Date
June 17, 2025, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.320034] ================================================================== [ 19.320089] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 19.320503] [ 19.320875] Call trace: [ 19.320898] show_stack+0x20/0x38 (C) [ 19.321535] kasan_report+0xdc/0x128 [ 19.321709] kasan_bitops_generic+0x110/0x1c8 [ 19.322893] [ 19.323093] kasan_save_track+0x20/0x40 [ 19.324250] The buggy address is located 8 bytes inside of [ 19.324250] allocated 9-byte region [fff00000c1193720, fff00000c1193729) [ 19.325869] ^ [ 19.327363] ==================================================================
[ 21.300791] ================================================================== [ 21.301480] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.302130] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.302678] [ 21.302941] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.303063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.303099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.303157] Call Trace: [ 21.303200] <TASK> [ 21.303289] dump_stack_lvl+0x73/0xb0 [ 21.303371] print_report+0xd1/0x650 [ 21.303444] ? __virt_addr_valid+0x1db/0x2d0 [ 21.303523] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.303612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.303688] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.303769] kasan_report+0x141/0x180 [ 21.303859] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.303953] kasan_check_range+0x10c/0x1c0 [ 21.304022] __kasan_check_write+0x18/0x20 [ 21.304076] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 21.304149] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.304262] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.304344] ? trace_hardirqs_on+0x37/0xe0 [ 21.304416] ? kasan_bitops_generic+0x92/0x1c0 [ 21.304504] kasan_bitops_generic+0x116/0x1c0 [ 21.304583] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.304662] ? __pfx_read_tsc+0x10/0x10 [ 21.304725] ? ktime_get_ts64+0x86/0x230 [ 21.304803] kunit_try_run_case+0x1a5/0x480 [ 21.304901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.304970] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.305036] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.305113] ? __kthread_parkme+0x82/0x180 [ 21.305180] ? preempt_count_sub+0x50/0x80 [ 21.305303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.305379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.305451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.305521] kthread+0x337/0x6f0 [ 21.305588] ? trace_preempt_on+0x20/0xc0 [ 21.305659] ? __pfx_kthread+0x10/0x10 [ 21.305727] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.305800] ? calculate_sigpending+0x7b/0xa0 [ 21.305887] ? __pfx_kthread+0x10/0x10 [ 21.305998] ret_from_fork+0x116/0x1d0 [ 21.306068] ? __pfx_kthread+0x10/0x10 [ 21.306140] ret_from_fork_asm+0x1a/0x30 [ 21.306276] </TASK> [ 21.306317] [ 21.319967] Allocated by task 288: [ 21.320358] kasan_save_stack+0x45/0x70 [ 21.320738] kasan_save_track+0x18/0x40 [ 21.321129] kasan_save_alloc_info+0x3b/0x50 [ 21.321586] __kasan_kmalloc+0xb7/0xc0 [ 21.321975] __kmalloc_cache_noprof+0x189/0x420 [ 21.322438] kasan_bitops_generic+0x92/0x1c0 [ 21.322860] kunit_try_run_case+0x1a5/0x480 [ 21.323335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.323779] kthread+0x337/0x6f0 [ 21.324054] ret_from_fork+0x116/0x1d0 [ 21.324367] ret_from_fork_asm+0x1a/0x30 [ 21.324659] [ 21.324821] The buggy address belongs to the object at ffff888102264580 [ 21.324821] which belongs to the cache kmalloc-16 of size 16 [ 21.325774] The buggy address is located 8 bytes inside of [ 21.325774] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.326787] [ 21.327012] The buggy address belongs to the physical page: [ 21.327467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.328002] flags: 0x200000000000000(node=0|zone=2) [ 21.328524] page_type: f5(slab) [ 21.328908] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.329611] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.330096] page dumped because: kasan: bad access detected [ 21.330483] [ 21.330640] Memory state around the buggy address: [ 21.331047] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.331688] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.332938] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.334181] ^ [ 21.335168] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.336612] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.337267] ================================================================== [ 