0x30 [ 54.081663] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 54.081682] kasan_bitops_generic+0x110/0x1c8 [ 54.081700] kunit_try_run_case+0x170/0x3f0 [ 54.081718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.081738] kthread+0x328/0x630 [ 54.081753] ret_from_fork+0x10/0x20 [ 54.081770] [ 54.152985] Allocated by task 347: [ 54.156436] kasan_save_stack+0x3c/0x68 [ 54.160341] kasan_save_track+0x20/0x40 [ 54.164244] kasan_save_alloc_info+0x40/0x58 [ 54.168578] __kasan_kmalloc+0xd4/0xd8 [ 54.172393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.176990] kasan_bitops_generic+0xa0/0x1c8 [ 54.181326] kunit_try_run_case+0x170/0x3f0 [ 54.185575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.191140] kthread+0x328/0x630 [ 54.194421] ret_from_fork+0x10/0x20 [ 54.198051] [ 54.199581] The buggy address belongs to the object at ffff000093276b80 [ 54.199581] which belongs to the cache kmalloc-16 of size 16 [ 54.212055] The buggy address is located 8 bytes inside of [ 54.212055] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 54.224446] [ 54.225970] The buggy address belongs to the physical page: [ 54.231616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 54.239715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.246329] page_type: f5(slab) [ 54.249524] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.257362] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.265195] page dumped because: kasan: bad access detected [ 54.270837] [ 54.272365] Memory state around the buggy address: [ 54.277225] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 54.284541] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.291854] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.299160] ^ [ 54.302698] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.310009] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.317323] ================================================================== [ 55.134835] ================================================================== [ 55.142146] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 55.150421] Write of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 55.157910] [ 55.159436] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 55.159464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.159471] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.159481] Call trace: [ 55.159487] show_stack+0x20/0x38 (C) [ 55.159503] dump_stack_lvl+0x8c/0xd0 [ 55.159520] print_report+0x118/0x608 [ 55.159538] kasan_report+0xdc/0x128 [ 55.159556] kasan_check_range+0x100/0x1a8 [ 55.159575] __kasan_check_write+0x20/0x30 [ 55.159590] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 55.159609] kasan_bitops_generic+0x110/0x1c8 [ 55.159626] kunit_try_run_case+0x170/0x3f0 [ 55.159643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.159664] kthread+0x328/0x630 [ 55.159677] ret_from_fork+0x10/0x20 [ 55.159693] [ 55.234326] Allocated by task 347: [ 55.237782] kasan_save_stack+0x3c/0x68 [ 55.241680] kasan_save_track+0x20/0x40 [ 55.245577] kasan_save_alloc_info+0x40/0x58 [ 55.249915] __kasan_kmalloc+0xd4/0xd8 [ 55.253724] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.258325] kasan_bitops_generic+0xa0/0x1c8 [ 55.262666] kunit_try_run_case+0x170/0x3f0 [ 55.266919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.272478] kthread+0x328/0x630 [ 55.275764] ret_from_fork+0x10/0x20 [ 55.279398] [ 55.280921] The buggy address belongs to the object at ffff000093276b80 [ 55.280921] which belongs to the cache kmalloc-16 of size 16 [ 55.293400] The buggy address is located 8 bytes inside of [ 55.293400] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 55.305796] [ 55.307319] The buggy address belongs to the physical page: [ 55.312965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 55.321062] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.327670] page_type: f5(slab) [ 55.330869] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.338707] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.346539] page dumped because: kasan: bad access detected [ 55.352185] [ 55.353707] Memory state around the buggy address: [ 55.358562] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 55.365875] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.373188] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.380499] ^ [ 55.384042] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.391354] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.398664] ================================================================== [ 54.324681] ================================================================== [ 54.331995] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 54.340271] Write of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 54.347760] [ 54.349285] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 54.349313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.349321] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.349331] Call trace: [ 54.349337] show_stack+0x20/0x38 (C) [ 54.349354] dump_stack_lvl+0x8c/0xd0 [ 54.349372] print_report+0x118/0x608 [ 54.349391] kasan_report+0xdc/0x128 [ 54.349409] kasan_check_range+0x100/0x1a8 [ 54.349429] __kasan_check_write+0x20/0x30 [ 54.349444] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 54.349463] kasan_bitops_generic+0x110/0x1c8 [ 54.349480] kunit_try_run_case+0x170/0x3f0 [ 54.349497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.349518] kthread+0x328/0x630 [ 54.349531] ret_from_fork+0x10/0x20 [ 54.349547] [ 54.424212] Allocated by task 347: [ 54.427663] kasan_save_stack+0x3c/0x68 [ 54.431567] kasan_save_track+0x20/0x40 [ 54.435461] kasan_save_alloc_info+0x40/0x58 [ 54.439792] __kasan_kmalloc+0xd4/0xd8 [ 54.443609] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.448206] kasan_bitops_generic+0xa0/0x1c8 [ 54.452542] kunit_try_run_case+0x170/0x3f0 [ 54.456791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.462357] kthread+0x328/0x630 [ 54.465637] ret_from_fork+0x10/0x20 [ 54.469268] [ 54.470791] The buggy address belongs to the object at ffff000093276b80 [ 54.470791] which belongs to the cache kmalloc-16 of size 16 [ 54.483267] The buggy address is located 8 bytes inside of [ 54.483267] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 54.495656] [ 54.497180] The buggy address belongs to the physical page: [ 54.502820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 54.510917] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.517529] page_type: f5(slab) [ 54.520723] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.528562] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.536395] page dumped because: kasan: bad access detected [ 54.542037] [ 54.543567] Memory state around the buggy address: [ 54.548417] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 54.555731] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.563037] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.570349] ^ [ 54.573887] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.581202] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.588515] ================================================================== [ 54.595873] ================================================================== [ 54.603190] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 54.611464] Write of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 54.618947] [ 54.620473] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 54.620502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.620511] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.620521] Call trace: [ 54.620527] show_stack+0x20/0x38 (C) [ 54.620544] dump_stack_lvl+0x8c/0xd0 [ 54.620561] print_report+0x118/0x608 [ 54.620581] kasan_report+0xdc/0x128 [ 54.620599] kasan_check_range+0x100/0x1a8 [ 