Date
June 25, 2025, 8:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 28.929148] ================================================================== [ 28.929196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 28.929353] [ 28.929712] Hardware name: linux,dummy-virt (DT) [ 28.929912] print_report+0x118/0x608 [ 28.930315] kasan_bitops_generic+0x110/0x1c8 [ 28.930801] kasan_save_stack+0x3c/0x68 [ 28.931513] kasan_bitops_generic+0xa0/0x1c8 [ 28.931931] ret_from_fork+0x10/0x20 [ 28.932990] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 28.934768] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 28.941543] Call trace: [ 28.943514] kthread+0x328/0x630 [ 28.944375] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.945262] [ 28.945850] page dumped because: kasan: bad access detected [ 28.946826] ==================================================================
[ 23.980318] ================================================================== [ 23.980679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 23.981101] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 23.981365] [ 23.981473] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 23.981522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.981534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.981556] Call Trace: [ 23.981575] <TASK> [ 23.981594] dump_stack_lvl+0x73/0xb0 [ 23.981620] print_report+0xd1/0x650 [ 23.981640] ? __virt_addr_valid+0x1db/0x2d0 [ 23.981664] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 23.981688] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.981712] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 23.981736] kasan_report+0x141/0x180 [ 23.981756] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 23.981783] kasan_check_range+0x10c/0x1c0 [ 23.981805] __kasan_check_write+0x18/0x20 [ 23.981826] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 23.981850] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.981874] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.981897] ? kasan_bitops_generic+0x92/0x1c0 [ 23.981922] kasan_bitops_generic+0x116/0x1c0 [ 23.981954] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.981976] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.982002] kunit_try_run_case+0x1a5/0x480 [ 23.982028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.982048] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.982069] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.982093] ? __kthread_parkme+0x82/0x180 [ 23.982112] ? preempt_count_sub+0x50/0x80 [ 23.982134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.982157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.982178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.982200] kthread+0x337/0x6f0 [ 23.982219] ? trace_preempt_on+0x20/0xc0 [ 23.982241] ? __pfx_kthread+0x10/0x10 [ 23.982260] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.982282] ? calculate_sigpending+0x7b/0xa0 [ 23.982330] ? __pfx_kthread+0x10/0x10 [ 23.982351] ret_from_fork+0x116/0x1d0 [ 23.982370] ? __pfx_kthread+0x10/0x10 [ 23.982389] ret_from_fork_asm+0x1a/0x30 [ 23.982419] </TASK> [ 23.982429] [ 23.990437] Allocated by task 290: [ 23.990640] kasan_save_stack+0x45/0x70 [ 23.990787] kasan_save_track+0x18/0x40 [ 23.991205] kasan_save_alloc_info+0x3b/0x50 [ 23.991376] __kasan_kmalloc+0xb7/0xc0 [ 23.991499] __kmalloc_cache_noprof+0x189/0x420 [ 23.991803] kasan_bitops_generic+0x92/0x1c0 [ 23.992197] kunit_try_run_case+0x1a5/0x480 [ 23.992361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.992522] kthread+0x337/0x6f0 [ 23.992631] ret_from_fork+0x116/0x1d0 [ 23.992805] ret_from_fork_asm+0x1a/0x30 [ 23.993001] [ 23.993088] The buggy address belongs to the object at ffff888102797f40 [ 23.993088] which belongs to the cache kmalloc-16 of size 16 [ 23.993736] The buggy address is located 8 bytes inside of [ 23.993736] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 23.994463] [ 23.994533] The buggy address belongs to the physical page: [ 23.994711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 23.995323] flags: 0x200000000000000(node=0|zone=2) [ 23.995892] page_type: f5(slab) [ 23.996110] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 23.996478] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.996792] page dumped because: kasan: bad access detected [ 23.997072] [ 23.997199] Memory state around the buggy address: [ 23.997364] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.997572] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.997876] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.998197] ^ [ 23.998380] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.998588] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.999385] ================================================================== [ 23.960810] ================================================================== [ 23.961156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 23.961595] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 23.961872] [ 23.961971] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 23.962018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.962029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.962236] Call Trace: [ 23.962289] <TASK> [ 23.962307] dump_stack_lvl+0x73/0xb0 [ 23.962335] print_report+0xd1/0x650 [ 23.962356] ? __virt_addr_valid+0x1db/0x2d0 [ 