Date
July 25, 2025, 3:13 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.798630] ================================================================== [ 34.800106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 34.800163] Write of size 8 at addr fff00000c91b2888 by task kunit_try_catch/293 [ 34.801033] Call trace: [ 34.801668] kasan_report+0xdc/0x128 [ 34.802522] kunit_try_run_case+0x170/0x3f0 [ 34.803164] [ 34.803395] Allocated by task 293: [ 34.803612] kasan_save_track+0x20/0x40 [ 34.804270] kunit_try_run_case+0x170/0x3f0 [ 34.805494] [ 34.805671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b2 [ 34.806438] fff00000c91b2780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.809063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 34.809188] [ 34.809904] Call trace: [ 34.810867] __asan_report_load8_noabort+0x20/0x30 [ 34.813228] [ 34.813843] kasan_save_alloc_info+0x40/0x58 [ 34.815900] ret_from_fork+0x10/0x20 [ 34.817116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.821294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 34.821427] [ 34.822159] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 34.822731] dump_stack_lvl+0x8c/0xd0 [ 34.823283] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 34.824656] [ 34.825185] kasan_save_track+0x20/0x40 [ 34.826286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.827239] The buggy address is located 8 bytes inside of [ 34.827239] allocated 9-byte region [fff00000c91b2880, fff00000c91b2889) [ 34.829214] >fff00000c91b2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.849545] ok 64 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 34.856982] ==================================================================
[ 28.127435] ================================================================== [ 28.127730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 28.128602] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310 [ 28.129224] [ 28.129386] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 28.129431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.129442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.129463] Call Trace: [ 28.129479] <TASK> [ 28.129494] dump_stack_lvl+0x73/0xb0 [ 28.129520] print_report+0xd1/0x640 [ 28.129708] ? __virt_addr_valid+0x1db/0x2d0 [ 28.129734] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 28.129763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.129831] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 28.129862] kasan_report+0x141/0x180 [ 28.129886] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 28.129919] kasan_check_range+0x10c/0x1c0 [ 28.129958] __kasan_check_write+0x18/0x20 [ 28.129983] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 28.130012] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.130041] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.130077] ? trace_hardirqs_on+0x37/0xe0 [ 28.130101] ? kasan_bitops_generic+0x92/0x1c0 [ 28.130129] kasan_bitops_generic+0x121/0x1c0 [ 28.130153] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.130180] ? __pfx_read_tsc+0x10/0x10 [ 28.130203] ? ktime_get_ts64+0x86/0x230 [ 28.130229] kunit_try_run_case+0x1a5/0x480 [ 28.130254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.130279] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.130302] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.130330] ? __kthread_parkme+0x82/0x180 [ 28.130351] ? preempt_count_sub+0x50/0x80 [ 28.130376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.130402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.130427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.130452] kthread+0x337/0x6f0 [ 28.130473] ? trace_preempt_on+0x20/0xc0 [ 28.130497] ? __pfx_kthread+0x10/0x10 [ 28.130519] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.130544] ? calculate_sigpending+0x7b/0xa0 [ 28.130569] ? __pfx_kthread+0x10/0x10 [ 28.130592] ret_from_fork+0x116/0x1d0 [ 28.130612] ? __pfx_kthread+0x10/0x10 [ 28.130634] ret_from_fork_asm+0x1a/0x30 [ 28.130667] </TASK> [ 28.130678] [ 28.146017] Allocated by task 310: [ 28.146393] kasan_save_stack+0x45/0x70 [ 28.146881] kasan_save_track+0x18/0x40 [ 28.147375] kasan_save_alloc_info+0x3b/0x50 [ 28.147751] __kasan_kmalloc+0xb7/0xc0 [ 28.148149] __kmalloc_cache_noprof+0x189/0x420 [ 28.148349] kasan_bitops_generic+0x92/0x1c0 [ 28.148493] kunit_try_run_case+0x1a5/0x480 [ 28.148635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.148982] kthread+0x337/0x6f0 [ 28.149182] ret_from_fork+0x116/0x1d0 [ 28.149356] ret_from_fork_asm+0x1a/0x30 [ 28.149555] [ 28.149654] The buggy address belongs to the object at ffff8881057d7680 [ 28.149654] which belongs to the cache kmalloc-16 of size 16 [ 28.150251] The