Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 59.616494] ================================================================== [ 59.623530] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 59.631688] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 59.638979] [ 59.640461] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 59.640508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.640524] Hardware name: WinLink E850-96 board (DT) [ 59.640544] Call trace: [ 59.640556] show_stack+0x20/0x38 (C) [ 59.640591] dump_stack_lvl+0x8c/0xd0 [ 59.640623] print_report+0x118/0x5d0 [ 59.640652] kasan_report+0xdc/0x128 [ 59.640681] __asan_report_load8_noabort+0x20/0x30 [ 59.640713] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 59.640750] kasan_bitops_generic+0x110/0x1c8 [ 59.640786] kunit_try_run_case+0x170/0x3f0 [ 59.640820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.640853] kthread+0x328/0x630 [ 59.640881] ret_from_fork+0x10/0x20 [ 59.640911] [ 59.709985] Allocated by task 345: [ 59.713372] kasan_save_stack+0x3c/0x68 [ 59.717190] kasan_save_track+0x20/0x40 [ 59.721010] kasan_save_alloc_info+0x40/0x58 [ 59.725263] __kasan_kmalloc+0xd4/0xd8 [ 59.728996] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.733509] kasan_bitops_generic+0xa0/0x1c8 [ 59.737763] kunit_try_run_case+0x170/0x3f0 [ 59.741929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.747398] kthread+0x328/0x630 [ 59.750610] ret_from_fork+0x10/0x20 [ 59.754169] [ 59.755644] The buggy address belongs to the object at ffff000806e5df40 [ 59.755644] which belongs to the cache kmalloc-16 of size 16 [ 59.767971] The buggy address is located 8 bytes inside of [ 59.767971] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 59.780210] [ 59.781686] The buggy address belongs to the physical page: [ 59.787244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 59.795227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.801737] page_type: f5(slab) [ 59.804870] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.812595] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.820314] page dumped because: kasan: bad access detected [ 59.825869] [ 59.827345] Memory state around the buggy address: [ 59.832123] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.839327] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.846532] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 59.853733] ^ [ 59.859292] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.866497] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.873698] ================================================================== [ 59.348420] ================================================================== [ 59.355480] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 59.363637] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 59.371015] [ 59.372495] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 59.372543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.372561] Hardware name: WinLink E850-96 board (DT) [ 59.372580] Call trace: [ 59.372593] show_stack+0x20/0x38 (C) [ 59.372630] dump_stack_lvl+0x8c/0xd0 [ 59.372662] print_report+0x118/0x5d0 [ 59.372691] kasan_report+0xdc/0x128 [ 59.372720] kasan_check_range+0x100/0x1a8 [ 59.372749] __kasan_check_write+0x20/0x30 [ 59.372779] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 59.372817] kasan_bitops_generic+0x110/0x1c8 [ 59.372852] kunit_try_run_case+0x170/0x3f0 [ 59.372885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.372917] kthread+0x328/0x630 [ 59.372945] ret_from_fork+0x10/0x20 [ 59.372977] [ 59.445406] Allocated by task 345: [ 59.448793] kasan_save_stack+0x3c/0x68 [ 59.452611] kasan_save_track+0x20/0x40 [ 59.456430] kasan_save_alloc_info+0x40/0x58 [ 59.460684] __kasan_kmalloc+0xd4/0xd8 [ 59.464416] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.468930] kasan_bitops_generic+0xa0/0x1c8 [ 59.473183] kunit_try_run_case+0x170/0x3f0 [ 59.477350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.482819] kthread+0x328/0x630 [ 59.486031] ret_from_fork+0x10/0x20 [ 59.489590] [ 59.491065] The buggy address belongs to the object at ffff000806e5df40 [ 59.491065] which belongs to the cache kmalloc-16 of size 16 [ 59.503392] The buggy address is located 8 bytes inside of [ 59.503392] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 59.515631] [ 59.517106] The buggy address belongs to the physical page: [ 59.522663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 59.530650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.537158] page_type: f5(slab) [ 59.540291] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.548015] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.555735] page dumped because: kasan: bad access detected [ 59.561290] [ 59.562765] Memory state around the buggy address: [ 59.567543] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.574748] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.581953] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 59.589154] ^ [ 59.594713] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.601918] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.609119] ================================================================== [ 58.547673] ================================================================== [ 58.554796] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 58.562954] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 58.570333] [ 58.571815] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 58.571861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.571877] Hardware name: WinLink E850-96 board (DT) [ 58.571896] Call trace: [ 58.571912] show_stack+0x20/0x38 (C) [ 58.571945] dump_stack_lvl+0x8c/0xd0 [ 58.571979] print_report+0x118/0x5d0 [ 58.572007] kasan_report+0xdc/0x128 [ 58.572036] kasan_check_range+0x100/0x1a8 [ 58.572067] __kasan_check_write+0x20/0x30 [ 58.572097] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 58.572133] kasan_bitops_generic+0x110/0x1c8 [ 58.572168] kunit_try_run_case+0x170/0x3f0 [ 58.572202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.572234] kthread+0x328/0x630 [ 58.572264] ret_from_fork+0x10/0x20 [ 58.572295] [ 58.644724] Allocated by task 345: [ 58.648111] kasan_save_stack+0x3c/0x68 [ 58.651928] kasan_save_track+0x20/0x40 [ 58.655748] kasan_save_alloc_info+0x40/0x58 [ 58.660001] __kasan_kmalloc+0xd4/0xd8 [ 58.663734] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.668248] kasan_bitops_generic+0xa0/0x1c8 [ 58.672501] kunit_try_run_case+0x170/0x3f0 [ 58.676667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.682136] kthread+0x328/0x630 [ 58.685348] ret_from_fork+0x10/0x20 [ 58.688907] [ 58.690383] The buggy address belongs to the object at ffff000806e5df40 [ 58.690383] which belongs to the cache kmalloc-16 of size 16 [ 58.702709] The buggy address is located 8 bytes inside of [ 58.702709] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 58.714948] [ 58.716424] The buggy address belongs to the physical page: [ 58.721980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 58.729969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.736476] page_type: f5(slab) [ 58.739609] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 58.747333] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.755052] page dumped because: kasan: bad access detected [ 58.760607] [ 58.762083] Memory state around the buggy address: [ 58.766861] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.774066] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.781270] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 58.788472] ^ [ 58.794030] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.801236] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.808437] ================================================================== [ 58.815737] ================================================================== [ 58.822848] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 58.831006] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 58.838297] [ 58.839778] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 58.839829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.839846] Hardware name: WinLink E850-96 board (DT) [ 58.839867] Call trace: [ 58.839880] show_stack+0x20/0x38 (C) [ 58.839915] dump_stack_lvl+0x8c/0xd0 [ 58.839947] print_report+0x118/0x5d0 [ 58.839973] kasan_report+0xdc/0x128 [ 58.840000] __asan_report_load8_noabort+0x20/0x30 [ 58.840035] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 58.840074] kasan_bitops_generic+0x110/0x1c8 [ 58.840109] kunit_try_run_case+0x170/0x3f0 [ 58.840141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.840175] kthread+0x328/0x630 [ 58.840204] ret_from_fork+0x10/0x20 [ 58.840238] [ 58.909303] Allocated by task 345: [ 58.912690] kasan_save_stack+0x3c/0x68 [ 