21.178759] ================================================================== [ 21.179883] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.180626] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.182138] [ 21.182744] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.182884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.182922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.182976] Call Trace: [ 21.183018] <TASK> [ 21.183056] dump_stack_lvl+0x73/0xb0 [ 21.183128] print_report+0xd1/0x650 [ 21.183199] ? __virt_addr_valid+0x1db/0x2d0 [ 21.184172] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.184312] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.184387] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.184449] kasan_report+0x141/0x180 [ 21.184483] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.184527] kasan_check_range+0x10c/0x1c0 [ 21.184560] __kasan_check_write+0x18/0x20 [ 21.184589] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 21.184625] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.184664] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.184701] ? trace_hardirqs_on+0x37/0xe0 [ 21.184736] ? kasan_bitops_generic+0x92/0x1c0 [ 21.184776] kasan_bitops_generic+0x116/0x1c0 [ 21.184810] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.184911] ? __pfx_read_tsc+0x10/0x10 [ 21.184982] ? ktime_get_ts64+0x86/0x230 [ 21.185446] kunit_try_run_case+0x1a5/0x480 [ 21.185656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.185730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.185799] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.185900] ? __kthread_parkme+0x82/0x180 [ 21.185968] ? preempt_count_sub+0x50/0x80 [ 21.186093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.186253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.186364] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.186494] kthread+0x337/0x6f0 [ 21.186545] ? trace_preempt_on+0x20/0xc0 [ 21.186610] ? __pfx_kthread+0x10/0x10 [ 21.186642] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.186681] ? calculate_sigpending+0x7b/0xa0 [ 21.186716] ? __pfx_kthread+0x10/0x10 [ 21.186746] ret_from_fork+0x116/0x1d0 [ 21.186773] ? __pfx_kthread+0x10/0x10 [ 21.186804] ret_from_fork_asm+0x1a/0x30 [ 21.186867] </TASK> [ 21.186883] [ 21.201866] Allocated by task 288: [ 21.202275] kasan_save_stack+0x45/0x70 [ 21.202688] kasan_save_track+0x18/0x40 [ 21.203115] kasan_save_alloc_info+0x3b/0x50 [ 21.203597] __kasan_kmalloc+0xb7/0xc0 [ 21.204515] __kmalloc_cache_noprof+0x189/0x420 [ 21.204918] kasan_bitops_generic+0x92/0x1c0 [ 21.205325] kunit_try_run_case+0x1a5/0x480 [ 21.205762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.206712] kthread+0x337/0x6f0 [ 21.209274] ret_from_fork+0x116/0x1d0 [ 21.209518] ret_from_fork_asm+0x1a/0x30 [ 21.209748] [ 21.209895] The buggy address belongs to the object at ffff888102264580 [ 21.209895] which belongs to the cache kmalloc-16 of size 16 [ 21.210464] The buggy address is located 8 bytes inside of [ 21.210464] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.212269] [ 21.212435] The buggy address belongs to the physical page: [ 21.215482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.216530] flags: 0x200000000000000(node=0|zone=2) [ 21.217050] page_type: f5(slab) [ 21.217428] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.217816] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.218282] page dumped because: kasan: bad access detected [ 21.218620] [ 21.218799] Memory state around the buggy address: [ 21.219168] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.219636] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.220206] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.220746] ^ [ 21.221030] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.221455] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.222821] ================================================================== [ 21.099800] ================================================================== [ 21.100530] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.101182] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.101852] [ 21.102094] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.102297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.102334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.102392] Call Trace: [ 21.102448] <TASK> [ 21.102522] dump_stack_lvl+0x73/0xb0 [ 21.102609] print_report+0xd1/0x650 [ 21.102684] ? __virt_addr_valid+0x1db/0x2d0 [ 21.102778] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.102899] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.102970] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.103049] kasan_report+0x141/0x180 [ 21.103121] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.103196] kasan_check_range+0x10c/0x1c0 [ 21.103272] __kasan_check_write+0x18/0x20 [ 21.103304] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 21.103340] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.103379] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.103413] ? trace_hardirqs_on+0x37/0xe0 [ 21.103448] ? kasan_bitops_generic+0x92/0x1c0 [ 21.103487] kasan_bitops_generic+0x116/0x1c0 [ 21.103519] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.103566] ? __pfx_read_tsc+0x10/0x10 [ 21.103596] ? ktime_get_ts64+0x86/0x230 [ 21.103631] kunit_try_run_case+0x1a5/0x480 [ 21.103667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.103698] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.103728] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.103766] ? __kthread_parkme+0x82/0x180 [ 21.103794] ? preempt_count_sub+0x50/0x80 [ 21.103844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.103889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.103924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.103958] kthread+0x337/0x6f0 [ 21.103987] ? trace_preempt_on+0x20/0xc0 [ 21.104019] ? __pfx_kthread+0x10/0x10 [ 21.104048] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.104083] ? calculate_sigpending+0x7b/0xa0 [ 21.104117] ? __pfx_kthread+0x10/0x10 [ 21.104148] ret_from_fork+0x116/0x1d0 [ 21.104173] ? __pfx_kthread+0x10/0x10 [ 21.104202] ret_from_fork_asm+0x1a/0x30 [ 21.104270] </TASK> [ 21.104286] [ 21.122714] Allocated by task 288: [ 21.123046] kasan_save_stack+0x45/0x70 [ 21.123524] kasan_save_track+0x18/0x40 [ 21.123969] kasan_save_alloc_info+0x3b/0x50 [ 21.124405] __kasan_kmalloc+0xb7/0xc0 [ 21.124729] __kmalloc_cache_noprof+0x189/0x420 [ 21.125185] kasan_bitops_generic+0x92/0x1c0 [ 21.125773] kunit_try_run_case+0x1a5/0x480 [ 21.126326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.126853] kthread+0x337/0x6f0 [ 21.127336] ret_from_fork+0x116/0x1d0 [ 21.127750] ret_from_fork_asm+0x1a/0x30 [ 21.128258] [ 21.128546] The buggy address belongs to the object at ffff888102264580 [ 21.128546] which belongs to the cache kmalloc-16 of size 16 [ 21.129561] The buggy address is located 8 bytes inside of [ 21.129561] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.130638] [ 21.130820] The buggy address belongs to the physical page: [ 21.131429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.132155] flags: 0x200000000000000(node=0|zone=2) [ 21.132752] page_type: f5(slab) [ 21.133114] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.133742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.134250] page dumped because: kasan: bad access detected [ 21.134592] [ 21.134749] Memory state around the buggy address: [ 21.135255] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.135960] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.136762] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.137183] ^ [ 21.137556] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.138314] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.139044] ================================================================== [ 21.224819] ================================================================== [ 21.225423] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.225988] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.226878] [ 21.227055] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.227161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.227191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.227235] Call Trace: [ 21.227275] <TASK> [ 21.227314] dump_stack_lvl+0x73/0xb0 [ 21.227390] print_report+0xd1/0x650 [ 21.227461] ? __virt_addr_valid+0x1db/0x2d0 [ 21.227534] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.227629] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.227702] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.227785] kasan_report+0x141/0x180 [ 21.227914] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.228010] kasan_check_range+0x10c/0x1c0 [ 21.228088] __kasan_check_write+0x18/0x20 [ 21.228156] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 21.228277] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.228368] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.228444] ? trace_hardirqs_on+0x37/0xe0 [ 21.228520] ? kasan_bitops_generic+0x92/0x1c0 [ 21.228600] kasan_bitops_generic+0x116/0x1c0 [ 21.228668] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.228748] ? __pfx_read_tsc+0x10/0x10 [ 