Hay
Date
June 25, 2025, 8:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   28.929148] ==================================================================
[   28.929196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   28.929353] 
[   28.929712] Hardware name: linux,dummy-virt (DT)
[   28.929912]  print_report+0x118/0x608
[   28.930315]  kasan_bitops_generic+0x110/0x1c8
[   28.930801]  kasan_save_stack+0x3c/0x68
[   28.931513]  kasan_bitops_generic+0xa0/0x1c8
[   28.931931]  ret_from_fork+0x10/0x20
[   28.932990] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   28.934768] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   28.941543] Call trace:
[   28.943514]  kthread+0x328/0x630
[   28.944375]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.945262] 
[   28.945850] page dumped because: kasan: bad access detected
[   28.946826] ==================================================================

[   23.980318] ==================================================================
[   23.980679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   23.981101] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290
[   23.981365] 
[   23.981473] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   23.981522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.981534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.981556] Call Trace:
[   23.981575]  <TASK>
[   23.981594]  dump_stack_lvl+0x73/0xb0
[   23.981620]  print_report+0xd1/0x650
[   23.981640]  ? __virt_addr_valid+0x1db/0x2d0
[   23.981664]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   23.981688]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.981712]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   23.981736]  kasan_report+0x141/0x180
[   23.981756]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   23.981783]  kasan_check_range+0x10c/0x1c0
[   23.981805]  __kasan_check_write+0x18/0x20
[   23.981826]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   23.981850]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.981874]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.981897]  ? kasan_bitops_generic+0x92/0x1c0
[   23.981922]  kasan_bitops_generic+0x116/0x1c0
[   23.981954]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.981976]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.982002]  kunit_try_run_case+0x1a5/0x480
[   23.982028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.982048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.982069]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.982093]  ? __kthread_parkme+0x82/0x180
[   23.982112]  ? preempt_count_sub+0x50/0x80
[   23.982134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.982157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.982178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.982200]  kthread+0x337/0x6f0
[   23.982219]  ? trace_preempt_on+0x20/0xc0
[   23.982241]  ? __pfx_kthread+0x10/0x10
[   23.982260]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.982282]  ? calculate_sigpending+0x7b/0xa0
[   23.982330]  ? __pfx_kthread+0x10/0x10
[   23.982351]  ret_from_fork+0x116/0x1d0
[   23.982370]  ? __pfx_kthread+0x10/0x10
[   23.982389]  ret_from_fork_asm+0x1a/0x30
[   23.982419]  </TASK>
[   23.982429] 
[   23.990437] Allocated by task 290:
[   23.990640]  kasan_save_stack+0x45/0x70
[   23.990787]  kasan_save_track+0x18/0x40
[   23.991205]  kasan_save_alloc_info+0x3b/0x50
[   23.991376]  __kasan_kmalloc+0xb7/0xc0
[   23.991499]  __kmalloc_cache_noprof+0x189/0x420
[   23.991803]  kasan_bitops_generic+0x92/0x1c0
[   23.992197]  kunit_try_run_case+0x1a5/0x480
[   23.992361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.992522]  kthread+0x337/0x6f0
[   23.992631]  ret_from_fork+0x116/0x1d0
[   23.992805]  ret_from_fork_asm+0x1a/0x30
[   23.993001] 
[   23.993088] The buggy address belongs to the object at ffff888102797f40
[   23.993088]  which belongs to the cache kmalloc-16 of size 16
[   23.993736] The buggy address is located 8 bytes inside of
[   23.993736]  allocated 9-byte region [ffff888102797f40, ffff888102797f49)
[   23.994463] 
[   23.994533] The buggy address belongs to the physical page:
[   23.994711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797
[   23.995323] flags: 0x200000000000000(node=0|zone=2)
[   23.995892] page_type: f5(slab)
[   23.996110] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.996478] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.996792] page dumped because: kasan: bad access detected
[   23.997072] 
[   23.997199] Memory state around the buggy address:
[   23.997364]  ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.997572]  ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.997876] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.998197]                                               ^
