Hay
Date
July 3, 2025, 11:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.809100] ==================================================================
[   22.809978] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   22.812610]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   22.815458]  kthread+0x328/0x630
[   22.817066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106191
[   22.819413] >fff00000c6191580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.861387] Read of size 4 at addr fff00000c659e330 by task kunit_try_catch/265
[   22.867606]  kasan_save_track+0x20/0x40
[   22.870373] 
[   22.871272] page_type: f5(slab)
[   22.871938] 
[   22.872635]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.872932]                                      ^
[   22.876237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   22.878168]  kasan_report+0xdc/0x128
[   22.882945] The buggy address is located 0 bytes to the right of
[   22.882945]  allocated 48-byte region [fff00000c659e300, fff00000c659e330)
[   22.885501]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.891206]  dump_stack_lvl+0x8c/0xd0
[   22.893284]  kasan_save_track+0x20/0x40
[   22.895497] page_type: f5(slab)
[   22.896341] 
[   22.896696] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.897708]  fff00000c659e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.904849]  kthread+0x328/0x630
[   22.906580] 
[   22.906635] The buggy address belongs to the physical page:
[   22.906942] page_type: f5(slab)
[   22.907710]  fff00000c659e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.913713]  dump_stack_lvl+0x8c/0xd0
[   22.917394]  kasan_save_track+0x20/0x40
[   22.919164]  ret_from_fork+0x10/0x20
[   22.920065] 
[   22.920557] page_type: f5(slab)
[   22.920958] 
[   22.922081] >fff00000c659e300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.922587]                                      ^
[   22.923089] ==================================================================

[   13.931884] ==================================================================
[   13.932222] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.932649] Write of size 8 at addr ffff8881023854e8 by task kunit_try_catch/278
[   13.933026] 
[   13.933160] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.933200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.933211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.933239] Call Trace:
[   13.933254]  <TASK>
[   13.933267]  dump_stack_lvl+0x73/0xb0
[   13.933384]  print_report+0xd1/0x650
[   13.933414]  ? __virt_addr_valid+0x1db/0x2d0
[   13.933439]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.933465]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.933487]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.933513]  kasan_report+0x141/0x180
[   13.933534]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.933566]  kasan_check_range+0x10c/0x1c0
[   13.933601]  __kasan_check_write+0x18/0x20
[   13.933620]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   13.933647]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.933686]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.933710]  ? kasan_bitops_generic+0x92/0x1c0
[   13.933736]  kasan_bitops_generic+0x121/0x1c0
[   13.933759]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.933784]  ? __pfx_read_tsc+0x10/0x10
[   13.933805]  ? ktime_get_ts64+0x86/0x230
[   13.933829]  kunit_try_run_case+0x1a5/0x480
[   13.933851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.933873]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.933896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.933925]  ? __kthread_parkme+0x82/0x180
[   13.933946]  ? preempt_count_sub+0x50/0x80
[   13.933969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.934001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.934023]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.934045]  kthread+0x337/0x6f0
[   13.934064]  ? trace_preempt_on+0x20/0xc0
[   13.934094]  ? __pfx_kthread+0x10/0x10
[   13.934114]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.934166]  ? calculate_sigpending+0x7b/0xa0
[   13.934189]  ? __pfx_kthread+0x10/0x10
[   13.934210]  ret_from_fork+0x116/0x1d0
[   13.934228]  ? __pfx_kthread+0x10/0x10
[   13.934248]  ret_from_fork_asm+0x1a/0x30
[   13.934278]  </TASK>
[   13.934288] 
[   13.942730] Allocated by task 278:
[   13.942879]  kasan_save_stack+0x45/0x70
[   13.943029]  kasan_save_track+0x18/0x40
[   13.944974]  kasan_save_alloc_info+0x3b/0x50
[   13.945271]  __kasan_kmalloc+0xb7/0xc0
[   13.945612]  __kmalloc_cache_noprof+0x189/0x420
[   13.945843]  kasan_bitops_generic+0x92/0x1c0
[   13.946053]  kunit_try_run_case+0x1a5/0x480
[   13.946284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.946619]  kthread+0x337/0x6f0
[   13.946809]  ret_from_fork+0x116/0x1d0
[   13.946994]  ret_from_fork_asm+0x1a/0x30
[   13.947219] 
[   13.947518] The buggy address belongs to the object at ffff8881023854e0
[   13.947518]  which belongs to the cache kmalloc-16 of size 16