54.620617] __kasan_check_write+0x20/0x30 [ 54.620634] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 54.620653] kasan_bitops_generic+0x110/0x1c8 [ 54.620671] kunit_try_run_case+0x170/0x3f0 [ 54.620688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.620707] kthread+0x328/0x630 [ 54.620721] ret_from_fork+0x10/0x20 [ 54.620738] [ 54.695380] Allocated by task 347: [ 54.698837] kasan_save_stack+0x3c/0x68 [ 54.702736] kasan_save_track+0x20/0x40 [ 54.706633] kasan_save_alloc_info+0x40/0x58 [ 54.710970] __kasan_kmalloc+0xd4/0xd8 [ 54.714779] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.719381] kasan_bitops_generic+0xa0/0x1c8 [ 54.723721] kunit_try_run_case+0x170/0x3f0 [ 54.727975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.733544] kthread+0x328/0x630 [ 54.736830] ret_from_fork+0x10/0x20 [ 54.740466] [ 54.741989] The buggy address belongs to the object at ffff000093276b80 [ 54.741989] which belongs to the cache kmalloc-16 of size 16 [ 54.754469] The buggy address is located 8 bytes inside of [ 54.754469] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 54.766865] [ 54.768388] The buggy address belongs to the physical page: [ 54.774034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 54.782132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.788740] page_type: f5(slab) [ 54.791940] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.799777] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.807611] page dumped because: kasan: bad access detected [ 54.813258] [ 54.814781] Memory state around the buggy address: [ 54.819637] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 54.826950] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.834263] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.841573] ^ [ 54.845116] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.852428] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.859739] ================================================================== [ 54.867113] ================================================================== [ 54.874428] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 54.882703] Read of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 54.890107] [ 54.891634] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 54.891662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.891669] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.891680] Call trace: [ 54.891686] show_stack+0x20/0x38 (C) [ 54.891704] dump_stack_lvl+0x8c/0xd0 [ 54.891722] print_report+0x118/0x608 [ 54.891741] kasan_report+0xdc/0x128 [ 54.891760] __asan_report_load8_noabort+0x20/0x30 [ 54.891776] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 54.891796] kasan_bitops_generic+0x110/0x1c8 [ 54.891815] kunit_try_run_case+0x170/0x3f0 [ 54.891832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.891853] kthread+0x328/0x630 [ 54.891867] ret_from_fork+0x10/0x20 [ 54.891883] [ 54.963094] Allocated by task 347: [ 54.966550] kasan_save_stack+0x3c/0x68 [ 54.970448] kasan_save_track+0x20/0x40 [ 54.974347] kasan_save_alloc_info+0x40/0x58 [ 54.978685] __kasan_kmalloc+0xd4/0xd8 [ 54.982493] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.987096] kasan_bitops_generic+0xa0/0x1c8 [ 54.991438] kunit_try_run_case+0x170/0x3f0 [ 54.995692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.001250] kthread+0x328/0x630 [ 55.004536] ret_from_fork+0x10/0x20 [ 55.008171] [ 55.009693] The buggy address belongs to the object at ffff000093276b80 [ 55.009693] which belongs to the cache kmalloc-16 of size 16 [ 55.022174] The buggy address is located 8 bytes inside of [ 55.022174] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 55.034571] [ 55.036095] The buggy address belongs to the physical page: [ 55.041740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 55.049838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.056447] page_type: f5(slab) [ 55.059648] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.067485] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.075320] page dumped because: kasan: bad access detected [ 55.080969] [ 55.082491] Memory state around the buggy address: [ 55.087347] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 55.094661] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.101975] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.109287] ^ [ 55.112830] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.120143] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.127454] ================================================================== [ 55.406033] ================================================================== [ 55.413346] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 55.421621] Write of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 55.429111] [ 55.430636] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 55.430665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.430672] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.430682] Call trace: [ 55.430687] show_stack+0x20/0x38 (C) [ 55.430704] dump_stack_lvl+0x8c/0xd0 [ 55.430722] print_report+0x118/0x608 [ 55.430740] kasan_report+0xdc/0x128 [ 55.430757] kasan_check_range+0x100/0x1a8 [ 55.430777] __kasan_check_write+0x20/0x30 [ 55.430793] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 55.430811] kasan_bitops_generic+0x110/0x1c8 [ 55.430829] kunit_try_run_case+0x170/0x3f0 [ 55.430846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.430867] kthread+0x328/0x630 [ 55.430880] ret_from_fork+0x10/0x20 [ 55.430896] [ 55.505530] Allocated by task 347: [ 55.508986] kasan_save_stack+0x3c/0x68 [ 55.512884] kasan_save_track+0x20/0x40 [ 55.516781] kasan_save_alloc_info+0x40/0x58 [ 55.521119] __kasan_kmalloc+0xd4/0xd8 [ 55.524928] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.529530] kasan_bitops_generic+0xa0/0x1c8 [ 55.533871] kunit_try_run_case+0x170/0x3f0 [ 55.538124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.543693] kthread+0x328/0x630 [ 55.546979] ret_from_fork+0x10/0x20 [ 55.550614] [ 55.552136] The buggy address belongs to the object at ffff000093276b80 [ 55.552136] which belongs to the cache kmalloc-16 of size 16 [ 55.564617] The buggy address is located 8 bytes inside of [ 55.564617] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 55.577013] [ 55.578536] The buggy address belongs to the physical page: [ 55.584184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 55.592280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.598889] page_type: f5(slab) [ 55.602088] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.609925] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.617759] page dumped because: kasan: bad access detected [ 55.623407] [ 55.624930] Memory state around the buggy address: [ 55.629785] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 55.637097] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.644412] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.651723] ^ [ 55.655267] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.662579] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.669892] ================================================================== [ 53.242874] ================================================================== [ 53.254084] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 53.262377] Write of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 53.269869] [ 53.271406] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 53.271437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.271445] Hardware name: Thundercomm Dragonboard 845c (DT) [ 53.271457] Call trace: [ 53.271464] show_stack+0x20/0x38 (C) [ 53.271482] dump_stack_lvl+0x8c/0xd0 [ 53.271500] print_report+0x118/0x608 [ 53.271519] kasan_report+0xdc/0x128 [ 53.271537] kasan_check_range+0x100/0x1a8 [ 