Hay
Date
June 23, 2025, 7:07 a.m.

Environment
qemu-x86_64

[   24.163860] ==================================================================
[   24.164438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   24.165145] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.166280] 
[   24.166558] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.166648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.166671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.166710] Call Trace:
[   24.166735]  <TASK>
[   24.166758]  dump_stack_lvl+0x73/0xb0
[   24.166812]  print_report+0xd1/0x650
[   24.166925]  ? __virt_addr_valid+0x1db/0x2d0
[   24.166972]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   24.167013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.167051]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   24.167095]  kasan_report+0x141/0x180
[   24.167128]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   24.167165]  kasan_check_range+0x10c/0x1c0
[   24.167194]  __kasan_check_write+0x18/0x20
[   24.167222]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   24.167254]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.167277]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.167297]  ? trace_hardirqs_on+0x37/0xe0
[   24.167315]  ? kasan_bitops_generic+0x92/0x1c0
[   24.167337]  kasan_bitops_generic+0x116/0x1c0
[   24.167356]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.167391]  ? __pfx_read_tsc+0x10/0x10
[   24.167413]  ? ktime_get_ts64+0x86/0x230
[   24.167434]  kunit_try_run_case+0x1a5/0x480
[   24.167455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.167473]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.167492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.167511]  ? __kthread_parkme+0x82/0x180
[   24.167528]  ? preempt_count_sub+0x50/0x80
[   24.167547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.167567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.167587]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.167607]  kthread+0x337/0x6f0
[   24.167623]  ? trace_preempt_on+0x20/0xc0
[   24.167641]  ? __pfx_kthread+0x10/0x10
[   24.167658]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.167676]  ? calculate_sigpending+0x7b/0xa0
[   24.167696]  ? __pfx_kthread+0x10/0x10
[   24.167714]  ret_from_fork+0x116/0x1d0
[   24.167729]  ? __pfx_kthread+0x10/0x10
[   24.167746]  ret_from_fork_asm+0x1a/0x30
[   24.167773]  </TASK>
[   24.167783] 
[   24.181546] Allocated by task 290:
[   24.182388]  kasan_save_stack+0x45/0x70
[   24.182559]  kasan_save_track+0x18/0x40
[   24.183214]  kasan_save_alloc_info+0x3b/0x50
[   24.183392]  __kasan_kmalloc+0xb7/0xc0
[   24.184048]  __kmalloc_cache_noprof+0x189/0x420
[   24.184219]  kasan_bitops_generic+0x92/0x1c0
[   24.184579]  kunit_try_run_case+0x1a5/0x480
[   24.184811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.185546]  kthread+0x337/0x6f0
[   24.185707]  ret_from_fork+0x116/0x1d0
[   24.185961]  ret_from_fork_asm+0x1a/0x30
[   24.186119] 
[   24.186641] The buggy address belongs to the object at ffff888101bb7fa0
[   24.186641]  which belongs to the cache kmalloc-16 of size 16
[   24.187914] The buggy address is located 8 bytes inside of
[   24.187914]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.188325] 
[   24.188822] The buggy address belongs to the physical page:
[   24.189030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.189518] flags: 0x200000000000000(node=0|zone=2)
[   24.189780] page_type: f5(slab)
[   24.190451] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.190885] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.191126] page dumped because: kasan: bad access detected
[   24.191792] 
[   24.191970] Memory state around the buggy address:
[   24.192542]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.192907]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.193351] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.193915]                                   ^
[   24.194181]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.194827]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.195375] ==================================================================
[   23.958481] ==================================================================
[   23.958984] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   23.959753] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   23.960459] 
[   23.960623] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   23.960707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.960727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.960899] Call Trace:
[   23.960931]  <TASK>
[   23.960960]  dump_stack_lvl+0x73/0xb0
[   23.961016]  print_report+0xd1/0x650
