Hay
Date
July 1, 2025, 11:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.203000] ==================================================================
[   21.203075] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   21.203409] Read of size 8 at addr fff00000c6013988 by task kunit_try_catch/262
[   21.203471] 
[   21.203961] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.204641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.204688] Hardware name: linux,dummy-virt (DT)
[   21.204946] Call trace:
[   21.205305]  show_stack+0x20/0x38 (C)
[   21.205450]  dump_stack_lvl+0x8c/0xd0
[   21.205692]  print_report+0x118/0x608
[   21.205951]  kasan_report+0xdc/0x128
[   21.206464]  __asan_report_load8_noabort+0x20/0x30
[   21.206713]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   21.206843]  kasan_bitops_generic+0x110/0x1c8
[   21.207269]  kunit_try_run_case+0x170/0x3f0
[   21.207346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.207777]  kthread+0x328/0x630
[   21.207946]  ret_from_fork+0x10/0x20
[   21.208024] 
[   21.208248] Allocated by task 262:
[   21.208348]  kasan_save_stack+0x3c/0x68
[   21.208547]  kasan_save_track+0x20/0x40
[   21.208599]  kasan_save_alloc_info+0x40/0x58
[   21.208914]  __kasan_kmalloc+0xd4/0xd8
[   21.209291]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.209408]  kasan_bitops_generic+0xa0/0x1c8
[   21.209617]  kunit_try_run_case+0x170/0x3f0
[   21.209689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.209777]  kthread+0x328/0x630
[   21.209825]  ret_from_fork+0x10/0x20
[   21.209869] 
[   21.209895] The buggy address belongs to the object at fff00000c6013980
[   21.209895]  which belongs to the cache kmalloc-16 of size 16
[   21.209979] The buggy address is located 8 bytes inside of
[   21.209979]  allocated 9-byte region [fff00000c6013980, fff00000c6013989)
[   21.210063] 
[   21.210089] The buggy address belongs to the physical page:
[   21.210128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013
[   21.210211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.210272] page_type: f5(slab)
[   21.210330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.210400] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.210451] page dumped because: kasan: bad access detected
[   21.210626]  fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   21.212585] ==================================================================
[   21.145197] ==================================================================
[   21.145705] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.145980] Read of size 8 at addr fff00000c6013988 by task kunit_try_catch/262
[   21.146522] 
[   21.146686] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.146789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.146954] Hardware name: linux,dummy-virt (DT)
[   21.147062] Call trace:
[   21.147092]  show_stack+0x20/0x38 (C)
[   21.147489]  dump_stack_lvl+0x8c/0xd0
[   21.147594]  print_report+0x118/0x608
[   21.147829]  kasan_report+0xdc/0x128
[   21.148026]  __asan_report_load8_noabort+0x20/0x30
[   21.148282]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.148428]  kasan_bitops_generic+0x110/0x1c8
[   21.148614]  kunit_try_run_case+0x170/0x3f0
[   21.148708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.148850]  kthread+0x328/0x630
[   21.149270]  ret_from_fork+0x10/0x20
[   21.149511] 
[   21.149596] Allocated by task 262:
[   21.149791]  kasan_save_stack+0x3c/0x68
[   21.149848]  kasan_save_track+0x20/0x40
[   21.150173]  kasan_save_alloc_info+0x40/0x58
[   21.150368]  __kasan_kmalloc+0xd4/0xd8
[   21.150633]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.150977]  kasan_bitops_generic+0xa0/0x1c8
[   21.151083]  kunit_try_run_case+0x170/0x3f0
[   21.151213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.151344]  kthread+0x328/0x630
[   21.151401]  ret_from_fork+0x10/0x20
[   21.151443] 
[   21.151472] The buggy address belongs to the object at fff00000c6013980
[   21.151472]  which belongs to the cache kmalloc-16 of size 16
[   21.151544] The buggy address is located 8 bytes inside of
[   21.151544]  allocated 9-byte region [fff00000c6013980, fff00000c6013989)
[   21.152192] 
[   21.152296] The buggy address belongs to the physical page:
[   21.152382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013
[   21.152557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.152621] page_type: f5(slab)
[   21.153064] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.153154] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.153330] page dumped because: kasan: bad access detected
[   21.153426] 
[   21.153504] Memory state around the buggy address:
[   21.153752]  fff00000c6013880: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc
[   21.153861]  fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   21.154482] >fff00000c6013980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.154554]                       ^
[   21.154617]  fff00000c6013a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.154671]  fff00000c6013a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.154718] ==================================================================
[   21.168784] ==================================================================
[   21.169228] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   21.169375] Read of size 8 at addr fff00000c6013988 by task kunit_try_catch/262
[   21.169488] 
[   21.169702] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.169964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.170094] Hardware name: linux,dummy-virt (DT)
[   21.170152] Call trace:
[   21.170215]  show_stack+0x20/0x38 (C)
[   21.170569]  dump_stack_lvl+0x8c/0xd0
[   21.170807]  print_report+0x118/0x608
[   21.171025]  kasan_report+0xdc/0x128
[   21.171210]  __asan_report_load8_noabort+0x20/0x30
[   21.171316]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   21.171565]  kasan_bitops_generic+0x110/0x1c8
[   21.171763]  kunit_try_run_case+0x170/0x3f0
[   21.172109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.172572]  kthread+0x328/0x630
[   21.172761]  ret_from_fork+0x10/0x20
[   21.172975] 
[   21.173018] Allocated by task 262:
[   21.173059]  kasan_save_stack+0x3c/0x68
[   21.173339]  kasan_save_track+0x20/0x40
[   21.173443]  kasan_save_alloc_info+0x40/0x58
[   21.173493]  __kasan_kmalloc+0xd4/0xd8
[   21.174432]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.174504]  kasan_bitops_generic+0xa0/0x1c8
