Hay
Date
June 17, 2025, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.320034] ==================================================================
[   19.320089] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   19.320503] 
[   19.320875] Call trace:
[   19.320898]  show_stack+0x20/0x38 (C)
[   19.321535]  kasan_report+0xdc/0x128
[   19.321709]  kasan_bitops_generic+0x110/0x1c8
[   19.322893] 
[   19.323093]  kasan_save_track+0x20/0x40
[   19.324250] The buggy address is located 8 bytes inside of
[   19.324250]  allocated 9-byte region [fff00000c1193720, fff00000c1193729)
[   19.325869]                                   ^
[   19.327363] ==================================================================

[   21.300791] ==================================================================
[   21.301480] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.302130] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.302678] 
[   21.302941] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.303063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.303099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.303157] Call Trace:
[   21.303200]  <TASK>
[   21.303289]  dump_stack_lvl+0x73/0xb0
[   21.303371]  print_report+0xd1/0x650
[   21.303444]  ? __virt_addr_valid+0x1db/0x2d0
[   21.303523]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.303612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.303688]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.303769]  kasan_report+0x141/0x180
[   21.303859]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.303953]  kasan_check_range+0x10c/0x1c0
[   21.304022]  __kasan_check_write+0x18/0x20
[   21.304076]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.304149]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.304262]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.304344]  ? trace_hardirqs_on+0x37/0xe0
[   21.304416]  ? kasan_bitops_generic+0x92/0x1c0
[   21.304504]  kasan_bitops_generic+0x116/0x1c0
[   21.304583]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.304662]  ? __pfx_read_tsc+0x10/0x10
[   21.304725]  ? ktime_get_ts64+0x86/0x230
[   21.304803]  kunit_try_run_case+0x1a5/0x480
[   21.304901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.304970]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.305036]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.305113]  ? __kthread_parkme+0x82/0x180
[   21.305180]  ? preempt_count_sub+0x50/0x80
[   21.305303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.305379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.305451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.305521]  kthread+0x337/0x6f0
[   21.305588]  ? trace_preempt_on+0x20/0xc0
[   21.305659]  ? __pfx_kthread+0x10/0x10
[   21.305727]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.305800]  ? calculate_sigpending+0x7b/0xa0
[   21.305887]  ? __pfx_kthread+0x10/0x10
[   21.305998]  ret_from_fork+0x116/0x1d0
[   21.306068]  ? __pfx_kthread+0x10/0x10
[   21.306140]  ret_from_fork_asm+0x1a/0x30
[   21.306276]  </TASK>
[   21.306317] 
[   21.319967] Allocated by task 288:
[   21.320358]  kasan_save_stack+0x45/0x70
[   21.320738]  kasan_save_track+0x18/0x40
[   21.321129]  kasan_save_alloc_info+0x3b/0x50
[   21.321586]  __kasan_kmalloc+0xb7/0xc0
[   21.321975]  __kmalloc_cache_noprof+0x189/0x420
[   21.322438]  kasan_bitops_generic+0x92/0x1c0
[   21.322860]  kunit_try_run_case+0x1a5/0x480
[   21.323335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.323779]  kthread+0x337/0x6f0
[   21.324054]  ret_from_fork+0x116/0x1d0
[   21.324367]  ret_from_fork_asm+0x1a/0x30
[   21.324659] 
[   21.324821] The buggy address belongs to the object at ffff888102264580
[   21.324821]  which belongs to the cache kmalloc-16 of size 16
[   21.325774] The buggy address is located 8 bytes inside of
[   21.325774]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.326787] 
[   21.327012] The buggy address belongs to the physical page:
[   21.327467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.328002] flags: 0x200000000000000(node=0|zone=2)
[   21.328524] page_type: f5(slab)
[   21.328908] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.329611] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.330096] page dumped because: kasan: bad access detected
[   21.330483] 
[   21.330640] Memory state around the buggy address:
[   21.331047]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.331688]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.332938] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.334181]                       ^
[   21.335168]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.336612]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.337267] ==================================================================
