Date
July 8, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 25.618516] ================================================================== [ 25.619255] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.619747] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309 [ 25.620670] [ 25.620883] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.620938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.620950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.620973] Call Trace: [ 25.620995] <TASK> [ 25.621015] dump_stack_lvl+0x73/0xb0 [ 25.621048] print_report+0xd1/0x610 [ 25.621073] ? __virt_addr_valid+0x1db/0x2d0 [ 25.621099] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.621128] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.621159] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.621187] kasan_report+0x141/0x180 [ 25.621217] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.621260] kasan_check_range+0x10c/0x1c0 [ 25.621287] __kasan_check_write+0x18/0x20 [ 25.621315] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.621344] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.621373] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.621402] ? trace_hardirqs_on+0x37/0xe0 [ 25.621427] ? kasan_bitops_generic+0x92/0x1c0 [ 25.621457] kasan_bitops_generic+0x116/0x1c0 [ 25.621484] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.621512] ? __pfx_read_tsc+0x10/0x10 [ 25.621539] ? ktime_get_ts64+0x86/0x230 [ 25.621566] kunit_try_run_case+0x1a5/0x480 [ 25.621590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.621612] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.621637] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.621669] ? __kthread_parkme+0x82/0x180 [ 25.621692] ? preempt_count_sub+0x50/0x80 [ 25.621718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.621741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.621770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.621799] kthread+0x337/0x6f0 [ 25.621976] ? trace_preempt_on+0x20/0xc0 [ 25.622004] ? __pfx_kthread+0x10/0x10 [ 25.622029] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.622057] ? calculate_sigpending+0x7b/0xa0 [ 25.622086] ? __pfx_kthread+0x10/0x10 [ 25.622111] ret_from_fork+0x116/0x1d0 [ 25.622132] ? __pfx_kthread+0x10/0x10 [ 25.622156] ret_from_fork_asm+0x1a/0x30 [ 25.622192] </TASK> [ 25.622204] [ 25.637441] Allocated by task 309: [ 25.637782] kasan_save_stack+0x45/0x70 [ 25.638214] kasan_save_track+0x18/0x40 [ 25.638655] kasan_save_alloc_info+0x3b/0x50 [ 25.639192] __kasan_kmalloc+0xb7/0xc0 [ 25.639564] __kmalloc_cache_noprof+0x189/0x420 [ 25.640048] kasan_bitops_generic+0x92/0x1c0 [ 25.640378] kunit_try_run_case+0x1a5/0x480 [ 25.640526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.640698] kthread+0x337/0x6f0 [ 25.641070] ret_from_fork+0x116/0x1d0 [ 25.641442] ret_from_fork_asm+0x1a/0x30 [ 25.641911] [ 25.642094] The buggy address belongs to the object at ffff88810598a260 [ 25.642094] which belongs to the cache kmalloc-16 of size 16 [ 25.643343] The buggy address is located 8 bytes inside of [ 25.643343] allocated 9-byte region [ffff88810598a260, ffff88810598a269) [ 25.644136] [ 25.644331] The buggy address belongs to the physical page: [ 25.644991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 25.645629] flags: 0x200000000000000(node=0|zone=2) [ 25.645994] page_type: f5(slab) [ 25.646323] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.647029] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.647274] page dumped because: kasan: bad access detected [ 25.647450] [ 25.647516] Memory state around the buggy address: [ 25.647667] ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.648031] ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.648284] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.648568] ^ [ 25.648873] ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.649203] ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.649709] ================================================================== [ 25.509032] ================================================================== [ 25.509391] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.509711] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309 [ 25.510093] [ 25.510192] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.510254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.510267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.510290] Call Trace: [ 25.510310] <TASK> [ 25.510328] dump_stack_lvl+0x73/0xb0 [ 25.510361] print_report+0xd1/0x610 [ 25.510386] ? __virt_addr_valid+0x1db/0x2d0 [ 25.510411] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.510441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.510471] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.510500] kasan_report+0x141/0x180 [ 25.510525] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.510558] kasan_check_range+0x10c/0x1c0 [ 25.510585] __kasan_check_write+0x18/0x20 [ 25.510613] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.510642] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.510672] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.510698] ? trace_hardirqs_on+0x37/0xe0 [ 25.510722] ? kasan_bitops_generic+0x92/0x1c0 [ 25.510753] kasan_bitops_generic+0x116/0x1c0 [ 25.510779] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.510808] ? __pfx_read_tsc+0x10/0x10 [ 25.510890] ? ktime_get_ts64+0x86/0x230 [ 25.510921] kunit_try_run_case+0x1a5/0x480 [ 25.510945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.510967] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.510989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.511020] ? __kthread_parkme+0x82/0x180 [ 25.511043] ? preempt_count_sub+0x50/0x80 [ 25.511069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.511093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.511120] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.511149] kthread+0x337/0x6f0 [ 25.511172] ? trace_preempt_on+0x20/0xc0 [ 25.511196] ? __pfx_kthread+0x10/0x10 [ 25.511220] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.511260] ? calculate_sigpending+0x7b/0xa0 [ 25.511288] ? __pfx_kthread+0x10/0x10 [ 25.511313] ret_from_fork+0x116/0x1d0 [ 25.511334] ? __pfx_kthread+0x10/0x10 [ 25.511358] ret_from_fork_asm+0x1a/0x30 [ 25.511394] </TASK> [ 25.511405] [ 25.519245] Allocated by task 309: [ 25.519652] kasan_save_stack+0x45/0x70 [ 25.520012] kasan_save_track+0x18/0x40 [ 25.520170] kasan_save_alloc_info+0x3b/0x50 [ 25.520328] __kasan_kmalloc+0xb7/0xc0 [ 25.520454] __kmalloc_cache_noprof+0x189/0x420 [ 25.520770] kasan_bitops_generic+0x92/0x1c0 [ 25.521229] kunit_try_run_case+0x1a5/0x480 [ 25.521445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.521666] kthread+0x337/0x6f0 [ 25.521783] ret_from_fork+0x116/0x1d0 [ 25.521909] ret_from_fork_asm+0x1a/0x30 [ 25.522046] [ 25.522110] The buggy address belongs to the object at ffff88810598a260 [ 25.522110] which belongs to the cache kmalloc-16 of size 16 [ 25.522982] The buggy address is located 8 bytes inside of [ 25.522982] allocated 9-byte region [ffff88810598a260, ffff88810598a269) [ 25.523336] [ 25.523401] The buggy address belongs to the physical page: [ 25.523567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 25.523979] flags: 0x200000000000000(node=0|zone=2) [ 25.524217] page_type: f5(slab) [ 25.524396] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.524738] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.525078] page dumped because: kasan: bad access detected [ 25.525342] [ 25.525432] Memory state around the buggy address: [ 25.525654] ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.525947] ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.526223] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.526555] ^ [ 25.527130] ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.527394] ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.527604] ================================================================== [ 25.566719] ================================================================== [ 25.567174] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.567523] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309 [ 25.567904] [ 25.568018] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.568069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.568082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.568104] Call Trace: [ 25.568126] <TASK> [ 25.568146] dump_stack_lvl+0x73/0xb0 [ 25.568179] print_report+0xd1/0x610 [ 25.568202] ? __virt_addr_valid+0x1db/0x2d0 [ 25.568228] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.568268] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.568298] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.568327] kasan_report+0x141/0x180 [ 25.568351] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.568385] kasan_check_range+0x10c/0x1c0 [ 25.568413] __kasan_check_write+0x18/0x20 [ 25.568440] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.568469] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.568498] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.568526] ? trace_hardirqs_on+0x37/0xe0 [ 25.568551] ? kasan_bitops_generic+0x92/0x1c0 [ 25.568581] kasan_bitops_generic+0x116/0x1c0 [ 25.568608] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.568636] ? __pfx_read_tsc+0x10/0x10 [ 25.568662] ? ktime_get_ts64+0x86/0x230 [ 25.568690] kunit_try_run_case+0x1a5/0x480 [ 25.568714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.568736] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.568806] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.568839] ? __kthread_parkme+0x82/0x180 [ 25.568863] ? preempt_count_sub+0x50/0x80 [ 25.568888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.568914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.568942] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.568971] kthread+0x337/0x6f0 [ 25.568995] ? trace_preempt_on+0x20/0xc0 [ 25.569020] ? __pfx_kthread+0x10/0x10 [ 25.569044] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.569073] ? calculate_sigpending+0x7b/0xa0 [ 25.569103] ? __pfx_kthread+0x10/0x10 [ 25.569130] ret_from_fork+0x116/0x1d0 [ 25.569152] ? __pfx_kthread+0x10/0x10 [ 25.569177] ret_from_fork_asm+0x1a/0x30 [ 25.569221] </TASK> [ 25.569233] [ 25.578295] Allocated by task 309: [ 25.578551] kasan_save_stack+0x45/0x70 [ 25.579043] kasan_save_track+0x18/0x40 [ 25.579399] kasan_save_alloc_info+0x3b/0x50 [ 25.579621] __kasan_kmalloc+0xb7/0xc0 [ 25.580311] __kmalloc_cache_noprof+0x189/0x420 [ 25.580623] kasan_bitops_generic+0x92/0x1c0 [ 25.581068] kunit_try_run_case+0x1a5/0x480 [ 25.581292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.581523] kthread+0x337/0x6f0 [ 25.581677] ret_from_fork+0x116/0x1d0 [ 25.582334] ret_from_fork_asm+0x1a/0x30 [ 25.582513] [ 25.582598] The buggy address belongs to the object at ffff88810598a260 [ 25.582598] which belongs to the cache kmalloc-16 of size 16 [ 25.583671] The buggy address is located 8 bytes inside of [ 25.583671] allocated 9-byte region [ffff88810598a260, ffff88810598a269) [ 25.584346] [ 25.584442] The buggy address belongs to the physical page: [ 25.584669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 25.585512] flags: 0x200000000000000(node=0|zone=2) [ 25.585740] page_type: f5(slab) [ 25.586214] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.586664] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.587034] page dumped because: kasan: bad access detected [ 25.587274] [ 25.587356] Memory state around the buggy address: [ 25.587546] ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.588175] ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.588457] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.588738] ^ [ 25.589068] ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.589370] ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.589647] ================================================================== [ 25.482832] ================================================================== [ 25.483288] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.483650] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309 [ 25.483943] [ 25.484056] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.484110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.484124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.484147] Call Trace: [ 25.484162] <TASK> [ 25.484182] dump_stack_lvl+0x73/0xb0 [ 25.484215] print_report+0xd1/0x610 [ 25.484260] ? __virt_addr_valid+0x1db/0x2d0 [ 25.484286] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.484325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.484357] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.484394] kasan_report+0x141/0x180 [ 25.484439] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.484482] kasan_check_range+0x10c/0x1c0 [ 25.484510] __kasan_check_write+0x18/0x20 [ 25.484548] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.484576] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.484606] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.484634] ? trace_hardirqs_on+0x37/0xe0 [ 25.484658] ? kasan_bitops_generic+0x92/0x1c0 [ 25.484689] kasan_bitops_generic+0x116/0x1c0 [ 25.484716] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.484744] ? __pfx_read_tsc+0x10/0x10 [ 25.484786] ? ktime_get_ts64+0x86/0x230 [ 25.484821] kunit_try_run_case+0x1a5/0x480 [ 25.484845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.484867] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.484891] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.484930] ? __kthread_parkme+0x82/0x180 [ 25.484953] ? preempt_count_sub+0x50/0x80 [ 25.484984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.485008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.485036] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.485064] kthread+0x337/0x6f0 [ 25.485087] ? trace_preempt_on+0x20/0xc0 [ 25.485113] ? __pfx_kthread+0x10/0x10 [ 25.485137] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.485165] ? calculate_sigpending+0x7b/0xa0 [ 25.485199] ? __pfx_kthread+0x10/0x10 [ 25.485224] ret_from_fork+0x116/0x1d0 [ 25.485253] ? __pfx_kthread+0x10/0x10 [ 25.485277] ret_from_fork_asm+0x1a/0x30 [ 25.485314] </TASK> [ 25.485326] [ 25.499787] Allocated by task 309: [ 25.500111] kasan_save_stack+0x45/0x70 [ 25.500476] kasan_save_track+0x18/0x40 [ 25.500857] kasan_save_alloc_info+0x3b/0x50 [ 25.501265] __kasan_kmalloc+0xb7/0xc0 [ 25.501406] __kmalloc_cache_noprof+0x189/0x420 [ 25.501559] kasan_bitops_generic+0x92/0x1c0 [ 25.501705] kunit_try_run_case+0x1a5/0x480 [ 25.501920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.502210] kthread+0x337/0x6f0 [ 25.502386] ret_from_fork+0x116/0x1d0 [ 25.502516] ret_from_fork_asm+0x1a/0x30 [ 25.502709] [ 25.502999] The buggy address belongs to the object at ffff88810598a260 [ 25.502999] which belongs to the cache kmalloc-16 of size 16 [ 25.503461] The buggy address is located 8 bytes inside of [ 25.503461] allocated 9-byte region [ffff88810598a260, ffff88810598a269) [ 25.504037] [ 25.504117] The buggy address belongs to the physical page: [ 25.504361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 25.504676] flags: 0x200000000000000(node=0|zone=2) [ 25.504961] page_type: f5(slab) [ 25.505123] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.505457] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.505725] page dumped because: kasan: bad access detected [ 25.505967] [ 25.506040] Memory state around the buggy address: [ 25.506189] ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.506554] ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.506978] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.507189] ^ [ 25.507928] ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.508294] ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.508554] ================================================================== [ 25.546827] ================================================================== [ 25.547503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.548199] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309 [ 25.548445] [ 25.548527] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.548578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.548590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.548613] Call Trace: [ 25.548631] <TASK> [ 25.548649] dump_stack_lvl+0x73/0xb0 [ 25.548681] print_report+0xd1/0x610 [ 25.548705] ? __virt_addr_valid+0x1db/0x2d0 [ 25.548731] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.548760] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.548789] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.548819] kasan_report+0x141/0x180 [ 25.548916] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.548951] kasan_check_range+0x10c/0x1c0 [ 25.548978] __kasan_check_write+0x18/0x20 [ 25.549005] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.549035] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.549065] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.549092] ? trace_hardirqs_on+0x37/0xe0 [ 25.549116] ? kasan_bitops_generic+0x92/0x1c0 [ 25.549146] kasan_bitops_generic+0x116/0x1c0 [ 25.549173] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.549207] ? __pfx_read_tsc+0x10/0x10 [ 25.549232] ? ktime_get_ts64+0x86/0x230 [ 25.549272] kunit_try_run_case+0x1a5/0x480 [ 25.549295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.549317] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.549341] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.549372] ? __kthread_parkme+0x82/0x180 [ 25.549394] ? preempt_count_sub+0x50/0x80 [ 25.549419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.549443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.549471] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.549500] kthread+0x337/0x6f0 [ 25.549523] ? trace_preempt_on+0x20/0xc0 [ 25.549548] ? __pfx_kthread+0x10/0x10 [ 25.549572] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.549601] ? calculate_sigpending+0x7b/0xa0 [ 25.549629] ? __pfx_kthread+0x10/0x10 [ 25.549654] ret_from_fork+0x116/0x1d0 [ 25.549675] ? __pfx_kthread+0x10/0x10 [ 25.549699] ret_from_fork_asm+0x1a/0x30 [ 25.549734] </TASK> [ 