Hay
Date
July 5, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   22.079970] ==================================================================
[   22.080328] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   22.080475] Read of size 8 at addr fff00000c5672908 by task kunit_try_catch/262
[   22.080579] 
[   22.080653] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.081338]  kasan_report+0xdc/0x128
[   22.083337]  kasan_save_alloc_info+0x40/0x58
[   22.085405] 
[   22.086545] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.088010] ==================================================================

[   15.908676] ==================================================================
[   15.909281] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.909633] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   15.909932] 
[   15.910806] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.910876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.910894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.910927] Call Trace:
[   15.910946]  <TASK>
[   15.910977]  dump_stack_lvl+0x73/0xb0
[   15.911021]  print_report+0xd1/0x650
[   15.911049]  ? __virt_addr_valid+0x1db/0x2d0
[   15.911080]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.911111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.911137]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.911168]  kasan_report+0x141/0x180
[   15.911230]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.911267]  kasan_check_range+0x10c/0x1c0
[   15.911310]  __kasan_check_write+0x18/0x20
[   15.911333]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.911364]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.911396]  ? ret_from_fork_asm+0x1a/0x30
[   15.911424]  ? kthread+0x337/0x6f0
[   15.911457]  kasan_bitops_generic+0x116/0x1c0
[   15.911486]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.911516]  ? __pfx_read_tsc+0x10/0x10
[   15.911543]  ? ktime_get_ts64+0x86/0x230
[   15.911575]  kunit_try_run_case+0x1a5/0x480
[   15.911611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.911637]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.911680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.911708]  ? __kthread_parkme+0x82/0x180
[   15.911732]  ? preempt_count_sub+0x50/0x80
[   15.911761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.911813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.911841]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.911869]  kthread+0x337/0x6f0
[   15.911892]  ? trace_preempt_on+0x20/0xc0
[   15.911921]  ? __pfx_kthread+0x10/0x10
[   15.911945]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.911969]  ? calculate_sigpending+0x7b/0xa0
[   15.911999]  ? __pfx_kthread+0x10/0x10
[   15.912024]  ret_from_fork+0x116/0x1d0
[   15.912046]  ? __pfx_kthread+0x10/0x10
[   15.912071]  ret_from_fork_asm+0x1a/0x30
[   15.912106]  </TASK>
[   15.912120] 
[   15.927583] Allocated by task 279:
[   15.927881]  kasan_save_stack+0x45/0x70
[   15.928229]  kasan_save_track+0x18/0x40
[   15.928418]  kasan_save_alloc_info+0x3b/0x50
[   15.928695]  __kasan_kmalloc+0xb7/0xc0
[   15.929302]  __kmalloc_cache_noprof+0x189/0x420
[   15.929594]  kasan_bitops_generic+0x92/0x1c0
[   15.929855]  kunit_try_run_case+0x1a5/0x480
[   15.930168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.930477]  kthread+0x337/0x6f0
[   15.930629]  ret_from_fork+0x116/0x1d0
[   15.930943]  ret_from_fork_asm+0x1a/0x30
[   15.931200] 
[   15.931322] The buggy address belongs to the object at ffff88810267b740
[   15.931322]  which belongs to the cache kmalloc-16 of size 16
[   15.932135] The buggy address is located 8 bytes inside of
[   15.932135]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   15.932668] 
[   15.932810] The buggy address belongs to the physical page:
[   15.933404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   15.933772] flags: 0x200000000000000(node=0|zone=2)
[   15.934174] page_type: f5(slab)
[   15.934386] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.934796] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.935318] page dumped because: kasan: bad access detected
[   15.935614] 
[   15.935747] Memory state around the buggy address:
[   15.936166]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.936546]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.937214] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   15.937719]                                               ^
[   15.937996]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.938394]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.938785] ==================================================================
[   15.965788] ==================================================================