21.228816] ? ktime_get_ts64+0x86/0x230 [ 21.228910] kunit_try_run_case+0x1a5/0x480 [ 21.228986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.229058] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.229128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.229208] ? __kthread_parkme+0x82/0x180 [ 21.229319] ? preempt_count_sub+0x50/0x80 [ 21.229398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.229471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.229588] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.229689] kthread+0x337/0x6f0 [ 21.229728] ? trace_preempt_on+0x20/0xc0 [ 21.229762] ? __pfx_kthread+0x10/0x10 [ 21.229791] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.229825] ? calculate_sigpending+0x7b/0xa0 [ 21.229917] ? __pfx_kthread+0x10/0x10 [ 21.229986] ret_from_fork+0x116/0x1d0 [ 21.230051] ? __pfx_kthread+0x10/0x10 [ 21.230118] ret_from_fork_asm+0x1a/0x30 [ 21.230210] </TASK> [ 21.230251] [ 21.249738] Allocated by task 288: [ 21.250094] kasan_save_stack+0x45/0x70 [ 21.250483] kasan_save_track+0x18/0x40 [ 21.250821] kasan_save_alloc_info+0x3b/0x50 [ 21.251209] __kasan_kmalloc+0xb7/0xc0 [ 21.251504] __kmalloc_cache_noprof+0x189/0x420 [ 21.251969] kasan_bitops_generic+0x92/0x1c0 [ 21.252426] kunit_try_run_case+0x1a5/0x480 [ 21.252854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.253345] kthread+0x337/0x6f0 [ 21.253605] ret_from_fork+0x116/0x1d0 [ 21.253988] ret_from_fork_asm+0x1a/0x30 [ 21.254428] [ 21.254631] The buggy address belongs to the object at ffff888102264580 [ 21.254631] which belongs to the cache kmalloc-16 of size 16 [ 21.255460] The buggy address is located 8 bytes inside of [ 21.255460] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.256461] [ 21.256770] The buggy address belongs to the physical page: [ 21.257290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.257985] flags: 0x200000000000000(node=0|zone=2) [ 21.258430] page_type: f5(slab) [ 21.258759] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.259389] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.260014] page dumped because: kasan: bad access detected [ 21.260468] [ 21.260639] Memory state around the buggy address: [ 21.261061] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.261646] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.262207] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.262716] ^ [ 21.262993] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.263550] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.264170] ================================================================== [ 21.265549] ================================================================== [ 21.266117] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.266784] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.267208] [ 21.267493] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.267627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.267664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.267723] Call Trace: [ 21.267769] <TASK> [ 21.267812] dump_stack_lvl+0x73/0xb0 [ 21.267915] print_report+0xd1/0x650 [ 21.267989] ? __virt_addr_valid+0x1db/0x2d0 [ 21.268060] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.268135] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.268205] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.268319] kasan_report+0x141/0x180 [ 21.268376] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.268470] kasan_check_range+0x10c/0x1c0 [ 21.268549] __kasan_check_write+0x18/0x20 [ 21.268618] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 21.268701] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.268787] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.268878] ? trace_hardirqs_on+0x37/0xe0 [ 21.268951] ? kasan_bitops_generic+0x92/0x1c0 [ 21.269032] kasan_bitops_generic+0x116/0x1c0 [ 21.269107] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.269184] ? __pfx_read_tsc+0x10/0x10 [ 21.269289] ? ktime_get_ts64+0x86/0x230 [ 21.269375] kunit_try_run_case+0x1a5/0x480 [ 21.269451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.269524] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.269596] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.269678] ? __kthread_parkme+0x82/0x180 [ 21.269748] ? preempt_count_sub+0x50/0x80 [ 21.269827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.269924] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.269988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.270045] kthread+0x337/0x6f0 [ 21.270111] ? trace_preempt_on+0x20/0xc0 [ 21.270184] ? __pfx_kthread+0x10/0x10 [ 