58.916508] kasan_save_track+0x20/0x40 [ 58.920327] kasan_save_alloc_info+0x40/0x58 [ 58.924581] __kasan_kmalloc+0xd4/0xd8 [ 58.928313] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.932827] kasan_bitops_generic+0xa0/0x1c8 [ 58.937080] kunit_try_run_case+0x170/0x3f0 [ 58.941247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.946716] kthread+0x328/0x630 [ 58.949927] ret_from_fork+0x10/0x20 [ 58.953487] [ 58.954962] The buggy address belongs to the object at ffff000806e5df40 [ 58.954962] which belongs to the cache kmalloc-16 of size 16 [ 58.967289] The buggy address is located 8 bytes inside of [ 58.967289] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 58.979528] [ 58.981004] The buggy address belongs to the physical page: [ 58.986560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 58.994548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.001055] page_type: f5(slab) [ 59.004188] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.011912] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.019631] page dumped because: kasan: bad access detected [ 59.025187] [ 59.026662] Memory state around the buggy address: [ 59.031441] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.038645] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.045850] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 59.053051] ^ [ 59.058610] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.065815] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.073016] ================================================================== [ 58.279634] ================================================================== [ 58.286746] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 58.294903] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 58.302281] [ 58.303763] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 58.303816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.303833] Hardware name: WinLink E850-96 board (DT) [ 58.303853] Call trace: [ 58.303865] show_stack+0x20/0x38 (C) [ 58.303900] dump_stack_lvl+0x8c/0xd0 [ 58.303933] print_report+0x118/0x5d0 [ 58.303961] kasan_report+0xdc/0x128 [ 58.303990] kasan_check_range+0x100/0x1a8 [ 58.304020] __kasan_check_write+0x20/0x30 [ 58.304051] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 58.304089] kasan_bitops_generic+0x110/0x1c8 [ 58.304122] kunit_try_run_case+0x170/0x3f0 [ 58.304157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.304191] kthread+0x328/0x630 [ 58.304220] ret_from_fork+0x10/0x20 [ 58.304251] [ 58.376673] Allocated by task 345: [ 58.380059] kasan_save_stack+0x3c/0x68 [ 58.383877] kasan_save_track+0x20/0x40 [ 58.387697] kasan_save_alloc_info+0x40/0x58 [ 58.391950] __kasan_kmalloc+0xd4/0xd8 [ 58.395682] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.400196] kasan_bitops_generic+0xa0/0x1c8 [ 58.404449] kunit_try_run_case+0x170/0x3f0 [ 58.408616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.414085] kthread+0x328/0x630 [ 58.417297] ret_from_fork+0x10/0x20 [ 58.420856] [ 58.422331] The buggy address belongs to the object at ffff000806e5df40 [ 58.422331] which belongs to the cache kmalloc-16 of size 16 [ 58.434658] The buggy address is located 8 bytes inside of [ 58.434658] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 58.446897] [ 58.448373] The buggy address belongs to the physical page: [ 58.453928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 58.461916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.468424] page_type: f5(slab) [ 58.471559] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 58.479282] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.487000] page dumped because: kasan: bad access detected [ 58.492556] [ 58.494031] Memory state around the buggy address: [ 58.498810] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.506014] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.513219] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 58.520420] ^ [ 58.525979] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.533184] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.540385] ================================================================== [ 59.080421] ================================================================== [ 59.087427] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 59.095585] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 59.102963] [ 59.104445] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 59.104493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.104509] Hardware name: WinLink E850-96 board (DT) [ 59.104529] Call trace: [ 59.104543] show_stack+0x20/0x38 (C) [ 59.104577] dump_stack_lvl+0x8c/0xd0 [ 59.104612] print_report+0x118/0x5d0 [ 59.104641] kasan_report+0xdc/0x128 [ 59.104669] kasan_check_range+0x100/0x1a8 [ 59.104698] __kasan_check_write+0x20/0x30 [ 59.104729] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 59.104766] kasan_bitops_generic+0x110/0x1c8 [ 59.104800] kunit_try_run_case+0x170/0x3f0 [ 59.104833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.104866] kthread+0x328/0x630 [ 59.104895] ret_from_fork+0x10/0x20 [ 59.104928] [ 59.177355] Allocated by task 345: [ 59.180742] kasan_save_stack+0x3c/0x68 [ 59.184560] kasan_save_track+0x20/0x40 [ 59.188379] kasan_save_alloc_info+0x40/0x58 [ 59.192632] __kasan_kmalloc+0xd4/0xd8 [ 59.196365] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.200879] kasan_bitops_generic+0xa0/0x1c8 [ 59.205132] kunit_try_run_case+0x170/0x3f0 [ 59.209298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.214767] kthread+0x328/0x630 [ 59.217979] ret_from_fork+0x10/0x20 [ 59.221538] [ 59.223014] The buggy address belongs to the object at ffff000806e5df40 [ 59.223014] which belongs to the cache kmalloc-16 of size 16 [ 59.235340] The buggy address is located 8 bytes inside of [ 59.235340] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 59.247579] [ 59.249056] The buggy address belongs to the physical page: [ 59.254611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 59.262598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.269107] page_type: f5(slab) [ 59.272240] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.279964] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.287683] page dumped because: kasan: bad access detected [ 59.293238] [ 59.294714] Memory state around the buggy address: [ 59.299492] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.306696] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.313901] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 59.321103] ^ [ 59.326662] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.333866] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.341067] ================================================================== [ 57.482511] ================================================================== [ 57.489537] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 57.497692] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 57.504984] [ 57.506470] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 57.506531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.506550] Hardware name: WinLink E850-96 board (DT) [ 57.506571] Call trace: [ 57.506584] show_stack+0x20/0x38 (C) [ 57.506619] dump_stack_lvl+0x8c/0xd0 [ 57.506654] print_report+0x118/0x5d0 [ 57.506681] kasan_report+0xdc/0x128 [ 57.506708] __asan_report_load8_noabort+0x20/0x30 [ 57.506745] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 57.506783] kasan_bitops_generic+0x110/0x1c8 [ 57.506818] kunit_try_run_case+0x170/0x3f0 [ 57.506855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.506889] kthread+0x328/0x630 [ 57.506920] ret_from_fork+0x10/0x20 [ 57.506954] [ 57.575991] Allocated by task 345: [ 57.579377] kasan_save_stack+0x3c/0x68 [ 57.583194] kasan_save_track+0x20/0x40 [ 57.587014] kasan_save_alloc_info+0x40/0x58 [ 57.591267] __kasan_kmalloc+0xd4/0xd8 [ 57.595000] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.599514] kasan_bitops_generic+0xa0/0x1c8 [ 57.603767] kunit_try_run_case+0x170/0x3f0 [ 57.607934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.613402] kthread+0x328/0x630 [ 57.616614] ret_from_fork+0x10/0x20 [ 57.620173] [ 57.621650] The buggy address belongs to the object at ffff000806e5df40 [ 57.621650] which belongs to the cache kmalloc-16 of size 16 [ 57.633975] The buggy address is located 8 bytes inside of [ 57.633975] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 57.646214] [ 57.647693] The buggy address belongs to the physical page: [ 57.653248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 57.661235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.667742] page_type: f5(slab) [ 57.670878] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 57.678599] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 57.686318] page dumped because: kasan: bad access detected [ 57.691873] [ 57.693349] Memory state around the buggy address: [ 57.698127] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.705332] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.712538] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 57.719738] ^ [ 57.725297] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.732503] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.739703] ================================================================== [ 57.747013] ================================================================== [ 57.754113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 57.762272] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 57.769650] [ 57.771134] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 57.771190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.771210] Hardware name: WinLink E850-96 board (DT) [ 57.771227] Call trace: [ 57.771241] show_stack+0x20/0x38 (C) [ 57.771275] dump_stack_lvl+0x8c/0xd0 [ 57.771310] print_report+0x118/0x5d0 [ 57.771340] kasan_report+0xdc/0x128 [ 57.771367] kasan_check_range+0x100/0x1a8 [ 57.771399] __kasan_check_write+0x20/0x30 [ 57.771431] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 57.771467] kasan_bitops_generic+0x110/0x1c8 [ 57.771502] kunit_try_run_case+0x170/0x3f0 [ 57.771538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.771572] kthread+0x328/0x630 [ 57.771601] ret_from_fork+0x10/0x20 [ 57.771634] [ 57.844041] Allocated by task 345: [ 57.847428] kasan_save_stack+0x3c/0x68 [ 57.851246] kasan_save_track+0x20/0x40 [ 57.855066] kasan_save_alloc_info+0x40/0x58 [ 57.859319] __kasan_kmalloc+0xd4/0xd8 [ 57.863051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.867565] kasan_bitops_generic+0xa0/0x1c8 [ 57.871819] kunit_try_run_case+0x170/0x3f0 [ 57.875985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.881454] kthread+0x328/0x630 [ 57.884666] ret_from_fork+0x10/0x20 [ 57.888225] [ 57.889701] The buggy address belongs to the object at ffff000806e5df40 [ 57.889701] which belongs to the cache kmalloc-16 of size 16 [ 57.902027] The buggy address is located 8 bytes inside of [ 57.902027] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 57.914266] [ 57.915743] The buggy address belongs to the physical page: [ 57.921299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 57.929286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.935793] page_type: f5(slab) [ 57.938928] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 57.946651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 57.954370] page dumped because: kasan: bad access detected [ 57.959925] [ 57.961401] Memory state around the buggy address: [ 57.966179] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.973383] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.980591] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 57.987789] ^ [ 57.993348] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.000553] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.007754] ================================================================== [ 58.015050] ================================================================== [ 58.022165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 58.030323] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 58.037614] [ 58.039098] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 58.039153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.039172] Hardware name: WinLink E850-96 board (DT) [ 58.039191] Call trace: [ 58.039204] show_stack+0x20/0x38 (C) [ 58.039243] dump_stack_lvl+0x8c/0xd0 [ 58.039278] print_report+0x118/0x5d0 [ 58.039307] kasan_report+0xdc/0x128 [ 58.039334] __asan_report_load8_noabort+0x20/0x30 [ 58.039368] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 58.039405] kasan_bitops_generic+0x110/0x1c8 [ 58.039440] kunit_try_run_case+0x170/0x3f0 [ 58.039475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.039509] kthread+0x328/0x630 [ 58.039537] ret_from_fork+0x10/0x20 [ 58.039567] [ 58.108621] Allocated by task 345: [ 58.112007] kasan_save_stack+0x3c/0x68 [ 58.115825] kasan_save_track+0x20/0x40 [ 58.119645] kasan_save_alloc_info+0x40/0x58 [ 58.123898] __kasan_kmalloc+0xd4/0xd8 [ 58.127631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.132145] kasan_bitops_generic+0xa0/0x1c8 [ 58.136398] kunit_try_run_case+0x170/0x3f0 [ 58.140565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.146033] kthread+0x328/0x630 [ 58.149245] ret_from_fork+0x10/0x20 [ 58.152804] [ 58.154280] The buggy address belongs to the object at ffff000806e5df40 [ 58.154280] which belongs to the cache kmalloc-16 of size 16 [ 58.166606] The buggy address is located 8 bytes inside of [ 58.166606] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 58.178845] [ 58.180321] The buggy address belongs to the physical page: [ 58.185879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 58.193865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.200373] page_type: f5(slab) [ 58.203507] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 58.211230] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.218949] page dumped because: kasan: bad access detected [ 58.224504] [ 58.225980] Memory state around the buggy address: [ 58.230758] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.237963] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.245168] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 58.252368] ^ [ 58.257928] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.265132] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.272334] ================================================================== [ 57.211887] ================================================================== [ 57.221485] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 57.229642] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 57.237019] [ 57.238507] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 57.238566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.238586] Hardware name: WinLink E850-96 board (DT) [ 57.238609] Call trace: [ 57.238624] show_stack+0x20/0x38 (C) [ 57.238664] dump_stack_lvl+0x8c/0xd0 [ 57.238698] print_report+0x118/0x5d0 [ 57.238729] kasan_report+0xdc/0x128 [ 57.238757] kasan_check_range+0x100/0x1a8 [ 57.238791] __kasan_check_write+0x20/0x30 [ 57.238822] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 57.238858] kasan_bitops_generic+0x110/0x1c8 [ 57.238894] kunit_try_run_case+0x170/0x3f0 [ 57.238935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.238970] kthread+0x328/0x630 [ 57.239001] ret_from_fork+0x10/0x20 [ 57.239037] [ 57.311412] Allocated by task 345: [ 57.314799] kasan_save_stack+0x3c/0x68 [ 57.318615] kasan_save_track+0x20/0x40 [ 57.322435] kasan_save_alloc_info+0x40/0x58 [ 57.326688] __kasan_kmalloc+0xd4/0xd8 [ 57.330422] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.334935] kasan_bitops_generic+0xa0/0x1c8 [ 57.339188] kunit_try_run_case+0x170/0x3f0 [ 57.343354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.348823] kthread+0x328/0x630 [ 57.352035] ret_from_fork+0x10/0x20 [ 57.355594] [ 57.357072] The buggy address belongs to the object at ffff000806e5df40 [ 57.357072] which belongs to the cache kmalloc-16 of size 16 [ 57.369399] The buggy address is located 8 bytes inside of [ 57.369399] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 57.381635] [ 57.383114] The buggy address belongs to the physical page: [ 57.388671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 57.396655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.403164] page_type: f5(slab) [ 57.406300] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 57.414020] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 57.421740] page dumped because: kasan: bad access detected [ 57.427294] [ 57.428769] Memory state around the buggy address: [ 57.433551] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.440753] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.447959] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 57.455158] ^ [ 57.460718] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.467923] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.475124] ==================================================================