[   13.948068] The buggy address is located 8 bytes inside of
[   13.948068]  allocated 9-byte region [ffff8881023854e0, ffff8881023854e9)
[   13.948568] 
[   13.948690] The buggy address belongs to the physical page:
[   13.948942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102385
[   13.949279] flags: 0x200000000000000(node=0|zone=2)
[   13.949634] page_type: f5(slab)
[   13.949799] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.950134] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.950567] page dumped because: kasan: bad access detected
[   13.950800] 
[   13.950918] Memory state around the buggy address:
[   13.951076]  ffff888102385380: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   13.951384]  ffff888102385400: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   13.951873] >ffff888102385480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.952235]                                                           ^
[   13.952591]  ffff888102385500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.952895]  ffff888102385580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.953240] ==================================================================
[   13.953967] ==================================================================
[   13.954486] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.954879] Read of size 8 at addr ffff8881023854e8 by task kunit_try_catch/278
[   13.955218] 
[   13.955546] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.955592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.955604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.955637] Call Trace:
[   13.955649]  <TASK>
[   13.955662]  dump_stack_lvl+0x73/0xb0
[   13.955689]  print_report+0xd1/0x650
[   13.955720]  ? __virt_addr_valid+0x1db/0x2d0
[   13.955742]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.955780]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.955802]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.955828]  kasan_report+0x141/0x180
[   13.955850]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.955889]  kasan_check_range+0x10c/0x1c0
[   13.955912]  __kasan_check_read+0x15/0x20
[   13.955930]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   13.955967]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.955995]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.956019]  ? kasan_bitops_generic+0x92/0x1c0
[   13.956046]  kasan_bitops_generic+0x121/0x1c0
[   13.956068]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.956100]  ? __pfx_read_tsc+0x10/0x10
[   13.956153]  ? ktime_get_ts64+0x86/0x230
[   13.956180]  kunit_try_run_case+0x1a5/0x480
[   13.956204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.956226]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.956248]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.956269]  ? __kthread_parkme+0x82/0x180
[   13.956289]  ? preempt_count_sub+0x50/0x80
[   13.956395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.956419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.956441]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.956474]  kthread+0x337/0x6f0
[   13.956493]  ? trace_preempt_on+0x20/0xc0
[   13.956515]  ? __pfx_kthread+0x10/0x10
[   13.956536]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.956557]  ? calculate_sigpending+0x7b/0xa0
[   13.956579]  ? __pfx_kthread+0x10/0x10
[   13.956600]  ret_from_fork+0x116/0x1d0
[   13.956617]  ? __pfx_kthread+0x10/0x10
[   13.956638]  ret_from_fork_asm+0x1a/0x30
[   13.956667]  </TASK>
[   13.956679] 
[   13.965871] Allocated by task 278:
[   13.966496]  kasan_save_stack+0x45/0x70
[   13.966711]  kasan_save_track+0x18/0x40
[   13.966855]  kasan_save_alloc_info+0x3b/0x50
[   13.967015]  __kasan_kmalloc+0xb7/0xc0
[   13.967176]  __kmalloc_cache_noprof+0x189/0x420
[   13.967400]  kasan_bitops_generic+0x92/0x1c0
[   13.967604]  kunit_try_run_case+0x1a5/0x480
[   13.967811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.968013]  kthread+0x337/0x6f0
[   13.970213]  ret_from_fork+0x116/0x1d0
[   13.970501]  ret_from_fork_asm+0x1a/0x30
[   13.970724] 
[   13.970821] The buggy address belongs to the object at ffff8881023854e0
[   13.970821]  which belongs to the cache kmalloc-16 of size 16
[   13.971380] The buggy address is located 8 bytes inside of
[   13.971380]  allocated 9-byte region [ffff8881023854e0, ffff8881023854e9)
[   13.971811] 
[   13.971891] The buggy address belongs to the physical page:
[   13.972204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102385
[   13.972965] flags: 0x200000000000000(node=0|zone=2)
[   13.973229] page_type: f5(slab)
[   13.973939] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.974420] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.975402] page dumped because: kasan: bad access detected
[   13.976891] 
[   13.976979] Memory state around the buggy address:
