Date
June 24, 2025, 11:37 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 56.742582] ================================================================== [ 56.749893] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 56.758958] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 56.766361] [ 56.767887] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 56.767917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.767924] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.767936] Call trace: [ 56.767943] show_stack+0x20/0x38 (C) [ 56.767961] dump_stack_lvl+0x8c/0xd0 [ 56.767978] print_report+0x118/0x608 [ 56.767997] kasan_report+0xdc/0x128 [ 56.768016] __asan_report_load8_noabort+0x20/0x30 [ 56.768032] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 56.768053] kasan_bitops_generic+0x11c/0x1c8 [ 56.768072] kunit_try_run_case+0x170/0x3f0 [ 56.768090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.768113] kthread+0x328/0x630 [ 56.768127] ret_from_fork+0x10/0x20 [ 56.768144] [ 56.840129] Allocated by task 359: [ 56.843585] kasan_save_stack+0x3c/0x68 [ 56.847483] kasan_save_track+0x20/0x40 [ 56.851379] kasan_save_alloc_info+0x40/0x58 [ 56.855718] __kasan_kmalloc+0xd4/0xd8 [ 56.859527] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.864128] kasan_bitops_generic+0xa0/0x1c8 [ 56.868469] kunit_try_run_case+0x170/0x3f0 [ 56.872724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.878292] kthread+0x328/0x630 [ 56.881577] ret_from_fork+0x10/0x20 [ 56.885211] [ 56.886735] The buggy address belongs to the object at ffff000080b08100 [ 56.886735] which belongs to the cache kmalloc-16 of size 16 [ 56.899213] The buggy address is located 8 bytes inside of [ 56.899213] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 56.911607] [ 56.913131] The buggy address belongs to the physical page: [ 56.918776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 56.926881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.933489] page_type: f5(slab) [ 56.936688] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.944523] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.952356] page dumped because: kasan: bad access detected [ 56.958001] [ 56.959525] Memory state around the buggy address: [ 56.964381] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 56.971692] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.979004] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.986313] ^ [ 56.989855] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.997167] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.004477] ================================================================== [ 54.847139] ================================================================== [ 54.854449] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 54.863514] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 54.870915] [ 54.872440] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 54.872468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.872476] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.872485] Call trace: [ 54.872491] show_stack+0x20/0x38 (C) [ 54.872508] dump_stack_lvl+0x8c/0xd0 [ 54.872525] print_report+0x118/0x608 [ 54.872543] kasan_report+0xdc/0x128 [ 54.872561] __asan_report_load8_noabort+0x20/0x30 [ 54.872578] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 54.872599] kasan_bitops_generic+0x11c/0x1c8 [ 54.872616] kunit_try_run_case+0x170/0x3f0 [ 54.872634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.872653] kthread+0x328/0x630 [ 54.872667] ret_from_fork+0x10/0x20 [ 54.872684] [ 54.944671] Allocated by task 359: [ 54.948126] kasan_save_stack+0x3c/0x68 [ 54.952025] kasan_save_track+0x20/0x40 [ 54.955922] kasan_save_alloc_info+0x40/0x58 [ 54.960260] __kasan_kmalloc+0xd4/0xd8 [ 54.964068] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.968671] kasan_bitops_generic+0xa0/0x1c8 [ 54.973011] kunit_try_run_case+0x170/0x3f0 [ 54.977263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.982833] kthread+0x328/0x630 [ 54.986118] ret_from_fork+0x10/0x20 [ 54.989754] [ 54.991277] The buggy address belongs to the object at ffff000080b08100 [ 54.991277] which belongs to the cache kmalloc-16 of size 16 [ 55.003754] The buggy address is located 8 bytes inside of [ 55.003754] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 55.016149] [ 55.017672] The buggy address belongs to the physical page: [ 55.023317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 55.031422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.038029] page_type: f5(slab) [ 55.041228] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.049065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.056896] page dumped because: kasan: bad access detected [ 55.062542] [ 55.064066] Memory state around the buggy address: [ 55.068921] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 55.076232] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.083545] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.090855] ^ [ 55.094398] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.101710] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.109018] ================================================================== [ 55.116380] ================================================================== [ 55.123692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 55.132758] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 55.140249] [ 55.141775] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 55.141804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.141813] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.141822] Call trace: [ 55.141829] show_stack+0x20/0x38 (C) [ 55.141846] dump_stack_lvl+0x8c/0xd0 [ 55.141863] print_report+0x118/0x608 [ 55.141882] kasan_report+0xdc/0x128 [ 55.141900] kasan_check_range+0x100/0x1a8 [ 55.141919] __kasan_check_write+0x20/0x30 [ 55.141934] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 55.141956] kasan_bitops_generic+0x11c/0x1c8 [ 55.141973] kunit_try_run_case+0x170/0x3f0 [ 55.141990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.142011] kthread+0x328/0x630 [ 55.142024] ret_from_fork+0x10/0x20 [ 55.142041] [ 55.217482] Allocated by task 359: [ 55.220938] kasan_save_stack+0x3c/0x68 [ 55.224838] kasan_save_track+0x20/0x40 [ 55.228734] kasan_save_alloc_info+0x40/0x58 [ 55.233074] __kasan_kmalloc+0xd4/0xd8 [ 55.236882] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.241484] kasan_bitops_generic+0xa0/0x1c8 [ 55.245824] kunit_try_run_case+0x170/0x3f0 [ 55.250077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.255646] kthread+0x328/0x630 [ 55.258932] ret_from_fork+0x10/0x20 [ 55.262566] [ 55.264089] The buggy address belongs to the object at ffff000080b08100 [ 55.264089] which belongs to the cache kmalloc-16 of size 16 [ 55.276566] The buggy address is located 8 bytes inside of [ 55.276566] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 55.288959] [ 55.290483] The buggy address belongs to the physical page: [ 55.296128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 55.304235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.310841] page_type: f5(slab) [ 55.314040] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.321875] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.329706] page dumped because: kasan: bad access detected [ 55.335352] [ 55.336875] Memory state around the buggy address: [ 55.341731] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 55.349042] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.356353] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.363662] ^ [ 55.367205] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.374515] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.381824] ================================================================== [ 55.389199] ================================================================== [ 55.396508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 55.405573] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 55.412973] [ 55.414500] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 55.414530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.414537] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.414548] Call trace: [ 55.414554] show_stack+0x20/0x38 (C) [ 55.414572] dump_stack_lvl+0x8c/0xd0 [ 55.414591] print_report+0x118/0x608 [ 55.414609] kasan_report+0xdc/0x128 [ 55.414627] __asan_report_load8_noabort+0x20/0x30 [ 55.414644] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 55.414665] kasan_bitops_generic+0x11c/0x1c8 [ 55.414683] kunit_try_run_case+0x170/0x3f0 [ 55.414702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.414724] kthread+0x328/0x630 [ 55.414737] ret_from_fork+0x10/0x20 [ 55.414754] [ 55.486741] Allocated by task 359: [ 55.490197] kasan_save_stack+0x3c/0x68 [ 55.494096] kasan_save_track+0x20/0x40 [ 55.497993] kasan_save_alloc_info+0x40/0x58 [ 55.502331] __kasan_kmalloc+0xd4/0xd8 [ 55.506139] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.510739] kasan_bitops_generic+0xa0/0x1c8 [ 55.515081] kunit_try_run_case+0x170/0x3f0 [ 55.519334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.524902] kthread+0x328/0x630 [ 55.528188] ret_from_fork+0x10/0x20 [ 55.531822] [ 55.533346] The buggy address belongs to the object at ffff000080b08100 [ 55.533346] which belongs to the cache kmalloc-16 of size 16 [ 55.545824] The buggy address is located 8 bytes inside of [ 55.545824] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 55.558218] [ 55.559741] The buggy address belongs to the physical page: [ 55.565386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 55.573491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.580099] page_type: f5(slab) [ 55.583298] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.591135] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.598966] page dumped because: kasan: bad access detected [ 55.604612] [ 55.606135] Memory state around the buggy address: [ 55.610990] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 55.618303] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.625615] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.632924] ^ [ 55.636468] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.643779] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.651089] ================================================================== [ 55.658452] ================================================================== [ 55.665763] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 55.674829] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 55.682316] [ 55.683842] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 55.683871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.683879] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.683891] Call trace: [ 55.683897] show_stack+0x20/0x38 (C) [ 55.683915] dump_stack_lvl+0x8c/0xd0 [ 55.683934] print_report+0x118/0x608 [ 55.683952] kasan_report+0xdc/0x128 [ 55.683970] kasan_check_range+0x100/0x1a8 [ 55.683990] __kasan_check_write+0x20/0x30 [ 55.684006] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 55.684028] kasan_bitops_generic+0x11c/0x1c8 [ 55.684047] kunit_try_run_case+0x170/0x3f0 [ 55.684064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.684086] kthread+0x328/0x630 [ 55.684100] ret_from_fork+0x10/0x20 [ 55.684117] [ 55.759555] Allocated by task 359: [ 55.763011] kasan_save_stack+0x3c/0x68 [ 55.766910] kasan_save_track+0x20/0x40 [ 55.770809] kasan_save_alloc_info+0x40/0x58 [ 55.775147] __kasan_kmalloc+0xd4/0xd8 [ 55.778956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.783557] kasan_bitops_generic+0xa0/0x1c8 [ 55.787897] kunit_try_run_case+0x170/0x3f0 [ 55.792150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.797719] kthread+0x328/0x630 [ 55.801004] ret_from_fork+0x10/0x20 [ 55.804638] [ 55.806161] The buggy address belongs to the object at ffff000080b08100 [ 55.806161] which belongs to the cache kmalloc-16 of size 16 [ 55.818639] The buggy address is located 8 bytes inside of [ 55.818639] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 55.831032] [ 55.832555] The buggy address belongs to the physical page: [ 55.838200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 55.846305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.852911] page_type: f5(slab) [ 55.856110] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.863945] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.871776] page dumped because: kasan: bad access detected [ 55.877421] [ 55.878943] Memory state around the buggy address: [ 55.883796] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 55.891108] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.898420] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.905729] ^ [ 55.909272] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.916583] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.923892] ================================================================== [ 56.200509] ================================================================== [ 56.207821] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 56.216885] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 56.224374] [ 56.225898] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 56.225927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.225936] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.225945] Call trace: [ 56.225953] show_stack+0x20/0x38 (C) [ 56.225970] dump_stack_lvl+0x8c/0xd0 [ 56.225988] print_report+0x118/0x608 [ 56.226006] kasan_report+0xdc/0x128 [ 56.226024] kasan_check_range+0x100/0x1a8 [ 56.226043] __kasan_check_write+0x20/0x30 [ 56.226060] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 56.226080] kasan_bitops_generic+0x11c/0x1c8 [ 56.226099] kunit_try_run_case+0x170/0x3f0 [ 56.226116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.226136] kthread+0x328/0x630 [ 56.226150] ret_from_fork+0x10/0x20 [ 56.226166] [ 56.301605] Allocated by task 359: [ 56.305061] kasan_save_stack+0x3c/0x68 [ 56.308961] kasan_save_track+0x20/0x40 [ 56.312859] kasan_save_alloc_info+0x40/0x58 [ 56.317196] __kasan_kmalloc+0xd4/0xd8 [ 56.321005] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.325605] kasan_bitops_generic+0xa0/0x1c8 [ 56.329947] kunit_try_run_case+0x170/0x3f0 [ 56.334200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.339770] kthread+0x328/0x630 [ 56.343055] ret_from_fork+0x10/0x20 [ 56.346690] [ 56.348212] The buggy address belongs to the object at ffff000080b08100 [ 56.348212] which belongs to the cache kmalloc-16 of size 16 [ 56.360689] The buggy address is located 8 bytes inside of [ 56.360689] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 56.373084] [ 56.374607] The buggy address belongs to the physical page: [ 56.380251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 56.388359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.394966] page_type: f5(slab) [ 56.398166] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.406002] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.413834] page dumped because: kasan: bad access detected [ 56.419481] [ 56.421003] Memory state around the buggy address: [ 56.425858] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 56.433171] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.440482] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.447793] ^ [ 56.451335] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.458645] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.465956] ================================================================== [ 56.473329] ================================================================== [ 56.480638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 56.489704] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 56.497104] [ 56.498629] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 56.498657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.498666] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.498677] Call trace: [ 56.498684] show_stack+0x20/0x38 (C) [ 56.498700] dump_stack_lvl+0x8c/0xd0 [ 56.498719] print_report+0x118/0x608 [ 56.498737] kasan_report+0xdc/0x128 [ 56.498755] __asan_report_load8_noabort+0x20/0x30 [ 56.498771] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 56.498793] kasan_bitops_generic+0x11c/0x1c8 [ 56.498811] kunit_try_run_case+0x170/0x3f0 [ 56.498829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.498849] kthread+0x328/0x630 [ 56.498863] ret_from_fork+0x10/0x20 [ 56.498880] [ 56.570868] Allocated by task 359: [ 56.574323] kasan_save_stack+0x3c/0x68 [ 56.578221] kasan_save_track+0x20/0x40 [ 56.582120] kasan_save_alloc_info+0x40/0x58 [ 56.586459] __kasan_kmalloc+0xd4/0xd8 [ 56.590268] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.594870] kasan_bitops_generic+0xa0/0x1c8 [ 56.599210] kunit_try_run_case+0x170/0x3f0 [ 56.603463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.609032] kthread+0x328/0x630 [ 56.612317] ret_from_fork+0x10/0x20 [ 56.615952] [ 56.617475] The buggy address belongs to the object at ffff000080b08100 [ 56.617475] which belongs to the cache kmalloc-16 of size 16 [ 56.629953] The buggy address is located 8 bytes inside of [ 56.629953] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 56.642347] [ 56.643870] The buggy address belongs to the physical page: [ 56.649516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 56.657623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.664230] page_type: f5(slab) [ 56.667428] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.675265] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.683096] page dumped because: kasan: bad access detected [ 56.688742] [ 56.690265] Memory state around the buggy address: [ 56.695122] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 56.702434] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.709747] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.717057] ^ [ 56.720600] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.727912] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.735221] ================================================================== [ 54.574492] ================================================================== [ 54.581803] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 54.590783] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 54.598270] [ 54.599796] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 54.599826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.599833] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.599843] Call trace: [ 54.599850] show_stack+0x20/0x38 (C) [ 54.599866] dump_stack_lvl+0x8c/0xd0 [ 54.599884] print_report+0x118/0x608 [ 54.599902] kasan_report+0xdc/0x128 [ 54.599921] kasan_check_range+0x100/0x1a8 [ 54.599942] __kasan_check_write+0x20/0x30 [ 54.599958] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 54.599979] kasan_bitops_generic+0x11c/0x1c8 [ 54.599998] kunit_try_run_case+0x170/0x3f0 [ 54.600016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.600037] kthread+0x328/0x630 [ 54.600051] ret_from_fork+0x10/0x20 [ 54.600069] [ 54.675422] Allocated by task 359: [ 54.678877] kasan_save_stack+0x3c/0x68 [ 54.682776] kasan_save_track+0x20/0x40 [ 54.686674] kasan_save_alloc_info+0x40/0x58 [ 54.691012] __kasan_kmalloc+0xd4/0xd8 [ 54.694822] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.699424] kasan_bitops_generic+0xa0/0x1c8 [ 54.703764] kunit_try_run_case+0x170/0x3f0 [ 54.708016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.713585] kthread+0x328/0x630 [ 54.716871] ret_from_fork+0x10/0x20 [ 54.720506] [ 54.722029] The buggy address belongs to the object at ffff000080b08100 [ 54.722029] which belongs to the cache kmalloc-16 of size 16 [ 54.734506] The buggy address is located 8 bytes inside of [ 54.734506] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 54.746900] [ 54.748423] The buggy address belongs to the physical page: [ 54.754068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 54.762173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.768780] page_type: f5(slab) [ 54.771979] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.779814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.787645] page dumped because: kasan: bad access detected [ 54.793292] [ 54.794814] Memory state around the buggy address: [ 54.799669] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 54.806980] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.814292] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.821602] ^ [ 54.825147] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.832457] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.839765] ================================================================== [ 55.931265] ================================================================== [ 55.938574] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 55.947638] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 55.955040] [ 55.956565] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 55.956594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.956602] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.956612] Call trace: [ 55.956618] show_stack+0x20/0x38 (C) [ 55.956635] dump_stack_lvl+0x8c/0xd0 [ 55.956652] print_report+0x118/0x608 [ 55.956670] kasan_report+0xdc/0x128 [ 55.956688] __asan_report_load8_noabort+0x20/0x30 [ 55.956704] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 55.956725] kasan_bitops_generic+0x11c/0x1c8 [ 55.956743] kunit_try_run_case+0x170/0x3f0 [ 55.956761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.956781] kthread+0x328/0x630 [ 55.956796] ret_from_fork+0x10/0x20 [ 55.956812] [ 56.028796] Allocated by task 359: [ 56.032252] kasan_save_stack+0x3c/0x68 [ 56.036150] kasan_save_track+0x20/0x40 [ 56.040047] kasan_save_alloc_info+0x40/0x58 [ 56.044386] __kasan_kmalloc+0xd4/0xd8 [ 56.048195] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.052796] kasan_bitops_generic+0xa0/0x1c8 [ 56.057137] kunit_try_run_case+0x170/0x3f0 [ 56.061390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.066960] kthread+0x328/0x630 [ 56.070247] ret_from_fork+0x10/0x20 [ 56.073881] [ 56.075404] The buggy address belongs to the object at ffff000080b08100 [ 56.075404] which belongs to the cache kmalloc-16 of size 16 [ 56.087884] The buggy address is located 8 bytes inside of [ 56.087884] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 56.100278] [ 56.101802] The buggy address belongs to the physical page: [ 56.107447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 56.115553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.122162] page_type: f5(slab) [ 56.125362] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.133198] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.141031] page dumped because: kasan: bad access detected [ 56.146677] [ 56.148199] Memory state around the buggy address: [ 56.153054] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 56.160365] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.167675] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.174984] ^ [ 56.178527] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.185840] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.193149] ==================================================================