[   21.178759] ==================================================================
[   21.179883] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.180626] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.182138] 
[   21.182744] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.182884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.182922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.182976] Call Trace:
[   21.183018]  <TASK>
[   21.183056]  dump_stack_lvl+0x73/0xb0
[   21.183128]  print_report+0xd1/0x650
[   21.183199]  ? __virt_addr_valid+0x1db/0x2d0
[   21.184172]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.184312]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.184387]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.184449]  kasan_report+0x141/0x180
[   21.184483]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.184527]  kasan_check_range+0x10c/0x1c0
[   21.184560]  __kasan_check_write+0x18/0x20
[   21.184589]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.184625]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.184664]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.184701]  ? trace_hardirqs_on+0x37/0xe0
[   21.184736]  ? kasan_bitops_generic+0x92/0x1c0
[   21.184776]  kasan_bitops_generic+0x116/0x1c0
[   21.184810]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.184911]  ? __pfx_read_tsc+0x10/0x10
[   21.184982]  ? ktime_get_ts64+0x86/0x230
[   21.185446]  kunit_try_run_case+0x1a5/0x480
[   21.185656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.185730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.185799]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.185900]  ? __kthread_parkme+0x82/0x180
[   21.185968]  ? preempt_count_sub+0x50/0x80
[   21.186093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.186253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.186364]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.186494]  kthread+0x337/0x6f0
[   21.186545]  ? trace_preempt_on+0x20/0xc0
[   21.186610]  ? __pfx_kthread+0x10/0x10
[   21.186642]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.186681]  ? calculate_sigpending+0x7b/0xa0
[   21.186716]  ? __pfx_kthread+0x10/0x10
[   21.186746]  ret_from_fork+0x116/0x1d0
[   21.186773]  ? __pfx_kthread+0x10/0x10
[   21.186804]  ret_from_fork_asm+0x1a/0x30
[   21.186867]  </TASK>
[   21.186883] 
[   21.201866] Allocated by task 288:
[   21.202275]  kasan_save_stack+0x45/0x70
[   21.202688]  kasan_save_track+0x18/0x40
[   21.203115]  kasan_save_alloc_info+0x3b/0x50
[   21.203597]  __kasan_kmalloc+0xb7/0xc0
[   21.204515]  __kmalloc_cache_noprof+0x189/0x420
[   21.204918]  kasan_bitops_generic+0x92/0x1c0
[   21.205325]  kunit_try_run_case+0x1a5/0x480
[   21.205762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.206712]  kthread+0x337/0x6f0
[   21.209274]  ret_from_fork+0x116/0x1d0
[   21.209518]  ret_from_fork_asm+0x1a/0x30
[   21.209748] 
[   21.209895] The buggy address belongs to the object at ffff888102264580
[   21.209895]  which belongs to the cache kmalloc-16 of size 16
[   21.210464] The buggy address is located 8 bytes inside of
[   21.210464]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.212269] 
[   21.212435] The buggy address belongs to the physical page:
[   21.215482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.216530] flags: 0x200000000000000(node=0|zone=2)
[   21.217050] page_type: f5(slab)
[   21.217428] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.217816] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.218282] page dumped because: kasan: bad access detected
[   21.218620] 
[   21.218799] Memory state around the buggy address:
[   21.219168]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.219636]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.220206] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.220746]                       ^
[   21.221030]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.221455]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.222821] ==================================================================
[   21.099800] ==================================================================
[   21.100530] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.101182] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.101852] 
[   21.102094] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.102297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.102334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.102392] Call Trace:
[   21.102448]  <TASK>
[   21.102522]  dump_stack_lvl+0x73/0xb0
[   21.102609]  print_report+0xd1/0x650
[   21.102684]  ? __virt_addr_valid+0x1db/0x2d0
