Date
June 18, 2025, 6:43 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 23.538072] ================================================================== [ 23.539966] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 23.540563] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.540722] Call trace: [ 23.541145] kasan_report+0xdc/0x128 [ 23.541389] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 23.541752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.542386] kasan_save_track+0x20/0x40 [ 23.542727] kasan_bitops_generic+0xa0/0x1c8 [ 23.543056] kthread+0x328/0x630 [ 23.543438] The buggy address is located 8 bytes inside of [ 23.543438] allocated 9-byte region [fff00000c60581a0, fff00000c60581a9) [ 23.544198] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.544550] fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 23.545054] fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.547906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 23.550447] Read of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271 [ 23.551177] [ 23.551427] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.551644] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.552224] Hardware name: linux,dummy-virt (DT) [ 23.552614] Call trace: [ 23.553174] show_stack+0x20/0x38 (C) [ 23.553868] dump_stack_lvl+0x8c/0xd0 [ 23.554264] print_report+0x118/0x608 [ 23.554548] __asan_report_load8_noabort+0x20/0x30 [ 23.554772] kasan_bitops_generic+0x11c/0x1c8 [ 23.554881] kunit_try_run_case+0x170/0x3f0 [ 23.554999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.560288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.565127] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.603839] ==================================================================
[ 13.396077] ================================================================== [ 13.396366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.396884] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287 [ 13.397352] [ 13.397462] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.397507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.397518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.397637] Call Trace: [ 13.397656] <TASK> [ 13.397670] dump_stack_lvl+0x73/0xb0 [ 13.397698] print_report+0xd1/0x650 [ 13.397720] ? __virt_addr_valid+0x1db/0x2d0 [ 13.397741] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.397766] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.397791] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.397819] kasan_report+0x141/0x180 [ 13.397839] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.397870] kasan_check_range+0x10c/0x1c0 [ 13.397893] __kasan_check_write+0x18/0x20 [ 13.397915] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.397942] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.397970] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.397992] ? trace_hardirqs_on+0x37/0xe0 [ 13.398014] ? kasan_bitops_generic+0x92/0x1c0 [ 13.398039] kasan_bitops_generic+0x121/0x1c0 [ 13.398062] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.398085] ? __pfx_read_tsc+0x10/0x10 [ 13.398106] ? ktime_get_ts64+0x86/0x230 [ 13.398129] kunit_try_run_case+0x1a5/0x480 [ 13.398152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.398174] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.398195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.398228] ? __kthread_parkme+0x82/0x180 [ 13.398248] ? preempt_count_sub+0x50/0x80 [ 13.398270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.398293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.398314] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.398336] kthread+0x337/0x6f0 [ 13.398355] ? trace_preempt_on+0x20/0xc0 [ 13.398376] ? __pfx_kthread+0x10/0x10 [ 13.398396] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.398416] ? calculate_sigpending+0x7b/0xa0 [ 13.398439] ? __pfx_kthread+0x10/0x10 [ 13.398460] ret_from_fork+0x116/0x1d0 [ 13.398478] ? __pfx_kthread+0x10/0x10 [ 13.398497] ret_from_fork_asm+0x1a/0x30 [ 13.398527] </TASK> [ 13.398537] [ 13.416720] Allocated by task 287: [ 13.416905] kasan_save_stack+0x45/0x70 [ 13.417087] kasan_save_track+0x18/0x40 [ 13.417261] kasan_save_alloc_info+0x3b/0x50 [ 13.417451] __kasan_kmalloc+0xb7/0xc0 [ 13.417583] __kmalloc_cache_noprof+0x189/0x420 [ 13.417800] kasan_bitops_generic+0x92/0x1c0 [ 13.418004] kunit_try_run_case+0x1a5/0x480 [ 13.418201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.419089] kthread+0x337/0x6f0 [ 13.419449] ret_from_fork+0x116/0x1d0 [ 13.419938] ret_from_fork_asm+0x1a/0x30 [ 13.420615] [ 13.420942] The buggy address belongs to the object at ffff8881028596c0 [ 13.420942] which belongs to