buggy address is located 8 bytes inside of [ 28.150251] allocated 9-byte region [ffff8881057d7680, ffff8881057d7689) [ 28.151066] [ 28.151169] The buggy address belongs to the physical page: [ 28.151416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7 [ 28.151721] flags: 0x200000000000000(node=0|zone=2) [ 28.152010] page_type: f5(slab) [ 28.152273] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.152549] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.152992] page dumped because: kasan: bad access detected [ 28.153240] [ 28.153336] Memory state around the buggy address: [ 28.153509] ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.153830] ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.154287] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.154570] ^ [ 28.154748] ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.155078] ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.155472] ================================================================== [ 28.156239] ================================================================== [ 28.156572] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 28.157274] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310 [ 28.157615] [ 28.157721] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 28.157769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.157789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.157810] Call Trace: [ 28.157822] <TASK> [ 28.157837] dump_stack_lvl+0x73/0xb0 [ 28.157865] print_report+0xd1/0x640 [ 28.157888] ? __virt_addr_valid+0x1db/0x2d0 [ 28.157912] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 28.157939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.157979] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 28.158008] kasan_report+0x141/0x180 [ 28.158030] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 28.158064] kasan_check_range+0x10c/0x1c0 [ 28.158110] __kasan_check_write+0x18/0x20 [ 28.158135] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 28.158164] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.158211] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.158236] ? trace_hardirqs_on+0x37/0xe0 [ 28.158258] ? kasan_bitops_generic+0x92/0x1c0 [ 28.158287] kasan_bitops_generic+0x121/0x1c0 [ 28.158312] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.158337] ? __pfx_read_tsc+0x10/0x10 [ 28.158375] ? ktime_get_ts64+0x86/0x230 [ 28.158400] kunit_try_run_case+0x1a5/0x480 [ 28.158427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.158450] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.158473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.158500] ? __kthread_parkme+0x82/0x180 [ 28.158521] ? preempt_count_sub+0x50/0x80 [ 28.158545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.158570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.158595] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.158619] kthread+0x337/0x6f0 [ 28.158658] ? trace_preempt_on+0x20/0xc0 [ 28.158682] ? __pfx_kthread+0x10/0x10 [ 28.158703] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.158728] ? calculate_sigpending+0x7b/0xa0 [ 28.158753] ? __pfx_kthread+0x10/0x10 [ 28.158775] ret_from_fork+0x116/0x1d0 [ 28.158796] ? __pfx_kthread+0x10/0x10 [ 28.158833] ret_from_fork_asm+0x1a/0x30 [ 28.158865] </TASK> [ 28.158876] [ 28.167346] Allocated by task 310: [ 28.167542] kasan_save_stack+0x45/0x70 [ 28.167759] kasan_save_track+0x18/0x40 [ 28.167985] kasan_save_alloc_info+0x3b/0x50 [ 28.168217] __kasan_kmalloc+0xb7/0xc0 [ 28.168421] __kmalloc_cache_noprof+0x189/0x420 [ 28.168596] kasan_bitops_generic+0x92/0x1c0 [ 28.168741] kunit_try_run_case+0x1a5/0x480 [ 28.168951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.169407] kthread+0x337/0x6f0 [ 28.169539] ret_from_fork+0x116/0x1d0 [ 28.169741] ret_from_fork_asm+0x1a/0x30 [ 28.169935] [ 28.170023] The buggy address belongs to the object at ffff8881057d7680 [ 28.170023] which belongs to the cache kmalloc-16 of size 16 [ 28.170535] The buggy address is located 8 bytes inside of [ 28.170535] allocated 9-byte region [ffff8881057d7680, ffff8881057d7689) [ 28.171010] [ 28.171144] The buggy address belongs to the physical page: [ 28.171363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7 [ 28.171706] flags: 0x200000000000000(node=0|zone=2) [ 28.171937] page_type: f5(slab) [ 28.172135] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.172445] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.172781] page dumped because: kasan: bad access detected [ 28.173019] [ 28.173130] Memory state around the buggy address: [ 28.173368] ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.173792] ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.174135] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.174411] ^ [ 28.174573] ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.174912] ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.175238] ================================================================== [ 28.272391] ================================================================== [ 28.272760] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.273389] Read of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310 [ 28.273710] [ 28.273906] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 28.273962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.273973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.273994] Call Trace: [ 28.274007] <TASK> [ 28.274021] dump_stack_lvl+0x73/0xb0 [ 28.274047] print_report+0xd1/0x640 [ 28.274078] ? __virt_addr_valid+0x1db/0x2d0 [ 28.274103] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.274130] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.274157] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.274186] kasan_report+0x141/0x180 [ 28.274220] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.274253] __asan_report_load8_noabort+0x18/0x20 [ 28.274289] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 28.274318] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.274347] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.274372] ? trace_hardirqs_on+0x37/0xe0 [ 28.274395] ? kasan_bitops_generic+0x92/0x1c0 [ 28.274424] kasan_bitops_generic+0x121/0x1c0 [ 28.274449] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.274475] ? __pfx_read_tsc+0x10/0x10 [ 28.274498] ? ktime_get_ts64+0x86/0x230 [ 28.274522] kunit_try_run_case+0x1a5/0x480 [ 28.274547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.274571] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.274593] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.274620] ? __kthread_parkme+0x82/0x180 [ 28.274641] ? preempt_count_sub+0x50/0x80 [ 28.274664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.274690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.274724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.274750] kthread+0x337/0x6f0 [ 28.274770] ? trace_preempt_on+0x20/0xc0 [ 28.274803] ? __pfx_kthread+0x10/0x10 [ 28.274825] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.274850] ? calculate_sigpending+0x7b/0xa0 [ 28.274874] ? __pfx_kthread+0x10/0x10 [ 28.274897] ret_from_fork+0x116/0x1d0 [ 28.274916] ? __pfx_kthread+0x10/0x10 [ 28.274938] ret_from_fork_asm+0x1a/0x30 [ 28.274979] </TASK> [ 28.274989] [ 28.283606] Allocated by task 310: [ 28.283778] kasan_save_stack+0x45/0x70 [ 28.283937] kasan_save_track+0x18/0x40 [ 28.284082] kasan_save_alloc_info+0x3b/0x50 [ 28.284230] __kasan_kmalloc+0xb7/0xc0 [ 28.284363] __kmalloc_cache_noprof+0x189/0x420 [ 28.284519] kasan_bitops_generic+0x92/0x1c0 [ 28.284669] kunit_try_run_case+0x1a5/0x480 [ 28.284817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.285003] kthread+0x337/0x6f0 [ 28.285128] ret_from_fork+0x116/0x1d0 [ 28.285271] ret_from_fork_asm+0x1a/0x30 [ 28.285464] [ 28.285552] The buggy address belongs to the object at ffff8881057d7680 [ 28.285552] which belongs to the cache kmalloc-16 of size 16 [ 28.286089] The buggy address is located 8 bytes inside of [ 28.286089] allocated 9-byte region [ffff8881057d7680, ffff8881057d7689) [ 28.286963] [ 28.287061] The buggy address belongs to the physical page: [ 28.287326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7 [ 28.287684] flags: 0x200000000000000(node=0|zone=2) [ 28.287921] page_type: f5(slab) [ 28.288064] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.288339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.288570] page dumped because: kasan: bad access detected [ 28.288744] [ 28.288808] Memory state around the buggy address: [ 28.288980] ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.289624] ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.289968] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.290593] ^ [ 28.290790] ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.291150] ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.291473] ================================================================== [ 28.253166] ================================================================== [ 28.253646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.254187] Read of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310 [ 28.254508] [ 28.254607] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 28.254654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.254665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.254686] Call Trace: [ 28.254709] <TASK> [ 28.254724] dump_stack_lvl+0x73/0xb0 [ 28.254751] print_report+0xd1/0x640 [ 28.254774] ? __virt_addr_valid+0x1db/0x2d0 [ 28.254810] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.254837] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.254864] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.254900] kasan_report+0x141/0x180 [ 28.254924] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.254973] kasan_check_range+0x10c/0x1c0 [ 28.255000] __kasan_check_read+0x15/0x20 [ 28.255024] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 28.255063] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.255094] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.255127] ? trace_hardirqs_on+0x37/0xe0 [ 28.255149] ? kasan_bitops_generic+0x92/0x1c0 [ 28.255178] kasan_bitops_generic+0x121/0x1c0 [ 28.255213] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.255238] ? __pfx_read_tsc+0x10/0x10 [ 28.255262] ? ktime_get_ts64+0x86/0x230 [ 28.255287] kunit_try_run_case+0x1a5/0x480 [ 28.255313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.255338] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.255361] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.255388] ? __kthread_parkme+0x82/0x180 [ 28.255409] ? preempt_count_sub+0x50/0x80 [ 28.255434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.255459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.255484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.255509] kthread+0x337/0x6f0 [ 28.255529] ? trace_preempt_on+0x20/0xc0 [ 28.255553] ? __pfx_kthread+0x10/0x10 [ 28.255575] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.255600] ? calculate_sigpending+0x7b/0xa0 [ 28.255624] ? __pfx_kthread+0x10/0x10 [ 28.255646] ret_from_fork+0x116/0x1d0 [ 28.255666] ? __pfx_kthread+0x10/0x10 [ 28.255688] ret_from_fork_asm+0x1a/0x30 [ 28.255730] </TASK> [ 28.255740] [ 28.264154] Allocated by task 310: [ 28.264347] kasan_save_stack+0x45/0x70 [ 28.264532] kasan_save_track+0x18/0x40 [ 28.264724] kasan_save_alloc_info+0x3b/0x50 [ 28.264931] __kasan_kmalloc+0xb7/0xc0 [ 28.265075] __kmalloc_cache_noprof+0x189/0x420 [ 28.265237] kasan_bitops_generic+0x92/0x1c0 [ 28.265401] kunit_try_run_case+0x1a5/0x480 [ 28.265628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.265882] kthread+0x337/0x6f0 [ 28.266058] ret_from_fork+0x116/0x1d0 [ 28.266272] ret_from_fork_asm+0x1a/0x30 [ 28.266411] [ 28.266476] The buggy address belongs to the object at ffff8881057d7680 [ 28.266476] which belongs to the cache kmalloc-16 of size 16 [ 28.267329] The buggy address is located 8 bytes inside of [ 28.267329] allocated 9-byte region [ffff8881057d7680, ffff8881057d7689) [ 28.267847] [ 28.267939] The buggy address belongs to the physical page: [ 28.268272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7 [ 28.268613] flags: 0x200000000000000(node=0|zone=2) [ 28.268826] page_type: f5(slab) [ 28.269020] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.269390] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.269715] page dumped because: kasan: bad access detected [ 28.269952] [ 28.270061] Memory state around the buggy address: [ 28.270280] ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.270598] ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.270916] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.271243] ^ [ 28.271415] ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.271709] ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.271966] ================================================================== [ 28.229446] ================================================================== [ 28.230147] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 28.231303] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310 [ 28.231966] [ 28.232136] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 28.232185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.232198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.232218] Call Trace: [ 28.232233] <TASK> [ 28.232250] dump_stack_lvl+0x73/0xb0 [ 28.232278] print_report+0xd1/0x640 [ 28.232302] ? __virt_addr_valid+0x1db/0x2d0 [ 28.232337] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 28.232365] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.232391] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 28.232431] kasan_report+0x141/0x180 [ 28.232453] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 28.232486] kasan_check_range+0x10c/0x1c0 [ 28.232510] __kasan_check_write+0x18/0x20 [ 28.232534] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 28.232562] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.232595] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.232620] ? trace_hardirqs_on+0x37/0xe0 [ 28.232653] ? kasan_bitops_generic+0x92/0x1c0 [ 28.232681] kasan_bitops_generic+0x121/0x1c0 [ 28.232705] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.232731] ? __pfx_read_tsc+0x10/0x10 [ 28.232753] ? ktime_get_ts64+0x86/0x230 [ 28.232777] kunit_try_run_case+0x1a5/0x480 [ 28.232801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.232825] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.232847] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.232874] ? __kthread_parkme+0x82/0x180 [ 28.232896] ? preempt_count_sub+0x50/0x80 [ 28.232920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.232955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.232980] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.233005] kthread+0x337/0x6f0 [ 28.233026] ? trace_preempt_on+0x20/0xc0 [ 28.233049] ? __pfx_kthread+0x10/0x10 [ 28.233080] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.233106] ? calculate_sigpending+0x7b/0xa0 [ 28.233136] ? __pfx_kthread+0x10/0x10 [ 28.233158] ret_from_fork+0x116/0x1d0 [ 28.233177] ? __pfx_kthread+0x10/0x10 [ 28.233199] ret_from_fork_asm+0x1a/0x30 [ 28.233231] </TASK> [ 28.233243] [ 28.245147] Allocated by task 310: [ 28.245302] kasan_save_stack+0x45/0x70 [ 28.245511] kasan_save_track+0x18/0x40 [ 28.245647] kasan_save_alloc_info+0x3b/0x50 [ 28.245797] __kasan_kmalloc+0xb7/0xc0 [ 28.245929] __kmalloc_cache_noprof+0x189/0x420 [ 28.246156] kasan_bitops_generic+0x92/0x1c0 [ 28.246361] kunit_try_run_case+0x1a5/0x480 [ 28.246572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.246823] kthread+0x337/0x6f0 [ 28.247028] ret_from_fork+0x116/0x1d0 [ 28.247222] ret_from_fork_asm+0x1a/0x30 [ 28.247363] [ 28.247451] The buggy address belongs to the object at ffff8881057d7680 [ 28.247451] which belongs to the cache kmalloc-16 of size 16 [ 28.247935] The buggy address is located 8 bytes inside of [ 28.247935] allocated 9-byte region [ffff8881057d7680, ffff8881057d7689) [ 28.248534] [ 28.248648] The buggy address belongs to the physical page: [ 28.248872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7 [ 28.249226] flags: 0x200000000000000(node=0|zone=2) [ 28.249476] page_type: f5(slab) [ 28.249616] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.249937] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.250404] page dumped because: kasan: bad access detected [ 28.250630] [ 28.250741] Memory state around the buggy address: [ 28.250935] ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.251274] ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.251581] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.251800] ^ [ 28.251940] ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.252285] ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.252631] ================================================================== [ 28.198998] ================================================================== [ 28.199605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 28.200569] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310 [ 28.201289] [ 28.201384] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 28.201433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.201446] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.201467] Call Trace: [ 28.201482] <TASK> [ 28.201497] dump_stack_lvl+0x73/0xb0 [ 28.201527] print_report+0xd1/0x640 [ 28.201549] ? __virt_addr_valid+0x1db/0x2d0 [ 28.201572] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 28.201600] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.201627] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 28.201655] kasan_report+0x141/0x180 [ 28.201678] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 28.201711] kasan_check_range+0x10c/0x1c0 [ 28.201734] __kasan_check_write+0x18/0x20 [ 28.201759] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 28.201787] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.201816] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.201840] ? trace_hardirqs_on+0x37/0xe0 [ 28.201862] ? kasan_bitops_generic+0x92/0x1c0 [ 28.201890] kasan_bitops_generic+0x121/0x1c0 [ 28.201914] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.201940] ? __pfx_read_tsc+0x10/0x10 [ 28.202193] ? ktime_get_ts64+0x86/0x230 [ 28.202236] kunit_try_run_case+0x1a5/0x480 [ 28.202262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.202318] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.202342] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.202369] ? __kthread_parkme+0x82/0x180 [ 28.202389] ? preempt_count_sub+0x50/0x80 [ 28.202414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.202439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.202464] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.202491] kthread+0x337/0x6f0 [ 28.202512] ? trace_preempt_on+0x20/0xc0 [ 28.202535] ? __pfx_kthread+0x10/0x10 [ 28.202556] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.202581] ? calculate_sigpending+0x7b/0xa0 [ 28.202606] ? __pfx_kthread+0x10/0x10 [ 28.202630] ret_from_fork+0x116/0x1d0 [ 28.202650] ? __pfx_kthread+0x10/0x10 [ 28.202672] ret_from_fork_asm+0x1a/0x30 [ 28.202704] </TASK> [ 28.202715] [ 28.217798] Allocated by task 310: [ 28.218178] kasan_save_stack+0x45/0x70 [ 28.218491] kasan_save_track+0x18/0x40 [ 28.218639] kasan_save_alloc_info+0x3b/0x50 [ 28.218896] __kasan_kmalloc+0xb7/0xc0 [ 28.219297] __kmalloc_cache_noprof+0x189/0x420 [ 28.219714] kasan_bitops_generic+0x92/0x1c0 [ 28.220031] kunit_try_run_case+0x1a5/0x480 [ 28.220365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.220545] kthread+0x337/0x6f0 [ 28.220664] ret_from_fork+0x116/0x1d0 [ 28.220796] ret_from_fork_asm+0x1a/0x30 [ 28.220934] [ 28.221132] The buggy address belongs to the object at ffff8881057d7680 [ 28.221132] which belongs to the cache kmalloc-16 of size 16 [ 28.222239] The buggy address is located 8 bytes inside of [ 28.222239] allocated 9-byte region [ffff8881057d7680, ffff8881057d7689) [ 28.223302] [ 28.223457] The buggy address belongs to the physical page: [ 28.223960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7 [ 28.224397] flags: 0x200000000000000(node=0|zone=2) [ 28.224565] page_type: f5(slab) [ 28.224686] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.224922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.225176] page dumped because: kasan: bad access detected [ 28.225352] [ 28.225418] Memory state around the buggy address: [ 28.225574] ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.225794] ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.226215] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.226825] ^ [ 28.227174] ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.227796] ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.228498] ================================================================== [ 28.067052] ================================================================== [ 28.067565] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 28.068022] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310 [ 28.068639] [ 28.068807] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 28.068854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.068866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.068926] Call Trace: [ 28.068941] <TASK> [ 28.068968] dump_stack_lvl+0x73/0xb0 [ 28.068997] print_report+0xd1/0x640 [ 28.069020] ? __virt_addr_valid+0x1db/0x2d0 [ 28.069044] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 28.069084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.069112] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 28.069145] kasan_report+0x141/0x180 [ 28.069168] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 28.069201] kasan_check_range+0x10c/0x1c0 [ 28.069226] __kasan_check_write+0x18/0x20 [ 28.069250] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 28.069279] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.069309] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.069334] ? trace_hardirqs_on+0x37/0xe0 [ 28.069355] ? kasan_bitops_generic+0x92/0x1c0 [ 28.069384] kasan_bitops_generic+0x121/0x1c0 [ 28.069409] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.069434] ? __pfx_read_tsc+0x10/0x10 [ 28.069456] ? ktime_get_ts64+0x86/0x230 [ 28.069482] kunit_try_run_case+0x1a5/0x480 [ 28.069508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.069532] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.069554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.069582] ? __kthread_parkme+0x82/0x180 [ 28.069603] ? preempt_count_sub+0x50/0x80 [ 28.069628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.069654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.069679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.069705] kthread+0x337/0x6f0 [ 28.069725] ? trace_preempt_on+0x20/0xc0 [ 28.069748] ? __pfx_kthread+0x10/0x10 [ 28.069770] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.069837] ? calculate_sigpending+0x7b/0xa0 [ 28.069863] ? __pfx_kthread+0x10/0x10 [ 28.069887] ret_from_fork+0x116/0x1d0 [ 28.069908] ? __pfx_kthread+0x10/0x10 [ 28.069930] ret_from_fork_asm+0x1a/0x30 [ 28.069972] </TASK> [ 28.069984] [ 28.083711] Allocated by task 310: [ 28.084107] kasan_save_stack+0x45/0x70 [ 28.084475] kasan_save_track+0x18/0x40 [ 28.084632] kasan_save_alloc_info+0x3b/0x50 [ 28.084819] __kasan_kmalloc+0xb7/0xc0 [ 28.085179] __kmalloc_cache_noprof+0x189/0x420 [ 28.085596] kasan_bitops_generic+0x92/0x1c0 [ 28.086026] kunit_try_run_case+0x1a5/0x480 [ 28.086455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.086670] kthread+0x337/0x6f0 [ 28.086808] ret_from_fork+0x116/0x1d0 [ 28.087383] ret_from_fork_asm+0x1a/0x30 [ 28.087747] [ 28.087928] The buggy address belongs to the object at ffff8881057d7680 [ 28.087928] which belongs to the cache kmalloc-16 of size 16 [ 28.088894] The buggy address is located 8 bytes inside of [ 28.088894] allocated 9-byte region [ffff8881057d7680, ffff8881057d7689) [ 28.090116] [ 28.090317] The buggy address belongs to the physical page: [ 28.090499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7 [ 28.090745] flags: 0x200000000000000(node=0|zone=2) [ 28.090910] page_type: f5(slab) [ 28.091213] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.091967] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.092787] page dumped because: kasan: bad access detected [ 28.093417] [ 28.093579] Memory state around the buggy address: [ 28.094254] ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.094889] ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.095341] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.095567] ^ [ 28.095692] ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.096020] ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.096492] ================================================================== [ 28.176547] ================================================================== [ 28.177113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 28.177536] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310 [ 28.177861] [ 28.177952] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 28.178001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.178032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.178064] Call Trace: [ 28.178078] <TASK> [ 28.178092] dump_stack_lvl+0x73/0xb0 [ 28.178120] print_report+0xd1/0x640 [ 28.178143] ? __virt_addr_valid+0x1db/0x2d0 [ 28.178185] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 28.178213] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.178240] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 28.178269] kasan_report+0x141/0x180 [ 28.178292] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 28.178345] kasan_check_range+0x10c/0x1c0 [ 28.178371] __kasan_check_write+0x18/0x20 [ 28.178396] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 28.178425] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.178454] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.178479] ? trace_hardirqs_on+0x37/0xe0 [ 28.178518] ? kasan_bitops_generic+0x92/0x1c0 [ 28.178547] kasan_bitops_generic+0x121/0x1c0 [ 28.178572] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.178598] ? __pfx_read_tsc+0x10/0x10 [ 28.178622] ? ktime_get_ts64+0x86/0x230 [ 28.178647] kunit_try_run_case+0x1a5/0x480 [ 28.178674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.178698] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.178721] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.178749] ? __kthread_parkme+0x82/0x180 [ 28.178769] ? preempt_count_sub+0x50/0x80 [ 28.178793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.178837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.178861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.178887] kthread+0x337/0x6f0 [ 28.178907] ? trace_preempt_on+0x20/0xc0 [ 28.178931] ? __pfx_kthread+0x10/0x10 [ 28.178962] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.178988] ? calculate_sigpending+0x7b/0xa0 [ 28.179029] ? __pfx_kthread+0x10/0x10 [ 28.179061] ret_from_fork+0x116/0x1d0 [ 28.179082] ? __pfx_kthread+0x10/0x10 [ 28.179104] ret_from_fork_asm+0x1a/0x30 [ 28.179137] </TASK> [ 28.179148] [ 28.187236] Allocated by task 310: [ 28.187434] kasan_save_stack+0x45/0x70 [ 28.187630] kasan_save_track+0x18/0x40 [ 28.187817] kasan_save_alloc_info+0x3b/0x50 [ 28.188063] __kasan_kmalloc+0xb7/0xc0 [ 28.188250] __kmalloc_cache_noprof+0x189/0x420 [ 28.188469] kasan_bitops_generic+0x92/0x1c0 [ 28.188673] kunit_try_run_case+0x1a5/0x480 [ 28.188847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.189033] kthread+0x337/0x6f0 [ 28.189213] ret_from_fork+0x116/0x1d0 [ 28.189396] ret_from_fork_asm+0x1a/0x30 [ 28.189586] [ 28.189671] The buggy address belongs to the object at ffff8881057d7680 [ 28.189671] which belongs to the cache kmalloc-16 of size 16 [ 28.190391] The buggy address is located 8 bytes inside of [ 28.190391] allocated 9-byte region [ffff8881057d7680, ffff8881057d7689) [ 28.190878] [ 28.190979] The buggy address belongs to the physical page: [ 28.191220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7 [ 28.191560] flags: 0x200000000000000(node=0|zone=2) [ 28.191815] page_type: f5(slab) [ 