Date
July 2, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 25.518816] ================================================================== [ 25.519525] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.520033] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.520567] [ 25.520939] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.521002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.521018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.521043] Call Trace: [ 25.521078] <TASK> [ 25.521101] dump_stack_lvl+0x73/0xb0 [ 25.521135] print_report+0xd1/0x650 [ 25.521160] ? __virt_addr_valid+0x1db/0x2d0 [ 25.521197] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.521223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.521249] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.521274] kasan_report+0x141/0x180 [ 25.521295] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.521325] kasan_check_range+0x10c/0x1c0 [ 25.521348] __kasan_check_write+0x18/0x20 [ 25.521371] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.521396] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.521421] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.521446] ? trace_hardirqs_on+0x37/0xe0 [ 25.521469] ? kasan_bitops_generic+0x92/0x1c0 [ 25.521496] kasan_bitops_generic+0x116/0x1c0 [ 25.521519] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.521543] ? __pfx_read_tsc+0x10/0x10 [ 25.521565] ? ktime_get_ts64+0x86/0x230 [ 25.521591] kunit_try_run_case+0x1a5/0x480 [ 25.521618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.521642] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.521664] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.521686] ? __kthread_parkme+0x82/0x180 [ 25.521708] ? preempt_count_sub+0x50/0x80 [ 25.521731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.521756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.521780] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.521806] kthread+0x337/0x6f0 [ 25.521835] ? trace_preempt_on+0x20/0xc0 [ 25.521858] ? __pfx_kthread+0x10/0x10 [ 25.521878] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.521903] ? calculate_sigpending+0x7b/0xa0 [ 25.522292] ? __pfx_kthread+0x10/0x10 [ 25.522336] ret_from_fork+0x116/0x1d0 [ 25.522361] ? __pfx_kthread+0x10/0x10 [ 25.522382] ret_from_fork_asm+0x1a/0x30 [ 25.522414] </TASK> [ 25.522428] [ 25.531782] Allocated by task 310: [ 25.532056] kasan_save_stack+0x45/0x70 [ 25.532436] kasan_save_track+0x18/0x40 [ 25.532616] kasan_save_alloc_info+0x3b/0x50 [ 25.532827] __kasan_kmalloc+0xb7/0xc0 [ 25.533081] __kmalloc_cache_noprof+0x189/0x420 [ 25.533234] kasan_bitops_generic+0x92/0x1c0 [ 25.533377] kunit_try_run_case+0x1a5/0x480 [ 25.533522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.533774] kthread+0x337/0x6f0 [ 25.534092] ret_from_fork+0x116/0x1d0 [ 25.534278] ret_from_fork_asm+0x1a/0x30 [ 25.534471] [ 25.534983] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.534983] which belongs to the cache kmalloc-16 of size 16 [ 25.535523] The buggy address is located 8 bytes inside of [ 25.535523] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.536257] [ 25.536370] The buggy address belongs to the physical page: [ 25.536591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.536943] flags: 0x200000000000000(node=0|zone=2) [ 25.537137] page_type: f5(slab) [ 25.537358] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.537660] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.537892] page dumped because: kasan: bad access detected [ 25.538087] [ 25.538239] Memory state around the buggy address: [ 25.538465] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.538757] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.538968] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.539562] ^ [ 25.539846] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.540629] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.540854] ================================================================== [ 25.431855] ================================================================== [ 25.432327] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.432695] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.433017] [ 25.433116] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.433381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.433403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.433428] Call Trace: [ 25.433451] <TASK> [ 25.433471] dump_stack_lvl+0x73/0xb0 [ 25.433504] print_report+0xd1/0x650 [ 25.433541] ? __virt_addr_valid+0x1db/0x2d0 [ 25.433566] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.433603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.433629] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.433656] kasan_report+0x141/0x180 [ 25.433678] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.433707] kasan_check_range+0x10c/0x1c0 [ 25.433730] __kasan_check_write+0x18/0x20 [ 25.433754] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.433779] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.433806] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.433836] ? trace_hardirqs_on+0x37/0xe0 [ 25.433860] ? kasan_bitops_generic+0x92/0x1c0 [ 25.433887] kasan_bitops_generic+0x116/0x1c0 [ 25.433910] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.433936] ? __pfx_read_tsc+0x10/0x10 [ 25.433959] ? ktime_get_ts64+0x86/0x230 [ 25.433985] kunit_try_run_case+0x1a5/0x480 [ 25.434013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.434073] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.434097] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.434129] ? __kthread_parkme+0x82/0x180 [ 25.434151] ? preempt_count_sub+0x50/0x80 [ 25.434195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.434221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.434246] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.434271] kthread+0x337/0x6f0 [ 25.434291] ? trace_preempt_on+0x20/0xc0 [ 25.434313] ? __pfx_kthread+0x10/0x10 [ 25.434334] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.434358] ? calculate_sigpending+0x7b/0xa0 [ 25.434488] ? __pfx_kthread+0x10/0x10 [ 25.434513] ret_from_fork+0x116/0x1d0 [ 25.434534] ? __pfx_kthread+0x10/0x10 [ 25.434555] ret_from_fork_asm+0x1a/0x30 [ 25.434588] </TASK> [ 25.434600] [ 25.443477] Allocated by task 310: [ 25.443652] kasan_save_stack+0x45/0x70 [ 25.443883] kasan_save_track+0x18/0x40 [ 25.444119] kasan_save_alloc_info+0x3b/0x50 [ 25.444390] __kasan_kmalloc+0xb7/0xc0 [ 25.444571] __kmalloc_cache_noprof+0x189/0x420 [ 25.444806] kasan_bitops_generic+0x92/0x1c0 [ 25.445040] kunit_try_run_case+0x1a5/0x480 [ 25.445477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.445709] kthread+0x337/0x6f0 [ 25.445908] ret_from_fork+0x116/0x1d0 [ 25.446140] ret_from_fork_asm+0x1a/0x30 [ 25.446430] [ 25.446527] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.446527] which belongs to the cache kmalloc-16 of size 16 [ 25.447016] The buggy address is located 8 bytes inside of [ 25.447016] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.447718] [ 25.447839] The buggy address belongs to the physical page: [ 25.448084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.448508] flags: 0x200000000000000(node=0|zone=2) [ 25.448768] page_type: f5(slab) [ 25.448988] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.449606] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.449963] page dumped because: kasan: bad access detected [ 25.450303] [ 25.450420] Memory state around the buggy address: [ 25.450607] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.450828] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.451305] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.451640] ^ [ 25.451897] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.452284] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.452628] ================================================================== [ 