[   21.102778]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.102899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.102970]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.103049]  kasan_report+0x141/0x180
[   21.103121]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.103196]  kasan_check_range+0x10c/0x1c0
[   21.103272]  __kasan_check_write+0x18/0x20
[   21.103304]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.103340]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.103379]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.103413]  ? trace_hardirqs_on+0x37/0xe0
[   21.103448]  ? kasan_bitops_generic+0x92/0x1c0
[   21.103487]  kasan_bitops_generic+0x116/0x1c0
[   21.103519]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.103566]  ? __pfx_read_tsc+0x10/0x10
[   21.103596]  ? ktime_get_ts64+0x86/0x230
[   21.103631]  kunit_try_run_case+0x1a5/0x480
[   21.103667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.103698]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.103728]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.103766]  ? __kthread_parkme+0x82/0x180
[   21.103794]  ? preempt_count_sub+0x50/0x80
[   21.103844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.103889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.103924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.103958]  kthread+0x337/0x6f0
[   21.103987]  ? trace_preempt_on+0x20/0xc0
[   21.104019]  ? __pfx_kthread+0x10/0x10
[   21.104048]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.104083]  ? calculate_sigpending+0x7b/0xa0
[   21.104117]  ? __pfx_kthread+0x10/0x10
[   21.104148]  ret_from_fork+0x116/0x1d0
[   21.104173]  ? __pfx_kthread+0x10/0x10
[   21.104202]  ret_from_fork_asm+0x1a/0x30
[   21.104270]  </TASK>
[   21.104286] 
[   21.122714] Allocated by task 288:
[   21.123046]  kasan_save_stack+0x45/0x70
[   21.123524]  kasan_save_track+0x18/0x40
[   21.123969]  kasan_save_alloc_info+0x3b/0x50
[   21.124405]  __kasan_kmalloc+0xb7/0xc0
[   21.124729]  __kmalloc_cache_noprof+0x189/0x420
[   21.125185]  kasan_bitops_generic+0x92/0x1c0
[   21.125773]  kunit_try_run_case+0x1a5/0x480
[   21.126326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.126853]  kthread+0x337/0x6f0
[   21.127336]  ret_from_fork+0x116/0x1d0
[   21.127750]  ret_from_fork_asm+0x1a/0x30
[   21.128258] 
[   21.128546] The buggy address belongs to the object at ffff888102264580
[   21.128546]  which belongs to the cache kmalloc-16 of size 16
[   21.129561] The buggy address is located 8 bytes inside of
[   21.129561]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.130638] 
[   21.130820] The buggy address belongs to the physical page:
[   21.131429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.132155] flags: 0x200000000000000(node=0|zone=2)
[   21.132752] page_type: f5(slab)
[   21.133114] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.133742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.134250] page dumped because: kasan: bad access detected
[   21.134592] 
[   21.134749] Memory state around the buggy address:
[   21.135255]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.135960]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.136762] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.137183]                       ^
[   21.137556]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.138314]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.139044] ==================================================================
[   21.224819] ==================================================================
[   21.225423] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.225988] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.226878] 
[   21.227055] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.227161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.227191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.227235] Call Trace:
[   21.227275]  <TASK>
[   21.227314]  dump_stack_lvl+0x73/0xb0
[   21.227390]  print_report+0xd1/0x650
[   21.227461]  ? __virt_addr_valid+0x1db/0x2d0
[   21.227534]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.227629]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.227702]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.227785]  kasan_report+0x141/0x180
[   21.227914]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.228010]  kasan_check_range+0x10c/0x1c0
[   21.228088]  __kasan_check_write+0x18/0x20
[   21.228156]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.228277]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.228368]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.228444]  ? trace_hardirqs_on+0x37/0xe0
[   21.228520]  ? kasan_bitops_generic+0x92/0x1c0
[   21.228600]  kasan_bitops_generic+0x116/0x1c0
[   21.228668]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.228748]  ? __pfx_read_tsc+0x10/0x10
