Date
July 15, 2025, 11:35 a.m.
Environment | |
---|---|
e850-96 | |
qemu-x86_64 |
[ 61.391854] ================================================================== [ 61.398896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 61.407837] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 61.415127] [ 61.416609] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 61.416658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.416672] Hardware name: WinLink E850-96 board (DT) [ 61.416691] Call trace: [ 61.416702] show_stack+0x20/0x38 (C) [ 61.416735] dump_stack_lvl+0x8c/0xd0 [ 61.416766] print_report+0x118/0x5d0 [ 61.416793] kasan_report+0xdc/0x128 [ 61.416821] __asan_report_load8_noabort+0x20/0x30 [ 61.416853] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 61.416891] kasan_bitops_generic+0x11c/0x1c8 [ 61.416925] kunit_try_run_case+0x170/0x3f0 [ 61.416954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.416988] kthread+0x328/0x630 [ 61.417015] ret_from_fork+0x10/0x20 [ 61.417045] [ 61.486914] Allocated by task 342: [ 61.490300] kasan_save_stack+0x3c/0x68 [ 61.494119] kasan_save_track+0x20/0x40 [ 61.497938] kasan_save_alloc_info+0x40/0x58 [ 61.502192] __kasan_kmalloc+0xd4/0xd8 [ 61.505924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.510438] kasan_bitops_generic+0xa0/0x1c8 [ 61.514691] kunit_try_run_case+0x170/0x3f0 [ 61.518858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.524326] kthread+0x328/0x630 [ 61.527538] ret_from_fork+0x10/0x20 [ 61.531098] [ 61.532573] The buggy address belongs to the object at ffff000806093fe0 [ 61.532573] which belongs to the cache kmalloc-16 of size 16 [ 61.544899] The buggy address is located 8 bytes inside of [ 61.544899] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 61.557138] [ 61.558616] The buggy address belongs to the physical page: [ 61.564171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 61.572157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.578666] page_type: f5(slab) [ 61.581798] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.589523] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.597242] page dumped because: kasan: bad access detected [ 61.602798] [ 61.604273] Memory state around the buggy address: [ 61.609052] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.616256] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.623461] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 61.630662] ^ [ 61.637263] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.644467] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 61.651668] ================================================================== [ 62.196825] ================================================================== [ 62.203920] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 62.212860] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 62.220236] [ 62.221717] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 62.221765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.221781] Hardware name: WinLink E850-96 board (DT) [ 62.221800] Call trace: [ 62.221813] show_stack+0x20/0x38 (C) [ 62.221844] dump_stack_lvl+0x8c/0xd0 [ 62.221875] print_report+0x118/0x5d0 [ 62.221905] kasan_report+0xdc/0x128 [ 62.221933] kasan_check_range+0x100/0x1a8 [ 62.221962] __kasan_check_write+0x20/0x30 [ 62.221993] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 62.222033] kasan_bitops_generic+0x11c/0x1c8 [ 62.222068] kunit_try_run_case+0x170/0x3f0 [ 62.222095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.222129] kthread+0x328/0x630 [ 62.222156] ret_from_fork+0x10/0x20 [ 62.222188] [ 62.295409] Allocated by task 342: [ 62.298794] kasan_save_stack+0x3c/0x68 [ 62.302614] kasan_save_track+0x20/0x40 [ 62.306433] kasan_save_alloc_info+0x40/0x58 [ 62.310686] __kasan_kmalloc+0xd4/0xd8 [ 62.314419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.318933] kasan_bitops_generic+0xa0/0x1c8 [ 62.323186] kunit_try_run_case+0x170/0x3f0 [ 62.327353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.332821] kthread+0x328/0x630 [ 62.336033] ret_from_fork+0x10/0x20 [ 62.339592] [ 62.341068] The buggy address belongs to the object at ffff000806093fe0 [ 62.341068] which belongs to the cache kmalloc-16 of size 16 [ 62.353394] The buggy address is located 8 bytes inside of [ 62.353394] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 62.365633] [ 62.367112] The buggy address belongs to the physical page: [ 62.372667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 62.380651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.387161] page_type: f5(slab) [ 62.390294] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.398018] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.405737] page dumped because: kasan: bad access detected [ 62.411292] [ 62.412768] Memory state around the buggy address: [ 62.417546] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.424751] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.431955] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 62.439157] ^ [ 62.445757] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.452962] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 62.460163] ================================================================== [ 62.734692] ================================================================== [ 62.741757] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 62.750699] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 62.758075] [ 62.759560] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 62.759608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.759626] Hardware name: WinLink E850-96 board (DT) [ 62.759642] Call trace: [ 62.759655] show_stack+0x20/0x38 (C) [ 62.759686] dump_stack_lvl+0x8c/0xd0 [ 62.759718] print_report+0x118/0x5d0 [ 62.759745] kasan_report+0xdc/0x128 [ 62.759771] kasan_check_range+0x100/0x1a8 [ 62.759799] __kasan_check_write+0x20/0x30 [ 62.759830] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 62.759868] kasan_bitops_generic+0x11c/0x1c8 [ 62.759903] kunit_try_run_case+0x170/0x3f0 [ 62.759933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.759965] kthread+0x328/0x630 [ 62.759991] ret_from_fork+0x10/0x20 [ 62.760022] [ 62.833248] Allocated by task 342: [ 62.836634] kasan_save_stack+0x3c/0x68 [ 62.840453] kasan_save_track+0x20/0x40 [ 62.844272] kasan_save_alloc_info+0x40/0x58 [ 62.848525] __kasan_kmalloc+0xd4/0xd8 [ 62.852258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.856772] kasan_bitops_generic+0xa0/0x1c8 [ 62.861025] kunit_try_run_case+0x170/0x3f0 [ 62.865192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.870661] kthread+0x328/0x630 [ 62.873872] ret_from_fork+0x10/0x20 [ 62.877431] [ 62.878907] The buggy address belongs to the object at ffff000806093fe0 [ 62.878907] which belongs to the cache kmalloc-16 of size 16 [ 62.891233] The buggy address is located 8 bytes inside of [ 62.891233] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 62.903472] [ 62.904950] The buggy address belongs to the physical page: [ 62.910507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 62.918490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.925000] page_type: f5(slab) [ 62.928134] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.935857] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.943576] page dumped because: kasan: bad access detected [ 62.949131] [ 62.950607] Memory state