Date
July 2, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 35.076677] ================================================================== [ 35.076753] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 35.076893] Read of size 8 at addr fff00000c57889e8 by task kunit_try_catch/292 [ 35.077126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.077321] dump_stack_lvl+0x8c/0xd0 [ 35.077731] kasan_bitops_generic+0x11c/0x1c8 [ 35.077926] kthread+0x328/0x630 [ 35.078401] kasan_save_stack+0x3c/0x68 [ 35.078648] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.079009] kthread+0x328/0x630 [ 35.079320] [ 35.079826] page_type: f5(slab) [ 35.080368] [ 35.080599] fff00000c5788900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.081350] ==================================================================
[ 25.654457] ================================================================== [ 25.654809] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 25.655177] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.655603] [ 25.655696] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.655747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.655760] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.655784] Call Trace: [ 25.655807] <TASK> [ 25.655826] dump_stack_lvl+0x73/0xb0 [ 25.655857] print_report+0xd1/0x650 [ 25.655880] ? __virt_addr_valid+0x1db/0x2d0 [ 25.655905] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 25.655931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.655958] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 25.655985] kasan_report+0x141/0x180 [ 25.656007] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 25.656038] kasan_check_range+0x10c/0x1c0 [ 25.656073] __kasan_check_write+0x18/0x20 [ 25.656100] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 25.656128] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.656156] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.656181] ? trace_hardirqs_on+0x37/0xe0 [ 25.656204] ? kasan_bitops_generic+0x92/0x1c0 [ 25.656231] kasan_bitops_generic+0x121/0x1c0 [ 25.656254] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.656279] ? __pfx_read_tsc+0x10/0x10 [ 25.656302] ? ktime_get_ts64+0x86/0x230 [ 25.656329] kunit_try_run_case+0x1a5/0x480 [ 25.656355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.656379] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.656413] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.656436] ? __kthread_parkme+0x82/0x180 [ 25.656456] ? preempt_count_sub+0x50/0x80 [ 25.656480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.656505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.656530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.656554] kthread+0x337/0x6f0 [ 25.656574] ? trace_preempt_on+0x20/0xc0 [ 25.656596] ? __pfx_kthread+0x10/0x10 [ 25.656617] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.656641] ? calculate_sigpending+0x7b/0xa0 [ 25.656664] ? __pfx_kthread+0x10/0x10 [ 25.656686] ret_from_fork+0x116/0x1d0 [ 25.656706] ? __pfx_kthread+0x10/0x10 [ 25.656727] ret_from_fork_asm+0x1a/0x30 [ 25.656759] </TASK> [ 25.656771] [ 25.665853] Allocated by task 310: [ 25.666413] kasan_save_stack+0x45/0x70 [ 25.666643] kasan_save_track+0x18/0x40 [ 25.666836] kasan_save_alloc_info+0x3b/0x50 [ 25.667258] __kasan_kmalloc+0xb7/0xc0 [ 25.667454] __kmalloc_cache_noprof+0x189/0x420 [ 25.667672] kasan_bitops_generic+0x92/0x1c0 [ 25.667876] kunit_try_run_case+0x1a5/0x480 [ 25.668089] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.668402] kthread+0x337/0x6f0 [ 25.668528] ret_from_fork+0x116/0x1d0 [ 25.668700] ret_from_fork_asm+0x1a/0x30 [ 25.668890] [ 25.668976] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.668976] which belongs to the cache kmalloc-16 of size 16 [ 25.669387] The buggy address is located 8 bytes inside of [ 25.669387] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.669730] [ 25.669868] The buggy address belongs to the physical page: [ 25.670174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.670511] flags: 0x200000000000000(node=0|zone=2) [ 25.670742] page_type: f5(slab) [ 25.670917] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.671620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.671964] page dumped because: kasan: bad access detected [ 25.672155] [ 25.672403] Memory state around the buggy address: [ 25.672642] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.672928] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.673292] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.673576] ^ [ 25.673750] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.673987] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.674666] ================================================================== [ 25.541928] ================================================================== [ 25.542311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 25.542799] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.543196] [ 25.543419] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.543490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.543504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.543527] Call Trace: [ 25.543550] <TASK> [ 25.543739] dump_stack_lvl+0x73/0xb0 [ 25.543779] print_report+0xd1/0x650 [ 25.543804] ? __virt_addr_valid+0x1db/0x2d0 [ 25.543830] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 25.543856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.543882] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 25.543909] kasan_report+0x141/0x180 [ 25.543930] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 25.543963] kasan_check_range+0x10c/0x1c0 [ 25.543986] __kasan_check_write+0x18/0x20 [ 25.544010] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 25.544037] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.544078] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.544105] ? trace_hardirqs_on+0x37/0xe0 [ 25.544131] ? kasan_bitops_generic+0x92/0x1c0 [ 25.544158] kasan_bitops_generic+0x121/0x1c0 [ 25.544191] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.544216] ? __pfx_read_tsc+0x10/0x10 [ 25.544239] ? ktime_get_ts64+0x86/0x230 [ 25.544274] kunit_try_run_case+0x1a5/0x480 [ 25.544301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.544326] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.544348] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.544371] ? __kthread_parkme+0x82/0x180 [ 25.544392] ? preempt_count_sub+0x50/0x80 [ 25.544416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.544441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.544465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.544551] kthread+0x337/0x6f0 [ 25.544573] ? trace_preempt_on+0x20/0xc0 [ 25.544595] ? __pfx_kthread+0x10/0x10 [ 25.544616] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.544641] ? calculate_sigpending+0x7b/0xa0 [ 25.544665] ? __pfx_kthread+0x10/0x10 [ 25.544686] ret_from_fork+0x116/0x1d0 [ 25.544707] ? __pfx_kthread+0x10/0x10 [ 25.544727] ret_from_fork_asm+0x1a/0x30 [ 25.544759] </TASK> [ 25.544772] [ 25.558632] Allocated by task 310: [ 25.558785] kasan_save_stack+0x45/0x70 [ 25.559096] kasan_save_track+0x18/0x40 [ 25.559660] kasan_save_alloc_info+0x3b/0x50 [ 25.560239] __kasan_kmalloc+0xb7/0xc0 [ 25.560699] __kmalloc_cache_noprof+0x189/0x420 [ 25.561252] kasan_bitops_generic+0x92/0x1c0 [ 25.561652] kunit_try_run_case+0x1a5/0x480 [ 25.561807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.562016] kthread+0x337/0x6f0 [ 25.562554] ret_from_fork+0x116/0x1d0 [ 25.563074] ret_from_fork_asm+0x1a/0x30 [ 25.563645] [ 25.563902] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.563902] which belongs to the cache kmalloc-16 of size 16 [ 25.565027] The buggy address is located 8 bytes inside of [ 25.565027] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.566052] [ 25.566362] The buggy address belongs to the physical page: [ 25.566916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.567632] flags: 0x200000000000000(node=0|zone=2) [ 25.567800] page_type: f5(slab) [ 25.567918] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.568148] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.568402] page dumped because: kasan: bad access detected [ 25.568575] [ 25.568994] Memory state around the buggy address: [ 25.569359] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.569628] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.569960] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.570182] ^ [ 25.570396] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.570774] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.571098] ================================================================== [ 25.571775] ================================================================== [ 25.572076] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 