Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-x86_64 |
[ 61.488137] ================================================================== [ 61.495203] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 61.504143] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 61.511521] [ 61.513002] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 61.513047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.513063] Hardware name: WinLink E850-96 board (DT) [ 61.513081] Call trace: [ 61.513092] show_stack+0x20/0x38 (C) [ 61.513123] dump_stack_lvl+0x8c/0xd0 [ 61.513157] print_report+0x118/0x5d0 [ 61.513186] kasan_report+0xdc/0x128 [ 61.513214] kasan_check_range+0x100/0x1a8 [ 61.513243] __kasan_check_write+0x20/0x30 [ 61.513272] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 61.513311] kasan_bitops_generic+0x11c/0x1c8 [ 61.513345] kunit_try_run_case+0x170/0x3f0 [ 61.513380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.513412] kthread+0x328/0x630 [ 61.513439] ret_from_fork+0x10/0x20 [ 61.513469] [ 61.586693] Allocated by task 345: [ 61.590079] kasan_save_stack+0x3c/0x68 [ 61.593898] kasan_save_track+0x20/0x40 [ 61.597718] kasan_save_alloc_info+0x40/0x58 [ 61.601971] __kasan_kmalloc+0xd4/0xd8 [ 61.605703] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.610218] kasan_bitops_generic+0xa0/0x1c8 [ 61.614471] kunit_try_run_case+0x170/0x3f0 [ 61.618637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.624106] kthread+0x328/0x630 [ 61.627318] ret_from_fork+0x10/0x20 [ 61.630877] [ 61.632352] The buggy address belongs to the object at ffff000806e5df40 [ 61.632352] which belongs to the cache kmalloc-16 of size 16 [ 61.644679] The buggy address is located 8 bytes inside of [ 61.644679] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 61.656918] [ 61.658394] The buggy address belongs to the physical page: [ 61.663950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 61.671937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.678446] page_type: f5(slab) [ 61.681578] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.689303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.697022] page dumped because: kasan: bad access detected [ 61.702577] [ 61.704053] Memory state around the buggy address: [ 61.708831] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.716035] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.723240] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 61.730441] ^ [ 61.736000] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.743205] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.750406] ================================================================== [ 60.952383] ================================================================== [ 60.959447] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 60.968387] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 60.975765] [ 60.977246] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 60.977294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.977312] Hardware name: WinLink E850-96 board (DT) [ 60.977331] Call trace: [ 60.977345] show_stack+0x20/0x38 (C) [ 60.977376] dump_stack_lvl+0x8c/0xd0 [ 60.977407] print_report+0x118/0x5d0 [ 60.977436] kasan_report+0xdc/0x128 [ 60.977463] kasan_check_range+0x100/0x1a8 [ 60.977494] __kasan_check_write+0x20/0x30 [ 60.977525] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 60.977566] kasan_bitops_generic+0x11c/0x1c8 [ 60.977601] kunit_try_run_case+0x170/0x3f0 [ 60.977634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.977668] kthread+0x328/0x630 [ 60.977695] ret_from_fork+0x10/0x20 [ 60.977727] [ 61.050937] Allocated by task 345: [ 61.054323] kasan_save_stack+0x3c/0x68 [ 61.058142] kasan_save_track+0x20/0x40 [ 61.061962] kasan_save_alloc_info+0x40/0x58 [ 61.066215] __kasan_kmalloc+0xd4/0xd8 [ 61.069948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.074462] kasan_bitops_generic+0xa0/0x1c8 [ 61.078715] kunit_try_run_case+0x170/0x3f0 [ 61.082883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.088350] kthread+0x328/0x630 [ 61.091562] ret_from_fork+0x10/0x20 [ 61.095121] [ 61.096596] The buggy address belongs to the object at ffff000806e5df40 [ 61.096596] which belongs to the cache kmalloc-16 of size 16 [ 61.108923] The buggy address is located 8 bytes inside of [ 61.108923] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 61.121162] [ 61.122638] The buggy address belongs to the physical page: [ 61.128194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 61.136181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.142690] page_type: f5(slab) [ 61.145822] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.153547] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.161266] page dumped because: kasan: bad access detected [ 61.166821] [ 61.168297] Memory state around the buggy address: [ 61.173075] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.180280] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.187484] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 61.194685] ^ [ 61.200244] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.207449] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.214650] ================================================================== [ 61.221995] ================================================================== [ 61.229061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 61.238001] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 61.245292] [ 61.246773] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 61.246820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.246835] Hardware name: WinLink E850-96 board (DT) [ 61.246855] Call trace: [ 61.246867] show_stack+0x20/0x38 (C) [ 61.246898] dump_stack_lvl+0x8c/0xd0 [ 61.246930] print_report+0x118/0x5d0 [ 61.246958] kasan_report+0xdc/0x128 [ 61.246985] __asan_report_load8_noabort+0x20/0x30 [ 61.247018] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 61.247057] kasan_bitops_generic+0x11c/0x1c8 [ 61.247093] kunit_try_run_case+0x170/0x3f0 [ 61.247127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.247158] kthread+0x328/0x630 [ 61.247185] ret_from_fork+0x10/0x20 [ 61.247216] [ 61.317079] Allocated by task 345: [ 61.320465] kasan_save_stack+0x3c/0x68 [ 61.324284] kasan_save_track+0x20/0x40 [ 61.328105] kasan_save_alloc_info+0x40/0x58 [ 61.332357] __kasan_kmalloc+0xd4/0xd8 [ 61.336089] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.340605] kasan_bitops_generic+0xa0/0x1c8 [ 61.344857] kunit_try_run_case+0x170/0x3f0 [ 61.349024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.354492] kthread+0x328/0x630 [ 61.357704] ret_from_fork+0x10/0x20 [ 61.361263] [ 61.362738] The buggy address belongs to the object at ffff000806e5df40 [ 61.362738] which belongs to the cache kmalloc-16 of size 16 [ 61.375065] The buggy address is located 8 bytes inside of [ 61.375065] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 61.387304] [ 61.388780] The buggy address belongs to the physical page: [ 61.394336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 61.402321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.408831] page_type: f5(slab) [ 61.411964] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.419689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.427408] page dumped because: kasan: bad access detected [ 61.432963] [ 