around the buggy address: [ 62.955386] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.962590] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.969795] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 62.976996] ^ [ 62.983596] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.990801] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 62.998002] ================================================================== [ 63.005373] ================================================================== [ 63.012413] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 63.021353] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 63.028644] [ 63.030126] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 63.030175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.030190] Hardware name: WinLink E850-96 board (DT) [ 63.030207] Call trace: [ 63.030221] show_stack+0x20/0x38 (C) [ 63.030253] dump_stack_lvl+0x8c/0xd0 [ 63.030285] print_report+0x118/0x5d0 [ 63.030315] kasan_report+0xdc/0x128 [ 63.030343] __asan_report_load8_noabort+0x20/0x30 [ 63.030377] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 63.030415] kasan_bitops_generic+0x11c/0x1c8 [ 63.030448] kunit_try_run_case+0x170/0x3f0 [ 63.030478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.030512] kthread+0x328/0x630 [ 63.030537] ret_from_fork+0x10/0x20 [ 63.030566] [ 63.100431] Allocated by task 342: [ 63.103817] kasan_save_stack+0x3c/0x68 [ 63.107636] kasan_save_track+0x20/0x40 [ 63.111455] kasan_save_alloc_info+0x40/0x58 [ 63.115709] __kasan_kmalloc+0xd4/0xd8 [ 63.119442] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.123955] kasan_bitops_generic+0xa0/0x1c8 [ 63.128209] kunit_try_run_case+0x170/0x3f0 [ 63.132375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.137844] kthread+0x328/0x630 [ 63.141056] ret_from_fork+0x10/0x20 [ 63.144614] [ 63.146090] The buggy address belongs to the object at ffff000806093fe0 [ 63.146090] which belongs to the cache kmalloc-16 of size 16 [ 63.158417] The buggy address is located 8 bytes inside of [ 63.158417] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 63.170656] [ 63.172133] The buggy address belongs to the physical page: [ 63.177689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 63.185673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.192183] page_type: f5(slab) [ 63.195317] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 63.203041] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 63.210760] page dumped because: kasan: bad access detected [ 63.216315] [ 63.217791] Memory state around the buggy address: [ 63.222570] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 63.229773] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 63.236978] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 63.244179] ^ [ 63.250780] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.257985] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 63.265186] ================================================================== [ 63.272531] ================================================================== [ 63.279597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 63.288536] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 63.295828] [ 63.297308] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 63.297358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.297375] Hardware name: WinLink E850-96 board (DT) [ 63.297394] Call trace: [ 63.297406] show_stack+0x20/0x38 (C) [ 63.297437] dump_stack_lvl+0x8c/0xd0 [ 63.297470] print_report+0x118/0x5d0 [ 63.297497] kasan_report+0xdc/0x128 [ 63.297524] __asan_report_load8_noabort+0x20/0x30 [ 63.297555] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 63.297594] kasan_bitops_generic+0x11c/0x1c8 [ 63.297628] kunit_try_run_case+0x170/0x3f0 [ 63.297657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.297689] kthread+0x328/0x630 [ 63.297716] ret_from_fork+0x10/0x20 [ 63.297746] [ 63.367614] Allocated by task 342: [ 63.371000] kasan_save_stack+0x3c/0x68 [ 63.374819] kasan_save_track+0x20/0x40 [ 63.378639] kasan_save_alloc_info+0x40/0x58 [ 63.382892] __kasan_kmalloc+0xd4/0xd8 [ 63.386625] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.391139] kasan_bitops_generic+0xa0/0x1c8 [ 63.395392] kunit_try_run_case+0x170/0x3f0 [ 63.399559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.405027] kthread+0x328/0x630 [ 63.408239] ret_from_fork+0x10/0x20 [ 63.411798] [ 63.413274] The buggy address belongs to the object at ffff000806093fe0 [ 63.413274] which belongs to the cache kmalloc-16 of size 16 [ 63.425600] The buggy address is located 8 bytes inside of [ 63.425600] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 63.437839] [ 63.439317] The buggy address belongs to the physical page: [ 63.444873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 63.452857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.459367] page_type: f5(slab) [ 63.462500] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 63.470224] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 63.477943] page dumped because: kasan: bad access detected [ 63.483499] [ 63.484974] Memory state around the buggy address: [ 63.489752] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 63.496957] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 63.504162] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 63.511362] ^ [ 63.517963] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.525168] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 63.532369] ================================================================== [ 61.929693] ================================================================== [ 61.936735] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 61.945675] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 61.952966] [ 61.954447] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 61.954495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.954512] Hardware name: WinLink E850-96 board (DT) [ 61.954529] Call trace: [ 61.954541] show_stack+0x20/0x38 (C) [ 61.954572] dump_stack_lvl+0x8c/0xd0 [ 61.954604] print_report+0x118/0x5d0 [ 61.954632] kasan_report+0xdc/0x128 [ 61.954658] __asan_report_load8_noabort+0x20/0x30 [ 61.954692] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 61.954730] kasan_bitops_generic+0x11c/0x1c8 [ 61.954763] kunit_try_run_case+0x170/0x3f0 [ 61.954792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.954824] kthread+0x328/0x630 [ 61.954851] ret_from_fork+0x10/0x20 [ 61.954884] [ 62.024753] Allocated by task 342: [ 62.028139] kasan_save_stack+0x3c/0x68 [ 62.031958] kasan_save_track+0x20/0x40 [ 62.035777] kasan_save_alloc_info+0x40/0x58 [ 62.040031] __kasan_kmalloc+0xd4/0xd8 [ 62.043763] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.048277] kasan_bitops_generic+0xa0/0x1c8 [ 62.052531] kunit_try_run_case+0x170/0x3f0 [ 62.056697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.062166] kthread+0x328/0x630 [ 62.065377] ret_from_fork+0x10/0x20 [ 62.068936] [ 62.070412] The buggy address belongs to the object at ffff000806093fe0 [ 62.070412] which belongs to the cache kmalloc-16 of size 16 [ 62.082738] The buggy address is located 8 bytes inside of [ 62.082738] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 62.094977] [ 62.096455] The buggy address belongs to the physical page: [ 62.102011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 