Date
July 3, 2025, 10:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 54.887139] ================================================================== [ 54.894452] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 54.902736] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 54.910144] [ 54.911677] CPU: 6 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 54.911707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.911717] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.911727] Call trace: [ 54.911733] show_stack+0x20/0x38 (C) [ 54.911751] dump_stack_lvl+0x8c/0xd0 [ 54.911770] print_report+0x118/0x608 [ 54.911790] kasan_report+0xdc/0x128 [ 54.911809] __asan_report_load8_noabort+0x20/0x30 [ 54.911828] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 54.911848] kasan_bitops_generic+0x110/0x1c8 [ 54.911866] kunit_try_run_case+0x170/0x3f0 [ 54.911885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.911907] kthread+0x328/0x630 [ 54.911920] ret_from_fork+0x10/0x20 [ 54.911937] [ 54.983160] Allocated by task 370: [ 54.986616] kasan_save_stack+0x3c/0x68 [ 54.990516] kasan_save_track+0x20/0x40 [ 54.994421] kasan_save_alloc_info+0x40/0x58 [ 54.998762] __kasan_kmalloc+0xd4/0xd8 [ 55.002581] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.007181] kasan_bitops_generic+0xa0/0x1c8 [ 55.011519] kunit_try_run_case+0x170/0x3f0 [ 55.015771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.021340] kthread+0x328/0x630 [ 55.024624] ret_from_fork+0x10/0x20 [ 55.028260] [ 55.029783] The buggy address belongs to the object at ffff000098190200 [ 55.029783] which belongs to the cache kmalloc-16 of size 16 [ 55.042267] The buggy address is located 8 bytes inside of [ 55.042267] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 55.054657] [ 55.056188] The buggy address belongs to the physical page: [ 55.061836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 55.069936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.076552] page_type: f5(slab) [ 55.079749] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.087594] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.095433] page dumped because: kasan: bad access detected [ 55.101080] [ 55.102603] Memory state around the buggy address: [ 55.107454] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.114765] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.122074] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.129382] ^ [ 55.132922] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.140232] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.147541] ================================================================== [ 55.154969] ================================================================== [ 55.162283] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 55.170565] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 55.178049] [ 55.179585] CPU: 6 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 55.179615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.179625] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.179636] Call trace: [ 55.179643] show_stack+0x20/0x38 (C) [ 55.179660] dump_stack_lvl+0x8c/0xd0 [ 55.179679] print_report+0x118/0x608 [ 55.179698] kasan_report+0xdc/0x128 [ 55.179716] kasan_check_range+0x100/0x1a8 [ 55.179736] __kasan_check_write+0x20/0x30 [ 55.179752] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 55.179773] kasan_bitops_generic+0x110/0x1c8 [ 55.179790] kunit_try_run_case+0x170/0x3f0 [ 55.179809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.179829] kthread+0x328/0x630 [ 55.179842] ret_from_fork+0x10/0x20 [ 55.179860] [ 55.254493] Allocated by task 370: [ 55.257946] kasan_save_stack+0x3c/0x68 [ 55.261845] kasan_save_track+0x20/0x40 [ 55.265751] kasan_save_alloc_info+0x40/0x58 [ 55.270089] __kasan_kmalloc+0xd4/0xd8 [ 55.273907] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.278509] kasan_bitops_generic+0xa0/0x1c8 [ 55.282847] kunit_try_run_case+0x170/0x3f0 [ 55.287100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.292668] kthread+0x328/0x630 [ 55.295951] ret_from_fork+0x10/0x20 [ 55.299587] [ 55.301110] The buggy address belongs to the object at ffff000098190200 [ 55.301110] which belongs to the cache kmalloc-16 of size 16 [ 55.313593] The buggy address is located 8 bytes inside of [ 55.313593] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 55.325983] [ 55.327514] The buggy address belongs to the physical page: [ 55.333159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 55.341261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.347876] page_type: f5(slab) [ 55.351077] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.358921] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.366760] page dumped because: kasan: bad access detected [ 55.372403] [ 55.373925] Memory state around the buggy address: [ 55.378780] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.386089] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.393397] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.400702] ^ [ 55.404244] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.411554] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.418863] ================================================================== [ 56.238014] ================================================================== [ 56.245335] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 56.253618] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 56.261106] [ 56.262634] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 56.262663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.262672] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.262685] Call trace: [ 56.262691] show_stack+0x20/0x38 (C) [ 56.262709] dump_stack_lvl+0x8c/0xd0 [ 56.262728] print_report+0x118/0x608 [ 56.262746] kasan_report+0xdc/0x128 [ 56.262765] kasan_check_range+0x100/0x1a8 [ 56.262785] __kasan_check_write+0x20/0x30 [ 56.262801] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 56.262823] kasan_bitops_generic+0x110/0x1c8 [ 56.262840] kunit_try_run_case+0x170/0x3f0 [ 56.262858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.262878] kthread+0x328/0x630 [ 56.262892] ret_from_fork+0x10/0x20 [ 56.262911] [ 56.337562] Allocated by task 370: [ 56.341019] kasan_save_stack+0x3c/0x68 [ 56.344919] kasan_save_track+0x20/0x40 [ 56.348818] kasan_save_alloc_info+0x40/0x58 [ 56.353158] __kasan_kmalloc+0xd4/0xd8 [ 56.356969] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.361572] kasan_bitops_generic+0xa0/0x1c8 [ 56.365915] kunit_try_run_case+0x170/0x3f0 [ 56.370172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.375743] kthread+0x328/0x630 [ 56.379030] ret_from_fork+0x10/0x20 [ 56.382667] [ 56.384190] The buggy address belongs to the object at ffff000098190200 [ 56.384190] which belongs to the cache kmalloc-16 of size 16 [ 56.396673] The buggy address is located 8 bytes inside of [ 56.396673] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 56.409072] [ 56.410598] The buggy address belongs to the physical page: [ 56.416246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 56.424343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.430954] page_type: f5(slab) [ 56.434155] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.441993] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.449830] page dumped because: kasan: bad access detected [ 56.455478] [ 56.457002] Memory state around the buggy address: [ 