the cache kmalloc-16 of size 16 [ 13.421737] The buggy address is located 8 bytes inside of [ 13.421737] allocated 9-byte region [ffff8881028596c0, ffff8881028596c9) [ 13.422092] [ 13.422157] The buggy address belongs to the physical page: [ 13.423148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859 [ 13.424170] flags: 0x200000000000000(node=0|zone=2) [ 13.424887] page_type: f5(slab) [ 13.425468] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.426490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.427158] page dumped because: kasan: bad access detected [ 13.427671] [ 13.427772] Memory state around the buggy address: [ 13.428168] ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.428850] ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.429241] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.429790] ^ [ 13.430127] ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.430903] ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.431219] ================================================================== [ 13.533032] ================================================================== [ 13.533502] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.533802] Read of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287 [ 13.534083] [ 13.534179] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.534236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.534270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.534291] Call Trace: [ 13.534304] <TASK> [ 13.534317] dump_stack_lvl+0x73/0xb0 [ 13.534342] print_report+0xd1/0x650 [ 13.534363] ? __virt_addr_valid+0x1db/0x2d0 [ 13.534384] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.534409] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.534453] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.534480] kasan_report+0x141/0x180 [ 13.534501] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.534531] __asan_report_load8_noabort+0x18/0x20 [ 13.534554] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.534580] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.534621] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.534645] ? trace_hardirqs_on+0x37/0xe0 [ 13.534666] ? kasan_bitops_generic+0x92/0x1c0 [ 13.534691] kasan_bitops_generic+0x121/0x1c0 [ 13.534713] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.534737] ? __pfx_read_tsc+0x10/0x10 [ 13.534757] ? ktime_get_ts64+0x86/0x230 [ 13.534793] kunit_try_run_case+0x1a5/0x480 [ 13.534816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.534837] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.534858] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.534880] ? __kthread_parkme+0x82/0x180 [ 13.534899] ? preempt_count_sub+0x50/0x80 [ 13.534920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.534943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.534965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.534988] kthread+0x337/0x6f0 [ 13.535007] ? trace_preempt_on+0x20/0xc0 [ 13.535029] ? __pfx_kthread+0x10/0x10 [ 13.535050] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.535070] ? calculate_sigpending+0x7b/0xa0 [ 13.535093] ? __pfx_kthread+0x10/0x10 [ 13.535380] ret_from_fork+0x116/0x1d0 [ 13.535413] ? __pfx_kthread+0x10/0x10 [ 13.535502] ret_from_fork_asm+0x1a/0x30 [ 13.535531] </TASK> [ 13.535542] [ 13.544097] Allocated by task 287: [ 13.544310] kasan_save_stack+0x45/0x70 [ 13.544597] kasan_save_track+0x18/0x40 [ 13.544789] kasan_save_alloc_info+0x3b/0x50 [ 13.544972] __kasan_kmalloc+0xb7/0xc0 [ 13.545168] __kmalloc_cache_noprof+0x189/0x420 [ 13.545409] kasan_bitops_generic+0x92/0x1c0 [ 13.545569] kunit_try_run_case+0x1a5/0x480 [ 13.545707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.546005] kthread+0x337/0x6f0 [ 13.546195] ret_from_fork+0x116/0x1d0 [ 13.546385] ret_from_fork_asm+0x1a/0x30 [ 13.546577] [ 13.546945] The buggy address belongs to the object at ffff8881028596c0 [ 13.546945] which belongs to the cache kmalloc-16 of size 16 [ 13.547391] The buggy address is located 8 bytes inside of [ 13.547391] allocated 9-byte region [ffff8881028596c0, ffff8881028596c9) [ 13.548022] [ 13.548113] The buggy address belongs to the physical page: [ 13.548402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859 [ 13.548855] flags: 0x200000000000000(node=0|zone=2) [ 13.549038] page_type: f5(slab) [ 13.549153] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.549467] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.549863] page dumped because: kasan: bad access detected [ 13.550070] [ 13.550135] Memory state around the buggy address: [ 13.550348] ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.550885] ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.551233] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.551610] ^ [ 13.551844] ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.552104] ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.552516] ================================================================== [ 13.513690] ================================================================== [ 13.513958] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.514560] Read of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287 [ 13.514886] [ 13.514985] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.515029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.515040] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.515060] Call Trace: [ 13.515076] <TASK> [ 13.515089] dump_stack_lvl+0x73/0xb0 [ 13.515114] print_report+0xd1/0x650 [ 13.515134] ? __virt_addr_valid+0x1db/0x2d0 [ 13.515155] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.515181] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.515219] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.515245] kasan_report+0x141/0x180 [ 13.515266] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.515296] kasan_check_range+0x10c/0x1c0 [ 13.515318] __kasan_check_read+0x15/0x20 [ 13.515340] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.515366] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.515393] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.515415] ? trace_hardirqs_on+0x37/0xe0 [ 13.515436] ? kasan_bitops_generic+0x92/0x1c0 [ 13.515461] kasan_bitops_generic+0x121/0x1c0 [ 13.515483] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.515507] ? __pfx_read_tsc+0x10/0x10 [ 13.515526] ? ktime_get_ts64+0x86/0x230 [ 13.515549] kunit_try_run_case+0x1a5/0x480 [ 13.515571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.515592] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.515613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.515635] ? __kthread_parkme+0x82/0x180 [ 13.515653] ? preempt_count_sub+0x50/0x80 [ 13.515676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.515721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.515743] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.515765] kthread+0x337/0x6f0 [ 13.515783] ? trace_preempt_on+0x20/0xc0 [ 13.515804] ? __pfx_kthread+0x10/0x10 [ 13.515824] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.515843] ? calculate_sigpending+0x7b/0xa0 [ 13.515867] ? __pfx_kthread+0x10/0x10 [ 13.515887] ret_from_fork+0x116/0x1d0 [ 13.515905] ? __pfx_kthread+0x10/0x10 [ 13.515924] ret_from_fork_asm+0x1a/0x30 [ 13.515953] </TASK> [ 13.515962] [ 13.524576] Allocated by task 287: [ 13.524715] kasan_save_stack+0x45/0x70 [ 13.524899] kasan_save_track+0x18/0x40 [ 13.525022] kasan_save_alloc_info+0x3b/0x50 [ 13.525158] __kasan_kmalloc+0xb7/0xc0 [ 13.525338] __kmalloc_cache_noprof+0x189/0x420 [ 13.525544] kasan_bitops_generic+0x92/0x1c0 [ 13.525732] kunit_try_run_case+0x1a5/0x480 [ 13.525899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.526129] kthread+0x337/0x6f0 [ 13.526574] ret_from_fork+0x116/0x1d0 [ 13.526789] ret_from_fork_asm+0x1a/0x30 [ 13.526978] [ 13.527073] The buggy address belongs to the object at ffff8881028596c0 [ 13.527073] which belongs to the cache kmalloc-16 of size 16 [ 13.527698] The buggy address is located 8 bytes inside of [ 13.527698] allocated 9-byte region [ffff8881028596c0, ffff8881028596c9) [ 13.528139] [ 13.528264] The buggy address belongs to the physical page: [ 13.528602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859 [ 13.528852] flags: 0x200000000000000(node=0|zone=2) [ 13.529007] page_type: f5(slab) [ 13.529119] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.529506] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.529864] page dumped because: kasan: bad access detected [ 13.530107] [ 13.530172] Memory state around the buggy address: [ 13.530338] ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.530636] ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.530927] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.531654] ^ [ 13.531894] ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.532241] ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.532600] ================================================================== [ 13.431867] ================================================================== [ 13.432215] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.432666] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287 [ 13.432920] [ 13.433018] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.433064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.433074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.433095] Call Trace: [ 