Date
July 10, 2025, 9:07 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 27.221766] ================================================================== [ 27.222113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 27.222484] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.223021] [ 27.223141] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.223192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.223205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.223229] Call Trace: [ 27.223250] <TASK> [ 27.223268] dump_stack_lvl+0x73/0xb0 [ 27.223298] print_report+0xd1/0x610 [ 27.223320] ? __virt_addr_valid+0x1db/0x2d0 [ 27.223345] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 27.223370] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.223396] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 27.223422] kasan_report+0x141/0x180 [ 27.223444] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 27.223474] kasan_check_range+0x10c/0x1c0 [ 27.223507] __kasan_check_write+0x18/0x20 [ 27.223531] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 27.223556] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.223583] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.223608] ? trace_hardirqs_on+0x37/0xe0 [ 27.223632] ? kasan_bitops_generic+0x92/0x1c0 [ 27.223659] kasan_bitops_generic+0x116/0x1c0 [ 27.223684] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.223723] ? trace_hardirqs_on+0x37/0xe0 [ 27.223746] ? __pfx_read_tsc+0x10/0x10 [ 27.223767] ? ktime_get_ts64+0x86/0x230 [ 27.223853] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.223879] kunit_try_run_case+0x1a5/0x480 [ 27.223903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.223926] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.223950] ? __kthread_parkme+0x82/0x180 [ 27.223971] ? preempt_count_sub+0x50/0x80 [ 27.223995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.224017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.224042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.224067] kthread+0x337/0x6f0 [ 27.224087] ? trace_preempt_on+0x20/0xc0 [ 27.224109] ? __pfx_kthread+0x10/0x10 [ 27.224130] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.224151] ? calculate_sigpending+0x7b/0xa0 [ 27.224176] ? __pfx_kthread+0x10/0x10 [ 27.224197] ret_from_fork+0x116/0x1d0 [ 27.224217] ? __pfx_kthread+0x10/0x10 [ 27.224238] ret_from_fork_asm+0x1a/0x30 [ 27.224270] </TASK> [ 27.224281] [ 27.232768] Allocated by task 309: [ 27.232990] kasan_save_stack+0x45/0x70 [ 27.233160] kasan_save_track+0x18/0x40 [ 27.233289] kasan_save_alloc_info+0x3b/0x50 [ 27.233436] __kasan_kmalloc+0xb7/0xc0 [ 27.233821] __kmalloc_cache_noprof+0x189/0x420 [ 27.234056] kasan_bitops_generic+0x92/0x1c0 [ 27.234257] kunit_try_run_case+0x1a5/0x480 [ 27.234439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.234689] kthread+0x337/0x6f0 [ 27.234819] ret_from_fork+0x116/0x1d0 [ 27.234947] ret_from_fork_asm+0x1a/0x30 [ 27.235082] [ 27.235147] The buggy address belongs to the object at ffff888105807fa0 [ 27.235147] which belongs to the cache kmalloc-16 of size 16 [ 27.235651] The buggy address is located 8 bytes inside of [ 27.235651] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.236651] [ 27.236791] The buggy address belongs to the physical page: [ 27.237095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.237350] flags: 0x200000000000000(node=0|zone=2) [ 27.237716] page_type: f5(slab) [ 27.238061] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.238363] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.238645] page dumped because: kasan: bad access detected [ 27.239075] [ 27.239156] Memory state around the buggy address: [ 27.239359] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.239687] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.240121] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.240441] ^ [ 27.240713] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.241025] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.241255] ================================================================== [ 27.241848] ================================================================== [ 27.242404] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 27.242897] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.243144] [ 27.243228] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.243280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.243293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.243315] Call Trace: [ 27.243335] <TASK> [ 27.243355] dump_stack_lvl+0x73/0xb0 [ 27.243382] print_report+0xd1/0x610 [ 