21.270302] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.270381] ? calculate_sigpending+0x7b/0xa0 [ 21.270459] ? __pfx_kthread+0x10/0x10 [ 21.270525] ret_from_fork+0x116/0x1d0 [ 21.270589] ? __pfx_kthread+0x10/0x10 [ 21.270658] ret_from_fork_asm+0x1a/0x30 [ 21.270746] </TASK> [ 21.270783] [ 21.285310] Allocated by task 288: [ 21.285574] kasan_save_stack+0x45/0x70 [ 21.285886] kasan_save_track+0x18/0x40 [ 21.286172] kasan_save_alloc_info+0x3b/0x50 [ 21.286525] __kasan_kmalloc+0xb7/0xc0 [ 21.286894] __kmalloc_cache_noprof+0x189/0x420 [ 21.287414] kasan_bitops_generic+0x92/0x1c0 [ 21.287886] kunit_try_run_case+0x1a5/0x480 [ 21.288367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.288902] kthread+0x337/0x6f0 [ 21.289303] ret_from_fork+0x116/0x1d0 [ 21.289706] ret_from_fork_asm+0x1a/0x30 [ 21.290058] [ 21.290278] The buggy address belongs to the object at ffff888102264580 [ 21.290278] which belongs to the cache kmalloc-16 of size 16 [ 21.291300] The buggy address is located 8 bytes inside of [ 21.291300] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.292096] [ 21.292313] The buggy address belongs to the physical page: [ 21.292645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.293294] flags: 0x200000000000000(node=0|zone=2) [ 21.293735] page_type: f5(slab) [ 21.294095] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.294762] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.295430] page dumped because: kasan: bad access detected [ 21.295930] [ 21.296134] Memory state around the buggy address: [ 21.296539] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.297087] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.297558] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.298022] ^ [ 21.298405] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.299002] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.299615] ================================================================== [ 21.016938] ================================================================== [ 21.017822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.018847] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.019820] [ 21.020096] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.020525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.020547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.020580] Call Trace: [ 21.020597] <TASK> [ 21.020619] dump_stack_lvl+0x73/0xb0 [ 21.020708] print_report+0xd1/0x650 [ 21.020821] ? __virt_addr_valid+0x1db/0x2d0 [ 21.020920] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.020994] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.021064] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.021115] kasan_report+0x141/0x180 [ 21.021150] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.021194] kasan_check_range+0x10c/0x1c0 [ 21.021270] __kasan_check_write+0x18/0x20 [ 21.021305] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 21.021343] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.021382] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.021420] ? trace_hardirqs_on+0x37/0xe0 [ 21.021452] ? kasan_bitops_generic+0x92/0x1c0 [ 21.021491] kasan_bitops_generic+0x116/0x1c0 [ 21.021526] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.021562] ? __pfx_read_tsc+0x10/0x10 [ 21.021593] ? ktime_get_ts64+0x86/0x230 [ 21.021627] kunit_try_run_case+0x1a5/0x480 [ 21.021662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.021694] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.021724] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.021760] ? __kthread_parkme+0x82/0x180 [ 21.021789] ? preempt_count_sub+0x50/0x80 [ 21.021822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.021886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.021919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.021954] kthread+0x337/0x6f0 [ 21.021981] ? trace_preempt_on+0x20/0xc0 [ 21.022013] ? __pfx_kthread+0x10/0x10 [ 21.022042] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.022077] ? calculate_sigpending+0x7b/0xa0 [ 21.022113] ? __pfx_kthread+0x10/0x10 [ 21.022143] ret_from_fork+0x116/0x1d0 [ 21.022169] ? __pfx_kthread+0x10/0x10 [ 21.022197] ret_from_fork_asm+0x1a/0x30 [ 21.022274] </TASK> [ 21.022292] [ 21.037675] Allocated by task 288: [ 21.038471] kasan_save_stack+0x45/0x70 [ 21.038886] kasan_save_track+0x18/0x40 [ 21.039283] kasan_save_alloc_info+0x3b/0x50 [ 21.039706] __kasan_kmalloc+0xb7/0xc0 [ 21.040538] __kmalloc_cache_noprof+0x189/0x420 [ 21.041020] kasan_bitops_generic+0x92/0x1c0 [ 21.041514] kunit_try_run_case+0x1a5/0x480 [ 21.041950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.042508] kthread+0x337/0x6f0 [ 21.042828] ret_from_fork+0x116/0x1d0 [ 21.043243] ret_from_fork_asm+0x1a/0x30 [ 21.043535] [ 21.043698] The buggy address belongs to the object at ffff888102264580 [ 21.043698] which belongs to the cache kmalloc-16 of size 16 [ 21.044732] The buggy address is located 8 bytes inside of [ 21.044732] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.045770] [ 21.046028] The buggy address belongs to the physical page: [ 21.046559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.047179] flags: 0x200000000000000(node=0|zone=2) [ 21.047563] page_type: f5(slab) [ 21.047821] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.048404] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.049123] page dumped because: kasan: bad access detected [ 21.050890] [ 21.051125] Memory state around the buggy address: [ 21.052009] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.052873] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.053495] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.054326] ^ [ 21.054769] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.055316] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.055907] ================================================================== [ 21.057518] ================================================================== [ 21.058183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.058890] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.060182] [ 21.060701] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.061134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.061175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.061232] Call Trace: [ 21.061281] <TASK> [ 21.061329] dump_stack_lvl+0x73/0xb0 [ 21.061402] print_report+0xd1/0x650 [ 21.061440] ? __virt_addr_valid+0x1db/0x2d0 [ 21.061475] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.061512] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.061543] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.061580] kasan_report+0x141/0x180 [ 21.061612] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.061653] kasan_check_range+0x10c/0x1c0 [ 21.061687] __kasan_check_write+0x18/0x20 [ 21.061713] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 21.061750] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.061790] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.061824] ? trace_hardirqs_on+0x37/0xe0 [ 21.061888] ? kasan_bitops_generic+0x92/0x1c0 [ 21.061928] kasan_bitops_generic+0x116/0x1c0 [ 21.061964] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.062001] ? __pfx_read_tsc+0x10/0x10 [ 21.062032] ? ktime_get_ts64+0x86/0x230 [ 21.062066] kunit_try_run_case+0x1a5/0x480 [ 21.062101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.062133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.062161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.062199] ? __kthread_parkme+0x82/0x180 [ 21.062276] ? preempt_count_sub+0x50/0x80 [ 21.062319] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.062357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.062391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.062423] kthread+0x337/0x6f0 [ 21.062453] ? trace_preempt_on+0x20/0xc0 [ 21.062486] ? __pfx_kthread+0x10/0x10 [ 21.062518] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.062552] ? calculate_sigpending+0x7b/0xa0 [ 21.062587] ? __pfx_kthread+0x10/0x10 [ 21.062618] ret_from_fork+0x116/0x1d0 [ 21.062645] ? __pfx_kthread+0x10/0x10 [ 21.062673] ret_from_fork_asm+0x1a/0x30 [ 21.062714] </TASK> [ 21.062729] [ 21.079074] Allocated by task 288: [ 21.079469] kasan_save_stack+0x45/0x70 [ 21.079885] kasan_save_track+0x18/0x40 [ 21.080332] kasan_save_alloc_info+0x3b/0x50 [ 21.080758] __kasan_kmalloc+0xb7/0xc0 [ 21.081165] __kmalloc_cache_noprof+0x189/0x420 [ 21.081584] kasan_bitops_generic+0x92/0x1c0 [ 21.082019] kunit_try_run_case+0x1a5/0x480 [ 21.082521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.083002] kthread+0x337/0x6f0 [ 21.083432] ret_from_fork+0x116/0x1d0 [ 21.083861] ret_from_fork_asm+0x1a/0x30 [ 21.084320] [ 21.084530] The buggy address belongs to the object at ffff888102264580 [ 21.084530] which belongs to the cache kmalloc-16 of size 16 [ 21.085538] The buggy address is located 8 bytes inside of [ 21.085538] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.086367] [ 21.086529] The buggy address belongs to the physical page: [ 21.087046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.087802] flags: 0x200000000000000(node=0|zone=2) [ 21.088259] page_type: f5(slab) [ 21.088521] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.089083] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.089787] page