[   13.977525]  ffff888102385380: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   13.978445]  ffff888102385400: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   13.978783] >ffff888102385480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.979016]                                                           ^
[   13.980094]  ffff888102385500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.980630]  ffff888102385580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.981241] ==================================================================
[   13.796819] ==================================================================
[   13.797165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.797708] Write of size 8 at addr ffff8881023854e8 by task kunit_try_catch/278
[   13.798092] 
[   13.798281] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.798339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.798351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.798370] Call Trace:
[   13.798384]  <TASK>
[   13.798399]  dump_stack_lvl+0x73/0xb0
[   13.798440]  print_report+0xd1/0x650
[   13.798474]  ? __virt_addr_valid+0x1db/0x2d0
[   13.798515]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.798544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.798565]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.798603]  kasan_report+0x141/0x180
[   13.798694]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.798726]  kasan_check_range+0x10c/0x1c0
[   13.798748]  __kasan_check_write+0x18/0x20
[   13.798767]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   13.798795]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.798822]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.798846]  ? kasan_bitops_generic+0x92/0x1c0
[   13.798872]  kasan_bitops_generic+0x121/0x1c0
[   13.798895]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.799077]  ? __pfx_read_tsc+0x10/0x10
[   13.799098]  ? ktime_get_ts64+0x86/0x230
[   13.799132]  kunit_try_run_case+0x1a5/0x480
[   13.799156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.799178]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.799232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.799254]  ? __kthread_parkme+0x82/0x180
[   13.799299]  ? preempt_count_sub+0x50/0x80
[   13.799389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.799425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.799448]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.799470]  kthread+0x337/0x6f0
[   13.799501]  ? trace_preempt_on+0x20/0xc0
[   13.799524]  ? __pfx_kthread+0x10/0x10
[   13.799543]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.799564]  ? calculate_sigpending+0x7b/0xa0
[   13.799587]  ? __pfx_kthread+0x10/0x10
[   13.799607]  ret_from_fork+0x116/0x1d0
[   13.799624]  ? __pfx_kthread+0x10/0x10
[   13.799645]  ret_from_fork_asm+0x1a/0x30
[   13.799674]  </TASK>
[   13.799684] 
[   13.809664] Allocated by task 278:
[   13.809847]  kasan_save_stack+0x45/0x70
[   13.810129]  kasan_save_track+0x18/0x40
[   13.810451]  kasan_save_alloc_info+0x3b/0x50
[   13.810649]  __kasan_kmalloc+0xb7/0xc0
[   13.810828]  __kmalloc_cache_noprof+0x189/0x420
[   13.811036]  kasan_bitops_generic+0x92/0x1c0
[   13.811294]  kunit_try_run_case+0x1a5/0x480
[   13.811445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.811698]  kthread+0x337/0x6f0
[   13.811903]  ret_from_fork+0x116/0x1d0
[   13.812373]  ret_from_fork_asm+0x1a/0x30
[   13.812569] 
[   13.812663] The buggy address belongs to the object at ffff8881023854e0
[   13.812663]  which belongs to the cache kmalloc-16 of size 16
[   13.813212] The buggy address is located 8 bytes inside of
[   13.813212]  allocated 9-byte region [ffff8881023854e0, ffff8881023854e9)
[   13.813860] 
[   13.814029] The buggy address belongs to the physical page:
[   13.814289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102385
[   13.814860] flags: 0x200000000000000(node=0|zone=2)
[   13.815184] page_type: f5(slab)
[   13.815474] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.815769] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.816103] page dumped because: kasan: bad access detected
[   13.816363] 
[   13.816458] Memory state around the buggy address:
[   13.816683]  ffff888102385380: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   13.816986]  ffff888102385400: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   13.817487] >ffff888102385480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.817760]                                                           ^
[   13.818173]  ffff888102385500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.818772]  ffff888102385580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.819147] ==================================================================
[   13.888119] ==================================================================
[   13.888382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.888880] Write of size 8 at addr ffff8881023854e8 by task kunit_try_catch/278
[   13.889245] 