[ 32.023967] ================================================================== [ 32.024032] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 32.024528] Write of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292 [ 32.024604] [ 32.024644] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.025083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.025217] Hardware name: linux,dummy-virt (DT) [ 32.025254] Call trace: [ 32.025297] show_stack+0x20/0x38 (C) [ 32.025729] dump_stack_lvl+0x8c/0xd0 [ 32.025837] print_report+0x118/0x5d0 [ 32.025988] kasan_report+0xdc/0x128 [ 32.026064] kasan_check_range+0x100/0x1a8 [ 32.026207] __kasan_check_write+0x20/0x30 [ 32.026296] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 32.026372] kasan_bitops_generic+0x110/0x1c8 [ 32.026689] kunit_try_run_case+0x170/0x3f0 [ 32.026804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.026923] kthread+0x328/0x630 [ 32.027005] ret_from_fork+0x10/0x20 [ 32.027076] [ 32.027099] Allocated by task 292: [ 32.027142] kasan_save_stack+0x3c/0x68 [ 32.027202] kasan_save_track+0x20/0x40 [ 32.027247] kasan_save_alloc_info+0x40/0x58 [ 32.027288] __kasan_kmalloc+0xd4/0xd8 [ 32.027747] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.027835] kasan_bitops_generic+0xa0/0x1c8 [ 32.028156] kunit_try_run_case+0x170/0x3f0 [ 32.028298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.028395] kthread+0x328/0x630 [ 32.028451] ret_from_fork+0x10/0x20 [ 32.028735] [ 32.028821] The buggy address belongs to the object at fff00000c64c1b40 [ 32.028821] which belongs to the cache kmalloc-16 of size 16 [ 32.028949] The buggy address is located 8 bytes inside of [ 32.028949] allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49) [ 32.029306] [ 32.029359] The buggy address belongs to the physical page: [ 32.029449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 32.029683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.029881] page_type: f5(slab) [ 32.029956] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.030248] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 32.030552] page dumped because: kasan: bad access detected [ 32.030681] [ 32.030749] Memory state around the buggy address: [ 32.030863] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.030959] fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.031122] >fff00000c64c1b00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 32.031179] ^ [ 32.031342] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.031553] fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.031653] ================================================================== [ 32.055799] ================================================================== [ 32.055930] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 32.055984] Write of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292 [ 32.056036] [ 32.056082] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.056167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.056312] Hardware name: linux,dummy-virt (DT) [ 32.056694] Call trace: [ 32.056922] show_stack+0x20/0x38 (C) [ 32.057114] dump_stack_lvl+0x8c/0xd0 [ 32.057239] print_report+0x118/0x5d0 [ 32.057629] kasan_report+0xdc/0x128 [ 32.057763] kasan_check_range+0x100/0x1a8 [ 32.057954] __kasan_check_write+0x20/0x30 [ 32.058115] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 32.058235] kasan_bitops_generic+0x110/0x1c8 [ 32.058490] kunit_try_run_case+0x170/0x3f0 [ 32.058780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.058904] kthread+0x328/0x630 [ 32.059029] ret_from_fork+0x10/0x20 [ 32.059210] [ 32.059233] Allocated by task 292: [ 32.059468] kasan_save_stack+0x3c/0x68 [ 32.059568] kasan_save_track+0x20/0x40 [ 32.059723] kasan_save_alloc_info+0x40/0x58 [ 32.059929] __kasan_kmalloc+0xd4/0xd8 [ 32.060099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.060227] kasan_bitops_generic+0xa0/0x1c8 [ 32.060902] [ 32.062421] page_type: f5(slab) [ 32.062767] page dumped because: kasan: bad access detected [ 32.063668] ^ [ 32.065448] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 32.066380] show_stack+0x20/0x38 (C) [ 32.066643] kasan_check_range+0x100/0x1a8 [ 32.067446] kthread+0x328/0x630 [ 32.068209] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.068428] kthread+0x328/0x630 [ 32.068891] [ 32.069704] The buggy address is located 8 bytes inside of [ 32.069704] allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49) [ 32.070996] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.072808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.073229] Call trace: [ 32.073298] show_stack+0x20/0x38 (C) [ 32.074182] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 32.075489] Allocated by task 292: [ 32.076464] kasan_bitops_generic+0xa0/0x1c8 [ 32.076909] kthread+0x328/0x630 [ 32.077572] The buggy address is located 8 bytes inside of [ 32.077572] allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49) [ 32.078967] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.080088] ================================================================== [ 32.048918] ================================================================== [ 32.048971] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 32.049474] Read of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292 [ 32.049546] [ 32.049823] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.049927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.050024] Hardware name: linux,dummy-virt (DT) [ 32.050116] Call trace: [ 32.050461] show_stack+0x20/0x38 (C) [ 32.050571] dump_stack_lvl+0x8c/0xd0 [ 32.050692] print_report+0x118/0x5d0 [ 32.050744] kasan_report+0xdc/0x128 [ 32.050789] __asan_report_load8_noabort+0x20/0x30 [ 32.050984] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 32.051070] kasan_bitops_generic+0x110/0x1c8 [ 32.051267] kunit_try_run_case+0x170/0x3f0 [ 32.051335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.051389] kthread+0x328/0x630 [ 32.051672] ret_from_fork+0x10/0x20 [ 32.051736] [ 32.051816] Allocated by task 292: [ 32.051872] kasan_save_stack+0x3c/0x68 [ 32.051946] kasan_save_track+0x20/0x40 [ 32.052126] kasan_save_alloc_info+0x40/0x58 [ 32.052367] __kasan_kmalloc+0xd4/0xd8 [ 32.052480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.052832] kasan_bitops_generic+0xa0/0x1c8 [ 32.052948] kunit_try_run_case+0x170/0x3f0 [ 32.053070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.053186] kthread+0x328/0x630 [ 32.053384] ret_from_fork+0x10/0x20 [ 32.053564] [ 32.053668] The buggy address belongs to the object at fff00000c64c1b40 [ 32.053668] which belongs to the cache kmalloc-16 of size 16 [ 32.053750] The buggy address is located 8 bytes inside of [ 32.053750] allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49) [ 32.053815] [ 32.053981] The buggy address belongs to the physical page: [ 32.054028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 32.054193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.054278] page_type: f5(slab) [ 32.054336] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.054391] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 32.054445] page dumped because: kasan: bad access detected [ 32.054488] [ 32.054510] Memory state around the buggy address: [ 32.054544] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.054590] fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.054644] >fff00000c64c1b00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 32.054699] ^ [ 32.054738] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.054781] fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.054835] ================================================================== [ 32.039570] ================================================================== [ 32.039621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 32.039675] Write of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292 [ 32.039808] [ 32.039844] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.039932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.040222] Hardware name: linux,dummy-virt (DT) [ 32.040380] Call trace: [ 32.040454] show_stack+0x20/0x38 (C) [ 32.040569] dump_stack_lvl+0x8c/0xd0 [ 32.040686] print_report+0x118/0x5d0 [ 32.040854] kasan_report+0xdc/0x128 [ 32.040908] kasan_check_range+0x100/0x1a8 [ 32.040954] __kasan_check_write+0x20/0x30 [ 32.041185] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 32.041382] kasan_bitops_generic+0x110/0x1c8 [ 32.041580] kunit_try_run_case+0x170/0x3f0 [ 32.041763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.041879] kthread+0x328/0x630 [ 32.042081] ret_from_fork+0x10/0x20 [ 32.042296] [ 32.042384] Allocated by task 292: [ 32.042417] kasan_save_stack+0x3c/0x68 [ 32.042869] kasan_save_track+0x20/0x40 [ 32.043256] kasan_save_alloc_info+0x40/0x58 [ 32.043343] __kasan_kmalloc+0xd4/0xd8 [ 32.043406] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.043488] kasan_bitops_generic+0xa0/0x1c8 [ 32.043562] kunit_try_run_case+0x170/0x3f0 [ 32.044242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.044305] kthread+0x328/0x630 [ 32.044343] ret_from_fork+0x10/0x20 [ 32.044540] [ 32.044789] The buggy address belongs to the object at fff00000c64c1b40 [ 32.044789] which belongs to the cache kmalloc-16 of size 16 [ 32.044963] The buggy address is located 8 bytes inside of [ 