[ 36.505933] ================================================================== [ 36.506000] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 36.506064] Write of size 8 at addr fff00000c5757348 by task kunit_try_catch/272 [ 36.506128] [ 36.506166] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 36.506347] Call trace: [ 36.506696] __kasan_check_write+0x20/0x30 [ 36.506755] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 36.506826] kasan_bitops_generic+0x11c/0x1c8 [ 36.506912] kunit_try_run_case+0x170/0x3f0 [ 36.507186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.507597] kthread+0x328/0x630 [ 36.507714] ret_from_fork+0x10/0x20 [ 36.507851] [ 36.507925] Allocated by task 272: [ 36.508004] kasan_save_stack+0x3c/0x68 [ 36.508109] kasan_save_track+0x20/0x40 [ 36.508267] kasan_save_alloc_info+0x40/0x58 [ 36.508375] __kasan_kmalloc+0xd4/0xd8 [ 36.508637] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.508747] kasan_bitops_generic+0xa0/0x1c8 [ 36.508847] kunit_try_run_case+0x170/0x3f0 [ 36.508993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.509124] kthread+0x328/0x630 [ 36.509535] The buggy address belongs to the object at fff00000c5757340 [ 36.509535] which belongs to the cache kmalloc-16 of size 16 [ 36.511569] fff00000c5757280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.513334] ==================================================================
[ 32.209220] ================================================================== [ 32.209771] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 32.210899] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 32.211498] [ 32.212304] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 32.212374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.212391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.212416] Call Trace: [ 32.212438] <TASK> [ 32.212460] dump_stack_lvl+0x73/0xb0 [ 32.212508] print_report+0xd1/0x650 [ 32.212564] ? __virt_addr_valid+0x1db/0x2d0 [ 32.212599] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 32.212661] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.212702] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 32.212738] kasan_report+0x141/0x180 [ 32.212768] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 32.212808] kasan_check_range+0x10c/0x1c0 [ 32.212839] __kasan_check_write+0x18/0x20 [ 32.212870] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 32.212906] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.212942] ? __kmalloc_cache_noprof+0x189/0x420 [ 32.212974] ? trace_hardirqs_on+0x37/0xe0 [ 32.213004] ? kasan_bitops_generic+0x92/0x1c0 [ 32.213039] kasan_bitops_generic+0x121/0x1c0 [ 32.213069] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.213101] ? __pfx_read_tsc+0x10/0x10 [ 32.213130] ? ktime_get_ts64+0x86/0x230 [ 32.213162] kunit_try_run_case+0x1a5/0x480 [ 32.213195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.213224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.213257] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.213291] ? __kthread_parkme+0x82/0x180 [ 32.213319] ? preempt_count_sub+0x50/0x80 [ 32.213351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.213382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.213413] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.213443] kthread+0x337/0x6f0 [ 32.213469] ? trace_preempt_on+0x20/0xc0 [ 32.213498] ? __pfx_kthread+0x10/0x10 [ 32.213525] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.213574] ? calculate_sigpending+0x7b/0xa0 [ 32.213605] ? __pfx_kthread+0x10/0x10 [ 32.213643] ret_from_fork+0x116/0x1d0 [ 32.213683] ? __pfx_kthread+0x10/0x10 [ 32.213712] ret_from_fork_asm+0x1a/0x30 [ 32.213752] </TASK> [ 32.213767] [ 32.229375] Allocated by task 291: [ 32.229759] kasan_save_stack+0x45/0x70 [ 32.230282] kasan_save_track+0x18/0x40 [ 32.230765] kasan_save_alloc_info+0x3b/0x50 [ 32.231188] __kasan_kmalloc+0xb7/0xc0 [ 32.231601] __kmalloc_cache_noprof+0x189/0x420 [ 32.232312] kasan_bitops_generic+0x92/0x1c0 [ 32.232689] kunit_try_run_case+0x1a5/0x480 [ 32.233007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.233525] kthread+0x337/0x6f0 [ 32.233969] ret_from_fork+0x116/0x1d0 [ 32.234509] ret_from_fork_asm+0x1a/0x30 [ 32.234947] [ 32.235178] The buggy address belongs to the object at ffff8881010ffca0 [ 32.235178] which belongs to the cache kmalloc-16 of size 16 [ 32.236173] The buggy address is located 8 bytes inside of [ 32.236173] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.236901] [ 32.237044] The buggy address belongs to the physical page: [ 32.237321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.238152] flags: 0x200000000000000(node=0|zone=2) [ 32.238763] page_type: f5(slab) [ 32.239108] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.239883] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.240572] page dumped because: kasan: bad access detected [ 32.241047] [ 32.241212] Memory state around the buggy address: [ 32.241674] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.242264] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.242903] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.243250] ^ [ 32.243878] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.245049] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.245573] ================================================================== [ 32.246801] ================================================================== [ 32.247385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 32.248214] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 32.248987] [ 32.249294] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 32.249452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.249489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.249573] Call Trace: [ 32.249619] <TASK> [ 32.249693] dump_stack_lvl+0x73/0xb0 [ 32.249829] print_report+0xd1/0x650 [ 32.249896] ? __virt_addr_valid+0x1db/0x2d0 [ 32.249959] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 32.250069] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.250165] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 32.250253] kasan_report+0x141/0x180 [ 32.250305] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 32.250348] kasan_check_range+0x10c/0x1c0 [ 32.250380] __kasan_check_write+0x18/0x20 [ 32.250412] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 32.250447] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.250484] ? __kmalloc_cache_noprof+0x189/0x420 [ 32.250517] ? trace_hardirqs_on+0x37/0xe0 [ 32.250567] ? kasan_bitops_generic+0x92/0x1c0 [ 32.250603] kasan_bitops_generic+0x121/0x1c0 [ 32.250653] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.250691] ? __pfx_read_tsc+0x10/0x10 [ 32.250721] ? ktime_get_ts64+0x86/0x230 [ 32.250753] kunit_try_run_case+0x1a5/0x480 [ 