Date
June 26, 2025, 9:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 57.571103] ================================================================== [ 57.578416] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 57.587483] Write of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 57.594973] [ 57.596498] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 57.596526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.596534] Hardware name: Thundercomm Dragonboard 845c (DT) [ 57.596544] Call trace: [ 57.596550] show_stack+0x20/0x38 (C) [ 57.596566] dump_stack_lvl+0x8c/0xd0 [ 57.596584] print_report+0x118/0x608 [ 57.596602] kasan_report+0xdc/0x128 [ 57.596619] kasan_check_range+0x100/0x1a8 [ 57.596639] __kasan_check_write+0x20/0x30 [ 57.596655] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 57.596676] kasan_bitops_generic+0x11c/0x1c8 [ 57.596693] kunit_try_run_case+0x170/0x3f0 [ 57.596709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.596730] kthread+0x328/0x630 [ 57.596743] ret_from_fork+0x10/0x20 [ 57.596759] [ 57.672171] Allocated by task 347: [ 57.675627] kasan_save_stack+0x3c/0x68 [ 57.679525] kasan_save_track+0x20/0x40 [ 57.683421] kasan_save_alloc_info+0x40/0x58 [ 57.687759] __kasan_kmalloc+0xd4/0xd8 [ 57.691568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.696171] kasan_bitops_generic+0xa0/0x1c8 [ 57.700512] kunit_try_run_case+0x170/0x3f0 [ 57.704765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.710333] kthread+0x328/0x630 [ 57.713621] ret_from_fork+0x10/0x20 [ 57.717255] [ 57.718778] The buggy address belongs to the object at ffff000093276b80 [ 57.718778] which belongs to the cache kmalloc-16 of size 16 [ 57.731257] The buggy address is located 8 bytes inside of [ 57.731257] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 57.743653] [ 57.745175] The buggy address belongs to the physical page: [ 57.750821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 57.758919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.765527] page_type: f5(slab) [ 57.768726] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 57.776563] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 57.784395] page dumped because: kasan: bad access detected [ 57.790043] [ 57.791566] Memory state around the buggy address: [ 57.796421] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 57.803735] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.811048] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.818360] ^ [ 57.821903] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.829216] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.836526] ================================================================== [ 57.843906] ================================================================== [ 57.851220] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 57.860286] Read of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 57.867690] [ 57.869215] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 57.869243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.869251] Hardware name: Thundercomm Dragonboard 845c (DT) [ 57.869260] Call trace: [ 57.869268] show_stack+0x20/0x38 (C) [ 57.869285] dump_stack_lvl+0x8c/0xd0 [ 57.869302] print_report+0x118/0x608 [ 57.869322] kasan_report+0xdc/0x128 [ 57.869340] __asan_report_load8_noabort+0x20/0x30 [ 57.869357] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 57.869377] kasan_bitops_generic+0x11c/0x1c8 [ 57.869395] kunit_try_run_case+0x170/0x3f0 [ 57.869412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.869434] kthread+0x328/0x630 [ 57.869447] ret_from_fork+0x10/0x20 [ 57.869464] [ 57.941465] Allocated by task 347: [ 57.944922] kasan_save_stack+0x3c/0x68 [ 57.948819] kasan_save_track+0x20/0x40 [ 57.952716] kasan_save_alloc_info+0x40/0x58 [ 57.957054] __kasan_kmalloc+0xd4/0xd8 [ 57.960864] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.965466] kasan_bitops_generic+0xa0/0x1c8 [ 57.969807] kunit_try_run_case+0x170/0x3f0 [ 57.974061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.979631] kthread+0x328/0x630 [ 57.982916] ret_from_fork+0x10/0x20 [ 57.986551] [ 57.988074] The buggy address belongs to the object at ffff000093276b80 [ 57.988074] which belongs to the cache kmalloc-16 of size 16 [ 58.000553] The buggy address is located 8 bytes inside of [ 58.000553] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 58.012949] [ 58.014473] The buggy address belongs to the physical page: [ 58.020119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 58.028216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.034824] page_type: f5(slab) [ 58.038023] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 58.045859] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.053692] page dumped because: kasan: bad access detected [ 58.059339] [ 58.060862] Memory state around the buggy address: [ 58.065718] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 58.073032] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.080344] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.087655] ^ [ 58.091199] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.098511] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.105823] ================================================================== [ 56.759722] ================================================================== [ 56.767034] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 56.776100] Read of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 56.783504] [ 56.785029] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 56.785057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.785065] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.785074] Call trace: [ 56.785080] show_stack+0x20/0x38 (C) [ 56.785097] dump_stack_lvl+0x8c/0xd0 [ 56.785114] print_report+0x118/0x608 [ 56.785133] kasan_report+0xdc/0x128 [ 56.785150] __asan_report_load8_noabort+0x20/0x30 [ 56.785167] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 56.785187] kasan_bitops_generic+0x11c/0x1c8 [ 56.785204] kunit_try_run_case+0x170/0x3f0 [ 56.785221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.785243] kthread+0x328/0x630 [ 56.785257] ret_from_fork+0x10/0x20 [ 56.785273] [ 56.857275] Allocated by task 347: [ 56.860730] kasan_save_stack+0x3c/0x68 [ 56.864628] kasan_save_track+0x20/0x40 [ 56.868528] kasan_save_alloc_info+0x40/0x58 [ 56.872866] __kasan_kmalloc+0xd4/0xd8 [ 56.876674] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.881275] kasan_bitops_generic+0xa0/0x1c8 [ 56.885618] kunit_try_run_case+0x170/0x3f0 [ 56.889871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.895442] kthread+0x328/0x630 [ 56.898728] ret_from_fork+0x10/0x20 [ 56.902363] [ 56.903885] The buggy address belongs to the object at ffff000093276b80 [ 56.903885] which belongs to the cache kmalloc-16 of size 16 [ 56.916364] The buggy address is located 8 bytes inside of [ 56.916364] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 56.928760] [ 56.930284] The buggy address belongs to the physical page: [ 56.935930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 56.944026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.950634] page_type: f5(slab) [ 56.953833] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.961671] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.969503] page dumped because: kasan: bad access detected [ 56.975150] [ 56.976673] Memory state around the buggy address: [ 56.981530] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 