56.461858] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.469173] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.476489] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.483803] ^ [ 56.487346] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.494662] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.501976] ================================================================== [ 55.698846] ================================================================== [ 55.706168] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 55.714455] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 55.721865] [ 55.723402] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 55.723433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.723442] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.723454] Call trace: [ 55.723460] show_stack+0x20/0x38 (C) [ 55.723480] dump_stack_lvl+0x8c/0xd0 [ 55.723500] print_report+0x118/0x608 [ 55.723520] kasan_report+0xdc/0x128 [ 55.723538] __asan_report_load8_noabort+0x20/0x30 [ 55.723555] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 55.723577] kasan_bitops_generic+0x110/0x1c8 [ 55.723595] kunit_try_run_case+0x170/0x3f0 [ 55.723614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.723636] kthread+0x328/0x630 [ 55.723650] ret_from_fork+0x10/0x20 [ 55.723668] [ 55.794876] Allocated by task 370: [ 55.798330] kasan_save_stack+0x3c/0x68 [ 55.802237] kasan_save_track+0x20/0x40 [ 55.806142] kasan_save_alloc_info+0x40/0x58 [ 55.810480] __kasan_kmalloc+0xd4/0xd8 [ 55.814298] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.818899] kasan_bitops_generic+0xa0/0x1c8 [ 55.823235] kunit_try_run_case+0x170/0x3f0 [ 55.827484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.833052] kthread+0x328/0x630 [ 55.836335] ret_from_fork+0x10/0x20 [ 55.839968] [ 55.841493] The buggy address belongs to the object at ffff000098190200 [ 55.841493] which belongs to the cache kmalloc-16 of size 16 [ 55.853975] The buggy address is located 8 bytes inside of [ 55.853975] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 55.866376] [ 55.867906] The buggy address belongs to the physical page: [ 55.873552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 55.881653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.888269] page_type: f5(slab) [ 55.891464] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.899310] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.907147] page dumped because: kasan: bad access detected [ 55.912790] [ 55.914315] Memory state around the buggy address: [ 55.919175] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.926485] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.933806] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.941121] ^ [ 55.944665] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.951983] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.959290] ================================================================== [ 55.426466] ================================================================== [ 55.433799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 55.442093] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 55.449593] [ 55.451127] CPU: 2 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 55.451158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.451166] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.451179] Call trace: [ 55.451185] show_stack+0x20/0x38 (C) [ 55.451203] dump_stack_lvl+0x8c/0xd0 [ 55.451224] print_report+0x118/0x608 [ 55.451244] kasan_report+0xdc/0x128 [ 55.451264] kasan_check_range+0x100/0x1a8 [ 55.451286] __kasan_check_write+0x20/0x30 [ 55.451304] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 55.451326] kasan_bitops_generic+0x110/0x1c8 [ 55.451345] kunit_try_run_case+0x170/0x3f0 [ 55.451365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.451388] kthread+0x328/0x630 [ 55.451404] ret_from_fork+0x10/0x20 [ 55.451422] [ 55.526115] Allocated by task 370: [ 55.529583] kasan_save_stack+0x3c/0x68 [ 55.533492] kasan_save_track+0x20/0x40 [ 55.537397] kasan_save_alloc_info+0x40/0x58 [ 55.541743] __kasan_kmalloc+0xd4/0xd8 [ 55.545561] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.550168] kasan_bitops_generic+0xa0/0x1c8 [ 55.554517] kunit_try_run_case+0x170/0x3f0 [ 55.558778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.564349] kthread+0x328/0x630 [ 55.567639] ret_from_fork+0x10/0x20 [ 55.571283] [ 55.572814] The buggy address belongs to the object at ffff000098190200 [ 55.572814] which belongs to the cache kmalloc-16 of size 16 [ 55.585305] The buggy address is located 8 bytes inside of [ 55.585305] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 55.597712] [ 55.599243] The buggy address belongs to the physical page: [ 55.604889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 55.612997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.619613] page_type: f5(slab) [ 55.622814] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.630663] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.638507] page dumped because: kasan: bad access detected [ 55.644155] [ 55.645686] Memory state around the buggy address: [ 55.650545] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.657862] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.665179] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.672492] ^ [ 55.676046] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.683363] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.690676] ================================================================== [ 54.071719] ================================================================== [ 54.082931] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 54.091226] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 54.098720] [ 54.100261] CPU: 3 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 54.100294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.100305] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.100318] Call trace: [ 54.100326] show_stack+0x20/0x38 (C) [ 54.100345] dump_stack_lvl+0x8c/0xd0 [ 54.100366] print_report+0x118/0x608 [ 54.100388] kasan_report+0xdc/0x128 [ 54.100408] kasan_check_range+0x100/0x1a8 [ 54.100430] __kasan_check_write+0x20/0x30 [ 54.100447] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 54.100468] kasan_bitops_generic+0x110/0x1c8 [ 54.100488] kunit_try_run_case+0x170/0x3f0 [ 54.100507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.100529] kthread+0x328/0x630 [ 54.100545] ret_from_fork+0x10/0x20 [ 54.100566] [ 54.175268] Allocated by task 370: [ 54.178732] kasan_save_stack+0x3c/0x68 [ 54.182645] kasan_save_track+0x20/0x40 [ 54.186558] kasan_save_alloc_info+0x40/0x58 [ 54.190898] __kasan_kmalloc+0xd4/0xd8 [ 54.194713] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.199325] kasan_bitops_generic+0xa0/0x1c8 [ 54.203667] kunit_try_run_case+0x170/0x3f0 [ 54.207923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.213502] kthread+0x328/0x630 [ 54.216797] ret_from_fork+0x10/0x20 [ 54.220437] [ 54.221971] The buggy address belongs to the object at ffff000098190200 [ 54.221971] which belongs to the cache kmalloc-16 of size 16 [ 54.234457] The buggy address is located 8 bytes inside of [ 54.234457] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 54.246860] [ 54.248397] The buggy address belongs to the physical page: [ 54.254048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 54.262155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.268772] page_type: f5(slab) [ 54.271980] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.279828] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.287674] page