[   13.889398] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.889474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.889487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.889506] Call Trace:
[   13.889519]  <TASK>
[   13.889534]  dump_stack_lvl+0x73/0xb0
[   13.889570]  print_report+0xd1/0x650
[   13.889593]  ? __virt_addr_valid+0x1db/0x2d0
[   13.889615]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.889654]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.889676]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.889703]  kasan_report+0x141/0x180
[   13.889723]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.889754]  kasan_check_range+0x10c/0x1c0
[   13.889779]  __kasan_check_write+0x18/0x20
[   13.889798]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   13.889825]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.889851]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.889875]  ? kasan_bitops_generic+0x92/0x1c0
[   13.889902]  kasan_bitops_generic+0x121/0x1c0
[   13.889934]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.889958]  ? __pfx_read_tsc+0x10/0x10
[   13.889977]  ? ktime_get_ts64+0x86/0x230
[   13.890012]  kunit_try_run_case+0x1a5/0x480
[   13.890035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.890057]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.890078]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.890107]  ? __kthread_parkme+0x82/0x180
[   13.890144]  ? preempt_count_sub+0x50/0x80
[   13.890167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.890201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.890223]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.890246]  kthread+0x337/0x6f0
[   13.890264]  ? trace_preempt_on+0x20/0xc0
[   13.890286]  ? __pfx_kthread+0x10/0x10
[   13.890385]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.890411]  ? calculate_sigpending+0x7b/0xa0
[   13.890434]  ? __pfx_kthread+0x10/0x10
[   13.890454]  ret_from_fork+0x116/0x1d0
[   13.890472]  ? __pfx_kthread+0x10/0x10
[   13.890491]  ret_from_fork_asm+0x1a/0x30
[   13.890526]  </TASK>
[   13.890537] 
[   13.899860] Allocated by task 278:
[   13.899994]  kasan_save_stack+0x45/0x70
[   13.900227]  kasan_save_track+0x18/0x40
[   13.900537]  kasan_save_alloc_info+0x3b/0x50
[   13.900694]  __kasan_kmalloc+0xb7/0xc0
[   13.900826]  __kmalloc_cache_noprof+0x189/0x420
[   13.901023]  kasan_bitops_generic+0x92/0x1c0
[   13.901243]  kunit_try_run_case+0x1a5/0x480
[   13.901673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.901886]  kthread+0x337/0x6f0
[   13.902008]  ret_from_fork+0x116/0x1d0
[   13.902239]  ret_from_fork_asm+0x1a/0x30
[   13.902679] 
[   13.902797] The buggy address belongs to the object at ffff8881023854e0
[   13.902797]  which belongs to the cache kmalloc-16 of size 16
[   13.903500] The buggy address is located 8 bytes inside of
[   13.903500]  allocated 9-byte region [ffff8881023854e0, ffff8881023854e9)
[   13.904098] 
[   13.904263] The buggy address belongs to the physical page:
[   13.904447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102385
[   13.904687] flags: 0x200000000000000(node=0|zone=2)
[   13.905025] page_type: f5(slab)
[   13.905285] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.905851] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.906086] page dumped because: kasan: bad access detected
[   13.906338] 
[   13.906447] Memory state around the buggy address:
[   13.906704]  ffff888102385380: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   13.907299]  ffff888102385400: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   13.907686] >ffff888102385480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.908302]                                                           ^
[   13.908753]  ffff888102385500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.909079]  ffff888102385580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.909471] ==================================================================
[   13.820297] ==================================================================
[   13.820617] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.820992] Write of size 8 at addr ffff8881023854e8 by task kunit_try_catch/278
[   13.821325] 
[   13.821425] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.821466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.821478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.821498] Call Trace:
[   13.821511]  <TASK>
[   13.821524]  dump_stack_lvl+0x73/0xb0
[   13.821549]  print_report+0xd1/0x650
[   13.821572]  ? __virt_addr_valid+0x1db/0x2d0
[   13.821595]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.821621]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.821643]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.821669]  kasan_report+0x141/0x180
[   13.821691]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.821721]  kasan_check_range+0x10c/0x1c0
[   13.821744]  __kasan_check_write+0x18/0x20
[   13.821762]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   13.821789]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.821816]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.821840]  ? kasan_bitops_generic+0x92/0x1c0