61.434438] Memory state around the buggy address: [ 61.439217] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.446421] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.453626] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 61.460827] ^ [ 61.466386] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.473591] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.480792] ================================================================== [ 62.023897] ================================================================== [ 62.030959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 62.039898] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 62.047190] [ 62.048671] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 62.048720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.048737] Hardware name: WinLink E850-96 board (DT) [ 62.048755] Call trace: [ 62.048770] show_stack+0x20/0x38 (C) [ 62.048801] dump_stack_lvl+0x8c/0xd0 [ 62.048833] print_report+0x118/0x5d0 [ 62.048861] kasan_report+0xdc/0x128 [ 62.048891] __asan_report_load8_noabort+0x20/0x30 [ 62.048928] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 62.048966] kasan_bitops_generic+0x11c/0x1c8 [ 62.049001] kunit_try_run_case+0x170/0x3f0 [ 62.049036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.049070] kthread+0x328/0x630 [ 62.049099] ret_from_fork+0x10/0x20 [ 62.049129] [ 62.118977] Allocated by task 345: [ 62.122363] kasan_save_stack+0x3c/0x68 [ 62.126182] kasan_save_track+0x20/0x40 [ 62.130001] kasan_save_alloc_info+0x40/0x58 [ 62.134255] __kasan_kmalloc+0xd4/0xd8 [ 62.137987] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.142501] kasan_bitops_generic+0xa0/0x1c8 [ 62.146754] kunit_try_run_case+0x170/0x3f0 [ 62.150921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.156390] kthread+0x328/0x630 [ 62.159601] ret_from_fork+0x10/0x20 [ 62.163160] [ 62.164636] The buggy address belongs to the object at ffff000806e5df40 [ 62.164636] which belongs to the cache kmalloc-16 of size 16 [ 62.176963] The buggy address is located 8 bytes inside of [ 62.176963] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 62.189202] [ 62.190678] The buggy address belongs to the physical page: [ 62.196234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 62.204221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.210729] page_type: f5(slab) [ 62.213862] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.221586] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.229305] page dumped because: kasan: bad access detected [ 62.234861] [ 62.236336] Memory state around the buggy address: [ 62.241114] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.248319] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.255524] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 62.262725] ^ [ 62.268284] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.275489] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.282690] ================================================================== [ 59.881018] ================================================================== [ 59.888109] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 59.896962] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 59.904340] [ 59.905821] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 59.905869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.905885] Hardware name: WinLink E850-96 board (DT) [ 59.905904] Call trace: [ 59.905918] show_stack+0x20/0x38 (C) [ 59.905951] dump_stack_lvl+0x8c/0xd0 [ 59.905980] print_report+0x118/0x5d0 [ 59.906009] kasan_report+0xdc/0x128 [ 59.906037] kasan_check_range+0x100/0x1a8 [ 59.906067] __kasan_check_write+0x20/0x30 [ 59.906098] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 59.906138] kasan_bitops_generic+0x11c/0x1c8 [ 59.906172] kunit_try_run_case+0x170/0x3f0 [ 59.906206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.906239] kthread+0x328/0x630 [ 59.906267] ret_from_fork+0x10/0x20 [ 59.906299] [ 59.979426] Allocated by task 345: [ 59.982813] kasan_save_stack+0x3c/0x68 [ 59.986631] kasan_save_track+0x20/0x40 [ 59.990450] kasan_save_alloc_info+0x40/0x58 [ 59.994703] __kasan_kmalloc+0xd4/0xd8 [ 59.998436] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.002950] kasan_bitops_generic+0xa0/0x1c8 [ 60.007203] kunit_try_run_case+0x170/0x3f0 [ 60.011370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.016838] kthread+0x328/0x630 [ 60.020050] ret_from_fork+0x10/0x20 [ 60.023609] [ 60.025085] The buggy address belongs to the object at ffff000806e5df40 [ 60.025085] which belongs to the cache kmalloc-16 of size 16 [ 60.037411] The buggy address is located 8 bytes inside of [ 60.037411] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 60.049650] [ 60.051126] The buggy address belongs to the physical page: [ 60.056682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 60.064668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.071178] page_type: f5(slab) [ 60.074311] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.082035] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.089754] page dumped because: kasan: bad access detected [ 60.095310] [ 60.096785] Memory state around the buggy address: [ 60.101563] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.108768] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.115973] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 60.123174] ^ [ 60.128733] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.135938] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.143139] ================================================================== [ 60.416623] ================================================================== [ 60.423692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 60.432631] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 60.440009] [ 60.441490] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 60.441537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.441553] Hardware name: WinLink E850-96 board (DT) [ 60.441571] Call trace: [ 60.441583] show_stack+0x20/0x38 (C) [ 60.441617] dump_stack_lvl+0x8c/0xd0 [ 60.441647] print_report+0x118/0x5d0 [ 60.441674] kasan_report+0xdc/0x128 [ 60.441701] kasan_check_range+0x100/0x1a8 [ 60.441732] __kasan_check_write+0x20/0x30 [ 60.441761] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 60.441800] kasan_bitops_generic+0x11c/0x1c8 [ 60.441832] kunit_try_run_case+0x170/0x3f0 [ 60.441864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.441899] kthread+0x328/0x630 [ 60.441925] ret_from_fork+0x10/0x20 [ 60.441956] [ 60.515181] Allocated by task 345: [ 60.518569] kasan_save_stack+0x3c/0x68 [ 60.522387] kasan_save_track+0x20/0x40 [ 60.526206] kasan_save_alloc_info+0x40/0x58 [ 60.530459] __kasan_kmalloc+0xd4/0xd8 [ 60.534192] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.538706] kasan_bitops_generic+0xa0/0x1c8 [ 60.542959] kunit_try_run_case+0x170/0x3f0 [ 60.547125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.552594] kthread+0x328/0x630 [ 60.555806] ret_from_fork+0x10/0x20 [ 60.559365] [ 60.560841] The buggy address belongs to the object at ffff000806e5df40 [ 60.560841] which belongs to the cache kmalloc-16 of size 16 [ 60.573167] The buggy address is located 8 bytes inside of [ 60.573167] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 60.585406] [ 60.586882] The buggy address