[   23.961050]  ? __virt_addr_valid+0x1db/0x2d0
[   23.961097]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   23.961151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.961291]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   23.961324]  kasan_report+0x141/0x180
[   23.961345]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   23.961372]  kasan_check_range+0x10c/0x1c0
[   23.961421]  __kasan_check_write+0x18/0x20
[   23.961453]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   23.961493]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.961532]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.961576]  ? trace_hardirqs_on+0x37/0xe0
[   23.961610]  ? kasan_bitops_generic+0x92/0x1c0
[   23.961672]  kasan_bitops_generic+0x116/0x1c0
[   23.961708]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.961748]  ? __pfx_read_tsc+0x10/0x10
[   23.961784]  ? ktime_get_ts64+0x86/0x230
[   23.961822]  kunit_try_run_case+0x1a5/0x480
[   23.961868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.961904]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.961956]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.961994]  ? __kthread_parkme+0x82/0x180
[   23.962032]  ? preempt_count_sub+0x50/0x80
[   23.962055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.962085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.962120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.962149]  kthread+0x337/0x6f0
[   23.962175]  ? trace_preempt_on+0x20/0xc0
[   23.962204]  ? __pfx_kthread+0x10/0x10
[   23.962230]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.962257]  ? calculate_sigpending+0x7b/0xa0
[   23.962290]  ? __pfx_kthread+0x10/0x10
[   23.962319]  ret_from_fork+0x116/0x1d0
[   23.962345]  ? __pfx_kthread+0x10/0x10
[   23.962372]  ret_from_fork_asm+0x1a/0x30
[   23.962433]  </TASK>
[   23.962445] 
[   23.973914] Allocated by task 290:
[   23.974244]  kasan_save_stack+0x45/0x70
[   23.974517]  kasan_save_track+0x18/0x40
[   23.974906]  kasan_save_alloc_info+0x3b/0x50
[   23.975214]  __kasan_kmalloc+0xb7/0xc0
[   23.975502]  __kmalloc_cache_noprof+0x189/0x420
[   23.975820]  kasan_bitops_generic+0x92/0x1c0
[   23.976122]  kunit_try_run_case+0x1a5/0x480
[   23.976863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.977984]  kthread+0x337/0x6f0
[   23.978301]  ret_from_fork+0x116/0x1d0
[   23.978614]  ret_from_fork_asm+0x1a/0x30
[   23.978957] 
[   23.979217] The buggy address belongs to the object at ffff888101bb7fa0
[   23.979217]  which belongs to the cache kmalloc-16 of size 16
[   23.979798] The buggy address is located 8 bytes inside of
[   23.979798]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   23.980781] 
[   23.980998] The buggy address belongs to the physical page:
[   23.981351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   23.982228] flags: 0x200000000000000(node=0|zone=2)
[   23.982637] page_type: f5(slab)
[   23.982940] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.983532] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.984040] page dumped because: kasan: bad access detected
[   23.984276] 
[   23.984401] Memory state around the buggy address:
[   23.984570]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   23.985212]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.985691] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.986441]                                   ^
[   23.986773]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.987237]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   23.987625] ==================================================================
[   24.105682] ==================================================================
[   24.106167] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   24.106826] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.107476] 
[   24.107693] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.107776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.107801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.107832] Call Trace:
[   24.107854]  <TASK>
[   24.107875]  dump_stack_lvl+0x73/0xb0
[   24.107925]  print_report+0xd1/0x650
[   24.107959]  ? __virt_addr_valid+0x1db/0x2d0
[   24.107993]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   24.108034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.108075]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   24.108279]  kasan_report+0x141/0x180
[   24.108316]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   24.108367]  kasan_check_range+0x10c/0x1c0
[   24.108423]  __kasan_check_write+0x18/0x20
[   24.108461]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   24.108507]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.108551]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.108592]  ? trace_hardirqs_on+0x37/0xe0
