Date
July 11, 2025, 10:11 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 61.170990] ================================================================== [ 61.178041] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 61.186894] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 61.194272] [ 61.195754] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 61.195804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.195821] Hardware name: WinLink E850-96 board (DT) [ 61.195838] Call trace: [ 61.195852] show_stack+0x20/0x38 (C) [ 61.195884] dump_stack_lvl+0x8c/0xd0 [ 61.195915] print_report+0x118/0x5d0 [ 61.195942] kasan_report+0xdc/0x128 [ 61.195971] kasan_check_range+0x100/0x1a8 [ 61.196001] __kasan_check_write+0x20/0x30 [ 61.196031] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 61.196070] kasan_bitops_generic+0x11c/0x1c8 [ 61.196105] kunit_try_run_case+0x170/0x3f0 [ 61.196141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.196174] kthread+0x328/0x630 [ 61.196200] ret_from_fork+0x10/0x20 [ 61.196233] [ 61.269358] Allocated by task 345: [ 61.272743] kasan_save_stack+0x3c/0x68 [ 61.276563] kasan_save_track+0x20/0x40 [ 61.280382] kasan_save_alloc_info+0x40/0x58 [ 61.284635] __kasan_kmalloc+0xd4/0xd8 [ 61.288368] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.292881] kasan_bitops_generic+0xa0/0x1c8 [ 61.297135] kunit_try_run_case+0x170/0x3f0 [ 61.301302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.306770] kthread+0x328/0x630 [ 61.309982] ret_from_fork+0x10/0x20 [ 61.313541] [ 61.315017] The buggy address belongs to the object at ffff000800b19520 [ 61.315017] which belongs to the cache kmalloc-16 of size 16 [ 61.327344] The buggy address is located 8 bytes inside of [ 61.327344] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 61.339582] [ 61.341058] The buggy address belongs to the physical page: [ 61.346615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 61.354600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.361110] page_type: f5(slab) [ 61.364245] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.371967] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.379686] page dumped because: kasan: bad access detected [ 61.385241] [ 61.386717] Memory state around the buggy address: [ 61.391497] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.398700] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 61.405906] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 61.413106] ^ [ 61.417623] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.424828] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.432029] ================================================================== [ 61.704453] ================================================================== [ 61.711541] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 61.720480] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 61.727858] [ 61.729337] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 61.729386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.729405] Hardware name: WinLink E850-96 board (DT) [ 61.729423] Call trace: [ 61.729435] show_stack+0x20/0x38 (C) [ 61.729466] dump_stack_lvl+0x8c/0xd0 [ 61.729499] print_report+0x118/0x5d0 [ 61.729527] kasan_report+0xdc/0x128 [ 61.729553] kasan_check_range+0x100/0x1a8 [ 61.729583] __kasan_check_write+0x20/0x30 [ 61.729614] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 61.729650] kasan_bitops_generic+0x11c/0x1c8 [ 61.729686] kunit_try_run_case+0x170/0x3f0 [ 61.729718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.729748] kthread+0x328/0x630 [ 61.729775] ret_from_fork+0x10/0x20 [ 61.729804] [ 61.803030] Allocated by task 345: [ 61.806416] kasan_save_stack+0x3c/0x68 [ 61.810235] kasan_save_track+0x20/0x40 [ 61.814055] kasan_save_alloc_info+0x40/0x58 [ 61.818308] __kasan_kmalloc+0xd4/0xd8 [ 61.822040] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.826554] kasan_bitops_generic+0xa0/0x1c8 [ 61.830808] kunit_try_run_case+0x170/0x3f0 [ 61.834974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.840443] kthread+0x328/0x630 [ 61.843655] ret_from_fork+0x10/0x20 [ 61.847214] [ 61.848689] The buggy address belongs to the object at ffff000800b19520 [ 61.848689] which belongs to the cache kmalloc-16 of size 16 [ 61.861016] The buggy address is located 8 bytes inside of [ 61.861016] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 61.873255] [ 61.874731] The buggy address belongs to the physical page: [ 61.880287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 61.888272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.894783] page_type: f5(slab) [ 61.897917] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.905640] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.913359] page dumped because: kasan: bad access detected [ 61.918914] [ 61.920389] Memory state around the buggy address: [ 61.925169] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.932373] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 61.939577] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 61.946778] ^ [ 61.951296] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.958500] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.965702] ================================================================== [ 63.305497] ================================================================== [ 63.312558] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 63.321498] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 63.328789] [ 63.330269] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 63.330318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.330334] Hardware name: WinLink E850-96 board (DT) [ 63.330352] Call trace: [ 63.330364] show_stack+0x20/0x38 (C) [ 63.330396] dump_stack_lvl+0x8c/0xd0 [ 63.330427] print_report+0x118/0x5d0 [ 63.330456] kasan_report+0xdc/0x128 [ 63.330482] __asan_report_load8_noabort+0x20/0x30 [ 63.330515] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 63.330555] kasan_bitops_generic+0x11c/0x1c8 [ 63.330589] kunit_try_run_case+0x170/0x3f0 [ 63.330622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.330657] kthread+0x328/0x630 [ 63.330684] ret_from_fork+0x10/0x20 [ 63.330714] [ 63.400576] Allocated by task 345: [ 63.403961] kasan_save_stack+0x3c/0x68 [ 63.407781] kasan_save_track+0x20/0x40 [ 63.411600] kasan_save_alloc_info+0x40/0x58 [ 63.415853] __kasan_kmalloc+0xd4/0xd8 [ 63.419586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.424100] kasan_bitops_generic+0xa0/0x1c8 [ 63.428353] kunit_try_run_case+0x170/0x3f0 [ 63.432520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.437989] kthread+0x328/0x630 [ 63.441200] ret_from_fork+0x10/0x20 [ 63.444759] [ 63.446235] The buggy address belongs to the object at ffff000800b19520 [ 63.446235] which belongs to the cache kmalloc-16 of size 16 [ 63.458561] The buggy address is located 8 bytes inside of [ 63.458561] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 63.470801] [ 63.472276] The buggy address belongs to the physical page: [ 63.477832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 63.485818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.492328] page_type: f5(slab) [ 63.495461] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 63.503185] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 63.510904] page dumped because: kasan: bad access detected [ 63.516459] [ 63.517935] Memory state around the buggy address: [ 63.522713] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 63.529918] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 63.537123] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 63.544324] ^ [ 