[   23.998380]  ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.998588]  ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.999385] ==================================================================
[   23.960810] ==================================================================
[   23.961156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   23.961595] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290
[   23.961872] 
[   23.961971] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   23.962018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.962029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.962236] Call Trace:
[   23.962289]  <TASK>
[   23.962307]  dump_stack_lvl+0x73/0xb0
[   23.962335]  print_report+0xd1/0x650
[   23.962356]  ? __virt_addr_valid+0x1db/0x2d0
[   23.962377]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   23.962402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.962426]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   23.962450]  kasan_report+0x141/0x180
[   23.962470]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   23.962498]  kasan_check_range+0x10c/0x1c0
[   23.962520]  __kasan_check_write+0x18/0x20
[   23.962541]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   23.962564]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.962588]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.962612]  ? kasan_bitops_generic+0x92/0x1c0
[   23.962637]  kasan_bitops_generic+0x116/0x1c0
[   23.962658]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.962680]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.962706]  kunit_try_run_case+0x1a5/0x480
[   23.962730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.962751]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.962773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.962797]  ? __kthread_parkme+0x82/0x180
[   23.962818]  ? preempt_count_sub+0x50/0x80
[   23.962840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.962863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.962885]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.962908]  kthread+0x337/0x6f0
[   23.962927]  ? trace_preempt_on+0x20/0xc0
[   23.962961]  ? __pfx_kthread+0x10/0x10
[   23.962980]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.963001]  ? calculate_sigpending+0x7b/0xa0
[   23.963024]  ? __pfx_kthread+0x10/0x10
[   23.963044]  ret_from_fork+0x116/0x1d0
[   23.963062]  ? __pfx_kthread+0x10/0x10
[   23.963081]  ret_from_fork_asm+0x1a/0x30
[   23.963110]  </TASK>
[   23.963193] 
[   23.971118] Allocated by task 290:
[   23.971561]  kasan_save_stack+0x45/0x70
[   23.971797]  kasan_save_track+0x18/0x40
[   23.972014]  kasan_save_alloc_info+0x3b/0x50
[   23.972283]  __kasan_kmalloc+0xb7/0xc0
[   23.972418]  __kmalloc_cache_noprof+0x189/0x420
[   23.972565]  kasan_bitops_generic+0x92/0x1c0
[   23.972738]  kunit_try_run_case+0x1a5/0x480
[   23.973118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.973432]  kthread+0x337/0x6f0
[   23.973614]  ret_from_fork+0x116/0x1d0
[   23.973769]  ret_from_fork_asm+0x1a/0x30
[   23.974008] 
[   23.974103] The buggy address belongs to the object at ffff888102797f40
[   23.974103]  which belongs to the cache kmalloc-16 of size 16
[   23.974532] The buggy address is located 8 bytes inside of
[   23.974532]  allocated 9-byte region [ffff888102797f40, ffff888102797f49)
[   23.975270] 
[   23.975376] The buggy address belongs to the physical page:
[   23.975537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797
[   23.975761] flags: 0x200000000000000(node=0|zone=2)
[   23.976010] page_type: f5(slab)
[   23.976174] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.976614] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.977147] page dumped because: kasan: bad access detected
[   23.977318] 
[   23.977379] Memory state around the buggy address:
[   23.977547]  ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.977997]  ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.978330] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.978528]                                               ^
[   23.978750]  ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.979567]  ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.979926] ==================================================================
[   23.858674] ==================================================================
[   23.858923] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   23.859588] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290
[   23.860061] 
[   23.860219] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   23.860303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.860317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.860350] Call Trace:
[   23.860363]  <TASK>
[   23.860392]  dump_stack_lvl+0x73/0xb0