[   21.174915]  kunit_try_run_case+0x170/0x3f0
[   21.175337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.175486]  kthread+0x328/0x630
[   21.175614]  ret_from_fork+0x10/0x20
[   21.175744] 
[   21.175785] The buggy address belongs to the object at fff00000c6013980
[   21.175785]  which belongs to the cache kmalloc-16 of size 16
[   21.175864] The buggy address is located 8 bytes inside of
[   21.175864]  allocated 9-byte region [fff00000c6013980, fff00000c6013989)
[   21.175935] 
[   21.176345] The buggy address belongs to the physical page:
[   21.176436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013
[   21.176631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.176714] page_type: f5(slab)
[   21.176770] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.176995] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.177194] page dumped because: kasan: bad access detected
[   21.177572] 
[   21.177706] Memory state around the buggy address:
[   21.178080]  fff00000c6013880: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc
[   21.178353]  fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   21.178482] >fff00000c6013980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.178553]                       ^
[   21.178619]  fff00000c6013a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.178765]  fff00000c6013a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.178994] ==================================================================
[   21.156762] ==================================================================
[   21.156842] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.156914] Write of size 8 at addr fff00000c6013988 by task kunit_try_catch/262
[   21.157505] 
[   21.157576] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.157678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.157711] Hardware name: linux,dummy-virt (DT)
[   21.157750] Call trace:
[   21.157779]  show_stack+0x20/0x38 (C)
[   21.157841]  dump_stack_lvl+0x8c/0xd0
[   21.157899]  print_report+0x118/0x608
[   21.157950]  kasan_report+0xdc/0x128
[   21.158025]  kasan_check_range+0x100/0x1a8
[   21.158081]  __kasan_check_write+0x20/0x30
[   21.158573]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.158887]  kasan_bitops_generic+0x110/0x1c8
[   21.158962]  kunit_try_run_case+0x170/0x3f0
[   21.159020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.159366]  kthread+0x328/0x630
[   21.159863]  ret_from_fork+0x10/0x20
[   21.160019] 
[   21.160165] Allocated by task 262:
[   21.160224]  kasan_save_stack+0x3c/0x68
[   21.160421]  kasan_save_track+0x20/0x40
[   21.160702]  kasan_save_alloc_info+0x40/0x58
[   21.161144]  __kasan_kmalloc+0xd4/0xd8
[   21.161296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.161381]  kasan_bitops_generic+0xa0/0x1c8
[   21.161737]  kunit_try_run_case+0x170/0x3f0
[   21.161877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.161937]  kthread+0x328/0x630
[   21.162380]  ret_from_fork+0x10/0x20
[   21.162542] 
[   21.162572] The buggy address belongs to the object at fff00000c6013980
[   21.162572]  which belongs to the cache kmalloc-16 of size 16
[   21.162863] The buggy address is located 8 bytes inside of
[   21.162863]  allocated 9-byte region [fff00000c6013980, fff00000c6013989)
[   21.163202] 
[   21.163267] The buggy address belongs to the physical page:
[   21.163428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013
[   21.163503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.163762] page_type: f5(slab)
[   21.163861] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.164216] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.164288] page dumped because: kasan: bad access detected
[   21.164464] 
[   21.164533] Memory state around the buggy address:
[   21.164772]  fff00000c6013880: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc
[   21.164973]  fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   21.165268] >fff00000c6013980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.165605]                       ^
[   21.165815]  fff00000c6013a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.166238]  fff00000c6013a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.166357] ==================================================================
[   21.190815] ==================================================================
[   21.190906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   21.191413] Write of size 8 at addr fff00000c6013988 by task kunit_try_catch/262
[   21.191585] 
[   21.191682] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.191874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.191935] Hardware name: linux,dummy-virt (DT)
[   21.191972] Call trace:
[   21.192002]  show_stack+0x20/0x38 (C)
[   21.192064]  dump_stack_lvl+0x8c/0xd0
[   21.192643]  print_report+0x118/0x608
[   21.192855]  kasan_report+0xdc/0x128
[   21.192952]  kasan_check_range+0x100/0x1a8
[   21.193040]  __kasan_check_write+0x20/0x30
[   21.193247]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   21.193389]  kasan_bitops_generic+0x110/0x1c8
[   21.193597]  kunit_try_run_case+0x170/0x3f0
[   21.193767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.193991]  kthread+0x328/0x630
[   21.194051]  ret_from_fork+0x10/0x20
[   21.194114] 
[   21.194184] Allocated by task 262:
[   21.194537]  kasan_save_stack+0x3c/0x68
[   21.194717]  kasan_save_track+0x20/0x40
[   21.195403]  kasan_save_alloc_info+0x40/0x58
[   21.195795]  __kasan_kmalloc+0xd4/0xd8
[   21.195846]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.195923]  kasan_bitops_generic+0xa0/0x1c8
[   21.195971]  kunit_try_run_case+0x170/0x3f0
[   21.196016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.196066]  kthread+0x328/0x630
[   21.196365]  ret_from_fork+0x10/0x20
[   21.197041] 
[   21.197124] The buggy address belongs to the object at fff00000c6013980
[   21.197124]  which belongs to the cache kmalloc-16 of size 16
[   21.198105] The buggy address is located 8 bytes inside of
[   21.198105]  allocated 9-byte region [fff00000c6013980, fff00000c6013989)
[   21.198228] 
[   21.198270] The buggy address belongs to the physical page:
[   21.198338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013
[   21.198467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.199110] page_type: f5(slab)
[   21.199290] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.199360] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.199409] page dumped because: kasan: bad access detected