63.548841] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.556046] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.563247] ================================================================== [ 62.506745] ================================================================== [ 62.513786] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 62.522725] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 62.530016] [ 62.531497] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 62.531546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.531562] Hardware name: WinLink E850-96 board (DT) [ 62.531581] Call trace: [ 62.531593] show_stack+0x20/0x38 (C) [ 62.531623] dump_stack_lvl+0x8c/0xd0 [ 62.531652] print_report+0x118/0x5d0 [ 62.531680] kasan_report+0xdc/0x128 [ 62.531708] __asan_report_load8_noabort+0x20/0x30 [ 62.531743] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 62.531781] kasan_bitops_generic+0x11c/0x1c8 [ 62.531816] kunit_try_run_case+0x170/0x3f0 [ 62.531853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.531886] kthread+0x328/0x630 [ 62.531913] ret_from_fork+0x10/0x20 [ 62.531944] [ 62.601803] Allocated by task 345: [ 62.605188] kasan_save_stack+0x3c/0x68 [ 62.609008] kasan_save_track+0x20/0x40 [ 62.612827] kasan_save_alloc_info+0x40/0x58 [ 62.617081] __kasan_kmalloc+0xd4/0xd8 [ 62.620813] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.625327] kasan_bitops_generic+0xa0/0x1c8 [ 62.629581] kunit_try_run_case+0x170/0x3f0 [ 62.633747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.639216] kthread+0x328/0x630 [ 62.642428] ret_from_fork+0x10/0x20 [ 62.645986] [ 62.647462] The buggy address belongs to the object at ffff000800b19520 [ 62.647462] which belongs to the cache kmalloc-16 of size 16 [ 62.659789] The buggy address is located 8 bytes inside of [ 62.659789] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 62.672028] [ 62.673504] The buggy address belongs to the physical page: [ 62.679059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 62.687047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.693555] page_type: f5(slab) [ 62.696690] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.704412] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.712131] page dumped because: kasan: bad access detected [ 62.717687] [ 62.719162] Memory state around the buggy address: [ 62.723941] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.731145] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 62.738350] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 62.745551] ^ [ 62.750068] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.757273] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.764474] ================================================================== [ 62.238153] ================================================================== [ 62.245213] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 62.254152] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 62.261530] [ 62.263011] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 62.263059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.263077] Hardware name: WinLink E850-96 board (DT) [ 62.263095] Call trace: [ 62.263105] show_stack+0x20/0x38 (C) [ 62.263138] dump_stack_lvl+0x8c/0xd0 [ 62.263166] print_report+0x118/0x5d0 [ 62.263192] kasan_report+0xdc/0x128 [ 62.263219] kasan_check_range+0x100/0x1a8 [ 62.263248] __kasan_check_write+0x20/0x30 [ 62.263278] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 62.263317] kasan_bitops_generic+0x11c/0x1c8 [ 62.263352] kunit_try_run_case+0x170/0x3f0 [ 62.263387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.263420] kthread+0x328/0x630 [ 62.263447] ret_from_fork+0x10/0x20 [ 62.263478] [ 62.336703] Allocated by task 345: [ 62.340088] kasan_save_stack+0x3c/0x68 [ 62.343907] kasan_save_track+0x20/0x40 [ 62.347727] kasan_save_alloc_info+0x40/0x58 [ 62.351980] __kasan_kmalloc+0xd4/0xd8 [ 62.355713] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.360227] kasan_bitops_generic+0xa0/0x1c8 [ 62.364480] kunit_try_run_case+0x170/0x3f0 [ 62.368647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.374116] kthread+0x328/0x630 [ 62.377327] ret_from_fork+0x10/0x20 [ 62.380886] [ 62.382362] The buggy address belongs to the object at ffff000800b19520 [ 62.382362] which belongs to the cache kmalloc-16 of size 16 [ 62.394689] The buggy address is located 8 bytes inside of [ 62.394689] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 62.406928] [ 62.408403] The buggy address belongs to the physical page: [ 62.413959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 62.421945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.428455] page_type: f5(slab) [ 62.431589] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.439312] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.447031] page dumped because: kasan: bad access detected [ 62.452586] [ 62.454062] Memory state around the buggy address: [ 62.458840] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.466045] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 62.473250] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 62.480450] ^ [ 62.484969] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.492173] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.499374] ================================================================== [ 63.040392] ================================================================== [ 63.047458] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 63.056397] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 63.063689] [ 63.065170] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 63.065217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.065235] Hardware name: WinLink E850-96 board (DT) [ 63.065251] Call trace: [ 63.065264] show_stack+0x20/0x38 (C) [ 63.065296] dump_stack_lvl+0x8c/0xd0 [ 63.065324] print_report+0x118/0x5d0 [ 63.065352] kasan_report+0xdc/0x128 [ 63.065379] __asan_report_load8_noabort+0x20/0x30 [ 63.065413] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 63.065452] kasan_bitops_generic+0x11c/0x1c8 [ 63.065486] kunit_try_run_case+0x170/0x3f0 [ 63.065520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.065555] kthread+0x328/0x630 [ 63.065582] ret_from_fork+0x10/0x20 [ 63.065613] [ 63.135477] Allocated by task 345: [ 63.138861] kasan_save_stack+0x3c/0x68 [ 63.142680] kasan_save_track+0x20/0x40 [ 63.146500] kasan_save_alloc_info+0x40/0x58 [ 63.150753] __kasan_kmalloc+0xd4/0xd8 [ 63.154486] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.158999] kasan_bitops_generic+0xa0/0x1c8 [ 63.163253] kunit_try_run_case+0x170/0x3f0 [ 63.167419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.172888] kthread+0x328/0x630 [ 63.176100] ret_from_fork+0x10/0x20 [ 63.179659] [ 63.181135] The buggy address belongs to the object at ffff000800b19520 [ 63.181135] which belongs to the cache kmalloc-16 of size 16 [ 63.193461] The buggy address is located 8 bytes inside of [ 63.193461] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 63.205700] [ 63.207176] The buggy address belongs to the physical page: [ 63.212732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 63.220719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.227228] page_type: f5(slab) [ 63.230364] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 63.238085] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 63.245804] page dumped because: kasan: bad access detected [ 63.251359] [ 63.252835] Memory state around the buggy address: [ 63.257613] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 63.264818] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 63.272023] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 