27.243405] ? __virt_addr_valid+0x1db/0x2d0 [ 27.243429] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 27.243454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.243480] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 27.243724] kasan_report+0x141/0x180 [ 27.243749] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 27.243930] kasan_check_range+0x10c/0x1c0 [ 27.243967] __kasan_check_write+0x18/0x20 [ 27.243993] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 27.244020] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.244046] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.244070] ? trace_hardirqs_on+0x37/0xe0 [ 27.244093] ? kasan_bitops_generic+0x92/0x1c0 [ 27.244119] kasan_bitops_generic+0x116/0x1c0 [ 27.244143] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.244166] ? trace_hardirqs_on+0x37/0xe0 [ 27.244187] ? __pfx_read_tsc+0x10/0x10 [ 27.244209] ? ktime_get_ts64+0x86/0x230 [ 27.244231] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.244258] kunit_try_run_case+0x1a5/0x480 [ 27.244279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.244302] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.244326] ? __kthread_parkme+0x82/0x180 [ 27.244347] ? preempt_count_sub+0x50/0x80 [ 27.244372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.244394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.244419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.244444] kthread+0x337/0x6f0 [ 27.244464] ? trace_preempt_on+0x20/0xc0 [ 27.244486] ? __pfx_kthread+0x10/0x10 [ 27.244507] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.244528] ? calculate_sigpending+0x7b/0xa0 [ 27.244553] ? __pfx_kthread+0x10/0x10 [ 27.244575] ret_from_fork+0x116/0x1d0 [ 27.244594] ? __pfx_kthread+0x10/0x10 [ 27.244615] ret_from_fork_asm+0x1a/0x30 [ 27.244645] </TASK> [ 27.244657] [ 27.253514] Allocated by task 309: [ 27.253658] kasan_save_stack+0x45/0x70 [ 27.253883] kasan_save_track+0x18/0x40 [ 27.254071] kasan_save_alloc_info+0x3b/0x50 [ 27.254418] __kasan_kmalloc+0xb7/0xc0 [ 27.254657] __kmalloc_cache_noprof+0x189/0x420 [ 27.254928] kasan_bitops_generic+0x92/0x1c0 [ 27.255105] kunit_try_run_case+0x1a5/0x480 [ 27.255271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.255535] kthread+0x337/0x6f0 [ 27.255692] ret_from_fork+0x116/0x1d0 [ 27.256054] ret_from_fork_asm+0x1a/0x30 [ 27.256252] [ 27.256345] The buggy address belongs to the object at ffff888105807fa0 [ 27.256345] which belongs to the cache kmalloc-16 of size 16 [ 27.256970] The buggy address is located 8 bytes inside of [ 27.256970] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.257387] [ 27.257459] The buggy address belongs to the physical page: [ 27.257630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.258004] flags: 0x200000000000000(node=0|zone=2) [ 27.258242] page_type: f5(slab) [ 27.258412] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.258845] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.259182] page dumped because: kasan: bad access detected [ 27.259430] [ 27.259538] Memory state around the buggy address: [ 27.259721] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.260167] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.260502] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.260862] ^ [ 27.261084] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.261404] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.261733] ================================================================== [ 27.181809] ================================================================== [ 27.182254] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 27.182835] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.183221] [ 27.183310] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.183360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.183372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.183395] Call Trace: [ 27.183415] <TASK> [ 27.183433] dump_stack_lvl+0x73/0xb0 [ 27.183463] print_report+0xd1/0x610 [ 27.183485] ? __virt_addr_valid+0x1db/0x2d0 [ 27.183509] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 27.183536] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.183561] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 27.183587] kasan_report+0x141/0x180 [ 27.183610] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 27.183639] kasan_check_range+0x10c/0x1c0 [ 27.183663] __kasan_check_write+0x18/0x20 [ 27.183687] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 27.183727] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.183753] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.183778] ? trace_hardirqs_on+0x37/0xe0 [ 27.183800] ? kasan_bitops_generic+0x92/0x1c0 [ 27.183827] kasan_bitops_generic+0x116/0x1c0 [ 27.183854] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.183876] ? trace_hardirqs_on+0x37/0xe0 [ 27.183899] ? __pfx_read_tsc+0x10/0x10 [ 27.183974] ? ktime_get_ts64+0x86/0x230 [ 27.184000] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.184027] kunit_try_run_case+0x1a5/0x480 [ 27.184048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.184071] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.184095] ? __kthread_parkme+0x82/0x180 [ 27.184116] ? preempt_count_sub+0x50/0x80 [ 27.184139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.184161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.184186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.184214] kthread+0x337/0x6f0 [ 27.184233] ? trace_preempt_on+0x20/0xc0 [ 27.184255] ? __pfx_kthread+0x10/0x10 [ 27.184276] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.184297] ? calculate_sigpending+0x7b/0xa0 [ 27.184322] ? __pfx_kthread+0x10/0x10 [ 27.184343] ret_from_fork+0x116/0x1d0 [ 27.184362] ? __pfx_kthread+0x10/0x10 [ 27.184383] ret_from_fork_asm+0x1a/0x30 [ 27.184415] </TASK> [ 27.184427] [ 27.193271] Allocated by task 309: [ 27.193441] kasan_save_stack+0x45/0x70 [ 27.193588] kasan_save_track+0x18/0x40 [ 27.193731] kasan_save_alloc_info+0x3b/0x50 [ 27.193920] __kasan_kmalloc+0xb7/0xc0 [ 27.194110] __kmalloc_cache_noprof+0x189/0x420 [ 27.194312] kasan_bitops_generic+0x92/0x1c0 [ 27.194454] kunit_try_run_case+0x1a5/0x480 [ 27.194594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.195150] kthread+0x337/0x6f0 [ 27.195337] ret_from_fork+0x116/0x1d0 [ 27.195576] ret_from_fork_asm+0x1a/0x30 [ 27.195857] [ 27.195944] The buggy address belongs to the object at ffff888105807fa0 [ 27.195944] which belongs to the cache kmalloc-16 of size 16 [ 27.196418] The buggy address is located 8 bytes inside of [ 27.196418] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.196826] [ 27.196965] The buggy address belongs to the physical page: [ 27.197223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.197575] flags: 0x200000000000000(node=0|zone=2) [ 27.197945] page_type: f5(slab) [ 27.198202] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.198542] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.199040] page dumped because: kasan: bad access detected [ 27.199218] [ 27.199283] Memory state around the buggy address: [ 27.199436] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.199650] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.199975] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.200295] ^ [ 27.200785] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.201118] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.201334] ================================================================== [ 27.302963] ================================================================== [ 27.303219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 27.303590] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.304103] [ 27.304193] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.304241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.304254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.304274] Call Trace: [ 27.304291] <TASK> [ 27.304305] dump_stack_lvl+0x73/0xb0 [ 27.304334] print_report+0xd1/0x610 [ 27.304355] ? __virt_addr_valid+0x1db/0x2d0 [ 27.304379] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 27.304403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.304429] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 27.304454] kasan_report+0x141/0x180 [ 27.304476] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 27.304505] kasan_check_range+0x10c/0x1c0 [ 27.304529] __kasan_check_write+0x18/0x20 [ 27.304552] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 27.304576] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.304602] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.304648] ? trace_hardirqs_on+0x37/0xe0 [ 27.304669] ? kasan_bitops_generic+0x92/0x1c0 [ 27.304706] kasan_bitops_generic+0x116/0x1c0 [ 27.304731] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.304753] ? trace_hardirqs_on+0x37/0xe0 [ 27.304844] ? __pfx_read_tsc+0x10/0x10 [ 27.304867] ? ktime_get_ts64+0x86/0x230 [ 27.304889] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.304915] kunit_try_run_case+0x1a5/0x480 [ 27.304939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.304962] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.304986] ? __kthread_parkme+0x82/0x180 [ 