[   13.821866]  kasan_bitops_generic+0x121/0x1c0
[   13.821888]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.821912]  ? __pfx_read_tsc+0x10/0x10
[   13.821932]  ? ktime_get_ts64+0x86/0x230
[   13.821956]  kunit_try_run_case+0x1a5/0x480
[   13.821977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.821999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.822021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.822042]  ? __kthread_parkme+0x82/0x180
[   13.822062]  ? preempt_count_sub+0x50/0x80
[   13.822086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.822109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.822488]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.822522]  kthread+0x337/0x6f0
[   13.822557]  ? trace_preempt_on+0x20/0xc0
[   13.822581]  ? __pfx_kthread+0x10/0x10
[   13.822601]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.822621]  ? calculate_sigpending+0x7b/0xa0
[   13.822644]  ? __pfx_kthread+0x10/0x10
[   13.822665]  ret_from_fork+0x116/0x1d0
[   13.822683]  ? __pfx_kthread+0x10/0x10
[   13.822703]  ret_from_fork_asm+0x1a/0x30
[   13.822732]  </TASK>
[   13.822743] 
[   13.832969] Allocated by task 278:
[   13.833217]  kasan_save_stack+0x45/0x70
[   13.833437]  kasan_save_track+0x18/0x40
[   13.833752]  kasan_save_alloc_info+0x3b/0x50
[   13.834002]  __kasan_kmalloc+0xb7/0xc0
[   13.834151]  __kmalloc_cache_noprof+0x189/0x420
[   13.834353]  kasan_bitops_generic+0x92/0x1c0
[   13.834629]  kunit_try_run_case+0x1a5/0x480
[   13.834994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.835587]  kthread+0x337/0x6f0
[   13.835912]  ret_from_fork+0x116/0x1d0
[   13.836060]  ret_from_fork_asm+0x1a/0x30
[   13.836289] 
[   13.836553] The buggy address belongs to the object at ffff8881023854e0
[   13.836553]  which belongs to the cache kmalloc-16 of size 16
[   13.837035] The buggy address is located 8 bytes inside of
[   13.837035]  allocated 9-byte region [ffff8881023854e0, ffff8881023854e9)
[   13.837785] 
[   13.837925] The buggy address belongs to the physical page:
[   13.838226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102385
[   13.838611] flags: 0x200000000000000(node=0|zone=2)
[   13.839159] page_type: f5(slab)
[   13.839453] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.839814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.840137] page dumped because: kasan: bad access detected
[   13.840575] 
[   13.840658] Memory state around the buggy address:
[   13.840849]  ffff888102385380: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   13.841188]  ffff888102385400: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   13.841590] >ffff888102385480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.841925]                                                           ^
[   13.842194]  ffff888102385500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.842796]  ffff888102385580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.843090] ==================================================================
[   13.909938] ==================================================================
[   13.910358] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.910695] Write of size 8 at addr ffff8881023854e8 by task kunit_try_catch/278
[   13.911204] 
[   13.911323] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.911366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.911379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.911494] Call Trace:
[   13.911512]  <TASK>
[   13.911527]  dump_stack_lvl+0x73/0xb0
[   13.911554]  print_report+0xd1/0x650
[   13.911576]  ? __virt_addr_valid+0x1db/0x2d0
[   13.911598]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.911625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.911647]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.911674]  kasan_report+0x141/0x180
[   13.911695]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.911839]  kasan_check_range+0x10c/0x1c0
[   13.911870]  __kasan_check_write+0x18/0x20
[   13.911888]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   13.911916]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.911943]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.911967]  ? kasan_bitops_generic+0x92/0x1c0
[   13.911994]  kasan_bitops_generic+0x121/0x1c0
[   13.912026]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.912051]  ? __pfx_read_tsc+0x10/0x10
[   13.912071]  ? ktime_get_ts64+0x86/0x230
[   13.912105]  kunit_try_run_case+0x1a5/0x480
[   13.912150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.912172]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.912194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.912215]  ? __kthread_parkme+0x82/0x180
[   13.912245]  ? preempt_count_sub+0x50/0x80
[   13.912267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.912290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.912391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.912416]  kthread+0x337/0x6f0