belongs to the physical page: [ 60.592438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 60.600424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.606934] page_type: f5(slab) [ 60.610066] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.617791] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.625510] page dumped because: kasan: bad access detected [ 60.631065] [ 60.632541] Memory state around the buggy address: [ 60.637319] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.644524] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.651728] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 60.658930] ^ [ 60.664489] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.671693] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.678894] ================================================================== [ 61.757777] ================================================================== [ 61.764817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 61.773757] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 61.781048] [ 61.782529] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 61.782578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.782594] Hardware name: WinLink E850-96 board (DT) [ 61.782613] Call trace: [ 61.782628] show_stack+0x20/0x38 (C) [ 61.782661] dump_stack_lvl+0x8c/0xd0 [ 61.782694] print_report+0x118/0x5d0 [ 61.782721] kasan_report+0xdc/0x128 [ 61.782748] __asan_report_load8_noabort+0x20/0x30 [ 61.782782] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 61.782822] kasan_bitops_generic+0x11c/0x1c8 [ 61.782857] kunit_try_run_case+0x170/0x3f0 [ 61.782892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.782923] kthread+0x328/0x630 [ 61.782951] ret_from_fork+0x10/0x20 [ 61.782983] [ 61.852835] Allocated by task 345: [ 61.856221] kasan_save_stack+0x3c/0x68 [ 61.860040] kasan_save_track+0x20/0x40 [ 61.863860] kasan_save_alloc_info+0x40/0x58 [ 61.868113] __kasan_kmalloc+0xd4/0xd8 [ 61.871846] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.876359] kasan_bitops_generic+0xa0/0x1c8 [ 61.880612] kunit_try_run_case+0x170/0x3f0 [ 61.884779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.890248] kthread+0x328/0x630 [ 61.893460] ret_from_fork+0x10/0x20 [ 61.897018] [ 61.898494] The buggy address belongs to the object at ffff000806e5df40 [ 61.898494] which belongs to the cache kmalloc-16 of size 16 [ 61.910821] The buggy address is located 8 bytes inside of [ 61.910821] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 61.923060] [ 61.924536] The buggy address belongs to the physical page: [ 61.930091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 61.938078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.944587] page_type: f5(slab) [ 61.947720] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.955445] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.963163] page dumped because: kasan: bad access detected [ 61.968719] [ 61.970194] Memory state around the buggy address: [ 61.974972] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.982177] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.989382] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 61.996583] ^ [ 62.002142] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.009347] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.016550] ================================================================== [ 60.150511] ================================================================== [ 60.157549] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 60.166489] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 60.173780] [ 60.175262] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 60.175312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.175327] Hardware name: WinLink E850-96 board (DT) [ 60.175347] Call trace: [ 60.175361] show_stack+0x20/0x38 (C) [ 60.175393] dump_stack_lvl+0x8c/0xd0 [ 60.175425] print_report+0x118/0x5d0 [ 60.175455] kasan_report+0xdc/0x128 [ 60.175482] __asan_report_load8_noabort+0x20/0x30 [ 60.175516] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 60.175554] kasan_bitops_generic+0x11c/0x1c8 [ 60.175587] kunit_try_run_case+0x170/0x3f0 [ 60.175624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.175657] kthread+0x328/0x630 [ 60.175686] ret_from_fork+0x10/0x20 [ 60.175717] [ 60.245568] Allocated by task 345: [ 60.248955] kasan_save_stack+0x3c/0x68 [ 60.252772] kasan_save_track+0x20/0x40 [ 60.256592] kasan_save_alloc_info+0x40/0x58 [ 60.260845] __kasan_kmalloc+0xd4/0xd8 [ 60.264578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.269092] kasan_bitops_generic+0xa0/0x1c8 [ 60.273345] kunit_try_run_case+0x170/0x3f0 [ 60.277512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.282980] kthread+0x328/0x630 [ 60.286192] ret_from_fork+0x10/0x20 [ 60.289751] [ 60.291227] The buggy address belongs to the object at ffff000806e5df40 [ 60.291227] which belongs to the cache kmalloc-16 of size 16 [ 60.303555] The buggy address is located 8 bytes inside of [ 60.303555] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 60.315792] [ 60.317268] The buggy address belongs to the physical page: [ 60.322824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 60.330809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.337320] page_type: f5(slab) [ 60.340452] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.348177] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.355896] page dumped because: kasan: bad access detected [ 60.361451] [ 60.362927] Memory state around the buggy address: [ 60.367705] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.374910] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.382114] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 60.389316] ^ [ 60.394875] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.402079] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.409281] ================================================================== [ 60.686267] ================================================================== [ 60.693306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 60.702245] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 60.709536] [ 60.711017] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 60.711067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.711085] Hardware name: WinLink E850-96 board (DT) [ 60.711104] Call trace: [ 60.711116] show_stack+0x20/0x38 (C) [ 60.711149] dump_stack_lvl+0x8c/0xd0 [ 60.711180] print_report+0x118/0x5d0 [ 60.711209] kasan_report+0xdc/0x128 [ 60.711235] __asan_report_load8_noabort+0x20/0x30 [ 60.711269] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 60.711309] kasan_bitops_generic+0x11c/0x1c8 [ 60.711341] kunit_try_run_case+0x170/0x3f0 [ 60.711377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.711409] kthread+0x328/0x630 [ 60.711436] ret_from_fork+0x10/0x20 [ 60.711469] [ 60.781323] Allocated by task 345: [ 60.784709] kasan_save_stack+0x3c/0x68 [ 60.788530] kasan_save_track+0x20/0x40 [ 60.792348] kasan_save_alloc_info+0x40/0x58 [ 60.796601] __kasan_kmalloc+0xd4/0xd8 [ 60.800334] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.804847] kasan_bitops_generic+0xa0/0x1c8 [ 60.809101] kunit_try_run_case+0x170/0x3f0 [ 60.813268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.818736] kthread+0x328/0x630 [ 60.821948] ret_from_fork+0x10/0x20 [ 60.825507] [ 60.826982] The buggy address belongs to the object at ffff000806e5df40 [ 60.826982] which belongs to the cache kmalloc-16 of size 16 [ 60.839309] The buggy address is located 8 bytes inside of [ 60.839309] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 60.851548] [ 60.853024] The buggy address belongs to the physical page: [ 60.858581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 60.866567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.873076] page_type: f5(slab) [ 60.876208] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.883933] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.891652] page dumped because: kasan: bad access detected [ 60.897207] [ 60.898683] Memory state around the buggy address: [ 60.903461] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.910665] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.917870] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 60.925071] ^ [ 60.930630] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.937835] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.945036] ==================================================================
[ 26.571295] ================================================================== [ 26.571631] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.572191] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.572424] [ 26.572510] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.572564] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.572578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.572601] Call Trace: [ 26.572616] <TASK> [ 26.572636] dump_stack_lvl+0x73/0xb0 [ 26.572677] print_report+0xd1/0x610 [ 26.572700] ? __virt_addr_valid+0x1db/0x2d0 [ 26.572724] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.572750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.572775] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.572802] kasan_report+0x141/0x180 [ 26.572826] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.572857] kasan_check_range+0x10c/0x1c0 [ 26.572880] __kasan_check_write+0x18/0x20 [ 26.572912] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.572939] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.572966] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.572991] ? trace_hardirqs_on+0x37/0xe0 [ 26.573014] ? kasan_bitops_generic+0x92/0x1c0 [ 26.573040] kasan_bitops_generic+0x121/0x1c0 [ 26.573063] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.573087] ? __pfx_read_tsc+0x10/0x10 [ 26.573109] ? ktime_get_ts64+0x86/0x230 [ 26.573133] kunit_try_run_case+0x1a5/0x480 [ 26.573157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.573177] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.573201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.573225] ? __kthread_parkme+0x82/0x180 [ 26.573247] ? preempt_count_sub+0x50/0x80 [ 26.573270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.573292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.573317] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.573342] kthread+0x337/0x6f0 [ 26.573362] ? trace_preempt_on+0x20/0xc0 [ 26.573384] ? __pfx_kthread+0x10/0x10 [ 26.573405] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.573427] ? calculate_sigpending+0x7b/0xa0 [ 26.573451] ? __pfx_kthread+0x10/0x10 [ 26.573473] ret_from_fork+0x116/0x1d0 [ 26.573492] ? __pfx_kthread+0x10/0x10 [ 26.573513] ret_from_fork_asm+0x1a/0x30 [ 26.573543] </TASK> [ 26.573555] [ 26.581627] Allocated by task 310: [ 26.581818] kasan_save_stack+0x45/0x70 [ 26.582005] kasan_save_track+0x18/0x40 [ 26.582188] kasan_save_alloc_info+0x3b/0x50 [ 26.582381] __kasan_kmalloc+0xb7/0xc0 [ 26.582543] __kmalloc_cache_noprof+0x189/0x420 [ 26.584377] kasan_bitops_generic+0x92/0x1c0 [ 26.584702] kunit_try_run_case+0x1a5/0x480 [ 26.584861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.585037] kthread+0x337/0x6f0 [ 26.585154] ret_from_fork+0x116/0x1d0 [ 26.585281] ret_from_fork_asm+0x1a/0x30 [ 26.585415] [ 26.585481] The buggy address belongs to the object at ffff8881058422c0 [ 26.585481] which belongs to the cache kmalloc-16 of size 16 [ 26.587644] The buggy address is located 8 bytes inside of [ 26.587644] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.588689] [ 26.588793] The buggy address belongs to the physical page: [ 26.588970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.589227] flags: 0x200000000000000(node=0|zone=2) [ 26.589389] page_type: f5(slab) [ 26.589510] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.589927] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.590951] page dumped because: kasan: bad access detected [ 26.591237] [ 26.591739] Memory state around the buggy address: [ 26.592007] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.592479] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.592713] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.592920] ^ [ 26.593425] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.593753] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.594837] ================================================================== [ 26.596350] ================================================================== [ 26.596819] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.597276] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.597592] [ 26.597711] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.597813] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.597828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.597853] Call Trace: [ 26.597884] <TASK> [ 26.597905] dump_stack_lvl+0x73/0xb0 [ 26.597936] print_report+0xd1/0x610 [ 26.597987] ? __virt_addr_valid+0x1db/0x2d0 [ 26.598011] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.598053] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.598095] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.598135] kasan_report+0x141/0x180 [ 26.598156] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.598186] kasan_check_range+0x10c/0x1c0 [ 26.598219] __kasan_check_write+0x18/0x20 [ 26.598241] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.598278] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.598305] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.598329] ? trace_hardirqs_on+0x37/0xe0 [ 26.598352] ? kasan_bitops_generic+0x92/0x1c0 [ 26.598378] kasan_bitops_generic+0x121/0x1c0 [ 26.598400] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.598424] ? __pfx_read_tsc+0x10/0x10 [ 26.598445] ? ktime_get_ts64+0x86/0x230 [ 26.598469] kunit_try_run_case+0x1a5/0x480 [ 26.598493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.598514] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.598540] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.598564] ? __kthread_parkme+0x82/0x180 [ 26.598585] ? preempt_count_sub+0x50/0x80 [ 26.598608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.598632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.598668] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.598693] kthread+0x337/0x6f0 [ 26.598713] ? trace_preempt_on+0x20/0xc0 [ 26.598735] ? __pfx_kthread+0x10/0x10 [ 26.598765] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.598787] ? calculate_sigpending+0x7b/0xa0 [ 26.598811] ? __pfx_kthread+0x10/0x10 [ 26.598832] ret_from_fork+0x116/0x1d0 [ 26.598851] ? __pfx_kthread+0x10/0x10 [ 26.598871] ret_from_fork_asm+0x1a/0x30 [ 26.598902] </TASK> [ 26.598914] [ 26.609396] Allocated by task 310: [ 26.609582] kasan_save_stack+0x45/0x70 [ 26.609859] kasan_save_track+0x18/0x40 [ 26.610406] kasan_save_alloc_info+0x3b/0x50 [ 26.610910] __kasan_kmalloc+0xb7/0xc0 [ 26.611090] __kmalloc_cache_noprof+0x189/0x420 [ 26.611281] kasan_bitops_generic+0x92/0x1c0 [ 26.611463] kunit_try_run_case+0x1a5/0x480 [ 26.611641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.612199] kthread+0x337/0x6f0 [ 26.612476] ret_from_fork+0x116/0x1d0 [ 26.612670] ret_from_fork_asm+0x1a/0x30 [ 26.613014] [ 26.613393] The buggy address belongs to the object at ffff8881058422c0 [ 26.613393] which belongs to the cache kmalloc-16 of size 16 [ 26.614187] The buggy address is located 8 bytes inside of [ 26.614187] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.614670] [ 26.614772] The buggy address belongs to the physical page: [ 26.614993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.615307] flags: 0x200000000000000(node=0|zone=2) [ 26.615518] page_type: f5(slab) [ 26.616119] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.616605] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.617069] page dumped because: kasan: bad access detected [ 26.617461] [ 26.617747] Memory state around the buggy address: [ 26.618127] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.618421] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.618888] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.619451] ^ [ 26.619704] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.620324] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.620632] ================================================================== [ 26.684925] ================================================================== [ 26.685203] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.685515] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.685848] [ 26.685960] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.686018] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.686031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.686061] Call Trace: [ 26.686080] <TASK> [ 26.686099] dump_stack_lvl+0x73/0xb0 [ 26.686129] print_report+0xd1/0x610 [ 26.686151] ? __virt_addr_valid+0x1db/0x2d0 [ 26.686175] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.686200] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.686226] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.686252] kasan_report+0x141/0x180 [ 26.686272] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.686303] kasan_check_range+0x10c/0x1c0 [ 26.686334] __kasan_check_write+0x18/0x20 [ 26.686356] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.686382] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.686408] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.686432] ? trace_hardirqs_on+0x37/0xe0 [ 26.686455] ? kasan_bitops_generic+0x92/0x1c0 [ 26.686481] kasan_bitops_generic+0x121/0x1c0 [ 26.686504] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.686528] ? __pfx_read_tsc+0x10/0x10 [ 26.686549] ? ktime_get_ts64+0x86/0x230 [ 26.686573] kunit_try_run_case+0x1a5/0x480 [ 26.686596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.686616] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.686640] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.686673] ? __kthread_parkme+0x82/0x180 [ 26.686694] ? preempt_count_sub+0x50/0x80 [ 26.686718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.686739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.686777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.686801] kthread+0x337/0x6f0 [ 26.686821] ? trace_preempt_on+0x20/0xc0 [ 26.686842] ? __pfx_kthread+0x10/0x10 [ 26.686863] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.686885] ? calculate_sigpending+0x7b/0xa0 [ 26.686909] ? __pfx_kthread+0x10/0x10 [ 26.686930] ret_from_fork+0x116/0x1d0 [ 26.686948] ? __pfx_kthread+0x10/0x10 [ 26.686969] ret_from_fork_asm+0x1a/0x30 [ 26.686999] </TASK> [ 26.687009] [ 26.695019] Allocated by task 310: [ 26.695171] kasan_save_stack+0x45/0x70 [ 26.695319] kasan_save_track+0x18/0x40 [ 26.695503] kasan_save_alloc_info+0x3b/0x50 [ 26.695712] __kasan_kmalloc+0xb7/0xc0 [ 26.695906] __kmalloc_cache_noprof+0x189/0x420 [ 26.696083] kasan_bitops_generic+0x92/0x1c0 [ 26.696271] kunit_try_run_case+0x1a5/0x480 [ 26.696450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.696679] kthread+0x337/0x6f0 [ 26.696815] ret_from_fork+0x116/0x1d0 [ 26.696997] ret_from_fork_asm+0x1a/0x30 [ 26.697175] [ 26.697261] The buggy address belongs to the object at ffff8881058422c0 [ 26.697261] which belongs to the cache kmalloc-16 of size 16 [ 26.697720] The buggy address is located 8 bytes inside of [ 26.697720] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.698165] [ 26.698233] The buggy address belongs to the physical page: [ 26.698398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.698632] flags: 0x200000000000000(node=0|zone=2) [ 26.698865] page_type: f5(slab) [ 26.699140] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.699474] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.699763] page dumped because: kasan: bad access detected [ 26.699926] [ 26.699987] Memory state around the buggy address: [ 26.700136] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.700432] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.700748] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.701058] ^ [ 26.701306] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.701625] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.701897] ================================================================== [ 26.702546] ================================================================== [ 26.703105] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.703601] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.703971] [ 26.704083] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.704138] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.704154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.704178] Call Trace: [ 26.704198] <TASK> [ 26.704217] dump_stack_lvl+0x73/0xb0 [ 26.704248] print_report+0xd1/0x610 [ 26.704269] ? __virt_addr_valid+0x1db/0x2d0 [ 26.704295] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.704321] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.704346] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.704374] kasan_report+0x141/0x180 [ 26.704396] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.704427] kasan_check_range+0x10c/0x1c0 [ 26.704454] __kasan_check_write+0x18/0x20 [ 26.704479] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.704508] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.704535] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.704560] ? trace_hardirqs_on+0x37/0xe0 [ 26.704584] ? kasan_bitops_generic+0x92/0x1c0 [ 26.704610] kasan_bitops_generic+0x121/0x1c0 [ 26.704633] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.704666] ? __pfx_read_tsc+0x10/0x10 [ 26.704688] ? ktime_get_ts64+0x86/0x230 [ 26.704712] kunit_try_run_case+0x1a5/0x480 [ 26.704736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.704756] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.704780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.704803] ? __kthread_parkme+0x82/0x180 [ 26.704825] ? preempt_count_sub+0x50/0x80 [ 