53.271557] __kasan_check_write+0x20/0x30 [ 53.271573] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 53.271591] kasan_bitops_generic+0x110/0x1c8 [ 53.271609] kunit_try_run_case+0x170/0x3f0 [ 53.271628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.271649] kthread+0x328/0x630 [ 53.271663] ret_from_fork+0x10/0x20 [ 53.271680] [ 53.346306] Allocated by task 347: [ 53.349768] kasan_save_stack+0x3c/0x68 [ 53.353675] kasan_save_track+0x20/0x40 [ 53.357580] kasan_save_alloc_info+0x40/0x58 [ 53.361914] __kasan_kmalloc+0xd4/0xd8 [ 53.365729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.370327] kasan_bitops_generic+0xa0/0x1c8 [ 53.374662] kunit_try_run_case+0x170/0x3f0 [ 53.378911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.384479] kthread+0x328/0x630 [ 53.387760] ret_from_fork+0x10/0x20 [ 53.391401] [ 53.392933] The buggy address belongs to the object at ffff000093276b80 [ 53.392933] which belongs to the cache kmalloc-16 of size 16 [ 53.405411] The buggy address is located 8 bytes inside of [ 53.405411] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 53.417804] [ 53.419337] The buggy address belongs to the physical page: [ 53.424977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 53.433076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.439688] page_type: f5(slab) [ 53.442890] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 53.450729] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 53.458563] page dumped because: kasan: bad access detected [ 53.464211] [ 53.465734] Memory state around the buggy address: [ 53.470597] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 53.477912] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 53.485226] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.492540] ^ [ 53.496079] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.503395] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.510698] ================================================================== [ 55.677270] ================================================================== [ 55.684582] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 55.692858] Read of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 55.700261] [ 55.701786] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 55.701815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.701823] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.701834] Call trace: [ 55.701839] show_stack+0x20/0x38 (C) [ 55.701856] dump_stack_lvl+0x8c/0xd0 [ 55.701874] print_report+0x118/0x608 [ 55.701893] kasan_report+0xdc/0x128 [ 55.701911] __asan_report_load8_noabort+0x20/0x30 [ 55.701926] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 55.701946] kasan_bitops_generic+0x110/0x1c8 [ 55.701964] kunit_try_run_case+0x170/0x3f0 [ 55.701980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.702000] kthread+0x328/0x630 [ 55.702013] ret_from_fork+0x10/0x20 [ 55.702030] [ 55.773220] Allocated by task 347: [ 55.776677] kasan_save_stack+0x3c/0x68 [ 55.780575] kasan_save_track+0x20/0x40 [ 55.784472] kasan_save_alloc_info+0x40/0x58 [ 55.788810] __kasan_kmalloc+0xd4/0xd8 [ 55.792619] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.797220] kasan_bitops_generic+0xa0/0x1c8 [ 55.801561] kunit_try_run_case+0x170/0x3f0 [ 55.805814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.811384] kthread+0x328/0x630 [ 55.814669] ret_from_fork+0x10/0x20 [ 55.818303] [ 55.819826] The buggy address belongs to the object at ffff000093276b80 [ 55.819826] which belongs to the cache kmalloc-16 of size 16 [ 55.832305] The buggy address is located 8 bytes inside of [ 55.832305] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 55.844701] [ 55.846224] The buggy address belongs to the physical page: [ 55.851871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 55.859968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.866577] page_type: f5(slab) [ 55.869776] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.877614] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.885447] page dumped because: kasan: bad access detected [ 55.891093] [ 55.892615] Memory state around the buggy address: [ 55.897471] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 55.904783] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.912096] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.919407] ^ [ 55.922950] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.930263] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.937574] ================================================================== [ 53.518067] ================================================================== [ 53.525384] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 53.533662] Read of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 53.541065] [ 53.542592] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 53.542621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.542630] Hardware name: Thundercomm Dragonboard 845c (DT) [ 53.542640] Call trace: [ 53.542647] show_stack+0x20/0x38 (C) [ 53.542665] dump_stack_lvl+0x8c/0xd0 [ 53.542683] print_report+0x118/0x608 [ 53.542703] kasan_report+0xdc/0x128 [ 53.542722] __asan_report_load8_noabort+0x20/0x30 [ 53.542740] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 53.542760] kasan_bitops_generic+0x110/0x1c8 [ 53.542779] kunit_try_run_case+0x170/0x3f0 [ 53.542797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.542818] kthread+0x328/0x630 [ 53.542832] ret_from_fork+0x10/0x20 [ 53.542849] [ 53.614034] Allocated by task 347: [ 53.617485] kasan_save_stack+0x3c/0x68 [ 53.621389] kasan_save_track+0x20/0x40 [ 53.625293] kasan_save_alloc_info+0x40/0x58 [ 53.629627] __kasan_kmalloc+0xd4/0xd8 [ 53.633441] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.638038] kasan_bitops_generic+0xa0/0x1c8 [ 53.642375] kunit_try_run_case+0x170/0x3f0 [ 53.646623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.652182] kthread+0x328/0x630 [ 53.655466] ret_from_fork+0x10/0x20 [ 53.659097] [ 53.660626] The buggy address belongs to the object at ffff000093276b80 [ 53.660626] which belongs to the cache kmalloc-16 of size 16 [ 53.673102] The buggy address is located 8 bytes inside of [ 53.673102] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 53.685494] [ 53.687017] The buggy address belongs to the physical page: [ 53.692665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 53.700765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.707376] page_type: f5(slab) [ 53.710575] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 53.718413] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 53.726249] page dumped because: kasan: bad access detected [ 53.731896] [ 53.733419] Memory state around the buggy address: [ 53.738271] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 53.745584] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 53.752898] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.760210] ^ [ 53.763757] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.771066] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.778375] ==================================================================