25.549746] [ 25.557664] Allocated by task 309: [ 25.557849] kasan_save_stack+0x45/0x70 [ 25.558076] kasan_save_track+0x18/0x40 [ 25.558577] kasan_save_alloc_info+0x3b/0x50 [ 25.558825] __kasan_kmalloc+0xb7/0xc0 [ 25.559012] __kmalloc_cache_noprof+0x189/0x420 [ 25.559197] kasan_bitops_generic+0x92/0x1c0 [ 25.559399] kunit_try_run_case+0x1a5/0x480 [ 25.559586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.559761] kthread+0x337/0x6f0 [ 25.559880] ret_from_fork+0x116/0x1d0 [ 25.560007] ret_from_fork_asm+0x1a/0x30 [ 25.560144] [ 25.560210] The buggy address belongs to the object at ffff88810598a260 [ 25.560210] which belongs to the cache kmalloc-16 of size 16 [ 25.560599] The buggy address is located 8 bytes inside of [ 25.560599] allocated 9-byte region [ffff88810598a260, ffff88810598a269) [ 25.561107] [ 25.561201] The buggy address belongs to the physical page: [ 25.561507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 25.562033] flags: 0x200000000000000(node=0|zone=2) [ 25.562380] page_type: f5(slab) [ 25.562545] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.562888] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.563190] page dumped because: kasan: bad access detected [ 25.563449] [ 25.563521] Memory state around the buggy address: [ 25.563672] ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.564463] ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.564729] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.565180] ^ [ 25.565400] ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.565608] ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.566226] ================================================================== [ 25.528116] ================================================================== [ 25.528467] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.528840] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309 [ 25.529163] [ 25.529489] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.529545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.529559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.529582] Call Trace: [ 25.529610] <TASK> [ 25.529630] dump_stack_lvl+0x73/0xb0 [ 25.529663] print_report+0xd1/0x610 [ 25.529688] ? __virt_addr_valid+0x1db/0x2d0 [ 25.529714] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.529743] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.529773] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.529803] kasan_report+0x141/0x180 [ 25.529828] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.529863] kasan_check_range+0x10c/0x1c0 [ 25.529890] __kasan_check_write+0x18/0x20 [ 25.529918] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.529948] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.529978] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.530006] ? trace_hardirqs_on+0x37/0xe0 [ 25.530030] ? kasan_bitops_generic+0x92/0x1c0 [ 25.530062] kasan_bitops_generic+0x116/0x1c0 [ 25.530157] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.530186] ? __pfx_read_tsc+0x10/0x10 [ 25.530213] ? ktime_get_ts64+0x86/0x230 [ 25.530255] kunit_try_run_case+0x1a5/0x480 [ 25.530280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.530301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.530325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.530356] ? __kthread_parkme+0x82/0x180 [ 25.530378] ? preempt_count_sub+0x50/0x80 [ 25.530403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.530427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.530455] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.530484] kthread+0x337/0x6f0 [ 25.530508] ? trace_preempt_on+0x20/0xc0 [ 25.530533] ? __pfx_kthread+0x10/0x10 [ 25.530557] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.530585] ? calculate_sigpending+0x7b/0xa0 [ 25.530614] ? __pfx_kthread+0x10/0x10 [ 25.530639] ret_from_fork+0x116/0x1d0 [ 25.530660] ? __pfx_kthread+0x10/0x10 [ 25.530684] ret_from_fork_asm+0x1a/0x30 [ 25.530720] </TASK> [ 25.530731] [ 25.538762] Allocated by task 309: [ 25.538926] kasan_save_stack+0x45/0x70 [ 25.539127] kasan_save_track+0x18/0x40 [ 25.539372] kasan_save_alloc_info+0x3b/0x50 [ 25.539692] __kasan_kmalloc+0xb7/0xc0 [ 25.539895] __kmalloc_cache_noprof+0x189/0x420 [ 25.540057] kasan_bitops_generic+0x92/0x1c0 [ 25.540318] kunit_try_run_case+0x1a5/0x480 [ 25.540566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.540965] kthread+0x337/0x6f0 [ 25.541128] ret_from_fork+0x116/0x1d0 [ 25.541304] ret_from_fork_asm+0x1a/0x30 [ 25.541499] [ 25.541588] The buggy address belongs to the object