Date
June 25, 2025, 8:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.018346] ================================================================== [ 29.021001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 29.021261] Hardware name: linux,dummy-virt (DT) [ 29.021496] kasan_report+0xdc/0x128 [ 29.021710] kunit_try_run_case+0x170/0x3f0 [ 29.022034] kasan_save_track+0x20/0x40 [ 29.022194] kasan_bitops_generic+0xa0/0x1c8 [ 29.023218] [ 29.023407] page_type: f5(slab) [ 29.024151] [ 29.024760] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.024855] ^ [ 29.024961] fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.041626] ok 64 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 29.044386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 29.045534] Hardware name: linux,dummy-virt (DT) [ 29.045690] show_stack+0x20/0x38 (C) [ 29.046433] __asan_report_load4_noabort+0x20/0x30 [ 29.047089] kunit_try_run_case+0x170/0x3f0 [ 29.048571] __kasan_kmalloc+0xd4/0xd8 [ 29.049874] The buggy address is located 0 bytes to the right of [ 29.049874] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.050544] page_type: f5(slab) [ 29.051016] [ 29.051416] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.052554] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.054513] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.054572] [ 29.054870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.055073] Hardware name: linux,dummy-virt (DT) [ 29.055586] print_report+0x118/0x608 [ 29.056902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.057734] kasan_save_track+0x20/0x40 [ 29.059224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.060310] [ 29.060748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.061455] [ 29.061931] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.061976] ^ [ 29.062038] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.062138] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.062180] ================================================================== [ 28.989162] ================================================================== [ 28.989333] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 28.989485] Read of size 8 at addr fff00000c454c808 by task kunit_try_catch/273 [ 28.989539] [ 28.989587] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.989729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.989786] Hardware name: linux,dummy-virt (DT) [ 28.989820] Call trace: [ 28.989871] show_stack+0x20/0x38 (C) [ 28.989931] dump_stack_lvl+0x8c/0xd0 [ 28.990005] print_report+0x118/0x608 [ 28.990120] kasan_report+0xdc/0x128 [ 28.990215] __asan_report_load8_noabort+0x20/0x30 [ 28.990318] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 28.990377] kasan_bitops_generic+0x11c/0x1c8 [ 28.990437] kunit_try_run_case+0x170/0x3f0 [ 28.990606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.990773] kthread+0x328/0x630 [ 28.990899] ret_from_fork+0x10/0x20 [ 28.990989] [ 28.991087] Allocated by task 273: [ 28.991118] kasan_save_stack+0x3c/0x68 [ 28.991231] kasan_save_track+0x20/0x40 [ 28.991279] kasan_save_alloc_info+0x40/0x58 [ 28.991325] __kasan_kmalloc+0xd4/0xd8 [ 28.991484] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.991580] kasan_bitops_generic+0xa0/0x1c8 [ 28.991624] kunit_try_run_case+0x170/0x3f0 [ 28.991664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.991710] kthread+0x328/0x630 [ 28.991881] ret_from_fork+0x10/0x20 [ 28.992386] [ 28.992773] The buggy address belongs to the object at fff00000c454c800 [ 28.992773] which belongs to the cache kmalloc-16 of size 16 [ 28.992859] The buggy address is located 8 bytes inside of [ 28.992859] allocated 9-byte region [fff00000c454c800, fff00000c454c809) [ 28.992925] [ 28.992948] The buggy address belongs to the physical page: [ 28.992982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c [ 28.993257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.993439] page_type: f5(slab) [ 28.993549] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 28.993676] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.993779] page dumped because: kasan: bad access detected [ 28.993847] [ 28.993931] Memory state around the buggy address: [ 28.994008] fff00000c454c700: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 28.994107] fff00000c454c780: fa fb fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc [ 28.994168] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.994209] ^ [ 28.994274] fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.994640] fff00000c454c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.994748] ================================================================== [ 29.005354] ================================================================== [ 29.005422] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 29.005479] Write of size 8 at addr fff00000c454c808 by task kunit_try_catch/273 [ 29.005530] [ 29.005560] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.005649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.005727] Hardware name: linux,dummy-virt (DT) [ 29.005769] Call trace: [ 29.005795] show_stack+0x20/0x38 (C) [ 29.005845] dump_stack_lvl+0x8c/0xd0 [ 29.005894] print_report+0x118/0x608 [ 29.005941] kasan_report+0xdc/0x128 [ 29.005993] kasan_check_range+0x100/0x1a8 [ 29.006044] __kasan_check_write+0x20/0x30 [ 29.006090] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 29.006147] kasan_bitops_generic+0x11c/0x1c8 [ 29.006196] kunit_try_run_case+0x170/0x3f0 [ 29.006246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.006309] kthread+0x328/0x630 [ 29.006351] ret_from_fork+0x10/0x20 [ 29.006842] [ 29.006876] Allocated by task 273: [ 29.006909] kasan_save_stack+0x3c/0x68 [ 29.006963] kasan_save_track+0x20/0x40 [ 29.007126] kasan_save_alloc_info+0x40/0x58 [ 29.007240] __kasan_kmalloc+0xd4/0xd8 [ 29.007330] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.007374] kasan_bitops_generic+0xa0/0x1c8 [ 29.007587] kunit_try_run_case+0x170/0x3f0 [ 29.007702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.007777] kthread+0x328/0x630 [ 29.007813] ret_from_fork+0x10/0x20 [ 29.007857] [ 29.008047] The buggy address belongs to the object at fff00000c454c800 [ 29.008047] which belongs to the cache kmalloc-16 of size 16 [ 29.008153] The buggy address is located 8 bytes inside of [ 29.008153] allocated 9-byte region [fff00000c454c800, fff00000c454c809) [ 29.008246] [ 29.008370] The buggy address belongs to the physical page: [ 29.008431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c [ 29.008612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.008824] page_type: f5(slab) [ 29.008925] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.009037] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.009146] page dumped because: kasan: bad access detected [ 29.009509] [ 29.009607] Memory state around the buggy address: [ 29.009761] fff00000c454c700: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 29.009846] fff00000c454c780: fa fb fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc [ 29.009951] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.010139] ^ [ 29.010240] fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.010353] fff00000c454c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.010542] ================================================================== [ 29.000305] ================================================================== [ 29.000352] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 29.000447] Read of size 8 at addr fff00000c454c808 by task kunit_try_catch/273 [ 29.000500] [ 29.000590] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.000674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.000703] Hardware name: linux,dummy-virt (DT) [ 29.000735] Call trace: [ 29.000776] show_stack+0x20/0x38 (C) [ 29.000827] dump_stack_lvl+0x8c/0xd0 [ 29.000970] print_report+0x118/0x608 [ 29.001022] kasan_report+0xdc/0x128 [ 29.001068] __asan_report_load8_noabort+0x20/0x30 [ 29.001118] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 29.001175] kasan_bitops_generic+0x11c/0x1c8 [ 29.001234] kunit_try_run_case+0x170/0x3f0 [ 29.001285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.001340] kthread+0x328/0x630 [ 29.001381] ret_from_fork+0x10/0x20 [ 29.001442] [ 29.001511] Allocated by task 273: [ 29.001554] kasan_save_stack+0x3c/0x68 [ 29.001598] kasan_save_track+0x20/0x40 [ 29.001637] kasan_save_alloc_info+0x40/0x58 [ 29.001676] __kasan_kmalloc+0xd4/0xd8 [ 29.001712] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.001754] kasan_bitops_generic+0xa0/0x1c8 [ 29.001839] kunit_try_run_case+0x170/0x3f0 [ 29.001880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.001927] kthread+0x328/0x630 [ 29.002518] ret_from_fork+0x10/0x20 [ 29.002600] [ 29.002716] The buggy address belongs to the object at fff00000c454c800 [ 29.002716] which belongs to the cache kmalloc-16 of size 16 [ 29.003172] The buggy address is located 8 bytes inside of [ 29.003172] allocated 9-byte region [fff00000c454c800, fff00000c454c809) [ 29.003413] [ 29.003439] The buggy address belongs to the physical page: [ 29.003693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c [ 29.003758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.003869] page_type: f5(slab) [ 29.003982] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.004110] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.004155] page dumped because: kasan: bad access detected [ 29.004221] [ 29.004242] Memory state around the buggy address: [ 29.004277] fff00000c454c700: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 29.004343] fff00000c454c780: fa fb fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc [ 29.004415] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.004606] ^ [ 29.004653] fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.004701] fff00000c454c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.004820] ================================================================== [ 28.995167] ================================================================== [ 28.995414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 28.995478] Write of size 8 at addr fff00000c454c808 by task kunit_try_catch/273 [ 28.995529] [ 28.995561] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.995682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.995847] Hardware name: linux,dummy-virt (DT) [ 28.995893] Call trace: [ 28.995925] show_stack+0x20/0x38 (C) [ 28.995977] dump_stack_lvl+0x8c/0xd0 [ 28.996024] print_report+0x118/0x608 [ 28.996336] kasan_report+0xdc/0x128 [ 28.996451] kasan_check_range+0x100/0x1a8 [ 28.996538] __kasan_check_write+0x20/0x30 [ 28.996654] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 28.996715] kasan_bitops_generic+0x11c/0x1c8 [ 28.996789] kunit_try_run_case+0x170/0x3f0 [ 28.996840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.997031] kthread+0x328/0x630 [ 28.997078] ret_from_fork+0x10/0x20 [ 28.997139] [ 28.997160] Allocated by task 273: [ 28.997190] kasan_save_stack+0x3c/0x68 [ 28.997274] kasan_save_track+0x20/0x40 [ 28.997457] kasan_save_alloc_info+0x40/0x58 [ 28.997514] __kasan_kmalloc+0xd4/0xd8 [ 28.997557] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.997745] kasan_bitops_generic+0xa0/0x1c8 [ 28.997789] kunit_try_run_case+0x170/0x3f0 [ 28.997829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.997989] kthread+0x328/0x630 [ 28.998079] ret_from_fork+0x10/0x20 [ 28.998193] [ 28.998300] The buggy address belongs to the object at fff00000c454c800 [ 28.998300] which belongs to the cache kmalloc-16 of size 16 [ 28.998391] The buggy address is located 8 bytes inside of [ 28.998391] allocated 9-byte