26.704848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.704870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.704895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.704920] kthread+0x337/0x6f0 [ 26.704939] ? trace_preempt_on+0x20/0xc0 [ 26.704960] ? __pfx_kthread+0x10/0x10 [ 26.704981] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.705002] ? calculate_sigpending+0x7b/0xa0 [ 26.705026] ? __pfx_kthread+0x10/0x10 [ 26.705047] ret_from_fork+0x116/0x1d0 [ 26.705065] ? __pfx_kthread+0x10/0x10 [ 26.705086] ret_from_fork_asm+0x1a/0x30 [ 26.705117] </TASK> [ 26.705127] [ 26.713756] Allocated by task 310: [ 26.713954] kasan_save_stack+0x45/0x70 [ 26.714158] kasan_save_track+0x18/0x40 [ 26.714336] kasan_save_alloc_info+0x3b/0x50 [ 26.714532] __kasan_kmalloc+0xb7/0xc0 [ 26.715049] __kmalloc_cache_noprof+0x189/0x420 [ 26.715273] kasan_bitops_generic+0x92/0x1c0 [ 26.715680] kunit_try_run_case+0x1a5/0x480 [ 26.716002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.716254] kthread+0x337/0x6f0 [ 26.716409] ret_from_fork+0x116/0x1d0 [ 26.716579] ret_from_fork_asm+0x1a/0x30 [ 26.716792] [ 26.716880] The buggy address belongs to the object at ffff8881058422c0 [ 26.716880] which belongs to the cache kmalloc-16 of size 16 [ 26.717372] The buggy address is located 8 bytes inside of [ 26.717372] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.718325] [ 26.718408] The buggy address belongs to the physical page: [ 26.718745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.719339] flags: 0x200000000000000(node=0|zone=2) [ 26.719680] page_type: f5(slab) [ 26.719958] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.720458] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.721049] page dumped because: kasan: bad access detected [ 26.721405] [ 26.721504] Memory state around the buggy address: [ 26.721708] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.722292] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.722595] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.723090] ^ [ 26.723564] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.724117] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.724410] ================================================================== [ 26.742682] ================================================================== [ 26.743447] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.743948] Read of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.744212] [ 26.744318] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.744371] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.744385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.744410] Call Trace: [ 26.744429] <TASK> [ 26.744448] dump_stack_lvl+0x73/0xb0 [ 26.744478] print_report+0xd1/0x610 [ 26.744500] ? __virt_addr_valid+0x1db/0x2d0 [ 26.744524] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.744550] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.744577] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.744605] kasan_report+0x141/0x180 [ 26.744626] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.744669] __asan_report_load8_noabort+0x18/0x20 [ 26.744693] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.744720] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.744757] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.744782] ? trace_hardirqs_on+0x37/0xe0 [ 26.744805] ? kasan_bitops_generic+0x92/0x1c0 [ 26.744831] kasan_bitops_generic+0x121/0x1c0 [ 26.744854] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.744878] ? __pfx_read_tsc+0x10/0x10 [ 26.744899] ? ktime_get_ts64+0x86/0x230 [ 26.744924] kunit_try_run_case+0x1a5/0x480 [ 26.744947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.744967] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.744991] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.745015] ? __kthread_parkme+0x82/0x180 [ 26.745036] ? preempt_count_sub+0x50/0x80 [ 26.745059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.745082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.745107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.745132] kthread+0x337/0x6f0 [ 26.745151] ? trace_preempt_on+0x20/0xc0 [ 26.745173] ? __pfx_kthread+0x10/0x10 [ 26.745194] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.745215] ? calculate_sigpending+0x7b/0xa0 [ 26.745239] ? __pfx_kthread+0x10/0x10 [ 26.745261] ret_from_fork+0x116/0x1d0 [ 26.745278] ? __pfx_kthread+0x10/0x10 [ 26.745299] ret_from_fork_asm+0x1a/0x30 [ 26.745330] </TASK> [ 26.745341] [ 26.753067] Allocated by task 310: [ 26.753206] kasan_save_stack+0x45/0x70 [ 26.753409] kasan_save_track+0x18/0x40 [ 26.753595] kasan_save_alloc_info+0x3b/0x50 [ 26.753824] __kasan_kmalloc+0xb7/0xc0 [ 26.753978] __kmalloc_cache_noprof+0x189/0x420 [ 26.754134] kasan_bitops_generic+0x92/0x1c0 [ 26.754273] kunit_try_run_case+0x1a5/0x480 [ 26.754412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.754582] kthread+0x337/0x6f0 [ 26.754706] ret_from_fork+0x116/0x1d0 [ 26.754834] ret_from_fork_asm+0x1a/0x30 [ 26.754965] [ 26.755056] The buggy address belongs to the object at ffff8881058422c0 [ 26.755056] which belongs to the cache kmalloc-16 of size 16 [ 26.755641] The buggy address is located 8 bytes inside of [ 26.755641] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.756160] [ 26.756249] The buggy address belongs to the physical page: [ 26.756477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.756723] flags: 0x200000000000000(node=0|zone=2) [ 26.756894] page_type: f5(slab) [ 26.757014] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.757235] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.757451] page dumped because: kasan: bad access detected [ 26.757887] [ 26.757988] Memory state around the buggy address: [ 26.758210] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.758526] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.758849] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.759162] ^ [ 26.759414] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.759855] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.760207] ================================================================== [ 26.725001] ================================================================== [ 26.725306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.725705] Read of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.725991] [ 26.726119] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.726173] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.726187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.726209] Call Trace: [ 26.726229] <TASK> [ 26.726250] dump_stack_lvl+0x73/0xb0 [ 26.726281] print_report+0xd1/0x610 [ 26.726302] ? __virt_addr_valid+0x1db/0x2d0 [ 26.726326] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.726352] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.726378] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.726404] kasan_report+0x141/0x180 [ 26.726427] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.726457] kasan_check_range+0x10c/0x1c0 [ 26.726481] __kasan_check_read+0x15/0x20 [ 26.726503] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.726529] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.726557] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.726581] ? trace_hardirqs_on+0x37/0xe0 [ 26.726603] ? kasan_bitops_generic+0x92/0x1c0 [ 