23.962377] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 23.962402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.962426] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 23.962450] kasan_report+0x141/0x180 [ 23.962470] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 23.962498] kasan_check_range+0x10c/0x1c0 [ 23.962520] __kasan_check_write+0x18/0x20 [ 23.962541] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 23.962564] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.962588] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.962612] ? kasan_bitops_generic+0x92/0x1c0 [ 23.962637] kasan_bitops_generic+0x116/0x1c0 [ 23.962658] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.962680] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.962706] kunit_try_run_case+0x1a5/0x480 [ 23.962730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.962751] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.962773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.962797] ? __kthread_parkme+0x82/0x180 [ 23.962818] ? preempt_count_sub+0x50/0x80 [ 23.962840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.962863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.962885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.962908] kthread+0x337/0x6f0 [ 23.962927] ? trace_preempt_on+0x20/0xc0 [ 23.962961] ? __pfx_kthread+0x10/0x10 [ 23.962980] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.963001] ? calculate_sigpending+0x7b/0xa0 [ 23.963024] ? __pfx_kthread+0x10/0x10 [ 23.963044] ret_from_fork+0x116/0x1d0 [ 23.963062] ? __pfx_kthread+0x10/0x10 [ 23.963081] ret_from_fork_asm+0x1a/0x30 [ 23.963110] </TASK> [ 23.963193] [ 23.971118] Allocated by task 290: [ 23.971561] kasan_save_stack+0x45/0x70 [ 23.971797] kasan_save_track+0x18/0x40 [ 23.972014] kasan_save_alloc_info+0x3b/0x50 [ 23.972283] __kasan_kmalloc+0xb7/0xc0 [ 23.972418] __kmalloc_cache_noprof+0x189/0x420 [ 23.972565] kasan_bitops_generic+0x92/0x1c0 [ 23.972738] kunit_try_run_case+0x1a5/0x480 [ 23.973118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.973432] kthread+0x337/0x6f0 [ 23.973614] ret_from_fork+0x116/0x1d0 [ 23.973769] ret_from_fork_asm+0x1a/0x30 [ 23.974008] [ 23.974103] The buggy address belongs to the object at ffff888102797f40 [ 23.974103] which belongs to the cache kmalloc-16 of size 16 [ 23.974532] The buggy address is located 8 bytes inside of [ 23.974532] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 23.975270] [ 23.975376] The buggy address belongs to the physical page: [ 23.975537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 23.975761] flags: 0x200000000000000(node=0|zone=2) [ 23.976010] page_type: f5(slab) [ 23.976174] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 23.976614] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.977147] page dumped because: kasan: bad access detected [ 23.977318] [ 23.977379] Memory state around the buggy address: [ 23.977547] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.977997] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.978330] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.978528] ^ [ 23.978750] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.979567] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.979926] ================================================================== [ 23.858674] ================================================================== [ 23.858923] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 23.859588] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 23.860061] [ 23.860219] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 23.860303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.860317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.860350] Call Trace: [ 23.860363] <TASK> [ 23.860392] dump_stack_lvl+0x73/0xb0 [ 23.860420] print_report+0xd1/0x650 [ 23.860442] ? __virt_addr_valid+0x1db/0x2d0 [ 23.860465] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 23.860490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.860515] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 23.860539] kasan_report+0x141/0x180 [ 23.860560] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 23.860587] kasan_check_range+0x10c/0x1c0 [ 23.860609] __kasan_check_write+0x18/0x20 [ 23.860630] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 23.860654] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.860678] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.860701] ? kasan_bitops_generic+0x92/0x1c0 [ 23.860727] kasan_bitops_generic+0x116/0x1c0 [ 23.860748] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.860771] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.860797] kunit_try_run_case+0x1a5/0x480 [ 23.860822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.860843] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.860864] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.860972] ? __kthread_parkme+0x82/0x180 [ 23.860994] ? preempt_count_sub+0x50/0x80 [ 23.861017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.861041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.861063] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.861086] kthread+0x337/0x6f0 [ 23.861105] ? trace_preempt_on+0x20/0xc0 [ 23.861128] ? __pfx_kthread+0x10/0x10 [ 23.861158] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.861180] ? calculate_sigpending+0x7b/0xa0 [ 23.861203] ? __pfx_kthread+0x10/0x10 [ 23.861223] ret_from_fork+0x116/0x1d0 [ 23.861242] ? __pfx_kthread+0x10/0x10 [ 23.861261] ret_from_fork_asm+0x1a/0x30 [ 23.861289] </TASK> [ 23.861300] [ 23.870047] Allocated by task 290: [ 23.870192] kasan_save_stack+0x45/0x70 [ 23.870605] kasan_save_track+0x18/0x40 [ 23.870915] kasan_save_alloc_info+0x3b/0x50 [ 23.871558] __kasan_kmalloc+0xb7/0xc0 [ 23.871728] __kmalloc_cache_noprof+0x189/0x420 [ 23.871980] kasan_bitops_generic+0x92/0x1c0 [ 23.872120] kunit_try_run_case+0x1a5/0x480 [ 23.872399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.872677] kthread+0x337/0x6f0 [ 23.872792] ret_from_fork+0x116/0x1d0 [ 23.872916] ret_from_fork_asm+0x1a/0x30 [ 23.873114] [ 23.873201] The buggy address belongs to the object at ffff888102797f40 [ 23.873201] which belongs to the cache kmalloc-16 of size 16 [ 23.873656] The buggy address is located 8 bytes inside of [ 23.873656] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 23.874497] [ 23.874579] The buggy address belongs to the physical page: [ 23.874951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 23.875425] flags: 0x200000000000000(node=0|zone=2) [ 23.875614] page_type: f5(slab) [ 23.875803] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 23.876219] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.876527] page dumped because: kasan: bad access detected [ 23.876762] [ 23.876904] Memory state around the buggy address: [ 23.877076] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.877287] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.878044] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.878335] ^ [ 23.878499] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.879029] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.879539] ================================================================== [ 23.880042] ================================================================== [ 23.880364] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 23.880650] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 23.881136] [ 23.881253] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 23.881322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.881334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.881356] Call Trace: [ 23.881375] <TASK> [ 23.881394] dump_stack_lvl+0x73/0xb0 [ 23.881420] print_report+0xd1/0x650 [ 23.881445] ? __virt_addr_valid+0x1db/0x2d0 [ 23.881487] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 23.881511] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.881535] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 23.881561] kasan_report+0x141/0x180 [ 23.881581] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 23.881610] kasan_check_range+0x10c/0x1c0 [ 23.881648] __kasan_check_write+0x18/0x20 [ 23.881670] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 23.881693] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.881718] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.881742] ? kasan_bitops_generic+0x92/0x1c0 [ 23.881767] kasan_bitops_generic+0x116/0x1c0 [ 23.881788] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.881859] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.881889] kunit_try_run_case+0x1a5/0x480 [ 23.881915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.881948] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.881969] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.881993] ? __kthread_parkme+0x82/0x180 [ 23.882013] ? preempt_count_sub+0x50/0x80 [ 23.882036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.882058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.882103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.882133] kthread+0x337/0x6f0 [ 23.882152] ? trace_preempt_on+0x20/0xc0 [ 23.882176] ? __pfx_kthread+0x10/0x10 [ 23.882196] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.882218] ? calculate_sigpending+0x7b/0xa0 [ 23.882240] ? __pfx_kthread+0x10/0x10 [ 23.882260] ret_from_fork+0x116/0x1d0 [ 23.882280] ? __pfx_kthread+0x10/0x10 [ 23.882299] ret_from_fork_asm+0x1a/0x30 [ 23.882329] </TASK> [ 23.882339] [ 23.891035] Allocated by task 290: [ 23.891272] kasan_save_stack+0x45/0x70 [ 23.891458] kasan_save_track+0x18/0x40 [ 23.891586] kasan_save_alloc_info+0x3b/0x50 [ 23.891734] __kasan_kmalloc+0xb7/0xc0 [ 23.891913] __kmalloc_cache_noprof+0x189/0x420 [ 23.892462] kasan_bitops_generic+0x92/0x1c0 [ 23.892671] kunit_try_run_case+0x1a5/0x480 [ 23.892928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.893341] kthread+0x337/0x6f0 [ 23.893518] ret_from_fork+0x116/0x1d0 [ 23.893670] ret_from_fork_asm+0x1a/0x30 [ 23.893802] [ 23.893867] The buggy address belongs to the object at ffff888102797f40 [ 23.893867] which belongs to the cache kmalloc-16 of size 16 [ 23.894530] The buggy address is located 8 bytes inside of [ 23.894530] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 23.895091] [ 23.895264] The buggy address belongs to the physical page: [ 23.895511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 23.896172] flags: 0x200000000000000(node=0|zone=2) [ 23.896349] page_type: f5(slab) [ 23.896467] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 23.896890] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.897399] page dumped because: kasan: bad access detected [ 23.897645] [ 23.897709] Memory state around the buggy address: [ 