25.572715] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.573141] [ 25.573319] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.573375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.573390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.573416] Call Trace: [ 25.573438] <TASK> [ 25.573460] dump_stack_lvl+0x73/0xb0 [ 25.573492] print_report+0xd1/0x650 [ 25.573515] ? __virt_addr_valid+0x1db/0x2d0 [ 25.573540] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 25.573567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.573593] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 25.573621] kasan_report+0x141/0x180 [ 25.573643] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 25.573673] kasan_check_range+0x10c/0x1c0 [ 25.573697] __kasan_check_write+0x18/0x20 [ 25.573720] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 25.573747] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.573775] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.573800] ? trace_hardirqs_on+0x37/0xe0 [ 25.573829] ? kasan_bitops_generic+0x92/0x1c0 [ 25.573855] kasan_bitops_generic+0x121/0x1c0 [ 25.573878] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.573903] ? __pfx_read_tsc+0x10/0x10 [ 25.573924] ? ktime_get_ts64+0x86/0x230 [ 25.573950] kunit_try_run_case+0x1a5/0x480 [ 25.573977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.573999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.574023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.574047] ? __kthread_parkme+0x82/0x180 [ 25.574080] ? preempt_count_sub+0x50/0x80 [ 25.574104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.574130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.574155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.574180] kthread+0x337/0x6f0 [ 25.574201] ? trace_preempt_on+0x20/0xc0 [ 25.574234] ? __pfx_kthread+0x10/0x10 [ 25.574255] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.574280] ? calculate_sigpending+0x7b/0xa0 [ 25.574304] ? __pfx_kthread+0x10/0x10 [ 25.574326] ret_from_fork+0x116/0x1d0 [ 25.574346] ? __pfx_kthread+0x10/0x10 [ 25.574367] ret_from_fork_asm+0x1a/0x30 [ 25.574398] </TASK> [ 25.574410] [ 25.582756] Allocated by task 310: [ 25.582947] kasan_save_stack+0x45/0x70 [ 25.583359] kasan_save_track+0x18/0x40 [ 25.583549] kasan_save_alloc_info+0x3b/0x50 [ 25.583749] __kasan_kmalloc+0xb7/0xc0 [ 25.583938] __kmalloc_cache_noprof+0x189/0x420 [ 25.584155] kasan_bitops_generic+0x92/0x1c0 [ 25.584610] kunit_try_run_case+0x1a5/0x480 [ 25.584822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.585099] kthread+0x337/0x6f0 [ 25.585350] ret_from_fork+0x116/0x1d0 [ 25.585539] ret_from_fork_asm+0x1a/0x30 [ 25.585690] [ 25.585754] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.585754] which belongs to the cache kmalloc-16 of size 16 [ 25.586404] The buggy address is located 8 bytes inside of [ 25.586404] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.586954] [ 25.587049] The buggy address belongs to the physical page: [ 25.587392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.587734] flags: 0x200000000000000(node=0|zone=2) [ 25.588018] page_type: f5(slab) [ 25.588163] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.588761] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.589134] page dumped because: kasan: bad access detected [ 25.589481] [ 25.589565] Memory state around the buggy address: [ 25.589770] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.590142] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.590570] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.590881] ^ [ 25.591121] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.591556] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.591813] ================================================================== [ 25.614213] ================================================================== [ 25.614836] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 25.615260] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.615538] [ 25.615779] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.615833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.615846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.615870] Call Trace: [ 25.615887] <TASK> [ 25.615907] dump_stack_lvl+0x73/0xb0 [ 25.615953] print_report+0xd1/0x650 [ 25.615977] ? __virt_addr_valid+0x1db/0x2d0 [ 25.616001] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 25.616027] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.616053] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 25.616091] kasan_report+0x141/0x180 [ 25.616112] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 25.616143] kasan_check_range+0x10c/0x1c0 [ 25.616167] __kasan_check_write+0x18/0x20 [ 25.616190] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 25.616295] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.616323] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.616348] ? trace_hardirqs_on+0x37/0xe0 [ 25.616371] ? kasan_bitops_generic+0x92/0x1c0 [ 25.616398] kasan_bitops_generic+0x121/0x1c0 [ 25.616420] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.616445] ? __pfx_read_tsc+0x10/0x10 [ 25.616467] ? ktime_get_ts64+0x86/0x230 [ 25.616491] kunit_try_run_case+0x1a5/0x480 [ 25.616518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.616541] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.616565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.616587] ? __kthread_parkme+0x82/0x180 [ 25.616608] ? preempt_count_sub+0x50/0x80 [ 25.616631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.616656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.616681] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.616705] kthread+0x337/0x6f0 [ 25.616725] ? trace_preempt_on+0x20/0xc0 [ 25.616747] ? __pfx_kthread+0x10/0x10 [ 25.616768] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.616792] ? calculate_sigpending+0x7b/0xa0 [ 25.616817] ? __pfx_kthread+0x10/0x10 [ 25.616838] ret_from_fork+0x116/0x1d0 [ 25.616857] ? __pfx_kthread+0x10/0x10 [ 25.616879] ret_from_fork_asm+0x1a/0x30 [ 25.616909] </TASK> [ 25.616923] [ 25.625023] Allocated by task 310: [ 25.625212] kasan_save_stack+0x45/0x70 [ 25.625392] kasan_save_track+0x18/0x40 [ 25.625557] kasan_save_alloc_info+0x3b/0x50 [ 25.625710] __kasan_kmalloc+0xb7/0xc0 [ 25.625841] __kmalloc_cache_noprof+0x189/0x420 [ 25.625994] kasan_bitops_generic+0x92/0x1c0 [ 25.626205] kunit_try_run_case+0x1a5/0x480 [ 25.626515] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.626872] kthread+0x337/0x6f0 [ 25.627106] ret_from_fork+0x116/0x1d0 [ 25.627542] ret_from_fork_asm+0x1a/0x30 [ 25.627715] [ 25.627796] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.627796] which belongs to the cache kmalloc-16 of size 16 [ 25.628467] The buggy address is located 8 bytes inside of [ 25.628467] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.628906] [ 25.629117] The buggy address belongs to the physical page: [ 25.629321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.629557] flags: 0x200000000000000(node=0|zone=2) [ 25.629715] page_type: f5(slab) [ 25.629839] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.630361] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.630706] page dumped because: kasan: bad access detected [ 25.630978] [ 25.631076] Memory state around the buggy address: [ 25.631548] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.631854] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.632183] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.632449] ^ [ 25.632660] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.633004] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.633289] ================================================================== [ 25.633727] ================================================================== [ 25.633986] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 25.634402] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.635003] [ 25.635136] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.635191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.635205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.635413] Call Trace: [ 25.635438] <TASK> [ 25.635458] dump_stack_lvl+0x73/0xb0 [ 25.635489] print_report+0xd1/0x650 [ 25.635512] ? __virt_addr_valid+0x1db/0x2d0 [ 25.635537] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 25.635564] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.635589] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 25.635617] kasan_report+0x141/0x180 [ 25.635639] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 25.635670] kasan_check_range+0x10c/0x1c0 [ 25.635693] __kasan_check_write+0x18/0x20 [ 25.635716] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 25.635743] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.635771] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.635796] ? trace_hardirqs_on+0x37/0xe0 [ 25.635819] ? kasan_bitops_generic+0x92/0x1c0 [ 25.635846] kasan_bitops_generic+0x121/0x1c0 [ 25.635869] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.635894] ? __pfx_read_tsc+0x10/0x10 [ 25.635915] ? ktime_get_ts64+0x86/0x230 [ 25.635951] kunit_try_run_case+0x1a5/0x480 [ 25.635977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.636001] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.636024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.636046] ? __kthread_parkme+0x82/0x180 [ 25.636081] ? preempt_count_sub+0x50/0x80 [ 25.636105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.636130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.636156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.636256] kthread+0x337/0x6f0 [ 25.636284] ? trace_preempt_on+0x20/0xc0 [ 25.636307] ? __pfx_kthread+0x10/0x10 [ 25.636327] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.636352] ? calculate_sigpending+0x7b/0xa0 [ 25.636377] ? __pfx_kthread+0x10/0x10 [ 25.636400] ret_from_fork+0x116/0x1d0 [ 25.636418] ? __pfx_kthread+0x10/0x10 [ 25.636439] ret_from_fork_asm+0x1a/0x30 [ 25.636471] </TASK> [ 25.636483] [ 25.645244] Allocated by task 310: [ 25.645444] kasan_save_stack+0x45/0x70 [ 25.645646] kasan_save_track+0x18/0x40 [ 25.645844] kasan_save_alloc_info+0x3b/0x50 [ 25.646147] __kasan_kmalloc+0xb7/0xc0 [ 25.646560] __kmalloc_cache_noprof+0x189/0x420 [ 25.646764] kasan_bitops_generic+0x92/0x1c0 [ 25.646906] kunit_try_run_case+0x1a5/0x480 [ 25.647132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.647502] kthread+0x337/0x6f0 [ 25.647651] ret_from_fork+0x116/0x1d0 [ 25.647808] ret_from_fork_asm+0x1a/0x30 [ 25.647980] [ 25.648085] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.648085] which belongs to the cache kmalloc-16 of size 16 [ 25.648843] The buggy address is located 8 bytes inside of [ 25.648843] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.649515] [ 25.649614] The buggy address belongs to the physical page: [ 25.649785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.650110] flags: 0x200000000000000(node=0|zone=2) [ 25.650343] page_type: f5(slab) [ 25.650561] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.650792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.651439] page dumped because: kasan: bad access detected [ 25.651641] [ 25.651732] Memory state around the buggy address: [ 25.651922] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.652232] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.652697] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.652987] ^ [ 25.653294] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.653597] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.653920] ================================================================== [ 25.695496] ================================================================== [ 25.695831] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 25.696397] Read of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.696707] [ 25.696818] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.696870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.696884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.696908] Call Trace: [ 25.696940] <TASK> [ 25.696960] dump_stack_lvl+0x73/0xb0 [ 25.696990] print_report+0xd1/0x650 [ 25.697014] ? __virt_addr_valid+0x1db/0x2d0 [ 25.697039] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 25.697077] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.697104] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 25.697132] kasan_report+0x141/0x180 [ 25.697154] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 25.697186] kasan_check_range+0x10c/0x1c0 [ 25.697209] __kasan_check_read+0x15/0x20 [ 25.697232] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 25.697260] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.697288] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.697326] ? trace_hardirqs_on+0x37/0xe0 [ 25.697350] ? kasan_bitops_generic+0x92/0x1c0 [ 25.697377] kasan_bitops_generic+0x121/0x1c0 [ 25.697400] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.697425] ? __pfx_read_tsc+0x10/0x10 [ 25.697447] ? ktime_get_ts64+0x86/0x230 [ 25.697473] kunit_try_run_case+0x1a5/0x480 [ 25.697499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.697523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.697546] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.697568] ? __kthread_parkme+0x82/0x180 [ 25.697590] ? preempt_count_sub+0x50/0x80 [ 25.697614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.697639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.697665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.697692] kthread+0x337/0x6f0 [ 25.697713] ? trace_preempt_on+0x20/0xc0 [ 25.697736] ? __pfx_kthread+0x10/0x10 [ 25.697757] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.697782] ? calculate_sigpending+0x7b/0xa0 [ 25.697807] ? __pfx_kthread+0x10/0x10 [ 25.697835] ret_from_fork+0x116/0x1d0 [ 25.697855] ? __pfx_kthread+0x10/0x10 [ 25.697878] ret_from_fork_asm+0x1a/0x30 [ 25.697912] </TASK> [ 25.697925] [ 25.706835] Allocated by task 310: [ 25.707016] kasan_save_stack+0x45/0x70 [ 25.707184] kasan_save_track+0x18/0x40 [ 25.707410] kasan_save_alloc_info+0x3b/0x50 [ 25.707625] __kasan_kmalloc+0xb7/0xc0 [ 25.707805] __kmalloc_cache_noprof+0x189/0x420 [ 25.708019] kasan_bitops_generic+0x92/0x1c0 [ 25.708237] kunit_try_run_case+0x1a5/0x480 [ 25.708491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.708751] kthread+0x337/0x6f0 [ 25.708894] ret_from_fork+0x116/0x1d0 [ 25.709108] ret_from_fork_asm+0x1a/0x30 [ 25.709298] [ 25.709422] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.709422] which belongs to the cache kmalloc-16 of size 16 [ 25.709881] The buggy address is located 8 bytes inside of [ 25.709881] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.710615] [ 25.710704] The buggy address belongs to the physical page: [ 25.710928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.711386] flags: 0x200000000000000(node=0|zone=2) [ 25.711585] page_type: f5(slab) [ 25.711754] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.712055] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.712289] page dumped because: kasan: bad access detected [ 25.712456] [ 25.712520] Memory state around the buggy address: [ 25.712669] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.713039] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.713675] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.714096] ^ [ 25.714602] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.714823] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.715147] ================================================================== [ 25.675085] ================================================================== [ 25.675422] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 25.676111] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.676674] [ 25.676785] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.676839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.676854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.676877] Call Trace: [ 25.676900] <TASK> [ 25.676920] dump_stack_lvl+0x73/0xb0 [ 25.676952] print_report+0xd1/0x650 [ 25.676976] ? __virt_addr_valid+0x1db/0x2d0 [ 25.677002] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 25.677028] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.677055] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 25.677094] kasan_report+0x141/0x180 [ 25.677116] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 25.677148] kasan_check_range+0x10c/0x1c0 [ 25.677170] __kasan_check_write+0x18/0x20 [ 25.677244] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 25.677273] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.677302] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.677328] ? trace_hardirqs_on+0x37/0xe0 [ 25.677352] ? kasan_bitops_generic+0x92/0x1c0 [ 25.677380] kasan_bitops_generic+0x121/0x1c0 [ 25.677405] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.677430] ? __pfx_read_tsc+0x10/0x10 [ 25.677453] ? ktime_get_ts64+0x86/0x230 [ 25.677479] kunit_try_run_case+0x1a5/0x480 [ 25.677506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.677530] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.677553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.677576] ? __kthread_parkme+0x82/0x180 [ 25.677597] ? preempt_count_sub+0x50/0x80 [ 25.677621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.677646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.677671] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.677696] kthread+0x337/0x6f0 [ 25.677716] ? trace_preempt_on+0x20/0xc0 [ 25.677738] ? __pfx_kthread+0x10/0x10 [ 