[   24.108629]  ? kasan_bitops_generic+0x92/0x1c0
[   24.108675]  kasan_bitops_generic+0x116/0x1c0
[   24.108709]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.108743]  ? __pfx_read_tsc+0x10/0x10
[   24.108776]  ? ktime_get_ts64+0x86/0x230
[   24.108812]  kunit_try_run_case+0x1a5/0x480
[   24.108849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.108887]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.108927]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.108968]  ? __kthread_parkme+0x82/0x180
[   24.109003]  ? preempt_count_sub+0x50/0x80
[   24.109046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.109088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.109129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.109171]  kthread+0x337/0x6f0
[   24.109205]  ? trace_preempt_on+0x20/0xc0
[   24.109246]  ? __pfx_kthread+0x10/0x10
[   24.109282]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.109320]  ? calculate_sigpending+0x7b/0xa0
[   24.109486]  ? __pfx_kthread+0x10/0x10
[   24.109514]  ret_from_fork+0x116/0x1d0
[   24.109536]  ? __pfx_kthread+0x10/0x10
[   24.109559]  ret_from_fork_asm+0x1a/0x30
[   24.109595]  </TASK>
[   24.109609] 
[   24.120914] Allocated by task 290:
[   24.122007]  kasan_save_stack+0x45/0x70
[   24.122330]  kasan_save_track+0x18/0x40
[   24.122477]  kasan_save_alloc_info+0x3b/0x50
[   24.122732]  __kasan_kmalloc+0xb7/0xc0
[   24.123348]  __kmalloc_cache_noprof+0x189/0x420
[   24.123667]  kasan_bitops_generic+0x92/0x1c0
[   24.123853]  kunit_try_run_case+0x1a5/0x480
[   24.124604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.124796]  kthread+0x337/0x6f0
[   24.124986]  ret_from_fork+0x116/0x1d0
[   24.125518]  ret_from_fork_asm+0x1a/0x30
[   24.125792] 
[   24.125902] The buggy address belongs to the object at ffff888101bb7fa0
[   24.125902]  which belongs to the cache kmalloc-16 of size 16
[   24.126805] The buggy address is located 8 bytes inside of
[   24.126805]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.127540] 
[   24.127676] The buggy address belongs to the physical page:
[   24.128068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.128855] flags: 0x200000000000000(node=0|zone=2)
[   24.129221] page_type: f5(slab)
[   24.129504] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.129923] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.130236] page dumped because: kasan: bad access detected
[   24.130591] 
[   24.130727] Memory state around the buggy address:
[   24.131030]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.131395]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.131809] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.132069]                                   ^
[   24.132364]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.132809]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.133127] ==================================================================
[   24.074611] ==================================================================
[   24.075582] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   24.076134] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.077049] 
[   24.077301] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.077399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.077424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.077462] Call Trace:
[   24.077488]  <TASK>
[   24.077512]  dump_stack_lvl+0x73/0xb0
[   24.077566]  print_report+0xd1/0x650
[   24.077603]  ? __virt_addr_valid+0x1db/0x2d0
[   24.077635]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   24.077671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.077710]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   24.077745]  kasan_report+0x141/0x180
[   24.078217]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   24.078286]  kasan_check_range+0x10c/0x1c0
[   24.078331]  __kasan_check_write+0x18/0x20
[   24.078394]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   24.078443]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.078492]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.078535]  ? trace_hardirqs_on+0x37/0xe0
[   24.078569]  ? kasan_bitops_generic+0x92/0x1c0
[   24.078618]  kasan_bitops_generic+0x116/0x1c0
[   24.078661]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.078715]  ? __pfx_read_tsc+0x10/0x10
[   24.078768]  ? ktime_get_ts64+0x86/0x230
[   24.078814]  kunit_try_run_case+0x1a5/0x480
[   24.078854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.078893]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.078930]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.078976]  ? __kthread_parkme+0x82/0x180
[   24.079025]  ? preempt_count_sub+0x50/0x80