[   21.228816]  ? ktime_get_ts64+0x86/0x230
[   21.228910]  kunit_try_run_case+0x1a5/0x480
[   21.228986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.229058]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.229128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.229208]  ? __kthread_parkme+0x82/0x180
[   21.229319]  ? preempt_count_sub+0x50/0x80
[   21.229398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.229471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.229588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.229689]  kthread+0x337/0x6f0
[   21.229728]  ? trace_preempt_on+0x20/0xc0
[   21.229762]  ? __pfx_kthread+0x10/0x10
[   21.229791]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.229825]  ? calculate_sigpending+0x7b/0xa0
[   21.229917]  ? __pfx_kthread+0x10/0x10
[   21.229986]  ret_from_fork+0x116/0x1d0
[   21.230051]  ? __pfx_kthread+0x10/0x10
[   21.230118]  ret_from_fork_asm+0x1a/0x30
[   21.230210]  </TASK>
[   21.230251] 
[   21.249738] Allocated by task 288:
[   21.250094]  kasan_save_stack+0x45/0x70
[   21.250483]  kasan_save_track+0x18/0x40
[   21.250821]  kasan_save_alloc_info+0x3b/0x50
[   21.251209]  __kasan_kmalloc+0xb7/0xc0
[   21.251504]  __kmalloc_cache_noprof+0x189/0x420
[   21.251969]  kasan_bitops_generic+0x92/0x1c0
[   21.252426]  kunit_try_run_case+0x1a5/0x480
[   21.252854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.253345]  kthread+0x337/0x6f0
[   21.253605]  ret_from_fork+0x116/0x1d0
[   21.253988]  ret_from_fork_asm+0x1a/0x30
[   21.254428] 
[   21.254631] The buggy address belongs to the object at ffff888102264580
[   21.254631]  which belongs to the cache kmalloc-16 of size 16
[   21.255460] The buggy address is located 8 bytes inside of
[   21.255460]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.256461] 
[   21.256770] The buggy address belongs to the physical page:
[   21.257290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.257985] flags: 0x200000000000000(node=0|zone=2)
[   21.258430] page_type: f5(slab)
[   21.258759] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.259389] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.260014] page dumped because: kasan: bad access detected
[   21.260468] 
[   21.260639] Memory state around the buggy address:
[   21.261061]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.261646]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.262207] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.262716]                       ^
[   21.262993]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.263550]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.264170] ==================================================================
[   21.265549] ==================================================================
[   21.266117] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.266784] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.267208] 
[   21.267493] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.267627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.267664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.267723] Call Trace:
[   21.267769]  <TASK>
[   21.267812]  dump_stack_lvl+0x73/0xb0
[   21.267915]  print_report+0xd1/0x650
[   21.267989]  ? __virt_addr_valid+0x1db/0x2d0
[   21.268060]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.268135]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.268205]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.268319]  kasan_report+0x141/0x180
[   21.268376]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.268470]  kasan_check_range+0x10c/0x1c0
[   21.268549]  __kasan_check_write+0x18/0x20
[   21.268618]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.268701]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.268787]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.268878]  ? trace_hardirqs_on+0x37/0xe0
[   21.268951]  ? kasan_bitops_generic+0x92/0x1c0
[   21.269032]  kasan_bitops_generic+0x116/0x1c0
[   21.269107]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.269184]  ? __pfx_read_tsc+0x10/0x10
[   21.269289]  ? ktime_get_ts64+0x86/0x230
[   21.269375]  kunit_try_run_case+0x1a5/0x480
[   21.269451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.269524]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.269596]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.269678]  ? __kthread_parkme+0x82/0x180
[   21.269748]  ? preempt_count_sub+0x50/0x80
[   21.269827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.269924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.269988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.270045]  kthread+0x337/0x6f0
[   21.270111]  ? trace_preempt_on+0x20/0xc0
[   21.270184]  ? __pfx_kthread+0x10/0x10