[   21.199793] 
[   21.199853] Memory state around the buggy address:
[   21.200043]  fff00000c6013880: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc
[   21.200150]  fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   21.200207] >fff00000c6013980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.200591]                       ^
[   21.200780]  fff00000c6013a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.201004]  fff00000c6013a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.201441] ==================================================================
[   21.181147] ==================================================================
[   21.181232] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   21.181471] Write of size 8 at addr fff00000c6013988 by task kunit_try_catch/262
[   21.181813] 
[   21.182053] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.182180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.182218] Hardware name: linux,dummy-virt (DT)
[   21.182608] Call trace:
[   21.182743]  show_stack+0x20/0x38 (C)
[   21.182951]  dump_stack_lvl+0x8c/0xd0
[   21.183079]  print_report+0x118/0x608
[   21.183156]  kasan_report+0xdc/0x128
[   21.183641]  kasan_check_range+0x100/0x1a8
[   21.183887]  __kasan_check_write+0x20/0x30
[   21.183946]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   21.184005]  kasan_bitops_generic+0x110/0x1c8
[   21.184067]  kunit_try_run_case+0x170/0x3f0
[   21.184344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.184796]  kthread+0x328/0x630
[   21.185008]  ret_from_fork+0x10/0x20
[   21.185150] 
[   21.185179] Allocated by task 262:
[   21.185244]  kasan_save_stack+0x3c/0x68
[   21.185303]  kasan_save_track+0x20/0x40
[   21.185348]  kasan_save_alloc_info+0x40/0x58
[   21.185395]  __kasan_kmalloc+0xd4/0xd8
[   21.185451]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.185514]  kasan_bitops_generic+0xa0/0x1c8
[   21.185561]  kunit_try_run_case+0x170/0x3f0
[   21.185606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.185658]  kthread+0x328/0x630
[   21.185694]  ret_from_fork+0x10/0x20
[   21.185734] 
[   21.185778] The buggy address belongs to the object at fff00000c6013980
[   21.185778]  which belongs to the cache kmalloc-16 of size 16
[   21.185866] The buggy address is located 8 bytes inside of
[   21.185866]  allocated 9-byte region [fff00000c6013980, fff00000c6013989)
[   21.185939] 
[   21.185965] The buggy address belongs to the physical page:
[   21.186013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013
[   21.186091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.186456] page_type: f5(slab)
[   21.186574] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.186869] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.187138] page dumped because: kasan: bad access detected
[   21.187217] 
[   21.187243] Memory state around the buggy address:
[   21.187706]  fff00000c6013880: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc
[   21.187924]  fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   21.188110] >fff00000c6013980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.188293]                       ^
[   21.188374]  fff00000c6013a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.188753]  fff00000c6013a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.188935] ==================================================================
[   21.136116] ==================================================================
[   21.136469] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.136921] Write of size 8 at addr fff00000c6013988 by task kunit_try_catch/262
[   21.137163] 
[   21.137465] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.137590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.137799] Hardware name: linux,dummy-virt (DT)
[   21.137899] Call trace:
[   21.138120]  show_stack+0x20/0x38 (C)
[   21.138216]  dump_stack_lvl+0x8c/0xd0
[   21.138283]  print_report+0x118/0x608
[   21.138544]  kasan_report+0xdc/0x128
[   21.138805]  kasan_check_range+0x100/0x1a8
[   21.138879]  __kasan_check_write+0x20/0x30
[   21.139027]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.139277]  kasan_bitops_generic+0x110/0x1c8
[   21.139412]  kunit_try_run_case+0x170/0x3f0
[   21.139594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.139733]  kthread+0x328/0x630
[   21.139840]  ret_from_fork+0x10/0x20
[   21.139946] 
[   21.139971] Allocated by task 262:
[   21.140010]  kasan_save_stack+0x3c/0x68
[   21.140058]  kasan_save_track+0x20/0x40
[   21.140731]  kasan_save_alloc_info+0x40/0x58
[   21.140980]  __kasan_kmalloc+0xd4/0xd8
[   21.141144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.141198]  kasan_bitops_generic+0xa0/0x1c8
[   21.141293]  kunit_try_run_case+0x170/0x3f0
[   21.141521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.141799]  kthread+0x328/0x630
[   21.141905]  ret_from_fork+0x10/0x20
[   21.141990] 
[   21.142123] The buggy address belongs to the object at fff00000c6013980
[   21.142123]  which belongs to the cache kmalloc-16 of size 16
[   21.142262] The buggy address is located 8 bytes inside of
[   21.142262]  allocated 9-byte region [fff00000c6013980, fff00000c6013989)
[   21.142336] 
[   21.142385] The buggy address belongs to the physical page:
[   21.142438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013
[   21.142514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.142587] page_type: f5(slab)
[   21.142646] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.142707] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.142756] page dumped because: kasan: bad access detected
[   21.142804] 
[   21.142827] Memory state around the buggy address:
[   21.142883]  fff00000c6013880: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc
[   21.142935]  fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   21.142986] >fff00000c6013980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.143031]                       ^
[   21.143066]  fff00000c6013a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.143401]  fff00000c6013a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.143574] ==================================================================

[   13.577492] ==================================================================
[   13.578403] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.578772] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.579118] 