25.677759] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.677784] ? calculate_sigpending+0x7b/0xa0 [ 25.677808] ? __pfx_kthread+0x10/0x10 [ 25.677839] ret_from_fork+0x116/0x1d0 [ 25.677858] ? __pfx_kthread+0x10/0x10 [ 25.677879] ret_from_fork_asm+0x1a/0x30 [ 25.677911] </TASK> [ 25.677924] [ 25.686555] Allocated by task 310: [ 25.686706] kasan_save_stack+0x45/0x70 [ 25.686911] kasan_save_track+0x18/0x40 [ 25.687052] kasan_save_alloc_info+0x3b/0x50 [ 25.687203] __kasan_kmalloc+0xb7/0xc0 [ 25.687330] __kmalloc_cache_noprof+0x189/0x420 [ 25.687507] kasan_bitops_generic+0x92/0x1c0 [ 25.687993] kunit_try_run_case+0x1a5/0x480 [ 25.688335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.688599] kthread+0x337/0x6f0 [ 25.688773] ret_from_fork+0x116/0x1d0 [ 25.688972] ret_from_fork_asm+0x1a/0x30 [ 25.689154] [ 25.689313] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.689313] which belongs to the cache kmalloc-16 of size 16 [ 25.689800] The buggy address is located 8 bytes inside of [ 25.689800] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.690403] [ 25.690552] The buggy address belongs to the physical page: [ 25.690734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.690970] flags: 0x200000000000000(node=0|zone=2) [ 25.691144] page_type: f5(slab) [ 25.691314] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.691651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.691984] page dumped because: kasan: bad access detected [ 25.692286] [ 25.692355] Memory state around the buggy address: [ 25.692505] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.692781] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.693137] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.693640] ^ [ 25.693807] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.694019] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.694732] ================================================================== [ 25.592658] ================================================================== [ 25.592971] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 25.593425] Write of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.593797] [ 25.593944] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.593998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.594012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.594035] Call Trace: [ 25.594086] <TASK> [ 25.594109] dump_stack_lvl+0x73/0xb0 [ 25.594141] print_report+0xd1/0x650 [ 25.594164] ? __virt_addr_valid+0x1db/0x2d0 [ 25.594307] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 25.594336] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.594361] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 25.594389] kasan_report+0x141/0x180 [ 25.594411] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 25.594443] kasan_check_range+0x10c/0x1c0 [ 25.594487] __kasan_check_write+0x18/0x20 [ 25.594510] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 25.594538] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.594580] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.594606] ? trace_hardirqs_on+0x37/0xe0 [ 25.594629] ? kasan_bitops_generic+0x92/0x1c0 [ 25.594657] kasan_bitops_generic+0x121/0x1c0 [ 25.594680] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.594705] ? __pfx_read_tsc+0x10/0x10 [ 25.594727] ? ktime_get_ts64+0x86/0x230 [ 25.594752] kunit_try_run_case+0x1a5/0x480 [ 25.594779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.594803] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.594827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.594849] ? __kthread_parkme+0x82/0x180 [ 25.594870] ? preempt_count_sub+0x50/0x80 [ 25.594894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.594957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.594984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.595009] kthread+0x337/0x6f0 [ 25.595028] ? trace_preempt_on+0x20/0xc0 [ 25.595051] ? __pfx_kthread+0x10/0x10 [ 25.595081] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.595121] ? calculate_sigpending+0x7b/0xa0 [ 25.595146] ? __pfx_kthread+0x10/0x10 [ 25.595168] ret_from_fork+0x116/0x1d0 [ 25.595250] ? __pfx_kthread+0x10/0x10 [ 25.595272] ret_from_fork_asm+0x1a/0x30 [ 25.595304] </TASK> [ 25.595317] [ 25.604763] Allocated by task 310: [ 25.604939] kasan_save_stack+0x45/0x70 [ 25.605274] kasan_save_track+0x18/0x40 [ 25.605469] kasan_save_alloc_info+0x3b/0x50 [ 25.605640] __kasan_kmalloc+0xb7/0xc0 [ 25.605863] __kmalloc_cache_noprof+0x189/0x420 [ 25.606104] kasan_bitops_generic+0x92/0x1c0 [ 25.606415] kunit_try_run_case+0x1a5/0x480 [ 25.606630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.606870] kthread+0x337/0x6f0 [ 25.607077] ret_from_fork+0x116/0x1d0 [ 25.607336] ret_from_fork_asm+0x1a/0x30 [ 25.607514] [ 25.607620] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.607620] which belongs to the cache kmalloc-16 of size 16 [ 25.608145] The buggy address is located 8 bytes inside of [ 25.608145] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.608753] [ 25.608846] The buggy address belongs to the physical page: [ 25.609145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.609562] flags: 0x200000000000000(node=0|zone=2) [ 25.609784] page_type: f5(slab) [ 25.610007] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.610456] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.610769] page dumped because: kasan: bad access detected [ 25.611081] [ 25.611155] Memory state around the buggy address: [ 25.611583] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.611840] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.612159] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.612400] ^ [ 25.612584] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.612899] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.613739] ================================================================== [ 25.715826] ================================================================== [ 25.716124] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 25.716390] Read of size 8 at addr ffff8881049ad5c8 by task kunit_try_catch/310 [ 25.716944] [ 25.717080] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.717133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.717147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.717171] Call Trace: [ 25.717194] <TASK> [ 25.717217] dump_stack_lvl+0x73/0xb0 [ 25.717250] print_report+0xd1/0x650 [ 25.717275] ? __virt_addr_valid+0x1db/0x2d0 [ 25.717300] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 25.717328] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.717356] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 25.717386] kasan_report+0x141/0x180 [ 25.717409] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 25.717442] __asan_report_load8_noabort+0x18/0x20 [ 25.717467] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 25.717495] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.717523] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.717549] ? trace_hardirqs_on+0x37/0xe0 [ 25.717573] ? kasan_bitops_generic+0x92/0x1c0 [ 25.717600] kasan_bitops_generic+0x121/0x1c0 [ 25.717625] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.717650] ? __pfx_read_tsc+0x10/0x10 [ 25.717673] ? ktime_get_ts64+0x86/0x230 [ 25.717698] kunit_try_run_case+0x1a5/0x480 [ 25.717725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.717751] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.717774] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.717797] ? __kthread_parkme+0x82/0x180 [ 25.717824] ? preempt_count_sub+0x50/0x80 [ 25.717862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.717888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.717914] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.717939] kthread+0x337/0x6f0 [ 25.717960] ? trace_preempt_on+0x20/0xc0 [ 25.717983] ? __pfx_kthread+0x10/0x10 [ 25.718004] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.718029] ? calculate_sigpending+0x7b/0xa0 [ 25.718054] ? __pfx_kthread+0x10/0x10 [ 25.718085] ret_from_fork+0x116/0x1d0 [ 25.718105] ? __pfx_kthread+0x10/0x10 [ 25.718126] ret_from_fork_asm+0x1a/0x30 [ 25.718159] </TASK> [ 25.718172] [ 25.726687] Allocated by task 310: [ 25.726875] kasan_save_stack+0x45/0x70 [ 25.727046] kasan_save_track+0x18/0x40 [ 25.727385] kasan_save_alloc_info+0x3b/0x50 [ 25.727553] __kasan_kmalloc+0xb7/0xc0 [ 25.727679] __kmalloc_cache_noprof+0x189/0x420 [ 25.727827] kasan_bitops_generic+0x92/0x1c0 [ 25.728382] kunit_try_run_case+0x1a5/0x480 [ 25.728611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.728862] kthread+0x337/0x6f0 [ 25.729053] ret_from_fork+0x116/0x1d0 [ 25.729296] ret_from_fork_asm+0x1a/0x30 [ 25.729506] [ 25.729597] The buggy address belongs to the object at ffff8881049ad5c0 [ 25.729597] which belongs to the cache kmalloc-16 of size 16 [ 25.729965] The buggy address is located 8 bytes inside of [ 25.729965] allocated 9-byte region [ffff8881049ad5c0, ffff8881049ad5c9) [ 25.730787] [ 25.730878] The buggy address belongs to the physical page: [ 25.731070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049ad [ 25.731300] flags: 0x200000000000000(node=0|zone=2) [ 25.731461] page_type: f5(slab) [ 25.731578] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 25.732104] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.732824] page dumped because: kasan: bad access detected [ 25.733074] [ 25.733446] Memory state around the buggy address: [ 25.733675] ffff8881049ad480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.733947] ffff8881049ad500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.734253] >ffff8881049ad580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.734526] ^ [ 25.734717] ffff8881049ad600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.734917] ffff8881049ad680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.735274] ==================================================================