62.109995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.116505] page_type: f5(slab) [ 62.119638] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.127363] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.135081] page dumped because: kasan: bad access detected [ 62.140637] [ 62.142112] Memory state around the buggy address: [ 62.146892] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.154095] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.161300] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 62.168501] ^ [ 62.175102] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.182307] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 62.189508] ================================================================== [ 62.467535] ================================================================== [ 62.474574] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 62.483515] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 62.490805] [ 62.492288] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 62.492334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.492352] Hardware name: WinLink E850-96 board (DT) [ 62.492370] Call trace: [ 62.492382] show_stack+0x20/0x38 (C) [ 62.492413] dump_stack_lvl+0x8c/0xd0 [ 62.492446] print_report+0x118/0x5d0 [ 62.492473] kasan_report+0xdc/0x128 [ 62.492501] __asan_report_load8_noabort+0x20/0x30 [ 62.492532] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 62.492570] kasan_bitops_generic+0x11c/0x1c8 [ 62.492605] kunit_try_run_case+0x170/0x3f0 [ 62.492632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.492667] kthread+0x328/0x630 [ 62.492693] ret_from_fork+0x10/0x20 [ 62.492726] [ 62.562592] Allocated by task 342: [ 62.565978] kasan_save_stack+0x3c/0x68 [ 62.569797] kasan_save_track+0x20/0x40 [ 62.573616] kasan_save_alloc_info+0x40/0x58 [ 62.577870] __kasan_kmalloc+0xd4/0xd8 [ 62.581602] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.586116] kasan_bitops_generic+0xa0/0x1c8 [ 62.590369] kunit_try_run_case+0x170/0x3f0 [ 62.594537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.600005] kthread+0x328/0x630 [ 62.603217] ret_from_fork+0x10/0x20 [ 62.606775] [ 62.608251] The buggy address belongs to the object at ffff000806093fe0 [ 62.608251] which belongs to the cache kmalloc-16 of size 16 [ 62.620578] The buggy address is located 8 bytes inside of [ 62.620578] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 62.632817] [ 62.634296] The buggy address belongs to the physical page: [ 62.639851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 62.647834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.654344] page_type: f5(slab) [ 62.657477] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.665202] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.672920] page dumped because: kasan: bad access detected [ 62.678476] [ 62.679951] Memory state around the buggy address: [ 62.684730] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.691934] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.699139] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 62.706340] ^ [ 62.712941] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.720145] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 62.727346] ================================================================== [ 61.659020] ================================================================== [ 61.666079] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 61.675020] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 61.682397] [ 61.683878] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 61.683924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.683940] Hardware name: WinLink E850-96 board (DT) [ 61.683958] Call trace: [ 61.683968] show_stack+0x20/0x38 (C) [ 61.683997] dump_stack_lvl+0x8c/0xd0 [ 61.684028] print_report+0x118/0x5d0 [ 61.684055] kasan_report+0xdc/0x128 [ 61.684082] kasan_check_range+0x100/0x1a8 [ 61.684110] __kasan_check_write+0x20/0x30 [ 61.684141] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 61.684180] kasan_bitops_generic+0x11c/0x1c8 [ 61.684213] kunit_try_run_case+0x170/0x3f0 [ 61.684243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.684277] kthread+0x328/0x630 [ 61.684302] ret_from_fork+0x10/0x20 [ 61.684332] [ 61.757569] Allocated by task 342: [ 61.760956] kasan_save_stack+0x3c/0x68 [ 61.764774] kasan_save_track+0x20/0x40 [ 61.768594] kasan_save_alloc_info+0x40/0x58 [ 61.772847] __kasan_kmalloc+0xd4/0xd8 [ 61.776580] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.781093] kasan_bitops_generic+0xa0/0x1c8 [ 61.785347] kunit_try_run_case+0x170/0x3f0 [ 61.789514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.794982] kthread+0x328/0x630 [ 61.798194] ret_from_fork+0x10/0x20 [ 61.801753] [ 61.803229] The buggy address belongs to the object at ffff000806093fe0 [ 61.803229] which belongs to the cache kmalloc-16 of size 16 [ 61.815555] The buggy address is located 8 bytes inside of [ 61.815555] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 61.827794] [ 61.829272] The buggy address belongs to the physical page: [ 61.834827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 61.842811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.849321] page_type: f5(slab) [ 61.852454] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.860179] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.867898] page dumped because: kasan: bad access detected [ 61.873453] [ 61.874929] Memory state around the buggy address: [ 61.879707] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.886911] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.894117] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 61.901317] ^ [ 61.907918] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.915123] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 61.922324] ================================================================== [ 61.121365] ================================================================== [ 61.128414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 61.137267] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 61.144645] [ 61.146126] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 61.146176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.146194] Hardware name: WinLink E850-96 board (DT) [ 61.146212] Call trace: [ 61.146223] show_stack+0x20/0x38 (C) [ 61.146257] dump_stack_lvl+0x8c/0xd0 [ 61.146291] print_report+0x118/0x5d0 [ 61.146320] kasan_report+0xdc/0x128 [ 61.146348] kasan_check_range+0x100/0x1a8 [ 61.146377] __kasan_check_write+0x20/0x30 [ 61.146408] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 61.146446] kasan_bitops_generic+0x11c/0x1c8 [ 61.146479] kunit_try_run_case+0x170/0x3f0 [ 61.146509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.146542] kthread+0x328/0x630 [ 61.146568] ret_from_fork+0x10/0x20 [ 61.146599] [ 61.219730] Allocated by task 342: [ 61.223116] kasan_save_stack+0x3c/0x68 [ 61.226935] kasan_save_track+0x20/0x40 [ 61.230755] kasan_save_alloc_info+0x40/0x58 [ 61.235008] __kasan_kmalloc+0xd4/0xd8 [ 61.238740] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.243254] kasan_bitops_generic+0xa0/0x1c8 [ 61.247508] kunit_try_run_case+0x170/0x3f0 [ 61.251674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.257143] kthread+0x328/0x630 [ 61.260355] ret_from_fork+0x10/0x20 [ 61.263914] [ 61.265389] The buggy address belongs to the object at ffff000806093fe0 [ 61.265389] which belongs to the cache kmalloc-16 of size 16 [ 61.277716] The buggy address is located 8 bytes inside of [ 61.277716] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 61.289955] [ 61.291432] The buggy address belongs to the physical page: [ 61.296989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 61.304973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.311482] page_type: f5(slab) [ 61.314615] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.322340] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.330058] page dumped because: kasan: bad access detected [ 61.335614] [ 61.337090] Memory state around the buggy address: [ 61.341868] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.349073] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.356277] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 61.363478] ^ [ 61.370079] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.377284] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 61.384485] ==================================================================