56.988842] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.996155] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.003467] ^ [ 57.007010] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.014323] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.021634] ================================================================== [ 57.301825] ================================================================== [ 57.309136] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 57.318202] Read of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 57.325604] [ 57.327129] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 57.327156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.327164] Hardware name: Thundercomm Dragonboard 845c (DT) [ 57.327175] Call trace: [ 57.327181] show_stack+0x20/0x38 (C) [ 57.327199] dump_stack_lvl+0x8c/0xd0 [ 57.327216] print_report+0x118/0x608 [ 57.327235] kasan_report+0xdc/0x128 [ 57.327252] __asan_report_load8_noabort+0x20/0x30 [ 57.327268] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 57.327290] kasan_bitops_generic+0x11c/0x1c8 [ 57.327307] kunit_try_run_case+0x170/0x3f0 [ 57.327324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.327344] kthread+0x328/0x630 [ 57.327357] ret_from_fork+0x10/0x20 [ 57.327373] [ 57.399375] Allocated by task 347: [ 57.402831] kasan_save_stack+0x3c/0x68 [ 57.406730] kasan_save_track+0x20/0x40 [ 57.410627] kasan_save_alloc_info+0x40/0x58 [ 57.414965] __kasan_kmalloc+0xd4/0xd8 [ 57.418774] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.423376] kasan_bitops_generic+0xa0/0x1c8 [ 57.427718] kunit_try_run_case+0x170/0x3f0 [ 57.431971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.437540] kthread+0x328/0x630 [ 57.440826] ret_from_fork+0x10/0x20 [ 57.444461] [ 57.445983] The buggy address belongs to the object at ffff000093276b80 [ 57.445983] which belongs to the cache kmalloc-16 of size 16 [ 57.458462] The buggy address is located 8 bytes inside of [ 57.458462] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 57.470859] [ 57.472383] The buggy address belongs to the physical page: [ 57.478029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 57.486126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.492734] page_type: f5(slab) [ 57.495933] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 57.503770] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 57.511604] page dumped because: kasan: bad access detected [ 57.517250] [ 57.518773] Memory state around the buggy address: [ 57.523628] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 57.530941] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.538253] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.545564] ^ [ 57.549107] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.556420] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.563730] ================================================================== [ 58.113188] ================================================================== [ 58.120501] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 58.129568] Read of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 58.136971] [ 58.138497] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 58.138525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.138534] Hardware name: Thundercomm Dragonboard 845c (DT) [ 58.138545] Call trace: [ 58.138553] show_stack+0x20/0x38 (C) [ 58.138569] dump_stack_lvl+0x8c/0xd0 [ 58.138587] print_report+0x118/0x608 [ 58.138605] kasan_report+0xdc/0x128 [ 58.138622] __asan_report_load8_noabort+0x20/0x30 [ 58.138641] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 58.138662] kasan_bitops_generic+0x11c/0x1c8 [ 58.138679] kunit_try_run_case+0x170/0x3f0 [ 58.138698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.138718] kthread+0x328/0x630 [ 58.138731] ret_from_fork+0x10/0x20 [ 58.138747] [ 58.210737] Allocated by task 347: [ 58.214194] kasan_save_stack+0x3c/0x68 [ 58.218091] kasan_save_track+0x20/0x40 [ 58.221988] kasan_save_alloc_info+0x40/0x58 [ 58.226327] __kasan_kmalloc+0xd4/0xd8 [ 58.230136] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.234737] kasan_bitops_generic+0xa0/0x1c8 [ 58.239079] kunit_try_run_case+0x170/0x3f0 [ 58.243332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.248891] kthread+0x328/0x630 [ 58.252176] ret_from_fork+0x10/0x20 [ 58.255812] [ 58.257334] The buggy address belongs to the object at ffff000093276b80 [ 58.257334] which belongs to the cache kmalloc-16 of size 16 [ 58.269814] The buggy address is located 8 bytes inside of [ 58.269814] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 58.282211] [ 58.283734] The buggy address belongs to the physical page: [ 58.289381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 58.297477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.304085] page_type: f5(slab) [ 58.307285] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 58.315123] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.322955] page dumped because: kasan: bad access detected [ 58.328602] [ 58.330124] Memory state around the buggy address: [ 58.334980] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 58.342293] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.349607] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.356919] ^ [ 58.360462] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.367774] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.375085] ================================================================== [ 55.944940] ================================================================== [ 55.952253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 55.961234] Write of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 55.968724] [ 55.970249] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 55.970278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.970285] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.970296] Call trace: [ 55.970302] show_stack+0x20/0x38 (C) [ 55.970319] dump_stack_lvl+0x8c/0xd0 [ 55.970336] print_report+0x118/0x608 [ 55.970355] kasan_report+0xdc/0x128 [ 55.970375] kasan_check_range+0x100/0x1a8 [ 55.970394] __kasan_check_write+0x20/0x30 [ 55.970409] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 55.970429] kasan_bitops_generic+0x11c/0x1c8 [ 55.970446] kunit_try_run_case+0x170/0x3f0 [ 55.970465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.970486] kthread+0x328/0x630 [ 55.970499] ret_from_fork+0x10/0x20 [ 55.970516] [ 56.045867] Allocated by task 347: [ 56.049323] kasan_save_stack+0x3c/0x68 [ 56.053221] kasan_save_track+0x20/0x40 [ 56.057119] kasan_save_alloc_info+0x40/0x58 [ 56.061458] __kasan_kmalloc+0xd4/0xd8 [ 56.065268] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.069870] kasan_bitops_generic+0xa0/0x1c8 [ 56.074212] kunit_try_run_case+0x170/0x3f0 [ 56.078466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.084037] kthread+0x328/0x630 [ 56.087323] ret_from_fork+0x10/0x20 [ 56.090957] [ 56.092480] The buggy address belongs to the object at ffff000093276b80 [ 56.092480] which belongs to the cache kmalloc-16 of size 16 [ 56.104961] The buggy address is located 8 bytes inside of [ 56.104961] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 56.117358] [ 56.118881] The buggy address belongs to the physical page: [ 56.124528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 56.132625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.139234] page_type: f5(slab) [ 