32.250787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.250818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.250852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.250887] ? __kthread_parkme+0x82/0x180 [ 32.250915] ? preempt_count_sub+0x50/0x80 [ 32.250946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.250979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.251011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.251043] kthread+0x337/0x6f0 [ 32.251069] ? trace_preempt_on+0x20/0xc0 [ 32.251098] ? __pfx_kthread+0x10/0x10 [ 32.251125] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.251155] ? calculate_sigpending+0x7b/0xa0 [ 32.251186] ? __pfx_kthread+0x10/0x10 [ 32.251214] ret_from_fork+0x116/0x1d0 [ 32.251240] ? __pfx_kthread+0x10/0x10 [ 32.251267] ret_from_fork_asm+0x1a/0x30 [ 32.251306] </TASK> [ 32.251320] [ 32.268244] Allocated by task 291: [ 32.268709] kasan_save_stack+0x45/0x70 [ 32.269189] kasan_save_track+0x18/0x40 [ 32.269618] kasan_save_alloc_info+0x3b/0x50 [ 32.270079] __kasan_kmalloc+0xb7/0xc0 [ 32.270500] __kmalloc_cache_noprof+0x189/0x420 [ 32.271064] kasan_bitops_generic+0x92/0x1c0 [ 32.271459] kunit_try_run_case+0x1a5/0x480 [ 32.271806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.272295] kthread+0x337/0x6f0 [ 32.273095] ret_from_fork+0x116/0x1d0 [ 32.273317] ret_from_fork_asm+0x1a/0x30 [ 32.274033] [ 32.274247] The buggy address belongs to the object at ffff8881010ffca0 [ 32.274247] which belongs to the cache kmalloc-16 of size 16 [ 32.275191] The buggy address is located 8 bytes inside of [ 32.275191] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.275948] [ 32.276158] The buggy address belongs to the physical page: [ 32.276842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.277301] flags: 0x200000000000000(node=0|zone=2) [ 32.277655] page_type: f5(slab) [ 32.277879] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.278452] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.279161] page dumped because: kasan: bad access detected [ 32.279587] [ 32.279802] Memory state around the buggy address: [ 32.280290] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.280664] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.281295] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.281811] ^ [ 32.282671] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.283371] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.283727] ================================================================== [ 32.285083] ================================================================== [ 32.286167] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 32.286701] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 32.287077] [ 32.287266] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 32.287607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.287711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.287793] Call Trace: [ 32.287845] <TASK> [ 32.287886] dump_stack_lvl+0x73/0xb0 [ 32.287959] print_report+0xd1/0x650 [ 32.288016] ? __virt_addr_valid+0x1db/0x2d0 [ 32.288078] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 32.288148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.288214] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 32.288304] kasan_report+0x141/0x180 [ 32.288368] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 32.288455] kasan_check_range+0x10c/0x1c0 [ 32.288522] __kasan_check_write+0x18/0x20 [ 32.288595] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 32.288661] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.288704] ? __kmalloc_cache_noprof+0x189/0x420 [ 32.288738] ? trace_hardirqs_on+0x37/0xe0 [ 32.288771] ? kasan_bitops_generic+0x92/0x1c0 [ 32.288806] kasan_bitops_generic+0x121/0x1c0 [ 32.288838] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.288870] ? __pfx_read_tsc+0x10/0x10 [ 32.288900] ? ktime_get_ts64+0x86/0x230 [ 32.288932] kunit_try_run_case+0x1a5/0x480 [ 32.288966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.288996] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.289029] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.289061] ? __kthread_parkme+0x82/0x180 [ 32.289089] ? preempt_count_sub+0x50/0x80 [ 32.289119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.289151] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.289183] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.289215] kthread+0x337/0x6f0 [ 32.289240] ? trace_preempt_on+0x20/0xc0 [ 32.289269] ? __pfx_kthread+0x10/0x10 [ 32.289297] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.289326] ? calculate_sigpending+0x7b/0xa0 [ 32.289357] ? __pfx_kthread+0x10/0x10 [ 32.289385] ret_from_fork+0x116/0x1d0 [ 32.289411] ? __pfx_kthread+0x10/0x10 [ 32.289438] ret_from_fork_asm+0x1a/0x30 [ 32.289478] </TASK> [ 32.289492] [ 32.303561] Allocated by task 291: [ 32.304052] kasan_save_stack+0x45/0x70 [ 32.304373] kasan_save_track+0x18/0x40 [ 32.304846] kasan_save_alloc_info+0x3b/0x50 [ 32.305297] __kasan_kmalloc+0xb7/0xc0 [ 32.305750] __kmalloc_cache_noprof+0x189/0x420 [ 32.306097] kasan_bitops_generic+0x92/0x1c0 [ 32.306580] kunit_try_run_case+0x1a5/0x480 [ 32.306991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.307437] kthread+0x337/0x6f0 [ 32.307763] ret_from_fork+0x116/0x1d0 [ 32.308202] ret_from_fork_asm+0x1a/0x30 [ 32.308611] [ 32.308857] The buggy address belongs to the object at ffff8881010ffca0 [ 32.308857] which belongs to the cache kmalloc-16 of size 16 [ 32.309529] The buggy address is located 8 bytes inside of [ 32.309529] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.310099] [ 32.310233] The buggy address belongs to the physical page: [ 32.310681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.311390] flags: 0x200000000000000(node=0|zone=2) [ 32.311914] page_type: f5(slab) [ 32.312251] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.312970] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.313689] page dumped because: kasan: bad access detected [ 32.314214] [ 32.314441] Memory state around the buggy address: [ 32.314963] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.315470] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.315953] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.316621] ^ [ 32.317121] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.317606] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.318149] ================================================================== [ 32.161306] ================================================================== [ 32.162973] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 32.163964] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 32.165457] [ 32.165922] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 32.166042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.166072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.166118] Call Trace: [ 32.166148] <TASK> [ 32.166181] dump_stack_lvl+0x73/0xb0 [ 32.166252] print_report+0xd1/0x650 [ 32.166286] ? __virt_addr_valid+0x1db/0x2d0 [ 32.166319] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 32.166355] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.166390] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 32.166425] kasan_report+0x141/0x180 [ 32.166454] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 32.166496] kasan_check_range+0x10c/0x1c0 [ 32.166527] __kasan_check_write+0x18/0x20 [ 32.166585] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 32.166622] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.166674] ? __kmalloc_cache_noprof+0x189/0x420 [ 32.166708] ? trace_hardirqs_on+0x37/0xe0 [ 