23.897885] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.898331] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.898684] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.899061] ^ [ 23.899324] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.899561] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.899974] ================================================================== [ 23.921038] ================================================================== [ 23.921582] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 23.922119] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 23.922427] [ 23.922513] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 23.922563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.922575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.922597] Call Trace: [ 23.922618] <TASK> [ 23.922638] dump_stack_lvl+0x73/0xb0 [ 23.922690] print_report+0xd1/0x650 [ 23.922712] ? __virt_addr_valid+0x1db/0x2d0 [ 23.922735] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 23.922759] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.922800] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 23.922824] kasan_report+0x141/0x180 [ 23.922844] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 23.922872] kasan_check_range+0x10c/0x1c0 [ 23.922894] __kasan_check_write+0x18/0x20 [ 23.922916] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 23.923138] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.923174] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.923198] ? kasan_bitops_generic+0x92/0x1c0 [ 23.923223] kasan_bitops_generic+0x116/0x1c0 [ 23.923244] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.923267] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.923365] kunit_try_run_case+0x1a5/0x480 [ 23.923392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.923413] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.923434] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.923476] ? __kthread_parkme+0x82/0x180 [ 23.923497] ? preempt_count_sub+0x50/0x80 [ 23.923520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.923542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.923564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.923587] kthread+0x337/0x6f0 [ 23.923606] ? trace_preempt_on+0x20/0xc0 [ 23.923630] ? __pfx_kthread+0x10/0x10 [ 23.923650] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.923672] ? calculate_sigpending+0x7b/0xa0 [ 23.923694] ? __pfx_kthread+0x10/0x10 [ 23.923714] ret_from_fork+0x116/0x1d0 [ 23.923732] ? __pfx_kthread+0x10/0x10 [ 23.923751] ret_from_fork_asm+0x1a/0x30 [ 23.923780] </TASK> [ 23.923792] [ 23.932060] Allocated by task 290: [ 23.932205] kasan_save_stack+0x45/0x70 [ 23.932436] kasan_save_track+0x18/0x40 [ 23.932622] kasan_save_alloc_info+0x3b/0x50 [ 23.932818] __kasan_kmalloc+0xb7/0xc0 [ 23.933262] __kmalloc_cache_noprof+0x189/0x420 [ 23.933450] kasan_bitops_generic+0x92/0x1c0 [ 23.933592] kunit_try_run_case+0x1a5/0x480 [ 23.933729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.934048] kthread+0x337/0x6f0 [ 23.934366] ret_from_fork+0x116/0x1d0 [ 23.934546] ret_from_fork_asm+0x1a/0x30 [ 23.934731] [ 23.934855] The buggy address belongs to the object at ffff888102797f40 [ 23.934855] which belongs to the cache kmalloc-16 of size 16 [ 23.935452] The buggy address is located 8 bytes inside of [ 23.935452] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 23.935817] [ 23.935882] The buggy address belongs to the physical page: [ 23.936132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 23.936592] flags: 0x200000000000000(node=0|zone=2) [ 23.936760] page_type: f5(slab) [ 23.937039] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 23.937653] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.938100] page dumped because: kasan: bad access detected [ 23.938298] [ 23.938362] Memory state around the buggy address: [ 23.938509] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.938722] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.939133] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.939464] ^ [ 23.939953] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.940546] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.941022] ================================================================== [ 23.900772] ================================================================== [ 23.901083] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 23.901701] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 23.902083] [ 23.902175] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 23.902225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.902236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.902257] Call Trace: [ 23.902278] <TASK> [ 23.902299] dump_stack_lvl+0x73/0xb0 [ 23.902355] print_report+0xd1/0x650 [ 23.902378] ? __virt_addr_valid+0x1db/0x2d0 [ 23.902401] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 23.902443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.902468] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 23.902502] kasan_report+0x141/0x180 [ 23.902534] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 23.902562] kasan_check_range+0x10c/0x1c0 [ 23.902584] __kasan_check_write+0x18/0x20 [ 23.902605] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 