[   23.860420]  print_report+0xd1/0x650
[   23.860442]  ? __virt_addr_valid+0x1db/0x2d0
[   23.860465]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   23.860490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.860515]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   23.860539]  kasan_report+0x141/0x180
[   23.860560]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   23.860587]  kasan_check_range+0x10c/0x1c0
[   23.860609]  __kasan_check_write+0x18/0x20
[   23.860630]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   23.860654]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.860678]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.860701]  ? kasan_bitops_generic+0x92/0x1c0
[   23.860727]  kasan_bitops_generic+0x116/0x1c0
[   23.860748]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.860771]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.860797]  kunit_try_run_case+0x1a5/0x480
[   23.860822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.860843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.860864]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.860972]  ? __kthread_parkme+0x82/0x180
[   23.860994]  ? preempt_count_sub+0x50/0x80
[   23.861017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.861041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.861063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.861086]  kthread+0x337/0x6f0
[   23.861105]  ? trace_preempt_on+0x20/0xc0
[   23.861128]  ? __pfx_kthread+0x10/0x10
[   23.861158]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.861180]  ? calculate_sigpending+0x7b/0xa0
[   23.861203]  ? __pfx_kthread+0x10/0x10
[   23.861223]  ret_from_fork+0x116/0x1d0
[   23.861242]  ? __pfx_kthread+0x10/0x10
[   23.861261]  ret_from_fork_asm+0x1a/0x30
[   23.861289]  </TASK>
[   23.861300] 
[   23.870047] Allocated by task 290:
[   23.870192]  kasan_save_stack+0x45/0x70
[   23.870605]  kasan_save_track+0x18/0x40
[   23.870915]  kasan_save_alloc_info+0x3b/0x50
[   23.871558]  __kasan_kmalloc+0xb7/0xc0
[   23.871728]  __kmalloc_cache_noprof+0x189/0x420
[   23.871980]  kasan_bitops_generic+0x92/0x1c0
[   23.872120]  kunit_try_run_case+0x1a5/0x480
[   23.872399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.872677]  kthread+0x337/0x6f0
[   23.872792]  ret_from_fork+0x116/0x1d0
[   23.872916]  ret_from_fork_asm+0x1a/0x30
[   23.873114] 
[   23.873201] The buggy address belongs to the object at ffff888102797f40
[   23.873201]  which belongs to the cache kmalloc-16 of size 16
[   23.873656] The buggy address is located 8 bytes inside of
[   23.873656]  allocated 9-byte region [ffff888102797f40, ffff888102797f49)
[   23.874497] 
[   23.874579] The buggy address belongs to the physical page:
[   23.874951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797
[   23.875425] flags: 0x200000000000000(node=0|zone=2)
[   23.875614] page_type: f5(slab)
[   23.875803] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.876219] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.876527] page dumped because: kasan: bad access detected
[   23.876762] 
[   23.876904] Memory state around the buggy address:
[   23.877076]  ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.877287]  ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.878044] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.878335]                                               ^
[   23.878499]  ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.879029]  ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.879539] ==================================================================
[   23.880042] ==================================================================
[   23.880364] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   23.880650] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290
[   23.881136] 
[   23.881253] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   23.881322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.881334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.881356] Call Trace:
[   23.881375]  <TASK>
[   23.881394]  dump_stack_lvl+0x73/0xb0
[   23.881420]  print_report+0xd1/0x650
[   23.881445]  ? __virt_addr_valid+0x1db/0x2d0
[   23.881487]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   23.881511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.881535]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   23.881561]  kasan_report+0x141/0x180
[   23.881581]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   23.881610]  kasan_check_range+0x10c/0x1c0
[   23.881648]  __kasan_check_write+0x18/0x20
[   23.881670]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   23.881693]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.881718]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.881742]  ? kasan_bitops_generic+0x92/0x1c0