27.305006] ? preempt_count_sub+0x50/0x80 [ 27.305030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.305052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.305078] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.305104] kthread+0x337/0x6f0 [ 27.305123] ? trace_preempt_on+0x20/0xc0 [ 27.305146] ? __pfx_kthread+0x10/0x10 [ 27.305167] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.305189] ? calculate_sigpending+0x7b/0xa0 [ 27.305213] ? __pfx_kthread+0x10/0x10 [ 27.305235] ret_from_fork+0x116/0x1d0 [ 27.305254] ? __pfx_kthread+0x10/0x10 [ 27.305276] ret_from_fork_asm+0x1a/0x30 [ 27.305307] </TASK> [ 27.305317] [ 27.313457] Allocated by task 309: [ 27.313633] kasan_save_stack+0x45/0x70 [ 27.313836] kasan_save_track+0x18/0x40 [ 27.314021] kasan_save_alloc_info+0x3b/0x50 [ 27.314192] __kasan_kmalloc+0xb7/0xc0 [ 27.314318] __kmalloc_cache_noprof+0x189/0x420 [ 27.314471] kasan_bitops_generic+0x92/0x1c0 [ 27.314614] kunit_try_run_case+0x1a5/0x480 [ 27.317056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.318453] kthread+0x337/0x6f0 [ 27.319068] ret_from_fork+0x116/0x1d0 [ 27.319216] ret_from_fork_asm+0x1a/0x30 [ 27.320785] [ 27.320871] The buggy address belongs to the object at ffff888105807fa0 [ 27.320871] which belongs to the cache kmalloc-16 of size 16 [ 27.322090] The buggy address is located 8 bytes inside of [ 27.322090] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.323470] [ 27.323992] The buggy address belongs to the physical page: [ 27.324422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.324964] flags: 0x200000000000000(node=0|zone=2) [ 27.325141] page_type: f5(slab) [ 27.325259] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.325484] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.325732] page dumped because: kasan: bad access detected [ 27.326283] [ 27.326469] Memory state around the buggy address: [ 27.327158] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.327936] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.328620] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.329272] ^ [ 27.329430] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.330049] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.330955] ================================================================== [ 27.201952] ================================================================== [ 27.202303] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 27.203147] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.203442] [ 27.203565] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.203616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.203629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.203653] Call Trace: [ 27.203673] <TASK> [ 27.203693] dump_stack_lvl+0x73/0xb0 [ 27.203738] print_report+0xd1/0x610 [ 27.203761] ? __virt_addr_valid+0x1db/0x2d0 [ 27.203785] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 27.203810] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.203836] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 27.203868] kasan_report+0x141/0x180 [ 27.203890] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 27.203919] kasan_check_range+0x10c/0x1c0 [ 27.203943] __kasan_check_write+0x18/0x20 [ 27.203966] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 27.203992] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.204019] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.204219] ? trace_hardirqs_on+0x37/0xe0 [ 27.204243] ? kasan_bitops_generic+0x92/0x1c0 [ 27.204270] kasan_bitops_generic+0x116/0x1c0 [ 27.204293] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.204316] ? trace_hardirqs_on+0x37/0xe0 [ 27.204339] ? __pfx_read_tsc+0x10/0x10 [ 27.204360] ? ktime_get_ts64+0x86/0x230 [ 27.204383] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.204410] kunit_try_run_case+0x1a5/0x480 [ 27.204433] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.204459] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.204482] ? __kthread_parkme+0x82/0x180 [ 27.204515] ? preempt_count_sub+0x50/0x80 [ 27.204539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.204561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.204587] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.204612] kthread+0x337/0x6f0 [ 27.204632] ? trace_preempt_on+0x20/0xc0 [ 27.204654] ? __pfx_kthread+0x10/0x10 [ 27.204675] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.204709] ? calculate_sigpending+0x7b/0xa0 [ 27.204733] ? __pfx_kthread+0x10/0x10 [ 27.204756] ret_from_fork+0x116/0x1d0 [ 27.204822] ? __pfx_kthread+0x10/0x10 [ 27.204848] ret_from_fork_asm+0x1a/0x30 [ 