region [fff00000c454c800, fff00000c454c809) [ 28.998552] [ 28.998630] The buggy address belongs to the physical page: [ 28.998702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c [ 28.998790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.998881] page_type: f5(slab) [ 28.998936] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 28.999058] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.999144] page dumped because: kasan: bad access detected [ 28.999247] [ 28.999315] Memory state around the buggy address: [ 28.999348] fff00000c454c700: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 28.999515] fff00000c454c780: fa fb fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc [ 28.999563] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.999603] ^ [ 28.999889] fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.999938] fff00000c454c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.999980] ==================================================================
[ 24.178116] ================================================================== [ 24.178421] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.178772] Read of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 24.179297] [ 24.179392] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 24.179439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.179452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.179473] Call Trace: [ 24.179493] <TASK> [ 24.179511] dump_stack_lvl+0x73/0xb0 [ 24.179538] print_report+0xd1/0x650 [ 24.179558] ? __virt_addr_valid+0x1db/0x2d0 [ 24.179580] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.179605] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.179629] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.179655] kasan_report+0x141/0x180 [ 24.179675] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.179705] __asan_report_load8_noabort+0x18/0x20 [ 24.179728] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.179753] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.179786] kasan_bitops_generic+0x121/0x1c0 [ 24.179807] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.179829] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.179855] kunit_try_run_case+0x1a5/0x480 [ 24.179880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.179901] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.179922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.180014] ? __kthread_parkme+0x82/0x180 [ 24.180036] ? preempt_count_sub+0x50/0x80 [ 24.180059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.180082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.180104] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.180126] kthread+0x337/0x6f0 [ 24.180145] ? trace_preempt_on+0x20/0xc0 [ 24.180168] ? __pfx_kthread+0x10/0x10 [ 24.180187] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.180209] ? calculate_sigpending+0x7b/0xa0 [ 24.180231] ? __pfx_kthread+0x10/0x10 [ 24.180252] ret_from_fork+0x116/0x1d0 [ 24.180269] ? __pfx_kthread+0x10/0x10 [ 24.180289] ret_from_fork_asm+0x1a/0x30 [ 24.180317] </TASK> [ 24.180338] [ 24.188187] Allocated by task 290: [ 24.188369] kasan_save_stack+0x45/0x70 [ 24.188544] kasan_save_track+0x18/0x40 [ 24.188704] kasan_save_alloc_info+0x3b/0x50 [ 24.188856] __kasan_kmalloc+0xb7/0xc0 [ 24.188993] __kmalloc_cache_noprof+0x189/0x420 [ 24.189254] kasan_bitops_generic+0x92/0x1c0 [ 24.189455] kunit_try_run_case+0x1a5/0x480 [ 24.189688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.190279] kthread+0x337/0x6f0 [ 24.190455] ret_from_fork+0x116/0x1d0 [ 24.190625] ret_from_fork_asm+0x1a/0x30 [ 24.190756] [ 24.190824] The buggy address belongs to the object at ffff888102797f40 [ 24.190824] which belongs to the cache kmalloc-16 of size 16 [ 24.191560] The buggy address is located 8 bytes inside of [ 24.191560] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 24.191893] [ 24.191966] The buggy address belongs to the physical page: [ 24.192127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 24.192840] flags: 0x200000000000000(node=0|zone=2) [ 24.193197] page_type: f5(slab) [ 24.193317] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.193540] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.193756] page dumped because: kasan: bad access detected [ 24.193997] [ 24.194085] Memory state around the buggy address: [ 24.194306] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.194948] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.195422] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 24.195706] ^ [ 24.196000] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.196218] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.196431] ================================================================== [ 24.002156] ================================================================== [ 24.002886] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.003188] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 24.003405] [ 24.003491] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 24.003541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.003554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.003576] Call Trace: [ 24.003591] <TASK> [ 24.003609] dump_stack_lvl+0x73/0xb0 [ 24.003635] print_report+0xd1/0x650 [ 24.003656] ? __virt_addr_valid+0x1db/0x2d0 [ 24.003678] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.003703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.003728] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.003753] kasan_report+0x141/0x180 [ 24.003773] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.003802] kasan_check_range+0x10c/0x1c0 [ 24.003823] __kasan_check_write+0x18/0x20 [ 24.003845] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.003870] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.003902] kasan_bitops_generic+0x121/0x1c0 [ 24.003923] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.004241] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.004275] kunit_try_run_case+0x1a5/0x480 [ 24.004303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.004325] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.004351] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.004567] ? __kthread_parkme+0x82/0x180 [ 24.004591] ? preempt_count_sub+0x50/0x80 [ 24.004615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.004639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.004662] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.004684] kthread+0x337/0x6f0 [ 24.004702] ? trace_preempt_on+0x20/0xc0 [ 24.004728] ? __pfx_kthread+0x10/0x10 [ 24.004747] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.004769] ? calculate_sigpending+0x7b/0xa0 [ 24.004792] ? __pfx_kthread+0x10/0x10 [ 24.004885] ret_from_fork+0x116/0x1d0 [ 24.004909] ? __pfx_kthread+0x10/0x10 [ 24.004929] ret_from_fork_asm+0x1a/0x30 [ 24.004971] </TASK> [ 24.004982] [ 24.016376] Allocated by task 290: [ 24.016549] kasan_save_stack+0x45/0x70 [ 24.016737] kasan_save_track+0x18/0x40 [ 24.017411] kasan_save_alloc_info+0x3b/0x50 [ 24.017677] __kasan_kmalloc+0xb7/0xc0 [ 24.018165] __kmalloc_cache_noprof+0x189/0x420 [ 24.018376] kasan_bitops_generic+0x92/0x1c0 [ 24.018556] kunit_try_run_case+0x1a5/0x480 [ 24.018731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.019476] kthread+0x337/0x6f0 [ 24.019708] ret_from_fork+0x116/0x1d0 [ 24.020150] ret_from_fork_asm+0x1a/0x30 [ 24.020428] [ 24.020638] The buggy address belongs to the object at ffff888102797f40 [ 24.020638] which belongs to the cache kmalloc-16 of size 16 [ 24.021552] The buggy address is located 8 bytes inside of [ 24.021552] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 24.022381] [ 24.022480] The buggy address belongs to the physical page: [ 24.022704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 24.023582] flags: 0x200000000000000(node=0|zone=2) [ 24.024021] page_type: f5(slab) [ 24.024346] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.024660] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.025187] page dumped because: kasan: bad access detected [ 24.025422] [ 24.025507] Memory state around the buggy address: [ 24.025708] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.026552] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.027109] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 24.027405] ^ [ 24.027638] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.028364] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.028637] ================================================================== [ 24.158759] ================================================================== [ 24.160022] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.161093] Read of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 24.161362] [ 24.161450] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 24.161501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.161513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.161536] Call Trace: [ 24.161556] <TASK> [ 24.161575] dump_stack_lvl+0x73/0xb0 [ 24.161602] print_report+0xd1/0x650 [ 24.161623] ? __virt_addr_valid+0x1db/0x2d0 [ 24.161645] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.161671] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.161695] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.161720] kasan_report+0x141/0x180 [ 24.161740] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.161769] kasan_check_range+0x10c/0x1c0 [ 24.161791] __kasan_check_read+0x15/0x20 [ 24.161812] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.161837] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.161870] kasan_bitops_generic+0x121/0x1c0 [ 24.161892] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.161916] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.161952] kunit_try_run_case+0x1a5/0x480 [ 24.161978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.161999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.162020] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.162044] ? __kthread_parkme+0x82/0x180 [ 24.162063] ? preempt_count_sub+0x50/0x80 [ 24.162086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.162108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.162130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.162153] kthread+0x337/0x6f0 [ 24.162171] ? trace_preempt_on+0x20/0xc0 [ 24.162193] ? __pfx_kthread+0x10/0x10 [ 24.162212] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.162234] ? calculate_sigpending+0x7b/0xa0 [ 24.162256] ? __pfx_kthread+0x10/0x10 [ 24.162277] ret_from_fork+0x116/0x1d0 [ 24.162295] ? __pfx_kthread+0x10/0x10 [ 24.162314] ret_from_fork_asm+0x1a/0x30 [ 24.162343] </TASK> [ 24.162353] [ 24.169800] Allocated by task 290: [ 24.170164] kasan_save_stack+0x45/0x70 [ 24.170370] kasan_save_track+0x18/0x40 [ 24.170558] kasan_save_alloc_info+0x3b/0x50 [ 24.170760] __kasan_kmalloc+0xb7/0xc0 [ 24.171090] __kmalloc_cache_noprof+0x189/0x420 [ 24.171309] kasan_bitops_generic+0x92/0x1c0 [ 24.171482] kunit_try_run_case+0x1a5/0x480 [ 24.171622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.171786] kthread+0x337/0x6f0 [ 24.171898] ret_from_fork+0x116/0x1d0 [ 24.172088] ret_from_fork_asm+0x1a/0x30 [ 24.172355] [ 24.172488] The buggy address belongs to the object at ffff888102797f40 [ 24.172488] which belongs to the cache kmalloc-16 of size 16 [ 24.172868] The buggy address is located 8 bytes inside of [ 24.172868] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 24.173265] [ 24.173350] The buggy address belongs to the physical page: [ 24.173597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 24.173961] flags: 0x200000000000000(node=0|zone=2) [ 24.174196] page_type: f5(slab) [ 