23.902628] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.902652] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.902676] ? kasan_bitops_generic+0x92/0x1c0 [ 23.902701] kasan_bitops_generic+0x116/0x1c0 [ 23.902722] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.902744] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.902771] kunit_try_run_case+0x1a5/0x480 [ 23.902796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.902817] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.902838] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.902863] ? __kthread_parkme+0x82/0x180 [ 23.902883] ? preempt_count_sub+0x50/0x80 [ 23.902905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.902928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.902962] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.902984] kthread+0x337/0x6f0 [ 23.903003] ? trace_preempt_on+0x20/0xc0 [ 23.903027] ? __pfx_kthread+0x10/0x10 [ 23.903046] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.903068] ? calculate_sigpending+0x7b/0xa0 [ 23.903092] ? __pfx_kthread+0x10/0x10 [ 23.903112] ret_from_fork+0x116/0x1d0 [ 23.903131] ? __pfx_kthread+0x10/0x10 [ 23.903149] ret_from_fork_asm+0x1a/0x30 [ 23.903179] </TASK> [ 23.903190] [ 23.911871] Allocated by task 290: [ 23.912086] kasan_save_stack+0x45/0x70 [ 23.912305] kasan_save_track+0x18/0x40 [ 23.912517] kasan_save_alloc_info+0x3b/0x50 [ 23.912723] __kasan_kmalloc+0xb7/0xc0 [ 23.912950] __kmalloc_cache_noprof+0x189/0x420 [ 23.913204] kasan_bitops_generic+0x92/0x1c0 [ 23.913405] kunit_try_run_case+0x1a5/0x480 [ 23.913581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.913948] kthread+0x337/0x6f0 [ 23.914114] ret_from_fork+0x116/0x1d0 [ 23.914268] ret_from_fork_asm+0x1a/0x30 [ 23.914399] [ 23.914462] The buggy address belongs to the object at ffff888102797f40 [ 23.914462] which belongs to the cache kmalloc-16 of size 16 [ 23.915022] The buggy address is located 8 bytes inside of [ 23.915022] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 23.915676] [ 23.915766] The buggy address belongs to the physical page: [ 23.916112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 23.916445] flags: 0x200000000000000(node=0|zone=2) [ 23.916604] page_type: f5(slab) [ 23.916719] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 23.917444] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.917983] page dumped because: kasan: bad access detected [ 23.918258] [ 23.918362] Memory state around the buggy address: [ 23.918540] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.918799] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.919358] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.919647] ^ [ 23.919898] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.920139] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.920561] ================================================================== [ 23.836042] ================================================================== [ 23.836592] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 23.836970] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 23.837274] [ 23.837360] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 23.837415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.837427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.837449] Call Trace: [ 23.837462] <TASK> [ 23.837480] dump_stack_lvl+0x73/0xb0 [ 23.837533] print_report+0xd1/0x650 [ 23.837555] ? __virt_addr_valid+0x1db/0x2d0 [ 23.837802] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 23.837831] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.837856] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 23.837880] kasan_report+0x141/0x180 [ 23.837900] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 23.837928] kasan_check_range+0x10c/0x1c0 [ 23.837961] __kasan_check_write+0x18/0x20 [ 23.837983] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 23.838007] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.838031] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.838056] ? kasan_bitops_generic+0x92/0x1c0 [ 23.838081] kasan_bitops_generic+0x116/0x1c0 [ 23.838103] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.838127] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.838153] kunit_try_run_case+0x1a5/0x480 [ 23.838178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.838200] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.838221] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.838246] ? __kthread_parkme+0x82/0x180 [ 23.838267] ? preempt_count_sub+0x50/0x80 [ 23.838289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.838312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.838343] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.838366] kthread+0x337/0x6f0 [ 23.838384] ? trace_preempt_on+0x20/0xc0 [ 23.838406] ? __pfx_kthread+0x10/0x10 [ 23.838425] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.838448] ? calculate_sigpending+0x7b/0xa0 [ 23.838471] ? __pfx_kthread+0x10/0x10 [ 23.838491] ret_from_fork+0x116/0x1d0 [ 23.838510] ? __pfx_kthread+0x10/0x10 [ 23.838529] ret_from_fork_asm+0x1a/0x30 [ 23.838558] </TASK> [ 23.838568] [ 23.848854] Allocated by task 290: [ 23.849455] kasan_save_stack+0x45/0x70 [ 23.849611] kasan_save_track+0x18/0x40 [ 23.849800] kasan_save_alloc_info+0x3b/0x50 [ 23.850194] __kasan_kmalloc+0xb7/0xc0 [ 23.850359] __kmalloc_cache_noprof+0x189/0x420 [ 23.850511] kasan_bitops_generic+0x92/0x1c0 [ 