25.410676] ================================================================== [ 25.410996] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.411412] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.411695] [ 25.411822] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.411875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.411889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.411913] Call Trace: [ 25.411934] <TASK> [ 25.411956] dump_stack_lvl+0x73/0xb0 [ 25.411986] print_report+0xd1/0x650 [ 25.412010] ? __virt_addr_valid+0x1db/0x2d0 [ 25.412035] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.412070] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.412096] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.412122] kasan_report+0x141/0x180 [ 25.412154] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.412200] kasan_check_range+0x10c/0x1c0 [ 25.412224] __kasan_check_write+0x18/0x20 [ 25.412248] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.412365] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.412399] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.412426] ? trace_hardirqs_on+0x37/0xe0 [ 25.412539] ? kasan_bitops_generic+0x92/0x1c0 [ 25.412573] kasan_bitops_generic+0x116/0x1c0 [ 25.412597] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.412684] ? __pfx_read_tsc+0x10/0x10 [ 25.412723] ? ktime_get_ts64+0x86/0x230 [ 25.412748] kunit_try_run_case+0x1a5/0x480 [ 25.412776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.412801] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.412824] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.412847] ? __kthread_parkme+0x82/0x180 [ 25.412868] ? preempt_count_sub+0x50/0x80 [ 25.412892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.412918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.412953] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.412979] kthread+0x337/0x6f0 [ 25.412998] ? trace_preempt_on+0x20/0xc0 [ 25.413021] ? __pfx_kthread+0x10/0x10 [ 25.413043] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.413085] ? calculate_sigpending+0x7b/0xa0 [ 25.413110] ? __pfx_kthread+0x10/0x10 [ 25.413142] ret_from_fork+0x116/0x1d0 [ 25.413162] ? __pfx_kthread+0x10/0x10 [ 25.413231] ret_from_fork_asm+0x1a/0x30 [ 25.413267] </TASK> [ 25.413291] [ 25.422264] Allocated by task 310: [ 25.422481] kasan_save_stack+0x45/0x70 [ 25.422686] kasan_save_track+0x18/0x40 [ 25.422864] kasan_save_alloc_info+0x3b/0x50 [ 25.423078] __kasan_kmalloc+0xb7/0xc0 [ 25.423302] __kmalloc_cache_noprof+0x189/0x420 [ 25.423552] kasan_bitops_generic+0x92/0x1c0 [ 25.423784] kunit_try_run_case+0x1a5/0x480 [ 25.423981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.424192] kthread+0x337/0x6f0 [ 25.424361] ret_from_fork+0x116/0x1d0 [ 25.424540] ret_from_fork_asm+0x1a/0x30 [ 25.424706] [ 25.424789] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.424789] which belongs to the cache kmalloc-16 of size 16 [ 25.425586] The buggy address is located 8 bytes inside of [ 25.425586] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.426002] [ 25.426084] The buggy address belongs to the physical page: [ 25.426437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.426793] flags: 0x200000000000000(node=0|zone=2) [ 25.427081] page_type: f5(slab) [ 25.427321] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.427640] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.427875] page dumped because: kasan: bad access detected [ 25.428257] [ 25.428369] Memory state around the buggy address: [ 25.428595] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.428875] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.429129] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.429632] ^ [ 25.429903] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.430348] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.430666] ================================================================== [ 25.367149] ================================================================== [ 25.368018] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.368549] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.368844] [ 25.368976] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.369043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.369057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.369099] Call Trace: [ 25.369114] <TASK> [ 25.369145] dump_stack_lvl+0x73/0xb0 [ 25.369181] print_report+0xd1/0x650 [ 25.369217] ? __virt_addr_valid+0x1db/0x2d0 [ 25.369245] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.369270] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.369369] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.369399] kasan_report+0x141/0x180 [ 25.369434] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.369463] kasan_check_range+0x10c/0x1c0 [ 25.369499] __kasan_check_write+0x18/0x20 [ 25.369523] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.369557] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.369583] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.369609] ? trace_hardirqs_on+0x37/0xe0 [ 25.369644] ? kasan_bitops_generic+0x92/0x1c0 [ 25.369670] kasan_bitops_generic+0x116/0x1c0 [ 25.369694] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.369718] ? __pfx_read_tsc+0x10/0x10 [ 25.369742] ? ktime_get_ts64+0x86/0x230 [ 25.369768] kunit_try_run_case+0x1a5/0x480 [ 25.369796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.369826] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.369849] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.369872] ? __kthread_parkme+0x82/0x180 [ 25.369894] ? preempt_count_sub+0x50/0x80 [ 25.369919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.369956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.369981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.370006] kthread+0x337/0x6f0 [ 25.370025] ? trace_preempt_on+0x20/0xc0 [ 25.370048] ? __pfx_kthread+0x10/0x10 [ 25.370077] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.370102] ? calculate_sigpending+0x7b/0xa0 [ 25.370126] ? __pfx_kthread+0x10/0x10 [ 25.370148] ret_from_fork+0x116/0x1d0 [ 25.370167] ? __pfx_kthread+0x10/0x10 [ 25.370333] ret_from_fork_asm+0x1a/0x30 [ 25.370374] </TASK> [ 25.370387] [ 25.378792] Allocated by task 310: [ 25.379022] kasan_save_stack+0x45/0x70 [ 25.379443] kasan_save_track+0x18/0x40 [ 25.379666] kasan_save_alloc_info+0x3b/0x50 [ 25.379837] __kasan_kmalloc+0xb7/0xc0 [ 25.380093] __kmalloc_cache_noprof+0x189/0x420 [ 25.380419] kasan_bitops_generic+0x92/0x1c0 [ 25.380626] kunit_try_run_case+0x1a5/0x480 [ 25.380834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.381160] kthread+0x337/0x6f0 [ 25.381367] ret_from_fork+0x116/0x1d0 [ 25.381566] ret_from_fork_asm+0x1a/0x30 [ 25.381756] [ 25.381855] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.381855] which belongs to the cache kmalloc-16 of size 16 [ 25.382482] The buggy address is located 8 bytes inside of [ 25.382482] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.382840] [ 25.382910] The buggy address belongs to the physical page: [ 25.383261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.383617] flags: 0x200000000000000(node=0|zone=2) [ 25.383854] page_type: f5(slab) [ 25.384382] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.384749] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.384978] page dumped because: kasan: bad access detected [ 25.385157] [ 25.385224] Memory state around the buggy address: [ 25.385618] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.385976] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.386353] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.386732] ^ [ 25.387104] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.388551] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.388858] ================================================================== [ 