at ffff88810598a260 [ 25.541588] which belongs to the cache kmalloc-16 of size 16 [ 25.542081] The buggy address is located 8 bytes inside of [ 25.542081] allocated 9-byte region [ffff88810598a260, ffff88810598a269) [ 25.542549] [ 25.542640] The buggy address belongs to the physical page: [ 25.542886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 25.543249] flags: 0x200000000000000(node=0|zone=2) [ 25.543442] page_type: f5(slab) [ 25.543558] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.543906] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.544254] page dumped because: kasan: bad access detected [ 25.544456] [ 25.544544] Memory state around the buggy address: [ 25.544737] ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.545069] ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.545380] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.545665] ^ [ 25.545962] ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.546174] ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.546393] ================================================================== [ 25.590622] ================================================================== [ 25.590855] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.591109] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309 [ 25.591342] [ 25.591426] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.591474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.591487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.591509] Call Trace: [ 25.591529] <TASK> [ 25.591547] dump_stack_lvl+0x73/0xb0 [ 25.591578] print_report+0xd1/0x610 [ 25.591601] ? __virt_addr_valid+0x1db/0x2d0 [ 25.591626] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.591654] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.591684] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.591712] kasan_report+0x141/0x180 [ 25.591736] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.591769] kasan_check_range+0x10c/0x1c0 [ 25.591795] __kasan_check_write+0x18/0x20 [ 25.591822] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.591850] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.591879] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.591906] ? trace_hardirqs_on+0x37/0xe0 [ 25.591929] ? kasan_bitops_generic+0x92/0x1c0 [ 25.591959] kasan_bitops_generic+0x116/0x1c0 [ 25.591987] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.592013] ? __pfx_read_tsc+0x10/0x10 [ 25.592039] ? ktime_get_ts64+0x86/0x230 [ 25.592230] kunit_try_run_case+0x1a5/0x480 [ 25.592272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.592295] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.592319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.592350] ? __kthread_parkme+0x82/0x180 [ 25.592373] ? preempt_count_sub+0x50/0x80 [ 25.592399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.592423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.592452] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.592481] kthread+0x337/0x6f0 [ 25.592505] ? trace_preempt_on+0x20/0xc0 [ 25.592531] ? __pfx_kthread+0x10/0x10 [ 25.592555] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.592584] ? calculate_sigpending+0x7b/0xa0 [ 25.592613] ? __pfx_kthread+0x10/0x10 [ 25.592638] ret_from_fork+0x116/0x1d0 [ 25.592660] ? __pfx_kthread+0x10/0x10 [ 25.592685] ret_from_fork_asm+0x1a/0x30 [ 25.592722] </TASK> [ 25.592734] [ 25.605909] Allocated by task 309: [ 25.606121] kasan_save_stack+0x45/0x70 [ 25.606356] kasan_save_track+0x18/0x40 [ 25.606557] kasan_save_alloc_info+0x3b/0x50 [ 25.606777] __kasan_kmalloc+0xb7/0xc0 [ 25.607355] __kmalloc_cache_noprof+0x189/0x420 [ 25.607598] kasan_bitops_generic+0x92/0x1c0 [ 25.607802] kunit_try_run_case+0x1a5/0x480 [ 25.608001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.608222] kthread+0x337/0x6f0 [ 25.608455] ret_from_fork+0x116/0x1d0 [ 25.608652] ret_from_fork_asm+0x1a/0x30 [ 25.608947] [ 25.609033] The buggy address belongs to the object at ffff88810598a260 [ 25.609033] which belongs to the cache kmalloc-16 of size 16 [ 25.609496] The buggy address is located 8 bytes inside of [ 25.609496] allocated 9-byte region [ffff88810598a260, ffff88810598a269) [ 25.610083] [ 25.610323] The buggy address belongs to the physical page: [ 25.610582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 25.611015] flags: 0x200000000000000(node=0|zone=2) [ 25.611460] page_type: f5(slab) [ 25.611744] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.612710] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.613345] page dumped