[ 25.473808] ================================================================== [ 25.474832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 25.475110] Read of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.475444] [ 25.475569] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.475620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.475634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.475657] Call Trace: [ 25.475673] <TASK> [ 25.475785] dump_stack_lvl+0x73/0xb0 [ 25.475818] print_report+0xd1/0x650 [ 25.475840] ? __virt_addr_valid+0x1db/0x2d0 [ 25.475863] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 25.475890] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.475918] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 25.475944] kasan_report+0x141/0x180 [ 25.475966] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 25.475997] __asan_report_load8_noabort+0x18/0x20 [ 25.476021] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 25.476048] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.476082] kasan_bitops_generic+0x121/0x1c0 [ 25.476105] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.476129] ? __pfx_read_tsc+0x10/0x10 [ 25.476149] ? ktime_get_ts64+0x86/0x230 [ 25.476174] kunit_try_run_case+0x1a5/0x480 [ 25.476198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.476222] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.476242] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.476264] ? __kthread_parkme+0x82/0x180 [ 25.476284] ? preempt_count_sub+0x50/0x80 [ 25.476321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.476347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.476371] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.476395] kthread+0x337/0x6f0 [ 25.476414] ? trace_preempt_on+0x20/0xc0 [ 25.476436] ? __pfx_kthread+0x10/0x10 [ 25.476456] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.476481] ? calculate_sigpending+0x7b/0xa0 [ 25.476734] ? __pfx_kthread+0x10/0x10 [ 25.476757] ret_from_fork+0x116/0x1d0 [ 25.476776] ? __pfx_kthread+0x10/0x10 [ 25.476798] ret_from_fork_asm+0x1a/0x30 [ 25.476828] </TASK> [ 25.476840] [ 25.486982] Allocated by task 309: [ 25.487126] kasan_save_stack+0x45/0x70 [ 25.487333] kasan_save_track+0x18/0x40 [ 25.487812] kasan_save_alloc_info+0x3b/0x50 [ 25.487972] __kasan_kmalloc+0xb7/0xc0 [ 25.488160] __kmalloc_cache_noprof+0x189/0x420 [ 25.488470] kasan_bitops_generic+0x92/0x1c0 [ 25.488892] kunit_try_run_case+0x1a5/0x480 [ 25.489113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.489354] kthread+0x337/0x6f0 [ 25.489507] ret_from_fork+0x116/0x1d0 [ 25.489931] ret_from_fork_asm+0x1a/0x30 [ 25.490121] [ 25.490213] The buggy address belongs to the object at ffff88810586d4c0 [ 25.490213] which belongs to the cache kmalloc-16 of size 16 [ 25.490851] The buggy address is located 8 bytes inside of [ 25.490851] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.491601] [ 25.491681] The buggy address belongs to the physical page: [ 25.492088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.492778] flags: 0x200000000000000(node=0|zone=2) [ 25.493212] page_type: f5(slab) [ 25.493404] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.493922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.494323] page dumped because: kasan: bad access detected [ 25.494544] [ 25.494711] Memory state around the buggy address: [ 25.495110] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.495576] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.496132] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.496529] ^ [ 25.496774] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.497041] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.497326] ================================================================== [ 25.332431] ================================================================== [ 25.332802] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 25.333486] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.333992] [ 25.334099] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.334148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.334162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.334183] Call Trace: [ 25.334196] <TASK> [ 25.334209] dump_stack_lvl+0x73/0xb0 [ 25.334237] print_report+0xd1/0x650 [ 25.334258] ? __virt_addr_valid+0x1db/0x2d0 [ 25.334281] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 25.334320] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.334346] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 25.334373] kasan_report+0x141/0x180 [ 25.334395] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 25.334426] kasan_check_range+0x10c/0x1c0 [ 25.334449] __kasan_check_write+0x18/0x20 [ 25.334472] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 25.334499] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.334533] kasan_bitops_generic+0x121/0x1c0 [ 25.334556] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.334581] ? __pfx_read_tsc+0x10/0x10 [ 25.334602] ? ktime_get_ts64+0x86/0x230 [ 25.334626] kunit_try_run_case+0x1a5/0x480 [ 25.334650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.334673] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.334696] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.334717] ? __kthread_parkme+0x82/0x180 [ 25.334952] ? preempt_count_sub+0x50/0x80 [ 25.334986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.335013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.335038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.335064] kthread+0x337/0x6f0 [ 25.335084] ? trace_preempt_on+0x20/0xc0 [ 25.335107] ? __pfx_kthread+0x10/0x10 [ 25.335129] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.335154] ? calculate_sigpending+0x7b/0xa0 [ 25.335178] ? __pfx_kthread+0x10/0x10 [ 25.335200] ret_from_fork+0x116/0x1d0 [ 25.335219] ? __pfx_kthread+0x10/0x10 [ 25.335240] ret_from_fork_asm+0x1a/0x30 [ 25.335270] </TASK> [ 25.335282] [ 25.342732] Allocated by task 309: [ 25.342860] kasan_save_stack+0x45/0x70 [ 25.342995] kasan_save_track+0x18/0x40 [ 25.343122] kasan_save_alloc_info+0x3b/0x50 [ 25.343339] __kasan_kmalloc+0xb7/0xc0 [ 25.343693] __kmalloc_cache_noprof+0x189/0x420 [ 25.343966] kasan_bitops_generic+0x92/0x1c0 [ 25.344173] kunit_try_run_case+0x1a5/0x480 [ 25.344396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.344658] kthread+0x337/0x6f0 [ 25.344880] ret_from_fork+0x116/0x1d0 [ 25.345041] ret_from_fork_asm+0x1a/0x30 [ 25.345174] [ 25.345239] The buggy address belongs to the object at ffff88810586d4c0 [ 25.345239] which belongs to the cache kmalloc-16 of size 16 [ 25.345643] The buggy address is located 8 bytes inside of [ 25.345643] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.346157] [ 25.346223] The buggy address belongs to the physical page: [ 25.346640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.346902] flags: 0x200000000000000(node=0|zone=2) [ 25.347059] page_type: f5(slab) [ 25.347174] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.347684] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.348184] page dumped because: kasan: bad access detected [ 25.348512] [ 25.348607] Memory state around the buggy address: [ 25.348855] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.349128] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.349425] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.349748] ^ [ 25.350008] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.350345] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.350614] ================================================================== [ 25.351174] ================================================================== [ 25.351466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 25.351971] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.352224] [ 