Date
July 22, 2025, 5:13 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.667212] ================================================================== [ 32.667266] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 32.667399] Read of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292 [ 32.668624] __asan_report_load8_noabort+0x20/0x30 [ 32.669379] ret_from_fork+0x10/0x20 [ 32.669429] [ 32.670268] kasan_save_track+0x20/0x40 [ 32.670908] kunit_try_run_case+0x170/0x3f0 [ 32.671890] The buggy address is located 8 bytes inside of [ 32.671890] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.673208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.675755] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 32.677249] kthread+0x328/0x630 [ 32.677292] ret_from_fork+0x10/0x20 [ 32.677341] [ 32.677380] Allocated by task 292: [ 32.677412] kasan_save_stack+0x3c/0x68 [ 32.677705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.678359] The buggy address is located 8 bytes inside of [ 32.678359] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.679412] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.680288] fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.682531] [ 32.683100] Call trace: [ 32.683928] kasan_bitops_generic+0x110/0x1c8 [ 32.684162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.684439] kthread+0x328/0x630 [ 32.684527] ret_from_fork+0x10/0x20 [ 32.684580] [ 32.684636] Allocated by task 292: [ 32.684672] kasan_save_stack+0x3c/0x68 [ 32.684717] kasan_save_track+0x20/0x40 [ 32.684885] kasan_save_alloc_info+0x40/0x58 [ 32.685403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.686033] The buggy address belongs to the object at fff00000c7b7a960 [ 32.686033] which belongs to the cache kmalloc-16 of size 16 [ 32.686824] page_type: f5(slab) [ 32.687037] page dumped because: kasan: bad access detected [ 32.687192] fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 32.688572] Write of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292 [ 32.690426] kunit_try_run_case+0x170/0x3f0 [ 32.690770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.691178] kthread+0x328/0x630 [ 32.691546] kasan_save_stack+0x3c/0x68 [ 32.692450] kunit_try_run_case+0x170/0x3f0 [ 32.693396] The buggy address is located 8 bytes inside of [ 32.693396] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.694142] page_type: f5(slab) [ 32.694407] page dumped because: kasan: bad access detected [ 32.694696] ^ [ 32.698200] kasan_report+0xdc/0x128 [ 32.698723] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 32.699166] kunit_try_run_case+0x170/0x3f0 [ 32.699773] ret_from_fork+0x10/0x20 [ 32.700310] kasan_bitops_generic+0xa0/0x1c8 [ 32.700454] kthread+0x328/0x630 [ 32.700632] The buggy address is located 8 bytes inside of [ 32.700632] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.701723] page dumped because: kasan: bad access detected [ 32.702515] ^ [ 32.703883] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 32.705262] kasan_report+0xdc/0x128 [ 32.705548] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 32.706315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.707962] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.709050] [ 32.709212] The buggy address is located 8 bytes inside of [ 32.709212] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.709752] page dumped because: kasan: bad access detected [ 32.710120] fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.711897] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.712738] kasan_check_range+0x100/0x1a8 [ 32.712789] __kasan_check_write+0x20/0x30 [ 32.713166] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 32.713453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.715405] kasan_bitops_generic+0xa0/0x1c8 [ 32.715843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.716553] The buggy address is located 8 bytes inside of [ 32.716553] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.717441] page dumped because: kasan: bad access detected [ 32.718169] >fff00000c7b7a900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.719799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 32.720543] kasan_report+0xdc/0x128 [ 32.720802] kunit_try_run_case+0x170/0x3f0 [ 32.721310] kasan_bitops_generic+0xa0/0x1c8 [ 32.721516] [ 32.721666] [ 32.721721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a [ 32.723295] ^ [ 32.724697] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 32.725470] dump_stack_lvl+0x8c/0xd0 [ 32.725520] print_report+0x118/0x5e8 [ 32.725774] kasan_report+0xdc/0x128 [ 32.726125] kasan_bitops_generic+0x110/0x1c8 [ 32.727128] kasan_save_stack+0x3c/0x68 [ 32.727896] kasan_bitops_generic+0xa0/0x1c8 [ 32.728345] kthread+0x328/0x630 [ 32.728766] The buggy address is located 8 bytes inside of [ 32.728766] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.729895] page_type: f5(slab) [ 32.730417] page dumped because: kasan: bad access detected [ 32.730802] fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 32.734526] Write of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292 [ 32.735072] show_stack+0x20/0x38 (C) [ 