13.433111] <TASK> [ 13.433125] dump_stack_lvl+0x73/0xb0 [ 13.433151] print_report+0xd1/0x650 [ 13.433171] ? __virt_addr_valid+0x1db/0x2d0 [ 13.433192] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.433228] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.433253] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.433279] kasan_report+0x141/0x180 [ 13.433319] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.433349] kasan_check_range+0x10c/0x1c0 [ 13.433371] __kasan_check_write+0x18/0x20 [ 13.433392] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.433418] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.433444] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.433466] ? trace_hardirqs_on+0x37/0xe0 [ 13.433487] ? kasan_bitops_generic+0x92/0x1c0 [ 13.433512] kasan_bitops_generic+0x121/0x1c0 [ 13.433534] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.433558] ? __pfx_read_tsc+0x10/0x10 [ 13.433578] ? ktime_get_ts64+0x86/0x230 [ 13.433601] kunit_try_run_case+0x1a5/0x480 [ 13.433623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.433644] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.433665] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.433686] ? __kthread_parkme+0x82/0x180 [ 13.433705] ? preempt_count_sub+0x50/0x80 [ 13.433728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.433750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.433772] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.433794] kthread+0x337/0x6f0 [ 13.433827] ? trace_preempt_on+0x20/0xc0 [ 13.433848] ? __pfx_kthread+0x10/0x10 [ 13.433868] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.433887] ? calculate_sigpending+0x7b/0xa0 [ 13.433910] ? __pfx_kthread+0x10/0x10 [ 13.433930] ret_from_fork+0x116/0x1d0 [ 13.433948] ? __pfx_kthread+0x10/0x10 [ 13.433967] ret_from_fork_asm+0x1a/0x30 [ 13.433996] </TASK> [ 13.434006] [ 13.442820] Allocated by task 287: [ 13.443286] kasan_save_stack+0x45/0x70 [ 13.443472] kasan_save_track+0x18/0x40 [ 13.443603] kasan_save_alloc_info+0x3b/0x50 [ 13.443750] __kasan_kmalloc+0xb7/0xc0 [ 13.443997] __kmalloc_cache_noprof+0x189/0x420 [ 13.444322] kasan_bitops_generic+0x92/0x1c0 [ 13.444747] kunit_try_run_case+0x1a5/0x480 [ 13.444906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.445158] kthread+0x337/0x6f0 [ 13.445488] ret_from_fork+0x116/0x1d0 [ 13.445629] ret_from_fork_asm+0x1a/0x30 [ 13.445762] [ 13.445827] The buggy address belongs to the object at ffff8881028596c0 [ 13.445827] which belongs to the cache kmalloc-16 of size 16 [ 13.446373] The buggy address is located 8 bytes inside of [ 13.446373] allocated 9-byte region [ffff8881028596c0, ffff8881028596c9) [ 13.447095] [ 13.447192] The buggy address belongs to the physical page: [ 13.447513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859 [ 13.447809] flags: 0x200000000000000(node=0|zone=2) [ 13.448116] page_type: f5(slab) [ 13.448253] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.448548] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.448865] page dumped because: kasan: bad access detected [ 13.449027] [ 13.449089] Memory state around the buggy address: [ 13.449597] ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.449944] ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.450301] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.450737] ^ [ 13.451001] ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.451297] ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.451723] ================================================================== [ 13.452164] ================================================================== [ 13.452567] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.452866] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287 [ 13.453182] [ 13.453322] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.453371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.453382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.453403] Call Trace: [ 13.453418] <TASK> [ 13.453431] dump_stack_lvl+0x73/0xb0 [ 13.453458] print_report+0xd1/0x650 [ 13.453478] ? __virt_addr_valid+0x1db/0x2d0 [ 13.453499] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.453525] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.453550] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.453578] kasan_report+0x141/0x180 [ 13.453598] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.453630] kasan_check_range+0x10c/0x1c0 [ 13.453652] __kasan_check_write+0x18/0x20 [ 13.453674] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.453700] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.453727] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.453849] ? trace_hardirqs_on+0x37/0xe0 [ 13.453872] ? kasan_bitops_generic+0x92/0x1c0 [ 13.453898] kasan_bitops_generic+0x121/0x1c0 [ 13.453921] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.453944] ? __pfx_read_tsc+0x10/0x10 [ 13.453964] ? ktime_get_ts64+0x86/0x230 [ 13.453987] kunit_try_run_case+0x1a5/0x480 [ 13.454010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.454031] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.454052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.454073] ? __kthread_parkme+0x82/0x180 [ 13.454093] ? preempt_count_sub+0x50/0x80 [ 13.454114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.454137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.454159] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.454180] kthread+0x337/0x6f0 [ 13.454232] ? trace_preempt_on+0x20/0xc0 [ 13.454254] ? __pfx_kthread+0x10/0x10 [ 13.454274] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.454293] ? calculate_sigpending+0x7b/0xa0 [ 13.454316] ? __pfx_kthread+0x10/0x10 [ 13.454337] ret_from_fork+0x116/0x1d0 [ 13.454355] ? __pfx_kthread+0x10/0x10 [ 13.454374] ret_from_fork_asm+0x1a/0x30 [ 13.454421] </TASK> [ 13.454431] [ 13.463629] Allocated by task 287: [ 13.463909] kasan_save_stack+0x45/0x70 [ 13.464250] kasan_save_track+0x18/0x40 [ 13.464506] kasan_save_alloc_info+0x3b/0x50 [ 13.464694] __kasan_kmalloc+0xb7/0xc0 [ 13.464868] __kmalloc_cache_noprof+0x189/0x420 [ 13.465047] kasan_bitops_generic+0x92/0x1c0 [ 13.465202] kunit_try_run_case+0x1a5/0x480 [ 13.465437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.465641] kthread+0x337/0x6f0 [ 13.465984] ret_from_fork+0x116/0x1d0 [ 13.466170] ret_from_fork_asm+0x1a/0x30 [ 13.466926] [ 13.467003] The buggy address belongs to the object at ffff8881028596c0 [ 13.467003] which belongs to the cache kmalloc-16 of size 16 [ 13.467366] The buggy address is located 8 bytes inside of [ 13.467366] allocated 9-byte region [ffff8881028596c0, ffff8881028596c9) [ 13.468129] [ 13.468516] The buggy address belongs to the physical page: [ 13.468775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859 [ 13.469123] flags: 0x200000000000000(node=0|zone=2) [ 13.469377] page_type: f5(slab) [ 13.469599] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.469833] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.470158] page dumped because: kasan: bad access detected [ 13.470429] [ 13.470535] Memory state around the buggy address: [ 13.470748] ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.471006] ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.471485] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.471908] ^ [ 13.472158] ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.472607] ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.472825] ================================================================== [ 13.375042] ================================================================== [ 13.375326] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.376022] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287 [ 13.376317] [ 13.376416] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.376511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.376524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.376544] Call Trace: [ 13.376556] <TASK> [ 13.376581] dump_stack_lvl+0x73/0xb0 [ 13.376607] print_report+0xd1/0x650 [ 13.376627] ? __virt_addr_valid+0x1db/0x2d0 [ 13.376648] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.376677] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.376702] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.376728] kasan_report+0x141/0x180 [ 13.376749] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.376780] kasan_check_range+0x10c/0x1c0 [ 13.376812] __kasan_check_write+0x18/0x20 [ 13.376834] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.376860] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.376897] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.376920] ? trace_hardirqs_on+0x37/0xe0 [ 13.376940] ? kasan_bitops_generic+0x92/0x1c0 [ 13.376966] kasan_bitops_generic+0x121/0x1c0 [ 13.376996] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.377020] ? __pfx_read_tsc+0x10/0x10 [ 13.377040] ? ktime_get_ts64+0x86/0x230 [ 13.377074] kunit_try_run_case+0x1a5/0x480 [ 13.377097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.377117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.377145] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.377168] ? __kthread_parkme+0x82/0x180 [ 13.377188] ? preempt_count_sub+0x50/0x80 [ 13.377226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.377249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.377270] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.377293] kthread+0x337/0x6f0 [ 13.377311] ? trace_preempt_on+0x20/0xc0 [ 13.377332] ? __pfx_kthread+0x10/0x10 [ 13.377352] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.377372] ? calculate_sigpending+0x7b/0xa0 [ 13.377395] ? __pfx_kthread+0x10/0x10 [ 13.377416] ret_from_fork+0x116/0x1d0 [ 13.377627] ? __pfx_kthread+0x10/0x10 [ 13.377657] ret_from_fork_asm+0x1a/0x30 [ 13.377701] </TASK> [ 13.377712] [ 13.386896] Allocated by task 287: [ 13.387056] kasan_save_stack+0x45/0x70 [ 13.387257] kasan_save_track+0x18/0x40 [ 13.387420] kasan_save_alloc_info+0x3b/0x50 [ 13.387686] __kasan_kmalloc+0xb7/0xc0 [ 13.387840] __kmalloc_cache_noprof+0x189/0x420 [ 13.388035] kasan_bitops_generic+0x92/0x1c0 [ 13.388254] kunit_try_run_case+0x1a5/0x480 [ 13.388437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.388710] kthread+0x337/0x6f0 [ 13.388885] ret_from_fork+0x116/0x1d0 [ 13.389065] ret_from_fork_asm+0x1a/0x30 [ 13.389314] [ 13.389415] The buggy address belongs to the object at ffff8881028596c0 [ 13.389415] which belongs to the cache kmalloc-16 of size 16 [ 13.390108] The buggy address is located 8 bytes inside of [ 13.390108] allocated 9-byte region [ffff8881028596c0, ffff8881028596c9) [ 13.390478] [ 13.390542] The buggy address belongs to the physical page: [ 13.390708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859 [ 13.391412] flags: 0x200000000000000(node=0|zone=2) [ 13.391846] page_type: f5(slab) [ 13.391971] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.392244] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.392773] page dumped because: kasan: bad access detected [ 13.393115] [ 13.393280] Memory state around the buggy address: [ 13.393650] ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.393931] ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.394150] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.394394] ^ [ 13.394737] ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.395155] ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.395507] ================================================================== [ 13.473258] ================================================================== [ 13.473718] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.474052] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287 [ 13.474288] [ 13.474386] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.474491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.474505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.474525] Call Trace: [ 13.474537] <TASK> [ 13.474550] dump_stack_lvl+0x73/0xb0 [ 13.474575] print_report+0xd1/0x650 [ 13.474596] ? __virt_addr_valid+0x1db/0x2d0 [ 13.474617] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.474642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.474667] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.474692] kasan_report+0x141/0x180 [ 13.474713] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.474742] kasan_check_range+0x10c/0x1c0 [ 13.474765] __kasan_check_write+0x18/0x20 [ 13.474809] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.474834] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.474873] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.474895] ? trace_hardirqs_on+0x37/0xe0 [ 13.474916] ? kasan_bitops_generic+0x92/0x1c0 [ 13.474958] kasan_bitops_generic+0x121/0x1c0 [ 13.474980] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.475004] ? __pfx_read_tsc+0x10/0x10 [ 13.475024] ? ktime_get_ts64+0x86/0x230 [ 13.475048] kunit_try_run_case+0x1a5/0x480 [ 13.475072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.475093] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.475114] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.475136] ? __kthread_parkme+0x82/0x180 [ 13.475155] ? preempt_count_sub+0x50/0x80 [ 13.475178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.475201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.475232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.475254] kthread+0x337/0x6f0 [ 13.475273] ? trace_preempt_on+0x20/0xc0 [ 13.475311] ? __pfx_kthread+0x10/0x10 [ 13.475331] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.475352] ? calculate_sigpending+0x7b/0xa0 [ 13.475375] ? __pfx_kthread+0x10/0x10 [ 13.475397] ret_from_fork+0x116/0x1d0 [ 13.475416] ? __pfx_kthread+0x10/0x10 [ 13.475619] ret_from_fork_asm+0x1a/0x30 [ 13.475655] </TASK> [ 13.475667] [ 13.484463] Allocated by task 287: [ 13.484588] kasan_save_stack+0x45/0x70 [ 13.484869] kasan_save_track+0x18/0x40 [ 13.485224] kasan_save_alloc_info+0x3b/0x50 [ 13.485449] __kasan_kmalloc+0xb7/0xc0 [ 13.485732] __kmalloc_cache_noprof+0x189/0x420 [ 13.485958] kasan_bitops_generic+0x92/0x1c0 [ 