56.142433] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.150269] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.158101] page dumped because: kasan: bad access detected [ 56.163749] [ 56.165272] Memory state around the buggy address: [ 56.170127] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 56.177441] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.184753] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.192065] ^ [ 56.195608] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.202921] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.210231] ================================================================== [ 56.486914] ================================================================== [ 56.494226] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 56.503293] Write of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 56.510783] [ 56.512308] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 56.512336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.512344] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.512353] Call trace: [ 56.512360] show_stack+0x20/0x38 (C) [ 56.512376] dump_stack_lvl+0x8c/0xd0 [ 56.512394] print_report+0x118/0x608 [ 56.512412] kasan_report+0xdc/0x128 [ 56.512430] kasan_check_range+0x100/0x1a8 [ 56.512448] __kasan_check_write+0x20/0x30 [ 56.512464] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 56.512487] kasan_bitops_generic+0x11c/0x1c8 [ 56.512504] kunit_try_run_case+0x170/0x3f0 [ 56.512521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.512541] kthread+0x328/0x630 [ 56.512555] ret_from_fork+0x10/0x20 [ 56.512571] [ 56.587996] Allocated by task 347: [ 56.591451] kasan_save_stack+0x3c/0x68 [ 56.595350] kasan_save_track+0x20/0x40 [ 56.599247] kasan_save_alloc_info+0x40/0x58 [ 56.603586] __kasan_kmalloc+0xd4/0xd8 [ 56.607395] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.611998] kasan_bitops_generic+0xa0/0x1c8 [ 56.616338] kunit_try_run_case+0x170/0x3f0 [ 56.620592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.626151] kthread+0x328/0x630 [ 56.629436] ret_from_fork+0x10/0x20 [ 56.633071] [ 56.634594] The buggy address belongs to the object at ffff000093276b80 [ 56.634594] which belongs to the cache kmalloc-16 of size 16 [ 56.647073] The buggy address is located 8 bytes inside of [ 56.647073] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 56.659469] [ 56.660992] The buggy address belongs to the physical page: [ 56.666638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 56.674736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.681345] page_type: f5(slab) [ 56.684545] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.692382] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.700215] page dumped because: kasan: bad access detected [ 56.705862] [ 56.707384] Memory state around the buggy address: [ 56.712241] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 56.719555] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.726868] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.734179] ^ [ 56.737721] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.745034] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.752345] ================================================================== [ 57.029005] ================================================================== [ 57.036316] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 57.045384] Write of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 57.052873] [ 57.054399] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 57.054429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.054438] Hardware name: Thundercomm Dragonboard 845c (DT) [ 57.054448] Call trace: [ 57.054454] show_stack+0x20/0x38 (C) [ 57.054470] dump_stack_lvl+0x8c/0xd0 [ 57.054488] print_report+0x118/0x608 [ 57.054507] kasan_report+0xdc/0x128 [ 57.054524] kasan_check_range+0x100/0x1a8 [ 57.054544] __kasan_check_write+0x20/0x30 [ 57.054561] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 57.054582] kasan_bitops_generic+0x11c/0x1c8 [ 57.054601] kunit_try_run_case+0x170/0x3f0 [ 57.054618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.054638] kthread+0x328/0x630 [ 57.054652] ret_from_fork+0x10/0x20 [ 57.054669] [ 57.130102] Allocated by task 347: [ 57.133558] kasan_save_stack+0x3c/0x68 [ 57.137456] kasan_save_track+0x20/0x40 [ 57.141353] kasan_save_alloc_info+0x40/0x58 [ 57.145692] __kasan_kmalloc+0xd4/0xd8 [ 57.149501] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.154103] kasan_bitops_generic+0xa0/0x1c8 [ 57.158443] kunit_try_run_case+0x170/0x3f0 [ 57.162697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.168256] kthread+0x328/0x630 [ 57.171541] ret_from_fork+0x10/0x20 [ 57.175176] [ 57.176699] The buggy address belongs to the object at ffff000093276b80 [ 57.176699] which belongs to the cache kmalloc-16 of size 16 [ 57.189179] The buggy address is located 8 bytes inside of [ 57.189179] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 57.201575] [ 57.203097] The buggy address belongs to the physical page: [ 57.208744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 57.216841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.223450] page_type: f5(slab) [ 57.226649] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 57.234486] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 57.242320] page dumped because: kasan: bad access detected [ 57.247966] [ 57.249488] Memory state around the buggy address: [ 57.254343] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 57.261656] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.268968] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.276280] ^ [ 57.279823] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.287136] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.294447] ================================================================== [ 56.217611] ================================================================== [ 56.224923] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 56.233991] Read of size 8 at addr ffff000093276b88 by task kunit_try_catch/347 [ 56.241394] [ 56.242920] CPU: 7 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 56.242949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.242957] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.242967] Call trace: [ 56.242974] show_stack+0x20/0x38 (C) [ 56.242990] dump_stack_lvl+0x8c/0xd0 [ 56.243009] print_report+0x118/0x608 [ 56.243026] kasan_report+0xdc/0x128 [ 56.243044] __asan_report_load8_noabort+0x20/0x30 [ 56.243062] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 56.243083] kasan_bitops_generic+0x11c/0x1c8 [ 56.243103] kunit_try_run_case+0x170/0x3f0 [ 56.243121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.243141] kthread+0x328/0x630 [ 56.243154] ret_from_fork+0x10/0x20 [ 56.243170] [ 56.315173] Allocated by task 347: [ 56.318631] kasan_save_stack+0x3c/0x68 [ 56.322529] kasan_save_track+0x20/0x40 [ 56.326426] kasan_save_alloc_info+0x40/0x58 [ 56.330766] __kasan_kmalloc+0xd4/0xd8 [ 56.334576] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.339178] kasan_bitops_generic+0xa0/0x1c8 [ 56.343518] kunit_try_run_case+0x170/0x3f0 [ 56.347772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.353341] kthread+0x328/0x630 [ 56.356628] ret_from_fork+0x10/0x20 [ 56.360263] [ 56.361787] The buggy address belongs to the object at ffff000093276b80 [ 56.361787] which belongs to the cache kmalloc-16 of size 16 [ 56.374268] The buggy address is located 8 bytes inside of [ 56.374268] allocated 9-byte region [ffff000093276b80, ffff000093276b89) [ 56.386665] [ 56.388188] The buggy address belongs to the physical page: [ 56.393834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113276 [ 56.401934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.408543] page_type: f5(slab) [ 56.411742] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.419580] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.427415] page dumped because: kasan: bad access detected [ 56.433062] [ 56.434585] Memory state around the buggy address: [ 56.439442] ffff000093276a80: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc [ 56.446756] ffff000093276b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.454069] >ffff000093276b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.461381] ^ [ 56.464925] ffff000093276c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.472239] ffff000093276c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.479550] ==================================================================