[   13.912435]  ? trace_preempt_on+0x20/0xc0
[   13.912457]  ? __pfx_kthread+0x10/0x10
[   13.912477]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.912497]  ? calculate_sigpending+0x7b/0xa0
[   13.912520]  ? __pfx_kthread+0x10/0x10
[   13.912539]  ret_from_fork+0x116/0x1d0
[   13.912557]  ? __pfx_kthread+0x10/0x10
[   13.912577]  ret_from_fork_asm+0x1a/0x30
[   13.912618]  </TASK>
[   13.912628] 
[   13.921955] Allocated by task 278:
[   13.922199]  kasan_save_stack+0x45/0x70
[   13.922350]  kasan_save_track+0x18/0x40
[   13.922486]  kasan_save_alloc_info+0x3b/0x50
[   13.922871]  __kasan_kmalloc+0xb7/0xc0
[   13.923067]  __kmalloc_cache_noprof+0x189/0x420
[   13.923672]  kasan_bitops_generic+0x92/0x1c0
[   13.923848]  kunit_try_run_case+0x1a5/0x480
[   13.924006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.924547]  kthread+0x337/0x6f0
[   13.924713]  ret_from_fork+0x116/0x1d0
[   13.924860]  ret_from_fork_asm+0x1a/0x30
[   13.925002] 
[   13.925095] The buggy address belongs to the object at ffff8881023854e0
[   13.925095]  which belongs to the cache kmalloc-16 of size 16
[   13.925780] The buggy address is located 8 bytes inside of
[   13.925780]  allocated 9-byte region [ffff8881023854e0, ffff8881023854e9)
[   13.926484] 
[   13.926571] The buggy address belongs to the physical page:
[   13.926805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102385
[   13.927232] flags: 0x200000000000000(node=0|zone=2)
[   13.927704] page_type: f5(slab)
[   13.927872] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.928258] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.928658] page dumped because: kasan: bad access detected
[   13.928915] 
[   13.929012] Memory state around the buggy address:
[   13.929262]  ffff888102385380: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   13.929538]  ffff888102385400: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   13.929913] >ffff888102385480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.930275]                                                           ^
[   13.930615]  ffff888102385500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.930873]  ffff888102385580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.931220] ==================================================================
[   13.843764] ==================================================================
[   13.844101] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.844689] Write of size 8 at addr ffff8881023854e8 by task kunit_try_catch/278
[   13.844940] 
[   13.845098] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.845150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.845161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.845181] Call Trace:
[   13.845198]  <TASK>
[   13.845213]  dump_stack_lvl+0x73/0xb0
[   13.845239]  print_report+0xd1/0x650
[   13.845262]  ? __virt_addr_valid+0x1db/0x2d0
[   13.845284]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.845390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.845439]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.845466]  kasan_report+0x141/0x180
[   13.845509]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.845539]  kasan_check_range+0x10c/0x1c0
[   13.845573]  __kasan_check_write+0x18/0x20
[   13.845592]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   13.845620]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.845647]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.845671]  ? kasan_bitops_generic+0x92/0x1c0
[   13.845698]  kasan_bitops_generic+0x121/0x1c0
[   13.845720]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.845775]  ? __pfx_read_tsc+0x10/0x10
[   13.845795]  ? ktime_get_ts64+0x86/0x230
[   13.845842]  kunit_try_run_case+0x1a5/0x480
[   13.845865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.845886]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.845908]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.845930]  ? __kthread_parkme+0x82/0x180
[   13.845950]  ? preempt_count_sub+0x50/0x80
[   13.845971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.845994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.846016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.846038]  kthread+0x337/0x6f0
[   13.846056]  ? trace_preempt_on+0x20/0xc0
[   13.846078]  ? __pfx_kthread+0x10/0x10
[   13.846097]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.846118]  ? calculate_sigpending+0x7b/0xa0
[   13.846149]  ? __pfx_kthread+0x10/0x10
[   13.846170]  ret_from_fork+0x116/0x1d0
[   13.846188]  ? __pfx_kthread+0x10/0x10
[   13.846208]  ret_from_fork_asm+0x1a/0x30
[   13.846237]  </TASK>
[   13.846248] 
[   13.856164] Allocated by task 278:
[   13.856351]  kasan_save_stack+0x45/0x70
[   13.856773]  kasan_save_track+0x18/0x40
[   13.856983]  kasan_save_alloc_info+0x3b/0x50
[   13.857146]  __kasan_kmalloc+0xb7/0xc0
[   13.857336]  __kmalloc_cache_noprof+0x189/0x420
[   13.857620]  kasan_bitops_generic+0x92/0x1c0