63.279223] ^ [ 63.283741] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.290946] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.298147] ================================================================== [ 61.973077] ================================================================== [ 61.980112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 61.989052] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 61.996344] [ 61.997823] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 61.997874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.997890] Hardware name: WinLink E850-96 board (DT) [ 61.997910] Call trace: [ 61.997922] show_stack+0x20/0x38 (C) [ 61.997954] dump_stack_lvl+0x8c/0xd0 [ 61.997989] print_report+0x118/0x5d0 [ 61.998018] kasan_report+0xdc/0x128 [ 61.998046] __asan_report_load8_noabort+0x20/0x30 [ 61.998079] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 61.998119] kasan_bitops_generic+0x11c/0x1c8 [ 61.998153] kunit_try_run_case+0x170/0x3f0 [ 61.998187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.998220] kthread+0x328/0x630 [ 61.998247] ret_from_fork+0x10/0x20 [ 61.998279] [ 62.068130] Allocated by task 345: [ 62.071516] kasan_save_stack+0x3c/0x68 [ 62.075336] kasan_save_track+0x20/0x40 [ 62.079155] kasan_save_alloc_info+0x40/0x58 [ 62.083408] __kasan_kmalloc+0xd4/0xd8 [ 62.087141] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.091654] kasan_bitops_generic+0xa0/0x1c8 [ 62.095908] kunit_try_run_case+0x170/0x3f0 [ 62.100075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.105543] kthread+0x328/0x630 [ 62.108755] ret_from_fork+0x10/0x20 [ 62.112314] [ 62.113789] The buggy address belongs to the object at ffff000800b19520 [ 62.113789] which belongs to the cache kmalloc-16 of size 16 [ 62.126116] The buggy address is located 8 bytes inside of [ 62.126116] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 62.138355] [ 62.139831] The buggy address belongs to the physical page: [ 62.145387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 62.153375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.159883] page_type: f5(slab) [ 62.163017] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.170740] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.178459] page dumped because: kasan: bad access detected [ 62.184014] [ 62.185490] Memory state around the buggy address: [ 62.190269] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.197472] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 62.204677] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 62.211878] ^ [ 62.216396] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.223601] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.230802] ================================================================== [ 62.771819] ================================================================== [ 62.778887] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 62.787825] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 62.795203] [ 62.796682] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 62.796731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.796747] Hardware name: WinLink E850-96 board (DT) [ 62.796766] Call trace: [ 62.796778] show_stack+0x20/0x38 (C) [ 62.796809] dump_stack_lvl+0x8c/0xd0 [ 62.796839] print_report+0x118/0x5d0 [ 62.796867] kasan_report+0xdc/0x128 [ 62.796894] kasan_check_range+0x100/0x1a8 [ 62.796924] __kasan_check_write+0x20/0x30 [ 62.796955] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 62.796995] kasan_bitops_generic+0x11c/0x1c8 [ 62.797029] kunit_try_run_case+0x170/0x3f0 [ 62.797062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.797095] kthread+0x328/0x630 [ 62.797121] ret_from_fork+0x10/0x20 [ 62.797153] [ 62.870375] Allocated by task 345: [ 62.873761] kasan_save_stack+0x3c/0x68 [ 62.877580] kasan_save_track+0x20/0x40 [ 62.881400] kasan_save_alloc_info+0x40/0x58 [ 62.885653] __kasan_kmalloc+0xd4/0xd8 [ 62.889386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.893899] kasan_bitops_generic+0xa0/0x1c8 [ 62.898153] kunit_try_run_case+0x170/0x3f0 [ 62.902319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.907788] kthread+0x328/0x630 [ 62.911000] ret_from_fork+0x10/0x20 [ 62.914559] [ 62.916036] The buggy address belongs to the object at ffff000800b19520 [ 62.916036] which belongs to the cache kmalloc-16 of size 16 [ 62.928361] The buggy address is located 8 bytes inside of [ 62.928361] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 62.940600] [ 62.942076] The buggy address belongs to the physical page: [ 62.947632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 62.955617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.962128] page_type: f5(slab) [ 62.965262] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.972984] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.980704] page dumped because: kasan: bad access detected [ 62.986259] [ 62.987735] Memory state around the buggy address: [ 62.992513] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.999718] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 63.006922] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 63.014123] ^ [ 63.018641] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.025846] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.033047] ================================================================== [ 61.439401] ================================================================== [ 61.446440] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 61.455381] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 61.462671] [ 61.464153] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 61.464204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.464221] Hardware name: WinLink E850-96 board (DT) [ 61.464239] Call trace: [ 61.464252] show_stack+0x20/0x38 (C) [ 61.464285] dump_stack_lvl+0x8c/0xd0 [ 61.464314] print_report+0x118/0x5d0 [ 61.464342] kasan_report+0xdc/0x128 [ 61.464369] __asan_report_load8_noabort+0x20/0x30 [ 61.464404] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 61.464447] kasan_bitops_generic+0x11c/0x1c8 [ 61.464480] kunit_try_run_case+0x170/0x3f0 [ 61.464513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.464548] kthread+0x328/0x630 [ 61.464574] ret_from_fork+0x10/0x20 [ 61.464605] [ 61.534458] Allocated by task 345: [ 61.537843] kasan_save_stack+0x3c/0x68 [ 61.541663] kasan_save_track+0x20/0x40 [ 61.545482] kasan_save_alloc_info+0x40/0x58 [ 61.549736] __kasan_kmalloc+0xd4/0xd8 [ 61.553468] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.557982] kasan_bitops_generic+0xa0/0x1c8 [ 61.562235] kunit_try_run_case+0x170/0x3f0 [ 61.566402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.571870] kthread+0x328/0x630 [ 61.575082] ret_from_fork+0x10/0x20 [ 61.578641] [ 61.580117] The buggy address belongs to the object at ffff000800b19520 [ 61.580117] which belongs to the cache kmalloc-16 of size 16 [ 61.592444] The buggy address is located 8 bytes inside of [ 61.592444] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 61.604683] [ 61.606158] The buggy address belongs to the physical page: [ 61.611715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 61.619702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.626210] page_type: f5(slab) [ 61.629345] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.637067] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.644786] page dumped because: kasan: bad access detected [ 61.650342] [ 61.651817] Memory state around the buggy address: [ 61.656597] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.663800] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 61.671007] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 61.678206] ^ [ 61.682723] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.689928] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.697129] ==================================================================