[   23.881767]  kasan_bitops_generic+0x116/0x1c0
[   23.881788]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.881859]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.881889]  kunit_try_run_case+0x1a5/0x480
[   23.881915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.881948]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.881969]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.881993]  ? __kthread_parkme+0x82/0x180
[   23.882013]  ? preempt_count_sub+0x50/0x80
[   23.882036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.882058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.882103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.882133]  kthread+0x337/0x6f0
[   23.882152]  ? trace_preempt_on+0x20/0xc0
[   23.882176]  ? __pfx_kthread+0x10/0x10
[   23.882196]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.882218]  ? calculate_sigpending+0x7b/0xa0
[   23.882240]  ? __pfx_kthread+0x10/0x10
[   23.882260]  ret_from_fork+0x116/0x1d0
[   23.882280]  ? __pfx_kthread+0x10/0x10
[   23.882299]  ret_from_fork_asm+0x1a/0x30
[   23.882329]  </TASK>
[   23.882339] 
[   23.891035] Allocated by task 290:
[   23.891272]  kasan_save_stack+0x45/0x70
[   23.891458]  kasan_save_track+0x18/0x40
[   23.891586]  kasan_save_alloc_info+0x3b/0x50
[   23.891734]  __kasan_kmalloc+0xb7/0xc0
[   23.891913]  __kmalloc_cache_noprof+0x189/0x420
[   23.892462]  kasan_bitops_generic+0x92/0x1c0
[   23.892671]  kunit_try_run_case+0x1a5/0x480
[   23.892928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.893341]  kthread+0x337/0x6f0
[   23.893518]  ret_from_fork+0x116/0x1d0
[   23.893670]  ret_from_fork_asm+0x1a/0x30
[   23.893802] 
[   23.893867] The buggy address belongs to the object at ffff888102797f40
[   23.893867]  which belongs to the cache kmalloc-16 of size 16
[   23.894530] The buggy address is located 8 bytes inside of
[   23.894530]  allocated 9-byte region [ffff888102797f40, ffff888102797f49)
[   23.895091] 
[   23.895264] The buggy address belongs to the physical page:
[   23.895511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797
[   23.896172] flags: 0x200000000000000(node=0|zone=2)
[   23.896349] page_type: f5(slab)
[   23.896467] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.896890] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.897399] page dumped because: kasan: bad access detected
[   23.897645] 
[   23.897709] Memory state around the buggy address:
[   23.897885]  ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.898331]  ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.898684] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.899061]                                               ^
[   23.899324]  ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.899561]  ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.899974] ==================================================================
[   23.921038] ==================================================================
[   23.921582] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   23.922119] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290
[   23.922427] 
[   23.922513] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   23.922563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.922575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.922597] Call Trace:
[   23.922618]  <TASK>
[   23.922638]  dump_stack_lvl+0x73/0xb0
[   23.922690]  print_report+0xd1/0x650
[   23.922712]  ? __virt_addr_valid+0x1db/0x2d0
[   23.922735]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   23.922759]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.922800]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   23.922824]  kasan_report+0x141/0x180
[   23.922844]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   23.922872]  kasan_check_range+0x10c/0x1c0
[   23.922894]  __kasan_check_write+0x18/0x20
[   23.922916]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   23.923138]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.923174]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.923198]  ? kasan_bitops_generic+0x92/0x1c0
[   23.923223]  kasan_bitops_generic+0x116/0x1c0
[   23.923244]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.923267]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.923365]  kunit_try_run_case+0x1a5/0x480
[   23.923392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.923413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.923434]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.923476]  ? __kthread_parkme+0x82/0x180
[   23.923497]  ? preempt_count_sub+0x50/0x80
[   23.923520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.923542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.923564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.923587]  kthread+0x337/0x6f0
[   23.923606]  ? trace_preempt_on+0x20/0xc0