[ 29.119433] ================================================================== [ 29.119826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 29.119907] Write of size 8 at addr fff00000c16b9cc8 by task kunit_try_catch/273 [ 29.119960] [ 29.119995] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.120473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.120667] Hardware name: linux,dummy-virt (DT) [ 29.120731] Call trace: [ 29.120791] show_stack+0x20/0x38 (C) [ 29.120949] dump_stack_lvl+0x8c/0xd0 [ 29.121343] print_report+0x118/0x608 [ 29.121415] kasan_report+0xdc/0x128 [ 29.121831] kasan_check_range+0x100/0x1a8 [ 29.121992] __kasan_check_write+0x20/0x30 [ 29.122105] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 29.122351] kasan_bitops_generic+0x110/0x1c8 [ 29.122630] kunit_try_run_case+0x170/0x3f0 [ 29.122705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.122910] kthread+0x328/0x630 [ 29.123114] ret_from_fork+0x10/0x20 [ 29.123293] [ 29.123609] Allocated by task 273: [ 29.123839] kasan_save_stack+0x3c/0x68 [ 29.124039] kasan_save_track+0x20/0x40 [ 29.124097] kasan_save_alloc_info+0x40/0x58 [ 29.124477] __kasan_kmalloc+0xd4/0xd8 [ 29.124740] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.124963] kasan_bitops_generic+0xa0/0x1c8 [ 29.125022] kunit_try_run_case+0x170/0x3f0 [ 29.125224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.125279] kthread+0x328/0x630 [ 29.125533] ret_from_fork+0x10/0x20 [ 29.125734] [ 29.125853] The buggy address belongs to the object at fff00000c16b9cc0 [ 29.125853] which belongs to the cache kmalloc-16 of size 16 [ 29.126250] The buggy address is located 8 bytes inside of [ 29.126250] allocated 9-byte region [fff00000c16b9cc0, fff00000c16b9cc9) [ 29.126426] [ 29.126468] The buggy address belongs to the physical page: [ 29.126509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9 [ 29.126580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.126642] page_type: f5(slab) [ 29.126683] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.126737] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000 [ 29.126790] page dumped because: kasan: bad access detected [ 29.126824] [ 29.126853] Memory state around the buggy address: [ 29.126887] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.126939] fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.126985] >fff00000c16b9c80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 29.127040] ^ [ 29.127090] fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.127152] fff00000c16b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.127192] ================================================================== [ 29.132673] ================================================================== [ 29.133132] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 29.133354] Read of size 8 at addr fff00000c16b9cc8 by task kunit_try_catch/273 [ 29.133541] [ 29.133585] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.133767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.133801] Hardware name: linux,dummy-virt (DT) [ 29.133870] Call trace: [ 29.133897] show_stack+0x20/0x38 (C) [ 29.134014] dump_stack_lvl+0x8c/0xd0 [ 29.134078] print_report+0x118/0x608 [ 29.134274] kasan_report+0xdc/0x128 [ 29.134534] __asan_report_load8_noabort+0x20/0x30 [ 29.134605] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 29.134858] kasan_bitops_generic+0x110/0x1c8 [ 29.135018] kunit_try_run_case+0x170/0x3f0 [ 29.135276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.135494] kthread+0x328/0x630 [ 29.135611] ret_from_fork+0x10/0x20 [ 29.135675] [ 29.135696] Allocated by task 273: [ 29.135729] kasan_save_stack+0x3c/0x68 [ 29.135783] kasan_save_track+0x20/0x40 [ 29.135990] kasan_save_alloc_info+0x40/0x58 [ 29.136124] __kasan_kmalloc+0xd4/0xd8 [ 29.136428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.136594] kasan_bitops_generic+0xa0/0x1c8 [ 29.136694] kunit_try_run_case+0x170/0x3f0 [ 29.136735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.136801] kthread+0x328/0x630 [ 29.137015] ret_from_fork+0x10/0x20 [ 29.137220] [ 29.137398] The buggy address belongs to the object at fff00000c16b9cc0 [ 29.137398] which belongs to the cache kmalloc-16 of size 16 [ 29.137535] The buggy address is located 8 bytes inside of [ 29.137535] allocated 9-byte region [fff00000c16b9cc0, fff00000c16b9cc9) [ 29.137640] [ 29.137662] The buggy address belongs to the physical page: [ 29.137743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9 [ 29.137959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.138080] page_type: f5(slab) [ 29.138237] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.138695] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000 [ 29.138781] page dumped because: kasan: bad access detected [ 29.138914] [ 29.138957] Memory state around the buggy address: [ 29.139192] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.139415] fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.139526] >fff00000c16b9c80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 29.139656] ^ [ 29.139713] fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.139892] fff00000c16b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.139981] ================================================================== [ 29.141753] ================================================================== [ 29.141809] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 29.141865] Write of size 8 at addr fff00000c16b9cc8 by task kunit_try_catch/273 [ 29.141918] [ 29.142309] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.142519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.142553] Hardware name: linux,dummy-virt (DT) [ 29.142633] Call trace: [ 29.142661] show_stack+0x20/0x38 (C) [ 29.142982] dump_stack_lvl+0x8c/0xd0 [ 29.143043] print_report+0x118/0x608 [ 29.143103] kasan_report+0xdc/0x128 [ 29.143151] kasan_check_range+0x100/0x1a8 [ 29.143201] __kasan_check_write+0x20/0x30 [ 29.143268] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 29.143323] kasan_bitops_generic+0x110/0x1c8 [ 29.144584] kasan_bitops_generic+0xa0/0x1c8 [ 29.145344] [ 29.145949] The buggy address belongs to the physical page: [ 29.148153] fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.150463] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 29.151411] Call trace: [ 29.151662] __asan_report_load8_noabort+0x20/0x30 [ 29.151939] kthread+0x328/0x630 [ 29.152985] kasan_save_alloc_info+0x40/0x58 [ 29.153813] kunit_try_run_case+0x170/0x3f0 [ 29.154484] [ 29.154993] [ 29.155199] The buggy address belongs to the physical page: [ 29.155352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.155497] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000 [ 29.156154] fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.158597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.159476] kasan_report+0xdc/0x128 [ 29.159674] kasan_check_range+0x100/0x1a8 [ 29.159877] __kasan_check_write+0x20/0x30 [ 29.160764] ret_from_fork+0x10/0x20 [ 29.161658] kasan_save_alloc_info+0x40/0x58 [ 29.161867] kunit_try_run_case+0x170/0x3f0 [ 29.162015] ret_from_fork+0x10/0x20 [ 29.162249] [ 29.162284] The buggy address belongs to the physical page: [ 29.162435] page_type: f5(slab) [ 29.162709] fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.165980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.166260] dump_stack_lvl+0x8c/0xd0 [ 29.166615] print_report+0x118/0x608 [ 29.166731] kasan_report+0xdc/0x128 [ 29.167093] kasan_bitops_generic+0x110/0x1c8 [ 29.168153] kasan_save_stack+0x3c/0x68 [ 29.168540] kasan_save_alloc_info+0x40/0x58 [ 29.169814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.170919] The buggy address is located 8 bytes inside of [ 29.170919] allocated 9-byte region [fff00000c16b9cc0, fff00000c16b9cc9) [ 29.172122] page_type: f5(slab) [ 29.173221] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.174167] ==================================================================