[   21.270302]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.270381]  ? calculate_sigpending+0x7b/0xa0
[   21.270459]  ? __pfx_kthread+0x10/0x10
[   21.270525]  ret_from_fork+0x116/0x1d0
[   21.270589]  ? __pfx_kthread+0x10/0x10
[   21.270658]  ret_from_fork_asm+0x1a/0x30
[   21.270746]  </TASK>
[   21.270783] 
[   21.285310] Allocated by task 288:
[   21.285574]  kasan_save_stack+0x45/0x70
[   21.285886]  kasan_save_track+0x18/0x40
[   21.286172]  kasan_save_alloc_info+0x3b/0x50
[   21.286525]  __kasan_kmalloc+0xb7/0xc0
[   21.286894]  __kmalloc_cache_noprof+0x189/0x420
[   21.287414]  kasan_bitops_generic+0x92/0x1c0
[   21.287886]  kunit_try_run_case+0x1a5/0x480
[   21.288367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.288902]  kthread+0x337/0x6f0
[   21.289303]  ret_from_fork+0x116/0x1d0
[   21.289706]  ret_from_fork_asm+0x1a/0x30
[   21.290058] 
[   21.290278] The buggy address belongs to the object at ffff888102264580
[   21.290278]  which belongs to the cache kmalloc-16 of size 16
[   21.291300] The buggy address is located 8 bytes inside of
[   21.291300]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.292096] 
[   21.292313] The buggy address belongs to the physical page:
[   21.292645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.293294] flags: 0x200000000000000(node=0|zone=2)
[   21.293735] page_type: f5(slab)
[   21.294095] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.294762] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.295430] page dumped because: kasan: bad access detected
[   21.295930] 
[   21.296134] Memory state around the buggy address:
[   21.296539]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.297087]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.297558] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.298022]                       ^
[   21.298405]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.299002]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.299615] ==================================================================
[   21.016938] ==================================================================
[   21.017822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.018847] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.019820] 
[   21.020096] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.020525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.020547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.020580] Call Trace:
[   21.020597]  <TASK>
[   21.020619]  dump_stack_lvl+0x73/0xb0
[   21.020708]  print_report+0xd1/0x650
[   21.020821]  ? __virt_addr_valid+0x1db/0x2d0
[   21.020920]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.020994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.021064]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.021115]  kasan_report+0x141/0x180
[   21.021150]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.021194]  kasan_check_range+0x10c/0x1c0
[   21.021270]  __kasan_check_write+0x18/0x20
[   21.021305]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.021343]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.021382]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.021420]  ? trace_hardirqs_on+0x37/0xe0
[   21.021452]  ? kasan_bitops_generic+0x92/0x1c0
[   21.021491]  kasan_bitops_generic+0x116/0x1c0
[   21.021526]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.021562]  ? __pfx_read_tsc+0x10/0x10
[   21.021593]  ? ktime_get_ts64+0x86/0x230
[   21.021627]  kunit_try_run_case+0x1a5/0x480
[   21.021662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.021694]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.021724]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.021760]  ? __kthread_parkme+0x82/0x180
[   21.021789]  ? preempt_count_sub+0x50/0x80
[   21.021822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.021886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.021919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.021954]  kthread+0x337/0x6f0
[   21.021981]  ? trace_preempt_on+0x20/0xc0
[   21.022013]  ? __pfx_kthread+0x10/0x10
[   21.022042]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.022077]  ? calculate_sigpending+0x7b/0xa0
[   21.022113]  ? __pfx_kthread+0x10/0x10
[   21.022143]  ret_from_fork+0x116/0x1d0
[   21.022169]  ? __pfx_kthread+0x10/0x10
[   21.022197]  ret_from_fork_asm+0x1a/0x30
[   21.022274]  </TASK>
[   21.022292] 
[   21.037675] Allocated by task 288:
[   21.038471]  kasan_save_stack+0x45/0x70
[   21.038886]  kasan_save_track+0x18/0x40
[   21.039283]  kasan_save_alloc_info+0x3b/0x50
[   21.039706]  __kasan_kmalloc+0xb7/0xc0
[   21.040538]  __kmalloc_cache_noprof+0x189/0x420
[   21.041020]  kasan_bitops_generic+0x92/0x1c0
[   21.041514]  kunit_try_run_case+0x1a5/0x480