[   24.079067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.079257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.079303]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.079334]  kthread+0x337/0x6f0
[   24.079357]  ? trace_preempt_on+0x20/0xc0
[   24.079396]  ? __pfx_kthread+0x10/0x10
[   24.079422]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.079447]  ? calculate_sigpending+0x7b/0xa0
[   24.079479]  ? __pfx_kthread+0x10/0x10
[   24.079510]  ret_from_fork+0x116/0x1d0
[   24.079543]  ? __pfx_kthread+0x10/0x10
[   24.079576]  ret_from_fork_asm+0x1a/0x30
[   24.079635]  </TASK>
[   24.079656] 
[   24.092637] Allocated by task 290:
[   24.092759]  kasan_save_stack+0x45/0x70
[   24.093043]  kasan_save_track+0x18/0x40
[   24.093401]  kasan_save_alloc_info+0x3b/0x50
[   24.094423]  __kasan_kmalloc+0xb7/0xc0
[   24.094665]  __kmalloc_cache_noprof+0x189/0x420
[   24.094824]  kasan_bitops_generic+0x92/0x1c0
[   24.095108]  kunit_try_run_case+0x1a5/0x480
[   24.095401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.095705]  kthread+0x337/0x6f0
[   24.095947]  ret_from_fork+0x116/0x1d0
[   24.096703]  ret_from_fork_asm+0x1a/0x30
[   24.096957] 
[   24.097065] The buggy address belongs to the object at ffff888101bb7fa0
[   24.097065]  which belongs to the cache kmalloc-16 of size 16
[   24.097643] The buggy address is located 8 bytes inside of
[   24.097643]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.098767] 
[   24.098859] The buggy address belongs to the physical page:
[   24.099585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.099997] flags: 0x200000000000000(node=0|zone=2)
[   24.100242] page_type: f5(slab)
[   24.100559] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.101117] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.101486] page dumped because: kasan: bad access detected
[   24.101759] 
[   24.101879] Memory state around the buggy address:
[   24.102184]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.102531]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.103035] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.103352]                                   ^
[   24.104044]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.104509]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.104835] ==================================================================
[   24.134956] ==================================================================
[   24.135411] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   24.135736] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.136169] 
[   24.136489] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.136591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.136616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.136651] Call Trace:
[   24.136676]  <TASK>
[   24.136704]  dump_stack_lvl+0x73/0xb0
[   24.136759]  print_report+0xd1/0x650
[   24.136800]  ? __virt_addr_valid+0x1db/0x2d0
[   24.136838]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   24.136880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.136925]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   24.136968]  kasan_report+0x141/0x180
[   24.137009]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   24.137062]  kasan_check_range+0x10c/0x1c0
[   24.137098]  __kasan_check_write+0x18/0x20
[   24.137134]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   24.137171]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.137209]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.137903]  ? trace_hardirqs_on+0x37/0xe0
[   24.137951]  ? kasan_bitops_generic+0x92/0x1c0
[   24.137977]  kasan_bitops_generic+0x116/0x1c0
[   24.137999]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.138033]  ? __pfx_read_tsc+0x10/0x10
[   24.138055]  ? ktime_get_ts64+0x86/0x230
[   24.138099]  kunit_try_run_case+0x1a5/0x480
[   24.138135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.138163]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.138193]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.138224]  ? __kthread_parkme+0x82/0x180
[   24.138252]  ? preempt_count_sub+0x50/0x80
[   24.138285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.138307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.138329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.138351]  kthread+0x337/0x6f0
[   24.138368]  ? trace_preempt_on+0x20/0xc0
[   24.138410]  ? __pfx_kthread+0x10/0x10
[   24.138429]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.138449]  ? calculate_sigpending+0x7b/0xa0
[   24.138471]  ? __pfx_kthread+0x10/0x10
[   24.138490]  ret_from_fork+0x116/0x1d0
[   24.138507]  ? __pfx_kthread+0x10/0x10
[   24.138526]  ret_from_fork_asm+0x1a/0x30
[   24.138556]  </TASK>
[   24.138567] 
[   24.148975] Allocated by task 290:
[   24.149619]  kasan_save_stack+0x45/0x70
[   24.150008]  kasan_save_track+0x18/0x40
[   24.150317]  kasan_save_alloc_info+0x3b/0x50
[   24.150592]  __kasan_kmalloc+0xb7/0xc0
[   24.150919]  __kmalloc_cache_noprof+0x189/0x420
[   24.151477]  kasan_bitops_generic+0x92/0x1c0
[   24.151874]  kunit_try_run_case+0x1a5/0x480
[   24.152355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.152717]  kthread+0x337/0x6f0
[   24.152872]  ret_from_fork+0x116/0x1d0
[   24.153017]  ret_from_fork_asm+0x1a/0x30
[   24.153168] 
[   24.153252] The buggy address belongs to the object at ffff888101bb7fa0
[   24.153252]  which belongs to the cache kmalloc-16 of size 16
[   24.154698] The buggy address is located 8 bytes inside of
[   24.154698]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.155772] 
[   24.156011] The buggy address belongs to the physical page:
[   24.156512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.156900] flags: 0x200000000000000(node=0|zone=2)
[   24.157674] page_type: f5(slab)
[   24.157869] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.158454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.159020] page dumped because: kasan: bad access detected
[   24.159566] 
[   24.159704] Memory state around the buggy address:
[   24.160028]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.160686]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.161482] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.161911]                                   ^
[   24.162100]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.162605]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.163133] ==================================================================
[   23.988711] ==================================================================
[   23.989208] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   23.989563] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   23.989969] 
[   23.990080] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   23.990165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.990189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.990224] Call Trace:
[   23.990251]  <TASK>
[   23.990278]  dump_stack_lvl+0x73/0xb0
[   23.990328]  print_report+0xd1/0x650
[   23.990368]  ? __virt_addr_valid+0x1db/0x2d0
[   23.990652]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   23.990700]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.990746]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   23.990791]  kasan_report+0x141/0x180
[   23.990841]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   23.990898]  kasan_check_range+0x10c/0x1c0
[   23.990942]  __kasan_check_write+0x18/0x20
[   23.990983]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   23.991029]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.991077]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.991120]  ? trace_hardirqs_on+0x37/0xe0
[   23.991159]  ? kasan_bitops_generic+0x92/0x1c0
[   23.991198]  kasan_bitops_generic+0x116/0x1c0
[   23.991227]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.991248]  ? __pfx_read_tsc+0x10/0x10
[   23.991266]  ? ktime_get_ts64+0x86/0x230
[   23.991287]  kunit_try_run_case+0x1a5/0x480
[   23.991308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.991326]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.991345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.991365]  ? __kthread_parkme+0x82/0x180
[   23.991399]  ? preempt_count_sub+0x50/0x80
[   23.991420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.991441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.991460]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.991480]  kthread+0x337/0x6f0
[   23.991496]  ? trace_preempt_on+0x20/0xc0
[   23.991514]  ? __pfx_kthread+0x10/0x10
[   23.991531]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.991549]  ? calculate_sigpending+0x7b/0xa0
[   23.991568]  ? __pfx_kthread+0x10/0x10
[   23.991586]  ret_from_fork+0x116/0x1d0
[   23.991602]  ? __pfx_kthread+0x10/0x10
[   23.991619]  ret_from_fork_asm+0x1a/0x30
[   23.991645]  </TASK>
[   23.991656] 
[   24.003324] Allocated by task 290:
[   24.003629]  kasan_save_stack+0x45/0x70
[   24.003884]  kasan_save_track+0x18/0x40
[   24.004033]  kasan_save_alloc_info+0x3b/0x50
[   24.004970]  __kasan_kmalloc+0xb7/0xc0
[   24.005409]  __kmalloc_cache_noprof+0x189/0x420
[   24.005781]  kasan_bitops_generic+0x92/0x1c0
[   24.006333]  kunit_try_run_case+0x1a5/0x480
[   24.006645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.006880]  kthread+0x337/0x6f0
[   24.007292]  ret_from_fork+0x116/0x1d0
[   24.007600]  ret_from_fork_asm+0x1a/0x30
[   24.007934] 
[   24.008375] The buggy address belongs to the object at ffff888101bb7fa0