32.166739] ? kasan_bitops_generic+0x92/0x1c0 [ 32.166774] kasan_bitops_generic+0x121/0x1c0 [ 32.166805] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.166837] ? __pfx_read_tsc+0x10/0x10 [ 32.166867] ? ktime_get_ts64+0x86/0x230 [ 32.166899] kunit_try_run_case+0x1a5/0x480 [ 32.166931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.166961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.166993] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.167027] ? __kthread_parkme+0x82/0x180 [ 32.167091] ? preempt_count_sub+0x50/0x80 [ 32.167160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.167202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.167237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.167270] kthread+0x337/0x6f0 [ 32.167297] ? trace_preempt_on+0x20/0xc0 [ 32.167328] ? __pfx_kthread+0x10/0x10 [ 32.167356] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.167387] ? calculate_sigpending+0x7b/0xa0 [ 32.167418] ? __pfx_kthread+0x10/0x10 [ 32.167447] ret_from_fork+0x116/0x1d0 [ 32.167473] ? __pfx_kthread+0x10/0x10 [ 32.167501] ret_from_fork_asm+0x1a/0x30 [ 32.167563] </TASK> [ 32.167580] [ 32.188180] Allocated by task 291: [ 32.188321] kasan_save_stack+0x45/0x70 [ 32.188469] kasan_save_track+0x18/0x40 [ 32.188992] kasan_save_alloc_info+0x3b/0x50 [ 32.189687] __kasan_kmalloc+0xb7/0xc0 [ 32.190530] __kmalloc_cache_noprof+0x189/0x420 [ 32.191079] kasan_bitops_generic+0x92/0x1c0 [ 32.191419] kunit_try_run_case+0x1a5/0x480 [ 32.192043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.192691] kthread+0x337/0x6f0 [ 32.192899] ret_from_fork+0x116/0x1d0 [ 32.193327] ret_from_fork_asm+0x1a/0x30 [ 32.193966] [ 32.194419] The buggy address belongs to the object at ffff8881010ffca0 [ 32.194419] which belongs to the cache kmalloc-16 of size 16 [ 32.195677] The buggy address is located 8 bytes inside of [ 32.195677] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.196881] [ 32.197123] The buggy address belongs to the physical page: [ 32.197435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.198159] flags: 0x200000000000000(node=0|zone=2) [ 32.199071] page_type: f5(slab) [ 32.199661] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.200391] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.201215] page dumped because: kasan: bad access detected [ 32.201696] [ 32.202342] Memory state around the buggy address: [ 32.202790] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.203496] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.204160] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.205097] ^ [ 32.205649] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.206204] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.206609] ================================================================== [ 32.355081] ================================================================== [ 32.355765] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 32.356351] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 32.357095] [ 32.357348] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 32.357488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.357525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.357587] Call Trace: [ 32.357658] <TASK> [ 32.357701] dump_stack_lvl+0x73/0xb0 [ 32.357788] print_report+0xd1/0x650 [ 32.357866] ? __virt_addr_valid+0x1db/0x2d0 [ 32.357929] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 32.357996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.358060] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 32.358160] kasan_report+0x141/0x180 [ 32.358224] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 32.358299] kasan_check_range+0x10c/0x1c0 [ 32.358360] __kasan_check_write+0x18/0x20 [ 32.358433] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 32.358524] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.358609] ? __kmalloc_cache_noprof+0x189/0x420 [ 32.358706] ? trace_hardirqs_on+0x37/0xe0 [ 32.358776] ? kasan_bitops_generic+0x92/0x1c0 [ 32.358864] kasan_bitops_generic+0x121/0x1c0 [ 32.358929] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.358988] ? __pfx_read_tsc+0x10/0x10 [ 32.359036] ? ktime_get_ts64+0x86/0x230 [ 32.359092] kunit_try_run_case+0x1a5/0x480 [ 32.359158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.359219] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.359284] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.359351] ? __kthread_parkme+0x82/0x180 [ 32.359411] ? preempt_count_sub+0x50/0x80 [ 32.359470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.359536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.359657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.359728] kthread+0x337/0x6f0 [ 32.359791] ? trace_preempt_on+0x20/0xc0 [ 32.359879] ? __pfx_kthread+0x10/0x10 [ 32.359939] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.360004] ? calculate_sigpending+0x7b/0xa0 [ 32.360070] ? __pfx_kthread+0x10/0x10 [ 32.360131] ret_from_fork+0x116/0x1d0 [ 32.360188] ? __pfx_kthread+0x10/0x10 [ 32.360248] ret_from_fork_asm+0x1a/0x30 [ 32.360332] </TASK> [ 32.360362] [ 32.378903] Allocated by task 291: [ 32.379266] kasan_save_stack+0x45/0x70 [ 32.379653] kasan_save_track+0x18/0x40 [ 32.380470] kasan_save_alloc_info+0x3b/0x50 [ 32.381660] __kasan_kmalloc+0xb7/0xc0 [ 32.381871] __kmalloc_cache_noprof+0x189/0x420 [ 32.382351] kasan_bitops_generic+0x92/0x1c0 [ 32.382841] kunit_try_run_case+0x1a5/0x480 [ 32.383256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.383741] kthread+0x337/0x6f0 [ 32.384361] ret_from_fork+0x116/0x1d0 [ 32.384780] ret_from_fork_asm+0x1a/0x30 [ 32.385456] [ 32.385610] The buggy address belongs to the object at ffff8881010ffca0 [ 32.385610] which belongs to the cache kmalloc-16 of size 16 [ 32.386945] The buggy address is located 8 bytes inside of [ 32.386945] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.387843] [ 32.388054] The buggy address belongs to the physical page: [ 32.388457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.388800] flags: 0x200000000000000(node=0|zone=2) [ 32.389478] page_type: f5(slab) [ 32.390241] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.390964] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.391353] page dumped because: kasan: bad access detected [ 32.392073] [ 32.392289] Memory state around the buggy address: [ 32.392657] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.393160] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.394244] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.394796] ^ [ 32.395202] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.395575] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.396219] ================================================================== [ 32.473406] ================================================================== [ 32.473876] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 32.474648] Read of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 32.475120] [ 32.475378] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 32.475492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.475524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.475594] Call Trace: [ 32.475667] <TASK> [ 32.475711] dump_stack_lvl+0x73/0xb0 [ 32.475787] print_report+0xd1/0x650 [ 32.475861] ? __virt_addr_valid+0x1db/0x2d0 [ 32.475927] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 32.475998] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.476078] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 32.476170] kasan_report+0x141/0x180 [ 