32.044963] allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49) [ 32.045098] [ 32.045188] The buggy address belongs to the physical page: [ 32.045301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 32.045404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.045952] page_type: f5(slab) [ 32.046128] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.046249] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 32.046348] page dumped because: kasan: bad access detected [ 32.046477] [ 32.046667] Memory state around the buggy address: [ 32.046734] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.046849] fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.046922] >fff00000c64c1b00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 32.047252] ^ [ 32.047460] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.047523] fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.047689] ================================================================== [ 32.033722] ================================================================== [ 32.033798] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 32.033857] Read of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292 [ 32.033909] [ 32.033941] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.034025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.034066] Hardware name: linux,dummy-virt (DT) [ 32.034099] Call trace: [ 32.034122] show_stack+0x20/0x38 (C) [ 32.034182] dump_stack_lvl+0x8c/0xd0 [ 32.034232] print_report+0x118/0x5d0 [ 32.034276] kasan_report+0xdc/0x128 [ 32.034320] __asan_report_load8_noabort+0x20/0x30 [ 32.034380] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 32.034436] kasan_bitops_generic+0x110/0x1c8 [ 32.034487] kunit_try_run_case+0x170/0x3f0 [ 32.034537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.034589] kthread+0x328/0x630 [ 32.034632] ret_from_fork+0x10/0x20 [ 32.034689] [ 32.034709] Allocated by task 292: [ 32.034741] kasan_save_stack+0x3c/0x68 [ 32.034782] kasan_save_track+0x20/0x40 [ 32.034821] kasan_save_alloc_info+0x40/0x58 [ 32.034860] __kasan_kmalloc+0xd4/0xd8 [ 32.034900] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.034942] kasan_bitops_generic+0xa0/0x1c8 [ 32.034984] kunit_try_run_case+0x170/0x3f0 [ 32.035025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.035713] kthread+0x328/0x630 [ 32.035775] ret_from_fork+0x10/0x20 [ 32.035825] [ 32.035856] The buggy address belongs to the object at fff00000c64c1b40 [ 32.035856] which belongs to the cache kmalloc-16 of size 16 [ 32.035918] The buggy address is located 8 bytes inside of [ 32.035918] allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49) [ 32.035981] [ 32.036203] The buggy address belongs to the physical page: [ 32.036304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 32.036762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.036981] page_type: f5(slab) [ 32.037174] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.037332] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 32.037432] page dumped because: kasan: bad access detected [ 32.037498] [ 32.037521] Memory state around the buggy address: [ 32.037994] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.038169] fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.038291] >fff00000c64c1b00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 32.038378] ^ [ 32.038484] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.038797] fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.038929] ==================================================================
[ 26.529234] ================================================================== [ 26.529526] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 26.529916] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.530386] [ 26.530778] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.530837] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.530851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.530875] Call Trace: [ 26.530894] <TASK> [ 26.530915] dump_stack_lvl+0x73/0xb0 [ 26.530947] print_report+0xd1/0x610 [ 26.530970] ? __virt_addr_valid+0x1db/0x2d0 [ 26.530993] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 26.531017] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.531043] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 26.531068] kasan_report+0x141/0x180 [ 26.531088] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 26.531117] kasan_check_range+0x10c/0x1c0 [ 26.531140] __kasan_check_write+0x18/0x20 [ 26.531162] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 26.531187] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.531212] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.531236] ? trace_hardirqs_on+0x37/0xe0 [ 26.531258] ? kasan_bitops_generic+0x92/0x1c0 [ 26.531284] kasan_bitops_generic+0x116/0x1c0 [ 26.531307] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.531330] ? __pfx_read_tsc+0x10/0x10 [ 26.531352] ? ktime_get_ts64+0x86/0x230 [ 26.531376] kunit_try_run_case+0x1a5/0x480 [ 26.531399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.531418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.531443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.531465] ? __kthread_parkme+0x82/0x180 [ 26.531551] ? preempt_count_sub+0x50/0x80 [ 26.531575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.531597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.531623] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.531648] kthread+0x337/0x6f0 [ 26.531679] ? trace_preempt_on+0x20/0xc0 [ 26.531701] ? __pfx_kthread+0x10/0x10 [ 26.531722] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.531744] ? calculate_sigpending+0x7b/0xa0 [ 26.531769] ? __pfx_kthread+0x10/0x10 [ 26.531791] ret_from_fork+0x116/0x1d0 [ 26.531810] ? __pfx_kthread+0x10/0x10 [ 26.531831] ret_from_fork_asm+0x1a/0x30 [ 26.531861] </TASK> [ 26.531872] [ 26.540306] Allocated by task 310: [ 26.540502] kasan_save_stack+0x45/0x70 [ 26.540702] kasan_save_track+0x18/0x40 [ 26.541043] kasan_save_alloc_info+0x3b/0x50 [ 26.541228] __kasan_kmalloc+0xb7/0xc0 [ 26.541398] __kmalloc_cache_noprof+0x189/0x420 [ 26.541597] kasan_bitops_generic+0x92/0x1c0 [ 26.541835] kunit_try_run_case+0x1a5/0x480 [ 26.542058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.542297] kthread+0x337/0x6f0 [ 26.542462] ret_from_fork+0x116/0x1d0 [ 26.542629] ret_from_fork_asm+0x1a/0x30 [ 26.542837] [ 26.542927] The buggy address belongs to the object at ffff8881058422c0 [ 26.542927] which belongs to the cache kmalloc-16 of size 16 [ 26.543379] The buggy address is located 8 bytes inside of [ 26.543379] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.544099] [ 26.544208] The buggy address belongs to the physical page: [ 26.544455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.544746] flags: 0x200000000000000(node=0|zone=2) [ 26.545075] page_type: f5(slab) [ 26.545366] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.545600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.545831] page dumped because: kasan: bad access detected [ 26.545996] [ 26.546063] Memory state around the buggy address: [ 26.546384] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.546740] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.547383] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.547646] ^ [ 26.547830] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.548037] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.548464] ================================================================== [ 26.549220] ================================================================== [ 26.549533] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 26.549809] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.550357] [ 26.550477] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.550533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.550547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.550570] Call Trace: [ 26.550590] <TASK> [ 26.550611] dump_stack_lvl+0x73/0xb0 [ 26.550642] print_report+0xd1/0x610 [ 26.550678] ? __virt_addr_valid+0x1db/0x2d0 [ 26.550702] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 26.550726] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.550752] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 26.550776] kasan_report+0x141/0x180 [ 26.550797] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 26.550826] kasan_check_range+0x10c/0x1c0 [ 26.550849] __kasan_check_write+0x18/0x20 [ 26.550871] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 26.550897] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.550921] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.550946] ? trace_hardirqs_on+0x37/0xe0 [ 26.550969] ? kasan_bitops_generic+0x92/0x1c0 [ 26.550995] kasan_bitops_generic+0x116/0x1c0 [ 