[ 32.775843] ================================================================== [ 32.775925] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 32.776620] show_stack+0x20/0x38 (C) [ 32.777060] kunit_try_run_case+0x170/0x3f0 [ 32.777957] kasan_save_alloc_info+0x40/0x58 [ 32.779516] The buggy address is located 8 bytes inside of [ 32.779516] allocated 9-byte region [fff00000c63ef120, fff00000c63ef129) [ 32.781633] >fff00000c63ef100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.783922] Write of size 8 at addr fff00000c63ef128 by task kunit_try_catch/292 [ 32.784813] kasan_check_range+0x100/0x1a8 [ 32.785071] kunit_try_run_case+0x170/0x3f0 [ 32.786720] kasan_bitops_generic+0xa0/0x1c8 [ 32.787923] [ 32.788475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.789472] fff00000c63ef080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.791990] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 32.793269] kasan_report+0xdc/0x128 [ 32.793581] kasan_bitops_generic+0x11c/0x1c8 [ 32.794000] kasan_save_track+0x20/0x40 [ 32.794523] The buggy address is located 8 bytes inside of [ 32.794523] allocated 9-byte region [fff00000c63ef120, fff00000c63ef129) [ 32.796270] fff00000c63ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.797977] [ 32.798284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.799922] __kasan_check_write+0x20/0x30 [ 32.800455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.801744] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.803584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ef [ 32.804881] ^ [ 32.806191] ================================================================== [ 32.768128] ================================================================== [ 32.768619] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 32.769270] Hardware name: linux,dummy-virt (DT) [ 32.769889] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 32.770353] kasan_save_track+0x20/0x40 [ 32.771944] [ 32.772189] The buggy address is located 8 bytes inside of [ 32.772189] allocated 9-byte region [fff00000c63ef120, fff00000c63ef129) [ 32.774417] ==================================================================
[ 26.193750] ================================================================== [ 26.193988] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.194248] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311 [ 26.194509] [ 26.194593] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.194644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.194656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.194680] Call Trace: [ 26.194700] <TASK> [ 26.194718] dump_stack_lvl+0x73/0xb0 [ 26.194759] print_report+0xd1/0x610 [ 26.194782] ? __virt_addr_valid+0x1db/0x2d0 [ 26.194808] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.195625] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.195662] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.195707] kasan_report+0x141/0x180 [ 26.195748] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.195780] kasan_check_range+0x10c/0x1c0 [ 26.195804] __kasan_check_write+0x18/0x20 [ 26.195838] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.195865] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.195892] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.195917] ? trace_hardirqs_on+0x37/0xe0 [ 26.195941] ? kasan_bitops_generic+0x92/0x1c0 [ 26.195977] kasan_bitops_generic+0x121/0x1c0 [ 26.196001] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.196025] ? __pfx_read_tsc+0x10/0x10 [ 26.196483] ? ktime_get_ts64+0x86/0x230 [ 26.196523] kunit_try_run_case+0x1a5/0x480 [ 26.196561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.196581] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.196606] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.196641] ? __kthread_parkme+0x82/0x180 [ 26.196662] ? preempt_count_sub+0x50/0x80 [ 26.196686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.196718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.196763] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.196787] kthread+0x337/0x6f0 [ 26.196807] ? trace_preempt_on+0x20/0xc0 [ 26.196842] ? __pfx_kthread+0x10/0x10 [ 26.196863] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.196885] ? calculate_sigpending+0x7b/0xa0 [ 26.196910] ? __pfx_kthread+0x10/0x10 [ 26.196932] ret_from_fork+0x116/0x1d0 [ 26.196950] ? __pfx_kthread+0x10/0x10 [ 26.196971] ret_from_fork_asm+0x1a/0x30 [ 26.197002] </TASK> [ 26.197014] [ 26.208601] Allocated by task 311: [ 26.208980] kasan_save_stack+0x45/0x70 [ 26.209167] kasan_save_track+0x18/0x40 [ 26.209458] kasan_save_alloc_info+0x3b/0x50 [ 26.209641] __kasan_kmalloc+0xb7/0xc0 [ 26.209946] __kmalloc_cache_noprof+0x189/0x420 [ 26.210268] kasan_bitops_generic+0x92/0x1c0 [ 26.210467] kunit_try_run_case+0x1a5/0x480 [ 26.210801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.211131] kthread+0x337/0x6f0 [ 26.211415] ret_from_fork+0x116/0x1d0 [ 26.211592] ret_from_fork_asm+0x1a/0x30 [ 26.211896] [ 26.211997] The buggy address belongs to the object at ffff888104c83b80 [ 26.211997] which belongs to the cache kmalloc-16 of size 16 [ 26.212699] The buggy address is located 8 bytes inside of [ 26.212699] allocated 9-byte region [ffff888104c83b80, ffff888104c83b89) [ 26.213210] [ 26.213287] The buggy address belongs to the physical page: [ 26.213587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83 [ 26.213942] flags: 0x200000000000000(node=0|zone=2) [ 26.214145] page_type: f5(slab) [ 26.214333] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.214650] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.215053] page dumped because: kasan: bad access detected [ 26.215300] [ 26.215436] Memory state around the buggy address: [ 26.215607] ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.215933] ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.216211] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.216561] ^ [ 26.216682] ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.216986] ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.217281] ================================================================== [ 26.175231] ================================================================== [ 26.175595] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.175912] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311 [ 26.176238] [ 26.176355] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.176427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.176440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.176462] Call Trace: [ 26.176483] <TASK> [ 26.176501] dump_stack_lvl+0x73/0xb0 [ 26.176530] print_report+0xd1/0x610 [ 26.176551] ? __virt_addr_valid+0x1db/0x2d0 [ 26.176576] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.176603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.176629] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.176656] kasan_report+0x141/0x180 [ 26.176676] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.176707] kasan_check_range+0x10c/0x1c0 [ 26.176740] __kasan_check_write+0x18/0x20 [ 26.176762] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.176948] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.176977] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.177015] ? trace_hardirqs_on+0x37/0xe0 [ 26.177037] ? kasan_bitops_generic+0x92/0x1c0 [ 