32.735136] dump_stack_lvl+0x8c/0xd0 [ 32.735294] print_report+0x118/0x5e8 [ 32.735354] kasan_report+0xdc/0x128 [ 32.735428] kasan_check_range+0x100/0x1a8 [ 32.735531] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 32.735921] kasan_save_stack+0x3c/0x68 [ 32.736056] __kasan_kmalloc+0xd4/0xd8 [ 32.736094] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.736264] kthread+0x328/0x630 [ 32.736357] The buggy address belongs to the object at fff00000c7b7a960 [ 32.736357] which belongs to the cache kmalloc-16 of size 16 [ 32.736593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.736733] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.737954] ^ [ 32.739548] Read of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292 [ 32.739861] Hardware name: linux,dummy-virt (DT) [ 32.739899] Call trace: [ 32.740444] __asan_report_load8_noabort+0x20/0x30 [ 32.741301] kthread+0x328/0x630 [ 32.742198] __kasan_kmalloc+0xd4/0xd8 [ 32.743164] kthread+0x328/0x630 [ 32.743391] [ 32.743590] The buggy address is located 8 bytes inside of [ 32.743590] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.744782] [ 32.745498] ^ [ 32.746806] ================================================================== [ 32.660058] ================================================================== [ 32.660119] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 32.660178] Write of size 8 at addr fff00000c7b7a968 by task kunit_try_catch/292 [ 32.660229] [ 32.660265] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250722 #1 PREEMPT [ 32.660355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.660387] Hardware name: linux,dummy-virt (DT) [ 32.660420] Call trace: [ 32.660444] show_stack+0x20/0x38 (C) [ 32.660494] dump_stack_lvl+0x8c/0xd0 [ 32.660541] print_report+0x118/0x5e8 [ 32.660586] kasan_report+0xdc/0x128 [ 32.660630] kasan_check_range+0x100/0x1a8 [ 32.660678] __kasan_check_write+0x20/0x30 [ 32.660725] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 32.660779] kasan_bitops_generic+0x110/0x1c8 [ 32.661201] kunit_try_run_case+0x170/0x3f0 [ 32.661565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.661659] kthread+0x328/0x630 [ 32.661706] ret_from_fork+0x10/0x20 [ 32.662425] [ 32.662480] Allocated by task 292: [ 32.662589] kasan_save_stack+0x3c/0x68 [ 32.662676] kasan_save_track+0x20/0x40 [ 32.662822] kasan_save_alloc_info+0x40/0x58 [ 32.662879] __kasan_kmalloc+0xd4/0xd8 [ 32.663231] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.663311] kasan_bitops_generic+0xa0/0x1c8 [ 32.663411] kunit_try_run_case+0x170/0x3f0 [ 32.663482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.663616] kthread+0x328/0x630 [ 32.663794] ret_from_fork+0x10/0x20 [ 32.663860] [ 32.663882] The buggy address belongs to the object at fff00000c7b7a960 [ 32.663882] which belongs to the cache kmalloc-16 of size 16 [ 32.663961] The buggy address is located 8 bytes inside of [ 32.663961] allocated 9-byte region [fff00000c7b7a960, fff00000c7b7a969) [ 32.664313] [ 32.664372] The buggy address belongs to the physical page: [ 32.664465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107b7a [ 32.664580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.664713] page_type: f5(slab) [ 32.664787] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.664990] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.665176] page dumped because: kasan: bad access detected [ 32.665231] [ 32.665311] Memory state around the buggy address: [ 32.665389] fff00000c7b7a800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.665499] fff00000c7b7a880: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 32.665632] >fff00000c7b7a900: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 32.665711] ^ [ 32.665820] fff00000c7b7a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.665893] fff00000c7b7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.665948] ==================================================================
[ 27.213313] ================================================================== [ 27.214052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 27.214670] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309 [ 27.215015] [ 27.215110] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 27.215159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.215182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.215204] Call Trace: [ 27.215218] <TASK> [ 27.215233] dump_stack_lvl+0x73/0xb0 [ 27.215262] print_report+0xd1/0x640 [ 27.215286] ? __virt_addr_valid+0x1db/0x2d0 [ 27.215309] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 27.215347] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.215374] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 27.215400] kasan_report+0x141/0x180 [ 27.215435] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 27.215477] kasan_check_range+0x10c/0x1c0 [ 27.215503] __kasan_check_write+0x18/0x20 [ 27.215527] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 27.215553] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.215628] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.215667] ? trace_hardirqs_on+0x37/0xe0 [ 