[   24.008375]  which belongs to the cache kmalloc-16 of size 16
[   24.008941] The buggy address is located 8 bytes inside of
[   24.008941]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.009863] 
[   24.010040] The buggy address belongs to the physical page:
[   24.010589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.011037] flags: 0x200000000000000(node=0|zone=2)
[   24.011576] page_type: f5(slab)
[   24.011743] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.012552] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.012954] page dumped because: kasan: bad access detected
[   24.013282] 
[   24.013445] Memory state around the buggy address:
[   24.013708]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.014417]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.014887] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.015449]                                   ^
[   24.015725]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.016321]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.016729] ==================================================================
[   24.046742] ==================================================================
[   24.047299] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   24.047580] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.048240] 
[   24.048429] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.048504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.048525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.048560] Call Trace:
[   24.048586]  <TASK>
[   24.048612]  dump_stack_lvl+0x73/0xb0
[   24.048665]  print_report+0xd1/0x650
[   24.048705]  ? __virt_addr_valid+0x1db/0x2d0
[   24.048741]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   24.048914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.048969]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   24.049017]  kasan_report+0x141/0x180
[   24.049059]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   24.049107]  kasan_check_range+0x10c/0x1c0
[   24.049149]  __kasan_check_write+0x18/0x20
[   24.049199]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   24.049240]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.049275]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.049307]  ? trace_hardirqs_on+0x37/0xe0
[   24.049340]  ? kasan_bitops_generic+0x92/0x1c0
[   24.049398]  kasan_bitops_generic+0x116/0x1c0
[   24.049774]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.049864]  ? __pfx_read_tsc+0x10/0x10
[   24.049901]  ? ktime_get_ts64+0x86/0x230
[   24.049949]  kunit_try_run_case+0x1a5/0x480
[   24.050014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.050057]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.050106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.050145]  ? __kthread_parkme+0x82/0x180
[   24.050181]  ? preempt_count_sub+0x50/0x80
[   24.050222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.050489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.050544]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.050587]  kthread+0x337/0x6f0
[   24.050641]  ? trace_preempt_on+0x20/0xc0
[   24.050682]  ? __pfx_kthread+0x10/0x10
[   24.050720]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.050759]  ? calculate_sigpending+0x7b/0xa0
[   24.050798]  ? __pfx_kthread+0x10/0x10
[   24.050844]  ret_from_fork+0x116/0x1d0
[   24.050881]  ? __pfx_kthread+0x10/0x10
[   24.050935]  ret_from_fork_asm+0x1a/0x30
[   24.050977]  </TASK>
[   24.050990] 
[   24.061587] Allocated by task 290:
[   24.061850]  kasan_save_stack+0x45/0x70
[   24.062193]  kasan_save_track+0x18/0x40
[   24.062471]  kasan_save_alloc_info+0x3b/0x50
[   24.062773]  __kasan_kmalloc+0xb7/0xc0
[   24.063251]  __kmalloc_cache_noprof+0x189/0x420
[   24.063438]  kasan_bitops_generic+0x92/0x1c0
[   24.063691]  kunit_try_run_case+0x1a5/0x480
[   24.063999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.064276]  kthread+0x337/0x6f0
[   24.064976]  ret_from_fork+0x116/0x1d0
[   24.065171]  ret_from_fork_asm+0x1a/0x30
[   24.065320] 
[   24.065442] The buggy address belongs to the object at ffff888101bb7fa0
[   24.065442]  which belongs to the cache kmalloc-16 of size 16
[   24.066149] The buggy address is located 8 bytes inside of
[   24.066149]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.066774] 
[   24.066937] The buggy address belongs to the physical page:
[   24.067395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.067848] flags: 0x200000000000000(node=0|zone=2)
[   24.068570] page_type: f5(slab)
[   24.068770] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.069451] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.070052] page dumped because: kasan: bad access detected
[   24.070574] 