[   21.041950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.042508]  kthread+0x337/0x6f0
[   21.042828]  ret_from_fork+0x116/0x1d0
[   21.043243]  ret_from_fork_asm+0x1a/0x30
[   21.043535] 
[   21.043698] The buggy address belongs to the object at ffff888102264580
[   21.043698]  which belongs to the cache kmalloc-16 of size 16
[   21.044732] The buggy address is located 8 bytes inside of
[   21.044732]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.045770] 
[   21.046028] The buggy address belongs to the physical page:
[   21.046559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.047179] flags: 0x200000000000000(node=0|zone=2)
[   21.047563] page_type: f5(slab)
[   21.047821] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.048404] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.049123] page dumped because: kasan: bad access detected
[   21.050890] 
[   21.051125] Memory state around the buggy address:
[   21.052009]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.052873]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.053495] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.054326]                       ^
[   21.054769]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.055316]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.055907] ==================================================================
[   21.057518] ==================================================================
[   21.058183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.058890] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.060182] 
[   21.060701] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.061134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.061175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.061232] Call Trace:
[   21.061281]  <TASK>
[   21.061329]  dump_stack_lvl+0x73/0xb0
[   21.061402]  print_report+0xd1/0x650
[   21.061440]  ? __virt_addr_valid+0x1db/0x2d0
[   21.061475]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.061512]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.061543]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.061580]  kasan_report+0x141/0x180
[   21.061612]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.061653]  kasan_check_range+0x10c/0x1c0
[   21.061687]  __kasan_check_write+0x18/0x20
[   21.061713]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.061750]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.061790]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.061824]  ? trace_hardirqs_on+0x37/0xe0
[   21.061888]  ? kasan_bitops_generic+0x92/0x1c0
[   21.061928]  kasan_bitops_generic+0x116/0x1c0
[   21.061964]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.062001]  ? __pfx_read_tsc+0x10/0x10
[   21.062032]  ? ktime_get_ts64+0x86/0x230
[   21.062066]  kunit_try_run_case+0x1a5/0x480
[   21.062101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.062133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.062161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.062199]  ? __kthread_parkme+0x82/0x180
[   21.062276]  ? preempt_count_sub+0x50/0x80
[   21.062319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.062357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.062391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.062423]  kthread+0x337/0x6f0
[   21.062453]  ? trace_preempt_on+0x20/0xc0
[   21.062486]  ? __pfx_kthread+0x10/0x10
[   21.062518]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.062552]  ? calculate_sigpending+0x7b/0xa0
[   21.062587]  ? __pfx_kthread+0x10/0x10
[   21.062618]  ret_from_fork+0x116/0x1d0
[   21.062645]  ? __pfx_kthread+0x10/0x10
[   21.062673]  ret_from_fork_asm+0x1a/0x30
[   21.062714]  </TASK>
[   21.062729] 
[   21.079074] Allocated by task 288:
[   21.079469]  kasan_save_stack+0x45/0x70
[   21.079885]  kasan_save_track+0x18/0x40
[   21.080332]  kasan_save_alloc_info+0x3b/0x50
[   21.080758]  __kasan_kmalloc+0xb7/0xc0
[   21.081165]  __kmalloc_cache_noprof+0x189/0x420
[   21.081584]  kasan_bitops_generic+0x92/0x1c0
[   21.082019]  kunit_try_run_case+0x1a5/0x480
[   21.082521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.083002]  kthread+0x337/0x6f0
[   21.083432]  ret_from_fork+0x116/0x1d0
[   21.083861]  ret_from_fork_asm+0x1a/0x30
[   21.084320] 
[   21.084530] The buggy address belongs to the object at ffff888102264580
[   21.084530]  which belongs to the cache kmalloc-16 of size 16
[   21.085538] The buggy address is located 8 bytes inside of
[   21.085538]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.086367] 
[   21.086529] The buggy address belongs to the physical page:
[   21.087046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.087802] flags: 0x200000000000000(node=0|zone=2)
[   21.088259] page_type: f5(slab)