[   15.966277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.966750] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   15.967428] 
[   15.967544] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.967612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.967627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.967681] Call Trace:
[   15.967703]  <TASK>
[   15.967725]  dump_stack_lvl+0x73/0xb0
[   15.967759]  print_report+0xd1/0x650
[   15.967786]  ? __virt_addr_valid+0x1db/0x2d0
[   15.967813]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.967844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.967871]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.967901]  kasan_report+0x141/0x180
[   15.967929]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.967964]  kasan_check_range+0x10c/0x1c0
[   15.968003]  __kasan_check_write+0x18/0x20
[   15.968026]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.968056]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.968144]  ? ret_from_fork_asm+0x1a/0x30
[   15.968171]  ? kthread+0x337/0x6f0
[   15.968249]  kasan_bitops_generic+0x116/0x1c0
[   15.968279]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.968309]  ? __pfx_read_tsc+0x10/0x10
[   15.968334]  ? ktime_get_ts64+0x86/0x230
[   15.968363]  kunit_try_run_case+0x1a5/0x480
[   15.968392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.968418]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.968447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.968485]  ? __kthread_parkme+0x82/0x180
[   15.968510]  ? preempt_count_sub+0x50/0x80
[   15.968552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.968580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.968606]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.968634]  kthread+0x337/0x6f0
[   15.968668]  ? trace_preempt_on+0x20/0xc0
[   15.968708]  ? __pfx_kthread+0x10/0x10
[   15.968734]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.968770]  ? calculate_sigpending+0x7b/0xa0
[   15.968802]  ? __pfx_kthread+0x10/0x10
[   15.968828]  ret_from_fork+0x116/0x1d0
[   15.968850]  ? __pfx_kthread+0x10/0x10
[   15.968875]  ret_from_fork_asm+0x1a/0x30
[   15.968912]  </TASK>
[   15.968925] 
[   15.979991] Allocated by task 279:
[   15.980266]  kasan_save_stack+0x45/0x70
[   15.980478]  kasan_save_track+0x18/0x40
[   15.980732]  kasan_save_alloc_info+0x3b/0x50
[   15.981028]  __kasan_kmalloc+0xb7/0xc0
[   15.981193]  __kmalloc_cache_noprof+0x189/0x420
[   15.981384]  kasan_bitops_generic+0x92/0x1c0
[   15.981632]  kunit_try_run_case+0x1a5/0x480
[   15.982166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.982491]  kthread+0x337/0x6f0
[   15.982711]  ret_from_fork+0x116/0x1d0
[   15.983098]  ret_from_fork_asm+0x1a/0x30
[   15.983297] 
[   15.983394] The buggy address belongs to the object at ffff88810267b740
[   15.983394]  which belongs to the cache kmalloc-16 of size 16
[   15.984171] The buggy address is located 8 bytes inside of
[   15.984171]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   15.984803] 
[   15.985008] The buggy address belongs to the physical page:
[   15.985301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   15.985741] flags: 0x200000000000000(node=0|zone=2)
[   15.986312] page_type: f5(slab)
[   15.986510] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.987118] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.987537] page dumped because: kasan: bad access detected
[   15.988004] 
[   15.988127] Memory state around the buggy address:
[   15.988364]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.988628]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.989156] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   15.989607]                                               ^
[   15.989928]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.990188]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.990494] ==================================================================
[   16.023965] ==================================================================
[   16.024712] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.025544] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.026245] 
[   16.026392] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.026465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.026481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.026509] Call Trace:
[   16.026532]  <TASK>
[   16.026556]  dump_stack_lvl+0x73/0xb0
[   16.026591]  print_report+0xd1/0x650
[   16.026617]  ? __virt_addr_valid+0x1db/0x2d0
[   16.026659]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.027071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.027101]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.027132]  kasan_report+0x141/0x180
[   16.027159]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.027204]  kasan_check_range+0x10c/0x1c0