27.204882] </TASK> [ 27.204894] [ 27.213605] Allocated by task 309: [ 27.213772] kasan_save_stack+0x45/0x70 [ 27.214043] kasan_save_track+0x18/0x40 [ 27.214177] kasan_save_alloc_info+0x3b/0x50 [ 27.214323] __kasan_kmalloc+0xb7/0xc0 [ 27.214451] __kmalloc_cache_noprof+0x189/0x420 [ 27.214685] kasan_bitops_generic+0x92/0x1c0 [ 27.215102] kunit_try_run_case+0x1a5/0x480 [ 27.215311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.215559] kthread+0x337/0x6f0 [ 27.215737] ret_from_fork+0x116/0x1d0 [ 27.215970] ret_from_fork_asm+0x1a/0x30 [ 27.216113] [ 27.216179] The buggy address belongs to the object at ffff888105807fa0 [ 27.216179] which belongs to the cache kmalloc-16 of size 16 [ 27.216566] The buggy address is located 8 bytes inside of [ 27.216566] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.217147] [ 27.217241] The buggy address belongs to the physical page: [ 27.217489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.217850] flags: 0x200000000000000(node=0|zone=2) [ 27.218250] page_type: f5(slab) [ 27.218429] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.218694] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.218934] page dumped because: kasan: bad access detected [ 27.219263] [ 27.219356] Memory state around the buggy address: [ 27.219580] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.219920] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.220134] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.220366] ^ [ 27.220624] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.220954] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.221342] ================================================================== [ 27.281575] ================================================================== [ 27.281890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 27.282216] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.282511] [ 27.282609] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.282656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.282670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.282692] Call Trace: [ 27.282826] <TASK> [ 27.282847] dump_stack_lvl+0x73/0xb0 [ 27.282877] print_report+0xd1/0x610 [ 27.282899] ? __virt_addr_valid+0x1db/0x2d0 [ 27.282923] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 27.282949] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.282975] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 27.282999] kasan_report+0x141/0x180 [ 27.283022] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 27.283051] kasan_check_range+0x10c/0x1c0 [ 27.283074] __kasan_check_write+0x18/0x20 [ 27.283097] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 27.283123] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.283149] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.283172] ? trace_hardirqs_on+0x37/0xe0 [ 27.283194] ? kasan_bitops_generic+0x92/0x1c0 [ 27.283221] kasan_bitops_generic+0x116/0x1c0 [ 27.283244] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.283267] ? trace_hardirqs_on+0x37/0xe0 [ 27.283288] ? __pfx_read_tsc+0x10/0x10 [ 27.283311] ? ktime_get_ts64+0x86/0x230 [ 27.283332] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.283359] kunit_try_run_case+0x1a5/0x480 [ 27.283381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.283402] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.283427] ? __kthread_parkme+0x82/0x180 [ 27.283447] ? preempt_count_sub+0x50/0x80 [ 27.283470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.283512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.283538] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.283564] kthread+0x337/0x6f0 [ 27.283583] ? trace_preempt_on+0x20/0xc0 [ 27.283606] ? __pfx_kthread+0x10/0x10 [ 27.283627] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.283649] ? calculate_sigpending+0x7b/0xa0 [ 27.283675] ? __pfx_kthread+0x10/0x10 [ 27.283705] ret_from_fork+0x116/0x1d0 [ 27.283724] ? __pfx_kthread+0x10/0x10 [ 27.283746] ret_from_fork_asm+0x1a/0x30 [ 27.283940] </TASK> [ 27.283954] [ 27.294384] Allocated by task 309: [ 27.294581] kasan_save_stack+0x45/0x70 [ 27.294759] kasan_save_track+0x18/0x40 [ 27.295015] kasan_save_alloc_info+0x3b/0x50 [ 27.295171] __kasan_kmalloc+0xb7/0xc0 [ 27.295354] __kmalloc_cache_noprof+0x189/0x420 [ 27.295597] kasan_bitops_generic+0x92/0x1c0 [ 27.295979] kunit_try_run_case+0x1a5/0x480 [ 27.296200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.296403] kthread+0x337/0x6f0 [ 27.296575] ret_from_fork+0x116/0x1d0 [ 27.296837] ret_from_fork_asm+0x1a/0x30 [ 27.297043] [ 27.297140] The buggy address belongs to the object