[   21.088521] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.089083] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.089787] page dumped because: kasan: bad access detected
[   21.090379] 
[   21.090595] Memory state around the buggy address:
[   21.091039]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.091509]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.091957] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.092411]                       ^
[   21.092771]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.093489]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.094143] ==================================================================
[   21.140205] ==================================================================
[   21.140923] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.141794] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288
[   21.142296] 
[   21.142509] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.142619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.142650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.142698] Call Trace:
[   21.142735]  <TASK>
[   21.142771]  dump_stack_lvl+0x73/0xb0
[   21.142853]  print_report+0xd1/0x650
[   21.142961]  ? __virt_addr_valid+0x1db/0x2d0
[   21.143038]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.143178]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.143321]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.143402]  kasan_report+0x141/0x180
[   21.143561]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.143646]  kasan_check_range+0x10c/0x1c0
[   21.143708]  __kasan_check_write+0x18/0x20
[   21.143776]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.143955]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.144120]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.144197]  ? trace_hardirqs_on+0x37/0xe0
[   21.144314]  ? kasan_bitops_generic+0x92/0x1c0
[   21.144399]  kasan_bitops_generic+0x116/0x1c0
[   21.144472]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.144550]  ? __pfx_read_tsc+0x10/0x10
[   21.144612]  ? ktime_get_ts64+0x86/0x230
[   21.144692]  kunit_try_run_case+0x1a5/0x480
[   21.144767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.144858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.145018]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.145101]  ? __kthread_parkme+0x82/0x180
[   21.145174]  ? preempt_count_sub+0x50/0x80
[   21.145297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.145459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.145538]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.145612]  kthread+0x337/0x6f0
[   21.145677]  ? trace_preempt_on+0x20/0xc0
[   21.145744]  ? __pfx_kthread+0x10/0x10
[   21.145801]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.145861]  ? calculate_sigpending+0x7b/0xa0
[   21.145904]  ? __pfx_kthread+0x10/0x10
[   21.145936]  ret_from_fork+0x116/0x1d0
[   21.145963]  ? __pfx_kthread+0x10/0x10
[   21.145994]  ret_from_fork_asm+0x1a/0x30
[   21.146037]  </TASK>
[   21.146052] 
[   21.162401] Allocated by task 288:
[   21.162769]  kasan_save_stack+0x45/0x70
[   21.163179]  kasan_save_track+0x18/0x40
[   21.163674]  kasan_save_alloc_info+0x3b/0x50
[   21.164097]  __kasan_kmalloc+0xb7/0xc0
[   21.164544]  __kmalloc_cache_noprof+0x189/0x420
[   21.164881]  kasan_bitops_generic+0x92/0x1c0
[   21.165183]  kunit_try_run_case+0x1a5/0x480
[   21.165648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.166159]  kthread+0x337/0x6f0
[   21.166625]  ret_from_fork+0x116/0x1d0
[   21.167062]  ret_from_fork_asm+0x1a/0x30
[   21.167499] 
[   21.167757] The buggy address belongs to the object at ffff888102264580
[   21.167757]  which belongs to the cache kmalloc-16 of size 16
[   21.168759] The buggy address is located 8 bytes inside of
[   21.168759]  allocated 9-byte region [ffff888102264580, ffff888102264589)
[   21.169590] 
[   21.169847] The buggy address belongs to the physical page:
[   21.170398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264
[   21.171016] flags: 0x200000000000000(node=0|zone=2)
[   21.171557] page_type: f5(slab)
[   21.171940] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   21.172619] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.173272] page dumped because: kasan: bad access detected
[   21.173771] 
[   21.173991] Memory state around the buggy address:
[   21.174469]  ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.175074]  ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.175693] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.176115]                       ^
[   21.176425]  ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.176873]  ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.177595] ==================================================================