[ 26.373675] ================================================================== [ 26.373987] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.374367] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309 [ 26.374878] [ 26.375030] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.375102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.375117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.375142] Call Trace: [ 26.375156] <TASK> [ 26.375172] dump_stack_lvl+0x73/0xb0 [ 26.375204] print_report+0xd1/0x610 [ 26.375230] ? __virt_addr_valid+0x1db/0x2d0 [ 26.375258] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.375290] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.375321] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.375380] kasan_report+0x141/0x180 [ 26.375407] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.375470] kasan_check_range+0x10c/0x1c0 [ 26.375509] __kasan_check_write+0x18/0x20 [ 26.375546] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 26.375580] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.375614] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.375644] ? trace_hardirqs_on+0x37/0xe0 [ 26.375670] ? kasan_bitops_generic+0x92/0x1c0 [ 26.375704] kasan_bitops_generic+0x121/0x1c0 [ 26.375732] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.375940] ? __pfx_read_tsc+0x10/0x10 [ 26.375967] ? ktime_get_ts64+0x86/0x230 [ 26.375998] kunit_try_run_case+0x1a5/0x480 [ 26.376027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.376053] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.376081] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.376109] ? __kthread_parkme+0x82/0x180 [ 26.376134] ? preempt_count_sub+0x50/0x80 [ 26.376163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.376192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.376224] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.376256] kthread+0x337/0x6f0 [ 26.376280] ? trace_preempt_on+0x20/0xc0 [ 26.376308] ? __pfx_kthread+0x10/0x10 [ 26.376333] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.376363] ? calculate_sigpending+0x7b/0xa0 [ 26.376392] ? __pfx_kthread+0x10/0x10 [ 26.376418] ret_from_fork+0x116/0x1d0 [ 26.376442] ? __pfx_kthread+0x10/0x10 [ 26.376467] ret_from_fork_asm+0x1a/0x30 [ 26.376507] </TASK> [ 26.376521] [ 26.386126] Allocated by task 309: [ 26.386293] kasan_save_stack+0x45/0x70 [ 26.386728] kasan_save_track+0x18/0x40 [ 26.386959] kasan_save_alloc_info+0x3b/0x50 [ 26.387199] __kasan_kmalloc+0xb7/0xc0 [ 26.387416] __kmalloc_cache_noprof+0x189/0x420 [ 26.387760] kasan_bitops_generic+0x92/0x1c0 [ 26.387925] kunit_try_run_case+0x1a5/0x480 [ 26.388076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.388289] kthread+0x337/0x6f0 [ 26.388511] ret_from_fork+0x116/0x1d0 [ 26.388721] ret_from_fork_asm+0x1a/0x30 [ 26.388926] [ 26.389020] The buggy address belongs to the object at ffff888104884680 [ 26.389020] which belongs to the cache kmalloc-16 of size 16 [ 26.390019] The buggy address is located 8 bytes inside of [ 26.390019] allocated 9-byte region [ffff888104884680, ffff888104884689) [ 26.390562] [ 26.390687] The buggy address belongs to the physical page: [ 26.390957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884 [ 26.391423] flags: 0x200000000000000(node=0|zone=2) [ 26.391725] page_type: f5(slab) [ 26.391995] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.392499] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.392959] page dumped because: kasan: bad access detected [ 26.393235] [ 26.393314] Memory state around the buggy address: [ 26.393588] ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.393831] ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.394158] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.394439] ^ [ 26.394853] ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.395102] ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.395471] ================================================================== [ 26.328048] ================================================================== [ 26.328460] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.328967] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309 [ 26.329639] [ 26.329869] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.329942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.329957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.329983] Call Trace: [ 26.329999] <TASK> [ 26.330015] dump_stack_lvl+0x73/0xb0 [ 26.330050] print_report+0xd1/0x610 [ 26.330078] ? __virt_addr_valid+0x1db/0x2d0 [ 26.330137] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.330170] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.330214] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.330247] kasan_report+0x141/0x180 [ 26.330275] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.330315] kasan_check_range+0x10c/0x1c0 [ 26.330343] __kasan_check_write+0x18/0x20 [ 26.330372] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 26.330406] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.330440] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.330473] ? trace_hardirqs_on+0x37/0xe0 [ 26.330500] ? kasan_bitops_generic+0x92/0x1c0 [ 26.330543] kasan_bitops_generic+0x121/0x1c0 [ 26.330571] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.330620] ? __pfx_read_tsc+0x10/0x10 [ 26.330645] ? ktime_get_ts64+0x86/0x230 [ 26.330675] kunit_try_run_case+0x1a5/0x480 [ 26.330704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.330730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.330758] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.330786] ? __kthread_parkme+0x82/0x180 [ 26.330811] ? preempt_count_sub+0x50/0x80 [ 26.330841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.330869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.330901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.330934] kthread+0x337/0x6f0 [ 26.330957] ? trace_preempt_on+0x20/0xc0 [ 26.330985] ? __pfx_kthread+0x10/0x10 [ 26.331011] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.331040] ? calculate_sigpending+0x7b/0xa0 [ 26.331070] ? __pfx_kthread+0x10/0x10 [ 26.331097] ret_from_fork+0x116/0x1d0 [ 26.331119] ? __pfx_kthread+0x10/0x10 [ 26.331145] ret_from_fork_asm+0x1a/0x30 [ 26.331185] </TASK> [ 26.331198] [ 26.341404] Allocated