[ 29.238800] ================================================================== [ 29.238852] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 29.238964] [ 29.239184] Call trace: [ 29.239318] print_report+0x118/0x608 [ 29.239474] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 29.239647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.241569] __kasan_kmalloc+0xd4/0xd8 [ 29.242106] kunit_try_run_case+0x170/0x3f0 [ 29.243455] The buggy address is located 8 bytes inside of [ 29.243455] allocated 9-byte region [fff00000c16b9cc0, fff00000c16b9cc9) [ 29.245147] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.247696] ==================================================================
[ 24.441761] ================================================================== [ 24.442348] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.442940] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.443511] [ 24.443959] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.444012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.444025] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.444050] Call Trace: [ 24.444069] <TASK> [ 24.444089] dump_stack_lvl+0x73/0xb0 [ 24.444118] print_report+0xd1/0x650 [ 24.444139] ? __virt_addr_valid+0x1db/0x2d0 [ 24.444163] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.444189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.444214] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.444252] kasan_report+0x141/0x180 [ 24.444274] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.444304] kasan_check_range+0x10c/0x1c0 [ 24.444327] __kasan_check_write+0x18/0x20 [ 24.444350] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 24.444376] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.444404] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.444429] ? trace_hardirqs_on+0x37/0xe0 [ 24.444452] ? kasan_bitops_generic+0x92/0x1c0 [ 24.444479] kasan_bitops_generic+0x121/0x1c0 [ 24.444501] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.444525] ? __pfx_read_tsc+0x10/0x10 [ 24.444546] ? ktime_get_ts64+0x86/0x230 [ 24.444571] kunit_try_run_case+0x1a5/0x480 [ 24.444595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.444616] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.444641] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.444665] ? __kthread_parkme+0x82/0x180 [ 24.444686] ? preempt_count_sub+0x50/0x80 [ 24.444708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.444731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.444754] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.444776] kthread+0x337/0x6f0 [ 24.444906] ? trace_preempt_on+0x20/0xc0 [ 24.444931] ? __pfx_kthread+0x10/0x10 [ 24.444952] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.444974] ? calculate_sigpending+0x7b/0xa0 [ 24.444998] ? __pfx_kthread+0x10/0x10 [ 24.445063] ret_from_fork+0x116/0x1d0 [ 24.445085] ? __pfx_kthread+0x10/0x10 [ 24.445104] ret_from_fork_asm+0x1a/0x30 [ 24.445135] </TASK> [ 24.445146] [ 24.457710] Allocated by task 290: [ 24.457934] kasan_save_stack+0x45/0x70 [ 24.458090] kasan_save_track+0x18/0x40 [ 24.458360] kasan_save_alloc_info+0x3b/0x50 [ 24.458611] __kasan_kmalloc+0xb7/0xc0 [ 24.458803] __kmalloc_cache_noprof+0x189/0x420 [ 24.458954] kasan_bitops_generic+0x92/0x1c0 [ 24.459242] kunit_try_run_case+0x1a5/0x480 [ 24.459469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.459687] kthread+0x337/0x6f0 [ 24.459852] ret_from_fork+0x116/0x1d0 [ 24.460055] ret_from_fork_asm+0x1a/0x30 [ 24.460268] [ 24.460374] The buggy address belongs to the object at ffff88810278b720 [ 24.460374] which belongs to the cache kmalloc-16 of size 16 [ 24.460742] The buggy address is located 8 bytes inside of [ 24.460742] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.461277] [ 24.461346] The buggy address belongs to the physical page: [ 24.461513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.461759] flags: 0x200000000000000(node=0|zone=2) [ 24.462101] page_type: f5(slab) [ 24.462310] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.462687] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.463451] page dumped because: kasan: bad access detected [ 24.463625] [ 24.463686] Memory state around the buggy address: [ 24.464320] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.464666] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.465076] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.465808] ^ [ 24.465967] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.466669] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.467587] ================================================================== [ 24.468765] ================================================================== [ 24.469382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.469776] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.470642] [ 24.470764] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.470815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.470828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.470853] Call Trace: [ 24.470875] <TASK> [ 24.470896] dump_stack_lvl+0x73/0xb0 [ 24.470926] print_report+0xd1/0x650 [ 24.470950] ? __virt_addr_valid+0x1db/0x2d0 [ 24.470975] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.471001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.471035] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.471062] kasan_report+0x141/0x180 [ 24.471083] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.471114] kasan_check_range+0x10c/0x1c0 [ 24.471137] __kasan_check_write+0x18/0x20 [ 24.471159] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 24.471186] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.471214] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.471247] ? trace_hardirqs_on+0x37/0xe0 [ 24.471269] ? kasan_bitops_generic+0x92/0x1c0 [ 24.471295] kasan_bitops_generic+0x121/0x1c0 [ 24.471318] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.471342] ? __pfx_read_tsc+0x10/0x10 [ 24.471364] ? ktime_get_ts64+0x86/0x230 [ 24.471389] kunit_try_run_case+0x1a5/0x480 [ 24.471413] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.471560] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.471585] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.471610] ? __kthread_parkme+0x82/0x180 [ 24.471632] ? preempt_count_sub+0x50/0x80 [ 