27.215689] ? kasan_bitops_generic+0x92/0x1c0 [ 27.215718] kasan_bitops_generic+0x116/0x1c0 [ 27.215743] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.215768] ? __pfx_read_tsc+0x10/0x10 [ 27.215790] ? ktime_get_ts64+0x86/0x230 [ 27.215813] kunit_try_run_case+0x1a5/0x480 [ 27.215860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.215884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.215910] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.215947] ? __kthread_parkme+0x82/0x180 [ 27.215967] ? preempt_count_sub+0x50/0x80 [ 27.215990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.216015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.216048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.216072] kthread+0x337/0x6f0 [ 27.216092] ? trace_preempt_on+0x20/0xc0 [ 27.216127] ? __pfx_kthread+0x10/0x10 [ 27.216149] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.216183] ? calculate_sigpending+0x7b/0xa0 [ 27.216207] ? __pfx_kthread+0x10/0x10 [ 27.216237] ret_from_fork+0x116/0x1d0 [ 27.216257] ? __pfx_kthread+0x10/0x10 [ 27.216279] ret_from_fork_asm+0x1a/0x30 [ 27.216320] </TASK> [ 27.216331] [ 27.225125] Allocated by task 309: [ 27.225256] kasan_save_stack+0x45/0x70 [ 27.225541] kasan_save_track+0x18/0x40 [ 27.225943] kasan_save_alloc_info+0x3b/0x50 [ 27.226175] __kasan_kmalloc+0xb7/0xc0 [ 27.226363] __kmalloc_cache_noprof+0x189/0x420 [ 27.226799] kasan_bitops_generic+0x92/0x1c0 [ 27.227028] kunit_try_run_case+0x1a5/0x480 [ 27.227305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.227727] kthread+0x337/0x6f0 [ 27.227916] ret_from_fork+0x116/0x1d0 [ 27.228053] ret_from_fork_asm+0x1a/0x30 [ 27.228275] [ 27.228369] The buggy address belongs to the object at ffff888104919c80 [ 27.228369] which belongs to the cache kmalloc-16 of size 16 [ 27.229175] The buggy address is located 8 bytes inside of [ 27.229175] allocated 9-byte region [ffff888104919c80, ffff888104919c89) [ 27.229796] [ 27.229890] The buggy address belongs to the physical page: [ 27.230070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919 [ 27.230792] flags: 0x200000000000000(node=0|zone=2) [ 27.231071] page_type: f5(slab) [ 27.231335] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.231816] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.232156] page dumped because: kasan: bad access detected [ 27.232358] [ 27.232427] Memory state around the buggy address: [ 27.232821] ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.233226] ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.233601] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.233877] ^ [ 27.234257] ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.234625] ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.235003] ================================================================== [ 27.235592] ================================================================== [ 27.236114] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 27.236507] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309 [ 27.236878] [ 27.237000] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 27.237048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.237073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.237094] Call Trace: [ 27.237108] <TASK> [ 27.237122] dump_stack_lvl+0x73/0xb0 [ 27.237162] print_report+0xd1/0x640 [ 27.237208] ? __virt_addr_valid+0x1db/0x2d0 [ 27.237232] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 27.237259] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.237297] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 27.237324] kasan_report+0x141/0x180 [ 27.237347] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 27.237377] kasan_check_range+0x10c/0x1c0 [ 27.237402] __kasan_check_write+0x18/0x20 [ 27.237425] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 27.237598] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.237638] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.237664] ? trace_hardirqs_on+0x37/0xe0 [ 27.237687] ? kasan_bitops_generic+0x92/0x1c0 [ 27.237715] kasan_bitops_generic+0x116/0x1c0 [ 27.237739] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.237765] ? __pfx_read_tsc+0x10/0x10 [ 27.237788] ? ktime_get_ts64+0x86/0x230 [ 27.237812] kunit_try_run_case+0x1a5/0x480 [ 27.237853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.237878] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.237905] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.237930] ? __kthread_parkme+0x82/0x180 [ 27.237950] ? preempt_count_sub+0x50/0x80 [ 27.237974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.237998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.238023] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.238048] kthread+0x337/0x6f0 [ 27.238068] ? trace_preempt_on+0x20/0xc0 [ 27.238092] ? __pfx_kthread+0x10/0x10 [ 27.238113] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.238137] ? calculate_sigpending+0x7b/0xa0 [ 27.238161] ? __pfx_kthread+0x10/0x10 [ 27.238182] ret_from_fork+0x116/0x1d0 [ 27.238203] ? __pfx_kthread+0x10/0x10 [ 27.238224] ret_from_fork_asm+0x1a/0x30 [ 27.238256] </TASK> [ 27.238267] [ 27.247230] Allocated