by task 309: [ 26.341563] kasan_save_stack+0x45/0x70 [ 26.342031] kasan_save_track+0x18/0x40 [ 26.342241] kasan_save_alloc_info+0x3b/0x50 [ 26.342413] __kasan_kmalloc+0xb7/0xc0 [ 26.342600] __kmalloc_cache_noprof+0x189/0x420 [ 26.342857] kasan_bitops_generic+0x92/0x1c0 [ 26.343115] kunit_try_run_case+0x1a5/0x480 [ 26.343392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.343775] kthread+0x337/0x6f0 [ 26.343902] ret_from_fork+0x116/0x1d0 [ 26.344040] ret_from_fork_asm+0x1a/0x30 [ 26.344275] [ 26.344577] The buggy address belongs to the object at ffff888104884680 [ 26.344577] which belongs to the cache kmalloc-16 of size 16 [ 26.345129] The buggy address is located 8 bytes inside of [ 26.345129] allocated 9-byte region [ffff888104884680, ffff888104884689) [ 26.345694] [ 26.345801] The buggy address belongs to the physical page: [ 26.346047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884 [ 26.346297] flags: 0x200000000000000(node=0|zone=2) [ 26.346549] page_type: f5(slab) [ 26.346873] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.347252] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.347788] page dumped because: kasan: bad access detected [ 26.348082] [ 26.348156] Memory state around the buggy address: [ 26.348315] ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.348809] ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.349197] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.349634] ^ [ 26.349832] ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.350086] ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.350457] ================================================================== [ 26.503797] ================================================================== [ 26.504148] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.504517] Read of size 8 at addr ffff888104884688 by task kunit_try_catch/309 [ 26.504875] [ 26.504992] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.505047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.505063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.505088] Call Trace: [ 26.505107] <TASK> [ 26.505125] dump_stack_lvl+0x73/0xb0 [ 26.505155] print_report+0xd1/0x610 [ 26.505182] ? __virt_addr_valid+0x1db/0x2d0 [ 26.505209] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.505240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.505272] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.505305] kasan_report+0x141/0x180 [ 26.505332] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.505373] __asan_report_load8_noabort+0x18/0x20 [ 26.505402] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 26.505435] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.505470] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.505498] ? trace_hardirqs_on+0x37/0xe0 [ 26.506513] ? kasan_bitops_generic+0x92/0x1c0 [ 26.506654] kasan_bitops_generic+0x121/0x1c0 [ 26.506689] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.506721] ? __pfx_read_tsc+0x10/0x10 [ 26.506747] ? ktime_get_ts64+0x86/0x230 [ 26.506777] kunit_try_run_case+0x1a5/0x480 [ 26.506806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.506832] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.506860] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.506889] ? __kthread_parkme+0x82/0x180 [ 26.506914] ? preempt_count_sub+0x50/0x80 [ 26.506944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.506972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.507004] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.507037] kthread+0x337/0x6f0 [ 26.507060] ? trace_preempt_on+0x20/0xc0 [ 26.507088] ? __pfx_kthread+0x10/0x10 [ 26.507113] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.507143] ? calculate_sigpending+0x7b/0xa0 [ 26.507172] ? __pfx_kthread+0x10/0x10 [ 26.507198] ret_from_fork+0x116/0x1d0 [ 26.507221] ? __pfx_kthread+0x10/0x10 [ 26.507247] ret_from_fork_asm+0x1a/0x30 [ 26.507287] </TASK> [ 26.507302] [ 26.518970] Allocated by task 309: [ 26.519237] kasan_save_stack+0x45/0x70 [ 26.519421] kasan_save_track+0x18/0x40 [ 26.519712] kasan_save_alloc_info+0x3b/0x50 [ 26.519919] __kasan_kmalloc+0xb7/0xc0 [ 26.520084] __kmalloc_cache_noprof+0x189/0x420 [ 26.520316] kasan_bitops_generic+0x92/0x1c0 [ 26.520493] kunit_try_run_case+0x1a5/0x480 [ 26.520781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.520998] kthread+0x337/0x6f0 [ 26.521163] ret_from_fork+0x116/0x1d0 [ 26.521358] ret_from_fork_asm+0x1a/0x30 [ 26.521512] [ 26.521818] The buggy address belongs to the object at ffff888104884680 [ 26.521818] which belongs to the cache kmalloc-16 of size 16 [ 26.522318] The buggy address is located 8 bytes inside of [ 26.522318] allocated 9-byte region [ffff888104884680, ffff888104884689) [ 26.522900] [ 26.523003] The buggy address belongs to the physical page: [ 26.523224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884 [ 26.523652] flags: 0x200000000000000(node=0|zone=2) [ 26.523882] page_type: f5(slab) [ 26.524008] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.524360] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.524737] page dumped because: kasan: bad access detected [ 26.524966] [ 26.525057] Memory state around the buggy address: [ 26.525233] ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.525523] ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.526044] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.526352] ^ [ 26.526518] ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.526928] ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.527200] ================================================================== [ 26.482413] ================================================================== [ 26.483067] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.483474] Read of size 8 at addr ffff888104884688 by task kunit_try_catch/309 [ 26.483882] [ 26.483985] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.484039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.484054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.484079] Call Trace: [ 26.484095] <TASK> [ 26.484111] dump_stack_lvl+0x73/0xb0 [ 26.484144] print_report+0xd1/0x610 [ 26.484172] ? __virt_addr_valid+0x1db/0x2d0 [ 26.484200] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.484233] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.484265] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.484299] kasan_report+0x141/0x180 [ 26.484326] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.484366] kasan_check_range+0x10c/0x1c0 [ 26.484395] __kasan_check_read+0x15/0x20 [ 26.484422] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 26.484456] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.484492] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.484521] ? trace_hardirqs_on+0x37/0xe0 [ 26.484560] ? kasan_bitops_generic+0x92/0x1c0 [ 26.484642] kasan_bitops_generic+0x121/0x1c0 [ 26.484671] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.484702] ? __pfx_read_tsc+0x10/0x10 [ 26.484728] ? ktime_get_ts64+0x86/0x230 [ 26.484758] kunit_try_run_case+0x1a5/0x480 [ 26.484788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.484814] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.484843] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.484873] ? __kthread_parkme+0x82/0x180 [ 26.484899] ? preempt_count_sub+0x50/0x80 [ 