[ 24.354080] ================================================================== [ 24.354743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 24.355070] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.355304] [ 24.355484] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.355531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.355543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.355564] Call Trace: [ 24.355585] <TASK> [ 24.355602] dump_stack_lvl+0x73/0xb0 [ 24.355630] print_report+0xd1/0x650 [ 24.355651] ? __virt_addr_valid+0x1db/0x2d0 [ 24.355675] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 24.355700] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.355725] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 24.355750] kasan_report+0x141/0x180 [ 24.355771] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 24.355799] kasan_check_range+0x10c/0x1c0 [ 24.355823] __kasan_check_write+0x18/0x20 [ 24.355847] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 24.355872] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.355898] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.355921] ? trace_hardirqs_on+0x37/0xe0 [ 24.355943] ? kasan_bitops_generic+0x92/0x1c0 [ 24.355969] kasan_bitops_generic+0x116/0x1c0 [ 24.355992] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.356016] ? __pfx_read_tsc+0x10/0x10 [ 24.356093] ? ktime_get_ts64+0x86/0x230 [ 24.356118] kunit_try_run_case+0x1a5/0x480 [ 24.356143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.356165] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.356190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.356215] ? __kthread_parkme+0x82/0x180 [ 24.356245] ? preempt_count_sub+0x50/0x80 [ 24.356269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.356292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.356316] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.356339] kthread+0x337/0x6f0 [ 24.356358] ? trace_preempt_on+0x20/0xc0 [ 24.356380] ? __pfx_kthread+0x10/0x10 [ 24.356400] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.356423] ? calculate_sigpending+0x7b/0xa0 [ 24.356446] ? __pfx_kthread+0x10/0x10 [ 24.356467] ret_from_fork+0x116/0x1d0 [ 24.356485] ? __pfx_kthread+0x10/0x10 [ 24.356506] ret_from_fork_asm+0x1a/0x30 [ 24.356536] </TASK> [ 24.356548] [ 24.365001] Allocated by task 290: [ 24.365185] kasan_save_stack+0x45/0x70 [ 24.365398] kasan_save_track+0x18/0x40 [ 24.365583] kasan_save_alloc_info+0x3b/0x50 [ 24.365956] __kasan_kmalloc+0xb7/0xc0 [ 24.366327] __kmalloc_cache_noprof+0x189/0x420 [ 24.366546] kasan_bitops_generic+0x92/0x1c0 [ 24.366736] kunit_try_run_case+0x1a5/0x480 [ 24.367072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.367289] kthread+0x337/0x6f0 [ 24.367404] ret_from_fork+0x116/0x1d0 [ 24.367529] ret_from_fork_asm+0x1a/0x30 [ 24.367660] [ 24.367724] The buggy address belongs to the object at ffff88810278b720 [ 24.367724] which belongs to the cache kmalloc-16 of size 16 [ 24.368239] The buggy address is located 8 bytes inside of [ 24.368239] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.368764] [ 24.368858] The buggy address belongs to the physical page: [ 24.369173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.369500] flags: 0x200000000000000(node=0|zone=2) [ 24.369707] page_type: f5(slab) [ 24.369843] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.370065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.370595] page dumped because: kasan: bad access detected [ 24.370914] [ 24.370986] Memory state around the buggy address: [ 24.371143] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.371469] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.371680] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.372245] ^ [ 24.372671] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.372974] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.373179] ================================================================== [ 24.158339] ================================================================== [ 24.158796] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 24.159077] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.159310] [ 24.159399] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.159452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.159465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.159490] Call Trace: [ 24.159504] <TASK> [ 24.159524] dump_stack_lvl+0x73/0xb0 [ 24.159554] print_report+0xd1/0x650 [ 24.159578] ? __virt_addr_valid+0x1db/0x2d0 [ 24.159602] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 24.159626] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.159652] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 24.159676] kasan_report+0x141/0x180 [ 24.159697] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 24.159725] kasan_check_range+0x10c/0x1c0 [ 24.159748] __kasan_check_write+0x18/0x20 [ 24.159770] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 24.159795] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.159820] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.159844] ? trace_hardirqs_on+0x37/0xe0 [ 24.159866] ? kasan_bitops_generic+0x92/0x1c0 [ 24.159891] kasan_bitops_generic+0x116/0x1c0 [ 24.159914] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.159937] ? __pfx_read_tsc+0x10/0x10 [ 24.159960] ? ktime_get_ts64+0x86/0x230 [ 24.159983] kunit_try_run_case+0x1a5/0x480 [ 24.160007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.160029] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.160054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.160079] ? __kthread_parkme+0x82/0x180 [ 24.160099] ? preempt_count_sub+0x50/0x80 [ 24.160122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.160145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.160169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.160192] kthread+0x337/0x6f0 [ 24.160211] ? trace_preempt_on+0x20/0xc0 [ 24.160659] ? __pfx_kthread+0x10/0x10 [ 24.160698] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.160725] ? calculate_sigpending+0x7b/0xa0 [ 24.160749] ? __pfx_kthread+0x10/0x10 [ 24.160771] ret_from_fork+0x116/0x1d0 [ 24.160790] ? __pfx_kthread+0x10/0x10 [ 24.160820] ret_from_fork_asm+0x1a/0x30 [ 24.160851] </TASK> [ 24.160863] [ 24.179906] Allocated by task 290: [ 24.180421] kasan_save_stack+0x45/0x70 [ 24.180680] kasan_save_track+0x18/0x40 [ 24.180861] kasan_save_alloc_info+0x3b/0x50 [ 24.181284] __kasan_kmalloc+0xb7/0xc0 [ 24.181548] __kmalloc_cache_noprof+0x189/0x420 [ 24.181876] kasan_bitops_generic+0x92/0x1c0 [ 24.182211] kunit_try_run_case+0x1a5/0x480 [ 24.182569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.182987] kthread+0x337/0x6f0 [ 24.183238] ret_from_fork+0x116/0x1d0 [ 24.183531] ret_from_fork_asm+0x1a/0x30 [ 24.183727] [ 24.183965] The buggy address belongs to the object at ffff88810278b720 [ 24.183965] which belongs to the cache kmalloc-16 of size 16 [ 24.184627] The buggy address is located 8 bytes inside of [ 24.184627] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.185437] [ 24.185664] The buggy address belongs to the physical page: [ 24.186215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.186684] flags: 0x200000000000000(node=0|zone=2) [ 24.187211] page_type: f5(slab) [ 24.187530] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.187889] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.188511] page dumped because: kasan: bad access detected [ 24.188889] [ 24.189104] Memory state around the buggy address: [ 24.189462] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.190055] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.190508] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.191044] ^ [ 24.191323] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.191738] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.192264] ================================================================== [ 24.309961] ================================================================== [ 24.310478] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 24.311010] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.311281] [ 24.311392] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.311442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.311454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.311553] Call