24.471655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.471677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.471701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.471725] kthread+0x337/0x6f0 [ 24.471744] ? trace_preempt_on+0x20/0xc0 [ 24.471765] ? __pfx_kthread+0x10/0x10 [ 24.471796] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.471819] ? calculate_sigpending+0x7b/0xa0 [ 24.471843] ? __pfx_kthread+0x10/0x10 [ 24.471865] ret_from_fork+0x116/0x1d0 [ 24.471887] ? __pfx_kthread+0x10/0x10 [ 24.471908] ret_from_fork_asm+0x1a/0x30 [ 24.471942] </TASK> [ 24.471953] [ 24.483423] Allocated by task 290: [ 24.483688] kasan_save_stack+0x45/0x70 [ 24.484039] kasan_save_track+0x18/0x40 [ 24.484249] kasan_save_alloc_info+0x3b/0x50 [ 24.484677] __kasan_kmalloc+0xb7/0xc0 [ 24.484826] __kmalloc_cache_noprof+0x189/0x420 [ 24.485288] kasan_bitops_generic+0x92/0x1c0 [ 24.485552] kunit_try_run_case+0x1a5/0x480 [ 24.485738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.485988] kthread+0x337/0x6f0 [ 24.486447] ret_from_fork+0x116/0x1d0 [ 24.486708] ret_from_fork_asm+0x1a/0x30 [ 24.486911] [ 24.487012] The buggy address belongs to the object at ffff88810278b720 [ 24.487012] which belongs to the cache kmalloc-16 of size 16 [ 24.487620] The buggy address is located 8 bytes inside of [ 24.487620] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.488341] [ 24.488574] The buggy address belongs to the physical page: [ 24.488939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.489447] flags: 0x200000000000000(node=0|zone=2) [ 24.489807] page_type: f5(slab) [ 24.490055] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.490312] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.490756] page dumped because: kasan: bad access detected [ 24.491215] [ 24.491392] Memory state around the buggy address: [ 24.491574] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.492416] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.492836] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.493133] ^ [ 24.493516] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.493988] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.494393] ================================================================== [ 24.494978] ================================================================== [ 24.495247] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.495787] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.497036] [ 24.497350] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.497408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.497422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.497448] Call Trace: [ 24.497469] <TASK> [ 24.497491] dump_stack_lvl+0x73/0xb0 [ 24.497524] print_report+0xd1/0x650 [ 24.497548] ? __virt_addr_valid+0x1db/0x2d0 [ 24.497573] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.497599] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.497625] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.497652] kasan_report+0x141/0x180 [ 24.497672] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.497703] kasan_check_range+0x10c/0x1c0 [ 24.497725] __kasan_check_write+0x18/0x20 [ 24.497748] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 24.497783] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.497812] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.497836] ? trace_hardirqs_on+0x37/0xe0 [ 24.497858] ? kasan_bitops_generic+0x92/0x1c0 [ 24.497885] kasan_bitops_generic+0x121/0x1c0 [ 24.497907] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.497931] ? __pfx_read_tsc+0x10/0x10 [ 24.497953] ? ktime_get_ts64+0x86/0x230 [ 24.497978] kunit_try_run_case+0x1a5/0x480 [ 24.498003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.498025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.498051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.498075] ? __kthread_parkme+0x82/0x180 [ 24.498096] ? preempt_count_sub+0x50/0x80 [ 24.498118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.498140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.498164] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.498187] kthread+0x337/0x6f0 [ 24.498207] ? trace_preempt_on+0x20/0xc0 [ 24.498238] ? __pfx_kthread+0x10/0x10 [ 24.498259] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.498281] ? calculate_sigpending+0x7b/0xa0 [ 24.498305] ? __pfx_kthread+0x10/0x10 [ 24.498325] ret_from_fork+0x116/0x1d0 [ 24.498344] ? __pfx_kthread+0x10/0x10 [ 24.498363] ret_from_fork_asm+0x1a/0x30 [ 24.498395] </TASK> [ 24.498407] [ 24.513352] Allocated by task 290: [ 24.513530] kasan_save_stack+0x45/0x70 [ 24.513855] kasan_save_track+0x18/0x40 [ 24.514324] kasan_save_alloc_info+0x3b/0x50 [ 24.514695] __kasan_kmalloc+0xb7/0xc0 [ 24.514874] __kmalloc_cache_noprof+0x189/0x420 [ 24.515439] kasan_bitops_generic+0x92/0x1c0 [ 24.515894] kunit_try_run_case+0x1a5/0x480 [ 24.516293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.516820] kthread+0x337/0x6f0 [ 24.517105] ret_from_fork+0x116/0x1d0 [ 24.517487] ret_from_fork_asm+0x1a/0x30 [ 24.517898] [ 24.517977] The buggy address belongs to the object at ffff88810278b720 [ 24.517977] which belongs to the cache kmalloc-16 of size 16 [ 24.518622] The buggy address is located 8 bytes inside of [ 24.518622] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.519605] [ 24.519781] The buggy address belongs to the physical page: [ 24.520406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.521139] flags: 0x200000000000000(node=0|zone=2) [ 24.521333] page_type: f5(slab) [ 24.521454] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.521674] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.521901] page dumped because: kasan: bad access detected [ 24.522067] [ 24.522129] Memory state around the buggy address: [ 24.522293] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.522504] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.522811] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.523125] ^ [ 24.523424] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.523768] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.523978] ================================================================== [ 24.417968] ================================================================== [ 24.418304] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.418970] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.419335] [ 24.419476] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.419565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.419578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.419615] Call Trace: [ 24.419660] <TASK> [ 24.419683] dump_stack_lvl+0x73/0xb0 [ 24.419713] print_report+0xd1/0x650 [ 24.419735] ? __virt_addr_valid+0x1db/0x2d0 [ 24.419760] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.419786] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.419813] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.419839] kasan_report+0x141/0x180 [ 24.419861] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.419892] kasan_check_range+0x10c/0x1c0 [ 24.419914] __kasan_check_write+0x18/0x20 [ 24.419936] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 24.419963] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.419991] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.420014] ? trace_hardirqs_on+0x37/0xe0 [ 24.420038] ? kasan_bitops_generic+0x92/0x1c0 [ 24.420063] kasan_bitops_generic+0x121/0x1c0 [ 24.420086] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.420110] ? __pfx_read_tsc+0x10/0x10 [ 24.420511] ? ktime_get_ts64+0x86/0x230 [ 24.420540] kunit_try_run_case+0x1a5/0x480 [ 24.420567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.420590] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.420616] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.420640] ? __kthread_parkme+0x82/0x180 [ 24.420661] ? preempt_count_sub+0x50/0x80 [ 24.420684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.420708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.420730] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.420754] kthread+0x337/0x6f0 [ 24.420773] ? trace_preempt_on+0x20/0xc0 [ 24.420859] ? __pfx_kthread+0x10/0x10 [ 24.420881] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.420904] ? calculate_sigpending+0x7b/0xa0 [ 24.420929] ? __pfx_kthread+0x10/0x10 [ 24.420976] ret_from_fork+0x116/0x1d0 [ 24.420996] ? __pfx_kthread+0x10/0x10 [ 24.421016] ret_from_fork_asm+0x1a/0x30 [ 24.421048] </TASK> [ 24.421059] [ 24.430334] Allocated by task 290: [ 24.430465] kasan_save_stack+0x45/0x70 [ 24.430666] kasan_save_track+0x18/0x40 [ 24.430982] kasan_save_alloc_info+0x3b/0x50 [ 24.431271] __kasan_kmalloc+0xb7/0xc0 [ 24.431459] __kmalloc_cache_noprof+0x189/0x420 [ 24.431657] kasan_bitops_generic+0x92/0x1c0 [ 24.432083] kunit_try_run_case+0x1a5/0x480 [ 24.432279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.432596] kthread+0x337/0x6f0 [ 24.432787] ret_from_fork+0x116/0x1d0 [ 24.433034] ret_from_fork_asm+0x1a/0x30 [ 24.433198] [ 24.433305] The buggy address belongs to the object at ffff88810278b720 [ 24.433305] which belongs to the cache kmalloc-16 of size 16 [ 24.433913] The buggy address is located 8 bytes inside of [ 24.433913] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.434564] [ 24.434668] The buggy address belongs to the physical page: [ 24.434923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.435384] flags: 0x200000000000000(node=0|zone=2) [ 24.435617] page_type: f5(slab) [ 24.435766] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.436092] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.436323] page dumped because: kasan: bad access detected [ 24.436547] [ 24.436639] Memory state around the buggy address: [ 24.436862] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.437363] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.437681] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.438508] ^ [ 24.438668] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.439665] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.440262] ================================================================== [ 24.373705] ================================================================== [ 24.374340] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.374775] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.375149] [ 24.375358] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.375410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.375423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.375447] Call Trace: [ 24.375468] <TASK> [ 24.375490] dump_stack_lvl+0x73/0xb0 [ 24.375519] print_report+0xd1/0x650 [ 24.375542] ? __virt_addr_valid+0x1db/0x2d0 [ 24.375565] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.375592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.375618] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.375724] kasan_report+0x141/0x180 [ 24.375751] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.375820] kasan_check_range+0x10c/0x1c0 [ 24.375846] __kasan_check_write+0x18/0x20 [ 24.375869] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 24.375896] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.375922] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.375947] ? trace_hardirqs_on+0x37/0xe0 [ 24.375969] ? kasan_bitops_generic+0x92/0x1c0 [ 24.375994] kasan_bitops_generic+0x121/0x1c0 [ 24.376034] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.376058] ? __pfx_read_tsc+0x10/0x10 [ 24.376081] ? ktime_get_ts64+0x86/0x230 [ 24.376105] kunit_try_run_case+0x1a5/0x480 [ 24.376130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.376151] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.376178] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.376202] ? __kthread_parkme+0x82/0x180 [ 24.376282] ? preempt_count_sub+0x50/0x80 [ 24.376310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.376334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.376357] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.376381] kthread+0x337/0x6f0 [ 24.376401] ? trace_preempt_on+0x20/0xc0 [ 24.376422] ? __pfx_kthread+0x10/0x10 [ 24.376442] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.376465] ? calculate_sigpending+0x7b/0xa0 [ 24.376489] ? __pfx_kthread+0x10/0x10 [ 24.376510] ret_from_fork+0x116/0x1d0 [ 24.376529] ? __pfx_kthread+0x10/0x10 [ 24.376549] ret_from_fork_asm+0x1a/0x30 [ 24.376580] </TASK> [ 24.376591] [ 24.386591] Allocated by task 290: [ 24.386785] kasan_save_stack+0x45/0x70 [ 24.386995] kasan_save_track+0x18/0x40 [ 24.387263] kasan_save_alloc_info+0x3b/0x50 [ 24.387470] __kasan_kmalloc+0xb7/0xc0 [ 24.387823] __kmalloc_cache_noprof+0x189/0x420 [ 24.388148] kasan_bitops_generic+0x92/0x1c0 [ 24.388357] kunit_try_run_case+0x1a5/0x480 [ 24.388501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.388666] kthread+0x337/0x6f0 [ 24.388869] ret_from_fork+0x116/0x1d0 [ 24.389114] ret_from_fork_asm+0x1a/0x30 [ 24.389321] [ 24.389411] The buggy address belongs to the object at ffff88810278b720 [ 24.389411] which belongs to the cache kmalloc-16 of size 16 [ 24.390331] The buggy address is located 8 bytes inside of [ 24.390331] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.390849] [ 24.390945] The buggy address belongs to the physical page: [ 24.391233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.391695] flags: 0x200000000000000(node=0|zone=2) [ 24.391991] page_type: f5(slab) [ 24.392184] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.392560] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.392896] page dumped because: kasan: bad access detected [ 24.393147] [ 24.393368] Memory state around the buggy address: [ 24.393600] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.393933] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.394248] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.394463] ^ [ 24.394676] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.395481] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.395852] ================================================================== [ 24.564540] ================================================================== [ 24.565069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.565434] Read of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.565710] [ 24.565865] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.565916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.565929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.565953] Call Trace: [ 24.565974] <TASK> [ 24.565996] dump_stack_lvl+0x73/0xb0 [ 24.566040] print_report+0xd1/0x650 [ 24.566062] ? __virt_addr_valid+0x1db/0x2d0 [ 24.566086] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.566114] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.566139] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.566166] kasan_report+0x141/0x180 [ 24.566187] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.566217] __asan_report_load8_noabort+0x18/0x20 [ 