[   23.923630]  ? __pfx_kthread+0x10/0x10
[   23.923650]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.923672]  ? calculate_sigpending+0x7b/0xa0
[   23.923694]  ? __pfx_kthread+0x10/0x10
[   23.923714]  ret_from_fork+0x116/0x1d0
[   23.923732]  ? __pfx_kthread+0x10/0x10
[   23.923751]  ret_from_fork_asm+0x1a/0x30
[   23.923780]  </TASK>
[   23.923792] 
[   23.932060] Allocated by task 290:
[   23.932205]  kasan_save_stack+0x45/0x70
[   23.932436]  kasan_save_track+0x18/0x40
[   23.932622]  kasan_save_alloc_info+0x3b/0x50
[   23.932818]  __kasan_kmalloc+0xb7/0xc0
[   23.933262]  __kmalloc_cache_noprof+0x189/0x420
[   23.933450]  kasan_bitops_generic+0x92/0x1c0
[   23.933592]  kunit_try_run_case+0x1a5/0x480
[   23.933729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.934048]  kthread+0x337/0x6f0
[   23.934366]  ret_from_fork+0x116/0x1d0
[   23.934546]  ret_from_fork_asm+0x1a/0x30
[   23.934731] 
[   23.934855] The buggy address belongs to the object at ffff888102797f40
[   23.934855]  which belongs to the cache kmalloc-16 of size 16
[   23.935452] The buggy address is located 8 bytes inside of
[   23.935452]  allocated 9-byte region [ffff888102797f40, ffff888102797f49)
[   23.935817] 
[   23.935882] The buggy address belongs to the physical page:
[   23.936132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797
[   23.936592] flags: 0x200000000000000(node=0|zone=2)
[   23.936760] page_type: f5(slab)
[   23.937039] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.937653] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.938100] page dumped because: kasan: bad access detected
[   23.938298] 
[   23.938362] Memory state around the buggy address:
[   23.938509]  ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.938722]  ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.939133] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.939464]                                               ^
[   23.939953]  ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.940546]  ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.941022] ==================================================================
[   23.900772] ==================================================================
[   23.901083] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   23.901701] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290
[   23.902083] 
[   23.902175] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   23.902225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.902236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.902257] Call Trace:
[   23.902278]  <TASK>
[   23.902299]  dump_stack_lvl+0x73/0xb0
[   23.902355]  print_report+0xd1/0x650
[   23.902378]  ? __virt_addr_valid+0x1db/0x2d0
[   23.902401]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   23.902443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.902468]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   23.902502]  kasan_report+0x141/0x180
[   23.902534]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   23.902562]  kasan_check_range+0x10c/0x1c0
[   23.902584]  __kasan_check_write+0x18/0x20
[   23.902605]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   23.902628]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.902652]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.902676]  ? kasan_bitops_generic+0x92/0x1c0
[   23.902701]  kasan_bitops_generic+0x116/0x1c0
[   23.902722]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.902744]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.902771]  kunit_try_run_case+0x1a5/0x480
[   23.902796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.902817]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.902838]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.902863]  ? __kthread_parkme+0x82/0x180
[   23.902883]  ? preempt_count_sub+0x50/0x80
[   23.902905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.902928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.902962]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.902984]  kthread+0x337/0x6f0
[   23.903003]  ? trace_preempt_on+0x20/0xc0
[   23.903027]  ? __pfx_kthread+0x10/0x10
[   23.903046]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.903068]  ? calculate_sigpending+0x7b/0xa0
[   23.903092]  ? __pfx_kthread+0x10/0x10
[   23.903112]  ret_from_fork+0x116/0x1d0
[   23.903131]  ? __pfx_kthread+0x10/0x10
[   23.903149]  ret_from_fork_asm+0x1a/0x30
[   23.903179]  </TASK>
[   23.903190] 
[   23.911871] Allocated by task 290:
[   23.912086]  kasan_save_stack+0x45/0x70
[   23.912305]  kasan_save_track+0x18/0x40
[   23.912517]  kasan_save_alloc_info+0x3b/0x50
[   23.912723]  __kasan_kmalloc+0xb7/0xc0
[   23.912950]  __kmalloc_cache_noprof+0x189/0x420
[   23.913204]  kasan_bitops_generic+0x92/0x1c0
[   23.913405]  kunit_try_run_case+0x1a5/0x480