26.177076] kasan_bitops_generic+0x121/0x1c0 [ 26.177100] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.177125] ? __pfx_read_tsc+0x10/0x10 [ 26.177147] ? ktime_get_ts64+0x86/0x230 [ 26.177182] kunit_try_run_case+0x1a5/0x480 [ 26.177203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.177224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.177258] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.177282] ? __kthread_parkme+0x82/0x180 [ 26.177303] ? preempt_count_sub+0x50/0x80 [ 26.177334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.177355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.177381] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.177433] kthread+0x337/0x6f0 [ 26.177453] ? trace_preempt_on+0x20/0xc0 [ 26.177476] ? __pfx_kthread+0x10/0x10 [ 26.177506] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.177528] ? calculate_sigpending+0x7b/0xa0 [ 26.177553] ? __pfx_kthread+0x10/0x10 [ 26.177585] ret_from_fork+0x116/0x1d0 [ 26.177606] ? __pfx_kthread+0x10/0x10 [ 26.177626] ret_from_fork_asm+0x1a/0x30 [ 26.177657] </TASK> [ 26.177669] [ 26.185280] Allocated by task 311: [ 26.185498] kasan_save_stack+0x45/0x70 [ 26.185715] kasan_save_track+0x18/0x40 [ 26.185894] kasan_save_alloc_info+0x3b/0x50 [ 26.186036] __kasan_kmalloc+0xb7/0xc0 [ 26.186161] __kmalloc_cache_noprof+0x189/0x420 [ 26.186308] kasan_bitops_generic+0x92/0x1c0 [ 26.186474] kunit_try_run_case+0x1a5/0x480 [ 26.186628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.186908] kthread+0x337/0x6f0 [ 26.187100] ret_from_fork+0x116/0x1d0 [ 26.187317] ret_from_fork_asm+0x1a/0x30 [ 26.187576] [ 26.187680] The buggy address belongs to the object at ffff888104c83b80 [ 26.187680] which belongs to the cache kmalloc-16 of size 16 [ 26.188204] The buggy address is located 8 bytes inside of [ 26.188204] allocated 9-byte region [ffff888104c83b80, ffff888104c83b89) [ 26.188776] [ 26.188852] The buggy address belongs to the physical page: [ 26.189020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83 [ 26.189298] flags: 0x200000000000000(node=0|zone=2) [ 26.189962] page_type: f5(slab) [ 26.190155] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.190525] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.190889] page dumped because: kasan: bad access detected [ 26.191131] [ 26.191216] Memory state around the buggy address: [ 26.191416] ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.191620] ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.191846] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.192102] ^ [ 26.192275] ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.192665] ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.192917] ================================================================== [ 26.132643] ================================================================== [ 26.133038] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.133510] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311 [ 26.133864] [ 26.133973] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.134023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.134035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.134058] Call Trace: [ 26.134078] <TASK> [ 26.134095] dump_stack_lvl+0x73/0xb0 [ 26.134123] print_report+0xd1/0x610 [ 26.134144] ? __virt_addr_valid+0x1db/0x2d0 [ 26.134169] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.134195] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.134220] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.134248] kasan_report+0x141/0x180 [ 26.134280] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.134311] kasan_check_range+0x10c/0x1c0 [ 26.134345] __kasan_check_write+0x18/0x20 [ 26.134368] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.134412] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.134448] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.134472] ? trace_hardirqs_on+0x37/0xe0 [ 26.134495] ? kasan_bitops_generic+0x92/0x1c0 [ 26.134532] kasan_bitops_generic+0x121/0x1c0 [ 26.134558] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.134584] ? __pfx_read_tsc+0x10/0x10 [ 26.134615] ? ktime_get_ts64+0x86/0x230 [ 26.134640] kunit_try_run_case+0x1a5/0x480 [ 26.134661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.134693] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.134718] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.134750] ? __kthread_parkme+0x82/0x180 [ 26.134781] ? preempt_count_sub+0x50/0x80 [ 26.134806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.134829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.134866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.134891] kthread+0x337/0x6f0 [ 26.134911] ? trace_preempt_on+0x20/0xc0 [ 26.134942] ? __pfx_kthread+0x10/0x10 [ 26.134963] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.134985] ? calculate_sigpending+0x7b/0xa0 [ 26.135019] ? __pfx_kthread+0x10/0x10 [ 26.135041] ret_from_fork+0x116/0x1d0 [ 26.135060] ? __pfx_kthread+0x10/0x10 [ 26.135090] ret_from_fork_asm+0x1a/0x30 [ 26.135121] </TASK> [ 26.135131] [ 26.146369] Allocated by task 311: [ 26.146757] kasan_save_stack+0x45/0x70 [ 26.146943] kasan_save_track+0x18/0x40 [ 26.147109] kasan_save_alloc_info+0x3b/0x50 [ 26.147297] __kasan_kmalloc+0xb7/0xc0 [ 26.147708] __kmalloc_cache_noprof+0x189/0x420 [ 26.148114] kasan_bitops_generic+0x92/0x1c0 [ 26.148518] kunit_try_run_case+0x1a5/0x480 [ 26.148921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.149416] kthread+0x337/0x6f0 [ 26.149653] ret_from_fork+0x116/0x1d0 [ 26.149961] ret_from_fork_asm+0x1a/0x30 [ 26.150145] [ 26.150231] The buggy address belongs to the object at ffff888104c83b80 [ 26.150231] which belongs to the cache kmalloc-16 of size 16 [ 26.151039] The buggy address is located 8 bytes inside of [ 26.151039] allocated 9-byte region [ffff888104c83b80, ffff888104c83b89) [ 26.151707] [ 26.151804] The buggy address belongs to the physical page: [ 26.152038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83 [ 26.152364] flags: 0x200000000000000(node=0|zone=2) [ 26.152651] page_type: f5(slab) [ 26.152828] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.153130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.153493] page dumped because: kasan: bad access detected [ 26.153712] [ 26.153828] Memory state around the buggy address: [ 26.154023] ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.154276] ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.154647] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.154968] ^ [ 26.155086] ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.155413] ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.155700] ================================================================== [ 26.218724] ================================================================== [ 26.219040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.219402] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311 [ 26.219707] [ 26.219988] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.220044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.220057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.220080] Call Trace: [ 26.220102] <TASK> [ 26.220132] dump_stack_lvl+0x73/0xb0 [ 26.220162] print_report+0xd1/0x610 [ 26.220185] ? __virt_addr_valid+0x1db/0x2d0 [ 26.220221] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.220247] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.220272] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.220299] kasan_report+0x141/0x180 [ 26.220325] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.220356] kasan_check_range+0x10c/0x1c0 [ 26.220378] __kasan_check_write+0x18/0x20 [ 26.220420] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.220447] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.220474] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.220508] ? trace_hardirqs_on+0x37/0xe0 [ 26.220530] ? kasan_bitops_generic+0x92/0x1c0 [ 26.220557] kasan_bitops_generic+0x121/0x1c0 [ 26.220590] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.220614] ? __pfx_read_tsc+0x10/0x10 [ 26.220636] ? ktime_get_ts64+0x86/0x230 [ 26.220660] kunit_try_run_case+0x1a5/0x480 [ 26.220682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.220702] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.220726] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.220759] ? __kthread_parkme+0x82/0x180 [ 26.220780] ? preempt_count_sub+0x50/0x80 [ 26.220805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.220827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.220852] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.220877] kthread+0x337/0x6f0 [ 26.220897] ? trace_preempt_on+0x20/0xc0 [ 26.220919] ? __pfx_kthread+0x10/0x10 [ 26.220939] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.220961] ? calculate_sigpending+0x7b/0xa0 [ 26.220985] ? __pfx_kthread+0x10/0x10 [ 26.221007] ret_from_fork+0x116/0x1d0 [ 26.221026] ? __pfx_kthread+0x10/0x10 [ 26.221047] ret_from_fork_asm+0x1a/0x30 [ 26.221078] </TASK> [ 26.221089] [ 26.228908] Allocated by task 311: [ 26.229097] kasan_save_stack+0x45/0x70 [ 26.229300] kasan_save_track+0x18/0x40 [ 26.229509] kasan_save_alloc_info+0x3b/0x50 [ 26.229654] __kasan_kmalloc+0xb7/0xc0 [ 26.229835] __kmalloc_cache_noprof+0x189/0x420 [ 26.230054] kasan_bitops_generic+0x92/0x1c0 [ 26.230284] kunit_try_run_case+0x1a5/0x480 [ 26.230522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.230761] kthread+0x337/0x6f0 [ 26.230929] ret_from_fork+0x116/0x1d0 [ 26.231108] ret_from_fork_asm+0x1a/0x30 [ 26.231294] [ 26.231385] The buggy address belongs to the object at ffff888104c83b80 [ 26.231385] which belongs to the cache kmalloc-16 of size 16 [ 26.231902] The buggy address is located 8 bytes inside of [ 26.231902] allocated 9-byte region [ffff888104c83b80, ffff888104c83b89) [ 26.232414] [ 26.232526] The buggy address belongs to the physical page: [ 26.232705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83 [ 26.232948] flags: 0x200000000000000(node=0|zone=2) [ 26.233109] page_type: f5(slab) [ 26.233226] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.233618] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.234015] page dumped because: kasan: bad access detected [ 26.234283] [ 26.234370] Memory state around the buggy address: [ 26.234544] ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.234762] ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.235031] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.235355] ^ [ 26.235552] ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.235873] ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.236194] ================================================================== [ 26.156908] ================================================================== [ 26.157241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.157638] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311 [ 26.157943] [ 26.158060] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.158113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.158124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.158147] Call Trace: [ 26.158170] <TASK> [ 26.158189] dump_stack_lvl+0x73/0xb0 [ 26.158218] print_report+0xd1/0x610 [ 26.158240] ? __virt_addr_valid+0x1db/0x2d0 [ 26.158264] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.158290] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.158315] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.158341] kasan_report+0x141/0x180 [ 26.158362] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.158392] kasan_check_range+0x10c/0x1c0 [ 26.158415] __kasan_check_write+0x18/0x20 [ 26.158437] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.158464] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.158491] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.158515] ? trace_hardirqs_on+0x37/0xe0 [ 26.158537] ? kasan_bitops_generic+0x92/0x1c0 [ 26.158562] kasan_bitops_generic+0x121/0x1c0 [ 26.158584] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.158608] ? __pfx_read_tsc+0x10/0x10 [ 26.158630] ? ktime_get_ts64+0x86/0x230 [ 26.158654] kunit_try_run_case+0x1a5/0x480 [ 26.158675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.158694] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.158718] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.159117] ? __kthread_parkme+0x82/0x180 [ 26.159146] ? preempt_count_sub+0x50/0x80 [ 26.159171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.159192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.159219] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.159243] kthread+0x337/0x6f0 [ 26.159263] ? trace_preempt_on+0x20/0xc0 [ 26.159286] ? __pfx_kthread+0x10/0x10 [ 26.159307] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.159329] ? calculate_sigpending+0x7b/0xa0 [ 26.159354] ? __pfx_kthread+0x10/0x10 [ 26.159377] ret_from_fork+0x116/0x1d0 [ 26.159415] ? __pfx_kthread+0x10/0x10 [ 26.159437] ret_from_fork_asm+0x1a/0x30 [ 26.159468] </TASK> [ 26.159479] [ 26.167313] Allocated by task 311: [ 26.167507] kasan_save_stack+0x45/0x70 [ 26.167707] kasan_save_track+0x18/0x40 [ 26.167875] kasan_save_alloc_info+0x3b/0x50 [ 26.168089] __kasan_kmalloc+0xb7/0xc0 [ 26.168258] __kmalloc_cache_noprof+0x189/0x420 [ 26.168504] kasan_bitops_generic+0x92/0x1c0 [ 26.168704] kunit_try_run_case+0x1a5/0x480 [ 26.168890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.169066] kthread+0x337/0x6f0 [ 26.169253] ret_from_fork+0x116/0x1d0 [ 26.169458] ret_from_fork_asm+0x1a/0x30 [ 26.169645] [ 26.169710] The buggy address belongs to the object at ffff888104c83b80 [ 26.169710] which belongs to the cache kmalloc-16 of size 16 [ 26.170203] The buggy address is located 8 bytes inside of [ 26.170203] allocated 9-byte region [ffff888104c83b80, ffff888104c83b89) [ 26.170633] [ 26.170701] The buggy address belongs to the physical page: [ 26.170876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83 [ 26.171197] flags: 0x200000000000000(node=0|zone=2) [ 26.171455] page_type: f5(slab) [ 26.171636] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.171976] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.172194] page dumped because: kasan: bad access detected [ 26.172362] [ 26.172448] Memory state around the buggy address: [ 26.172607] ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.172934] ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.173275] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.173655] ^ [ 26.173835] ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.174179] ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.174466] ================================================================== [ 26.096819] ================================================================== [ 26.097161] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.097606] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311 [ 26.097940] [ 26.098047] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.098111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.098125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.098159] Call Trace: [ 26.098176] <TASK> [ 26.098193] dump_stack_lvl+0x73/0xb0 [ 26.098224] print_report+0xd1/0x610 [ 26.098245] ? __virt_addr_valid+0x1db/0x2d0 [ 