dumped because: kasan: bad access detected [ 21.090379] [ 21.090595] Memory state around the buggy address: [ 21.091039] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.091509] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.091957] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.092411] ^ [ 21.092771] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.093489] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.094143] ================================================================== [ 21.140205] ================================================================== [ 21.140923] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.141794] Write of size 8 at addr ffff888102264588 by task kunit_try_catch/288 [ 21.142296] [ 21.142509] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) [ 21.142619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.142650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.142698] Call Trace: [ 21.142735] <TASK> [ 21.142771] dump_stack_lvl+0x73/0xb0 [ 21.142853] print_report+0xd1/0x650 [ 21.142961] ? __virt_addr_valid+0x1db/0x2d0 [ 21.143038] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.143178] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.143321] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.143402] kasan_report+0x141/0x180 [ 21.143561] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.143646] kasan_check_range+0x10c/0x1c0 [ 21.143708] __kasan_check_write+0x18/0x20 [ 21.143776] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 21.143955] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.144120] ? __kmalloc_cache_noprof+0x189/0x420 [ 21.144197] ? trace_hardirqs_on+0x37/0xe0 [ 21.144314] ? kasan_bitops_generic+0x92/0x1c0 [ 21.144399] kasan_bitops_generic+0x116/0x1c0 [ 21.144472] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.144550] ? __pfx_read_tsc+0x10/0x10 [ 21.144612] ? ktime_get_ts64+0x86/0x230 [ 21.144692] kunit_try_run_case+0x1a5/0x480 [ 21.144767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.144858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.145018] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.145101] ? __kthread_parkme+0x82/0x180 [ 21.145174] ? preempt_count_sub+0x50/0x80 [ 21.145297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.145459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.145538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.145612] kthread+0x337/0x6f0 [ 21.145677] ? trace_preempt_on+0x20/0xc0 [ 21.145744] ? __pfx_kthread+0x10/0x10 [ 21.145801] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.145861] ? calculate_sigpending+0x7b/0xa0 [ 21.145904] ? __pfx_kthread+0x10/0x10 [ 21.145936] ret_from_fork+0x116/0x1d0 [ 21.145963] ? __pfx_kthread+0x10/0x10 [ 21.145994] ret_from_fork_asm+0x1a/0x30 [ 21.146037] </TASK> [ 21.146052] [ 21.162401] Allocated by task 288: [ 21.162769] kasan_save_stack+0x45/0x70 [ 21.163179] kasan_save_track+0x18/0x40 [ 21.163674] kasan_save_alloc_info+0x3b/0x50 [ 21.164097] __kasan_kmalloc+0xb7/0xc0 [ 21.164544] __kmalloc_cache_noprof+0x189/0x420 [ 21.164881] kasan_bitops_generic+0x92/0x1c0 [ 21.165183] kunit_try_run_case+0x1a5/0x480 [ 21.165648] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.166159] kthread+0x337/0x6f0 [ 21.166625] ret_from_fork+0x116/0x1d0 [ 21.167062] ret_from_fork_asm+0x1a/0x30 [ 21.167499] [ 21.167757] The buggy address belongs to the object at ffff888102264580 [ 21.167757] which belongs to the cache kmalloc-16 of size 16 [ 21.168759] The buggy address is located 8 bytes inside of [ 21.168759] allocated 9-byte region [ffff888102264580, ffff888102264589) [ 21.169590] [ 21.169847] The buggy address belongs to the physical page: [ 21.170398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102264 [ 21.171016] flags: 0x200000000000000(node=0|zone=2) [ 21.171557] page_type: f5(slab) [ 21.171940] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 21.172619] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.173272] page dumped because: kasan: bad access detected [ 21.173771] [ 21.173991] Memory state around the buggy address: [ 21.174469] ffff888102264480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.175074] ffff888102264500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.175693] >ffff888102264580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.176115] ^ [ 21.176425] ffff888102264600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.176873] ffff888102264680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.177595] ==================================================================