dumped because: kasan: bad access detected [ 54.293326] [ 54.294857] Memory state around the buggy address: [ 54.299719] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.307037] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.314355] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.321672] ^ [ 54.325222] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.332540] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.339855] ================================================================== [ 54.347272] ================================================================== [ 54.354590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 54.362875] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 54.370280] [ 54.371822] CPU: 3 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 54.371854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.371863] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.371875] Call trace: [ 54.371884] show_stack+0x20/0x38 (C) [ 54.371904] dump_stack_lvl+0x8c/0xd0 [ 54.371924] print_report+0x118/0x608 [ 54.371944] kasan_report+0xdc/0x128 [ 54.371965] __asan_report_load8_noabort+0x20/0x30 [ 54.371984] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 54.372006] kasan_bitops_generic+0x110/0x1c8 [ 54.372027] kunit_try_run_case+0x170/0x3f0 [ 54.372047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.372072] kthread+0x328/0x630 [ 54.372087] ret_from_fork+0x10/0x20 [ 54.372106] [ 54.443352] Allocated by task 370: [ 54.446819] kasan_save_stack+0x3c/0x68 [ 54.450731] kasan_save_track+0x20/0x40 [ 54.454644] kasan_save_alloc_info+0x40/0x58 [ 54.458984] __kasan_kmalloc+0xd4/0xd8 [ 54.462798] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.467411] kasan_bitops_generic+0xa0/0x1c8 [ 54.471751] kunit_try_run_case+0x170/0x3f0 [ 54.476007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.481586] kthread+0x328/0x630 [ 54.484879] ret_from_fork+0x10/0x20 [ 54.488519] [ 54.490051] The buggy address belongs to the object at ffff000098190200 [ 54.490051] which belongs to the cache kmalloc-16 of size 16 [ 54.502539] The buggy address is located 8 bytes inside of [ 54.502539] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 54.514941] [ 54.516479] The buggy address belongs to the physical page: [ 54.522130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 54.530239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.536853] page_type: f5(slab) [ 54.540059] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.547909] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.555753] page dumped because: kasan: bad access detected [ 54.561404] [ 54.562934] Memory state around the buggy address: [ 54.567795] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.575115] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.582434] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.589749] ^ [ 54.593299] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.600616] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.607931] ================================================================== [ 55.966700] ================================================================== [ 55.974024] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 55.982306] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 55.989801] [ 55.991334] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 55.991363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.991371] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.991382] Call trace: [ 55.991389] show_stack+0x20/0x38 (C) [ 55.991407] dump_stack_lvl+0x8c/0xd0 [ 55.991426] print_report+0x118/0x608 [ 55.991445] kasan_report+0xdc/0x128 [ 55.991462] kasan_check_range+0x100/0x1a8 [ 55.991482] __kasan_check_write+0x20/0x30 [ 55.991497] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 55.991516] kasan_bitops_generic+0x110/0x1c8 [ 55.991535] kunit_try_run_case+0x170/0x3f0 [ 55.991554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.991576] kthread+0x328/0x630 [ 55.991590] ret_from_fork+0x10/0x20 [ 55.991606] [ 56.066247] Allocated by task 370: [ 56.069700] kasan_save_stack+0x3c/0x68 [ 56.073597] kasan_save_track+0x20/0x40 [ 56.077503] kasan_save_alloc_info+0x40/0x58 [ 56.081840] __kasan_kmalloc+0xd4/0xd8 [ 56.085657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.090260] kasan_bitops_generic+0xa0/0x1c8 [ 56.094598] kunit_try_run_case+0x170/0x3f0 [ 56.098851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.104413] kthread+0x328/0x630 [ 56.107694] ret_from_fork+0x10/0x20 [ 56.111325] [ 56.112859] The buggy address belongs to the object at ffff000098190200 [ 56.112859] which belongs to the cache kmalloc-16 of size 16 [ 56.125340] The buggy address is located 8 bytes inside of [ 56.125340] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 56.137737] [ 56.139270] The buggy address belongs to the physical page: [ 56.144913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 56.153014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.159626] page_type: f5(slab) [ 56.162829] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.170669] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.178506] page dumped because: kasan: bad access detected [ 56.184149] [ 56.185672] Memory state around the buggy address: [ 56.190524] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.197842] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.205160] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.212467] ^ [ 56.216017] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.223335] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.230642] ================================================================== [ 56.509370] ================================================================== [ 56.516685] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 56.524962] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 56.532369] [ 56.533896] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 56.533926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.533934] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.533947] Call trace: [ 56.533954] show_stack+0x20/0x38 (C) [ 56.533971] dump_stack_lvl+0x8c/0xd0 [ 56.533990] print_report+0x118/0x608 [ 56.534009] kasan_report+0xdc/0x128 [ 56.534028] __asan_report_load8_noabort+0x20/0x30 [ 56.534045] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 56.534065] kasan_bitops_generic+0x110/0x1c8 [ 56.534082] kunit_try_run_case+0x170/0x3f0 [ 56.534101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.534121] kthread+0x328/0x630 [ 56.534135] ret_from_fork+0x10/0x20 [ 56.534151] [ 56.605378] Allocated by task 370: [ 56.608836] kasan_save_stack+0x3c/0x68 [ 56.612735] kasan_save_track+0x20/0x40 [ 56.616634] kasan_save_alloc_info+0x40/0x58 [ 56.620976] __kasan_kmalloc+0xd4/0xd8 [ 56.624788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.629391] kasan_bitops_generic+0xa0/0x1c8 [ 56.633736] kunit_try_run_case+0x170/0x3f0 [ 56.637992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.643562] kthread+0x328/0x630 [ 56.646849] ret_from_fork+0x10/0x20 [ 56.650487] [ 56.652019] The buggy address belongs to the object at ffff000098190200 [ 56.652019] which belongs to the cache kmalloc-16 of size 16 [ 56.664500] The buggy address is located 8 bytes inside of [ 56.664500] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 56.676899] [ 56.678424] The buggy address belongs to the physical page: [ 56.684071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 