26.551018] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.551043] ? __pfx_read_tsc+0x10/0x10 [ 26.551064] ? ktime_get_ts64+0x86/0x230 [ 26.551088] kunit_try_run_case+0x1a5/0x480 [ 26.551112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.551132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.551156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.551180] ? __kthread_parkme+0x82/0x180 [ 26.551201] ? preempt_count_sub+0x50/0x80 [ 26.551224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.551246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.551560] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.551592] kthread+0x337/0x6f0 [ 26.551613] ? trace_preempt_on+0x20/0xc0 [ 26.551635] ? __pfx_kthread+0x10/0x10 [ 26.551669] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.551691] ? calculate_sigpending+0x7b/0xa0 [ 26.551716] ? __pfx_kthread+0x10/0x10 [ 26.551737] ret_from_fork+0x116/0x1d0 [ 26.551756] ? __pfx_kthread+0x10/0x10 [ 26.551777] ret_from_fork_asm+0x1a/0x30 [ 26.551810] </TASK> [ 26.551821] [ 26.561156] Allocated by task 310: [ 26.561318] kasan_save_stack+0x45/0x70 [ 26.561531] kasan_save_track+0x18/0x40 [ 26.561730] kasan_save_alloc_info+0x3b/0x50 [ 26.562059] __kasan_kmalloc+0xb7/0xc0 [ 26.562277] __kmalloc_cache_noprof+0x189/0x420 [ 26.562423] kasan_bitops_generic+0x92/0x1c0 [ 26.562561] kunit_try_run_case+0x1a5/0x480 [ 26.562709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.562929] kthread+0x337/0x6f0 [ 26.563093] ret_from_fork+0x116/0x1d0 [ 26.563318] ret_from_fork_asm+0x1a/0x30 [ 26.563524] [ 26.563742] The buggy address belongs to the object at ffff8881058422c0 [ 26.563742] which belongs to the cache kmalloc-16 of size 16 [ 26.564456] The buggy address is located 8 bytes inside of [ 26.564456] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.565107] [ 26.565208] The buggy address belongs to the physical page: [ 26.565403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.565640] flags: 0x200000000000000(node=0|zone=2) [ 26.566010] page_type: f5(slab) [ 26.566207] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.566550] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.566882] page dumped because: kasan: bad access detected [ 26.567046] [ 26.567108] Memory state around the buggy address: [ 26.567264] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.567576] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.567965] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.568272] ^ [ 26.568487] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.568705] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.569213] ================================================================== [ 26.387642] ================================================================== [ 26.388294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 26.388678] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.389081] [ 26.389188] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.389245] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.389259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.389286] Call Trace: [ 26.389301] <TASK> [ 26.389322] dump_stack_lvl+0x73/0xb0 [ 26.389358] print_report+0xd1/0x610 [ 26.389382] ? __virt_addr_valid+0x1db/0x2d0 [ 26.389408] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 26.389432] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.389458] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 26.389483] kasan_report+0x141/0x180 [ 26.389505] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 26.389534] kasan_check_range+0x10c/0x1c0 [ 26.389558] __kasan_check_write+0x18/0x20 [ 26.389580] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 26.389604] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.389630] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.389668] ? trace_hardirqs_on+0x37/0xe0 [ 26.389692] ? kasan_bitops_generic+0x92/0x1c0 [ 26.389719] kasan_bitops_generic+0x116/0x1c0 [ 26.389742] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.389765] ? __pfx_read_tsc+0x10/0x10 [ 26.389789] ? ktime_get_ts64+0x86/0x230 [ 26.389815] kunit_try_run_case+0x1a5/0x480 [ 26.389840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.389861] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.389886] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.389910] ? __kthread_parkme+0x82/0x180 [ 26.390154] ? preempt_count_sub+0x50/0x80 [ 26.390183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.390205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.390231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.390256] kthread+0x337/0x6f0 [ 26.390276] ? trace_preempt_on+0x20/0xc0 [ 26.390298] ? __pfx_kthread+0x10/0x10 [ 26.390319] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.390341] ? calculate_sigpending+0x7b/0xa0 [ 26.390366] ? __pfx_kthread+0x10/0x10 [ 26.390387] ret_from_fork+0x116/0x1d0 [ 26.390407] ? __pfx_kthread+0x10/0x10 [ 26.390427] ret_from_fork_asm+0x1a/0x30 [ 26.390460] </TASK> [ 26.390472] [ 26.401578] Allocated by task 310: [ 26.401774] kasan_save_stack+0x45/0x70 [ 26.401982] kasan_save_track+0x18/0x40 [ 26.402241] kasan_save_alloc_info+0x3b/0x50 [ 26.402470] __kasan_kmalloc+0xb7/0xc0 [ 26.402638] __kmalloc_cache_noprof+0x189/0x420 [ 26.402870] kasan_bitops_generic+0x92/0x1c0 [ 26.403036] kunit_try_run_case+0x1a5/0x480 [ 26.403237] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.403444] kthread+0x337/0x6f0 [ 26.403615] ret_from_fork+0x116/0x1d0 [ 26.403768] ret_from_fork_asm+0x1a/0x30 [ 26.403905] [ 26.403970] The buggy address belongs to the object at ffff8881058422c0 [ 26.403970] which belongs to the cache kmalloc-16 of size 16 [ 26.404380] The buggy address is located 8 bytes inside of [ 26.404380] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.405266] [ 26.405349] The buggy address belongs to the physical page: [ 26.405522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.406015] flags: 0x200000000000000(node=0|zone=2) [ 26.406270] page_type: f5(slab) [ 26.406439] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.406852] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.407171] page dumped because: kasan: bad access detected [ 26.407396] [ 26.407459] Memory state around the buggy address: [ 26.407683] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.408228] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.408493] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.408751] ^ [ 26.409104] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.409457] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.409716] ================================================================== [ 26.476601] ================================================================== [ 26.478520] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 26.479372] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.479819] [ 26.479935] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.479991] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.480005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.480028] Call Trace: [ 26.480049] <TASK> [ 26.480069] dump_stack_lvl+0x73/0xb0 [ 26.480370] print_report+0xd1/0x610 [ 26.480396] ? __virt_addr_valid+0x1db/0x2d0 [ 26.480421] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 26.480446] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.480471] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 26.480496] kasan_report+0x141/0x180 [ 26.480519] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 26.480548] kasan_check_range+0x10c/0x1c0 [ 26.480571] __kasan_check_write+0x18/0x20 [ 26.480593] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 26.480617] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.480643] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.480681] ? trace_hardirqs_on+0x37/0xe0 [ 26.480704] ? kasan_bitops_generic+0x92/0x1c0 [ 26.480730] kasan_bitops_generic+0x116/0x1c0 [ 26.480762] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.480786] ? __pfx_read_tsc+0x10/0x10 [ 26.480807] ? ktime_get_ts64+0x86/0x230 [ 26.480832] kunit_try_run_case+0x1a5/0x480 [ 26.480854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.480874] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.480898] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.480921] ? __kthread_parkme+0x82/0x180 [ 26.481210] ? preempt_count_sub+0x50/0x80 [ 26.481240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.481262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.481288] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.481313] kthread+0x337/0x6f0 [ 26.481332] ? trace_preempt_on+0x20/0xc0 [ 26.481355] ? __pfx_kthread+0x10/0x10 [ 26.481377] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.481399] ? calculate_sigpending+0x7b/0xa0 [ 26.481423] ? __pfx_kthread+0x10/0x10 [ 26.481444] ret_from_fork+0x116/0x1d0 [ 26.481463] ? __pfx_kthread+0x10/0x10 [ 26.481483] ret_from_fork_asm+0x1a/0x30 [ 26.481513] </TASK> [ 26.481525] [ 26.493369] Allocated by task 310: [ 26.493533] kasan_save_stack+0x45/0x70 [ 26.493714] kasan_save_track+0x18/0x40 [ 26.494453] kasan_save_alloc_info+0x3b/0x50 [ 26.495096] __kasan_kmalloc+0xb7/0xc0 [ 26.495246] __kmalloc_cache_noprof+0x189/0x420 [ 26.495400] kasan_bitops_generic+0x92/0x1c0 [ 26.495544] kunit_try_run_case+0x1a5/0x480 [ 26.495700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.495875] kthread+0x337/0x6f0 [ 26.495991] ret_from_fork+0x116/0x1d0 [ 26.496250] ret_from_fork_asm+0x1a/0x30 [ 26.496446] [ 26.496538] The buggy address belongs to the object at ffff8881058422c0 [ 26.496538] which belongs to the cache kmalloc-16 of size 16 [ 26.497012] The buggy address is located 8 bytes inside of [ 26.497012] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.497911] [ 26.498295] The buggy address belongs to the physical page: [ 26.498508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.498930] flags: 0x200000000000000(node=0|zone=2) [ 26.499115] page_type: f5(slab) [ 26.499283] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.499612] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.499967] page dumped because: kasan: bad access detected [ 26.500135] [ 26.500198] Memory state around the buggy address: [ 26.500603] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.501000] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.501347] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.501707] ^ [ 26.502339] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.502797] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.503361] ================================================================== [ 26.410379] ================================================================== [ 26.410693] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 26.411290] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.411540] [ 26.411627] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.411695] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.411708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.411732] Call Trace: [ 26.411752] <TASK> [ 26.411771] dump_stack_lvl+0x73/0xb0 [ 26.411803] print_report+0xd1/0x610 [ 26.411826] ? __virt_addr_valid+0x1db/0x2d0 [ 26.411850] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 26.411875] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.411913] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 26.411938] kasan_report+0x141/0x180 [ 26.411959] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 26.411989] kasan_check_range+0x10c/0x1c0 [ 26.412127] __kasan_check_write+0x18/0x20 [ 26.412152] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 26.412177] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.412204] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.412228] ? trace_hardirqs_on+0x37/0xe0 [ 26.412251] ? kasan_bitops_generic+0x92/0x1c0 [ 26.412278] kasan_bitops_generic+0x116/0x1c0 [ 26.412301] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.412325] ? __pfx_read_tsc+0x10/0x10 [ 26.412346] ? ktime_get_ts64+0x86/0x230 [ 26.412370] kunit_try_run_case+0x1a5/0x480 [ 26.412393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.412414] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.412438] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.412461] ? __kthread_parkme+0x82/0x180 [ 26.412483] ? preempt_count_sub+0x50/0x80 [ 26.412505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.412527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.412552] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.412577] kthread+0x337/0x6f0 [ 26.412596] ? trace_preempt_on+0x20/0xc0 [ 26.412618] ? __pfx_kthread+0x10/0x10 [ 26.412638] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.412674] ? calculate_sigpending+0x7b/0xa0 [ 26.412697] ? __pfx_kthread+0x10/0x10 [ 26.412719] ret_from_fork+0x116/0x1d0 [ 26.412737] ? __pfx_kthread+0x10/0x10 [ 26.412765] ret_from_fork_asm+0x1a/0x30 [ 26.412796] </TASK> [ 26.412807] [ 26.425016] Allocated by task 310: [ 26.425609] kasan_save_stack+0x45/0x70 [ 26.425877] kasan_save_track+0x18/0x40 [ 26.426192] kasan_save_alloc_info+0x3b/0x50 [ 26.426356] __kasan_kmalloc+0xb7/0xc0 [ 26.426547] __kmalloc_cache_noprof+0x189/0x420 [ 26.426770] kasan_bitops_generic+0x92/0x1c0 [ 26.427280] kunit_try_run_case+0x1a5/0x480 [ 26.427494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.427923] kthread+0x337/0x6f0 [ 26.428258] ret_from_fork+0x116/0x1d0 [ 26.428456] ret_from_fork_asm+0x1a/0x30 [ 26.428932] [ 26.429017] The buggy address belongs to the object at ffff8881058422c0 [ 26.429017] which belongs to the cache kmalloc-16 of size 16 [ 26.429751] The buggy address is located 8 bytes inside of [ 26.429751] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.430626] [ 26.430737] The buggy address belongs to the physical page: [ 26.431132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.431537] flags: 0x200000000000000(node=0|zone=2) [ 26.431725] page_type: f5(slab) [ 26.431942] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.432520] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.432834] page dumped because: kasan: bad access detected [ 26.433118] [ 26.433204] Memory state around the buggy address: [ 26.433440] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.433707] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.434131] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.434906] ^ [ 26.435285] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.435680] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.436433] ================================================================== [ 26.437439] ================================================================== [ 26.437724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 26.438080] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.438604] [ 26.438712] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.438768] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.438782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.438806] Call Trace: [ 26.438821] <TASK> [ 26.438841] dump_stack_lvl+0x73/0xb0 [ 26.438874] print_report+0xd1/0x610 [ 26.438898] ? __virt_addr_valid+0x1db/0x2d0 [ 26.438922] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 26.439046] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.439075] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 26.439099] kasan_report+0x141/0x180 [ 26.439121] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 26.439150] kasan_check_range+0x10c/0x1c0 [ 26.439173] __kasan_check_write+0x18/0x20 [ 26.439196] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 26.439221] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.439246] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.439270] ? trace_hardirqs_on+0x37/0xe0 [ 26.439294] ? kasan_bitops_generic+0x92/0x1c0 [ 26.439320] kasan_bitops_generic+0x116/0x1c0 [ 26.439343] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.439367] ? __pfx_read_tsc+0x10/0x10 [ 26.439389] ? ktime_get_ts64+0x86/0x230 [ 26.439414] kunit_try_run_case+0x1a5/0x480 [ 26.439437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.439458] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.439482] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.439504] ? __kthread_parkme+0x82/0x180 [ 26.439526] ? preempt_count_sub+0x50/0x80 [ 26.439549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.439571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.439596] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.439621] kthread+0x337/0x6f0 [ 26.439640] ? trace_preempt_on+0x20/0xc0 [ 26.439677] ? __pfx_kthread+0x10/0x10 [ 26.439697] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.439719] ? calculate_sigpending+0x7b/0xa0 [ 26.439743] ? __pfx_kthread+0x10/0x10 [ 26.439764] ret_from_fork+0x116/0x1d0 [ 26.439783] ? __pfx_kthread+0x10/0x10 [ 26.439802] ret_from_fork_asm+0x1a/0x30 [ 26.439833] </TASK> [ 26.439844] [ 26.448296] Allocated by task 310: [ 26.448511] kasan_save_stack+0x45/0x70 [ 26.448746] kasan_save_track+0x18/0x40 [ 26.448914] kasan_save_alloc_info+0x3b/0x50 [ 26.449056] __kasan_kmalloc+0xb7/0xc0 [ 26.449299] __kmalloc_cache_noprof+0x189/0x420 [ 26.449539] kasan_bitops_generic+0x92/0x1c0 [ 26.449733] kunit_try_run_case+0x1a5/0x480 [ 26.449875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.450051] kthread+0x337/0x6f0 [ 26.450168] ret_from_fork+0x116/0x1d0 [ 26.450387] ret_from_fork_asm+0x1a/0x30 [ 26.450702] [ 26.450793] The buggy address belongs to the object at ffff8881058422c0 [ 26.450793] which belongs to the cache kmalloc-16 of size 16 [ 26.451360] The buggy address is located 8 bytes inside of [ 26.451360] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.451840] [ 