Trace: [ 24.311577] <TASK> [ 24.311597] dump_stack_lvl+0x73/0xb0 [ 24.311625] print_report+0xd1/0x650 [ 24.311647] ? __virt_addr_valid+0x1db/0x2d0 [ 24.311670] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 24.311696] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.311898] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 24.311926] kasan_report+0x141/0x180 [ 24.311947] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 24.311976] kasan_check_range+0x10c/0x1c0 [ 24.311999] __kasan_check_write+0x18/0x20 [ 24.312021] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 24.312047] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.312073] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.312096] ? trace_hardirqs_on+0x37/0xe0 [ 24.312118] ? kasan_bitops_generic+0x92/0x1c0 [ 24.312144] kasan_bitops_generic+0x116/0x1c0 [ 24.312167] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.312190] ? __pfx_read_tsc+0x10/0x10 [ 24.312212] ? ktime_get_ts64+0x86/0x230 [ 24.312250] kunit_try_run_case+0x1a5/0x480 [ 24.312274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.312297] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.312322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.312347] ? __kthread_parkme+0x82/0x180 [ 24.312367] ? preempt_count_sub+0x50/0x80 [ 24.312390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.312414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.312437] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.312459] kthread+0x337/0x6f0 [ 24.312479] ? trace_preempt_on+0x20/0xc0 [ 24.312501] ? __pfx_kthread+0x10/0x10 [ 24.312521] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.312544] ? calculate_sigpending+0x7b/0xa0 [ 24.312567] ? __pfx_kthread+0x10/0x10 [ 24.312588] ret_from_fork+0x116/0x1d0 [ 24.312607] ? __pfx_kthread+0x10/0x10 [ 24.312627] ret_from_fork_asm+0x1a/0x30 [ 24.312658] </TASK> [ 24.312669] [ 24.323930] Allocated by task 290: [ 24.324295] kasan_save_stack+0x45/0x70 [ 24.324578] kasan_save_track+0x18/0x40 [ 24.324768] kasan_save_alloc_info+0x3b/0x50 [ 24.324950] __kasan_kmalloc+0xb7/0xc0 [ 24.325102] __kmalloc_cache_noprof+0x189/0x420 [ 24.325312] kasan_bitops_generic+0x92/0x1c0 [ 24.325525] kunit_try_run_case+0x1a5/0x480 [ 24.325724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.325941] kthread+0x337/0x6f0 [ 24.326097] ret_from_fork+0x116/0x1d0 [ 24.326708] ret_from_fork_asm+0x1a/0x30 [ 24.326892] [ 24.327002] The buggy address belongs to the object at ffff88810278b720 [ 24.327002] which belongs to the cache kmalloc-16 of size 16 [ 24.327590] The buggy address is located 8 bytes inside of [ 24.327590] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.328204] [ 24.328312] The buggy address belongs to the physical page: [ 24.328573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.328822] flags: 0x200000000000000(node=0|zone=2) [ 24.329106] page_type: f5(slab) [ 24.329732] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.330018] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.330503] page dumped because: kasan: bad access detected [ 24.330802] [ 24.330886] Memory state around the buggy address: [ 24.331264] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.331695] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.332119] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.332434] ^ [ 24.332641] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.333430] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.333702] ================================================================== [ 24.222682] ================================================================== [ 24.223518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 24.224816] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.225575] [ 24.225825] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.225881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.225895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.225918] Call Trace: [ 24.225952] <TASK> [ 24.225972] dump_stack_lvl+0x73/0xb0 [ 24.226004] print_report+0xd1/0x650 [ 24.226042] ? __virt_addr_valid+0x1db/0x2d0 [ 24.226066] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 24.226090] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.226116] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 24.226140] kasan_report+0x141/0x180 [ 24.226161] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 24.226190] kasan_check_range+0x10c/0x1c0 [ 24.226212] __kasan_check_write+0x18/0x20 [ 24.226245] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 24.226269] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.226295] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.226318] ? trace_hardirqs_on+0x37/0xe0 [ 24.226340] ? kasan_bitops_generic+0x92/0x1c0 [ 24.226366] kasan_bitops_generic+0x116/0x1c0 [ 24.226389] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.226412] ? __pfx_read_tsc+0x10/0x10 [ 24.226434] ? ktime_get_ts64+0x86/0x230 [ 24.226460] kunit_try_run_case+0x1a5/0x480 [ 24.226486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.226507] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.226533] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.226557] ? __kthread_parkme+0x82/0x180 [ 24.226577] ? preempt_count_sub+0x50/0x80 [ 24.226600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.226623] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.226646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.226669] kthread+0x337/0x6f0 [ 24.226689] ? trace_preempt_on+0x20/0xc0 [ 24.226710] ? __pfx_kthread+0x10/0x10 [ 24.226730] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.226752] ? calculate_sigpending+0x7b/0xa0 [ 24.226776] ? __pfx_kthread+0x10/0x10 [ 24.226796] ret_from_fork+0x116/0x1d0 [ 24.226814] ? __pfx_kthread+0x10/0x10 [ 24.226834] ret_from_fork_asm+0x1a/0x30 [ 24.226868] </TASK> [ 24.226880] [ 24.242642] Allocated by task 290: [ 24.242995] kasan_save_stack+0x45/0x70 [ 24.243569] kasan_save_track+0x18/0x40 [ 24.243916] kasan_save_alloc_info+0x3b/0x50 [ 24.244085] __kasan_kmalloc+0xb7/0xc0 [ 24.244452] __kmalloc_cache_noprof+0x189/0x420 [ 24.244918] kasan_bitops_generic+0x92/0x1c0 [ 24.245378] kunit_try_run_case+0x1a5/0x480 [ 24.245522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.245688] kthread+0x337/0x6f0 [ 24.245801] ret_from_fork+0x116/0x1d0 [ 24.245926] ret_from_fork_asm+0x1a/0x30 [ 24.246185] [ 24.246392] The buggy address belongs to the object at ffff88810278b720 [ 24.246392] which belongs to the cache kmalloc-16 of size 16 [ 24.247561] The buggy address is located 8 bytes inside of [ 24.247561] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.249026] [ 24.249307] The buggy address belongs to the physical page: [ 24.249851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.250307] flags: 0x200000000000000(node=0|zone=2) [ 24.250478] page_type: f5(slab) [ 24.250595] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.250921] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.251649] page dumped because: kasan: bad access detected [ 24.252215] [ 24.252421] Memory state around the buggy address: [ 24.252890] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.253654] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.254347] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.255149] ^ [ 24.255323] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.255539] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.255747] ================================================================== [ 24.334590] ================================================================== [ 24.334847] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 24.335533] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.335924] [ 