24.566250] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 24.566279] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.566306] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.566329] ? trace_hardirqs_on+0x37/0xe0 [ 24.566352] ? kasan_bitops_generic+0x92/0x1c0 [ 24.566378] kasan_bitops_generic+0x121/0x1c0 [ 24.566401] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.566425] ? __pfx_read_tsc+0x10/0x10 [ 24.566446] ? ktime_get_ts64+0x86/0x230 [ 24.566470] kunit_try_run_case+0x1a5/0x480 [ 24.566494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.566517] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.566542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.566566] ? __kthread_parkme+0x82/0x180 [ 24.566586] ? preempt_count_sub+0x50/0x80 [ 24.566609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.566632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.566655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.566706] kthread+0x337/0x6f0 [ 24.566727] ? trace_preempt_on+0x20/0xc0 [ 24.566748] ? __pfx_kthread+0x10/0x10 [ 24.566768] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.566825] ? calculate_sigpending+0x7b/0xa0 [ 24.566849] ? __pfx_kthread+0x10/0x10 [ 24.566870] ret_from_fork+0x116/0x1d0 [ 24.566890] ? __pfx_kthread+0x10/0x10 [ 24.566925] ret_from_fork_asm+0x1a/0x30 [ 24.566970] </TASK> [ 24.566995] [ 24.575506] Allocated by task 290: [ 24.575684] kasan_save_stack+0x45/0x70 [ 24.575994] kasan_save_track+0x18/0x40 [ 24.576240] kasan_save_alloc_info+0x3b/0x50 [ 24.576489] __kasan_kmalloc+0xb7/0xc0 [ 24.576649] __kmalloc_cache_noprof+0x189/0x420 [ 24.576884] kasan_bitops_generic+0x92/0x1c0 [ 24.577100] kunit_try_run_case+0x1a5/0x480 [ 24.577319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.577536] kthread+0x337/0x6f0 [ 24.577674] ret_from_fork+0x116/0x1d0 [ 24.577885] ret_from_fork_asm+0x1a/0x30 [ 24.578117] [ 24.578227] The buggy address belongs to the object at ffff88810278b720 [ 24.578227] which belongs to the cache kmalloc-16 of size 16 [ 24.578689] The buggy address is located 8 bytes inside of [ 24.578689] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.579300] [ 24.579395] The buggy address belongs to the physical page: [ 24.579617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.579983] flags: 0x200000000000000(node=0|zone=2) [ 24.580233] page_type: f5(slab) [ 24.580466] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.580841] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.581188] page dumped because: kasan: bad access detected [ 24.581514] [ 24.581600] Memory state around the buggy address: [ 24.581854] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.582278] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.582574] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.582887] ^ [ 24.583185] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.583461] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.583741] ================================================================== [ 24.396397] ================================================================== [ 24.396740] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.397252] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.397573] [ 24.397682] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.397731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.397743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.397766] Call Trace: [ 24.397843] <TASK> [ 24.397864] dump_stack_lvl+0x73/0xb0 [ 24.397893] print_report+0xd1/0x650 [ 24.397933] ? __virt_addr_valid+0x1db/0x2d0 [ 24.397957] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.397983] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.398008] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.398034] kasan_report+0x141/0x180 [ 24.398055] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.398085] kasan_check_range+0x10c/0x1c0 [ 24.398124] __kasan_check_write+0x18/0x20 [ 24.398159] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 24.398186] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.398213] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.398246] ? trace_hardirqs_on+0x37/0xe0 [ 24.398267] ? kasan_bitops_generic+0x92/0x1c0 [ 24.398293] kasan_bitops_generic+0x121/0x1c0 [ 24.398316] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.398339] ? __pfx_read_tsc+0x10/0x10 [ 24.398361] ? ktime_get_ts64+0x86/0x230 [ 24.398385] kunit_try_run_case+0x1a5/0x480 [ 24.398409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.398431] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.398456] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.398480] ? __kthread_parkme+0x82/0x180 [ 24.398500] ? preempt_count_sub+0x50/0x80 [ 24.398541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.398565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.398588] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.398611] kthread+0x337/0x6f0 [ 24.398629] ? trace_preempt_on+0x20/0xc0 [ 24.398650] ? __pfx_kthread+0x10/0x10 [ 24.398670] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.398709] ? calculate_sigpending+0x7b/0xa0 [ 24.398733] ? __pfx_kthread+0x10/0x10 [ 24.398753] ret_from_fork+0x116/0x1d0 [ 24.398773] ? __pfx_kthread+0x10/0x10 [ 24.398826] ret_from_fork_asm+0x1a/0x30 [ 24.398859] </TASK> [ 24.398869] [ 24.408474] Allocated by task 290: [ 24.408650] kasan_save_stack+0x45/0x70 [ 24.408844] kasan_save_track+0x18/0x40 [ 24.409080] kasan_save_alloc_info+0x3b/0x50 [ 24.409504] __kasan_kmalloc+0xb7/0xc0 [ 24.409689] __kmalloc_cache_noprof+0x189/0x420 [ 24.409951] kasan_bitops_generic+0x92/0x1c0 [ 24.410093] kunit_try_run_case+0x1a5/0x480 [ 24.410332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.410674] kthread+0x337/0x6f0 [ 24.410857] ret_from_fork+0x116/0x1d0 [ 24.411079] ret_from_fork_asm+0x1a/0x30 [ 24.411303] [ 24.411395] The buggy address belongs to the object at ffff88810278b720 [ 24.411395] which belongs to the cache kmalloc-16 of size 16 [ 24.412145] The buggy address is located 8 bytes inside of [ 24.412145] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.412728] [ 24.412813] The buggy address belongs to the physical page: [ 24.413066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.413432] flags: 0x200000000000000(node=0|zone=2) [ 24.413663] page_type: f5(slab) [ 24.413826] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.414157] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.414636] page dumped because: kasan: bad access detected [ 24.414832] [ 24.414895] Memory state around the buggy address: [ 24.415104] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.415564] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.415982] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.416303] ^ [ 24.416536] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.416855] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.417424] ================================================================== [ 24.524511] ================================================================== [ 24.524882] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.525480] Write of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.525867] [ 24.525954] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.526024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.526056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.526080] Call Trace: [ 24.526102] <TASK> [ 24.526122] dump_stack_lvl+0x73/0xb0 [ 24.526164] print_report+0xd1/0x650 [ 