at ffff888105807fa0 [ 27.297140] which belongs to the cache kmalloc-16 of size 16 [ 27.297586] The buggy address is located 8 bytes inside of [ 27.297586] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.298168] [ 27.298263] The buggy address belongs to the physical page: [ 27.298509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.298911] flags: 0x200000000000000(node=0|zone=2) [ 27.299139] page_type: f5(slab) [ 27.299284] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.299569] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.300065] page dumped because: kasan: bad access detected [ 27.300319] [ 27.300388] Memory state around the buggy address: [ 27.300597] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.300980] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.301270] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.301598] ^ [ 27.301856] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.302153] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.302404] ================================================================== [ 27.161344] ================================================================== [ 27.161954] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 27.162505] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.162827] [ 27.163233] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.163293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.163307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.163330] Call Trace: [ 27.163343] <TASK> [ 27.163363] dump_stack_lvl+0x73/0xb0 [ 27.163396] print_report+0xd1/0x610 [ 27.163420] ? __virt_addr_valid+0x1db/0x2d0 [ 27.163445] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 27.163470] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.163496] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 27.163538] kasan_report+0x141/0x180 [ 27.163560] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 27.163590] kasan_check_range+0x10c/0x1c0 [ 27.163614] __kasan_check_write+0x18/0x20 [ 27.163637] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 27.163663] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.163689] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.163729] ? trace_hardirqs_on+0x37/0xe0 [ 27.163751] ? kasan_bitops_generic+0x92/0x1c0 [ 27.163851] kasan_bitops_generic+0x116/0x1c0 [ 27.163880] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.163903] ? trace_hardirqs_on+0x37/0xe0 [ 27.163926] ? __pfx_read_tsc+0x10/0x10 [ 27.163948] ? ktime_get_ts64+0x86/0x230 [ 27.163971] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.163997] kunit_try_run_case+0x1a5/0x480 [ 27.164020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.164043] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.164067] ? __kthread_parkme+0x82/0x180 [ 27.164088] ? preempt_count_sub+0x50/0x80 [ 27.164112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.164134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.164160] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.164185] kthread+0x337/0x6f0 [ 27.164206] ? trace_preempt_on+0x20/0xc0 [ 27.164227] ? __pfx_kthread+0x10/0x10 [ 27.164248] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.164269] ? calculate_sigpending+0x7b/0xa0 [ 27.164294] ? __pfx_kthread+0x10/0x10 [ 27.164315] ret_from_fork+0x116/0x1d0 [ 27.164334] ? __pfx_kthread+0x10/0x10 [ 27.164357] ret_from_fork_asm+0x1a/0x30 [ 27.164389] </TASK> [ 27.164401] [ 27.173118] Allocated by task 309: [ 27.173302] kasan_save_stack+0x45/0x70 [ 27.173544] kasan_save_track+0x18/0x40 [ 27.173721] kasan_save_alloc_info+0x3b/0x50 [ 27.173965] __kasan_kmalloc+0xb7/0xc0 [ 27.174138] __kmalloc_cache_noprof+0x189/0x420 [ 27.174355] kasan_bitops_generic+0x92/0x1c0 [ 27.174652] kunit_try_run_case+0x1a5/0x480 [ 27.174812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.174988] kthread+0x337/0x6f0 [ 27.175104] ret_from_fork+0x116/0x1d0 [ 27.175275] ret_from_fork_asm+0x1a/0x30 [ 27.175467] [ 27.175640] The buggy address belongs to the object at ffff888105807fa0 [ 27.175640] which belongs to the cache kmalloc-16 of size 16 [ 27.176188] The buggy address is located 8 bytes inside of [ 27.176188] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.176820] [ 27.176889] The buggy address belongs to the physical page: [ 27.177060] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.177604] flags: 0x200000000000000(node=0|zone=2) [ 27.178093] page_type: f5(slab) [ 27.178279] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.178543] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.178825] page dumped because: kasan: bad access