13.486167] kunit_try_run_case+0x1a5/0x480 [ 13.486477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.486750] kthread+0x337/0x6f0 [ 13.486934] ret_from_fork+0x116/0x1d0 [ 13.487108] ret_from_fork_asm+0x1a/0x30 [ 13.487311] [ 13.487411] The buggy address belongs to the object at ffff8881028596c0 [ 13.487411] which belongs to the cache kmalloc-16 of size 16 [ 13.488110] The buggy address is located 8 bytes inside of [ 13.488110] allocated 9-byte region [ffff8881028596c0, ffff8881028596c9) [ 13.488501] [ 13.488567] The buggy address belongs to the physical page: [ 13.488818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859 [ 13.489161] flags: 0x200000000000000(node=0|zone=2) [ 13.489395] page_type: f5(slab) [ 13.489540] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.489793] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.490012] page dumped because: kasan: bad access detected [ 13.490176] [ 13.490371] Memory state around the buggy address: [ 13.490596] ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.490909] ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.491261] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.491787] ^ [ 13.492059] ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.492347] ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.492788] ================================================================== [ 13.493323] ================================================================== [ 13.493647] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.494092] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287 [ 13.494412] [ 13.494537] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.494584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.494596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.494616] Call Trace: [ 13.494630] <TASK> [ 13.494644] dump_stack_lvl+0x73/0xb0 [ 13.494670] print_report+0xd1/0x650 [ 13.494692] ? __virt_addr_valid+0x1db/0x2d0 [ 13.494715] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.494741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.494834] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.494862] kasan_report+0x141/0x180 [ 13.494883] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.494914] kasan_check_range+0x10c/0x1c0 [ 13.494937] __kasan_check_write+0x18/0x20 [ 13.494960] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.494985] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.495032] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.495055] ? trace_hardirqs_on+0x37/0xe0 [ 13.495075] ? kasan_bitops_generic+0x92/0x1c0 [ 13.495100] kasan_bitops_generic+0x121/0x1c0 [ 13.495122] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.495145] ? __pfx_read_tsc+0x10/0x10 [ 13.495181] ? ktime_get_ts64+0x86/0x230 [ 13.495213] kunit_try_run_case+0x1a5/0x480 [ 13.495235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.495256] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.495277] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.495299] ? __kthread_parkme+0x82/0x180 [ 13.495320] ? preempt_count_sub+0x50/0x80 [ 13.495342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.495364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.495386] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.495408] kthread+0x337/0x6f0 [ 13.495426] ? trace_preempt_on+0x20/0xc0 [ 13.495447] ? __pfx_kthread+0x10/0x10 [ 13.495466] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.495486] ? calculate_sigpending+0x7b/0xa0 [ 13.495509] ? __pfx_kthread+0x10/0x10 [ 13.495529] ret_from_fork+0x116/0x1d0 [ 13.495548] ? __pfx_kthread+0x10/0x10 [ 13.495568] ret_from_fork_asm+0x1a/0x30 [ 13.495597] </TASK> [ 13.495607] [ 13.504963] Allocated by task 287: [ 13.505140] kasan_save_stack+0x45/0x70 [ 13.505382] kasan_save_track+0x18/0x40 [ 13.505553] kasan_save_alloc_info+0x3b/0x50 [ 13.505694] __kasan_kmalloc+0xb7/0xc0 [ 13.505851] __kmalloc_cache_noprof+0x189/0x420 [ 13.506063] kasan_bitops_generic+0x92/0x1c0 [ 13.506275] kunit_try_run_case+0x1a5/0x480 [ 13.506457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.506624] kthread+0x337/0x6f0 [ 13.506737] ret_from_fork+0x116/0x1d0 [ 13.507078] ret_from_fork_asm+0x1a/0x30 [ 13.507401] [ 13.507601] The buggy address belongs to the object at ffff8881028596c0 [ 13.507601] which belongs to the cache kmalloc-16 of size 16 [ 13.508091] The buggy address is located 8 bytes inside of [ 13.508091] allocated 9-byte region [ffff8881028596c0, ffff8881028596c9) [ 13.508505] [ 13.508569] The buggy address belongs to the physical page: [ 13.508739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859 [ 13.509306] flags: 0x200000000000000(node=0|zone=2) [ 13.509764] page_type: f5(slab) [ 