23.850713] kunit_try_run_case+0x1a5/0x480 [ 23.850987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.851314] kthread+0x337/0x6f0 [ 23.851433] ret_from_fork+0x116/0x1d0 [ 23.851556] ret_from_fork_asm+0x1a/0x30 [ 23.851744] [ 23.851833] The buggy address belongs to the object at ffff888102797f40 [ 23.851833] which belongs to the cache kmalloc-16 of size 16 [ 23.852543] The buggy address is located 8 bytes inside of [ 23.852543] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 23.852994] [ 23.853063] The buggy address belongs to the physical page: [ 23.853524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 23.853926] flags: 0x200000000000000(node=0|zone=2) [ 23.854322] page_type: f5(slab) [ 23.854470] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 23.854814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.855156] page dumped because: kasan: bad access detected [ 23.855440] [ 23.855523] Memory state around the buggy address: [ 23.855757] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.856073] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.856457] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.856751] ^ [ 23.857267] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.857509] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.857986] ================================================================== [ 23.941444] ================================================================== [ 23.941796] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 23.942126] Write of size 8 at addr ffff888102797f48 by task kunit_try_catch/290 [ 23.942467] [ 23.942685] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) [ 23.942738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.942750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.942772] Call Trace: [ 23.942855] <TASK> [ 23.942879] dump_stack_lvl+0x73/0xb0 [ 23.942907] print_report+0xd1/0x650 [ 23.942927] ? __virt_addr_valid+0x1db/0x2d0 [ 23.942963] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 23.942987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.943013] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 23.943036] kasan_report+0x141/0x180 [ 23.943057] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 23.943084] kasan_check_range+0x10c/0x1c0 [ 23.943106] __kasan_check_write+0x18/0x20 [ 23.943129] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 23.943152] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.943177] ? __kmalloc_cache_noprof+0x189/0x420 [ 23.943200] ? kasan_bitops_generic+0x92/0x1c0 [ 23.943225] kasan_bitops_generic+0x116/0x1c0 [ 23.943247] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.943269] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.943295] kunit_try_run_case+0x1a5/0x480 [ 23.943321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.943343] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.943363] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.943387] ? __kthread_parkme+0x82/0x180 [ 23.943407] ? preempt_count_sub+0x50/0x80 [ 23.943429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.943452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.943474] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.943496] kthread+0x337/0x6f0 [ 23.943515] ? trace_preempt_on+0x20/0xc0 [ 23.943538] ? __pfx_kthread+0x10/0x10 [ 23.943557] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.943578] ? calculate_sigpending+0x7b/0xa0 [ 23.943602] ? __pfx_kthread+0x10/0x10 [ 23.943625] ret_from_fork+0x116/0x1d0 [ 23.943644] ? __pfx_kthread+0x10/0x10 [ 23.943664] ret_from_fork_asm+0x1a/0x30 [ 23.943694] </TASK> [ 23.943704] [ 23.951704] Allocated by task 290: [ 23.951830] kasan_save_stack+0x45/0x70 [ 23.952050] kasan_save_track+0x18/0x40 [ 23.952231] kasan_save_alloc_info+0x3b/0x50 [ 23.952442] __kasan_kmalloc+0xb7/0xc0 [ 23.952681] __kmalloc_cache_noprof+0x189/0x420 [ 23.953058] kasan_bitops_generic+0x92/0x1c0 [ 23.953291] kunit_try_run_case+0x1a5/0x480 [ 23.953539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.953710] kthread+0x337/0x6f0 [ 23.953994] ret_from_fork+0x116/0x1d0 [ 23.954282] ret_from_fork_asm+0x1a/0x30 [ 23.954608] [ 23.954675] The buggy address belongs to the object at ffff888102797f40 [ 23.954675] which belongs to the cache kmalloc-16 of size 16 [ 23.955190] The buggy address is located 8 bytes inside of [ 23.955190] allocated 9-byte region [ffff888102797f40, ffff888102797f49) [ 23.955715] [ 23.955780] The buggy address belongs to the physical page: [ 23.955950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102797 [ 23.956515] flags: 0x200000000000000(node=0|zone=2) [ 23.956735] page_type: f5(slab) [ 23.956893] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122 [ 23.957402] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.957625] page dumped because: kasan: bad access detected [ 23.957976] [ 23.958097] Memory state around the buggy address: [ 23.958543] ffff888102797e00: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.958844] ffff888102797e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.959279] >ffff888102797f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.959581] ^ [ 23.959801] ffff888102797f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.960155] ffff888102798000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.960370] ==================================================================