56.692169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.698779] page_type: f5(slab) [ 56.701979] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.709819] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.717656] page dumped because: kasan: bad access detected [ 56.723303] [ 56.724827] Memory state around the buggy address: [ 56.729685] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.737000] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.744316] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.751629] ^ [ 56.755174] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.762488] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.769799] ================================================================== [ 54.615771] ================================================================== [ 54.623096] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 54.631379] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 54.638871] [ 54.640407] CPU: 6 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 54.640440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.640449] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.640461] Call trace: [ 54.640468] show_stack+0x20/0x38 (C) [ 54.640487] dump_stack_lvl+0x8c/0xd0 [ 54.640508] print_report+0x118/0x608 [ 54.640528] kasan_report+0xdc/0x128 [ 54.640547] kasan_check_range+0x100/0x1a8 [ 54.640569] __kasan_check_write+0x20/0x30 [ 54.640584] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 54.640605] kasan_bitops_generic+0x110/0x1c8 [ 54.640622] kunit_try_run_case+0x170/0x3f0 [ 54.640640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.640661] kthread+0x328/0x630 [ 54.640674] ret_from_fork+0x10/0x20 [ 54.640692] [ 54.715367] Allocated by task 370: [ 54.718829] kasan_save_stack+0x3c/0x68 [ 54.722737] kasan_save_track+0x20/0x40 [ 54.726634] kasan_save_alloc_info+0x40/0x58 [ 54.730970] __kasan_kmalloc+0xd4/0xd8 [ 54.734780] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.739378] kasan_bitops_generic+0xa0/0x1c8 [ 54.743717] kunit_try_run_case+0x170/0x3f0 [ 54.747973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.753541] kthread+0x328/0x630 [ 54.756827] ret_from_fork+0x10/0x20 [ 54.760461] [ 54.761986] The buggy address belongs to the object at ffff000098190200 [ 54.761986] which belongs to the cache kmalloc-16 of size 16 [ 54.774463] The buggy address is located 8 bytes inside of [ 54.774463] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 54.786862] [ 54.788397] The buggy address belongs to the physical page: [ 54.794042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 54.802145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.808758] page_type: f5(slab) [ 54.811960] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.819807] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.827650] page dumped because: kasan: bad access detected [ 54.833295] [ 54.834818] Memory state around the buggy address: [ 54.839683] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.846995] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.854305] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.861611] ^ [ 54.865152] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.872464] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.879770] ==================================================================
[ 33.342897] ================================================================== [ 33.342972] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 33.343517] Write of size 8 at addr fff00000c5a30ce8 by task kunit_try_catch/293 [ 33.343888] [ 33.343952] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 33.344338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.344368] Hardware name: linux,dummy-virt (DT) [ 33.344406] Call trace: [ 33.344431] show_stack+0x20/0x38 (C) [ 33.344557] dump_stack_lvl+0x8c/0xd0 [ 33.345093] __kasan_check_write+0x20/0x30 [ 33.346322] ret_from_fork+0x10/0x20 [ 33.346377] [ 33.346425] Allocated by task 293: [ 33.346772] kasan_save_alloc_info+0x40/0x58 [ 33.347538] ret_from_fork+0x10/0x20 [ 33.347864] The buggy address is located 8 bytes inside of [ 33.347864] allocated 9-byte region [fff00000c5a30ce0, fff00000c5a30ce9) [ 33.348403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.349137] page dumped because: kasan: bad access detected [ 33.349389] fff00000c5a30b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.349871] fff00000c5a30d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.352567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.353724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.353965] kthread+0x328/0x630 [ 33.354014] ret_from_fork+0x10/0x20 [ 33.354133] [ 33.354153] Allocated by task 293: [ 33.354184] kasan_save_stack+0x3c/0x68 [ 33.354569] kasan_save_alloc_info+0x40/0x58 [ 33.355269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.355802] [ 33.356268] page_type: f5(slab) [ 33.356501] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.356642] page dumped because: kasan: bad access detected [ 33.356849] fff00000c5a30c00: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.358924] [ 33.359512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.360418] kasan_report+0xdc/0x128 [ 33.360569] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 33.361029] kunit_try_run_case+0x170/0x3f0 [ 33.362346] __kasan_kmalloc+0xd4/0xd8 [ 33.363694] The buggy address is located 8 bytes inside of [ 33.363694] allocated 9-byte region [fff00000c5a30ce0, fff00000c5a30ce9) [ 33.364235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.364664] raw: fff00000c5a30be0 000000008080007f 00000000f5000000 0000000000000000 [ 33.364884] fff00000c5a30c00: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.365661] ==================================================================
[ 25.181267] ================================================================== [ 25.182156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.183221] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310 [ 25.183497] [ 25.183585] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 25.183636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.183650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.183672] Call Trace: [ 25.183685] <TASK> [ 25.183703] dump_stack_lvl+0x73/0xb0 [ 25.183733] print_report+0xd1/0x650 [ 25.183755] ? __virt_addr_valid+0x1db/0x2d0 [ 25.183780] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.183803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.183829] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.183854] kasan_report+0x141/0x180 [ 25.183875] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.183904] kasan_check_range+0x10c/0x1c0 [ 25.183927] __kasan_check_write+0x18/0x20 [ 25.183950] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.183974] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.184000] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.184024] ? trace_hardirqs_on+0x37/0xe0 [ 25.184045] ? kasan_bitops_generic+0x92/0x1c0 [ 25.184072] kasan_bitops_generic+0x116/0x1c0 [ 25.184094] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.184118] ? __pfx_read_tsc+0x10/0x10 [ 25.184250] ? ktime_get_ts64+0x86/0x230 [ 25.184323] kunit_try_run_case+0x1a5/0x480 [ 25.184350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.184373] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.184395] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.184421] ? __kthread_parkme+0x82/0x180 [ 25.184442] ? preempt_count_sub+0x50/0x80 [ 