by task 309: [ 27.247416] kasan_save_stack+0x45/0x70 [ 27.247674] kasan_save_track+0x18/0x40 [ 27.247880] kasan_save_alloc_info+0x3b/0x50 [ 27.248030] __kasan_kmalloc+0xb7/0xc0 [ 27.248163] __kmalloc_cache_noprof+0x189/0x420 [ 27.248416] kasan_bitops_generic+0x92/0x1c0 [ 27.248921] kunit_try_run_case+0x1a5/0x480 [ 27.249119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.249297] kthread+0x337/0x6f0 [ 27.249520] ret_from_fork+0x116/0x1d0 [ 27.249746] ret_from_fork_asm+0x1a/0x30 [ 27.249973] [ 27.250074] The buggy address belongs to the object at ffff888104919c80 [ 27.250074] which belongs to the cache kmalloc-16 of size 16 [ 27.250739] The buggy address is located 8 bytes inside of [ 27.250739] allocated 9-byte region [ffff888104919c80, ffff888104919c89) [ 27.251288] [ 27.251405] The buggy address belongs to the physical page: [ 27.251722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919 [ 27.252101] flags: 0x200000000000000(node=0|zone=2) [ 27.252398] page_type: f5(slab) [ 27.252586] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.252826] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.253199] page dumped because: kasan: bad access detected [ 27.253639] [ 27.253746] Memory state around the buggy address: [ 27.253988] ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.254274] ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.254661] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.255035] ^ [ 27.255261] ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.255653] ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.255967] ================================================================== [ 27.128450] ================================================================== [ 27.129256] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 27.129764] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309 [ 27.130086] [ 27.130173] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 27.130231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.130244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.130266] Call Trace: [ 27.130290] <TASK> [ 27.130303] dump_stack_lvl+0x73/0xb0 [ 27.130332] print_report+0xd1/0x640 [ 27.130356] ? __virt_addr_valid+0x1db/0x2d0 [ 27.130380] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 27.130406] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.130442] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 27.130469] kasan_report+0x141/0x180 [ 27.130492] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 27.130542] kasan_check_range+0x10c/0x1c0 [ 27.130568] __kasan_check_write+0x18/0x20 [ 27.130593] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 27.130620] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.130697] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.130737] ? trace_hardirqs_on+0x37/0xe0 [ 27.130759] ? kasan_bitops_generic+0x92/0x1c0 [ 27.130788] kasan_bitops_generic+0x116/0x1c0 [ 27.130821] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.130862] ? __pfx_read_tsc+0x10/0x10 [ 27.130885] ? ktime_get_ts64+0x86/0x230 [ 27.130910] kunit_try_run_case+0x1a5/0x480 [ 27.130935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.130959] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.130987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.131014] ? __kthread_parkme+0x82/0x180 [ 27.131035] ? preempt_count_sub+0x50/0x80 [ 27.131059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.131084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.131108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.131133] kthread+0x337/0x6f0 [ 27.131154] ? trace_preempt_on+0x20/0xc0 [ 27.131186] ? __pfx_kthread+0x10/0x10 [ 27.131216] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.131240] ? calculate_sigpending+0x7b/0xa0 [ 27.131264] ? __pfx_kthread+0x10/0x10 [ 27.131296] ret_from_fork+0x116/0x1d0 [ 27.131318] ? __pfx_kthread+0x10/0x10 [ 27.131339] ret_from_fork_asm+0x1a/0x30 [ 27.131371] </TASK> [ 27.131383] [ 27.140116] Allocated by task 309: [ 27.140370] kasan_save_stack+0x45/0x70 [ 27.140841] kasan_save_track+0x18/0x40 [ 27.141057] kasan_save_alloc_info+0x3b/0x50 [ 27.141267] __kasan_kmalloc+0xb7/0xc0 [ 27.141593] __kmalloc_cache_noprof+0x189/0x420 [ 27.141959] kasan_bitops_generic+0x92/0x1c0 [ 27.142123] kunit_try_run_case+0x1a5/0x480 [ 27.142608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.142886] kthread+0x337/0x6f0 [ 27.143057] ret_from_fork+0x116/0x1d0 [ 27.143276] ret_from_fork_asm+0x1a/0x30 [ 27.143520] [ 27.143601] The buggy address belongs to the object at ffff888104919c80 [ 27.143601] which belongs to the cache kmalloc-16 of size 16 [ 27.144023] The buggy address is located 8 bytes inside of [ 27.144023] allocated 9-byte region [ffff888104919c80, ffff888104919c89) [ 27.144757] [ 27.145070] The buggy address belongs to the physical page: [ 27.145300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919 [ 27.145858] flags: 0x200000000000000(node=0|zone=2) [ 27.146031] page_type: f5(slab) [ 27.146172] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.146609] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.146979] page dumped