24.174533] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.175175] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.175471] page dumped because: kasan: bad access detected [ 24.175697] [ 24.175777] Memory state around the buggy address: [ 24.176024] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.176237] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.176481] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 24.176790] ^ [ 24.177047] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.177366] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.177642] ================================================================== [ 24.102648] ================================================================== [ 24.103269] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.103649] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 24.103870] [ 24.104051] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 24.104103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.104115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.104136] Call Trace: [ 24.104157] <TASK> [ 24.104175] dump_stack_lvl+0x73/0xb0 [ 24.104202] print_report+0xd1/0x650 [ 24.104223] ? __virt_addr_valid+0x1db/0x2d0 [ 24.104245] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.104271] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.104295] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.104320] kasan_report+0x141/0x180 [ 24.104345] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.104375] kasan_check_range+0x10c/0x1c0 [ 24.104397] __kasan_check_write+0x18/0x20 [ 24.104418] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.104444] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.104476] kasan_bitops_generic+0x121/0x1c0 [ 24.104498] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.104520] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.104545] kunit_try_run_case+0x1a5/0x480 [ 24.104569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.104591] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.104611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.104635] ? __kthread_parkme+0x82/0x180 [ 24.104654] ? preempt_count_sub+0x50/0x80 [ 24.104677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.104699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.104721] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.104744] kthread+0x337/0x6f0 [ 24.104763] ? trace_preempt_on+0x20/0xc0 [ 24.104785] ? __pfx_kthread+0x10/0x10 [ 24.104804] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.104842] ? calculate_sigpending+0x7b/0xa0 [ 24.104865] ? __pfx_kthread+0x10/0x10 [ 24.104885] ret_from_fork+0x116/0x1d0 [ 24.104903] ? __pfx_kthread+0x10/0x10 [ 24.104922] ret_from_fork_asm+0x1a/0x30 [ 24.104960] </TASK> [ 24.104970] [ 24.112754] Allocated by task 290: [ 24.112878] kasan_save_stack+0x45/0x70 [ 24.113170] kasan_save_track+0x18/0x40 [ 24.113379] kasan_save_alloc_info+0x3b/0x50 [ 24.113587] __kasan_kmalloc+0xb7/0xc0 [ 24.113772] __kmalloc_cache_noprof+0x189/0x420 [ 24.114190] kasan_bitops_generic+0x92/0x1c0 [ 24.114341] kunit_try_run_case+0x1a5/0x480 [ 24.114541] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.114751] kthread+0x337/0x6f0 [ 24.114999] ret_from_fork+0x116/0x1d0 [ 24.115205] ret_from_fork_asm+0x1a/0x30 [ 24.115370] [ 24.115461] The buggy address belongs to the object at ffff888102797f40 [ 24.115461] which belongs to the cache kmalloc-16 of size 16 [ 24.116007] The buggy address is located 8 bytes inside of [ 24.116007] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 24.116605] [ 24.116685] The buggy address belongs to the physical page: [ 24.117082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 24.117322] flags: 0x200000000000000(node=0|zone=2) [ 24.117476] page_type: f5(slab) [ 24.117591] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.117922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.118275] page dumped because: kasan: bad access detected [ 24.118628] [ 24.118726] Memory state around the buggy address: [ 24.119066] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.119278] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.119482] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 24.119925] ^ [ 24.120284] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.120613] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.121186] ================================================================== [ 24.079191] ================================================================== [ 24.079431] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.079830] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 24.080587] [ 24.080694] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 24.080744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.080757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.080779] Call Trace: [ 24.080799] <TASK> [ 24.081040] dump_stack_lvl+0x73/0xb0 [ 24.081079] print_report+0xd1/0x650 [ 24.081102] ? __virt_addr_valid+0x1db/0x2d0 [ 24.081125] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.081150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.081176] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.081201] kasan_report+0x141/0x180 [ 24.081222] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.081252] kasan_check_range+0x10c/0x1c0 [ 24.081274] __kasan_check_write+0x18/0x20 [ 24.081296] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.081320] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.081353] kasan_bitops_generic+0x121/0x1c0 [ 24.081375] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.081397] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.081423] kunit_try_run_case+0x1a5/0x480 [ 24.081449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.081469] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.081490] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.081514] ? __kthread_parkme+0x82/0x180 [ 24.081534] ? preempt_count_sub+0x50/0x80 [ 24.081557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.081580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.081602] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.081624] kthread+0x337/0x6f0 [ 24.081643] ? trace_preempt_on+0x20/0xc0 [ 24.081665] ? __pfx_kthread+0x10/0x10 [ 24.081687] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.081709] ? calculate_sigpending+0x7b/0xa0 [ 24.081732] ? __pfx_kthread+0x10/0x10 [ 24.081751] ret_from_fork+0x116/0x1d0 [ 24.081770] ? __pfx_kthread+0x10/0x10 [ 24.081789] ret_from_fork_asm+0x1a/0x30 [ 24.081969] </TASK> [ 24.081986] [ 24.092160] Allocated by task 290: [ 24.092532] kasan_save_stack+0x45/0x70 [ 24.092739] kasan_save_track+0x18/0x40 [ 24.093087] kasan_save_alloc_info+0x3b/0x50 [ 24.093465] __kasan_kmalloc+0xb7/0xc0 [ 24.093618] __kmalloc_cache_noprof+0x189/0x420 [ 24.094115] kasan_bitops_generic+0x92/0x1c0 [ 24.094309] kunit_try_run_case+0x1a5/0x480 [ 24.094497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.094725] kthread+0x337/0x6f0 [ 24.094864] ret_from_fork+0x116/0x1d0 [ 24.095301] ret_from_fork_asm+0x1a/0x30 [ 24.095459] [ 24.095543] The buggy address belongs to the object at ffff888102797f40 [ 24.095543] which belongs to the cache kmalloc-16 of size 16 [ 24.096323] The buggy address is located 8 bytes inside of [ 24.096323] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 24.097038] [ 24.097290] The buggy address belongs to the physical page: [ 24.097523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 24.098199] flags: 0x200000000000000(node=0|zone=2) [ 24.098413] page_type: f5(slab) [ 24.098563] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.099149] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.099460] page dumped because: kasan: bad access detected [ 24.099690] [ 24.099762] Memory state around the buggy address: [ 24.099989] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.100653] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.101137] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 24.101446] ^ [ 24.101672] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.101966] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.102273] ================================================================== [ 24.140153] ================================================================== [ 24.140475] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.141045] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 24.141360] [ 24.141466] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 24.141514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.141527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.141549] Call Trace: [ 24.141568] <TASK> [ 24.141585] dump_stack_lvl+0x73/0xb0 [ 24.141612] print_report+0xd1/0x650 [ 24.141633] ? __virt_addr_valid+0x1db/0x2d0 [ 24.141655] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.141680] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.141705] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.141730] kasan_report+0x141/0x180 [ 24.141750] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.141780] kasan_check_range+0x10c/0x1c0 [ 24.141801] __kasan_check_write+0x18/0x20 [ 24.141821] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.141847] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.141880] kasan_bitops_generic+0x121/0x1c0 [ 24.141903] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.141925] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.141964] kunit_try_run_case+0x1a5/0x480 [ 24.141988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.142013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.142033] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.142057] ? __kthread_parkme+0x82/0x180 [ 24.142078] ? preempt_count_sub+0x50/0x80 [ 24.142100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.142123] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.142145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.142168] kthread+0x337/0x6f0 [ 24.142217] ? trace_preempt_on+0x20/0xc0 [ 24.142241] ? __pfx_kthread+0x10/0x10 [ 24.142261] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.142284] ? calculate_sigpending+0x7b/0xa0 [ 24.142307] ? __pfx_kthread+0x10/0x10 [ 24.142328] ret_from_fork+0x116/0x1d0 [ 24.142347] ? __pfx_kthread+0x10/0x10 [ 24.142366] ret_from_fork_asm+0x1a/0x30 [ 24.142395] </TASK> [ 24.142406] [ 24.150348] Allocated by task 290: [ 24.150544] kasan_save_stack+0x45/0x70 [ 24.150762] kasan_save_track+0x18/0x40 [ 24.150889] kasan_save_alloc_info+0x3b/0x50 [ 24.151090] __kasan_kmalloc+0xb7/0xc0 [ 24.151274] __kmalloc_cache_noprof+0x189/0x420 [ 24.151606] kasan_bitops_generic+0x92/0x1c0 [ 24.151783] kunit_try_run_case+0x1a5/0x480 [ 24.152075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.152369] kthread+0x337/0x6f0 [ 24.152482] ret_from_fork+0x116/0x1d0 [ 24.152626] ret_from_fork_asm+0x1a/0x30 [ 24.152810] [ 24.152895] The buggy address belongs to the object at ffff888102797f40 [ 24.152895] which belongs to the cache kmalloc-16 of size 16 [ 24.153318] The buggy address is located 8 bytes inside of [ 24.153318] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 24.154085] [ 24.154287] The buggy address belongs to the physical page: [ 24.154562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 24.154791] flags: 0x200000000000000(node=0|zone=2) [ 24.155093] page_type: f5(slab) [ 24.155381] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.155693] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.156053] page dumped because: kasan: bad access detected [ 24.156278] [ 24.156346] Memory state around the buggy address: [ 