25.389427] ================================================================== [ 25.389711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.390079] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.390536] [ 25.390645] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.390700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.390714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.390738] Call Trace: [ 25.390761] <TASK> [ 25.390782] dump_stack_lvl+0x73/0xb0 [ 25.390814] print_report+0xd1/0x650 [ 25.390838] ? __virt_addr_valid+0x1db/0x2d0 [ 25.390874] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.390901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.390927] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.390966] kasan_report+0x141/0x180 [ 25.390989] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.391019] kasan_check_range+0x10c/0x1c0 [ 25.391043] __kasan_check_write+0x18/0x20 [ 25.391076] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.391102] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.391129] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.391154] ? trace_hardirqs_on+0x37/0xe0 [ 25.391191] ? kasan_bitops_generic+0x92/0x1c0 [ 25.391218] kasan_bitops_generic+0x116/0x1c0 [ 25.391242] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.391267] ? __pfx_read_tsc+0x10/0x10 [ 25.391289] ? ktime_get_ts64+0x86/0x230 [ 25.391385] kunit_try_run_case+0x1a5/0x480 [ 25.391414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.391437] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.391460] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.391483] ? __kthread_parkme+0x82/0x180 [ 25.391505] ? preempt_count_sub+0x50/0x80 [ 25.391529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.391554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.391579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.391604] kthread+0x337/0x6f0 [ 25.391624] ? trace_preempt_on+0x20/0xc0 [ 25.391646] ? __pfx_kthread+0x10/0x10 [ 25.391677] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.391701] ? calculate_sigpending+0x7b/0xa0 [ 25.391726] ? __pfx_kthread+0x10/0x10 [ 25.391757] ret_from_fork+0x116/0x1d0 [ 25.391778] ? __pfx_kthread+0x10/0x10 [ 25.391798] ret_from_fork_asm+0x1a/0x30 [ 25.391830] </TASK> [ 25.391852] [ 25.401086] Allocated by task 310: [ 25.401481] kasan_save_stack+0x45/0x70 [ 25.401636] kasan_save_track+0x18/0x40 [ 25.401768] kasan_save_alloc_info+0x3b/0x50 [ 25.401923] __kasan_kmalloc+0xb7/0xc0 [ 25.402135] __kmalloc_cache_noprof+0x189/0x420 [ 25.402643] kasan_bitops_generic+0x92/0x1c0 [ 25.402846] kunit_try_run_case+0x1a5/0x480 [ 25.402995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.403178] kthread+0x337/0x6f0 [ 25.403413] ret_from_fork+0x116/0x1d0 [ 25.403608] ret_from_fork_asm+0x1a/0x30 [ 25.403800] [ 25.403888] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.403888] which belongs to the cache kmalloc-16 of size 16 [ 25.404678] The buggy address is located 8 bytes inside of [ 25.404678] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.405043] [ 25.405243] The buggy address belongs to the physical page: [ 25.405550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.406179] flags: 0x200000000000000(node=0|zone=2) [ 25.406470] page_type: f5(slab) [ 25.406592] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.406880] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.407247] page dumped because: kasan: bad access detected [ 25.407601] [ 25.407664] Memory state around the buggy address: [ 25.407813] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.408169] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.408494] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.409264] ^ [ 25.409450] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.409790] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.410077] ================================================================== [ 25.453162] ================================================================== [ 25.453774] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.454212] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.454489] [ 25.454699] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.454756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.454770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.454795] Call Trace: [ 25.454818] <TASK> [ 25.454839] dump_stack_lvl+0x73/0xb0 [ 25.454872] print_report+0xd1/0x650 [ 25.454896] ? __virt_addr_valid+0x1db/0x2d0 [ 25.454942] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.454979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.455006] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.455033] kasan_report+0x141/0x180 [ 25.455074] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.455106] kasan_check_range+0x10c/0x1c0 [ 25.455131] __kasan_check_write+0x18/0x20 [ 25.455155] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.455273] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.455305] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.455332] ? trace_hardirqs_on+0x37/0xe0 [ 25.455355] ? kasan_bitops_generic+0x92/0x1c0 [ 25.455383] kasan_bitops_generic+0x116/0x1c0 [ 25.455407] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.455432] ? __pfx_read_tsc+0x10/0x10 [ 25.455455] ? ktime_get_ts64+0x86/0x230 [ 25.455482] kunit_try_run_case+0x1a5/0x480 [ 25.455509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.455533] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.455556] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.455592] ? __kthread_parkme+0x82/0x180 [ 25.455614] ? preempt_count_sub+0x50/0x80 [ 25.455650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.455676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.455702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.455727] kthread+0x337/0x6f0 [ 25.455748] ? trace_preempt_on+0x20/0xc0 [ 25.455771] ? __pfx_kthread+0x10/0x10 [ 25.455792] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.455817] ? calculate_sigpending+0x7b/0xa0 [ 25.455842] ? __pfx_kthread+0x10/0x10 [ 25.455864] ret_from_fork+0x116/0x1d0 [ 25.455884] ? __pfx_kthread+0x10/0x10 [ 25.455906] ret_from_fork_asm+0x1a/0x30 [ 25.455956] </TASK> [ 25.455970] [ 25.464943] Allocated by task 310: [ 25.465439] kasan_save_stack+0x45/0x70 [ 25.465702] kasan_save_track+0x18/0x40 [ 25.465906] kasan_save_alloc_info+0x3b/0x50 [ 25.466148] __kasan_kmalloc+0xb7/0xc0 [ 25.466407] __kmalloc_cache_noprof+0x189/0x420 [ 25.466624] kasan_bitops_generic+0x92/0x1c0 [ 25.466830] kunit_try_run_case+0x1a5/0x480 [ 25.467072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.467426] kthread+0x337/0x6f0 [ 25.467556] ret_from_fork+0x116/0x1d0 [ 25.467685] ret_from_fork_asm+0x1a/0x30 [ 25.467821] [ 25.467923] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.467923] which belongs to the cache kmalloc-16 of size 16 [ 25.468504] The buggy address is located 8 bytes inside of [ 25.468504] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.468944] [ 25.469012] The buggy address belongs to the physical page: [ 25.469271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.469621] flags: 0x200000000000000(node=0|zone=2) [ 25.469845] page_type: f5(slab) [ 25.469972] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.470627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.471011] page dumped because: kasan: bad access detected [ 25.471354] [ 25.471467] Memory state around the buggy address: [ 25.471687] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.472044] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.472445] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.472734] ^ [ 25.473025] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.473495] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.473854] ================================================================== [ 