because: kasan: bad access detected [ 27.147216] [ 27.147382] Memory state around the buggy address: [ 27.147670] ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.148003] ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.148293] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.148742] ^ [ 27.148938] ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.149275] ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.149687] ================================================================== [ 27.086766] ================================================================== [ 27.087250] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 27.087938] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309 [ 27.088241] [ 27.088420] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 27.088473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.088486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.088508] Call Trace: [ 27.088521] <TASK> [ 27.088538] dump_stack_lvl+0x73/0xb0 [ 27.088608] print_report+0xd1/0x640 [ 27.088632] ? __virt_addr_valid+0x1db/0x2d0 [ 27.088699] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 27.088728] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.088755] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 27.088782] kasan_report+0x141/0x180 [ 27.088806] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 27.088858] kasan_check_range+0x10c/0x1c0 [ 27.088891] __kasan_check_write+0x18/0x20 [ 27.088926] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 27.088954] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.088982] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.089007] ? trace_hardirqs_on+0x37/0xe0 [ 27.089030] ? kasan_bitops_generic+0x92/0x1c0 [ 27.089067] kasan_bitops_generic+0x116/0x1c0 [ 27.089092] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.089129] ? __pfx_read_tsc+0x10/0x10 [ 27.089152] ? ktime_get_ts64+0x86/0x230 [ 27.089188] kunit_try_run_case+0x1a5/0x480 [ 27.089214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.089241] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.089268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.089295] ? __kthread_parkme+0x82/0x180 [ 27.089316] ? preempt_count_sub+0x50/0x80 [ 27.089340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.089366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.089390] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.089415] kthread+0x337/0x6f0 [ 27.089436] ? trace_preempt_on+0x20/0xc0 [ 27.089505] ? __pfx_kthread+0x10/0x10 [ 27.089529] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.089554] ? calculate_sigpending+0x7b/0xa0 [ 27.089579] ? __pfx_kthread+0x10/0x10 [ 27.089602] ret_from_fork+0x116/0x1d0 [ 27.089623] ? __pfx_kthread+0x10/0x10 [ 27.089645] ret_from_fork_asm+0x1a/0x30 [ 27.089677] </TASK> [ 27.089689] [ 27.098201] Allocated by task 309: [ 27.098383] kasan_save_stack+0x45/0x70 [ 27.098599] kasan_save_track+0x18/0x40 [ 27.098791] kasan_save_alloc_info+0x3b/0x50 [ 27.099091] __kasan_kmalloc+0xb7/0xc0 [ 27.099333] __kmalloc_cache_noprof+0x189/0x420 [ 27.099622] kasan_bitops_generic+0x92/0x1c0 [ 27.099853] kunit_try_run_case+0x1a5/0x480 [ 27.100044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.100338] kthread+0x337/0x6f0 [ 27.100524] ret_from_fork+0x116/0x1d0 [ 27.100756] ret_from_fork_asm+0x1a/0x30 [ 27.100955] [ 27.101028] The buggy address belongs to the object at ffff888104919c80 [ 27.101028] which belongs to the cache kmalloc-16 of size 16 [ 27.101540] The buggy address is located 8 bytes inside of [ 27.101540] allocated 9-byte region [ffff888104919c80, ffff888104919c89) [ 27.102175] [ 27.102362] The buggy address belongs to the physical page: [ 27.102699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919 [ 27.103078] flags: 0x200000000000000(node=0|zone=2) [ 27.103298] page_type: f5(slab) [ 27.103538] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.103890] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.104203] page dumped because: kasan: bad access detected [ 27.104445] [ 27.104612] Memory state around the buggy address: [ 27.104811] ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.105141] ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.105452] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.105670] ^ [ 27.105793] ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.106118] ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.106722] ================================================================== [ 27.150180] ================================================================== [ 27.150555] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 27.150961] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309 [ 27.151283] [ 27.151368] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 27.151416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.151429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.151450] Call Trace: [ 27.151514] <TASK> [ 27.151531] dump_stack_lvl+0x73/0xb0 [ 27.151560] print_report+0xd1/0x640 [ 27.151595] ? __virt_addr_valid+0x1db/0x2d0 [ 27.151619] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 