26.098270] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.098297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.098323] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.098351] kasan_report+0x141/0x180 [ 26.098372] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.098422] kasan_check_range+0x10c/0x1c0 [ 26.098446] __kasan_check_write+0x18/0x20 [ 26.098468] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.098494] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.098522] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.098555] ? trace_hardirqs_on+0x37/0xe0 [ 26.098579] ? kasan_bitops_generic+0x92/0x1c0 [ 26.098607] kasan_bitops_generic+0x121/0x1c0 [ 26.098640] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.098664] ? __pfx_read_tsc+0x10/0x10 [ 26.098686] ? ktime_get_ts64+0x86/0x230 [ 26.098712] kunit_try_run_case+0x1a5/0x480 [ 26.098743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.098763] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.098787] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.098811] ? __kthread_parkme+0x82/0x180 [ 26.098832] ? preempt_count_sub+0x50/0x80 [ 26.098855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.098877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.098902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.098927] kthread+0x337/0x6f0 [ 26.098947] ? trace_preempt_on+0x20/0xc0 [ 26.098970] ? __pfx_kthread+0x10/0x10 [ 26.098991] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.099012] ? calculate_sigpending+0x7b/0xa0 [ 26.099037] ? __pfx_kthread+0x10/0x10 [ 26.099059] ret_from_fork+0x116/0x1d0 [ 26.099079] ? __pfx_kthread+0x10/0x10 [ 26.099099] ret_from_fork_asm+0x1a/0x30 [ 26.099130] </TASK> [ 26.099141] [ 26.106949] Allocated by task 311: [ 26.107123] kasan_save_stack+0x45/0x70 [ 26.107316] kasan_save_track+0x18/0x40 [ 26.107518] kasan_save_alloc_info+0x3b/0x50 [ 26.107724] __kasan_kmalloc+0xb7/0xc0 [ 26.107904] __kmalloc_cache_noprof+0x189/0x420 [ 26.108055] kasan_bitops_generic+0x92/0x1c0 [ 26.108196] kunit_try_run_case+0x1a5/0x480 [ 26.108414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.108691] kthread+0x337/0x6f0 [ 26.108889] ret_from_fork+0x116/0x1d0 [ 26.109056] ret_from_fork_asm+0x1a/0x30 [ 26.109201] [ 26.109265] The buggy address belongs to the object at ffff888104c83b80 [ 26.109265] which belongs to the cache kmalloc-16 of size 16 [ 26.109646] The buggy address is located 8 bytes inside of [ 26.109646] allocated 9-byte region [ffff888104c83b80, ffff888104c83b89) [ 26.110132] [ 26.110221] The buggy address belongs to the physical page: [ 26.110513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83 [ 26.110861] flags: 0x200000000000000(node=0|zone=2) [ 26.111092] page_type: f5(slab) [ 26.111213] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.111462] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.111687] page dumped because: kasan: bad access detected [ 26.111947] [ 26.112042] Memory state around the buggy address: [ 26.112280] ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.112638] ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.112970] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.113286] ^ [ 26.113469] ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.113762] ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.114058] ================================================================== [ 26.114697] ================================================================== [ 26.115026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.115430] Write of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311 [ 26.115749] [ 26.115832] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.115881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.115894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.115915] Call Trace: [ 26.115934] <TASK> [ 26.115949] dump_stack_lvl+0x73/0xb0 [ 26.115977] print_report+0xd1/0x610 [ 26.115998] ? __virt_addr_valid+0x1db/0x2d0 [ 26.116021] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.116047] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.116073] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.116111] kasan_report+0x141/0x180 [ 26.116132] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.116174] kasan_check_range+0x10c/0x1c0 [ 26.116198] __kasan_check_write+0x18/0x20 [ 26.116221] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.116247] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.116275] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.116299] ? trace_hardirqs_on+0x37/0xe0 [ 26.116325] ? kasan_bitops_generic+0x92/0x1c0 [ 26.116352] kasan_bitops_generic+0x121/0x1c0 [ 26.116375] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.116418] ? __pfx_read_tsc+0x10/0x10 [ 26.116439] ? ktime_get_ts64+0x86/0x230 [ 26.116464] kunit_try_run_case+0x1a5/0x480 [ 26.116495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.116516] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.116541] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.116575] ? __kthread_parkme+0x82/0x180 [ 26.116596] ? preempt_count_sub+0x50/0x80 [ 26.116621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.116642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.116667] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.116693] kthread+0x337/0x6f0 [ 26.116712] ? trace_preempt_on+0x20/0xc0 [ 26.116742] ? __pfx_kthread+0x10/0x10 [ 26.116763] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.116785] ? calculate_sigpending+0x7b/0xa0 [ 26.116809] ? __pfx_kthread+0x10/0x10 [ 26.116831] ret_from_fork+0x116/0x1d0 [ 26.116849] ? __pfx_kthread+0x10/0x10 [ 26.116870] ret_from_fork_asm+0x1a/0x30 [ 26.116901] </TASK> [ 26.116913] [ 26.124487] Allocated by task 311: [ 26.124654] kasan_save_stack+0x45/0x70 [ 26.124870] kasan_save_track+0x18/0x40 [ 26.125072] kasan_save_alloc_info+0x3b/0x50 [ 26.125318] __kasan_kmalloc+0xb7/0xc0 [ 26.125558] __kmalloc_cache_noprof+0x189/0x420 [ 26.125799] kasan_bitops_generic+0x92/0x1c0 [ 26.125943] kunit_try_run_case+0x1a5/0x480 [ 26.126143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.126451] kthread+0x337/0x6f0 [ 26.126605] ret_from_fork+0x116/0x1d0 [ 26.126769] ret_from_fork_asm+0x1a/0x30 [ 26.126962] [ 26.127064] The buggy address belongs to the object at ffff888104c83b80 [ 26.127064] which belongs to the cache kmalloc-16 of size 16 [ 26.127573] The buggy address is located 8 bytes inside of [ 26.127573] allocated 9-byte region [ffff888104c83b80, ffff888104c83b89) [ 26.128084] [ 26.128167] The buggy address belongs to the physical page: [ 26.128423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83 [ 26.128781] flags: 0x200000000000000(node=0|zone=2) [ 26.128974] page_type: f5(slab) [ 26.129091] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.129315] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.129561] page dumped because: kasan: bad access detected [ 26.129745] [ 26.129846] Memory state around the buggy address: [ 26.130069] ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.130376] ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.130701] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.131018] ^ [ 26.131186] ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.131524] ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.131829] ================================================================== [ 26.254840] ================================================================== [ 26.255356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.255803] Read of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311 [ 26.256032] [ 26.256162] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.256224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.256237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.256258] Call