25.474465] ================================================================== [ 25.474812] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.475221] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.475662] [ 25.475804] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.475859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.475873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.475898] Call Trace: [ 25.475929] <TASK> [ 25.475950] dump_stack_lvl+0x73/0xb0 [ 25.475983] print_report+0xd1/0x650 [ 25.476031] ? __virt_addr_valid+0x1db/0x2d0 [ 25.476056] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.476090] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.476118] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.476152] kasan_report+0x141/0x180 [ 25.476250] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.476287] kasan_check_range+0x10c/0x1c0 [ 25.476311] __kasan_check_write+0x18/0x20 [ 25.476334] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.476371] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.476398] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.476426] ? trace_hardirqs_on+0x37/0xe0 [ 25.476462] ? kasan_bitops_generic+0x92/0x1c0 [ 25.476489] kasan_bitops_generic+0x116/0x1c0 [ 25.476513] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.476538] ? __pfx_read_tsc+0x10/0x10 [ 25.476562] ? ktime_get_ts64+0x86/0x230 [ 25.476588] kunit_try_run_case+0x1a5/0x480 [ 25.476615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.476640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.476664] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.476686] ? __kthread_parkme+0x82/0x180 [ 25.476717] ? preempt_count_sub+0x50/0x80 [ 25.476742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.476778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.476803] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.476829] kthread+0x337/0x6f0 [ 25.476850] ? trace_preempt_on+0x20/0xc0 [ 25.476872] ? __pfx_kthread+0x10/0x10 [ 25.476893] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.476917] ? calculate_sigpending+0x7b/0xa0 [ 25.476943] ? __pfx_kthread+0x10/0x10 [ 25.476982] ret_from_fork+0x116/0x1d0 [ 25.477004] ? __pfx_kthread+0x10/0x10 [ 25.477026] ret_from_fork_asm+0x1a/0x30 [ 25.477067] </TASK> [ 25.477080] [ 25.486115] Allocated by task 310: [ 25.486393] kasan_save_stack+0x45/0x70 [ 25.486578] kasan_save_track+0x18/0x40 [ 25.486733] kasan_save_alloc_info+0x3b/0x50 [ 25.486946] __kasan_kmalloc+0xb7/0xc0 [ 25.487164] __kmalloc_cache_noprof+0x189/0x420 [ 25.487498] kasan_bitops_generic+0x92/0x1c0 [ 25.487708] kunit_try_run_case+0x1a5/0x480 [ 25.487846] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.488008] kthread+0x337/0x6f0 [ 25.488249] ret_from_fork+0x116/0x1d0 [ 25.488461] ret_from_fork_asm+0x1a/0x30 [ 25.488657] [ 25.488745] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.488745] which belongs to the cache kmalloc-16 of size 16 [ 25.489572] The buggy address is located 8 bytes inside of [ 25.489572] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.490011] [ 25.490115] The buggy address belongs to the physical page: [ 25.490472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.490807] flags: 0x200000000000000(node=0|zone=2) [ 25.491055] page_type: f5(slab) [ 25.491346] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.491673] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.492014] page dumped because: kasan: bad access detected [ 25.492330] [ 25.492415] Memory state around the buggy address: [ 25.492644] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.492965] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.493512] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.493808] ^ [ 25.494105] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.494438] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.494762] ================================================================== [ 25.495433] ================================================================== [ 25.495766] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.496144] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.496549] [ 25.496689] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.496743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.496757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.496782] Call Trace: [ 25.496804] <TASK> [ 25.496826] dump_stack_lvl+0x73/0xb0 [ 25.496857] print_report+0xd1/0x650 [ 25.496879] ? __virt_addr_valid+0x1db/0x2d0 [ 25.496904] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.496930] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.496955] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.497009] kasan_report+0x141/0x180 [ 25.497032] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.497078] kasan_check_range+0x10c/0x1c0 [ 25.497101] __kasan_check_write+0x18/0x20 [ 25.497125] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.497150] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.497481] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.497532] ? trace_hardirqs_on+0x37/0xe0 [ 25.497558] ? kasan_bitops_generic+0x92/0x1c0 [ 25.497586] kasan_bitops_generic+0x116/0x1c0 [ 25.497610] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.497635] ? __pfx_read_tsc+0x10/0x10 [ 25.497658] ? ktime_get_ts64+0x86/0x230 [ 25.497683] kunit_try_run_case+0x1a5/0x480 [ 25.497710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.497735] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.497759] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.497781] ? __kthread_parkme+0x82/0x180 [ 25.497803] ? preempt_count_sub+0x50/0x80 [ 25.497832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.497857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.497882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.497907] kthread+0x337/0x6f0 [ 25.497982] ? trace_preempt_on+0x20/0xc0 [ 25.498006] ? __pfx_kthread+0x10/0x10 [ 25.498028] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.498053] ? calculate_sigpending+0x7b/0xa0 [ 25.498088] ? __pfx_kthread+0x10/0x10 [ 25.498121] ret_from_fork+0x116/0x1d0 [ 25.498140] ? __pfx_kthread+0x10/0x10 [ 25.498163] ret_from_fork_asm+0x1a/0x30 [ 25.498268] </TASK> [ 25.498282] [ 25.507103] Allocated by task 310: [ 25.507286] kasan_save_stack+0x45/0x70 [ 25.507446] kasan_save_track+0x18/0x40 [ 25.507625] kasan_save_alloc_info+0x3b/0x50 [ 25.507814] __kasan_kmalloc+0xb7/0xc0 [ 25.507961] __kmalloc_cache_noprof+0x189/0x420 [ 25.508195] kasan_bitops_generic+0x92/0x1c0 [ 25.508402] kunit_try_run_case+0x1a5/0x480 [ 25.508599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.508988] kthread+0x337/0x6f0 [ 25.509163] ret_from_fork+0x116/0x1d0 [ 25.509573] ret_from_fork_asm+0x1a/0x30 [ 25.509778] [ 25.509874] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.509874] which belongs to the cache kmalloc-16 of size 16 [ 25.510515] The buggy address is located 8 bytes inside of [ 25.510515] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.511036] [ 25.511455] The buggy address belongs to the physical page: [ 25.511717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.511977] flags: 0x200000000000000(node=0|zone=2) [ 25.513118] page_type: f5(slab) [ 25.513497] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.513912] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.514236] page dumped because: kasan: bad access detected [ 25.514494] [ 25.514705] Memory state around the buggy address: [ 25.515139] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.515655] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.516073] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.516593] ^ [ 25.516979] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.517674] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.517974] ==================================================================