because: kasan: bad access detected [ 25.613667] [ 25.613734] Memory state around the buggy address: [ 25.614327] ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.615037] ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.615553] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.616162] ^ [ 25.616539] ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.616952] ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.617567] ================================================================== [ 25.450698] ================================================================== [ 25.451617] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.452345] Write of size 8 at addr ffff88810598a268 by task kunit_try_catch/309 [ 25.453001] [ 25.453145] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) [ 25.453208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.453222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.453255] Call Trace: [ 25.453283] <TASK> [ 25.453304] dump_stack_lvl+0x73/0xb0 [ 25.453350] print_report+0xd1/0x610 [ 25.453377] ? __virt_addr_valid+0x1db/0x2d0 [ 25.453404] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.453433] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.453473] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.453503] kasan_report+0x141/0x180 [ 25.453528] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.453571] kasan_check_range+0x10c/0x1c0 [ 25.453599] __kasan_check_write+0x18/0x20 [ 25.453628] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 25.453657] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.453686] ? __kmalloc_cache_noprof+0x189/0x420 [ 25.453714] ? trace_hardirqs_on+0x37/0xe0 [ 25.453804] ? kasan_bitops_generic+0x92/0x1c0 [ 25.453847] kasan_bitops_generic+0x116/0x1c0 [ 25.453876] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.453904] ? __pfx_read_tsc+0x10/0x10 [ 25.453931] ? ktime_get_ts64+0x86/0x230 [ 25.453958] kunit_try_run_case+0x1a5/0x480 [ 25.453983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.454004] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.454028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.454058] ? __kthread_parkme+0x82/0x180 [ 25.454081] ? preempt_count_sub+0x50/0x80 [ 25.454108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.454132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.454160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.454189] kthread+0x337/0x6f0 [ 25.454234] ? trace_preempt_on+0x20/0xc0 [ 25.454275] ? __pfx_kthread+0x10/0x10 [ 25.454299] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.454340] ? calculate_sigpending+0x7b/0xa0 [ 25.454368] ? __pfx_kthread+0x10/0x10 [ 25.454393] ret_from_fork+0x116/0x1d0 [ 25.454426] ? __pfx_kthread+0x10/0x10 [ 25.454450] ret_from_fork_asm+0x1a/0x30 [ 25.454497] </TASK> [ 25.454510] [ 25.468570] Allocated by task 309: [ 25.468997] kasan_save_stack+0x45/0x70 [ 25.469395] kasan_save_track+0x18/0x40 [ 25.469755] kasan_save_alloc_info+0x3b/0x50 [ 25.470208] __kasan_kmalloc+0xb7/0xc0 [ 25.470613] __kmalloc_cache_noprof+0x189/0x420 [ 25.470997] kasan_bitops_generic+0x92/0x1c0 [ 25.471657] kunit_try_run_case+0x1a5/0x480 [ 25.472072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.472480] kthread+0x337/0x6f0 [ 25.472696] ret_from_fork+0x116/0x1d0 [ 25.473084] ret_from_fork_asm+0x1a/0x30 [ 25.473420] [ 25.473601] The buggy address belongs to the object at ffff88810598a260 [ 25.473601] which belongs to the cache kmalloc-16 of size 16 [ 25.474316] The buggy address is located 8 bytes inside of [ 25.474316] allocated 9-byte region [ffff88810598a260, ffff88810598a269) [ 25.475485] [ 25.475561] The buggy address belongs to the physical page: [ 25.475731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 25.476585] flags: 0x200000000000000(node=0|zone=2) [ 25.477127] page_type: f5(slab) [ 25.477464] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.477705] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.478347] page dumped because: kasan: bad access detected [ 25.478900] [ 25.479079] Memory state around the buggy address: [ 25.479467] ffff88810598a100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.479688] ffff88810598a180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.480348] >ffff88810598a200: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.481075] ^ [ 25.481744] ffff88810598a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.482072] ffff88810598a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.482297] ==================================================================