[   13.579371] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.579432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.579445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.579466] Call Trace:
[   13.579487]  <TASK>
[   13.579505]  dump_stack_lvl+0x73/0xb0
[   13.579536]  print_report+0xd1/0x650
[   13.579559]  ? __virt_addr_valid+0x1db/0x2d0
[   13.579590]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.579614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.579635]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.579659]  kasan_report+0x141/0x180
[   13.579681]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.579709]  kasan_check_range+0x10c/0x1c0
[   13.579731]  __kasan_check_write+0x18/0x20
[   13.579751]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.579775]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.579801]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.579826]  ? trace_hardirqs_on+0x37/0xe0
[   13.579848]  ? kasan_bitops_generic+0x92/0x1c0
[   13.579875]  kasan_bitops_generic+0x116/0x1c0
[   13.579900]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.579926]  ? __pfx_read_tsc+0x10/0x10
[   13.579948]  ? ktime_get_ts64+0x86/0x230
[   13.579972]  kunit_try_run_case+0x1a5/0x480
[   13.579997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.580019]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.580043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.580065]  ? __kthread_parkme+0x82/0x180
[   13.580086]  ? preempt_count_sub+0x50/0x80
[   13.580110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.580134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.580156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.580224]  kthread+0x337/0x6f0
[   13.580245]  ? trace_preempt_on+0x20/0xc0
[   13.580268]  ? __pfx_kthread+0x10/0x10
[   13.580288]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.580309]  ? calculate_sigpending+0x7b/0xa0
[   13.580332]  ? __pfx_kthread+0x10/0x10
[   13.580353]  ret_from_fork+0x116/0x1d0
[   13.580371]  ? __pfx_kthread+0x10/0x10
[   13.580407]  ret_from_fork_asm+0x1a/0x30
[   13.580436]  </TASK>
[   13.580449] 
[   13.588741] Allocated by task 278:
[   13.588958]  kasan_save_stack+0x45/0x70
[   13.589139]  kasan_save_track+0x18/0x40
[   13.589306]  kasan_save_alloc_info+0x3b/0x50
[   13.589467]  __kasan_kmalloc+0xb7/0xc0
[   13.589600]  __kmalloc_cache_noprof+0x189/0x420
[   13.589786]  kasan_bitops_generic+0x92/0x1c0
[   13.590096]  kunit_try_run_case+0x1a5/0x480
[   13.590306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.590908]  kthread+0x337/0x6f0
[   13.591047]  ret_from_fork+0x116/0x1d0
[   13.591182]  ret_from_fork_asm+0x1a/0x30
[   13.591386] 
[   13.591482] The buggy address belongs to the object at ffff888102531780
[   13.591482]  which belongs to the cache kmalloc-16 of size 16
[   13.592160] The buggy address is located 8 bytes inside of
[   13.592160]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.592696] 
[   13.592791] The buggy address belongs to the physical page:
[   13.593017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.593286] flags: 0x200000000000000(node=0|zone=2)
[   13.593498] page_type: f5(slab)
[   13.593665] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.593993] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.594619] page dumped because: kasan: bad access detected
[   13.594825] 
[   13.594896] Memory state around the buggy address:
[   13.595335]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.595588]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.595909] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.596179]                       ^
[   13.596323]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.596647]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.596861] ==================================================================
[   13.515280] ==================================================================
[   13.515788] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.516663] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.516927] 
[   13.517100] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.517148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.517161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.517183] Call Trace:
[   13.517195]  <TASK>
[   13.517214]  dump_stack_lvl+0x73/0xb0
[   13.517244]  print_report+0xd1/0x650
[   13.517268]  ? __virt_addr_valid+0x1db/0x2d0
[   13.517292]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.517318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.517339]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.517364]  kasan_report+0x141/0x180
[   13.517398]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.517429]  kasan_check_range+0x10c/0x1c0
[   13.517452]  __kasan_check_write+0x18/0x20
[   13.517471]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.517495]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.517521]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.517545]  ? trace_hardirqs_on+0x37/0xe0
[   13.517568]  ? kasan_bitops_generic+0x92/0x1c0
[   13.517609]  kasan_bitops_generic+0x116/0x1c0
[   13.517632]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.517656]  ? __pfx_read_tsc+0x10/0x10
[   13.517679]  ? ktime_get_ts64+0x86/0x230
[   13.517704]  kunit_try_run_case+0x1a5/0x480
[   13.517731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.517754]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.517779]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.517801]  ? __kthread_parkme+0x82/0x180
[   13.517823]  ? preempt_count_sub+0x50/0x80
[   13.517847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.517872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.517894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.517917]  kthread+0x337/0x6f0
[   13.517937]  ? trace_preempt_on+0x20/0xc0
[   13.517960]  ? __pfx_kthread+0x10/0x10
[   13.517981]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.518002]  ? calculate_sigpending+0x7b/0xa0
[   13.518025]  ? __pfx_kthread+0x10/0x10
[   13.518046]  ret_from_fork+0x116/0x1d0
[   13.518064]  ? __pfx_kthread+0x10/0x10
[   13.518083]  ret_from_fork_asm+0x1a/0x30
[   13.518114]  </TASK>
[   13.518126] 
[   13.526901] Allocated by task 278:
[   13.527256]  kasan_save_stack+0x45/0x70
[   13.527496]  kasan_save_track+0x18/0x40
[   13.527691]  kasan_save_alloc_info+0x3b/0x50
[   13.527856]  __kasan_kmalloc+0xb7/0xc0
[   13.528252]  __kmalloc_cache_noprof+0x189/0x420
[   13.528444]  kasan_bitops_generic+0x92/0x1c0