25.184476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.184500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.184523] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.184547] kthread+0x337/0x6f0 [ 25.184567] ? trace_preempt_on+0x20/0xc0 [ 25.184588] ? __pfx_kthread+0x10/0x10 [ 25.184609] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.184632] ? calculate_sigpending+0x7b/0xa0 [ 25.184655] ? __pfx_kthread+0x10/0x10 [ 25.184677] ret_from_fork+0x116/0x1d0 [ 25.184696] ? __pfx_kthread+0x10/0x10 [ 25.184717] ret_from_fork_asm+0x1a/0x30 [ 25.184747] </TASK> [ 25.184759] [ 25.199910] Allocated by task 310: [ 25.200104] kasan_save_stack+0x45/0x70 [ 25.200681] kasan_save_track+0x18/0x40 [ 25.200827] kasan_save_alloc_info+0x3b/0x50 [ 25.200972] __kasan_kmalloc+0xb7/0xc0 [ 25.201103] __kmalloc_cache_noprof+0x189/0x420 [ 25.201261] kasan_bitops_generic+0x92/0x1c0 [ 25.201402] kunit_try_run_case+0x1a5/0x480 [ 25.201745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.202220] kthread+0x337/0x6f0 [ 25.202658] ret_from_fork+0x116/0x1d0 [ 25.203017] ret_from_fork_asm+0x1a/0x30 [ 25.203491] [ 25.203688] The buggy address belongs to the object at ffff888104b06e60 [ 25.203688] which belongs to the cache kmalloc-16 of size 16 [ 25.205043] The buggy address is located 8 bytes inside of [ 25.205043] allocated 9-byte region [ffff888104b06e60, ffff888104b06e69) [ 25.206038] [ 25.206118] The buggy address belongs to the physical page: [ 25.206579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06 [ 25.207328] flags: 0x200000000000000(node=0|zone=2) [ 25.207788] page_type: f5(slab) [ 25.207987] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.208281] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.209040] page dumped because: kasan: bad access detected [ 25.209586] [ 25.209742] Memory state around the buggy address: [ 25.210205] ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.210434] ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 25.210662] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.210869] ^ [ 25.211062] ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.211582] ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.212228] ================================================================== [ 25.291637] ================================================================== [ 25.291975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.292355] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310 [ 25.292663] [ 25.292761] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 25.292808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.292821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.292842] Call Trace: [ 25.292856] <TASK> [ 25.292872] dump_stack_lvl+0x73/0xb0 [ 25.292898] print_report+0xd1/0x650 [ 25.292920] ? __virt_addr_valid+0x1db/0x2d0 [ 25.292943] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.292968] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.292992] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.293018] kasan_report+0x141/0x180 [ 25.293040] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.293069] kasan_check_range+0x10c/0x1c0 [ 25.293093] __kasan_check_write+0x18/0x20 [ 25.293116] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.293141] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.293167] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.293189] ? trace_hardirqs_on+0x37/0xe0 [ 25.293212] ? kasan_bitops_generic+0x92/0x1c0 [ 25.293238] kasan_bitops_generic+0x116/0x1c0 [ 25.293261] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.293286] ? __pfx_read_tsc+0x10/0x10 [ 25.293306] ? ktime_get_ts64+0x86/0x230 [ 25.293330] kunit_try_run_case+0x1a5/0x480 [ 25.293354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.293378] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.293399] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.293424] ? __kthread_parkme+0x82/0x180 [ 25.293445] ? preempt_count_sub+0x50/0x80 [ 25.293479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.293503] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.293527] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.293551] kthread+0x337/0x6f0 [ 25.293570] ? trace_preempt_on+0x20/0xc0 [ 25.293592] ? __pfx_kthread+0x10/0x10 [ 25.293613] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.293636] ? calculate_sigpending+0x7b/0xa0 [ 25.293660] ? __pfx_kthread+0x10/0x10 [ 25.293682] ret_from_fork+0x116/0x1d0 [ 25.293701] ? __pfx_kthread+0x10/0x10 [ 25.293722] ret_from_fork_asm+0x1a/0x30 [ 25.293753] </TASK> [ 25.293764] [ 25.302260] Allocated by task 310: [ 25.302438] kasan_save_stack+0x45/0x70 [ 25.302709] kasan_save_track+0x18/0x40 [ 25.302904] kasan_save_alloc_info+0x3b/0x50 [ 25.303117] __kasan_kmalloc+0xb7/0xc0 [ 25.303402] __kmalloc_cache_noprof+0x189/0x420 [ 25.303637] kasan_bitops_generic+0x92/0x1c0 [ 25.303810] kunit_try_run_case+0x1a5/0x480 [ 25.303986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.304157] kthread+0x337/0x6f0 [ 25.304271] ret_from_fork+0x116/0x1d0 [ 25.304398] ret_from_fork_asm+0x1a/0x30 [ 25.304541] [ 25.304606] The buggy address belongs to the object at ffff888104b06e60 [ 25.304606] which belongs to the cache kmalloc-16 of size 16 [ 25.305427] The buggy address is located 8 bytes inside of [ 25.305427] allocated 9-byte region [ffff888104b06e60, ffff888104b06e69) [ 25.305966] [ 25.306052] The buggy address belongs to the physical page: [ 25.306310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06 [ 25.306598] flags: 0x200000000000000(node=0|zone=2) [ 25.306755] page_type: f5(slab) [ 25.306869] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.307094] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.307662] page dumped because: kasan: bad access detected [ 25.307918] [ 25.308006] Memory state around the buggy address: [ 25.308352] ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.308692] ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 25.308971] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.309176] ^ [ 25.309368] ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.309588] ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.309793] ================================================================== [ 25.329339] ================================================================== [ 25.329689] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.330067] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310 [ 25.330586] [ 25.330677] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 25.330721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.330733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.330754] Call Trace: [ 25.330771] <TASK> [ 25.330786] dump_stack_lvl+0x73/0xb0 [ 25.330813] print_report+0xd1/0x650 [ 25.330834] ? __virt_addr_valid+0x1db/0x2d0 [ 25.330858] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.330882] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.330907] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.330932] kasan_report+0x141/0x180 [ 25.330954] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.330984] kasan_check_range+0x10c/0x1c0 [ 25.331007] __kasan_check_write+0x18/0x20 [ 25.331030] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.331056] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.331084] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.331108] ? trace_hardirqs_on+0x37/0xe0 [ 25.331141] ? kasan_bitops_generic+0x92/0x1c0 [ 25.331169] kasan_bitops_generic+0x116/0x1c0 [ 25.331192] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.331218] ? __pfx_read_tsc+0x10/0x10 [ 25.331238] ? ktime_get_ts64+0x86/0x230 [ 25.331262] kunit_try_run_case+0x1a5/0x480 [ 25.331286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.331309] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.331331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.331357] ? __kthread_parkme+0x82/0x180 [ 25.331378] ? preempt_count_sub+0x50/0x80 [ 25.331401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.331426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.331449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.331485] kthread+0x337/0x6f0 [ 25.331504] ? trace_preempt_on+0x20/0xc0 [ 25.331526] ? __pfx_kthread+0x10/0x10 [ 25.331547] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.331571] ? calculate_sigpending+0x7b/0xa0 [ 25.331595] ? __pfx_kthread+0x10/0x10 [ 25.331616] ret_from_fork+0x116/0x1d0 [ 25.331636] ? __pfx_kthread+0x10/0x10 [ 25.331657] ret_from_fork_asm+0x1a/0x30 [ 25.331688] </TASK> [ 25.331700] [ 25.346003] Allocated by task 310: [ 25.346239] kasan_save_stack+0x45/0x70 [ 25.346405] kasan_save_track+0x18/0x40 [ 25.346599] kasan_save_alloc_info+0x3b/0x50 [ 25.346741] __kasan_kmalloc+0xb7/0xc0 [ 25.346871] __kmalloc_cache_noprof+0x189/0x420 [ 25.347033] kasan_bitops_generic+0x92/0x1c0 [ 25.347236] kunit_try_run_case+0x1a5/0x480 [ 25.347434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.347664] kthread+0x337/0x6f0 [ 25.347974] ret_from_fork+0x116/0x1d0 [ 25.348129] ret_from_fork_asm+0x1a/0x30 [ 25.348448] [ 25.348532] The buggy address belongs to the object at ffff888104b06e60 [ 25.348532] which belongs to the cache kmalloc-16 of size 16 [ 25.348962] The buggy address is located 8 bytes inside of [ 25.348962] allocated 9-byte region [ffff888104b06e60, ffff888104b06e69) [ 25.349807] [ 25.349899] The buggy address belongs to the physical page: [ 25.350092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06 [ 25.350435] flags: 0x200000000000000(node=0|zone=2) [ 25.350680] page_type: f5(slab) [ 25.350827] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.351134] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.351614] page dumped because: kasan: bad access detected [ 25.351837] [ 25.351918] Memory state around the buggy address: [ 25.352090] ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.352491] ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 25.352780] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.353011] ^ [ 25.353298] ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.353620] ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.353923] ================================================================== [ 25.310385] ================================================================== [ 25.310731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.311100] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310 [ 25.311833] [ 25.311937] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 25.311981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.311994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.312015] Call Trace: [ 25.312027] <TASK> [ 25.312041] dump_stack_lvl+0x73/0xb0 [ 25.312067] print_report+0xd1/0x650 [ 25.312088] ? __virt_addr_valid+0x1db/0x2d0 [ 25.312111] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.312136] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.312163] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.312188] kasan_report+0x141/0x180 [ 25.312378] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.312409] kasan_check_range+0x10c/0x1c0 [ 25.312433] __kasan_check_write+0x18/0x20 [ 25.312471] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.312497] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.312523] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.312546] ? trace_hardirqs_on+0x37/0xe0 [ 25.312567] ? kasan_bitops_generic+0x92/0x1c0 [ 25.312594] kasan_bitops_generic+0x116/0x1c0 [ 25.312616] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.312641] ? __pfx_read_tsc+0x10/0x10 [ 25.312662] ? ktime_get_ts64+0x86/0x230 [ 25.312685] kunit_try_run_case+0x1a5/0x480 [ 25.312710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.312733] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.312754] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.312781] ? __kthread_parkme+0x82/0x180 [ 25.312802] ? preempt_count_sub+0x50/0x80 [ 25.312824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.312849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.312874] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.312898] kthread+0x337/0x6f0 [ 25.312918] ? trace_preempt_on+0x20/0xc0 [ 25.312941] ? __pfx_kthread+0x10/0x10 [ 25.312961] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.312985] ? calculate_sigpending+0x7b/0xa0 [ 25.313008] ? __pfx_kthread+0x10/0x10 [ 25.313031] ret_from_fork+0x116/0x1d0 [ 25.313050] ? __pfx_kthread+0x10/0x10 [ 25.313071] ret_from_fork_asm+0x1a/0x30 [ 25.313102] </TASK> [ 25.313113] [ 25.321064] Allocated by task 310: [ 25.321188] kasan_save_stack+0x45/0x70 [ 25.321390] kasan_save_track+0x18/0x40 [ 25.321814] kasan_save_alloc_info+0x3b/0x50 [ 25.322024] __kasan_kmalloc+0xb7/0xc0 [ 25.322342] __kmalloc_cache_noprof+0x189/0x420 [ 25.322585] kasan_bitops_generic+0x92/0x1c0 [ 25.322782] kunit_try_run_case+0x1a5/0x480 [ 25.322922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.323090] kthread+0x337/0x6f0 [ 25.323413] ret_from_fork+0x116/0x1d0 [ 25.323631] ret_from_fork_asm+0x1a/0x30 [ 25.323829] [ 25.323984] The buggy address belongs to the object at ffff888104b06e60 [ 25.323984] which belongs to the cache kmalloc-16 of size 16 [ 25.324547] The buggy address is located 8 bytes inside of [ 25.324547] allocated 9-byte region [ffff888104b06e60, ffff888104b06e69) [ 25.324993] [ 25.325060] The buggy address belongs to the physical page: [ 25.325224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06 [ 25.325466] flags: 0x200000000000000(node=0|zone=2) [ 25.325622] page_type: f5(slab) [ 25.325734] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.326061] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.326386] page dumped because: kasan: bad access detected [ 25.326638] [ 25.326963] Memory state around the buggy address: [ 25.327269] ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.327598] ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 25.327909] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.328204] ^ [ 25.328396] ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.328616] ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.328821] ================================================================== [ 25.234762] ================================================================== [ 25.235059] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.235441] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310 [ 25.235682] [ 25.235760] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 25.235805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.235817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.235839] Call Trace: [ 25.235855] <TASK> [ 25.235871] dump_stack_lvl+0x73/0xb0 [ 25.235897] print_report+0xd1/0x650 [ 25.235919] ? __virt_addr_valid+0x1db/0x2d0 [ 25.235942] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.235967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.235993] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.236018] kasan_report+0x141/0x180 [ 25.236040] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.236069] kasan_check_range+0x10c/0x1c0 [ 25.236093] __kasan_check_write+0x18/0x20 [ 25.236116] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.236141] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.236166] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.236189] ? trace_hardirqs_on+0x37/0xe0 [ 25.236209] ? kasan_bitops_generic+0x92/0x1c0 [ 25.236235] kasan_bitops_generic+0x116/0x1c0 [ 25.236259] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.236283] ? __pfx_read_tsc+0x10/0x10 [ 25.236305] ? ktime_get_ts64+0x86/0x230 [ 25.236329] kunit_try_run_case+0x1a5/0x480 [ 25.236353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.236376] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.236399] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.236424] ? __kthread_parkme+0x82/0x180 [ 25.236444] ? preempt_count_sub+0x50/0x80 [ 25.236481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.236506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.236529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.236554] kthread+0x337/0x6f0 [ 25.236574] ? trace_preempt_on+0x20/0xc0 [ 25.236596] ? __pfx_kthread+0x10/0x10 [ 25.236616] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.236639] ? calculate_sigpending+0x7b/0xa0 [ 25.236664] ? __pfx_kthread+0x10/0x10 [ 25.236685] ret_from_fork+0x116/0x1d0 [ 25.236705] ? __pfx_kthread+0x10/0x10 [ 25.236726] ret_from_fork_asm+0x1a/0x30 [ 25.236757] </TASK> [ 25.236768] [ 25.245779] Allocated by task 310: [ 25.245951] kasan_save_stack+0x45/0x70 [ 25.246147] kasan_save_track+0x18/0x40 [ 25.246398] kasan_save_alloc_info+0x3b/0x50 [ 25.246600] __kasan_kmalloc+0xb7/0xc0 [ 25.246762] __kmalloc_cache_noprof+0x189/0x420 [ 25.246938] kasan_bitops_generic+0x92/0x1c0 [ 25.247147] kunit_try_run_case+0x1a5/0x480 [ 25.247403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.247602] kthread+0x337/0x6f0 [ 25.247725] ret_from_fork+0x116/0x1d0 [ 25.247853] ret_from_fork_asm+0x1a/0x30 [ 25.247995] [ 25.248085] The buggy address belongs to the object at ffff888104b06e60 [ 25.248085] which belongs to the cache kmalloc-16 of size 16 [ 25.248604] The buggy address is located 8 bytes inside of [ 25.248604] allocated 9-byte region [ffff888104b06e60, ffff888104b06e69) [ 25.249368] [ 25.249490] The buggy address belongs to the physical page: [ 25.249739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06 [ 25.250084] flags: 0x200000000000000(node=0|zone=2) [ 25.250425] page_type: f5(slab) [ 25.250559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.250789] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.251010] page dumped because: kasan: bad access detected [ 25.251177] [ 25.251266] Memory state around the buggy address: [ 25.251494] ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.251841] ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 25.252151] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.252448] ^ [ 25.252648] ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.252858] ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.253061] ================================================================== [ 25.213488] ================================================================== [ 25.214102] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.215051] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310 [ 25.215893] [ 25.216068] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 25.216116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.216129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.216150] Call Trace: [ 25.216181] <TASK> [ 25.216197] dump_stack_lvl+0x73/0xb0 [ 25.216225] print_report+0xd1/0x650 [ 25.216248] ? __virt_addr_valid+0x1db/0x2d0 [ 25.216271] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.216296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.216322] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.216347] kasan_report+0x141/0x180 [ 25.216368] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.216398] kasan_check_range+0x10c/0x1c0 [ 25.216421] __kasan_check_write+0x18/0x20 [ 25.216443] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.216483] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.216509] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.216532] ? trace_hardirqs_on+0x37/0xe0 [ 25.216553] ? kasan_bitops_generic+0x92/0x1c0 [ 25.216580] kasan_bitops_generic+0x116/0x1c0 [ 25.216603] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.216627] ? __pfx_read_tsc+0x10/0x10 [ 25.216648] ? ktime_get_ts64+0x86/0x230 [ 25.216672] kunit_try_run_case+0x1a5/0x480 [ 25.216696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.216719] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.216740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.216766] ? __kthread_parkme+0x82/0x180 [ 25.216787] ? preempt_count_sub+0x50/0x80 [ 25.216810] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.216834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.216858] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.216882] kthread+0x337/0x6f0 [ 25.216901] ? trace_preempt_on+0x20/0xc0 [ 25.216923] ? __pfx_kthread+0x10/0x10 [ 25.216944] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.216967] ? calculate_sigpending+0x7b/0xa0 [ 25.216991] ? __pfx_kthread+0x10/0x10 [ 25.217013] ret_from_fork+0x116/0x1d0 [ 25.217033] ? __pfx_kthread+0x10/0x10 [ 25.217054] ret_from_fork_asm+0x1a/0x30 [ 25.217085] </TASK> [ 25.217096] [ 25.225812] Allocated by task 310: [ 25.225974] kasan_save_stack+0x45/0x70 [ 25.226172] kasan_save_track+0x18/0x40 [ 25.226362] kasan_save_alloc_info+0x3b/0x50 [ 25.226652] __kasan_kmalloc+0xb7/0xc0 [ 25.226853] __kmalloc_cache_noprof+0x189/0x420 [ 25.227072] kasan_bitops_generic+0x92/0x1c0 [ 25.227281] kunit_try_run_case+0x1a5/0x480 [ 25.227563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.227846] kthread+0x337/0x6f0 [ 25.227980] ret_from_fork+0x116/0x1d0 [ 25.228282] ret_from_fork_asm+0x1a/0x30 [ 25.228517] [ 25.228586] The buggy address belongs to the object at ffff888104b06e60 [ 25.228586] which belongs to the cache kmalloc-16 of size 16 [ 25.229070] The buggy address is located 8 bytes inside of [ 25.229070] allocated 9-byte region [ffff888104b06e60, ffff888104b06e69) [ 25.229631] [ 25.229724] The buggy address belongs to the physical page: [ 25.229940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06 [ 25.230262] flags: 0x200000000000000(node=0|zone=2) [ 25.230607] page_type: f5(slab) [ 25.230768] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.231048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.231268] page dumped because: kasan: bad access detected [ 25.231433] [ 25.231508] Memory state around the buggy address: [ 25.231656] ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.232030] ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 25.232719] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.233040] ^ [ 25.233563] ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.233899] ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.234340] ================================================================== [ 25.253429] ================================================================== [ 25.253775] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.254312] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310 [ 25.254668] [ 25.254773] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 25.254818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.254830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.254852] Call Trace: [ 25.254868] <TASK> [ 25.254883] dump_stack_lvl+0x73/0xb0 [ 