[   16.027232]  __kasan_check_write+0x18/0x20
[   16.027255]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.027285]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.027316]  ? ret_from_fork_asm+0x1a/0x30
[   16.027342]  ? kthread+0x337/0x6f0
[   16.027372]  kasan_bitops_generic+0x116/0x1c0
[   16.027400]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.027429]  ? __pfx_read_tsc+0x10/0x10
[   16.027454]  ? ktime_get_ts64+0x86/0x230
[   16.027482]  kunit_try_run_case+0x1a5/0x480
[   16.027513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.027541]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.027570]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.027597]  ? __kthread_parkme+0x82/0x180
[   16.027621]  ? preempt_count_sub+0x50/0x80
[   16.027659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.027687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.027867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.027945]  kthread+0x337/0x6f0
[   16.027969]  ? trace_preempt_on+0x20/0xc0
[   16.027998]  ? __pfx_kthread+0x10/0x10
[   16.028023]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.028047]  ? calculate_sigpending+0x7b/0xa0
[   16.028077]  ? __pfx_kthread+0x10/0x10
[   16.028102]  ret_from_fork+0x116/0x1d0
[   16.028124]  ? __pfx_kthread+0x10/0x10
[   16.028147]  ret_from_fork_asm+0x1a/0x30
[   16.028184]  </TASK>
[   16.028197] 
[   16.043841] Allocated by task 279:
[   16.044061]  kasan_save_stack+0x45/0x70
[   16.044384]  kasan_save_track+0x18/0x40
[   16.044581]  kasan_save_alloc_info+0x3b/0x50
[   16.044938]  __kasan_kmalloc+0xb7/0xc0
[   16.045107]  __kmalloc_cache_noprof+0x189/0x420
[   16.045386]  kasan_bitops_generic+0x92/0x1c0
[   16.045627]  kunit_try_run_case+0x1a5/0x480
[   16.045949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.046263]  kthread+0x337/0x6f0
[   16.046463]  ret_from_fork+0x116/0x1d0
[   16.046709]  ret_from_fork_asm+0x1a/0x30
[   16.046960] 
[   16.047047] The buggy address belongs to the object at ffff88810267b740
[   16.047047]  which belongs to the cache kmalloc-16 of size 16
[   16.047524] The buggy address is located 8 bytes inside of
[   16.047524]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.048494] 
[   16.048597] The buggy address belongs to the physical page:
[   16.049192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.049659] flags: 0x200000000000000(node=0|zone=2)
[   16.050182] page_type: f5(slab)
[   16.050371] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.050751] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.051199] page dumped because: kasan: bad access detected
[   16.051511] 
[   16.051598] Memory state around the buggy address:
[   16.051853]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.052161]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.052558] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.052952]                                               ^
[   16.053201]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.053614]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.053921] ==================================================================
[   15.991191] ==================================================================
[   15.991562] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.992364] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   15.992843] 
[   15.993099] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.993155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.993170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.993197] Call Trace:
[   15.993220]  <TASK>
[   15.993247]  dump_stack_lvl+0x73/0xb0
[   15.993282]  print_report+0xd1/0x650
[   15.993310]  ? __virt_addr_valid+0x1db/0x2d0
[   15.993340]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.993369]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.993397]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.993427]  kasan_report+0x141/0x180
[   15.993453]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.993488]  kasan_check_range+0x10c/0x1c0
[   15.993516]  __kasan_check_write+0x18/0x20
[   15.993555]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.993586]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.993631]  ? ret_from_fork_asm+0x1a/0x30
[   15.993669]  ? kthread+0x337/0x6f0
[   15.993698]  kasan_bitops_generic+0x116/0x1c0
[   15.993725]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.993754]  ? __pfx_read_tsc+0x10/0x10
[   15.993780]  ? ktime_get_ts64+0x86/0x230
[   15.993811]  kunit_try_run_case+0x1a5/0x480
[   15.993839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.993866]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.993895]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.993921]  ? __kthread_parkme+0x82/0x180