[   13.857832]  kunit_try_run_case+0x1a5/0x480
[   13.857988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.858528]  kthread+0x337/0x6f0
[   13.858721]  ret_from_fork+0x116/0x1d0
[   13.858903]  ret_from_fork_asm+0x1a/0x30
[   13.859074] 
[   13.859241] The buggy address belongs to the object at ffff8881023854e0
[   13.859241]  which belongs to the cache kmalloc-16 of size 16
[   13.859840] The buggy address is located 8 bytes inside of
[   13.859840]  allocated 9-byte region [ffff8881023854e0, ffff8881023854e9)
[   13.860457] 
[   13.860667] The buggy address belongs to the physical page:
[   13.860963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102385
[   13.861356] flags: 0x200000000000000(node=0|zone=2)
[   13.861545] page_type: f5(slab)
[   13.861768] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.862165] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.862519] page dumped because: kasan: bad access detected
[   13.862973] 
[   13.863074] Memory state around the buggy address:
[   13.863485]  ffff888102385380: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   13.863824]  ffff888102385400: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   13.864131] >ffff888102385480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.864435]                                                           ^
[   13.864846]  ffff888102385500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.865237]  ffff888102385580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.865655] ==================================================================
[   13.866158] ==================================================================
[   13.866692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.867106] Write of size 8 at addr ffff8881023854e8 by task kunit_try_catch/278
[   13.867532] 
[   13.867648] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.867691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.867703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.867724] Call Trace:
[   13.867735]  <TASK>
[   13.867748]  dump_stack_lvl+0x73/0xb0
[   13.867775]  print_report+0xd1/0x650
[   13.867797]  ? __virt_addr_valid+0x1db/0x2d0
[   13.867820]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.867848]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.867869]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.867896]  kasan_report+0x141/0x180
[   13.867917]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.867947]  kasan_check_range+0x10c/0x1c0
[   13.867971]  __kasan_check_write+0x18/0x20
[   13.867989]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   13.868015]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.868042]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.868066]  ? kasan_bitops_generic+0x92/0x1c0
[   13.868093]  kasan_bitops_generic+0x121/0x1c0
[   13.868151]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.868188]  ? __pfx_read_tsc+0x10/0x10
[   13.868208]  ? ktime_get_ts64+0x86/0x230
[   13.868232]  kunit_try_run_case+0x1a5/0x480
[   13.868265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.868286]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.868314]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.868335]  ? __kthread_parkme+0x82/0x180
[   13.868355]  ? preempt_count_sub+0x50/0x80
[   13.868377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.868400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.868422]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.868445]  kthread+0x337/0x6f0
[   13.868463]  ? trace_preempt_on+0x20/0xc0
[   13.868485]  ? __pfx_kthread+0x10/0x10
[   13.868505]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.868525]  ? calculate_sigpending+0x7b/0xa0
[   13.868547]  ? __pfx_kthread+0x10/0x10
[   13.868567]  ret_from_fork+0x116/0x1d0
[   13.868585]  ? __pfx_kthread+0x10/0x10
[   13.868604]  ret_from_fork_asm+0x1a/0x30
[   13.868633]  </TASK>
[   13.868643] 
[   13.878590] Allocated by task 278:
[   13.878913]  kasan_save_stack+0x45/0x70
[   13.879137]  kasan_save_track+0x18/0x40
[   13.879344]  kasan_save_alloc_info+0x3b/0x50
[   13.879748]  __kasan_kmalloc+0xb7/0xc0
[   13.880037]  __kmalloc_cache_noprof+0x189/0x420
[   13.880283]  kasan_bitops_generic+0x92/0x1c0
[   13.880433]  kunit_try_run_case+0x1a5/0x480
[   13.880608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.880869]  kthread+0x337/0x6f0
[   13.881224]  ret_from_fork+0x116/0x1d0
[   13.881471]  ret_from_fork_asm+0x1a/0x30
[   13.881632] 
[   13.881727] The buggy address belongs to the object at ffff8881023854e0
[   13.881727]  which belongs to the cache kmalloc-16 of size 16
[   13.882274] The buggy address is located 8 bytes inside of
[   13.882274]  allocated 9-byte region [ffff8881023854e0, ffff8881023854e9)
[   13.882711] 
[   13.882792] The buggy address belongs to the physical page:
[   13.883112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102385
[   13.883631] flags: 0x200000000000000(node=0|zone=2)
[   13.883846] page_type: f5(slab)