[   23.913581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.913948]  kthread+0x337/0x6f0
[   23.914114]  ret_from_fork+0x116/0x1d0
[   23.914268]  ret_from_fork_asm+0x1a/0x30
[   23.914399] 
[   23.914462] The buggy address belongs to the object at ffff888102797f40
[   23.914462]  which belongs to the cache kmalloc-16 of size 16
[   23.915022] The buggy address is located 8 bytes inside of
[   23.915022]  allocated 9-byte region [ffff888102797f40, ffff888102797f49)
[   23.915676] 
[   23.915766] The buggy address belongs to the physical page:
[   23.916112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797
[   23.916445] flags: 0x200000000000000(node=0|zone=2)
[   23.916604] page_type: f5(slab)
[   23.916719] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.917444] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.917983] page dumped because: kasan: bad access detected
[   23.918258] 
[   23.918362] Memory state around the buggy address:
[   23.918540]  ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.918799]  ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.919358] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.919647]                                               ^
[   23.919898]  ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.920139]  ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.920561] ==================================================================
[   23.836042] ==================================================================
[   23.836592] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   23.836970] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290
[   23.837274] 
[   23.837360] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   23.837415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.837427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.837449] Call Trace:
[   23.837462]  <TASK>
[   23.837480]  dump_stack_lvl+0x73/0xb0
[   23.837533]  print_report+0xd1/0x650
[   23.837555]  ? __virt_addr_valid+0x1db/0x2d0
[   23.837802]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   23.837831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.837856]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   23.837880]  kasan_report+0x141/0x180
[   23.837900]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   23.837928]  kasan_check_range+0x10c/0x1c0
[   23.837961]  __kasan_check_write+0x18/0x20
[   23.837983]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   23.838007]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.838031]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.838056]  ? kasan_bitops_generic+0x92/0x1c0
[   23.838081]  kasan_bitops_generic+0x116/0x1c0
[   23.838103]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.838127]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.838153]  kunit_try_run_case+0x1a5/0x480
[   23.838178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.838200]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.838221]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.838246]  ? __kthread_parkme+0x82/0x180
[   23.838267]  ? preempt_count_sub+0x50/0x80
[   23.838289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.838312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.838343]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.838366]  kthread+0x337/0x6f0
[   23.838384]  ? trace_preempt_on+0x20/0xc0
[   23.838406]  ? __pfx_kthread+0x10/0x10
[   23.838425]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.838448]  ? calculate_sigpending+0x7b/0xa0
[   23.838471]  ? __pfx_kthread+0x10/0x10
[   23.838491]  ret_from_fork+0x116/0x1d0
[   23.838510]  ? __pfx_kthread+0x10/0x10
[   23.838529]  ret_from_fork_asm+0x1a/0x30
[   23.838558]  </TASK>
[   23.838568] 
[   23.848854] Allocated by task 290:
[   23.849455]  kasan_save_stack+0x45/0x70
[   23.849611]  kasan_save_track+0x18/0x40
[   23.849800]  kasan_save_alloc_info+0x3b/0x50
[   23.850194]  __kasan_kmalloc+0xb7/0xc0
[   23.850359]  __kmalloc_cache_noprof+0x189/0x420
[   23.850511]  kasan_bitops_generic+0x92/0x1c0
[   23.850713]  kunit_try_run_case+0x1a5/0x480
[   23.850987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.851314]  kthread+0x337/0x6f0
[   23.851433]  ret_from_fork+0x116/0x1d0
[   23.851556]  ret_from_fork_asm+0x1a/0x30
[   23.851744] 
[   23.851833] The buggy address belongs to the object at ffff888102797f40
[   23.851833]  which belongs to the cache kmalloc-16 of size 16
[   23.852543] The buggy address is located 8 bytes inside of
[   23.852543]  allocated 9-byte region [ffff888102797f40, ffff888102797f49)
[   23.852994] 
[   23.853063] The buggy address belongs to the physical page:
[   23.853524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797
[   23.853926] flags: 0x200000000000000(node=0|zone=2)
[   23.854322] page_type: f5(slab)