26.484929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.484958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.484990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.485023] kthread+0x337/0x6f0 [ 26.485045] ? trace_preempt_on+0x20/0xc0 [ 26.485073] ? __pfx_kthread+0x10/0x10 [ 26.485099] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.485129] ? calculate_sigpending+0x7b/0xa0 [ 26.485159] ? __pfx_kthread+0x10/0x10 [ 26.485185] ret_from_fork+0x116/0x1d0 [ 26.485209] ? __pfx_kthread+0x10/0x10 [ 26.485235] ret_from_fork_asm+0x1a/0x30 [ 26.485276] </TASK> [ 26.485289] [ 26.493713] Allocated by task 309: [ 26.493905] kasan_save_stack+0x45/0x70 [ 26.494105] kasan_save_track+0x18/0x40 [ 26.494302] kasan_save_alloc_info+0x3b/0x50 [ 26.494535] __kasan_kmalloc+0xb7/0xc0 [ 26.494904] __kmalloc_cache_noprof+0x189/0x420 [ 26.495412] kasan_bitops_generic+0x92/0x1c0 [ 26.495816] kunit_try_run_case+0x1a5/0x480 [ 26.496014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.496245] kthread+0x337/0x6f0 [ 26.496403] ret_from_fork+0x116/0x1d0 [ 26.496556] ret_from_fork_asm+0x1a/0x30 [ 26.497025] [ 26.497121] The buggy address belongs to the object at ffff888104884680 [ 26.497121] which belongs to the cache kmalloc-16 of size 16 [ 26.497612] The buggy address is located 8 bytes inside of [ 26.497612] allocated 9-byte region [ffff888104884680, ffff888104884689) [ 26.498107] [ 26.498187] The buggy address belongs to the physical page: [ 26.498420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884 [ 26.498816] flags: 0x200000000000000(node=0|zone=2) [ 26.499018] page_type: f5(slab) [ 26.499143] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.499384] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.499838] page dumped because: kasan: bad access detected [ 26.500096] [ 26.500188] Memory state around the buggy address: [ 26.500357] ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.500757] ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.501097] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.501435] ^ [ 26.501651] ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.501982] ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.502315] ================================================================== [ 26.419858] ================================================================== [ 26.421962] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.422276] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309 [ 26.422706] [ 26.422806] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.422903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.422920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.422947] Call Trace: [ 26.423023] <TASK> [ 26.423044] dump_stack_lvl+0x73/0xb0 [ 26.423079] print_report+0xd1/0x610 [ 26.423116] ? __virt_addr_valid+0x1db/0x2d0 [ 26.423145] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.423178] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.423221] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.423254] kasan_report+0x141/0x180 [ 26.423281] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.423321] kasan_check_range+0x10c/0x1c0 [ 26.423350] __kasan_check_write+0x18/0x20 [ 26.423378] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 26.423411] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.423446] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.423473] ? trace_hardirqs_on+0x37/0xe0 [ 26.423500] ? kasan_bitops_generic+0x92/0x1c0 [ 26.423552] kasan_bitops_generic+0x121/0x1c0 [ 26.423579] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.423620] ? __pfx_read_tsc+0x10/0x10 [ 26.423648] ? ktime_get_ts64+0x86/0x230 [ 26.423677] kunit_try_run_case+0x1a5/0x480 [ 26.423724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.423806] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.423836] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.423864] ? __kthread_parkme+0x82/0x180 [ 26.424422] ? preempt_count_sub+0x50/0x80 [ 26.424455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.424484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.424517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.424896] kthread+0x337/0x6f0 [ 26.424923] ? trace_preempt_on+0x20/0xc0 [ 26.424953] ? __pfx_kthread+0x10/0x10 [ 26.424979] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.425011] ? calculate_sigpending+0x7b/0xa0 [ 26.425040] ? __pfx_kthread+0x10/0x10 [ 26.425067] ret_from_fork+0x116/0x1d0 [ 26.425091] ? __pfx_kthread+0x10/0x10 [ 26.425116] ret_from_fork_asm+0x1a/0x30 [ 26.425156] </TASK> [ 26.425171] [ 26.433933] Allocated by task 309: [ 26.434116] kasan_save_stack+0x45/0x70 [ 26.434320] kasan_save_track+0x18/0x40 [ 26.434733] kasan_save_alloc_info+0x3b/0x50 [ 26.434917] __kasan_kmalloc+0xb7/0xc0 [ 26.435057] __kmalloc_cache_noprof+0x189/0x420 [ 26.435218] kasan_bitops_generic+0x92/0x1c0 [ 26.435420] kunit_try_run_case+0x1a5/0x480 [ 26.435777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.436054] kthread+0x337/0x6f0 [ 26.436225] ret_from_fork+0x116/0x1d0 [ 26.436376] ret_from_fork_asm+0x1a/0x30 [ 26.436565] [ 26.436706] The buggy address belongs to the object at ffff888104884680 [ 26.436706] which belongs to the cache kmalloc-16 of size 16 [ 26.437177] The buggy address is located 8 bytes inside of [ 26.437177] allocated 9-byte region [ffff888104884680, ffff888104884689) [ 26.437777] [ 26.437869] The buggy address belongs to the physical page: [ 26.438061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884 [ 26.438312] flags: 0x200000000000000(node=0|zone=2) [ 26.438554] page_type: f5(slab) [ 26.438726] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.439255] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.439614] page dumped because: kasan: bad access detected [ 26.439825] [ 26.439895] Memory state around the buggy address: [ 26.440054] ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.440334] ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.440619] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.440892] ^ [ 26.441048] ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.441320] ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.442477] ================================================================== [ 26.443330] ================================================================== [ 26.443726] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.444111] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309 [ 26.444398] [ 26.444500] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.444567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.444582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.444607] Call Trace: [ 26.444622] <TASK> [ 26.444638] dump_stack_lvl+0x73/0xb0 [ 26.444670] print_report+0xd1/0x610 [ 26.444696] ? __virt_addr_valid+0x1db/0x2d0 [ 26.444724] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.444756] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.444788] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.444823] kasan_report+0x141/0x180 [ 26.444849] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.444956] kasan_check_range+0x10c/0x1c0 [ 26.444987] __kasan_check_write+0x18/0x20 [ 26.445016] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 26.445051] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.445086] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.445115] ? trace_hardirqs_on+0x37/0xe0 [ 26.445140] ? kasan_bitops_generic+0x92/0x1c0 [ 26.445175] kasan_bitops_generic+0x121/0x1c0 [ 26.445202] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.445234] ? __pfx_read_tsc+0x10/0x10 [ 26.445258] ? ktime_get_ts64+0x86/0x230 [ 26.445288] kunit_try_run_case+0x1a5/0x480 [ 26.445316] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.445342] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.445369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.445397] ? __kthread_parkme+0x82/0x180 [ 26.445422] ? preempt_count_sub+0x50/0x80 [ 26.445452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.445481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.445513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.445559] kthread+0x337/0x6f0 [ 26.445583] ? trace_preempt_on+0x20/0xc0 [ 26.445762] ? __pfx_kthread+0x10/0x10 [ 26.445789] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.445818] ? calculate_sigpending+0x7b/0xa0 [ 26.445848] ? __pfx_kthread+0x10/0x10 [ 26.445876] ret_from_fork+0x116/0x1d0 [ 26.445899] ? __pfx_kthread+0x10/0x10 [ 26.445925] ret_from_fork_asm+0x1a/0x30 [ 26.445966] </TASK> [ 26.445979] [ 26.454319] Allocated by task 309: [ 26.454458] kasan_save_stack+0x45/0x70 [ 26.454885] kasan_save_track+0x18/0x40 [ 26.455072] kasan_save_alloc_info+0x3b/0x50 [ 26.455262] __kasan_kmalloc+0xb7/0xc0 [ 26.455448] __kmalloc_cache_noprof+0x189/0x420 [ 26.455750] kasan_bitops_generic+0x92/0x1c0 [ 26.455973] kunit_try_run_case+0x1a5/0x480 [ 26.456175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.456412] kthread+0x337/0x6f0 [ 26.456548] ret_from_fork+0x116/0x1d0 [ 26.456686] ret_from_fork_asm+0x1a/0x30 [ 26.456828] [ 26.456901] The buggy address belongs to the object at ffff888104884680 [ 26.456901] which belongs to the cache kmalloc-16 of size 16 [ 26.457480] The buggy address is located 8 bytes inside of [ 26.457480] allocated 9-byte region [ffff888104884680, ffff888104884689) [ 26.457888] [ 26.457958] The buggy address belongs to the physical page: [ 26.458136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884 [ 26.458398] flags: 0x200000000000000(node=0|zone=2) [ 26.458731] page_type: f5(slab) [ 26.458904] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.459257] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.459609] page dumped because: kasan: bad access detected [ 26.459869] [ 26.460019] Memory state around the buggy address: [ 26.460253] ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.460697] ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.460970] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.461290] ^ [ 26.461456] ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.461957] ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.462185] ================================================================== [ 26.396076] ================================================================== [ 26.396426] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.396943] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309 [ 26.397265] [ 26.397434] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.397490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.397506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.397542] Call Trace: [ 26.397557] <TASK> [ 26.397574] dump_stack_lvl+0x73/0xb0 [ 26.397621] print_report+0xd1/0x610 [ 26.397647] ? __virt_addr_valid+0x1db/0x2d0 [ 26.397675] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.397803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.397837] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.397872] kasan_report+0x141/0x180 [ 26.397899] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.397971] kasan_check_range+0x10c/0x1c0 [ 26.398001] __kasan_check_write+0x18/0x20 [ 26.398039] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 26.398074] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.398108] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.398137] ? trace_hardirqs_on+0x37/0xe0 [ 26.398163] ? kasan_bitops_generic+0x92/0x1c0 [ 26.398226] kasan_bitops_generic+0x121/0x1c0 [ 26.398256] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.398308] ? __pfx_read_tsc+0x10/0x10 [ 26.398334] ? ktime_get_ts64+0x86/0x230 [ 26.398363] kunit_try_run_case+0x1a5/0x480 [ 26.398392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.398418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.398446] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.398477] ? __kthread_parkme+0x82/0x180 [ 26.398502] ? preempt_count_sub+0x50/0x80 [ 26.398541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.398569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.398737] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.398771] kthread+0x337/0x6f0 [ 26.398795] ? trace_preempt_on+0x20/0xc0 [ 26.398824] ? __pfx_kthread+0x10/0x10 [ 26.398849] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.398878] ? calculate_sigpending+0x7b/0xa0 [ 26.398908] ? __pfx_kthread+0x10/0x10 [ 26.398935] ret_from_fork+0x116/0x1d0 [ 26.398959] ? __pfx_kthread+0x10/0x10 [ 26.398984] ret_from_fork_asm+0x1a/0x30 [ 26.399024] </TASK> [ 26.399038] [ 26.408652] Allocated by task 309: [ 26.408956] kasan_save_stack+0x45/0x70 [ 26.409275] kasan_save_track+0x18/0x40 [ 26.409456] kasan_save_alloc_info+0x3b/0x50 [ 26.409794] __kasan_kmalloc+0xb7/0xc0 [ 26.410057] __kmalloc_cache_noprof+0x189/0x420 [ 26.410222] kasan_bitops_generic+0x92/0x1c0 [ 26.410378] kunit_try_run_case+0x1a5/0x480 [ 26.410673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.410999] kthread+0x337/0x6f0 [ 26.411177] ret_from_fork+0x116/0x1d0 [ 26.411345] ret_from_fork_asm+0x1a/0x30 [ 26.411628] [ 26.411725] The buggy address belongs to the object at ffff888104884680 [ 26.411725] which belongs to the cache kmalloc-16 of size 16 [ 26.412487] The buggy address is located 8 bytes inside of [ 26.412487] allocated 9-byte region [ffff888104884680, ffff888104884689) [ 26.413019] [ 26.413093] The buggy address belongs to the physical page: [ 26.413477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884 [ 26.414115] flags: 0x200000000000000(node=0|zone=2) [ 26.414303] page_type: f5(slab) [ 26.414429] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.416401] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.416919] page dumped because: kasan: bad access detected [ 26.417198] [ 26.417299] Memory state around the buggy address: [ 26.417493] ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.417743] ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.417966] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.418322] ^ [ 26.418490] ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.418816] ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.419063] ================================================================== [ 26.351099] ================================================================== [ 26.351455] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.352061] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309 [ 26.352409] [ 26.352522] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.352591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.352606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.352630] Call Trace: [ 26.352649] <TASK> [ 26.352771] dump_stack_lvl+0x73/0xb0 [ 26.352837] print_report+0xd1/0x610 [ 26.352865] ? __virt_addr_valid+0x1db/0x2d0 [ 