[   13.884022] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.884499] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.884835] page dumped because: kasan: bad access detected
[   13.885083] 
[   13.885236] Memory state around the buggy address:
[   13.885478]  ffff888102385380: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   13.885851]  ffff888102385400: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   13.886175] >ffff888102385480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.886583]                                                           ^
[   13.886876]  ffff888102385500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.887157]  ffff888102385580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.887514] ==================================================================
[   13.981741] ==================================================================
[   13.981974] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.982565] Read of size 8 at addr ffff8881023854e8 by task kunit_try_catch/278
[   13.983280] 
[   13.983459] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.983505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.983517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.983537] Call Trace:
[   13.983554]  <TASK>
[   13.983570]  dump_stack_lvl+0x73/0xb0
[   13.983597]  print_report+0xd1/0x650
[   13.983620]  ? __virt_addr_valid+0x1db/0x2d0
[   13.983645]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.983671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.983693]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.983719]  kasan_report+0x141/0x180
[   13.983740]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.983770]  __asan_report_load8_noabort+0x18/0x20
[   13.983794]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   13.983821]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   13.983848]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.983873]  ? kasan_bitops_generic+0x92/0x1c0
[   13.983898]  kasan_bitops_generic+0x121/0x1c0
[   13.983921]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.983947]  ? __pfx_read_tsc+0x10/0x10
[   13.983967]  ? ktime_get_ts64+0x86/0x230
[   13.983992]  kunit_try_run_case+0x1a5/0x480
[   13.984015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.984036]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.984059]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.984081]  ? __kthread_parkme+0x82/0x180
[   13.984101]  ? preempt_count_sub+0x50/0x80
[   13.984147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.984170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.984191]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.984214]  kthread+0x337/0x6f0
[   13.984242]  ? trace_preempt_on+0x20/0xc0
[   13.984265]  ? __pfx_kthread+0x10/0x10
[   13.984285]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.984305]  ? calculate_sigpending+0x7b/0xa0
[   13.984327]  ? __pfx_kthread+0x10/0x10
[   13.984349]  ret_from_fork+0x116/0x1d0
[   13.984367]  ? __pfx_kthread+0x10/0x10
[   13.984387]  ret_from_fork_asm+0x1a/0x30
[   13.984417]  </TASK>
[   13.984427] 
[   13.998749] Allocated by task 278:
[   13.999068]  kasan_save_stack+0x45/0x70
[   13.999435]  kasan_save_track+0x18/0x40
[   13.999898]  kasan_save_alloc_info+0x3b/0x50
[   14.000090]  __kasan_kmalloc+0xb7/0xc0
[   14.000529]  __kmalloc_cache_noprof+0x189/0x420
[   14.000994]  kasan_bitops_generic+0x92/0x1c0
[   14.001391]  kunit_try_run_case+0x1a5/0x480
[   14.001675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.002151]  kthread+0x337/0x6f0
[   14.002328]  ret_from_fork+0x116/0x1d0
[   14.002461]  ret_from_fork_asm+0x1a/0x30
[   14.002861] 
[   14.003067] The buggy address belongs to the object at ffff8881023854e0
[   14.003067]  which belongs to the cache kmalloc-16 of size 16
[   14.003494] The buggy address is located 8 bytes inside of
[   14.003494]  allocated 9-byte region [ffff8881023854e0, ffff8881023854e9)
[   14.004675] 
[   14.004864] The buggy address belongs to the physical page:
[   14.005398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102385
[   14.005669] flags: 0x200000000000000(node=0|zone=2)
[   14.005842] page_type: f5(slab)
[   14.005963] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.006321] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.007028] page dumped because: kasan: bad access detected
[   14.007612] 
[   14.007779] Memory state around the buggy address:
[   14.008328]  ffff888102385380: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.008970]  ffff888102385400: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   14.009670] >ffff888102385480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.010429]                                                           ^
[   14.011056]  ffff888102385500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.011781]  ffff888102385580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.012578] ==================================================================