32.476235] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 32.476323] __asan_report_load8_noabort+0x18/0x20 [ 32.476394] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 32.476469] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.476561] ? __kmalloc_cache_noprof+0x189/0x420 [ 32.476663] ? trace_hardirqs_on+0x37/0xe0 [ 32.476732] ? kasan_bitops_generic+0x92/0x1c0 [ 32.476807] kasan_bitops_generic+0x121/0x1c0 [ 32.476876] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.476945] ? __pfx_read_tsc+0x10/0x10 [ 32.476997] ? ktime_get_ts64+0x86/0x230 [ 32.477042] kunit_try_run_case+0x1a5/0x480 [ 32.477077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.477109] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.477144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.477179] ? __kthread_parkme+0x82/0x180 [ 32.477207] ? preempt_count_sub+0x50/0x80 [ 32.477238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.477270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.477302] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.477334] kthread+0x337/0x6f0 [ 32.477360] ? trace_preempt_on+0x20/0xc0 [ 32.477390] ? __pfx_kthread+0x10/0x10 [ 32.477418] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.477447] ? calculate_sigpending+0x7b/0xa0 [ 32.477480] ? __pfx_kthread+0x10/0x10 [ 32.477508] ret_from_fork+0x116/0x1d0 [ 32.477533] ? __pfx_kthread+0x10/0x10 [ 32.477585] ret_from_fork_asm+0x1a/0x30 [ 32.477642] </TASK> [ 32.477679] [ 32.491119] Allocated by task 291: [ 32.491371] kasan_save_stack+0x45/0x70 [ 32.491832] kasan_save_track+0x18/0x40 [ 32.492194] kasan_save_alloc_info+0x3b/0x50 [ 32.492516] __kasan_kmalloc+0xb7/0xc0 [ 32.492875] __kmalloc_cache_noprof+0x189/0x420 [ 32.493308] kasan_bitops_generic+0x92/0x1c0 [ 32.493747] kunit_try_run_case+0x1a5/0x480 [ 32.494077] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.494505] kthread+0x337/0x6f0 [ 32.494833] ret_from_fork+0x116/0x1d0 [ 32.495137] ret_from_fork_asm+0x1a/0x30 [ 32.495533] [ 32.495734] The buggy address belongs to the object at ffff8881010ffca0 [ 32.495734] which belongs to the cache kmalloc-16 of size 16 [ 32.496661] The buggy address is located 8 bytes inside of [ 32.496661] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.497437] [ 32.497692] The buggy address belongs to the physical page: [ 32.497973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.498354] flags: 0x200000000000000(node=0|zone=2) [ 32.498872] page_type: f5(slab) [ 32.499229] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.499961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.500454] page dumped because: kasan: bad access detected [ 32.500785] [ 32.500919] Memory state around the buggy address: [ 32.501167] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.501501] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.502177] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.502851] ^ [ 32.503277] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.503959] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.504514] ================================================================== [ 32.397628] ================================================================== [ 32.398387] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 32.399913] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 32.400286] [ 32.400435] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 32.400535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.400586] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.400638] Call Trace: [ 32.400680] <TASK> [ 32.400716] dump_stack_lvl+0x73/0xb0 [ 32.400763] print_report+0xd1/0x650 [ 32.400794] ? __virt_addr_valid+0x1db/0x2d0 [ 32.400827] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 32.400864] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.400898] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 32.400934] kasan_report+0x141/0x180 [ 32.400962] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 32.401003] kasan_check_range+0x10c/0x1c0 [ 32.401034] __kasan_check_write+0x18/0x20 [ 32.401064] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 32.401099] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.401135] ? __kmalloc_cache_noprof+0x189/0x420 [ 32.401166] ? trace_hardirqs_on+0x37/0xe0 [ 32.401196] ? kasan_bitops_generic+0x92/0x1c0 [ 32.401231] kasan_bitops_generic+0x121/0x1c0 [ 32.401261] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.401293] ? __pfx_read_tsc+0x10/0x10 [ 32.401321] ? ktime_get_ts64+0x86/0x230 [ 32.401352] kunit_try_run_case+0x1a5/0x480 [ 32.401386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.401416] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.401448] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.401480] ? __kthread_parkme+0x82/0x180 [ 32.401507] ? preempt_count_sub+0x50/0x80 [ 32.401570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.401653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.401719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.401877] kthread+0x337/0x6f0 [ 32.402148] ? trace_preempt_on+0x20/0xc0 [ 32.402252] ? __pfx_kthread+0x10/0x10 [ 32.402314] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.402379] ? calculate_sigpending+0x7b/0xa0 [ 32.402444] ? __pfx_kthread+0x10/0x10 [ 32.402504] ret_from_fork+0x116/0x1d0 [ 32.402570] ? __pfx_kthread+0x10/0x10 [ 32.402671] ret_from_fork_asm+0x1a/0x30 [ 32.402749] </TASK> [ 32.402768] [ 32.416704] Allocated by task 291: [ 32.417101] kasan_save_stack+0x45/0x70 [ 32.417516] kasan_save_track+0x18/0x40 [ 32.417977] kasan_save_alloc_info+0x3b/0x50 [ 32.418338] __kasan_kmalloc+0xb7/0xc0 [ 32.418598] __kmalloc_cache_noprof+0x189/0x420 [ 32.418909] kasan_bitops_generic+0x92/0x1c0 [ 32.419164] kunit_try_run_case+0x1a5/0x480 [ 32.419610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.420195] kthread+0x337/0x6f0 [ 32.420576] ret_from_fork+0x116/0x1d0 [ 32.421006] ret_from_fork_asm+0x1a/0x30 [ 32.421411] [ 32.421657] The buggy address belongs to the object at ffff8881010ffca0 [ 32.421657] which belongs to the cache kmalloc-16 of size 16 [ 32.422767] The buggy address is located 8 bytes inside of [ 32.422767] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.423521] [ 32.423788] The buggy address belongs to the physical page: [ 32.424175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.424574] flags: 0x200000000000000(node=0|zone=2) [ 32.425082] page_type: f5(slab) [ 32.425485] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.426234] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.426847] page dumped because: kasan: bad access detected [ 32.427134] [ 32.427261] Memory state around the buggy address: [ 32.427708] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.428382] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.429045] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.429507] ^ [ 32.429981] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.430444] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.431011] ================================================================== [ 32.434081] ================================================================== [ 32.434667] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 32.435355] Read of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 32.435950] [ 32.436224] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 32.436336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.436370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.436421] Call Trace: [ 32.436462] <TASK> [ 32.436502] dump_stack_lvl+0x73/0xb0 [ 32.436621] print_report+0xd1/0x650 [ 32.436723] ? __virt_addr_valid+0x1db/0x2d0 [ 32.436790] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 32.436858] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.436923] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 32.436991] kasan_report+0x141/0x180 [ 32.437053] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 32.437130] kasan_check_range+0x10c/0x1c0 [ 32.437203] __kasan_check_read+0x15/0x20 [ 32.437284] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 32.437363] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.437437] ? __kmalloc_cache_noprof+0x189/0x420 [ 32.437474] ? trace_hardirqs_on+0x37/0xe0 [ 32.437508] ? kasan_bitops_generic+0x92/0x1c0 [ 32.437563] kasan_bitops_generic+0x121/0x1c0 [ 32.437597] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.437662] ? __pfx_read_tsc+0x10/0x10 [ 32.437698] ? ktime_get_ts64+0x86/0x230 [ 32.437732] kunit_try_run_case+0x1a5/0x480 [ 32.437767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.437797] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.437830] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.437863] ? __kthread_parkme+0x82/0x180 [ 32.437890] ? preempt_count_sub+0x50/0x80 [ 32.437922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.437954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.437986] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.438018] kthread+0x337/0x6f0 [ 32.438044] ? trace_preempt_on+0x20/0xc0 [ 32.438074] ? __pfx_kthread+0x10/0x10 [ 32.438101] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.438131] ? calculate_sigpending+0x7b/0xa0 [ 32.438162] ? __pfx_kthread+0x10/0x10 [ 32.438190] ret_from_fork+0x116/0x1d0 [ 32.438215] ? __pfx_kthread+0x10/0x10 [ 32.438242] ret_from_fork_asm+0x1a/0x30 [ 32.438282] </TASK> [ 32.438297] [ 32.456609] Allocated by task 291: [ 32.456860] kasan_save_stack+0x45/0x70 [ 32.457331] kasan_save_track+0x18/0x40 [ 32.458285] kasan_save_alloc_info+0x3b/0x50 [ 32.458798] __kasan_kmalloc+0xb7/0xc0 [ 32.459077] __kmalloc_cache_noprof+0x189/0x420 [ 32.459569] kasan_bitops_generic+0x92/0x1c0 [ 32.460038] kunit_try_run_case+0x1a5/0x480 [ 32.460586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.460937] kthread+0x337/0x6f0 [ 32.461296] ret_from_fork+0x116/0x1d0 [ 32.461760] ret_from_fork_asm+0x1a/0x30 [ 32.462214] [ 32.462480] The buggy address belongs to the object at ffff8881010ffca0 [ 32.462480] which belongs to the cache kmalloc-16 of size 16 [ 32.463659] The buggy address is located 8 bytes inside of [ 32.463659] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.464378] [ 32.464636] The buggy address belongs to the physical page: [ 32.465145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.465669] flags: 0x200000000000000(node=0|zone=2) [ 32.466184] page_type: f5(slab) [ 32.466502] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.467453] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.467940] page dumped because: kasan: bad access detected [ 32.468488] [ 32.468732] Memory state around the buggy address: [ 32.469028] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.469721] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.470297] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.470809] ^ [ 32.471255] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.471838] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.472328] ================================================================== [ 32.319745] ================================================================== [ 32.320448] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 32.321316] Write of size 8 at addr ffff8881010ffca8 by task kunit_try_catch/291 [ 32.322046] [ 32.322282] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) [ 32.322395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.322425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.322485] Call Trace: [ 32.322556] <TASK> [ 32.322597] dump_stack_lvl+0x73/0xb0 [ 32.322716] print_report+0xd1/0x650 [ 32.322782] ? __virt_addr_valid+0x1db/0x2d0 [ 32.322842] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 32.322922] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.323008] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 32.323081] kasan_report+0x141/0x180 [ 32.323145] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 32.323225] kasan_check_range+0x10c/0x1c0 [ 32.323282] __kasan_check_write+0x18/0x20 [ 32.323331] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 32.323397] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.323466] ? __kmalloc_cache_noprof+0x189/0x420 [ 32.323534] ? trace_hardirqs_on+0x37/0xe0 [ 32.323620] ? kasan_bitops_generic+0x92/0x1c0 [ 32.323722] kasan_bitops_generic+0x121/0x1c0 [ 32.323785] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.323869] ? __pfx_read_tsc+0x10/0x10 [ 32.323950] ? ktime_get_ts64+0x86/0x230 [ 32.324012] kunit_try_run_case+0x1a5/0x480 [ 32.324078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.324148] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.324231] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.324292] ? __kthread_parkme+0x82/0x180 [ 32.324347] ? preempt_count_sub+0x50/0x80 [ 32.324405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.324469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.324562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.324658] kthread+0x337/0x6f0 [ 32.324715] ? trace_preempt_on+0x20/0xc0 [ 32.324771] ? __pfx_kthread+0x10/0x10 [ 32.324829] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.324900] ? calculate_sigpending+0x7b/0xa0 [ 32.324980] ? __pfx_kthread+0x10/0x10 [ 32.325039] ret_from_fork+0x116/0x1d0 [ 32.325090] ? __pfx_kthread+0x10/0x10 [ 32.325145] ret_from_fork_asm+0x1a/0x30 [ 32.325233] </TASK> [ 32.325280] [ 32.338786] Allocated by task 291: [ 32.339163] kasan_save_stack+0x45/0x70 [ 32.339598] kasan_save_track+0x18/0x40 [ 32.340032] kasan_save_alloc_info+0x3b/0x50 [ 32.340491] __kasan_kmalloc+0xb7/0xc0 [ 32.340963] __kmalloc_cache_noprof+0x189/0x420 [ 32.341402] kasan_bitops_generic+0x92/0x1c0 [ 32.341750] kunit_try_run_case+0x1a5/0x480 [ 32.342173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.342788] kthread+0x337/0x6f0 [ 32.343153] ret_from_fork+0x116/0x1d0 [ 32.343523] ret_from_fork_asm+0x1a/0x30 [ 32.343981] [ 32.344137] The buggy address belongs to the object at ffff8881010ffca0 [ 32.344137] which belongs to the cache kmalloc-16 of size 16 [ 32.344986] The buggy address is located 8 bytes inside of [ 32.344986] allocated 9-byte region [ffff8881010ffca0, ffff8881010ffca9) [ 32.345902] [ 32.346125] The buggy address belongs to the physical page: [ 32.346567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ff [ 32.347152] flags: 0x200000000000000(node=0|zone=2) [ 32.347595] page_type: f5(slab) [ 32.347863] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.348226] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.348610] page dumped because: kasan: bad access detected [ 32.349176] [ 32.349381] Memory state around the buggy address: [ 32.349884] ffff8881010ffb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.350512] ffff8881010ffc00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 32.351201] >ffff8881010ffc80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.351901] ^ [ 32.352304] ffff8881010ffd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.352958] ffff8881010ffd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.353432] ==================================================================