[   23.854470] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.854814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.855156] page dumped because: kasan: bad access detected
[   23.855440] 
[   23.855523] Memory state around the buggy address:
[   23.855757]  ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.856073]  ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.856457] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.856751]                                               ^
[   23.857267]  ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.857509]  ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.857986] ==================================================================
[   23.941444] ==================================================================
[   23.941796] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   23.942126] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290
[   23.942467] 
[   23.942685] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   23.942738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.942750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.942772] Call Trace:
[   23.942855]  <TASK>
[   23.942879]  dump_stack_lvl+0x73/0xb0
[   23.942907]  print_report+0xd1/0x650
[   23.942927]  ? __virt_addr_valid+0x1db/0x2d0
[   23.942963]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   23.942987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.943013]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   23.943036]  kasan_report+0x141/0x180
[   23.943057]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   23.943084]  kasan_check_range+0x10c/0x1c0
[   23.943106]  __kasan_check_write+0x18/0x20
[   23.943129]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   23.943152]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   23.943177]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.943200]  ? kasan_bitops_generic+0x92/0x1c0
[   23.943225]  kasan_bitops_generic+0x116/0x1c0
[   23.943247]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.943269]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.943295]  kunit_try_run_case+0x1a5/0x480
[   23.943321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.943343]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.943363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.943387]  ? __kthread_parkme+0x82/0x180
[   23.943407]  ? preempt_count_sub+0x50/0x80
[   23.943429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.943452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.943474]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.943496]  kthread+0x337/0x6f0
[   23.943515]  ? trace_preempt_on+0x20/0xc0
[   23.943538]  ? __pfx_kthread+0x10/0x10
[   23.943557]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.943578]  ? calculate_sigpending+0x7b/0xa0
[   23.943602]  ? __pfx_kthread+0x10/0x10
[   23.943625]  ret_from_fork+0x116/0x1d0
[   23.943644]  ? __pfx_kthread+0x10/0x10
[   23.943664]  ret_from_fork_asm+0x1a/0x30
[   23.943694]  </TASK>
[   23.943704] 
[   23.951704] Allocated by task 290:
[   23.951830]  kasan_save_stack+0x45/0x70
[   23.952050]  kasan_save_track+0x18/0x40
[   23.952231]  kasan_save_alloc_info+0x3b/0x50
[   23.952442]  __kasan_kmalloc+0xb7/0xc0
[   23.952681]  __kmalloc_cache_noprof+0x189/0x420
[   23.953058]  kasan_bitops_generic+0x92/0x1c0
[   23.953291]  kunit_try_run_case+0x1a5/0x480
[   23.953539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.953710]  kthread+0x337/0x6f0
[   23.953994]  ret_from_fork+0x116/0x1d0
[   23.954282]  ret_from_fork_asm+0x1a/0x30
[   23.954608] 
[   23.954675] The buggy address belongs to the object at ffff888102797f40
[   23.954675]  which belongs to the cache kmalloc-16 of size 16
[   23.955190] The buggy address is located 8 bytes inside of
[   23.955190]  allocated 9-byte region [ffff888102797f40, ffff888102797f49)
[   23.955715] 
[   23.955780] The buggy address belongs to the physical page:
[   23.955950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797
[   23.956515] flags: 0x200000000000000(node=0|zone=2)
[   23.956735] page_type: f5(slab)
[   23.956893] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   23.957402] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.957625] page dumped because: kasan: bad access detected
[   23.957976] 
[   23.958097] Memory state around the buggy address:
[   23.958543]  ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.958844]  ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.959279] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   23.959581]                                               ^
[   23.959801]  ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.960155]  ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.960370] ==================================================================