[   13.528595]  kunit_try_run_case+0x1a5/0x480
[   13.528745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.528995]  kthread+0x337/0x6f0
[   13.529167]  ret_from_fork+0x116/0x1d0
[   13.529530]  ret_from_fork_asm+0x1a/0x30
[   13.529726] 
[   13.529797] The buggy address belongs to the object at ffff888102531780
[   13.529797]  which belongs to the cache kmalloc-16 of size 16
[   13.530146] The buggy address is located 8 bytes inside of
[   13.530146]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.531181] 
[   13.531280] The buggy address belongs to the physical page:
[   13.531514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.531758] flags: 0x200000000000000(node=0|zone=2)
[   13.531923] page_type: f5(slab)
[   13.532357] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.532962] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.533235] page dumped because: kasan: bad access detected
[   13.533419] 
[   13.533488] Memory state around the buggy address:
[   13.533643]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.533943]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.534263] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.534804]                       ^
[   13.535054]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.535356]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.535653] ==================================================================
[   13.536145] ==================================================================
[   13.536507] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.536892] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.537185] 
[   13.537642] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.537691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.537703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.537724] Call Trace:
[   13.537739]  <TASK>
[   13.537756]  dump_stack_lvl+0x73/0xb0
[   13.537784]  print_report+0xd1/0x650
[   13.537808]  ? __virt_addr_valid+0x1db/0x2d0
[   13.537832]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.537857]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.537878]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.537903]  kasan_report+0x141/0x180
[   13.537994]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.538028]  kasan_check_range+0x10c/0x1c0
[   13.538052]  __kasan_check_write+0x18/0x20
[   13.538071]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.538095]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.538122]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.538147]  ? trace_hardirqs_on+0x37/0xe0
[   13.538170]  ? kasan_bitops_generic+0x92/0x1c0
[   13.538197]  kasan_bitops_generic+0x116/0x1c0
[   13.538220]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.538244]  ? __pfx_read_tsc+0x10/0x10
[   13.538265]  ? ktime_get_ts64+0x86/0x230
[   13.538289]  kunit_try_run_case+0x1a5/0x480
[   13.538313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.538334]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.538359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.538395]  ? __kthread_parkme+0x82/0x180
[   13.538417]  ? preempt_count_sub+0x50/0x80
[   13.538441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.538464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.538487]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.538510]  kthread+0x337/0x6f0
[   13.538530]  ? trace_preempt_on+0x20/0xc0
[   13.538553]  ? __pfx_kthread+0x10/0x10
[   13.538573]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.538594]  ? calculate_sigpending+0x7b/0xa0
[   13.538617]  ? __pfx_kthread+0x10/0x10
[   13.538638]  ret_from_fork+0x116/0x1d0
[   13.538656]  ? __pfx_kthread+0x10/0x10
[   13.538676]  ret_from_fork_asm+0x1a/0x30
[   13.538708]  </TASK>
[   13.538719] 
[   13.547151] Allocated by task 278:
[   13.547599]  kasan_save_stack+0x45/0x70
[   13.547779]  kasan_save_track+0x18/0x40
[   13.547917]  kasan_save_alloc_info+0x3b/0x50
[   13.548067]  __kasan_kmalloc+0xb7/0xc0
[   13.548255]  __kmalloc_cache_noprof+0x189/0x420
[   13.548496]  kasan_bitops_generic+0x92/0x1c0
[   13.548711]  kunit_try_run_case+0x1a5/0x480
[   13.549077]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.549255]  kthread+0x337/0x6f0
[   13.549387]  ret_from_fork+0x116/0x1d0
[   13.549548]  ret_from_fork_asm+0x1a/0x30
[   13.549746] 
[   13.549845] The buggy address belongs to the object at ffff888102531780
[   13.549845]  which belongs to the cache kmalloc-16 of size 16
[   13.550750] The buggy address is located 8 bytes inside of
[   13.550750]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.551358] 
[   13.551477] The buggy address belongs to the physical page:
[   13.551724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.551966] flags: 0x200000000000000(node=0|zone=2)
[   13.552144] page_type: f5(slab)
[   13.552316] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.552783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.553283] page dumped because: kasan: bad access detected
[   13.554121] 
[   13.554203] Memory state around the buggy address:
[   13.554364]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.554991]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.555326] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.555672]                       ^
[   13.555849]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.556099]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.556463] ==================================================================
[   13.597228] ==================================================================
[   13.597574] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.598095] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.598451] 
[   13.598562] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.598606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.598617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.598638] Call Trace:
[   13.598651]  <TASK>
[   13.598665]  dump_stack_lvl+0x73/0xb0
[   13.598694]  print_report+0xd1/0x650
[   13.598717]  ? __virt_addr_valid+0x1db/0x2d0
[   13.598739]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.598764]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.598785]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.598810]  kasan_report+0x141/0x180
[   13.598831]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.598860]  kasan_check_range+0x10c/0x1c0
[   13.598883]  __kasan_check_write+0x18/0x20