26.352902] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.352935] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.352966] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.352999] kasan_report+0x141/0x180 [ 26.353027] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.353068] kasan_check_range+0x10c/0x1c0 [ 26.353097] __kasan_check_write+0x18/0x20 [ 26.353125] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 26.353159] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.353225] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.353277] ? trace_hardirqs_on+0x37/0xe0 [ 26.353304] ? kasan_bitops_generic+0x92/0x1c0 [ 26.353339] kasan_bitops_generic+0x121/0x1c0 [ 26.353367] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.353398] ? __pfx_read_tsc+0x10/0x10 [ 26.353423] ? ktime_get_ts64+0x86/0x230 [ 26.353454] kunit_try_run_case+0x1a5/0x480 [ 26.353482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.353508] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.353544] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.353572] ? __kthread_parkme+0x82/0x180 [ 26.353638] ? preempt_count_sub+0x50/0x80 [ 26.353669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.353698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.353730] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.353763] kthread+0x337/0x6f0 [ 26.353785] ? trace_preempt_on+0x20/0xc0 [ 26.353814] ? __pfx_kthread+0x10/0x10 [ 26.353840] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.353869] ? calculate_sigpending+0x7b/0xa0 [ 26.353898] ? __pfx_kthread+0x10/0x10 [ 26.353925] ret_from_fork+0x116/0x1d0 [ 26.353948] ? __pfx_kthread+0x10/0x10 [ 26.353973] ret_from_fork_asm+0x1a/0x30 [ 26.354014] </TASK> [ 26.354027] [ 26.364086] Allocated by task 309: [ 26.364222] kasan_save_stack+0x45/0x70 [ 26.364427] kasan_save_track+0x18/0x40 [ 26.364864] kasan_save_alloc_info+0x3b/0x50 [ 26.365085] __kasan_kmalloc+0xb7/0xc0 [ 26.365346] __kmalloc_cache_noprof+0x189/0x420 [ 26.365513] kasan_bitops_generic+0x92/0x1c0 [ 26.365678] kunit_try_run_case+0x1a5/0x480 [ 26.365889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.366272] kthread+0x337/0x6f0 [ 26.366610] ret_from_fork+0x116/0x1d0 [ 26.366809] ret_from_fork_asm+0x1a/0x30 [ 26.367008] [ 26.367205] The buggy address belongs to the object at ffff888104884680 [ 26.367205] which belongs to the cache kmalloc-16 of size 16 [ 26.367772] The buggy address is located 8 bytes inside of [ 26.367772] allocated 9-byte region [ffff888104884680, ffff888104884689) [ 26.368278] [ 26.368425] The buggy address belongs to the physical page: [ 26.368623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884 [ 26.369182] flags: 0x200000000000000(node=0|zone=2) [ 26.369375] page_type: f5(slab) [ 26.369558] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.370106] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.370451] page dumped because: kasan: bad access detected [ 26.370865] [ 26.370959] Memory state around the buggy address: [ 26.371158] ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.371459] ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.371864] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.372182] ^ [ 26.372352] ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.372883] ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.373245] ================================================================== [ 26.462711] ================================================================== [ 26.463033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.463314] Write of size 8 at addr ffff888104884688 by task kunit_try_catch/309 [ 26.463735] [ 26.463852] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 26.463908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.463923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.463949] Call Trace: [ 26.463964] <TASK> [ 26.463980] dump_stack_lvl+0x73/0xb0 [ 26.464010] print_report+0xd1/0x610 [ 26.464037] ? __virt_addr_valid+0x1db/0x2d0 [ 26.464064] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.464097] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.464128] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.464162] kasan_report+0x141/0x180 [ 26.464189] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.464229] kasan_check_range+0x10c/0x1c0 [ 26.464257] __kasan_check_write+0x18/0x20 [ 26.464285] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 26.464320] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.464353] ? __kmalloc_cache_noprof+0x189/0x420 [ 26.464382] ? trace_hardirqs_on+0x37/0xe0 [ 26.464408] ? kasan_bitops_generic+0x92/0x1c0 [ 26.464442] kasan_bitops_generic+0x121/0x1c0 [ 26.464470] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.464502] ? __pfx_read_tsc+0x10/0x10 [ 26.464539] ? ktime_get_ts64+0x86/0x230 [ 26.464570] kunit_try_run_case+0x1a5/0x480 [ 26.464774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.464802] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.464830] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.464859] ? __kthread_parkme+0x82/0x180 [ 26.464884] ? preempt_count_sub+0x50/0x80 [ 26.464914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.464942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.464975] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.465008] kthread+0x337/0x6f0 [ 26.465031] ? trace_preempt_on+0x20/0xc0 [ 26.465059] ? __pfx_kthread+0x10/0x10 [ 26.465085] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.465114] ? calculate_sigpending+0x7b/0xa0 [ 26.465143] ? __pfx_kthread+0x10/0x10 [ 26.465170] ret_from_fork+0x116/0x1d0 [ 26.465192] ? __pfx_kthread+0x10/0x10 [ 26.465218] ret_from_fork_asm+0x1a/0x30 [ 26.465258] </TASK> [ 26.465271] [ 26.473839] Allocated by task 309: [ 26.474023] kasan_save_stack+0x45/0x70 [ 26.474229] kasan_save_track+0x18/0x40 [ 26.474424] kasan_save_alloc_info+0x3b/0x50 [ 26.474750] __kasan_kmalloc+0xb7/0xc0 [ 26.474905] __kmalloc_cache_noprof+0x189/0x420 [ 26.475131] kasan_bitops_generic+0x92/0x1c0 [ 26.475286] kunit_try_run_case+0x1a5/0x480 [ 26.475497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.475867] kthread+0x337/0x6f0 [ 26.476013] ret_from_fork+0x116/0x1d0 [ 26.476190] ret_from_fork_asm+0x1a/0x30 [ 26.476375] [ 26.476466] The buggy address belongs to the object at ffff888104884680 [ 26.476466] which belongs to the cache kmalloc-16 of size 16 [ 26.477008] The buggy address is located 8 bytes inside of [ 26.477008] allocated 9-byte region [ffff888104884680, ffff888104884689) [ 26.477509] [ 26.477887] The buggy address belongs to the physical page: [ 26.478124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104884 [ 26.478399] flags: 0x200000000000000(node=0|zone=2) [ 26.478742] page_type: f5(slab) [ 26.479027] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 26.479269] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.479502] page dumped because: kasan: bad access detected [ 26.479704] [ 26.479798] Memory state around the buggy address: [ 26.480073] ffff888104884580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.480405] ffff888104884600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.480738] >ffff888104884680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.481145] ^ [ 26.481323] ffff888104884700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.481604] ffff888104884780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.482066] ==================================================================