25.352298] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.352355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.352369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.352389] Call Trace: [ 25.352403] <TASK> [ 25.352416] dump_stack_lvl+0x73/0xb0 [ 25.352442] print_report+0xd1/0x650 [ 25.352465] ? __virt_addr_valid+0x1db/0x2d0 [ 25.352487] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 25.352524] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.352551] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 25.352577] kasan_report+0x141/0x180 [ 25.352599] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 25.352630] kasan_check_range+0x10c/0x1c0 [ 25.352653] __kasan_check_write+0x18/0x20 [ 25.352677] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 25.352704] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.352737] kasan_bitops_generic+0x121/0x1c0 [ 25.352761] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.352786] ? __pfx_read_tsc+0x10/0x10 [ 25.352808] ? ktime_get_ts64+0x86/0x230 [ 25.352831] kunit_try_run_case+0x1a5/0x480 [ 25.352856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.352879] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.352900] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.352922] ? __kthread_parkme+0x82/0x180 [ 25.352943] ? preempt_count_sub+0x50/0x80 [ 25.352966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.352991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.353062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.353090] kthread+0x337/0x6f0 [ 25.353110] ? trace_preempt_on+0x20/0xc0 [ 25.353132] ? __pfx_kthread+0x10/0x10 [ 25.353153] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.353178] ? calculate_sigpending+0x7b/0xa0 [ 25.353201] ? __pfx_kthread+0x10/0x10 [ 25.353222] ret_from_fork+0x116/0x1d0 [ 25.353242] ? __pfx_kthread+0x10/0x10 [ 25.353263] ret_from_fork_asm+0x1a/0x30 [ 25.353293] </TASK> [ 25.353304] [ 25.362530] Allocated by task 309: [ 25.363056] kasan_save_stack+0x45/0x70 [ 25.363472] kasan_save_track+0x18/0x40 [ 25.363935] kasan_save_alloc_info+0x3b/0x50 [ 25.364345] __kasan_kmalloc+0xb7/0xc0 [ 25.364777] __kmalloc_cache_noprof+0x189/0x420 [ 25.365167] kasan_bitops_generic+0x92/0x1c0 [ 25.365331] kunit_try_run_case+0x1a5/0x480 [ 25.365793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.366271] kthread+0x337/0x6f0 [ 25.366555] ret_from_fork+0x116/0x1d0 [ 25.366966] ret_from_fork_asm+0x1a/0x30 [ 25.367116] [ 25.367182] The buggy address belongs to the object at ffff88810586d4c0 [ 25.367182] which belongs to the cache kmalloc-16 of size 16 [ 25.367536] The buggy address is located 8 bytes inside of [ 25.367536] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.367881] [ 25.367947] The buggy address belongs to the physical page: [ 25.368169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.368920] flags: 0x200000000000000(node=0|zone=2) [ 25.369446] page_type: f5(slab) [ 25.369852] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.370574] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.371433] page dumped because: kasan: bad access detected [ 25.372097] [ 25.372284] Memory state around the buggy address: [ 25.372806] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.373510] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.374431] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.375296] ^ [ 25.375973] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.376752] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.377378] ================================================================== [ 25.451044] ================================================================== [ 25.451356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 25.451735] Read of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.452159] [ 25.452275] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.452333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.452346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.452367] Call Trace: [ 25.452383] <TASK> [ 25.452397] dump_stack_lvl+0x73/0xb0 [ 25.452424] print_report+0xd1/0x650 [ 25.452482] ? __virt_addr_valid+0x1db/0x2d0 [ 25.452518] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 25.452555] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.452581] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 25.452608] kasan_report+0x141/0x180 [ 25.452630] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 25.452662] kasan_check_range+0x10c/0x1c0 [ 25.452685] __kasan_check_read+0x15/0x20 [ 25.452708] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 25.452735] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.452842] kasan_bitops_generic+0x121/0x1c0 [ 25.452905] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.452930] ? __pfx_read_tsc+0x10/0x10 [ 25.452962] ? ktime_get_ts64+0x86/0x230 [ 25.452987] kunit_try_run_case+0x1a5/0x480 [ 25.453039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.453064] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.453097] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.453119] ? __kthread_parkme+0x82/0x180 [ 25.453139] ? preempt_count_sub+0x50/0x80 [ 25.453162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.453187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.453211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.453236] kthread+0x337/0x6f0 [ 25.453255] ? trace_preempt_on+0x20/0xc0 [ 25.453276] ? __pfx_kthread+0x10/0x10 [ 25.453298] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.453333] ? calculate_sigpending+0x7b/0xa0 [ 25.453355] ? __pfx_kthread+0x10/0x10 [ 25.453377] ret_from_fork+0x116/0x1d0 [ 25.453397] ? __pfx_kthread+0x10/0x10 [ 25.453418] ret_from_fork_asm+0x1a/0x30 [ 25.453449] </TASK> [ 25.453461] [ 25.462691] Allocated by task 309: [ 25.462825] kasan_save_stack+0x45/0x70 [ 25.463211] kasan_save_track+0x18/0x40 [ 25.463641] kasan_save_alloc_info+0x3b/0x50 [ 25.463842] __kasan_kmalloc+0xb7/0xc0 [ 25.464282] __kmalloc_cache_noprof+0x189/0x420 [ 25.464449] kasan_bitops_generic+0x92/0x1c0 [ 25.464927] kunit_try_run_case+0x1a5/0x480 [ 25.465246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.465540] kthread+0x337/0x6f0 [ 25.465764] ret_from_fork+0x116/0x1d0 [ 25.466019] ret_from_fork_asm+0x1a/0x30 [ 25.466529] [ 25.466623] The buggy address belongs to the object at ffff88810586d4c0 [ 25.466623] which belongs to the cache kmalloc-16 of size 16 [ 25.467235] The buggy address is located 8 bytes inside of [ 25.467235] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.468011] [ 25.468110] The buggy address belongs to the physical page: [ 25.468320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.468834] flags: 0x200000000000000(node=0|zone=2) [ 25.469058] page_type: f5(slab) [ 25.469236] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.469636] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.470078] page dumped because: kasan: bad access detected [ 25.470405] [ 25.470492] Memory state around the buggy address: [ 25.470795] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.471337] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.471767] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.472277] ^ [ 25.472550] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.472975] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.473319] ================================================================== [ 25.378263] ================================================================== [ 25.378513] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 25.379233] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.380032] [ 25.380353] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.380406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.380419] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.380440] Call Trace: [ 25.380456] <TASK> [ 25.380471] dump_stack_lvl+0x73/0xb0 [ 25.380530] print_report+0xd1/0x650 [ 25.380552] ? __virt_addr_valid+0x1db/0x2d0 [ 25.380587] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 25.380614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.380639] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 25.380666] kasan_report+0x141/0x180 [ 25.380746] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 25.380778] kasan_check_range+0x10c/0x1c0 [ 25.380801] __kasan_check_write+0x18/0x20 [ 25.380825] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 25.380851] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.380885] kasan_bitops_generic+0x121/0x1c0 [ 25.380908] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.380932] ? __pfx_read_tsc+0x10/0x10 [ 25.380953] ? ktime_get_ts64+0x86/0x230 [ 25.380977] kunit_try_run_case+0x1a5/0x480 [ 25.381002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.381025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.381046] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.381069] ? __kthread_parkme+0x82/0x180 [ 25.381089] ? preempt_count_sub+0x50/0x80 [ 25.381112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.381136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.381160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.381185] kthread+0x337/0x6f0 [ 25.381204] ? trace_preempt_on+0x20/0xc0 [ 25.381226] ? __pfx_kthread+0x10/0x10 [ 25.381247] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.381270] ? calculate_sigpending+0x7b/0xa0 [ 25.381294] ? __pfx_kthread+0x10/0x10 [ 25.381329] ret_from_fork+0x116/0x1d0 [ 25.381349] ? __pfx_kthread+0x10/0x10 [ 25.381370] ret_from_fork_asm+0x1a/0x30 [ 25.381400] </TASK> [ 25.381413] [ 25.394372] Allocated by task 309: [ 25.394525] kasan_save_stack+0x45/0x70 [ 25.395149] kasan_save_track+0x18/0x40 [ 25.395659] kasan_save_alloc_info+0x3b/0x50 [ 25.396299] __kasan_kmalloc+0xb7/0xc0 [ 25.396830] __kmalloc_cache_noprof+0x189/0x420 [ 25.397260] kasan_bitops_generic+0x92/0x1c0 [ 25.397428] kunit_try_run_case+0x1a5/0x480 [ 25.397611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.398318] kthread+0x337/0x6f0 [ 25.398790] ret_from_fork+0x116/0x1d0 [ 25.399281] ret_from_fork_asm+0x1a/0x30 [ 25.399904] [ 25.400230] The buggy address belongs to the object at ffff88810586d4c0 [ 25.400230] which belongs to the cache kmalloc-16 of size 16 [ 25.401350] The buggy address is located 8 bytes inside of [ 25.401350] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.402064] [ 25.402406] The buggy address belongs to the physical page: [ 25.403018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.403647] flags: 0x200000000000000(node=0|zone=2) [ 25.404220] page_type: f5(slab) [ 25.404365] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.405034] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.406050] page dumped because: kasan: bad access detected [ 25.406552] [ 25.406711] Memory state around the buggy address: [ 25.407161] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.407519] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.408462] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.409026] ^ [ 25.409211] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.409444] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.409727] ================================================================== [ 25.410227] ================================================================== [ 25.410484] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 25.411042] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.411325] [ 25.411444] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.411514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.411528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.411561] Call Trace: [ 25.411577] <TASK> [ 25.411592] dump_stack_lvl+0x73/0xb0 [ 25.411619] print_report+0xd1/0x650 [ 25.411641] ? __virt_addr_valid+0x1db/0x2d0 [ 25.411664] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 25.411689] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.411715] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 25.411742] kasan_report+0x141/0x180 [ 25.411764] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 25.411795] kasan_check_range+0x10c/0x1c0 [ 25.411818] __kasan_check_write+0x18/0x20 [ 25.411840] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 25.411867] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.411911] kasan_bitops_generic+0x121/0x1c0 [ 25.411935] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.411959] ? __pfx_read_tsc+0x10/0x10 [ 25.412047] ? ktime_get_ts64+0x86/0x230 [ 25.412077] kunit_try_run_case+0x1a5/0x480 [ 25.412102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.412139] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.412161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.412183] ? __kthread_parkme+0x82/0x180 [ 25.412204] ? preempt_count_sub+0x50/0x80 [ 25.412227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.412252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.412277] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.412302] kthread+0x337/0x6f0 [ 25.412342] ? trace_preempt_on+0x20/0xc0 [ 25.412365] ? __pfx_kthread+0x10/0x10 [ 25.412386] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.412420] ? calculate_sigpending+0x7b/0xa0 [ 25.412445] ? __pfx_kthread+0x10/0x10 [ 25.412467] ret_from_fork+0x116/0x1d0 [ 25.412486] ? __pfx_kthread+0x10/0x10 [ 25.412515] ret_from_fork_asm+0x1a/0x30 [ 25.412547] </TASK> [ 25.412558] [ 25.420968] Allocated by task 309: [ 25.421173] kasan_save_stack+0x45/0x70 [ 25.421408] kasan_save_track+0x18/0x40 [ 25.421797] kasan_save_alloc_info+0x3b/0x50 [ 25.422021] __kasan_kmalloc+0xb7/0xc0 [ 25.422260] __kmalloc_cache_noprof+0x189/0x420 [ 25.422476] kasan_bitops_generic+0x92/0x1c0 [ 25.422654] kunit_try_run_case+0x1a5/0x480 [ 25.422878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.423117] kthread+0x337/0x6f0 [ 25.423235] ret_from_fork+0x116/0x1d0 [ 25.423426] ret_from_fork_asm+0x1a/0x30 [ 25.423633] [ 25.423737] The buggy address belongs to the object at ffff88810586d4c0 [ 25.423737] which belongs to the cache kmalloc-16 of size 16 [ 25.424239] The buggy address is located 8 bytes inside of [ 25.424239] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.424944] [ 25.425154] The buggy address belongs to the physical page: [ 25.425430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.425907] flags: 0x200000000000000(node=0|zone=2) [ 25.426199] page_type: f5(slab) [ 25.426333] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.426643] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.427003] page dumped because: kasan: bad access detected [ 25.427349] [ 25.427414] Memory state around the buggy address: [ 25.427720] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.428040] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.428321] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.428881] ^ [ 25.429124] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.429352] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.429580] ================================================================== [ 25.430034] ================================================================== [ 25.430397] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 25.430798] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.431182] [ 25.431282] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.431338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.431350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.431371] Call Trace: [ 25.431385] <TASK> [ 25.431399] dump_stack_lvl+0x73/0xb0 [ 25.431426] print_report+0xd1/0x650 [ 25.431447] ? __virt_addr_valid+0x1db/0x2d0 [ 25.431470] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 25.431496] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.431522] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 25.431548] kasan_report+0x141/0x180 [ 25.431570] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 25.431600] kasan_check_range+0x10c/0x1c0 [ 25.431634] __kasan_check_write+0x18/0x20 [ 25.431658] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 25.431685] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.431731] kasan_bitops_generic+0x121/0x1c0 [ 25.431808] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.431849] ? __pfx_read_tsc+0x10/0x10 [ 25.431871] ? ktime_get_ts64+0x86/0x230 [ 25.431894] kunit_try_run_case+0x1a5/0x480 [ 25.431919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.431942] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.431964] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.431985] ? __kthread_parkme+0x82/0x180 [ 25.432005] ? preempt_count_sub+0x50/0x80 [ 25.432029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.432063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.432087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.432112] kthread+0x337/0x6f0 [ 25.432142] ? trace_preempt_on+0x20/0xc0 [ 25.432165] ? __pfx_kthread+0x10/0x10 [ 25.432186] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.432209] ? calculate_sigpending+0x7b/0xa0 [ 25.432232] ? __pfx_kthread+0x10/0x10 [ 25.432253] ret_from_fork+0x116/0x1d0 [ 25.432272] ? __pfx_kthread+0x10/0x10 [ 25.432292] ret_from_fork_asm+0x1a/0x30 [ 25.432333] </TASK> [ 25.432344] [ 25.441105] Allocated by task 309: [ 25.441303] kasan_save_stack+0x45/0x70 [ 25.441602] kasan_save_track+0x18/0x40 [ 25.441877] kasan_save_alloc_info+0x3b/0x50 [ 25.442043] __kasan_kmalloc+0xb7/0xc0 [ 25.442171] __kmalloc_cache_noprof+0x189/0x420 [ 25.442342] kasan_bitops_generic+0x92/0x1c0 [ 25.442550] kunit_try_run_case+0x1a5/0x480 [ 25.442758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.443011] kthread+0x337/0x6f0 [ 25.443335] ret_from_fork+0x116/0x1d0 [ 25.443722] ret_from_fork_asm+0x1a/0x30 [ 25.443930] [ 25.443998] The