[   13.598902]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.598926]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.598951]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.598976]  ? trace_hardirqs_on+0x37/0xe0
[   13.598999]  ? kasan_bitops_generic+0x92/0x1c0
[   13.599025]  kasan_bitops_generic+0x116/0x1c0
[   13.599048]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.599072]  ? __pfx_read_tsc+0x10/0x10
[   13.599093]  ? ktime_get_ts64+0x86/0x230
[   13.599117]  kunit_try_run_case+0x1a5/0x480
[   13.599141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.599163]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.599187]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.599209]  ? __kthread_parkme+0x82/0x180
[   13.599230]  ? preempt_count_sub+0x50/0x80
[   13.599253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.599276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.599298]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.599321]  kthread+0x337/0x6f0
[   13.599340]  ? trace_preempt_on+0x20/0xc0
[   13.599361]  ? __pfx_kthread+0x10/0x10
[   13.599390]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.599411]  ? calculate_sigpending+0x7b/0xa0
[   13.599434]  ? __pfx_kthread+0x10/0x10
[   13.599515]  ret_from_fork+0x116/0x1d0
[   13.599535]  ? __pfx_kthread+0x10/0x10
[   13.599555]  ret_from_fork_asm+0x1a/0x30
[   13.599586]  </TASK>
[   13.599597] 
[   13.608484] Allocated by task 278:
[   13.608755]  kasan_save_stack+0x45/0x70
[   13.609065]  kasan_save_track+0x18/0x40
[   13.609220]  kasan_save_alloc_info+0x3b/0x50
[   13.609385]  __kasan_kmalloc+0xb7/0xc0
[   13.609519]  __kmalloc_cache_noprof+0x189/0x420
[   13.609676]  kasan_bitops_generic+0x92/0x1c0
[   13.609823]  kunit_try_run_case+0x1a5/0x480
[   13.609970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.610222]  kthread+0x337/0x6f0
[   13.610401]  ret_from_fork+0x116/0x1d0
[   13.610590]  ret_from_fork_asm+0x1a/0x30
[   13.610790] 
[   13.610885] The buggy address belongs to the object at ffff888102531780
[   13.610885]  which belongs to the cache kmalloc-16 of size 16
[   13.611811] The buggy address is located 8 bytes inside of
[   13.611811]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.612357] 
[   13.612477] The buggy address belongs to the physical page:
[   13.612732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.613091] flags: 0x200000000000000(node=0|zone=2)
[   13.613262] page_type: f5(slab)
[   13.613393] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.613740] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.614087] page dumped because: kasan: bad access detected
[   13.614443] 
[   13.614538] Memory state around the buggy address:
[   13.614727]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.614955]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.615268] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.615806]                       ^
[   13.615963]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.616180]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.616504] ==================================================================
[   13.557045] ==================================================================
[   13.557456] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.558197] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.558465] 
[   13.558581] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.558624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.558636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.558657] Call Trace:
[   13.558676]  <TASK>
[   13.558694]  dump_stack_lvl+0x73/0xb0
[   13.558723]  print_report+0xd1/0x650
[   13.558747]  ? __virt_addr_valid+0x1db/0x2d0
[   13.558770]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.558794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.558816]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.558840]  kasan_report+0x141/0x180
[   13.558861]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.558890]  kasan_check_range+0x10c/0x1c0
[   13.558913]  __kasan_check_write+0x18/0x20
[   13.558931]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.558956]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.558982]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.559007]  ? trace_hardirqs_on+0x37/0xe0
[   13.559029]  ? kasan_bitops_generic+0x92/0x1c0
[   13.559056]  kasan_bitops_generic+0x116/0x1c0
[   13.559078]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.559103]  ? __pfx_read_tsc+0x10/0x10
[   13.559124]  ? ktime_get_ts64+0x86/0x230
[   13.559147]  kunit_try_run_case+0x1a5/0x480
[   13.559171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.559193]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.559217]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.559240]  ? __kthread_parkme+0x82/0x180
[   13.559260]  ? preempt_count_sub+0x50/0x80
[   13.559283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.559306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.559328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.559444]  kthread+0x337/0x6f0
[   13.559466]  ? trace_preempt_on+0x20/0xc0
[   13.559487]  ? __pfx_kthread+0x10/0x10
[   13.559510]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.559531]  ? calculate_sigpending+0x7b/0xa0
[   13.559554]  ? __pfx_kthread+0x10/0x10
[   13.559575]  ret_from_fork+0x116/0x1d0
[   13.559593]  ? __pfx_kthread+0x10/0x10
[   13.559613]  ret_from_fork_asm+0x1a/0x30
[   13.559643]  </TASK>
[   13.559654] 
[   13.568468] Allocated by task 278:
[   13.568675]  kasan_save_stack+0x45/0x70
[   13.568835]  kasan_save_track+0x18/0x40
[   13.568972]  kasan_save_alloc_info+0x3b/0x50
[   13.569131]  __kasan_kmalloc+0xb7/0xc0
[   13.569341]  __kmalloc_cache_noprof+0x189/0x420
[   13.569593]  kasan_bitops_generic+0x92/0x1c0
[   13.569803]  kunit_try_run_case+0x1a5/0x480
[   13.570403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.570803]  kthread+0x337/0x6f0
[   13.571127]  ret_from_fork+0x116/0x1d0
[   13.571331]  ret_from_fork_asm+0x1a/0x30
[   13.571494] 
[   13.571598] The buggy address belongs to the object at ffff888102531780
[   13.571598]  which belongs to the cache kmalloc-16 of size 16
[   13.572162] The buggy address is located 8 bytes inside of
[   13.572162]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.572664] 
[   13.572743] The buggy address belongs to the physical page:
[   13.572950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.573434] flags: 0x200000000000000(node=0|zone=2)
[   13.573658] page_type: f5(slab)