28.191932] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.192293] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.192626] page dumped because: kasan: bad access detected [ 28.192871] [ 28.192979] Memory state around the buggy address: [ 28.193222] ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.193436] ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.193697] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.196036] ^ [ 28.196376] ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.196711] ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.197039] ================================================================== [ 28.097332] ================================================================== [ 28.097760] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 28.098521] Write of size 8 at addr ffff8881057d7688 by task kunit_try_catch/310 [ 28.099216] [ 28.099405] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250725 #1 PREEMPT(voluntary) [ 28.099455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.099468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.099489] Call Trace: [ 28.099504] <TASK> [ 28.099520] dump_stack_lvl+0x73/0xb0 [ 28.099547] print_report+0xd1/0x640 [ 28.099570] ? __virt_addr_valid+0x1db/0x2d0 [ 28.099595] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 28.099623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.099650] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 28.099678] kasan_report+0x141/0x180 [ 28.099702] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 28.099736] kasan_check_range+0x10c/0x1c0 [ 28.099761] __kasan_check_write+0x18/0x20 [ 28.099799] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 28.099828] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.099858] ? __kmalloc_cache_noprof+0x189/0x420 [ 28.099883] ? trace_hardirqs_on+0x37/0xe0 [ 28.099906] ? kasan_bitops_generic+0x92/0x1c0 [ 28.099935] kasan_bitops_generic+0x121/0x1c0 [ 28.099970] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.099996] ? __pfx_read_tsc+0x10/0x10 [ 28.100019] ? ktime_get_ts64+0x86/0x230 [ 28.100051] kunit_try_run_case+0x1a5/0x480 [ 28.100077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.100110] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.100133] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.100161] ? __kthread_parkme+0x82/0x180 [ 28.100182] ? preempt_count_sub+0x50/0x80 [ 28.100207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.100232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.100256] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.100282] kthread+0x337/0x6f0 [ 28.100303] ? trace_preempt_on+0x20/0xc0 [ 28.100325] ? __pfx_kthread+0x10/0x10 [ 28.100347] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.100372] ? calculate_sigpending+0x7b/0xa0 [ 28.100397] ? __pfx_kthread+0x10/0x10 [ 28.100420] ret_from_fork+0x116/0x1d0 [ 28.100440] ? __pfx_kthread+0x10/0x10 [ 28.100462] ret_from_fork_asm+0x1a/0x30 [ 28.100495] </TASK> [ 28.100507] [ 28.114565] Allocated by task 310: [ 28.114913] kasan_save_stack+0x45/0x70 [ 28.115188] kasan_save_track+0x18/0x40 [ 28.115545] kasan_save_alloc_info+0x3b/0x50 [ 28.116028] __kasan_kmalloc+0xb7/0xc0 [ 28.116278] __kmalloc_cache_noprof+0x189/0x420 [ 28.116436] kasan_bitops_generic+0x92/0x1c0 [ 28.116587] kunit_try_run_case+0x1a5/0x480 [ 28.116734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.117535] kthread+0x337/0x6f0 [ 28.117961] ret_from_fork+0x116/0x1d0 [ 28.118505] ret_from_fork_asm+0x1a/0x30 [ 28.118937] [ 28.119207] The buggy address belongs to the object at ffff8881057d7680 [ 28.119207] which belongs to the cache kmalloc-16 of size 16 [ 28.120515] The buggy address is located 8 bytes inside of [ 28.120515] allocated 9-byte region [ffff8881057d7680, ffff8881057d7689) [ 28.121397] [ 28.121470] The buggy address belongs to the physical page: [ 28.121651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057d7 [ 28.122178] flags: 0x200000000000000(node=0|zone=2) [ 28.122630] page_type: f5(slab) [ 28.123087] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.123762] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.124496] page dumped because: kasan: bad access detected [ 28.125063] [ 28.125140] Memory state around the buggy address: [ 28.125300] ffff8881057d7580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.125520] ffff8881057d7600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.125739] >ffff8881057d7680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.125975] ^ [ 28.126169] ffff8881057d7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.126539] ffff8881057d7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.126961] ==================================================================