[   15.993945]  ? preempt_count_sub+0x50/0x80
[   15.993974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.994002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.994028]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.994055]  kthread+0x337/0x6f0
[   15.994078]  ? trace_preempt_on+0x20/0xc0
[   15.994107]  ? __pfx_kthread+0x10/0x10
[   15.994131]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.994247]  ? calculate_sigpending+0x7b/0xa0
[   15.994277]  ? __pfx_kthread+0x10/0x10
[   15.994303]  ret_from_fork+0x116/0x1d0
[   15.994327]  ? __pfx_kthread+0x10/0x10
[   15.994351]  ret_from_fork_asm+0x1a/0x30
[   15.994388]  </TASK>
[   15.994401] 
[   16.008043] Allocated by task 279:
[   16.008347]  kasan_save_stack+0x45/0x70
[   16.008580]  kasan_save_track+0x18/0x40
[   16.009046]  kasan_save_alloc_info+0x3b/0x50
[   16.009506]  __kasan_kmalloc+0xb7/0xc0
[   16.010113]  __kmalloc_cache_noprof+0x189/0x420
[   16.010386]  kasan_bitops_generic+0x92/0x1c0
[   16.010628]  kunit_try_run_case+0x1a5/0x480
[   16.011283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.011753]  kthread+0x337/0x6f0
[   16.012375]  ret_from_fork+0x116/0x1d0
[   16.012605]  ret_from_fork_asm+0x1a/0x30
[   16.013543] 
[   16.013766] The buggy address belongs to the object at ffff88810267b740
[   16.013766]  which belongs to the cache kmalloc-16 of size 16
[   16.014611] The buggy address is located 8 bytes inside of
[   16.014611]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.015221] 
[   16.015312] The buggy address belongs to the physical page:
[   16.015517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.016075] flags: 0x200000000000000(node=0|zone=2)
[   16.016283] page_type: f5(slab)
[   16.016433] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.017386] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.019614] page dumped because: kasan: bad access detected
[   16.020262] 
[   16.020395] Memory state around the buggy address:
[   16.020670]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.021049]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.021412] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.022735]                                               ^
[   16.022956]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.023213]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.023464] ==================================================================
[   16.054597] ==================================================================
[   16.055103] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.055519] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.056289] 
[   16.056415] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.056474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.056490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.056516] Call Trace:
[   16.056540]  <TASK>
[   16.056565]  dump_stack_lvl+0x73/0xb0
[   16.056601]  print_report+0xd1/0x650
[   16.056626]  ? __virt_addr_valid+0x1db/0x2d0
[   16.056672]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.056702]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.056728]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.056759]  kasan_report+0x141/0x180
[   16.056784]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.056835]  kasan_check_range+0x10c/0x1c0
[   16.056863]  __kasan_check_write+0x18/0x20
[   16.056886]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.056917]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.056948]  ? ret_from_fork_asm+0x1a/0x30
[   16.056973]  ? kthread+0x337/0x6f0
[   16.057003]  kasan_bitops_generic+0x116/0x1c0
[   16.057031]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.057061]  ? __pfx_read_tsc+0x10/0x10
[   16.057085]  ? ktime_get_ts64+0x86/0x230
[   16.057115]  kunit_try_run_case+0x1a5/0x480
[   16.057144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.057171]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.057200]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.057228]  ? __kthread_parkme+0x82/0x180
[   16.057251]  ? preempt_count_sub+0x50/0x80
[   16.057279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.057306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.057333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.057360]  kthread+0x337/0x6f0
[   16.057382]  ? trace_preempt_on+0x20/0xc0
[   16.057410]  ? __pfx_kthread+0x10/0x10
[   16.057433]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.057458]  ? calculate_sigpending+0x7b/0xa0
[   16.057485]  ? __pfx_kthread+0x10/0x10
[   16.057511]  ret_from_fork+0x116/0x1d0
[   16.057532]  ? __pfx_kthread+0x10/0x10
[   16.057556]  ret_from_fork_asm+0x1a/0x30
[   16.057592]  </TASK>
[   16.057605] 
[   16.066986] Allocated by task 279:
[   16.067154]  kasan_save_stack+0x45/0x70