[   13.573797] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.574028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.574254] page dumped because: kasan: bad access detected
[   13.574462] 
[   13.574560] Memory state around the buggy address:
[   13.574789]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.575694]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.575921] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.576240]                       ^
[   13.576441]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.576762]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.576978] ==================================================================
[   13.617069] ==================================================================
[   13.617425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.617827] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.618194] 
[   13.618310] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.618353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.618365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.618396] Call Trace:
[   13.618410]  <TASK>
[   13.618424]  dump_stack_lvl+0x73/0xb0
[   13.618454]  print_report+0xd1/0x650
[   13.618476]  ? __virt_addr_valid+0x1db/0x2d0
[   13.618498]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.618522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.618544]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.618569]  kasan_report+0x141/0x180
[   13.618590]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.618640]  kasan_check_range+0x10c/0x1c0
[   13.618663]  __kasan_check_write+0x18/0x20
[   13.618682]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.618706]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.618731]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.618755]  ? trace_hardirqs_on+0x37/0xe0
[   13.618778]  ? kasan_bitops_generic+0x92/0x1c0
[   13.618805]  kasan_bitops_generic+0x116/0x1c0
[   13.618829]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.618853]  ? __pfx_read_tsc+0x10/0x10
[   13.618874]  ? ktime_get_ts64+0x86/0x230
[   13.618898]  kunit_try_run_case+0x1a5/0x480
[   13.619109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.619133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.619157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.619180]  ? __kthread_parkme+0x82/0x180
[   13.619202]  ? preempt_count_sub+0x50/0x80
[   13.619225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.619249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.619272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.619294]  kthread+0x337/0x6f0
[   13.619313]  ? trace_preempt_on+0x20/0xc0
[   13.619335]  ? __pfx_kthread+0x10/0x10
[   13.619354]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.619387]  ? calculate_sigpending+0x7b/0xa0
[   13.619411]  ? __pfx_kthread+0x10/0x10
[   13.619431]  ret_from_fork+0x116/0x1d0
[   13.619449]  ? __pfx_kthread+0x10/0x10
[   13.619468]  ret_from_fork_asm+0x1a/0x30
[   13.619498]  </TASK>
[   13.619509] 
[   13.627882] Allocated by task 278:
[   13.628124]  kasan_save_stack+0x45/0x70
[   13.628302]  kasan_save_track+0x18/0x40
[   13.628506]  kasan_save_alloc_info+0x3b/0x50
[   13.628715]  __kasan_kmalloc+0xb7/0xc0
[   13.628892]  __kmalloc_cache_noprof+0x189/0x420
[   13.629138]  kasan_bitops_generic+0x92/0x1c0
[   13.629344]  kunit_try_run_case+0x1a5/0x480
[   13.629531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.629785]  kthread+0x337/0x6f0
[   13.630040]  ret_from_fork+0x116/0x1d0
[   13.630234]  ret_from_fork_asm+0x1a/0x30
[   13.630407] 
[   13.630502] The buggy address belongs to the object at ffff888102531780
[   13.630502]  which belongs to the cache kmalloc-16 of size 16
[   13.631191] The buggy address is located 8 bytes inside of
[   13.631191]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.631673] 
[   13.631788] The buggy address belongs to the physical page:
[   13.632041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.632289] flags: 0x200000000000000(node=0|zone=2)
[   13.632469] page_type: f5(slab)
[   13.632664] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.633081] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.633427] page dumped because: kasan: bad access detected
[   13.633703] 
[   13.633798] Memory state around the buggy address:
[   13.634099]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.634439]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.634691] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.635107]                       ^
[   13.635311]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.635641]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.636066] ==================================================================
[   13.658368] ==================================================================
[   13.658854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.659297] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.659635] 
[   13.659742] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.659785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.659797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.659818] Call Trace:
[   13.659834]  <TASK>
[   13.659851]  dump_stack_lvl+0x73/0xb0
[   13.659879]  print_report+0xd1/0x650
[   13.659901]  ? __virt_addr_valid+0x1db/0x2d0
[   13.660161]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.660187]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.660210]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.660236]  kasan_report+0x141/0x180
[   13.660258]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.660287]  kasan_check_range+0x10c/0x1c0
[   13.660309]  __kasan_check_write+0x18/0x20
[   13.660328]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.660353]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.660391]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.660422]  ? trace_hardirqs_on+0x37/0xe0
[   13.660444]  ? kasan_bitops_generic+0x92/0x1c0
[   13.660470]  kasan_bitops_generic+0x116/0x1c0
[   13.660492]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.660516]  ? __pfx_read_tsc+0x10/0x10
[   13.660536]  ? ktime_get_ts64+0x86/0x230
[   13.660559]  kunit_try_run_case+0x1a5/0x480
[   13.660583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.660603]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.660627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.660649]  ? __kthread_parkme+0x82/0x180
[   13.660668]  ? preempt_count_sub+0x50/0x80