Trace: [ 26.256290] <TASK> [ 26.256307] dump_stack_lvl+0x73/0xb0 [ 26.256342] print_report+0xd1/0x610 [ 26.256373] ? __virt_addr_valid+0x1db/0x2d0 [ 26.256420] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.256449] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.256474] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.256500] kasan_report+0x141/0x180 [ 26.256522] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.256552] __asan_report_load8_noabort+0x18/0x20 [ 26.256585] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.256611] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.256649] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.256672] ? trace_hardirqs_on+0x37/0xe0 [ 26.256694] ? kasan_bitops_generic+0x92/0x1c0 [ 26.256721] kasan_bitops_generic+0x121/0x1c0 [ 26.256753] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.256777] ? __pfx_read_tsc+0x10/0x10 [ 26.256799] ? ktime_get_ts64+0x86/0x230 [ 26.256824] kunit_try_run_case+0x1a5/0x480 [ 26.256846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.256866] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.256890] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.256913] ? __kthread_parkme+0x82/0x180 [ 26.256936] ? preempt_count_sub+0x50/0x80 [ 26.256960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.256990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.257016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.257041] kthread+0x337/0x6f0 [ 26.257070] ? trace_preempt_on+0x20/0xc0 [ 26.257092] ? __pfx_kthread+0x10/0x10 [ 26.257113] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.257135] ? calculate_sigpending+0x7b/0xa0 [ 26.257159] ? __pfx_kthread+0x10/0x10 [ 26.257181] ret_from_fork+0x116/0x1d0 [ 26.257199] ? __pfx_kthread+0x10/0x10 [ 26.257220] ret_from_fork_asm+0x1a/0x30 [ 26.257250] </TASK> [ 26.257261] [ 26.264667] Allocated by task 311: [ 26.264797] kasan_save_stack+0x45/0x70 [ 26.264933] kasan_save_track+0x18/0x40 [ 26.265118] kasan_save_alloc_info+0x3b/0x50 [ 26.265351] __kasan_kmalloc+0xb7/0xc0 [ 26.265578] __kmalloc_cache_noprof+0x189/0x420 [ 26.265801] kasan_bitops_generic+0x92/0x1c0 [ 26.266027] kunit_try_run_case+0x1a5/0x480 [ 26.266230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.266497] kthread+0x337/0x6f0 [ 26.266658] ret_from_fork+0x116/0x1d0 [ 26.266853] ret_from_fork_asm+0x1a/0x30 [ 26.267022] [ 26.267123] The buggy address belongs to the object at ffff888104c83b80 [ 26.267123] which belongs to the cache kmalloc-16 of size 16 [ 26.267621] The buggy address is located 8 bytes inside of [ 26.267621] allocated 9-byte region [ffff888104c83b80, ffff888104c83b89) [ 26.268112] [ 26.268208] The buggy address belongs to the physical page: [ 26.268466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83 [ 26.268724] flags: 0x200000000000000(node=0|zone=2) [ 26.268891] page_type: f5(slab) [ 26.269006] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.269227] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.269560] page dumped because: kasan: bad access detected [ 26.269808] [ 26.269893] Memory state around the buggy address: [ 26.270105] ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.270426] ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.270687] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.270967] ^ [ 26.271083] ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.271287] ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.271514] ================================================================== [ 26.237058] ================================================================== [ 26.237460] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.237852] Read of size 8 at addr ffff888104c83b88 by task kunit_try_catch/311 [ 26.238141] [ 26.238251] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 26.238303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.238315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.238338] Call Trace: [ 26.238360] <TASK> [ 26.238378] dump_stack_lvl+0x73/0xb0 [ 26.238429] print_report+0xd1/0x610 [ 26.238450] ? __virt_addr_valid+0x1db/0x2d0 [ 26.238477] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.238504] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.238530] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.238556] kasan_report+0x141/0x180 [ 26.238577] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.238608] kasan_check_range+0x10c/0x1c0 [ 26.238631] __kasan_check_read+0x15/0x20 [ 26.238663] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.238689] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.238717] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.238766] ? trace_hardirqs_on+0x37/0xe0 [ 26.238788] ? kasan_bitops_generic+0x92/0x1c0 [ 26.238814] kasan_bitops_generic+0x121/0x1c0 [ 26.238848] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.238872] ? __pfx_read_tsc+0x10/0x10 [ 26.238894] ? ktime_get_ts64+0x86/0x230 [ 26.238919] kunit_try_run_case+0x1a5/0x480 [ 26.238942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.238963] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.238987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.239010] ? __kthread_parkme+0x82/0x180 [ 26.239031] ? preempt_count_sub+0x50/0x80 [ 26.239054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.239076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.239102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.239127] kthread+0x337/0x6f0 [ 26.239148] ? trace_preempt_on+0x20/0xc0 [ 26.239170] ? __pfx_kthread+0x10/0x10 [ 26.239191] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.239212] ? calculate_sigpending+0x7b/0xa0 [ 26.239236] ? __pfx_kthread+0x10/0x10 [ 26.239258] ret_from_fork+0x116/0x1d0 [ 26.239277] ? __pfx_kthread+0x10/0x10 [ 26.239298] ret_from_fork_asm+0x1a/0x30 [ 26.239329] </TASK> [ 26.239340] [ 26.247026] Allocated by task 311: [ 26.247225] kasan_save_stack+0x45/0x70 [ 26.247448] kasan_save_track+0x18/0x40 [ 26.247638] kasan_save_alloc_info+0x3b/0x50 [ 26.247837] __kasan_kmalloc+0xb7/0xc0 [ 26.248033] __kmalloc_cache_noprof+0x189/0x420 [ 26.248217] kasan_bitops_generic+0x92/0x1c0 [ 26.248453] kunit_try_run_case+0x1a5/0x480 [ 26.248655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.248898] kthread+0x337/0x6f0 [ 26.249066] ret_from_fork+0x116/0x1d0 [ 26.249217] ret_from_fork_asm+0x1a/0x30 [ 26.249355] [ 26.249447] The buggy address belongs to the object at ffff888104c83b80 [ 26.249447] which belongs to the cache kmalloc-16 of size 16 [ 26.249803] The buggy address is located 8 bytes inside of [ 26.249803] allocated 9-byte region [ffff888104c83b80, ffff888104c83b89) [ 26.250337] [ 26.250442] The buggy address belongs to the physical page: [ 26.250686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104c83 [ 26.251035] flags: 0x200000000000000(node=0|zone=2) [ 26.251258] page_type: f5(slab) [ 26.251406] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.251627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.251853] page dumped because: kasan: bad access detected [ 26.252094] [ 26.252181] Memory state around the buggy address: [ 26.252472] ffff888104c83a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.252823] ffff888104c83b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.253134] >ffff888104c83b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.253494] ^ [ 26.253666] ffff888104c83c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.253972] ffff888104c83c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.254254] ==================================================================