[ 25.248820] ================================================================== [ 25.249137] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.249610] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.250053] [ 25.250182] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.250249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.250262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.250284] Call Trace: [ 25.250297] <TASK> [ 25.250324] dump_stack_lvl+0x73/0xb0 [ 25.250352] print_report+0xd1/0x650 [ 25.250392] ? __virt_addr_valid+0x1db/0x2d0 [ 25.250414] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.250439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.250464] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.250489] kasan_report+0x141/0x180 [ 25.250510] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.250539] kasan_check_range+0x10c/0x1c0 [ 25.250577] __kasan_check_write+0x18/0x20 [ 25.250610] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.250634] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.250726] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.250755] ? trace_hardirqs_on+0x37/0xe0 [ 25.250776] ? kasan_bitops_generic+0x92/0x1c0 [ 25.250805] kasan_bitops_generic+0x116/0x1c0 [ 25.250828] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.250852] ? __pfx_read_tsc+0x10/0x10 [ 25.250873] ? ktime_get_ts64+0x86/0x230 [ 25.250919] kunit_try_run_case+0x1a5/0x480 [ 25.250945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.250983] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.251005] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.251027] ? __kthread_parkme+0x82/0x180 [ 25.251046] ? preempt_count_sub+0x50/0x80 [ 25.251069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.251094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.251118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.251142] kthread+0x337/0x6f0 [ 25.251163] ? trace_preempt_on+0x20/0xc0 [ 25.251202] ? __pfx_kthread+0x10/0x10 [ 25.251222] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.251262] ? calculate_sigpending+0x7b/0xa0 [ 25.251285] ? __pfx_kthread+0x10/0x10 [ 25.251317] ret_from_fork+0x116/0x1d0 [ 25.251335] ? __pfx_kthread+0x10/0x10 [ 25.251356] ret_from_fork_asm+0x1a/0x30 [ 25.251401] </TASK> [ 25.251413] [ 25.259931] Allocated by task 309: [ 25.260109] kasan_save_stack+0x45/0x70 [ 25.260461] kasan_save_track+0x18/0x40 [ 25.260604] kasan_save_alloc_info+0x3b/0x50 [ 25.261017] __kasan_kmalloc+0xb7/0xc0 [ 25.261155] __kmalloc_cache_noprof+0x189/0x420 [ 25.261299] kasan_bitops_generic+0x92/0x1c0 [ 25.261594] kunit_try_run_case+0x1a5/0x480 [ 25.261940] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.262236] kthread+0x337/0x6f0 [ 25.262413] ret_from_fork+0x116/0x1d0 [ 25.262588] ret_from_fork_asm+0x1a/0x30 [ 25.262935] [ 25.263096] The buggy address belongs to the object at ffff88810586d4c0 [ 25.263096] which belongs to the cache kmalloc-16 of size 16 [ 25.263596] The buggy address is located 8 bytes inside of [ 25.263596] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.264193] [ 25.264319] The buggy address belongs to the physical page: [ 25.264566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.264959] flags: 0x200000000000000(node=0|zone=2) [ 25.265180] page_type: f5(slab) [ 25.265344] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.265684] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.265967] page dumped because: kasan: bad access detected [ 25.266125] [ 25.266186] Memory state around the buggy address: [ 25.266425] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.267223] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.267549] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.267931] ^ [ 25.268221] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.268560] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.269058] ================================================================== [ 25.165142] ================================================================== [ 25.165927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.166334] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.166958] [ 25.167068] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.167114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.167127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.167147] Call Trace: [ 25.167180] <TASK> [ 25.167194] dump_stack_lvl+0x73/0xb0 [ 25.167222] print_report+0xd1/0x650 [ 25.167258] ? __virt_addr_valid+0x1db/0x2d0 [ 25.167294] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.167344] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.167383] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.167408] kasan_report+0x141/0x180 [ 25.167430] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.167460] kasan_check_range+0x10c/0x1c0 [ 25.167483] __kasan_check_write+0x18/0x20 [ 25.167520] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.167545] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.167571] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.167595] ? trace_hardirqs_on+0x37/0xe0 [ 25.167617] ? kasan_bitops_generic+0x92/0x1c0 [ 25.167643] kasan_bitops_generic+0x116/0x1c0 [ 25.167666] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.167706] ? __pfx_read_tsc+0x10/0x10 [ 25.167727] ? ktime_get_ts64+0x86/0x230 [ 25.167751] kunit_try_run_case+0x1a5/0x480 [ 25.167776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.167800] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.167822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.167844] ? __kthread_parkme+0x82/0x180 [ 25.167864] ? preempt_count_sub+0x50/0x80 [ 25.167888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.167913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.167937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.167961] kthread+0x337/0x6f0 [ 25.167981] ? trace_preempt_on+0x20/0xc0 [ 25.168003] ? __pfx_kthread+0x10/0x10 [ 25.168023] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.168047] ? calculate_sigpending+0x7b/0xa0 [ 25.168071] ? __pfx_kthread+0x10/0x10 [ 25.168092] ret_from_fork+0x116/0x1d0 [ 25.168111] ? __pfx_kthread+0x10/0x10 [ 25.168131] ret_from_fork_asm+0x1a/0x30 [ 25.168162] </TASK> [ 25.168173] [ 25.177104] Allocated by task 309: [ 25.177229] kasan_save_stack+0x45/0x70 [ 25.177406] kasan_save_track+0x18/0x40 [ 25.177727] kasan_save_alloc_info+0x3b/0x50 [ 25.178004] __kasan_kmalloc+0xb7/0xc0 [ 25.178208] __kmalloc_cache_noprof+0x189/0x420 [ 25.178404] kasan_bitops_generic+0x92/0x1c0 [ 25.178567] kunit_try_run_case+0x1a5/0x480 [ 25.178794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.179106] kthread+0x337/0x6f0 [ 25.179317] ret_from_fork+0x116/0x1d0 [ 25.179527] ret_from_fork_asm+0x1a/0x30 [ 25.179731] [ 25.179834] The buggy address belongs to the object at ffff88810586d4c0 [ 25.179834] which belongs to the cache kmalloc-16 of size 16 [ 25.180317] The buggy address is located 8 bytes inside of [ 25.180317] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.180871] [ 25.180969] The buggy address belongs to the physical page: [ 25.181194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.181430] flags: 0x200000000000000(node=0|zone=2) [ 25.181581] page_type: f5(slab) [ 25.181692] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.181952] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.182560] page dumped because: kasan: bad access detected [ 25.183034] [ 25.183127] Memory state around the buggy address: [ 25.183352] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.183629] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.184141] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.184480] ^ [ 25.184926] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.185198] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.185413] ================================================================== [ 