[   13.660692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.660715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.660737]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.660780]  kthread+0x337/0x6f0
[   13.660801]  ? trace_preempt_on+0x20/0xc0
[   13.660822]  ? __pfx_kthread+0x10/0x10
[   13.660841]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.660861]  ? calculate_sigpending+0x7b/0xa0
[   13.660884]  ? __pfx_kthread+0x10/0x10
[   13.660973]  ret_from_fork+0x116/0x1d0
[   13.660995]  ? __pfx_kthread+0x10/0x10
[   13.661015]  ret_from_fork_asm+0x1a/0x30
[   13.661044]  </TASK>
[   13.661056] 
[   13.669591] Allocated by task 278:
[   13.669805]  kasan_save_stack+0x45/0x70
[   13.670034]  kasan_save_track+0x18/0x40
[   13.670227]  kasan_save_alloc_info+0x3b/0x50
[   13.670525]  __kasan_kmalloc+0xb7/0xc0
[   13.670697]  __kmalloc_cache_noprof+0x189/0x420
[   13.670882]  kasan_bitops_generic+0x92/0x1c0
[   13.671149]  kunit_try_run_case+0x1a5/0x480
[   13.671388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.671621]  kthread+0x337/0x6f0
[   13.671800]  ret_from_fork+0x116/0x1d0
[   13.672184]  ret_from_fork_asm+0x1a/0x30
[   13.672348] 
[   13.672441] The buggy address belongs to the object at ffff888102531780
[   13.672441]  which belongs to the cache kmalloc-16 of size 16
[   13.672969] The buggy address is located 8 bytes inside of
[   13.672969]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.673455] 
[   13.673529] The buggy address belongs to the physical page:
[   13.673702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.674010] flags: 0x200000000000000(node=0|zone=2)
[   13.674249] page_type: f5(slab)
[   13.674533] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.674793] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.675080] page dumped because: kasan: bad access detected
[   13.675255] 
[   13.675324] Memory state around the buggy address:
[   13.675490]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.675732]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.676154] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.676388]                       ^
[   13.676519]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.676862]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.677258] ==================================================================
[   13.638538] ==================================================================
[   13.638820] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.639189] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278
[   13.639529] 
[   13.639626] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.639668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.639680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.639701] Call Trace:
[   13.639716]  <TASK>
[   13.639731]  dump_stack_lvl+0x73/0xb0
[   13.639758]  print_report+0xd1/0x650
[   13.639780]  ? __virt_addr_valid+0x1db/0x2d0
[   13.639802]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.639825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.639847]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.639871]  kasan_report+0x141/0x180
[   13.639892]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.639921]  kasan_check_range+0x10c/0x1c0
[   13.639943]  __kasan_check_write+0x18/0x20
[   13.639962]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.639988]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.640014]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.640038]  ? trace_hardirqs_on+0x37/0xe0
[   13.640060]  ? kasan_bitops_generic+0x92/0x1c0
[   13.640087]  kasan_bitops_generic+0x116/0x1c0
[   13.640109]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.640133]  ? __pfx_read_tsc+0x10/0x10
[   13.640154]  ? ktime_get_ts64+0x86/0x230
[   13.640177]  kunit_try_run_case+0x1a5/0x480
[   13.640201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.640222]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.640245]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.640266]  ? __kthread_parkme+0x82/0x180
[   13.640287]  ? preempt_count_sub+0x50/0x80
[   13.640309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.640332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.640354]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.640677]  kthread+0x337/0x6f0
[   13.640707]  ? trace_preempt_on+0x20/0xc0
[   13.640730]  ? __pfx_kthread+0x10/0x10
[   13.640750]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.640771]  ? calculate_sigpending+0x7b/0xa0
[   13.640794]  ? __pfx_kthread+0x10/0x10
[   13.640816]  ret_from_fork+0x116/0x1d0
[   13.640834]  ? __pfx_kthread+0x10/0x10
[   13.640854]  ret_from_fork_asm+0x1a/0x30
[   13.640883]  </TASK>
[   13.640895] 
[   13.649772] Allocated by task 278:
[   13.650035]  kasan_save_stack+0x45/0x70
[   13.650249]  kasan_save_track+0x18/0x40
[   13.650443]  kasan_save_alloc_info+0x3b/0x50
[   13.650663]  __kasan_kmalloc+0xb7/0xc0
[   13.650832]  __kmalloc_cache_noprof+0x189/0x420
[   13.651150]  kasan_bitops_generic+0x92/0x1c0
[   13.651307]  kunit_try_run_case+0x1a5/0x480
[   13.651473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.651749]  kthread+0x337/0x6f0
[   13.652107]  ret_from_fork+0x116/0x1d0
[   13.652304]  ret_from_fork_asm+0x1a/0x30
[   13.652523] 
[   13.652620] The buggy address belongs to the object at ffff888102531780
[   13.652620]  which belongs to the cache kmalloc-16 of size 16
[   13.653189] The buggy address is located 8 bytes inside of
[   13.653189]  allocated 9-byte region [ffff888102531780, ffff888102531789)
[   13.653730] 
[   13.653826] The buggy address belongs to the physical page:
[   13.654138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531
[   13.654442] flags: 0x200000000000000(node=0|zone=2)
[   13.654702] page_type: f5(slab)
[   13.654825] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.655226] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.655569] page dumped because: kasan: bad access detected
[   13.655805] 
[   13.655900] Memory state around the buggy address:
[   13.656299]  ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.656609]  ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.656945] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.657216]                       ^
[   13.657367]  ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.657651]  ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.657894] ==================================================================