24.336034] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.336087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.336099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.336123] Call Trace: [ 24.336143] <TASK> [ 24.336165] dump_stack_lvl+0x73/0xb0 [ 24.336195] print_report+0xd1/0x650 [ 24.336217] ? __virt_addr_valid+0x1db/0x2d0 [ 24.336251] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 24.336276] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.336302] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 24.336326] kasan_report+0x141/0x180 [ 24.336348] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 24.336376] kasan_check_range+0x10c/0x1c0 [ 24.336399] __kasan_check_write+0x18/0x20 [ 24.336422] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 24.336446] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.336472] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.336496] ? trace_hardirqs_on+0x37/0xe0 [ 24.336518] ? kasan_bitops_generic+0x92/0x1c0 [ 24.336544] kasan_bitops_generic+0x116/0x1c0 [ 24.336567] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.336591] ? __pfx_read_tsc+0x10/0x10 [ 24.336613] ? ktime_get_ts64+0x86/0x230 [ 24.336637] kunit_try_run_case+0x1a5/0x480 [ 24.336662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.336684] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.336709] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.336734] ? __kthread_parkme+0x82/0x180 [ 24.336754] ? preempt_count_sub+0x50/0x80 [ 24.336778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.336852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.336877] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.336900] kthread+0x337/0x6f0 [ 24.336920] ? trace_preempt_on+0x20/0xc0 [ 24.336943] ? __pfx_kthread+0x10/0x10 [ 24.336963] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.336988] ? calculate_sigpending+0x7b/0xa0 [ 24.337011] ? __pfx_kthread+0x10/0x10 [ 24.337032] ret_from_fork+0x116/0x1d0 [ 24.337051] ? __pfx_kthread+0x10/0x10 [ 24.337071] ret_from_fork_asm+0x1a/0x30 [ 24.337101] </TASK> [ 24.337111] [ 24.345387] Allocated by task 290: [ 24.345629] kasan_save_stack+0x45/0x70 [ 24.345836] kasan_save_track+0x18/0x40 [ 24.346025] kasan_save_alloc_info+0x3b/0x50 [ 24.346287] __kasan_kmalloc+0xb7/0xc0 [ 24.346536] __kmalloc_cache_noprof+0x189/0x420 [ 24.346703] kasan_bitops_generic+0x92/0x1c0 [ 24.346844] kunit_try_run_case+0x1a5/0x480 [ 24.347030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.347304] kthread+0x337/0x6f0 [ 24.347480] ret_from_fork+0x116/0x1d0 [ 24.347672] ret_from_fork_asm+0x1a/0x30 [ 24.348129] [ 24.348209] The buggy address belongs to the object at ffff88810278b720 [ 24.348209] which belongs to the cache kmalloc-16 of size 16 [ 24.348673] The buggy address is located 8 bytes inside of [ 24.348673] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.349372] [ 24.349489] The buggy address belongs to the physical page: [ 24.349702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.349960] flags: 0x200000000000000(node=0|zone=2) [ 24.350118] page_type: f5(slab) [ 24.350241] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.350516] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.350909] page dumped because: kasan: bad access detected [ 24.351367] [ 24.351456] Memory state around the buggy address: [ 24.351605] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.351913] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.352532] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.352924] ^ [ 24.353126] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.353418] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.353657] ================================================================== [ 24.256195] ================================================================== [ 24.256504] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 24.256951] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.257325] [ 24.257413] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.257462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.257474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.257496] Call Trace: [ 24.257517] <TASK> [ 24.257537] dump_stack_lvl+0x73/0xb0 [ 24.257564] print_report+0xd1/0x650 [ 24.257586] ? __virt_addr_valid+0x1db/0x2d0 [ 24.257611] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 24.257636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.257661] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 24.257685] kasan_report+0x141/0x180 [ 24.257706] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 24.257734] kasan_check_range+0x10c/0x1c0 [ 24.257756] __kasan_check_write+0x18/0x20 [ 24.257779] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 24.257803] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.257828] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.257852] ? trace_hardirqs_on+0x37/0xe0 [ 24.257873] ? kasan_bitops_generic+0x92/0x1c0 [ 24.257899] kasan_bitops_generic+0x116/0x1c0 [ 24.257921] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.257944] ? __pfx_read_tsc+0x10/0x10 [ 24.257965] ? ktime_get_ts64+0x86/0x230 [ 24.257990] kunit_try_run_case+0x1a5/0x480 [ 24.258014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.258100] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.258126] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.258151] ? __kthread_parkme+0x82/0x180 [ 24.258171] ? preempt_count_sub+0x50/0x80 [ 24.258193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.258217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.258252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.258276] kthread+0x337/0x6f0 [ 24.258294] ? trace_preempt_on+0x20/0xc0 [ 24.258316] ? __pfx_kthread+0x10/0x10 [ 24.258336] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.258360] ? calculate_sigpending+0x7b/0xa0 [ 24.258383] ? __pfx_kthread+0x10/0x10 [ 24.258404] ret_from_fork+0x116/0x1d0 [ 24.258423] ? __pfx_kthread+0x10/0x10 [ 24.258442] ret_from_fork_asm+0x1a/0x30 [ 24.258473] </TASK> [ 24.258483] [ 24.270589] Allocated by task 290: [ 24.270977] kasan_save_stack+0x45/0x70 [ 24.271206] kasan_save_track+0x18/0x40 [ 24.271377] kasan_save_alloc_info+0x3b/0x50 [ 24.271585] __kasan_kmalloc+0xb7/0xc0 [ 24.271733] __kmalloc_cache_noprof+0x189/0x420 [ 24.272259] kasan_bitops_generic+0x92/0x1c0 [ 24.272490] kunit_try_run_case+0x1a5/0x480 [ 24.272953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.273543] kthread+0x337/0x6f0 [ 24.273681] ret_from_fork+0x116/0x1d0 [ 24.274070] ret_from_fork_asm+0x1a/0x30 [ 24.274506] [ 24.274722] The buggy address belongs to the object at ffff88810278b720 [ 24.274722] which belongs to the cache kmalloc-16 of size 16 [ 24.276129] The buggy address is located 8 bytes inside of [ 24.276129] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.276500] [ 24.276572] The buggy address belongs to the physical page: [ 24.276743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.277799] flags: 0x200000000000000(node=0|zone=2) [ 24.278368] page_type: f5(slab) [ 24.278805] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.279773] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.280529] page dumped because: kasan: bad access detected [ 24.280961] [ 24.281236] Memory state around the buggy address: [ 24.281608] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.281870] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.282525] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.283178] ^ [ 24.283481] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.283692] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.284406] ================================================================== [ 24.193282] ================================================================== [ 24.194003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 