25.269476] ================================================================== [ 25.269945] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.270239] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.270462] [ 25.270622] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.270687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.270700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.270721] Call Trace: [ 25.270734] <TASK> [ 25.270765] dump_stack_lvl+0x73/0xb0 [ 25.270791] print_report+0xd1/0x650 [ 25.270828] ? __virt_addr_valid+0x1db/0x2d0 [ 25.270863] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.270900] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.270925] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.270963] kasan_report+0x141/0x180 [ 25.270984] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.271013] kasan_check_range+0x10c/0x1c0 [ 25.271037] __kasan_check_write+0x18/0x20 [ 25.271224] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.271250] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.271276] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.271300] ? trace_hardirqs_on+0x37/0xe0 [ 25.271335] ? kasan_bitops_generic+0x92/0x1c0 [ 25.271362] kasan_bitops_generic+0x116/0x1c0 [ 25.271385] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.271408] ? __pfx_read_tsc+0x10/0x10 [ 25.271430] ? ktime_get_ts64+0x86/0x230 [ 25.271453] kunit_try_run_case+0x1a5/0x480 [ 25.271478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.271501] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.271522] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.271544] ? __kthread_parkme+0x82/0x180 [ 25.271564] ? preempt_count_sub+0x50/0x80 [ 25.271587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.271612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.271635] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.271682] kthread+0x337/0x6f0 [ 25.271702] ? trace_preempt_on+0x20/0xc0 [ 25.271737] ? __pfx_kthread+0x10/0x10 [ 25.271770] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.271807] ? calculate_sigpending+0x7b/0xa0 [ 25.271831] ? __pfx_kthread+0x10/0x10 [ 25.271853] ret_from_fork+0x116/0x1d0 [ 25.271886] ? __pfx_kthread+0x10/0x10 [ 25.271920] ret_from_fork_asm+0x1a/0x30 [ 25.271950] </TASK> [ 25.271961] [ 25.280743] Allocated by task 309: [ 25.280927] kasan_save_stack+0x45/0x70 [ 25.281126] kasan_save_track+0x18/0x40 [ 25.281339] kasan_save_alloc_info+0x3b/0x50 [ 25.281550] __kasan_kmalloc+0xb7/0xc0 [ 25.281785] __kmalloc_cache_noprof+0x189/0x420 [ 25.281997] kasan_bitops_generic+0x92/0x1c0 [ 25.282192] kunit_try_run_case+0x1a5/0x480 [ 25.282474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.282685] kthread+0x337/0x6f0 [ 25.282801] ret_from_fork+0x116/0x1d0 [ 25.283032] ret_from_fork_asm+0x1a/0x30 [ 25.283232] [ 25.283363] The buggy address belongs to the object at ffff88810586d4c0 [ 25.283363] which belongs to the cache kmalloc-16 of size 16 [ 25.284235] The buggy address is located 8 bytes inside of [ 25.284235] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.284871] [ 25.284961] The buggy address belongs to the physical page: [ 25.285221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.285463] flags: 0x200000000000000(node=0|zone=2) [ 25.285682] page_type: f5(slab) [ 25.286105] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.286510] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.286951] page dumped because: kasan: bad access detected [ 25.287146] [ 25.287209] Memory state around the buggy address: [ 25.287393] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.287960] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.288207] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.288479] ^ [ 25.288806] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.289026] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.289224] ================================================================== [ 25.228030] ================================================================== [ 25.228480] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.228917] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.229134] [ 25.229209] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.229254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.229267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.229288] Call Trace: [ 25.229303] <TASK> [ 25.229332] dump_stack_lvl+0x73/0xb0 [ 25.229359] print_report+0xd1/0x650 [ 25.229380] ? __virt_addr_valid+0x1db/0x2d0 [ 25.229403] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.229427] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.229453] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.229478] kasan_report+0x141/0x180 [ 25.229500] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.229529] kasan_check_range+0x10c/0x1c0 [ 25.229552] __kasan_check_write+0x18/0x20 [ 25.229575] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.229600] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.229627] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.229649] ? trace_hardirqs_on+0x37/0xe0 [ 25.229670] ? kasan_bitops_generic+0x92/0x1c0 [ 25.229697] kasan_bitops_generic+0x116/0x1c0 [ 25.229720] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.229750] ? __pfx_read_tsc+0x10/0x10 [ 25.229770] ? ktime_get_ts64+0x86/0x230 [ 25.229794] kunit_try_run_case+0x1a5/0x480 [ 25.229818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.229842] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.229980] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.230010] ? __kthread_parkme+0x82/0x180 [ 25.230030] ? preempt_count_sub+0x50/0x80 [ 25.230053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.230078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.230102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.230127] kthread+0x337/0x6f0 [ 25.230146] ? trace_preempt_on+0x20/0xc0 [ 25.230167] ? __pfx_kthread+0x10/0x10 [ 25.230189] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.230213] ? calculate_sigpending+0x7b/0xa0 [ 25.230235] ? __pfx_kthread+0x10/0x10 [ 25.230257] ret_from_fork+0x116/0x1d0 [ 25.230275] ? __pfx_kthread+0x10/0x10 [ 25.230296] ret_from_fork_asm+0x1a/0x30 [ 25.230337] </TASK> [ 25.230348] [ 25.239478] Allocated by task 309: [ 25.239743] kasan_save_stack+0x45/0x70 [ 25.239936] kasan_save_track+0x18/0x40 [ 25.240174] kasan_save_alloc_info+0x3b/0x50 [ 25.240375] __kasan_kmalloc+0xb7/0xc0 [ 25.240514] __kmalloc_cache_noprof+0x189/0x420 [ 25.240844] kasan_bitops_generic+0x92/0x1c0 [ 25.241075] kunit_try_run_case+0x1a5/0x480 [ 25.241224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.241479] kthread+0x337/0x6f0 [ 25.241628] ret_from_fork+0x116/0x1d0 [ 25.242003] ret_from_fork_asm+0x1a/0x30 [ 25.242148] [ 25.242211] The buggy address belongs to the object at ffff88810586d4c0 [ 25.242211] which belongs to the cache kmalloc-16 of size 16 [ 25.242595] The buggy address is located 8 bytes inside of [ 25.242595] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.243389] [ 25.243459] The buggy address belongs to the physical page: [ 25.243619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.243844] flags: 0x200000000000000(node=0|zone=2) [ 25.244199] page_type: f5(slab) [ 25.244407] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.244890] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.245441] page dumped because: kasan: bad access detected [ 25.245867] [ 25.245938] Memory state around the buggy address: [ 25.246083] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.246602] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.247111] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.247334] ^ [ 25.247680] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.248053] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.248355] ================================================================== [ 