25.254912] print_report+0xd1/0x650 [ 25.254933] ? __virt_addr_valid+0x1db/0x2d0 [ 25.254957] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.254982] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.255008] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.255034] kasan_report+0x141/0x180 [ 25.255055] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.255085] kasan_check_range+0x10c/0x1c0 [ 25.255108] __kasan_check_write+0x18/0x20 [ 25.255132] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.255221] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.255249] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.255273] ? trace_hardirqs_on+0x37/0xe0 [ 25.255295] ? kasan_bitops_generic+0x92/0x1c0 [ 25.255322] kasan_bitops_generic+0x116/0x1c0 [ 25.255345] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.255369] ? __pfx_read_tsc+0x10/0x10 [ 25.255391] ? ktime_get_ts64+0x86/0x230 [ 25.255416] kunit_try_run_case+0x1a5/0x480 [ 25.255440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.255476] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.255500] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.255526] ? __kthread_parkme+0x82/0x180 [ 25.255546] ? preempt_count_sub+0x50/0x80 [ 25.255570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.255594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.255618] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.255643] kthread+0x337/0x6f0 [ 25.255662] ? trace_preempt_on+0x20/0xc0 [ 25.255684] ? __pfx_kthread+0x10/0x10 [ 25.255705] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.255728] ? calculate_sigpending+0x7b/0xa0 [ 25.255753] ? __pfx_kthread+0x10/0x10 [ 25.255776] ret_from_fork+0x116/0x1d0 [ 25.255795] ? __pfx_kthread+0x10/0x10 [ 25.255817] ret_from_fork_asm+0x1a/0x30 [ 25.255847] </TASK> [ 25.255858] [ 25.264123] Allocated by task 310: [ 25.264348] kasan_save_stack+0x45/0x70 [ 25.264553] kasan_save_track+0x18/0x40 [ 25.264704] kasan_save_alloc_info+0x3b/0x50 [ 25.264848] __kasan_kmalloc+0xb7/0xc0 [ 25.264984] __kmalloc_cache_noprof+0x189/0x420 [ 25.265414] kasan_bitops_generic+0x92/0x1c0 [ 25.265665] kunit_try_run_case+0x1a5/0x480 [ 25.265878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.266093] kthread+0x337/0x6f0 [ 25.266347] ret_from_fork+0x116/0x1d0 [ 25.266495] ret_from_fork_asm+0x1a/0x30 [ 25.266677] [ 25.266766] The buggy address belongs to the object at ffff888104b06e60 [ 25.266766] which belongs to the cache kmalloc-16 of size 16 [ 25.267308] The buggy address is located 8 bytes inside of [ 25.267308] allocated 9-byte region [ffff888104b06e60, ffff888104b06e69) [ 25.267806] [ 25.267899] The buggy address belongs to the physical page: [ 25.268109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06 [ 25.268489] flags: 0x200000000000000(node=0|zone=2) [ 25.268713] page_type: f5(slab) [ 25.268850] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.269113] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.269333] page dumped because: kasan: bad access detected [ 25.269507] [ 25.269570] Memory state around the buggy address: [ 25.269717] ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.270036] ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 25.270547] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.270854] ^ [ 25.271129] ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.271338] ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.271555] ================================================================== [ 25.271894] ================================================================== [ 25.272115] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.272837] Write of size 8 at addr ffff888104b06e68 by task kunit_try_catch/310 [ 25.273177] [ 25.273281] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 25.273392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.273407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.273428] Call Trace: [ 25.273441] <TASK> [ 25.273466] dump_stack_lvl+0x73/0xb0 [ 25.273494] print_report+0xd1/0x650 [ 25.273516] ? __virt_addr_valid+0x1db/0x2d0 [ 25.273538] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.273563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.273588] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.273613] kasan_report+0x141/0x180 [ 25.273635] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.273664] kasan_check_range+0x10c/0x1c0 [ 25.273688] __kasan_check_write+0x18/0x20 [ 25.273711] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.273736] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.273763] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.273786] ? trace_hardirqs_on+0x37/0xe0 [ 25.273807] ? kasan_bitops_generic+0x92/0x1c0 [ 25.273834] kasan_bitops_generic+0x116/0x1c0 [ 25.273864] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.273889] ? __pfx_read_tsc+0x10/0x10 [ 25.273910] ? ktime_get_ts64+0x86/0x230 [ 25.273934] kunit_try_run_case+0x1a5/0x480 [ 25.273958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.273984] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.274005] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.274032] ? __kthread_parkme+0x82/0x180 [ 25.274053] ? preempt_count_sub+0x50/0x80 [ 25.274075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.274100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.274124] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.274148] kthread+0x337/0x6f0 [ 25.274168] ? trace_preempt_on+0x20/0xc0 [ 25.274190] ? __pfx_kthread+0x10/0x10 [ 25.274211] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.274235] ? calculate_sigpending+0x7b/0xa0 [ 25.274315] ? __pfx_kthread+0x10/0x10 [ 25.274339] ret_from_fork+0x116/0x1d0 [ 25.274358] ? __pfx_kthread+0x10/0x10 [ 25.274380] ret_from_fork_asm+0x1a/0x30 [ 25.274410] </TASK> [ 25.274422] [ 25.282778] Allocated by task 310: [ 25.282903] kasan_save_stack+0x45/0x70 [ 25.283044] kasan_save_track+0x18/0x40 [ 25.283274] kasan_save_alloc_info+0x3b/0x50 [ 25.283670] __kasan_kmalloc+0xb7/0xc0 [ 25.283854] __kmalloc_cache_noprof+0x189/0x420 [ 25.284067] kasan_bitops_generic+0x92/0x1c0 [ 25.284302] kunit_try_run_case+0x1a5/0x480 [ 25.284509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.284862] kthread+0x337/0x6f0 [ 25.285178] ret_from_fork+0x116/0x1d0 [ 25.285541] ret_from_fork_asm+0x1a/0x30 [ 25.285678] [ 25.285743] The buggy address belongs to the object at ffff888104b06e60 [ 25.285743] which belongs to the cache kmalloc-16 of size 16 [ 25.286258] The buggy address is located 8 bytes inside of [ 25.286258] allocated 9-byte region [ffff888104b06e60, ffff888104b06e69) [ 25.286799] [ 25.286891] The buggy address belongs to the physical page: [ 25.287137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b06 [ 25.287532] flags: 0x200000000000000(node=0|zone=2) [ 25.287716] page_type: f5(slab) [ 25.287833] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.288208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.288506] page dumped because: kasan: bad access detected [ 25.288673] [ 25.288736] Memory state around the buggy address: [ 25.288885] ffff888104b06d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.289097] ffff888104b06d80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 25.289468] >ffff888104b06e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.289985] ^ [ 25.290269] ffff888104b06e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.290767] ffff888104b06f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.291001] ==================================================================