24.194609] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.194979] [ 24.195356] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.195450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.195464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.195488] Call Trace: [ 24.195502] <TASK> [ 24.195523] dump_stack_lvl+0x73/0xb0 [ 24.195552] print_report+0xd1/0x650 [ 24.195574] ? __virt_addr_valid+0x1db/0x2d0 [ 24.195598] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 24.195622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.195648] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 24.195672] kasan_report+0x141/0x180 [ 24.195694] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 24.195723] kasan_check_range+0x10c/0x1c0 [ 24.195745] __kasan_check_write+0x18/0x20 [ 24.195767] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 24.195792] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.195818] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.195842] ? trace_hardirqs_on+0x37/0xe0 [ 24.195865] ? kasan_bitops_generic+0x92/0x1c0 [ 24.195891] kasan_bitops_generic+0x116/0x1c0 [ 24.195914] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.195937] ? __pfx_read_tsc+0x10/0x10 [ 24.195959] ? ktime_get_ts64+0x86/0x230 [ 24.195983] kunit_try_run_case+0x1a5/0x480 [ 24.196007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.196029] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.196055] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.196080] ? __kthread_parkme+0x82/0x180 [ 24.196100] ? preempt_count_sub+0x50/0x80 [ 24.196124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.196147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.196170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.196194] kthread+0x337/0x6f0 [ 24.196213] ? trace_preempt_on+0x20/0xc0 [ 24.196247] ? __pfx_kthread+0x10/0x10 [ 24.196267] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.196289] ? calculate_sigpending+0x7b/0xa0 [ 24.196313] ? __pfx_kthread+0x10/0x10 [ 24.196334] ret_from_fork+0x116/0x1d0 [ 24.196352] ? __pfx_kthread+0x10/0x10 [ 24.196372] ret_from_fork_asm+0x1a/0x30 [ 24.196402] </TASK> [ 24.196415] [ 24.207682] Allocated by task 290: [ 24.208291] kasan_save_stack+0x45/0x70 [ 24.208609] kasan_save_track+0x18/0x40 [ 24.209322] kasan_save_alloc_info+0x3b/0x50 [ 24.209772] __kasan_kmalloc+0xb7/0xc0 [ 24.210198] __kmalloc_cache_noprof+0x189/0x420 [ 24.210419] kasan_bitops_generic+0x92/0x1c0 [ 24.210606] kunit_try_run_case+0x1a5/0x480 [ 24.211090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.211593] kthread+0x337/0x6f0 [ 24.212208] ret_from_fork+0x116/0x1d0 [ 24.212641] ret_from_fork_asm+0x1a/0x30 [ 24.213103] [ 24.213201] The buggy address belongs to the object at ffff88810278b720 [ 24.213201] which belongs to the cache kmalloc-16 of size 16 [ 24.213690] The buggy address is located 8 bytes inside of [ 24.213690] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.215229] [ 24.215350] The buggy address belongs to the physical page: [ 24.215525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.215763] flags: 0x200000000000000(node=0|zone=2) [ 24.215933] page_type: f5(slab) [ 24.216053] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.216289] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.216510] page dumped because: kasan: bad access detected [ 24.216673] [ 24.216738] Memory state around the buggy address: [ 24.216890] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.217098] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.217675] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.219115] ^ [ 24.219805] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.220534] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.221549] ================================================================== [ 24.285394] ================================================================== [ 24.286082] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 24.287005] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.287487] [ 24.287574] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.287623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.287635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.287658] Call Trace: [ 24.287678] <TASK> [ 24.287698] dump_stack_lvl+0x73/0xb0 [ 24.287726] print_report+0xd1/0x650 [ 24.287748] ? __virt_addr_valid+0x1db/0x2d0 [ 24.287772] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 24.287796] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.287824] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 24.287851] kasan_report+0x141/0x180 [ 24.287872] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 24.287901] kasan_check_range+0x10c/0x1c0 [ 24.287923] __kasan_check_write+0x18/0x20 [ 24.287945] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 24.287970] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.287995] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.288019] ? trace_hardirqs_on+0x37/0xe0 [ 24.288042] ? kasan_bitops_generic+0x92/0x1c0 [ 24.288068] kasan_bitops_generic+0x116/0x1c0 [ 24.288091] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.288115] ? __pfx_read_tsc+0x10/0x10 [ 24.288136] ? ktime_get_ts64+0x86/0x230 [ 24.288161] kunit_try_run_case+0x1a5/0x480 [ 24.288185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.288207] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.288244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.288269] ? __kthread_parkme+0x82/0x180 [ 24.288289] ? preempt_count_sub+0x50/0x80 [ 24.288312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.288335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.288358] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.288382] kthread+0x337/0x6f0 [ 24.288403] ? trace_preempt_on+0x20/0xc0 [ 24.288424] ? __pfx_kthread+0x10/0x10 [ 24.288443] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.288466] ? calculate_sigpending+0x7b/0xa0 [ 24.288490] ? __pfx_kthread+0x10/0x10 [ 24.288511] ret_from_fork+0x116/0x1d0 [ 24.288529] ? __pfx_kthread+0x10/0x10 [ 24.288549] ret_from_fork_asm+0x1a/0x30 [ 24.288579] </TASK> [ 24.288590] [ 24.299056] Allocated by task 290: [ 24.299368] kasan_save_stack+0x45/0x70 [ 24.299562] kasan_save_track+0x18/0x40 [ 24.299732] kasan_save_alloc_info+0x3b/0x50 [ 24.300173] __kasan_kmalloc+0xb7/0xc0 [ 24.300361] __kmalloc_cache_noprof+0x189/0x420 [ 24.300556] kasan_bitops_generic+0x92/0x1c0 [ 24.300741] kunit_try_run_case+0x1a5/0x480 [ 24.301379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.301590] kthread+0x337/0x6f0 [ 24.301759] ret_from_fork+0x116/0x1d0 [ 24.301979] ret_from_fork_asm+0x1a/0x30 [ 24.302400] [ 24.302486] The buggy address belongs to the object at ffff88810278b720 [ 24.302486] which belongs to the cache kmalloc-16 of size 16 [ 24.303065] The buggy address is located 8 bytes inside of [ 24.303065] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.303775] [ 24.303908] The buggy address belongs to the physical page: [ 24.304191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.304725] flags: 0x200000000000000(node=0|zone=2) [ 24.305020] page_type: f5(slab) [ 24.305153] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.305479] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.305787] page dumped because: kasan: bad access detected [ 24.306598] [ 24.306681] Memory state around the buggy address: [ 24.306910] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.307500] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.307934] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.308325] ^ [ 24.308508] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.308805] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.309294] ==================================================================