buggy address belongs to the object at ffff88810586d4c0 [ 25.443998] which belongs to the cache kmalloc-16 of size 16 [ 25.444405] The buggy address is located 8 bytes inside of [ 25.444405] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.445491] [ 25.445649] The buggy address belongs to the physical page: [ 25.445977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.446293] flags: 0x200000000000000(node=0|zone=2) [ 25.446465] page_type: f5(slab) [ 25.446581] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.447211] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.447525] page dumped because: kasan: bad access detected [ 25.447919] [ 25.448014] Memory state around the buggy address: [ 25.448178] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.448444] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.448942] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.449366] ^ [ 25.449788] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.450060] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.450370] ================================================================== [ 25.291097] ================================================================== [ 25.291476] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 25.292076] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.292358] [ 25.292484] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.292531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.292545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.292566] Call Trace: [ 25.292579] <TASK> [ 25.292593] dump_stack_lvl+0x73/0xb0 [ 25.292620] print_report+0xd1/0x650 [ 25.292641] ? __virt_addr_valid+0x1db/0x2d0 [ 25.292664] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 25.292771] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.292797] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 25.292824] kasan_report+0x141/0x180 [ 25.292847] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 25.292878] kasan_check_range+0x10c/0x1c0 [ 25.292918] __kasan_check_write+0x18/0x20 [ 25.292942] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 25.292968] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.293002] kasan_bitops_generic+0x121/0x1c0 [ 25.293025] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.293050] ? __pfx_read_tsc+0x10/0x10 [ 25.293087] ? ktime_get_ts64+0x86/0x230 [ 25.293110] kunit_try_run_case+0x1a5/0x480 [ 25.293135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.293159] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.293179] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.293201] ? __kthread_parkme+0x82/0x180 [ 25.293239] ? preempt_count_sub+0x50/0x80 [ 25.293263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.293287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.293323] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.293348] kthread+0x337/0x6f0 [ 25.293367] ? trace_preempt_on+0x20/0xc0 [ 25.293389] ? __pfx_kthread+0x10/0x10 [ 25.293410] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.293434] ? calculate_sigpending+0x7b/0xa0 [ 25.293457] ? __pfx_kthread+0x10/0x10 [ 25.293503] ret_from_fork+0x116/0x1d0 [ 25.293523] ? __pfx_kthread+0x10/0x10 [ 25.293543] ret_from_fork_asm+0x1a/0x30 [ 25.293574] </TASK> [ 25.293587] [ 25.302742] Allocated by task 309: [ 25.302935] kasan_save_stack+0x45/0x70 [ 25.303097] kasan_save_track+0x18/0x40 [ 25.303227] kasan_save_alloc_info+0x3b/0x50 [ 25.303425] __kasan_kmalloc+0xb7/0xc0 [ 25.303860] __kmalloc_cache_noprof+0x189/0x420 [ 25.304113] kasan_bitops_generic+0x92/0x1c0 [ 25.304318] kunit_try_run_case+0x1a5/0x480 [ 25.304560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.304834] kthread+0x337/0x6f0 [ 25.304955] ret_from_fork+0x116/0x1d0 [ 25.305133] ret_from_fork_asm+0x1a/0x30 [ 25.305360] [ 25.305448] The buggy address belongs to the object at ffff88810586d4c0 [ 25.305448] which belongs to the cache kmalloc-16 of size 16 [ 25.306206] The buggy address is located 8 bytes inside of [ 25.306206] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.306908] [ 25.307014] The buggy address belongs to the physical page: [ 25.307204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.307451] flags: 0x200000000000000(node=0|zone=2) [ 25.307870] page_type: f5(slab) [ 25.308043] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.308499] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.308885] page dumped because: kasan: bad access detected [ 25.309119] [ 25.309231] Memory state around the buggy address: [ 25.309482] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.309808] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.310262] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.310536] ^ [ 25.310998] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.311374] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.311652] ================================================================== [ 25.312267] ================================================================== [ 25.312593] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 25.313074] Write of size 8 at addr ffff88810586d4c8 by task kunit_try_catch/309 [ 25.313413] [ 25.313519] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 25.313564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.313577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.313598] Call Trace: [ 25.313614] <TASK> [ 25.313649] dump_stack_lvl+0x73/0xb0 [ 25.313822] print_report+0xd1/0x650 [ 25.313856] ? __virt_addr_valid+0x1db/0x2d0 [ 25.313880] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 25.313906] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.313932] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 25.313958] kasan_report+0x141/0x180 [ 25.313980] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 25.314011] kasan_check_range+0x10c/0x1c0 [ 25.314034] __kasan_check_write+0x18/0x20 [ 25.314057] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 25.314083] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.314118] kasan_bitops_generic+0x121/0x1c0 [ 25.314142] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.314166] ? __pfx_read_tsc+0x10/0x10 [ 25.314188] ? ktime_get_ts64+0x86/0x230 [ 25.314212] kunit_try_run_case+0x1a5/0x480 [ 25.314237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.314260] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.314282] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.314318] ? __kthread_parkme+0x82/0x180 [ 25.314338] ? preempt_count_sub+0x50/0x80 [ 25.314361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.314386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.314410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.314435] kthread+0x337/0x6f0 [ 25.314455] ? trace_preempt_on+0x20/0xc0 [ 25.314477] ? __pfx_kthread+0x10/0x10 [ 25.314524] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.314548] ? calculate_sigpending+0x7b/0xa0 [ 25.314572] ? __pfx_kthread+0x10/0x10 [ 25.314594] ret_from_fork+0x116/0x1d0 [ 25.314613] ? __pfx_kthread+0x10/0x10 [ 25.314634] ret_from_fork_asm+0x1a/0x30 [ 25.314663] </TASK> [ 25.314686] [ 25.323285] Allocated by task 309: [ 25.323474] kasan_save_stack+0x45/0x70 [ 25.323740] kasan_save_track+0x18/0x40 [ 25.323966] kasan_save_alloc_info+0x3b/0x50 [ 25.324124] __kasan_kmalloc+0xb7/0xc0 [ 25.324317] __kmalloc_cache_noprof+0x189/0x420 [ 25.324590] kasan_bitops_generic+0x92/0x1c0 [ 25.324810] kunit_try_run_case+0x1a5/0x480 [ 25.325093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.325386] kthread+0x337/0x6f0 [ 25.325556] ret_from_fork+0x116/0x1d0 [ 25.325974] ret_from_fork_asm+0x1a/0x30 [ 25.326135] [ 25.326201] The buggy address belongs to the object at ffff88810586d4c0 [ 25.326201] which belongs to the cache kmalloc-16 of size 16 [ 25.326810] The buggy address is located 8 bytes inside of [ 25.326810] allocated 9-byte region [ffff88810586d4c0, ffff88810586d4c9) [ 25.327287] [ 25.327404] The buggy address belongs to the physical page: [ 25.327665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586d [ 25.328129] flags: 0x200000000000000(node=0|zone=2) [ 25.328392] page_type: f5(slab) [ 25.328554] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.328868] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.329086] page dumped because: kasan: bad access detected [ 25.329251] [ 25.329322] Memory state around the buggy address: [ 25.329470] ffff88810586d380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.330074] ffff88810586d400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.330663] >ffff88810586d480: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 25.331020] ^ [ 25.331422] ffff88810586d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.331848] ffff88810586d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.332061] ==================================================================