26.726629] kasan_bitops_generic+0x121/0x1c0 [ 26.726652] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.726687] ? __pfx_read_tsc+0x10/0x10 [ 26.726708] ? ktime_get_ts64+0x86/0x230 [ 26.726733] kunit_try_run_case+0x1a5/0x480 [ 26.726756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.726776] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.726800] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.726833] ? __kthread_parkme+0x82/0x180 [ 26.726854] ? preempt_count_sub+0x50/0x80 [ 26.726877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.726899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.726923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.726948] kthread+0x337/0x6f0 [ 26.726968] ? trace_preempt_on+0x20/0xc0 [ 26.726989] ? __pfx_kthread+0x10/0x10 [ 26.727010] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.727032] ? calculate_sigpending+0x7b/0xa0 [ 26.727056] ? __pfx_kthread+0x10/0x10 [ 26.727078] ret_from_fork+0x116/0x1d0 [ 26.727097] ? __pfx_kthread+0x10/0x10 [ 26.727117] ret_from_fork_asm+0x1a/0x30 [ 26.727148] </TASK> [ 26.727158] [ 26.735008] Allocated by task 310: [ 26.735196] kasan_save_stack+0x45/0x70 [ 26.735342] kasan_save_track+0x18/0x40 [ 26.735470] kasan_save_alloc_info+0x3b/0x50 [ 26.735611] __kasan_kmalloc+0xb7/0xc0 [ 26.735831] __kmalloc_cache_noprof+0x189/0x420 [ 26.736049] kasan_bitops_generic+0x92/0x1c0 [ 26.736251] kunit_try_run_case+0x1a5/0x480 [ 26.736452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.736696] kthread+0x337/0x6f0 [ 26.736848] ret_from_fork+0x116/0x1d0 [ 26.736995] ret_from_fork_asm+0x1a/0x30 [ 26.737188] [ 26.737279] The buggy address belongs to the object at ffff8881058422c0 [ 26.737279] which belongs to the cache kmalloc-16 of size 16 [ 26.737717] The buggy address is located 8 bytes inside of [ 26.737717] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.738212] [ 26.738294] The buggy address belongs to the physical page: [ 26.738503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.738746] flags: 0x200000000000000(node=0|zone=2) [ 26.738987] page_type: f5(slab) [ 26.739153] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.739441] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.739724] page dumped because: kasan: bad access detected [ 26.739972] [ 26.740060] Memory state around the buggy address: [ 26.740277] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.740551] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.740917] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.741174] ^ [ 26.741341] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.741547] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.741814] ================================================================== [ 26.667159] ================================================================== [ 26.667524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.668053] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.668324] [ 26.668418] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.668473] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.668486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.668510] Call Trace: [ 26.668531] <TASK> [ 26.668551] dump_stack_lvl+0x73/0xb0 [ 26.668582] print_report+0xd1/0x610 [ 26.668605] ? __virt_addr_valid+0x1db/0x2d0 [ 26.668630] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.668668] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.668694] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.668720] kasan_report+0x141/0x180 [ 26.668741] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.668779] kasan_check_range+0x10c/0x1c0 [ 26.668801] __kasan_check_write+0x18/0x20 [ 26.668823] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.668851] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.668878] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.668903] ? trace_hardirqs_on+0x37/0xe0 [ 26.668926] ? kasan_bitops_generic+0x92/0x1c0 [ 26.668951] kasan_bitops_generic+0x121/0x1c0 [ 26.668974] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.668998] ? __pfx_read_tsc+0x10/0x10 [ 26.669019] ? ktime_get_ts64+0x86/0x230 [ 26.669043] kunit_try_run_case+0x1a5/0x480 [ 26.669066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.669086] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.669111] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.669134] ? __kthread_parkme+0x82/0x180 [ 26.669155] ? preempt_count_sub+0x50/0x80 [ 26.669178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.669200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.669224] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.669249] kthread+0x337/0x6f0 [ 26.669268] ? trace_preempt_on+0x20/0xc0 [ 26.669290] ? __pfx_kthread+0x10/0x10 [ 26.669310] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.669332] ? calculate_sigpending+0x7b/0xa0 [ 26.669355] ? __pfx_kthread+0x10/0x10 [ 26.669376] ret_from_fork+0x116/0x1d0 [ 26.669394] ? __pfx_kthread+0x10/0x10 [ 26.669415] ret_from_fork_asm+0x1a/0x30 [ 26.669446] </TASK> [ 26.669458] [ 26.677030] Allocated by task 310: [ 26.677178] kasan_save_stack+0x45/0x70 [ 26.677340] kasan_save_track+0x18/0x40 [ 26.677527] kasan_save_alloc_info+0x3b/0x50 [ 26.677747] __kasan_kmalloc+0xb7/0xc0 [ 26.677933] __kmalloc_cache_noprof+0x189/0x420 [ 26.678153] kasan_bitops_generic+0x92/0x1c0 [ 26.678312] kunit_try_run_case+0x1a5/0x480 [ 26.678490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.678751] kthread+0x337/0x6f0 [ 26.678898] ret_from_fork+0x116/0x1d0 [ 26.679071] ret_from_fork_asm+0x1a/0x30 [ 26.679239] [ 26.679304] The buggy address belongs to the object at ffff8881058422c0 [ 26.679304] which belongs to the cache kmalloc-16 of size 16 [ 26.679652] The buggy address is located 8 bytes inside of [ 26.679652] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.680063] [ 26.680195] The buggy address belongs to the physical page: [ 26.680442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.680797] flags: 0x200000000000000(node=0|zone=2) [ 26.681025] page_type: f5(slab) [ 26.681195] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.681711] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.682104] page dumped because: kasan: bad access detected [ 26.682267] [ 26.682328] Memory state around the buggy address: [ 26.682477] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.682837] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.683152] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.683459] ^ [ 26.683691] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.684053] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.684320] ================================================================== [ 26.645311] ================================================================== [ 26.645643] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.646556] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.647137] [ 26.647258] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.647314] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.647328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.647352] Call Trace: [ 26.647373] <TASK> [ 26.647393] dump_stack_lvl+0x73/0xb0 [ 26.647429] print_report+0xd1/0x610 [ 26.647452] ? __virt_addr_valid+0x1db/0x2d0 [ 26.647476] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.647502] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.647527] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.647554] kasan_report+0x141/0x180 [ 26.647576] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.647608] kasan_check_range+0x10c/0x1c0 [ 26.647631] __kasan_check_write+0x18/0x20 [ 26.647666] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.647693] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.647720] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.647761] ? trace_hardirqs_on+0x37/0xe0 [ 26.647784] ? kasan_bitops_generic+0x92/0x1c0 [ 26.647809] kasan_bitops_generic+0x121/0x1c0 [ 26.647832] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.647856] ? __pfx_read_tsc+0x10/0x10 [ 26.647878] ? ktime_get_ts64+0x86/0x230 [ 26.647902] kunit_try_run_case+0x1a5/0x480 [ 26.647926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.647949] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.647974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.647998] ? __kthread_parkme+0x82/0x180 [ 26.648019] ? preempt_count_sub+0x50/0x80 [ 26.648043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.648064] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.648089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.648114] kthread+0x337/0x6f0 [ 26.648133] ? trace_preempt_on+0x20/0xc0 [ 26.648155] ? __pfx_kthread+0x10/0x10 [ 26.648176] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.648197] ? calculate_sigpending+0x7b/0xa0 [ 26.648220] ? __pfx_kthread+0x10/0x10 [ 26.648241] ret_from_fork+0x116/0x1d0 [ 26.648260] ? __pfx_kthread+0x10/0x10 [ 26.648280] ret_from_fork_asm+0x1a/0x30 [ 26.648311] </TASK> [ 26.648322] [ 26.658287] Allocated by task 310: [ 26.658692] kasan_save_stack+0x45/0x70 [ 26.659031] kasan_save_track+0x18/0x40 [ 26.659400] kasan_save_alloc_info+0x3b/0x50 [ 26.659728] __kasan_kmalloc+0xb7/0xc0 [ 26.660072] __kmalloc_cache_noprof+0x189/0x420 [ 26.660289] kasan_bitops_generic+0x92/0x1c0 [ 26.660476] kunit_try_run_case+0x1a5/0x480 [ 26.660652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.660840] kthread+0x337/0x6f0 [ 26.660960] ret_from_fork+0x116/0x1d0 [ 26.661152] ret_from_fork_asm+0x1a/0x30 [ 26.661347] [ 26.661436] The buggy address belongs to the object at ffff8881058422c0 [ 26.661436] which belongs to the cache kmalloc-16 of size 16 [ 26.662059] The buggy address is located 8 bytes inside of [ 26.662059] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.662520] [ 26.662606] The buggy address belongs to the physical page: [ 26.662848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.663150] flags: 0x200000000000000(node=0|zone=2) [ 26.663378] page_type: f5(slab) [ 26.663523] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.663901] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.664197] page dumped because: kasan: bad access detected [ 26.664361] [ 26.664422] Memory state around the buggy address: [ 26.664623] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.664944] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.665167] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.665370] ^ [ 26.665631] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.666126] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.666398] ================================================================== [ 26.621645] ================================================================== [ 26.622676] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.623067] Write of size 8 at addr ffff8881058422c8 by task kunit_try_catch/310 [ 26.623351] [ 26.623453] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.623509] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.623523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.623548] Call Trace: [ 26.623562] <TASK> [ 26.623582] dump_stack_lvl+0x73/0xb0 [ 26.623614] print_report+0xd1/0x610 [ 26.623637] ? __virt_addr_valid+0x1db/0x2d0 [ 26.623671] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.623697] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.623723] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.624001] kasan_report+0x141/0x180 [ 26.624027] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.624072] kasan_check_range+0x10c/0x1c0 [ 26.624096] __kasan_check_write+0x18/0x20 [ 26.624323] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.624352] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.624381] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.624406] ? trace_hardirqs_on+0x37/0xe0 [ 26.624429] ? kasan_bitops_generic+0x92/0x1c0 [ 26.624457] kasan_bitops_generic+0x121/0x1c0 [ 26.624480] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.624504] ? __pfx_read_tsc+0x10/0x10 [ 26.624526] ? ktime_get_ts64+0x86/0x230 [ 26.624551] kunit_try_run_case+0x1a5/0x480 [ 26.624575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.624596] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.624621] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.624645] ? __kthread_parkme+0x82/0x180 [ 26.624679] ? preempt_count_sub+0x50/0x80 [ 26.624702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.624723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.624759] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.624783] kthread+0x337/0x6f0 [ 26.624803] ? trace_preempt_on+0x20/0xc0 [ 26.624825] ? __pfx_kthread+0x10/0x10 [ 26.624846] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.624867] ? calculate_sigpending+0x7b/0xa0 [ 26.624891] ? __pfx_kthread+0x10/0x10 [ 26.624912] ret_from_fork+0x116/0x1d0 [ 26.624930] ? __pfx_kthread+0x10/0x10 [ 26.624951] ret_from_fork_asm+0x1a/0x30 [ 26.625010] </TASK> [ 26.625021] [ 26.635384] Allocated by task 310: [ 26.635630] kasan_save_stack+0x45/0x70 [ 26.635857] kasan_save_track+0x18/0x40 [ 26.636077] kasan_save_alloc_info+0x3b/0x50 [ 26.636382] __kasan_kmalloc+0xb7/0xc0 [ 26.636528] __kmalloc_cache_noprof+0x189/0x420 [ 26.636739] kasan_bitops_generic+0x92/0x1c0 [ 26.636931] kunit_try_run_case+0x1a5/0x480 [ 26.637115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.637355] kthread+0x337/0x6f0 [ 26.637467] ret_from_fork+0x116/0x1d0 [ 26.637677] ret_from_fork_asm+0x1a/0x30 [ 26.637882] [ 26.637944] The buggy address belongs to the object at ffff8881058422c0 [ 26.637944] which belongs to the cache kmalloc-16 of size 16 [ 26.638688] The buggy address is located 8 bytes inside of [ 26.638688] allocated 9-byte region [ffff8881058422c0, ffff8881058422c9) [ 26.639592] [ 26.639724] The buggy address belongs to the physical page: [ 26.640057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105842 [ 26.640377] flags: 0x200000000000000(node=0|zone=2) [ 26.640589] page_type: f5(slab) [ 26.640738] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.641044] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.641341] page dumped because: kasan: bad access detected [ 26.641559] [ 26.641628] Memory state around the buggy address: [ 26.642371] ffff888105842180: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.642750] ffff888105842200: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc [ 26.643095] >ffff888105842280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.643439] ^ [ 26.643624] ffff888105842300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.644110] ffff888105842380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.644492] ==================================================================