27.151658] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.151686] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 27.151712] kasan_report+0x141/0x180 [ 27.151735] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 27.151767] kasan_check_range+0x10c/0x1c0 [ 27.151791] __kasan_check_write+0x18/0x20 [ 27.151816] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 27.151861] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.151889] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.151924] ? trace_hardirqs_on+0x37/0xe0 [ 27.151947] ? kasan_bitops_generic+0x92/0x1c0 [ 27.151976] kasan_bitops_generic+0x116/0x1c0 [ 27.152009] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.152036] ? __pfx_read_tsc+0x10/0x10 [ 27.152059] ? ktime_get_ts64+0x86/0x230 [ 27.152094] kunit_try_run_case+0x1a5/0x480 [ 27.152120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.152144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.152170] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.152205] ? __kthread_parkme+0x82/0x180 [ 27.152226] ? preempt_count_sub+0x50/0x80 [ 27.152250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.152286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.152310] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.152334] kthread+0x337/0x6f0 [ 27.152355] ? trace_preempt_on+0x20/0xc0 [ 27.152378] ? __pfx_kthread+0x10/0x10 [ 27.152400] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.152424] ? calculate_sigpending+0x7b/0xa0 [ 27.152448] ? __pfx_kthread+0x10/0x10 [ 27.152479] ret_from_fork+0x116/0x1d0 [ 27.152509] ? __pfx_kthread+0x10/0x10 [ 27.152531] ret_from_fork_asm+0x1a/0x30 [ 27.152668] </TASK> [ 27.152684] [ 27.161625] Allocated by task 309: [ 27.161814] kasan_save_stack+0x45/0x70 [ 27.162030] kasan_save_track+0x18/0x40 [ 27.162368] kasan_save_alloc_info+0x3b/0x50 [ 27.162703] __kasan_kmalloc+0xb7/0xc0 [ 27.162895] __kmalloc_cache_noprof+0x189/0x420 [ 27.163069] kasan_bitops_generic+0x92/0x1c0 [ 27.163369] kunit_try_run_case+0x1a5/0x480 [ 27.163772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.164062] kthread+0x337/0x6f0 [ 27.164260] ret_from_fork+0x116/0x1d0 [ 27.164443] ret_from_fork_asm+0x1a/0x30 [ 27.164734] [ 27.164806] The buggy address belongs to the object at ffff888104919c80 [ 27.164806] which belongs to the cache kmalloc-16 of size 16 [ 27.165401] The buggy address is located 8 bytes inside of [ 27.165401] allocated 9-byte region [ffff888104919c80, ffff888104919c89) [ 27.166047] [ 27.166134] The buggy address belongs to the physical page: [ 27.166745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919 [ 27.167029] flags: 0x200000000000000(node=0|zone=2) [ 27.167197] page_type: f5(slab) [ 27.167319] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.167554] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.167783] page dumped because: kasan: bad access detected [ 27.168039] [ 27.168129] Memory state around the buggy address: [ 27.168510] ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.168826] ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.169152] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.169392] ^ [ 27.169513] ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.169737] ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.169962] ================================================================== [ 27.191923] ================================================================== [ 27.192562] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 27.192842] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309 [ 27.193269] [ 27.193386] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 27.193432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.193445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.193466] Call Trace: [ 27.193480] <TASK> [ 27.193508] dump_stack_lvl+0x73/0xb0 [ 27.193536] print_report+0xd1/0x640 [ 27.193561] ? __virt_addr_valid+0x1db/0x2d0 [ 27.193733] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 27.193761] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.193803] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 27.193842] kasan_report+0x141/0x180 [ 27.193868] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 27.193908] kasan_check_range+0x10c/0x1c0 [ 27.193933] __kasan_check_write+0x18/0x20 [ 27.193968] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 27.193994] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.194021] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.194045] ? trace_hardirqs_on+0x37/0xe0 [ 27.194077] ? kasan_bitops_generic+0x92/0x1c0 [ 27.194105] kasan_bitops_generic+0x116/0x1c0 [ 27.194140] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.194167] ? __pfx_read_tsc+0x10/0x10 [ 27.194189] ? ktime_get_ts64+0x86/0x230 [ 27.194213] kunit_try_run_case+0x1a5/0x480 [ 27.194238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.194271] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.194296] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.194322] ? __kthread_parkme+0x82/0x180 [ 27.194353] ? preempt_count_sub+0x50/0x80 [ 