25.185810] ================================================================== [ 25.186048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.186825] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.187296] [ 25.187441] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.187504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.187517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.187538] Call Trace: [ 25.187554] <TASK> [ 25.187568] dump_stack_lvl+0x73/0xb0 [ 25.187616] print_report+0xd1/0x650 [ 25.187638] ? __virt_addr_valid+0x1db/0x2d0 [ 25.187661] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.187726] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.187755] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.187780] kasan_report+0x141/0x180 [ 25.187802] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.187831] kasan_check_range+0x10c/0x1c0 [ 25.187855] __kasan_check_write+0x18/0x20 [ 25.187900] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.187926] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.187951] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.187975] ? trace_hardirqs_on+0x37/0xe0 [ 25.187998] ? kasan_bitops_generic+0x92/0x1c0 [ 25.188024] kasan_bitops_generic+0x116/0x1c0 [ 25.188064] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.188089] ? __pfx_read_tsc+0x10/0x10 [ 25.188110] ? ktime_get_ts64+0x86/0x230 [ 25.188134] kunit_try_run_case+0x1a5/0x480 [ 25.188159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.188183] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.188204] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.188243] ? __kthread_parkme+0x82/0x180 [ 25.188264] ? preempt_count_sub+0x50/0x80 [ 25.188287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.188322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.188347] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.188371] kthread+0x337/0x6f0 [ 25.188404] ? trace_preempt_on+0x20/0xc0 [ 25.188426] ? __pfx_kthread+0x10/0x10 [ 25.188447] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.188472] ? calculate_sigpending+0x7b/0xa0 [ 25.188496] ? __pfx_kthread+0x10/0x10 [ 25.188518] ret_from_fork+0x116/0x1d0 [ 25.188536] ? __pfx_kthread+0x10/0x10 [ 25.188558] ret_from_fork_asm+0x1a/0x30 [ 25.188604] </TASK> [ 25.188615] [ 25.197851] Allocated by task 309: [ 25.198049] kasan_save_stack+0x45/0x70 [ 25.198230] kasan_save_track+0x18/0x40 [ 25.198439] kasan_save_alloc_info+0x3b/0x50 [ 25.198645] __kasan_kmalloc+0xb7/0xc0 [ 25.198784] __kmalloc_cache_noprof+0x189/0x420 [ 25.198930] kasan_bitops_generic+0x92/0x1c0 [ 25.199440] kunit_try_run_case+0x1a5/0x480 [ 25.199705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.199868] kthread+0x337/0x6f0 [ 25.199977] ret_from_fork+0x116/0x1d0 [ 25.200097] ret_from_fork_asm+0x1a/0x30 [ 25.200222] [ 25.200300] The buggy address belongs to the object at ffff88810586d4c0 [ 25.200300] which belongs to the cache kmalloc-16 of size 16 [ 25.201397] The buggy address is located 8 bytes inside of [ 25.201397] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.202029] [ 25.202100] The buggy address belongs to the physical page: [ 25.202260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.202849] flags: 0x200000000000000(node=0|zone=2) [ 25.203122] page_type: f5(slab) [ 25.203271] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.203655] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.203961] page dumped because: kasan: bad access detected [ 25.204120] [ 25.204199] Memory state around the buggy address: [ 25.204501] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.204983] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.205386] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.205742] ^ [ 25.206001] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.206299] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.206673] ================================================================== [ 25.207023] ================================================================== [ 25.207299] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.208014] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.208373] [ 25.208500] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.208548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.208560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.208599] Call Trace: [ 25.208614] <TASK> [ 25.208629] dump_stack_lvl+0x73/0xb0 [ 25.208656] print_report+0xd1/0x650 [ 25.208783] ? __virt_addr_valid+0x1db/0x2d0 [ 25.208830] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.208870] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.208896] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.208921] kasan_report+0x141/0x180 [ 25.208944] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.208973] kasan_check_range+0x10c/0x1c0 [ 25.208997] __kasan_check_write+0x18/0x20 [ 25.209020] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.209045] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.209070] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.209094] ? trace_hardirqs_on+0x37/0xe0 [ 25.209115] ? kasan_bitops_generic+0x92/0x1c0 [ 25.209142] kasan_bitops_generic+0x116/0x1c0 [ 25.209165] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.209190] ? __pfx_read_tsc+0x10/0x10 [ 25.209212] ? ktime_get_ts64+0x86/0x230 [ 25.209236] kunit_try_run_case+0x1a5/0x480 [ 25.209261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.209284] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.209319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.209341] ? __kthread_parkme+0x82/0x180 [ 25.209361] ? preempt_count_sub+0x50/0x80 [ 25.209384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.209409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.209434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.209459] kthread+0x337/0x6f0 [ 25.209478] ? trace_preempt_on+0x20/0xc0 [ 25.209577] ? __pfx_kthread+0x10/0x10 [ 25.209600] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.209642] ? calculate_sigpending+0x7b/0xa0 [ 25.209666] ? __pfx_kthread+0x10/0x10 [ 25.209748] ret_from_fork+0x116/0x1d0 [ 25.209769] ? __pfx_kthread+0x10/0x10 [ 25.209789] ret_from_fork_asm+0x1a/0x30 [ 25.209820] </TASK> [ 25.209831] [ 25.218738] Allocated by task 309: [ 25.218922] kasan_save_stack+0x45/0x70 [ 25.219174] kasan_save_track+0x18/0x40 [ 25.219340] kasan_save_alloc_info+0x3b/0x50 [ 25.219488] __kasan_kmalloc+0xb7/0xc0 [ 25.219768] __kmalloc_cache_noprof+0x189/0x420 [ 25.220086] kasan_bitops_generic+0x92/0x1c0 [ 25.220270] kunit_try_run_case+0x1a5/0x480 [ 25.220496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.220783] kthread+0x337/0x6f0 [ 25.220976] ret_from_fork+0x116/0x1d0 [ 25.221150] ret_from_fork_asm+0x1a/0x30 [ 25.221355] [ 25.221646] The buggy address belongs to the object at ffff88810586d4c0 [ 25.221646] which belongs to the cache kmalloc-16 of size 16 [ 25.222175] The buggy address is located 8 bytes inside of [ 25.222175] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.222853] [ 25.222923] The buggy address belongs to the physical page: [ 25.223084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.223445] flags: 0x200000000000000(node=0|zone=2) [ 25.223740] page_type: f5(slab) [ 25.223899] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.224130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.224387] page dumped because: kasan: bad access detected [ 25.224968] [ 25.225073] Memory state around the buggy address: [ 25.225260] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.225478] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.226080] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.226578] ^ [ 25.226910] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.227215] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.227539] ================================================================== [ 