13.509954] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.510317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.510701] page dumped because: kasan: bad access detected [ 13.510867] [ 13.510932] Memory state around the buggy address: [ 13.511114] ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.511595] ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.511887] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.512096] ^ [ 13.512539] ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.512889] ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.513138] ================================================================== [ 13.353680] ================================================================== [ 13.354599] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.354981] Write of size 8 at addr ffff8881028596c8 by task kunit_try_catch/287 [ 13.355251] [ 13.355355] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.355400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.355412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.355432] Call Trace: [ 13.355448] <TASK> [ 13.355463] dump_stack_lvl+0x73/0xb0 [ 13.355487] print_report+0xd1/0x650 [ 13.355507] ? __virt_addr_valid+0x1db/0x2d0 [ 13.355528] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.355553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.355578] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.355605] kasan_report+0x141/0x180 [ 13.355625] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.355655] kasan_check_range+0x10c/0x1c0 [ 13.355678] __kasan_check_write+0x18/0x20 [ 13.355699] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.355725] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.355753] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.355776] ? trace_hardirqs_on+0x37/0xe0 [ 13.355798] ? kasan_bitops_generic+0x92/0x1c0 [ 13.355822] kasan_bitops_generic+0x121/0x1c0 [ 13.355845] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.355868] ? __pfx_read_tsc+0x10/0x10 [ 13.355888] ? ktime_get_ts64+0x86/0x230 [ 13.355912] kunit_try_run_case+0x1a5/0x480 [ 13.355935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.355956] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.355977] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.355998] ? __kthread_parkme+0x82/0x180 [ 13.356018] ? preempt_count_sub+0x50/0x80 [ 13.356040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.356063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.356085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.356106] kthread+0x337/0x6f0 [ 13.356125] ? trace_preempt_on+0x20/0xc0 [ 13.356145] ? __pfx_kthread+0x10/0x10 [ 13.356165] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.356185] ? calculate_sigpending+0x7b/0xa0 [ 13.356226] ? __pfx_kthread+0x10/0x10 [ 13.356247] ret_from_fork+0x116/0x1d0 [ 13.356266] ? __pfx_kthread+0x10/0x10 [ 13.356296] ret_from_fork_asm+0x1a/0x30 [ 13.356325] </TASK> [ 13.356335] [ 13.365619] Allocated by task 287: [ 13.365819] kasan_save_stack+0x45/0x70 [ 13.365967] kasan_save_track+0x18/0x40 [ 13.366149] kasan_save_alloc_info+0x3b/0x50 [ 13.366391] __kasan_kmalloc+0xb7/0xc0 [ 13.366572] __kmalloc_cache_noprof+0x189/0x420 [ 13.366826] kasan_bitops_generic+0x92/0x1c0 [ 13.367059] kunit_try_run_case+0x1a5/0x480 [ 13.367377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.367725] kthread+0x337/0x6f0 [ 13.367848] ret_from_fork+0x116/0x1d0 [ 13.367973] ret_from_fork_asm+0x1a/0x30 [ 13.368103] [ 13.368166] The buggy address belongs to the object at ffff8881028596c0 [ 13.368166] which belongs to the cache kmalloc-16 of size 16 [ 13.368774] The buggy address is located 8 bytes inside of [ 13.368774] allocated 9-byte region [ffff8881028596c0, ffff8881028596c9) [ 13.369277] [ 13.369343] The buggy address belongs to the physical page: [ 13.369510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102859 [ 13.370335] flags: 0x200000000000000(node=0|zone=2) [ 13.370795] page_type: f5(slab) [ 13.370974] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 13.371319] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.371741] page dumped because: kasan: bad access detected [ 13.371985] [ 13.372088] Memory state around the buggy address: [ 13.372312] ffff888102859580: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.372676] ffff888102859600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.372889] >ffff888102859680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.373125] ^ [ 13.373385] ffff888102859700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.373691] ffff888102859780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.374316] ==================================================================