24.156493] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.156699] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.156971] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 24.157272] ^ [ 24.157517] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.158163] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.158411] ================================================================== [ 24.121633] ================================================================== [ 24.122085] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.122427] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 24.122718] [ 24.122826] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 24.122873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.122886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.122906] Call Trace: [ 24.122927] <TASK> [ 24.122955] dump_stack_lvl+0x73/0xb0 [ 24.122981] print_report+0xd1/0x650 [ 24.123002] ? __virt_addr_valid+0x1db/0x2d0 [ 24.123024] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.123050] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.123075] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.123100] kasan_report+0x141/0x180 [ 24.123207] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.123244] kasan_check_range+0x10c/0x1c0 [ 24.123267] __kasan_check_write+0x18/0x20 [ 24.123288] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.123313] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.123345] kasan_bitops_generic+0x121/0x1c0 [ 24.123367] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.123389] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.123415] kunit_try_run_case+0x1a5/0x480 [ 24.123439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.123461] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.123481] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.123505] ? __kthread_parkme+0x82/0x180 [ 24.123525] ? preempt_count_sub+0x50/0x80 [ 24.123547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.123570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.123592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.123614] kthread+0x337/0x6f0 [ 24.123633] ? trace_preempt_on+0x20/0xc0 [ 24.123656] ? __pfx_kthread+0x10/0x10 [ 24.123675] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.123696] ? calculate_sigpending+0x7b/0xa0 [ 24.123719] ? __pfx_kthread+0x10/0x10 [ 24.123739] ret_from_fork+0x116/0x1d0 [ 24.123757] ? __pfx_kthread+0x10/0x10 [ 24.123776] ret_from_fork_asm+0x1a/0x30 [ 24.123805] </TASK> [ 24.123854] [ 24.131577] Allocated by task 290: [ 24.131706] kasan_save_stack+0x45/0x70 [ 24.131868] kasan_save_track+0x18/0x40 [ 24.132057] kasan_save_alloc_info+0x3b/0x50 [ 24.132357] __kasan_kmalloc+0xb7/0xc0 [ 24.132582] __kmalloc_cache_noprof+0x189/0x420 [ 24.132782] kasan_bitops_generic+0x92/0x1c0 [ 24.133003] kunit_try_run_case+0x1a5/0x480 [ 24.133377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.133602] kthread+0x337/0x6f0 [ 24.133749] ret_from_fork+0x116/0x1d0 [ 24.133977] ret_from_fork_asm+0x1a/0x30 [ 24.134180] [ 24.134246] The buggy address belongs to the object at ffff888102797f40 [ 24.134246] which belongs to the cache kmalloc-16 of size 16 [ 24.134701] The buggy address is located 8 bytes inside of [ 24.134701] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 24.135046] [ 24.135110] The buggy address belongs to the physical page: [ 24.135274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 24.135503] flags: 0x200000000000000(node=0|zone=2) [ 24.135687] page_type: f5(slab) [ 24.135847] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.136345] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.137105] page dumped because: kasan: bad access detected [ 24.137328] [ 24.137392] Memory state around the buggy address: [ 24.137540] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.137746] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.138301] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 24.138610] ^ [ 24.138951] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.139404] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.139681] ================================================================== [ 24.054686] ================================================================== [ 24.054967] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.055505] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 24.056203] [ 24.056453] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 24.056507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.056520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.056601] Call Trace: [ 24.056675] <TASK> [ 24.056697] dump_stack_lvl+0x73/0xb0 [ 24.056727] print_report+0xd1/0x650 [ 24.056748] ? __virt_addr_valid+0x1db/0x2d0 [ 24.056772] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.056797] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.056893] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.056918] kasan_report+0x141/0x180 [ 24.056953] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.056982] kasan_check_range+0x10c/0x1c0 [ 24.057003] __kasan_check_write+0x18/0x20 [ 24.057026] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.057052] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.057084] kasan_bitops_generic+0x121/0x1c0 [ 24.057106] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.057128] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.057154] kunit_try_run_case+0x1a5/0x480 [ 24.057179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.057200] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.057220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.057245] ? __kthread_parkme+0x82/0x180 [ 24.057266] ? preempt_count_sub+0x50/0x80 [ 24.057287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.057310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.057332] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.057355] kthread+0x337/0x6f0 [ 24.057373] ? trace_preempt_on+0x20/0xc0 [ 24.057396] ? __pfx_kthread+0x10/0x10 [ 24.057415] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.057437] ? calculate_sigpending+0x7b/0xa0 [ 24.057459] ? __pfx_kthread+0x10/0x10 [ 24.057479] ret_from_fork+0x116/0x1d0 [ 24.057499] ? __pfx_kthread+0x10/0x10 [ 24.057518] ret_from_fork_asm+0x1a/0x30 [ 24.057548] </TASK> [ 24.057558] [ 24.067729] Allocated by task 290: [ 24.067890] kasan_save_stack+0x45/0x70 [ 24.068405] kasan_save_track+0x18/0x40 [ 24.068580] kasan_save_alloc_info+0x3b/0x50 [ 24.068893] __kasan_kmalloc+0xb7/0xc0 [ 24.069073] __kmalloc_cache_noprof+0x189/0x420 [ 24.069526] kasan_bitops_generic+0x92/0x1c0 [ 24.069764] kunit_try_run_case+0x1a5/0x480 [ 24.070129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.070569] kthread+0x337/0x6f0 [ 24.070899] ret_from_fork+0x116/0x1d0 [ 24.071098] ret_from_fork_asm+0x1a/0x30 [ 24.071433] [ 24.071530] The buggy address belongs to the object at ffff888102797f40 [ 24.071530] which belongs to the cache kmalloc-16 of size 16 [ 24.072277] The buggy address is located 8 bytes inside of [ 24.072277] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 24.072832] [ 24.072924] The buggy address belongs to the physical page: [ 24.073454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 24.073780] flags: 0x200000000000000(node=0|zone=2) [ 24.074249] page_type: f5(slab) [ 24.074388] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.074713] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.075328] page dumped because: kasan: bad access detected [ 24.075558] [ 24.075783] Memory state around the buggy address: [ 24.076114] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.076374] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.076678] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 24.077264] ^ [ 24.077482] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.078006] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.078323] ================================================================== [ 24.029459] ================================================================== [ 24.029758] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.030220] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 24.030540] [ 24.030637] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 24.030687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.030699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.030721] Call Trace: [ 24.030741] <TASK> [ 24.030759] dump_stack_lvl+0x73/0xb0 [ 24.030787] print_report+0xd1/0x650 [ 24.030808] ? __virt_addr_valid+0x1db/0x2d0 [ 24.030927] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.030967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.030991] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.031017] kasan_report+0x141/0x180 [ 24.031038] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.031067] kasan_check_range+0x10c/0x1c0 [ 24.031089] __kasan_check_write+0x18/0x20 [ 24.031110] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.031135] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.031168] kasan_bitops_generic+0x121/0x1c0 [ 24.031189] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.031211] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.031236] kunit_try_run_case+0x1a5/0x480 [ 24.031260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.031282] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.031303] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.031327] ? __kthread_parkme+0x82/0x180 [ 24.031347] ? preempt_count_sub+0x50/0x80 [ 24.031370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.031393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.031415] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.031437] kthread+0x337/0x6f0 [ 24.031456] ? trace_preempt_on+0x20/0xc0 [ 24.031479] ? __pfx_kthread+0x10/0x10 [ 24.031498] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.031519] ? calculate_sigpending+0x7b/0xa0 [ 24.031542] ? __pfx_kthread+0x10/0x10 [ 24.031563] ret_from_fork+0x116/0x1d0 [ 24.031581] ? __pfx_kthread+0x10/0x10 [ 24.031600] ret_from_fork_asm+0x1a/0x30 [ 24.031628] </TASK> [ 24.031639] [ 24.042283] Allocated by task 290: [ 24.042972] kasan_save_stack+0x45/0x70 [ 24.043349] kasan_save_track+0x18/0x40 [ 24.043522] kasan_save_alloc_info+0x3b/0x50 [ 24.043715] __kasan_kmalloc+0xb7/0xc0 [ 24.044296] __kmalloc_cache_noprof+0x189/0x420 [ 24.044680] kasan_bitops_generic+0x92/0x1c0 [ 24.045049] kunit_try_run_case+0x1a5/0x480 [ 24.045315] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.045552] kthread+0x337/0x6f0 [ 24.045701] ret_from_fork+0x116/0x1d0 [ 24.045858] ret_from_fork_asm+0x1a/0x30 [ 24.046485] [ 24.046562] The buggy address belongs to the object at ffff888102797f40 [ 24.046562] which belongs to the cache kmalloc-16 of size 16 [ 24.047053] The buggy address is located 8 bytes inside of [ 24.047053] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 24.048025] [ 24.048112] The buggy address belongs to the physical page: [ 24.048549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 24.049063] flags: 0x200000000000000(node=0|zone=2) [ 24.049389] page_type: f5(slab) [ 24.049544] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.050231] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.050670] page dumped because: kasan: bad access detected [ 24.051083] [ 24.051167] Memory state around the buggy address: [ 24.051471] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.051779] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.052402] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 24.052805] ^ [ 24.053236] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.053526] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.053811] ==================================================================