24.526200] ? __virt_addr_valid+0x1db/0x2d0 [ 24.526235] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.526262] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.526308] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.526335] kasan_report+0x141/0x180 [ 24.526356] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.526387] kasan_check_range+0x10c/0x1c0 [ 24.526410] __kasan_check_write+0x18/0x20 [ 24.526433] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 24.526459] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.526503] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.526527] ? trace_hardirqs_on+0x37/0xe0 [ 24.526549] ? kasan_bitops_generic+0x92/0x1c0 [ 24.526576] kasan_bitops_generic+0x121/0x1c0 [ 24.526598] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.526621] ? __pfx_read_tsc+0x10/0x10 [ 24.526642] ? ktime_get_ts64+0x86/0x230 [ 24.526667] kunit_try_run_case+0x1a5/0x480 [ 24.526709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.526732] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.526758] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.526805] ? __kthread_parkme+0x82/0x180 [ 24.526826] ? preempt_count_sub+0x50/0x80 [ 24.526849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.526873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.526896] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.526920] kthread+0x337/0x6f0 [ 24.526938] ? trace_preempt_on+0x20/0xc0 [ 24.526977] ? __pfx_kthread+0x10/0x10 [ 24.526997] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.527067] ? calculate_sigpending+0x7b/0xa0 [ 24.527091] ? __pfx_kthread+0x10/0x10 [ 24.527111] ret_from_fork+0x116/0x1d0 [ 24.527131] ? __pfx_kthread+0x10/0x10 [ 24.527150] ret_from_fork_asm+0x1a/0x30 [ 24.527181] </TASK> [ 24.527192] [ 24.536129] Allocated by task 290: [ 24.536337] kasan_save_stack+0x45/0x70 [ 24.536536] kasan_save_track+0x18/0x40 [ 24.536717] kasan_save_alloc_info+0x3b/0x50 [ 24.536914] __kasan_kmalloc+0xb7/0xc0 [ 24.537035] __kmalloc_cache_noprof+0x189/0x420 [ 24.537177] kasan_bitops_generic+0x92/0x1c0 [ 24.537445] kunit_try_run_case+0x1a5/0x480 [ 24.537759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.538000] kthread+0x337/0x6f0 [ 24.538226] ret_from_fork+0x116/0x1d0 [ 24.538419] ret_from_fork_asm+0x1a/0x30 [ 24.538551] [ 24.538613] The buggy address belongs to the object at ffff88810278b720 [ 24.538613] which belongs to the cache kmalloc-16 of size 16 [ 24.538953] The buggy address is located 8 bytes inside of [ 24.538953] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.539399] [ 24.539492] The buggy address belongs to the physical page: [ 24.539890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.540298] flags: 0x200000000000000(node=0|zone=2) [ 24.540530] page_type: f5(slab) [ 24.540692] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.541097] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.541487] page dumped because: kasan: bad access detected [ 24.541667] [ 24.541745] Memory state around the buggy address: [ 24.542025] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.542366] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.542571] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.543033] ^ [ 24.543272] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.543595] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.543924] ================================================================== [ 24.544670] ================================================================== [ 24.545314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.545640] Read of size 8 at addr ffff88810278b728 by task kunit_try_catch/290 [ 24.545956] [ 24.546093] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) [ 24.546184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.546197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.546247] Call Trace: [ 24.546267] <TASK> [ 24.546289] dump_stack_lvl+0x73/0xb0 [ 24.546333] print_report+0xd1/0x650 [ 24.546370] ? __virt_addr_valid+0x1db/0x2d0 [ 24.546421] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.546448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.546473] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.546500] kasan_report+0x141/0x180 [ 24.546521] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.546551] kasan_check_range+0x10c/0x1c0 [ 24.546574] __kasan_check_read+0x15/0x20 [ 24.546596] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 24.546623] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.546649] ? __kmalloc_cache_noprof+0x189/0x420 [ 24.546672] ? trace_hardirqs_on+0x37/0xe0 [ 24.546694] ? kasan_bitops_generic+0x92/0x1c0 [ 24.546720] kasan_bitops_generic+0x121/0x1c0 [ 24.546745] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.546768] ? __pfx_read_tsc+0x10/0x10 [ 24.546790] ? ktime_get_ts64+0x86/0x230 [ 24.546814] kunit_try_run_case+0x1a5/0x480 [ 24.546839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.546861] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.546886] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.546910] ? __kthread_parkme+0x82/0x180 [ 24.546931] ? preempt_count_sub+0x50/0x80 [ 24.546957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.546982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.547024] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.547054] kthread+0x337/0x6f0 [ 24.547074] ? trace_preempt_on+0x20/0xc0 [ 24.547096] ? __pfx_kthread+0x10/0x10 [ 24.547116] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.547139] ? calculate_sigpending+0x7b/0xa0 [ 24.547163] ? __pfx_kthread+0x10/0x10 [ 24.547183] ret_from_fork+0x116/0x1d0 [ 24.547203] ? __pfx_kthread+0x10/0x10 [ 24.547231] ret_from_fork_asm+0x1a/0x30 [ 24.547263] </TASK> [ 24.547274] [ 24.555485] Allocated by task 290: [ 24.555701] kasan_save_stack+0x45/0x70 [ 24.555933] kasan_save_track+0x18/0x40 [ 24.556190] kasan_save_alloc_info+0x3b/0x50 [ 24.556410] __kasan_kmalloc+0xb7/0xc0 [ 24.556609] __kmalloc_cache_noprof+0x189/0x420 [ 24.556896] kasan_bitops_generic+0x92/0x1c0 [ 24.557177] kunit_try_run_case+0x1a5/0x480 [ 24.557404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.557630] kthread+0x337/0x6f0 [ 24.557742] ret_from_fork+0x116/0x1d0 [ 24.557864] ret_from_fork_asm+0x1a/0x30 [ 24.558119] [ 24.558265] The buggy address belongs to the object at ffff88810278b720 [ 24.558265] which belongs to the cache kmalloc-16 of size 16 [ 24.558826] The buggy address is located 8 bytes inside of [ 24.558826] allocated 9-byte region [ffff88810278b720, ffff88810278b729) [ 24.559451] [ 24.559525] The buggy address belongs to the physical page: [ 24.559767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10278b [ 24.560003] flags: 0x200000000000000(node=0|zone=2) [ 24.560243] page_type: f5(slab) [ 24.560407] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 24.560743] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.561077] page dumped because: kasan: bad access detected [ 24.561341] [ 24.561432] Memory state around the buggy address: [ 24.561597] ffff88810278b600: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 24.561809] ffff88810278b680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.562164] >ffff88810278b700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.562524] ^ [ 24.562760] ffff88810278b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.563142] ffff88810278b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.563675] ==================================================================