27.194377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.194402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.194435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.194460] kthread+0x337/0x6f0 [ 27.194480] ? trace_preempt_on+0x20/0xc0 [ 27.194525] ? __pfx_kthread+0x10/0x10 [ 27.194546] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.194570] ? calculate_sigpending+0x7b/0xa0 [ 27.194600] ? __pfx_kthread+0x10/0x10 [ 27.194622] ret_from_fork+0x116/0x1d0 [ 27.194643] ? __pfx_kthread+0x10/0x10 [ 27.194664] ret_from_fork_asm+0x1a/0x30 [ 27.194695] </TASK> [ 27.194706] [ 27.203894] Allocated by task 309: [ 27.204072] kasan_save_stack+0x45/0x70 [ 27.204370] kasan_save_track+0x18/0x40 [ 27.204815] kasan_save_alloc_info+0x3b/0x50 [ 27.205054] __kasan_kmalloc+0xb7/0xc0 [ 27.205316] __kmalloc_cache_noprof+0x189/0x420 [ 27.205739] kasan_bitops_generic+0x92/0x1c0 [ 27.205985] kunit_try_run_case+0x1a5/0x480 [ 27.206158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.206404] kthread+0x337/0x6f0 [ 27.206762] ret_from_fork+0x116/0x1d0 [ 27.206922] ret_from_fork_asm+0x1a/0x30 [ 27.207064] [ 27.207132] The buggy address belongs to the object at ffff888104919c80 [ 27.207132] which belongs to the cache kmalloc-16 of size 16 [ 27.208038] The buggy address is located 8 bytes inside of [ 27.208038] allocated 9-byte region [ffff888104919c80, ffff888104919c89) [ 27.208708] [ 27.208787] The buggy address belongs to the physical page: [ 27.208987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919 [ 27.209232] flags: 0x200000000000000(node=0|zone=2) [ 27.209396] page_type: f5(slab) [ 27.209514] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.209850] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.210195] page dumped because: kasan: bad access detected [ 27.210490] [ 27.210580] Memory state around the buggy address: [ 27.210803] ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.211131] ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.211447] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.211761] ^ [ 27.212028] ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.212549] ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.212763] ================================================================== [ 27.170432] ================================================================== [ 27.171238] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 27.171821] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309 [ 27.172176] [ 27.172281] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 27.172328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.172341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.172361] Call Trace: [ 27.172378] <TASK> [ 27.172393] dump_stack_lvl+0x73/0xb0 [ 27.172420] print_report+0xd1/0x640 [ 27.172443] ? __virt_addr_valid+0x1db/0x2d0 [ 27.172466] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 27.172493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.172519] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 27.172546] kasan_report+0x141/0x180 [ 27.172569] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 27.172600] kasan_check_range+0x10c/0x1c0 [ 27.172625] __kasan_check_write+0x18/0x20 [ 27.172649] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 27.172675] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.172703] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.172728] ? trace_hardirqs_on+0x37/0xe0 [ 27.172752] ? kasan_bitops_generic+0x92/0x1c0 [ 27.172780] kasan_bitops_generic+0x116/0x1c0 [ 27.172805] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.172840] ? __pfx_read_tsc+0x10/0x10 [ 27.172863] ? ktime_get_ts64+0x86/0x230 [ 27.172894] kunit_try_run_case+0x1a5/0x480 [ 27.172919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.172943] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.172969] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.172996] ? __kthread_parkme+0x82/0x180 [ 27.173016] ? preempt_count_sub+0x50/0x80 [ 27.173040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.173065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.173091] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.173118] kthread+0x337/0x6f0 [ 27.173141] ? trace_preempt_on+0x20/0xc0 [ 27.173165] ? __pfx_kthread+0x10/0x10 [ 27.173257] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.173282] ? calculate_sigpending+0x7b/0xa0 [ 27.173318] ? __pfx_kthread+0x10/0x10 [ 27.173342] ret_from_fork+0x116/0x1d0 [ 27.173364] ? __pfx_kthread+0x10/0x10 [ 27.173386] ret_from_fork_asm+0x1a/0x30 [ 27.173418] </TASK> [ 27.173429] [ 27.183003] Allocated by task 309: [ 27.183176] kasan_save_stack+0x45/0x70 [ 27.183390] kasan_save_track+0x18/0x40 [ 27.183616] kasan_save_alloc_info+0x3b/0x50 [ 27.183827] __kasan_kmalloc+0xb7/0xc0 [ 27.184049] __kmalloc_cache_noprof+0x189/0x420 [ 27.184262] kasan_bitops_generic+0x92/0x1c0 [ 27.184414] kunit_try_run_case+0x1a5/0x480 [ 27.184560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.184736] kthread+0x337/0x6f0 [ 27.184874] ret_from_fork+0x116/0x1d0 [ 27.185007] ret_from_fork_asm+0x1a/0x30 [ 27.185146] [ 27.185214] The buggy address belongs to the object at ffff888104919c80 [ 27.185214] which