26.451937] The buggy address belongs to the physical page: [ 26.452399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.452789] flags: 0x200000000000000(node=0|zone=2) [ 26.453078] page_type: f5(slab) [ 26.453207] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.453433] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.453818] page dumped because: kasan: bad access detected [ 26.454223] [ 26.454316] Memory state around the buggy address: [ 26.454537] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.455026] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.455245] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.455451] ^ [ 26.455718] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.456500] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.456734] ================================================================== [ 26.504168] ================================================================== [ 26.504836] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 26.505892] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.506634] [ 26.507027] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.507089] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.507126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.507150] Call Trace: [ 26.507170] <TASK> [ 26.507190] dump_stack_lvl+0x73/0xb0 [ 26.507229] print_report+0xd1/0x610 [ 26.507251] ? __virt_addr_valid+0x1db/0x2d0 [ 26.507275] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 26.507301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.507326] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 26.507350] kasan_report+0x141/0x180 [ 26.507371] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 26.507400] kasan_check_range+0x10c/0x1c0 [ 26.507423] __kasan_check_write+0x18/0x20 [ 26.507444] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 26.507469] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.507494] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.507518] ? trace_hardirqs_on+0x37/0xe0 [ 26.507540] ? kasan_bitops_generic+0x92/0x1c0 [ 26.507566] kasan_bitops_generic+0x116/0x1c0 [ 26.507589] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.507614] ? __pfx_read_tsc+0x10/0x10 [ 26.507635] ? ktime_get_ts64+0x86/0x230 [ 26.507672] kunit_try_run_case+0x1a5/0x480 [ 26.507695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.507715] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.507739] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.507762] ? __kthread_parkme+0x82/0x180 [ 26.507783] ? preempt_count_sub+0x50/0x80 [ 26.507806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.507828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.507853] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.507877] kthread+0x337/0x6f0 [ 26.507897] ? trace_preempt_on+0x20/0xc0 [ 26.507918] ? __pfx_kthread+0x10/0x10 [ 26.507939] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.508016] ? calculate_sigpending+0x7b/0xa0 [ 26.508041] ? __pfx_kthread+0x10/0x10 [ 26.508063] ret_from_fork+0x116/0x1d0 [ 26.508081] ? __pfx_kthread+0x10/0x10 [ 26.508102] ret_from_fork_asm+0x1a/0x30 [ 26.508132] </TASK> [ 26.508144] [ 26.519236] Allocated by task 310: [ 26.519611] kasan_save_stack+0x45/0x70 [ 26.519877] kasan_save_track+0x18/0x40 [ 26.520280] kasan_save_alloc_info+0x3b/0x50 [ 26.520473] __kasan_kmalloc+0xb7/0xc0 [ 26.520597] __kmalloc_cache_noprof+0x189/0x420 [ 26.520752] kasan_bitops_generic+0x92/0x1c0 [ 26.520919] kunit_try_run_case+0x1a5/0x480 [ 26.521185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.521580] kthread+0x337/0x6f0 [ 26.521908] ret_from_fork+0x116/0x1d0 [ 26.522278] ret_from_fork_asm+0x1a/0x30 [ 26.522483] [ 26.522596] The buggy address belongs to the object at ffff8881058422c0 [ 26.522596] which belongs to the cache kmalloc-16 of size 16 [ 26.522982] The buggy address is located 8 bytes inside of [ 26.522982] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.523610] [ 26.523751] The buggy address belongs to the physical page: [ 26.524055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.524359] flags: 0x200000000000000(node=0|zone=2) [ 26.524686] page_type: f5(slab) [ 26.524871] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.525398] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.525756] page dumped because: kasan: bad access detected [ 26.526029] [ 26.526135] Memory state around the buggy address: [ 26.526559] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.526937] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.527296] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.527647] ^ [ 26.528036] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.528310] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.528624] ================================================================== [ 26.457407] ================================================================== [ 26.457729] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 26.457999] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.458383] [ 26.458496] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.458550] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.458563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.458587] Call Trace: [ 26.458606] <TASK> [ 26.458626] dump_stack_lvl+0x73/0xb0 [ 26.458669] print_report+0xd1/0x610 [ 26.458693] ? __virt_addr_valid+0x1db/0x2d0 [ 26.458718] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 26.458742] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.458777] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 26.458801] kasan_report+0x141/0x180 [ 26.458822] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 26.458851] kasan_check_range+0x10c/0x1c0 [ 26.458873] __kasan_check_write+0x18/0x20 [ 26.458896] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 26.458922] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.458947] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.459016] ? trace_hardirqs_on+0x37/0xe0 [ 26.459041] ? kasan_bitops_generic+0x92/0x1c0 [ 26.459067] kasan_bitops_generic+0x116/0x1c0 [ 26.459090] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.459115] ? __pfx_read_tsc+0x10/0x10 [ 26.459136] ? ktime_get_ts64+0x86/0x230 [ 26.459160] kunit_try_run_case+0x1a5/0x480 [ 26.459183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.459203] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.459227] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.459250] ? __kthread_parkme+0x82/0x180 [ 26.459271] ? preempt_count_sub+0x50/0x80 [ 26.459294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.459315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.459340] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.459365] kthread+0x337/0x6f0 [ 26.459385] ? trace_preempt_on+0x20/0xc0 [ 26.459406] ? __pfx_kthread+0x10/0x10 [ 26.459426] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.459448] ? calculate_sigpending+0x7b/0xa0 [ 26.459471] ? __pfx_kthread+0x10/0x10 [ 26.459492] ret_from_fork+0x116/0x1d0 [ 26.459510] ? __pfx_kthread+0x10/0x10 [ 26.459531] ret_from_fork_asm+0x1a/0x30 [ 26.459561] </TASK> [ 26.459573] [ 26.468446] Allocated by task 310: [ 26.468631] kasan_save_stack+0x45/0x70 [ 26.468879] kasan_save_track+0x18/0x40 [ 26.469146] kasan_save_alloc_info+0x3b/0x50 [ 26.469299] __kasan_kmalloc+0xb7/0xc0 [ 26.469424] __kmalloc_cache_noprof+0x189/0x420 [ 26.469626] kasan_bitops_generic+0x92/0x1c0 [ 26.469957] kunit_try_run_case+0x1a5/0x480 [ 26.470179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.470411] kthread+0x337/0x6f0 [ 26.470568] ret_from_fork+0x116/0x1d0 [ 26.470750] ret_from_fork_asm+0x1a/0x30 [ 26.471027] [ 26.471125] The buggy address belongs to the object at ffff8881058422c0 [ 26.471125] which belongs to the cache kmalloc-16 of size 16 [ 26.471545] The buggy address is located 8 bytes inside of [ 26.471545] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.472442] [ 26.472529] The buggy address belongs to the physical page: [ 26.472745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.473065] flags: 0x200000000000000(node=0|zone=2) [ 26.473274] page_type: f5(slab) [ 26.473392] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.473616] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.473850] page dumped because: kasan: bad access detected [ 26.474202] [ 26.474302] Memory state around the buggy address: [ 26.474519] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.474951] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.475260] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.475480] ^ [ 26.475649] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.475865] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.476070] ==================================================================