25.144654] ================================================================== [ 25.144978] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.145340] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.146069] [ 25.146162] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.146212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.146225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.146247] Call Trace: [ 25.146258] <TASK> [ 25.146274] dump_stack_lvl+0x73/0xb0 [ 25.146302] print_report+0xd1/0x650 [ 25.146337] ? __virt_addr_valid+0x1db/0x2d0 [ 25.146381] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.146420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.146445] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.146470] kasan_report+0x141/0x180 [ 25.146492] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.146535] kasan_check_range+0x10c/0x1c0 [ 25.146558] __kasan_check_write+0x18/0x20 [ 25.146581] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.146606] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.146632] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.146656] ? trace_hardirqs_on+0x37/0xe0 [ 25.146739] ? kasan_bitops_generic+0x92/0x1c0 [ 25.146769] kasan_bitops_generic+0x116/0x1c0 [ 25.146793] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.146817] ? __pfx_read_tsc+0x10/0x10 [ 25.146839] ? ktime_get_ts64+0x86/0x230 [ 25.146864] kunit_try_run_case+0x1a5/0x480 [ 25.146889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.146912] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.146935] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.146957] ? __kthread_parkme+0x82/0x180 [ 25.146978] ? preempt_count_sub+0x50/0x80 [ 25.147001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.147026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.147049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.147074] kthread+0x337/0x6f0 [ 25.147094] ? trace_preempt_on+0x20/0xc0 [ 25.147116] ? __pfx_kthread+0x10/0x10 [ 25.147135] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.147159] ? calculate_sigpending+0x7b/0xa0 [ 25.147182] ? __pfx_kthread+0x10/0x10 [ 25.147203] ret_from_fork+0x116/0x1d0 [ 25.147221] ? __pfx_kthread+0x10/0x10 [ 25.147241] ret_from_fork_asm+0x1a/0x30 [ 25.147319] </TASK> [ 25.147331] [ 25.156296] Allocated by task 309: [ 25.156506] kasan_save_stack+0x45/0x70 [ 25.156825] kasan_save_track+0x18/0x40 [ 25.157061] kasan_save_alloc_info+0x3b/0x50 [ 25.157284] __kasan_kmalloc+0xb7/0xc0 [ 25.157469] __kmalloc_cache_noprof+0x189/0x420 [ 25.157729] kasan_bitops_generic+0x92/0x1c0 [ 25.158014] kunit_try_run_case+0x1a5/0x480 [ 25.158195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.158398] kthread+0x337/0x6f0 [ 25.158659] ret_from_fork+0x116/0x1d0 [ 25.158919] ret_from_fork_asm+0x1a/0x30 [ 25.159122] [ 25.159232] The buggy address belongs to the object at ffff88810586d4c0 [ 25.159232] which belongs to the cache kmalloc-16 of size 16 [ 25.159717] The buggy address is located 8 bytes inside of [ 25.159717] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.160275] [ 25.160406] The buggy address belongs to the physical page: [ 25.160566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.160814] flags: 0x200000000000000(node=0|zone=2) [ 25.161261] page_type: f5(slab) [ 25.161446] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.162259] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.162613] page dumped because: kasan: bad access detected [ 25.162930] [ 25.163024] Memory state around the buggy address: [ 25.163236] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.163526] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.163859] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.164157] ^ [ 25.164398] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.164601] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.164802] ================================================================== [ 25.110702] ================================================================== [ 25.112015] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.112330] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.113502] [ 25.114184] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.114245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.114267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.114290] Call Trace: [ 25.114316] <TASK> [ 25.114337] dump_stack_lvl+0x73/0xb0 [ 25.114372] print_report+0xd1/0x650 [ 25.114396] ? __virt_addr_valid+0x1db/0x2d0 [ 25.114420] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.114445] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.114470] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.114503] kasan_report+0x141/0x180 [ 25.114525] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.114554] kasan_check_range+0x10c/0x1c0 [ 25.114577] __kasan_check_write+0x18/0x20 [ 25.114600] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.114625] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.114650] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.114676] ? trace_hardirqs_on+0x37/0xe0 [ 25.114699] ? kasan_bitops_generic+0x92/0x1c0 [ 25.114726] kasan_bitops_generic+0x116/0x1c0 [ 25.114749] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.114774] ? __pfx_read_tsc+0x10/0x10 [ 25.114795] ? ktime_get_ts64+0x86/0x230 [ 25.114819] kunit_try_run_case+0x1a5/0x480 [ 25.114847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.114871] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.114894] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.114916] ? __kthread_parkme+0x82/0x180 [ 25.114937] ? preempt_count_sub+0x50/0x80 [ 25.114962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.114986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.115010] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.115033] kthread+0x337/0x6f0 [ 25.115052] ? trace_preempt_on+0x20/0xc0 [ 25.115074] ? __pfx_kthread+0x10/0x10 [ 25.115094] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.115118] ? calculate_sigpending+0x7b/0xa0 [ 25.115142] ? __pfx_kthread+0x10/0x10 [ 25.115164] ret_from_fork+0x116/0x1d0 [ 25.115182] ? __pfx_kthread+0x10/0x10 [ 25.115203] ret_from_fork_asm+0x1a/0x30 [ 25.115234] </TASK> [ 25.115248] [ 25.131402] Allocated by task 309: [ 25.131710] kasan_save_stack+0x45/0x70 [ 25.132227] kasan_save_track+0x18/0x40 [ 25.132434] kasan_save_alloc_info+0x3b/0x50 [ 25.132811] __kasan_kmalloc+0xb7/0xc0 [ 25.133110] __kmalloc_cache_noprof+0x189/0x420 [ 25.133452] kasan_bitops_generic+0x92/0x1c0 [ 25.133876] kunit_try_run_case+0x1a5/0x480 [ 25.134177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.134548] kthread+0x337/0x6f0 [ 25.134905] ret_from_fork+0x116/0x1d0 [ 25.135196] ret_from_fork_asm+0x1a/0x30 [ 25.135498] [ 25.135592] The buggy address belongs to the object at ffff88810586d4c0 [ 25.135592] which belongs to the cache kmalloc-16 of size 16 [ 25.136425] The buggy address is located 8 bytes inside of [ 25.136425] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.137126] [ 25.137228] The buggy address belongs to the physical page: [ 25.137670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.137984] flags: 0x200000000000000(node=0|zone=2) [ 25.138218] page_type: f5(slab) [ 25.138383] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.139025] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.139481] page dumped because: kasan: bad access detected [ 25.140153] [ 25.140259] Memory state around the buggy address: [ 25.140457] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.141057] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.141497] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.141973] ^ [ 25.142360] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.142859] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.143342] ==================================================================