belongs to the cache kmalloc-16 of size 16 [ 27.185690] The buggy address is located 8 bytes inside of [ 27.185690] allocated 9-byte region [ffff888104919c80, ffff888104919c89) [ 27.186646] [ 27.186748] The buggy address belongs to the physical page: [ 27.187019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919 [ 27.187417] flags: 0x200000000000000(node=0|zone=2) [ 27.187588] page_type: f5(slab) [ 27.187707] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.187949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.188179] page dumped because: kasan: bad access detected [ 27.188349] [ 27.188415] Memory state around the buggy address: [ 27.188942] ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.189417] ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.189979] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.190598] ^ [ 27.190810] ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.191186] ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.191537] ================================================================== [ 27.107393] ================================================================== [ 27.108283] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 27.108874] Write of size 8 at addr ffff888104919c88 by task kunit_try_catch/309 [ 27.109158] [ 27.109266] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) [ 27.109313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.109326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.109349] Call Trace: [ 27.109363] <TASK> [ 27.109378] dump_stack_lvl+0x73/0xb0 [ 27.109408] print_report+0xd1/0x640 [ 27.109433] ? __virt_addr_valid+0x1db/0x2d0 [ 27.109457] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 27.109549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.109578] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 27.109618] kasan_report+0x141/0x180 [ 27.109643] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 27.109675] kasan_check_range+0x10c/0x1c0 [ 27.109710] __kasan_check_write+0x18/0x20 [ 27.109735] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 27.109773] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.109802] ? __kmalloc_cache_noprof+0x189/0x420 [ 27.109827] ? trace_hardirqs_on+0x37/0xe0 [ 27.109860] ? kasan_bitops_generic+0x92/0x1c0 [ 27.109897] kasan_bitops_generic+0x116/0x1c0 [ 27.109923] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.109949] ? __pfx_read_tsc+0x10/0x10 [ 27.109983] ? ktime_get_ts64+0x86/0x230 [ 27.110007] kunit_try_run_case+0x1a5/0x480 [ 27.110033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.110065] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.110091] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.110118] ? __kthread_parkme+0x82/0x180 [ 27.110150] ? preempt_count_sub+0x50/0x80 [ 27.110184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.110209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.110233] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.110268] kthread+0x337/0x6f0 [ 27.110289] ? trace_preempt_on+0x20/0xc0 [ 27.110312] ? __pfx_kthread+0x10/0x10 [ 27.110344] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.110368] ? calculate_sigpending+0x7b/0xa0 [ 27.110392] ? __pfx_kthread+0x10/0x10 [ 27.110414] ret_from_fork+0x116/0x1d0 [ 27.110445] ? __pfx_kthread+0x10/0x10 [ 27.110467] ret_from_fork_asm+0x1a/0x30 [ 27.110508] </TASK> [ 27.110561] [ 27.119528] Allocated by task 309: [ 27.119866] kasan_save_stack+0x45/0x70 [ 27.120080] kasan_save_track+0x18/0x40 [ 27.120279] kasan_save_alloc_info+0x3b/0x50 [ 27.120577] __kasan_kmalloc+0xb7/0xc0 [ 27.120771] __kmalloc_cache_noprof+0x189/0x420 [ 27.121031] kasan_bitops_generic+0x92/0x1c0 [ 27.121252] kunit_try_run_case+0x1a5/0x480 [ 27.121455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.121822] kthread+0x337/0x6f0 [ 27.121960] ret_from_fork+0x116/0x1d0 [ 27.122097] ret_from_fork_asm+0x1a/0x30 [ 27.122263] [ 27.122358] The buggy address belongs to the object at ffff888104919c80 [ 27.122358] which belongs to the cache kmalloc-16 of size 16 [ 27.122863] The buggy address is located 8 bytes inside of [ 27.122863] allocated 9-byte region [ffff888104919c80, ffff888104919c89) [ 27.123577] [ 27.123700] The buggy address belongs to the physical page: [ 27.123978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104919 [ 27.124362] flags: 0x200000000000000(node=0|zone=2) [ 27.124621] page_type: f5(slab) [ 27.124842] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.125234] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.125568] page dumped because: kasan: bad access detected [ 27.125910] [ 27.126008] Memory state around the buggy address: [ 27.126234] ffff888104919b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.126648] ffff888104919c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.126973] >ffff888104919c80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.127191] ^ [ 27.127313] ffff888104919d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.127530] ffff888104919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.127876] ==================================================================