detected [ 27.179155] [ 27.179248] Memory state around the buggy address: [ 27.179468] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.179718] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.179935] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.180211] ^ [ 27.180424] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.180869] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.181398] ================================================================== [ 27.262217] ================================================================== [ 27.262484] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 27.262938] Write of size 8 at addr ffff888105807fa8 by task kunit_try_catch/309 [ 27.263212] [ 27.263324] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) [ 27.263372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.263386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.263408] Call Trace: [ 27.263426] <TASK> [ 27.263444] dump_stack_lvl+0x73/0xb0 [ 27.263472] print_report+0xd1/0x610 [ 27.263515] ? __virt_addr_valid+0x1db/0x2d0 [ 27.263539] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 27.263567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.263593] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 27.263618] kasan_report+0x141/0x180 [ 27.263641] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 27.263669] kasan_check_range+0x10c/0x1c0 [ 27.263693] __kasan_check_write+0x18/0x20 [ 27.263725] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 27.263750] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.263971] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.263998] ? trace_hardirqs_on+0x37/0xe0 [ 27.264022] ? kasan_bitops_generic+0x92/0x1c0 [ 27.264050] kasan_bitops_generic+0x116/0x1c0 [ 27.264074] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.264098] ? trace_hardirqs_on+0x37/0xe0 [ 27.264121] ? __pfx_read_tsc+0x10/0x10 [ 27.264142] ? ktime_get_ts64+0x86/0x230 [ 27.264165] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 27.264190] kunit_try_run_case+0x1a5/0x480 [ 27.264214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.264237] ? queued_spin_lock_slowpath+0x116/0xb40 [ 27.264261] ? __kthread_parkme+0x82/0x180 [ 27.264281] ? preempt_count_sub+0x50/0x80 [ 27.264305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.264328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.264352] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.264377] kthread+0x337/0x6f0 [ 27.264398] ? trace_preempt_on+0x20/0xc0 [ 27.264419] ? __pfx_kthread+0x10/0x10 [ 27.264441] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.264462] ? calculate_sigpending+0x7b/0xa0 [ 27.264511] ? __pfx_kthread+0x10/0x10 [ 27.264532] ret_from_fork+0x116/0x1d0 [ 27.264552] ? __pfx_kthread+0x10/0x10 [ 27.264573] ret_from_fork_asm+0x1a/0x30 [ 27.264604] </TASK> [ 27.264616] [ 27.273029] Allocated by task 309: [ 27.273215] kasan_save_stack+0x45/0x70 [ 27.273414] kasan_save_track+0x18/0x40 [ 27.273627] kasan_save_alloc_info+0x3b/0x50 [ 27.273893] __kasan_kmalloc+0xb7/0xc0 [ 27.274032] __kmalloc_cache_noprof+0x189/0x420 [ 27.274188] kasan_bitops_generic+0x92/0x1c0 [ 27.274396] kunit_try_run_case+0x1a5/0x480 [ 27.274619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.274950] kthread+0x337/0x6f0 [ 27.275124] ret_from_fork+0x116/0x1d0 [ 27.275277] ret_from_fork_asm+0x1a/0x30 [ 27.275450] [ 27.275562] The buggy address belongs to the object at ffff888105807fa0 [ 27.275562] which belongs to the cache kmalloc-16 of size 16 [ 27.276242] The buggy address is located 8 bytes inside of [ 27.276242] allocated 9-byte region [ffff888105807fa0, ffff888105807fa9) [ 27.276873] [ 27.276971] The buggy address belongs to the physical page: [ 27.277157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105807 [ 27.277399] flags: 0x200000000000000(node=0|zone=2) [ 27.277588] page_type: f5(slab) [ 27.277741] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.278154] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.278488] page dumped because: kasan: bad access detected [ 27.278843] [ 27.278936] Memory state around the buggy address: [ 27.279158] ffff888105807e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.279438] ffff888105807f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.279753] >ffff888105807f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 27.280252] ^ [ 27.280478] ffff888105808000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.280847] ffff888105808080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 27.281165] ==================================================================