[   24.070682] Memory state around the buggy address:
[   24.070853]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.071424]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.072038] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.072757]                                   ^
[   24.073013]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.073559]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.074001] ==================================================================
[   24.017508] ==================================================================
[   24.017780] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   24.018606] Write of size 8 at addr ffff888101bb7fa8 by task kunit_try_catch/290
[   24.019041] 
[   24.019361] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.019469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.019493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.019542] Call Trace:
[   24.019568]  <TASK>
[   24.019592]  dump_stack_lvl+0x73/0xb0
[   24.019652]  print_report+0xd1/0x650
[   24.019705]  ? __virt_addr_valid+0x1db/0x2d0
[   24.019742]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   24.019783]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.019823]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   24.019897]  kasan_report+0x141/0x180
[   24.019956]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   24.020007]  kasan_check_range+0x10c/0x1c0
[   24.020061]  __kasan_check_write+0x18/0x20
[   24.020420]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   24.020468]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   24.020516]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.020557]  ? trace_hardirqs_on+0x37/0xe0
[   24.020608]  ? kasan_bitops_generic+0x92/0x1c0
[   24.020653]  kasan_bitops_generic+0x116/0x1c0
[   24.020696]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   24.020747]  ? __pfx_read_tsc+0x10/0x10
[   24.020788]  ? ktime_get_ts64+0x86/0x230
[   24.020860]  kunit_try_run_case+0x1a5/0x480
[   24.020893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.020913]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.020932]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.020952]  ? __kthread_parkme+0x82/0x180
[   24.020970]  ? preempt_count_sub+0x50/0x80
[   24.020989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.021008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.021028]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.021047]  kthread+0x337/0x6f0
[   24.021064]  ? trace_preempt_on+0x20/0xc0
[   24.021107]  ? __pfx_kthread+0x10/0x10
[   24.021125]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.021143]  ? calculate_sigpending+0x7b/0xa0
[   24.021162]  ? __pfx_kthread+0x10/0x10
[   24.021180]  ret_from_fork+0x116/0x1d0
[   24.021196]  ? __pfx_kthread+0x10/0x10
[   24.021213]  ret_from_fork_asm+0x1a/0x30
[   24.021240]  </TASK>
[   24.021250] 
[   24.033707] Allocated by task 290:
[   24.033854]  kasan_save_stack+0x45/0x70
[   24.034163]  kasan_save_track+0x18/0x40
[   24.034484]  kasan_save_alloc_info+0x3b/0x50
[   24.035147]  __kasan_kmalloc+0xb7/0xc0
[   24.035468]  __kmalloc_cache_noprof+0x189/0x420
[   24.035807]  kasan_bitops_generic+0x92/0x1c0
[   24.036026]  kunit_try_run_case+0x1a5/0x480
[   24.036326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.036678]  kthread+0x337/0x6f0
[   24.036834]  ret_from_fork+0x116/0x1d0
[   24.037334]  ret_from_fork_asm+0x1a/0x30
[   24.037660] 
[   24.037996] The buggy address belongs to the object at ffff888101bb7fa0
[   24.037996]  which belongs to the cache kmalloc-16 of size 16
[   24.038806] The buggy address is located 8 bytes inside of
[   24.038806]  allocated 9-byte region [ffff888101bb7fa0, ffff888101bb7fa9)
[   24.039409] 
[   24.039682] The buggy address belongs to the physical page:
[   24.039971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb7
[   24.040295] flags: 0x200000000000000(node=0|zone=2)
[   24.040795] page_type: f5(slab)
[   24.041061] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   24.041329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.042040] page dumped because: kasan: bad access detected
[   24.042660] 
[   24.042826] Memory state around the buggy address:
[   24.043122]  ffff888101bb7e80: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.043339]  ffff888101bb7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.043925] >ffff888101bb7f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.044529]                                   ^
[   24.044692]  ffff888101bb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.045493]  ffff888101bb8080: 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   24.045908] ==================================================================