[   16.067361]  kasan_save_track+0x18/0x40
[   16.067584]  kasan_save_alloc_info+0x3b/0x50
[   16.067844]  __kasan_kmalloc+0xb7/0xc0
[   16.068064]  __kmalloc_cache_noprof+0x189/0x420
[   16.068253]  kasan_bitops_generic+0x92/0x1c0
[   16.068430]  kunit_try_run_case+0x1a5/0x480
[   16.069165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.069494]  kthread+0x337/0x6f0
[   16.069719]  ret_from_fork+0x116/0x1d0
[   16.070249]  ret_from_fork_asm+0x1a/0x30
[   16.070497] 
[   16.070596] The buggy address belongs to the object at ffff88810267b740
[   16.070596]  which belongs to the cache kmalloc-16 of size 16
[   16.071402] The buggy address is located 8 bytes inside of
[   16.071402]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.072021] 
[   16.072150] The buggy address belongs to the physical page:
[   16.072460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.072768] flags: 0x200000000000000(node=0|zone=2)
[   16.072969] page_type: f5(slab)
[   16.073117] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.073531] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.074734] page dumped because: kasan: bad access detected
[   16.075167] 
[   16.075286] Memory state around the buggy address:
[   16.075538]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.075816]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.076075] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.077017]                                               ^
[   16.077363]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.077784]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.078177] ==================================================================
[   15.939508] ==================================================================
[   15.940083] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.940679] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   15.941132] 
[   15.941267] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.941364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.941584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.941616] Call Trace:
[   15.941667]  <TASK>
[   15.941691]  dump_stack_lvl+0x73/0xb0
[   15.941728]  print_report+0xd1/0x650
[   15.941755]  ? __virt_addr_valid+0x1db/0x2d0
[   15.941784]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.941814]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.941840]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.941871]  kasan_report+0x141/0x180
[   15.941897]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.941933]  kasan_check_range+0x10c/0x1c0
[   15.941961]  __kasan_check_write+0x18/0x20
[   15.941983]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.942015]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.942113]  ? ret_from_fork_asm+0x1a/0x30
[   15.942160]  ? kthread+0x337/0x6f0
[   15.942190]  kasan_bitops_generic+0x116/0x1c0
[   15.942218]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.942248]  ? __pfx_read_tsc+0x10/0x10
[   15.942274]  ? ktime_get_ts64+0x86/0x230
[   15.942303]  kunit_try_run_case+0x1a5/0x480
[   15.942333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.942359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.942388]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.942431]  ? __kthread_parkme+0x82/0x180
[   15.942455]  ? preempt_count_sub+0x50/0x80
[   15.942485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.942526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.942554]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.942581]  kthread+0x337/0x6f0
[   15.942604]  ? trace_preempt_on+0x20/0xc0
[   15.942632]  ? __pfx_kthread+0x10/0x10
[   15.942666]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.942691]  ? calculate_sigpending+0x7b/0xa0
[   15.942720]  ? __pfx_kthread+0x10/0x10
[   15.942745]  ret_from_fork+0x116/0x1d0
[   15.942767]  ? __pfx_kthread+0x10/0x10
[   15.942873]  ret_from_fork_asm+0x1a/0x30
[   15.942921]  </TASK>
[   15.942934] 
[   15.953977] Allocated by task 279:
[   15.954211]  kasan_save_stack+0x45/0x70
[   15.954490]  kasan_save_track+0x18/0x40
[   15.954726]  kasan_save_alloc_info+0x3b/0x50
[   15.954983]  __kasan_kmalloc+0xb7/0xc0
[   15.955179]  __kmalloc_cache_noprof+0x189/0x420
[   15.955372]  kasan_bitops_generic+0x92/0x1c0
[   15.955549]  kunit_try_run_case+0x1a5/0x480
[   15.955920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.956257]  kthread+0x337/0x6f0
[   15.956459]  ret_from_fork+0x116/0x1d0
[   15.956699]  ret_from_fork_asm+0x1a/0x30
[   15.957273] 
[   15.957374] The buggy address belongs to the object at ffff88810267b740
[   15.957374]  which belongs to the cache kmalloc-16 of size 16
[   15.958156] The buggy address is located 8 bytes inside of
[   15.958156]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   15.958861] 
[   15.959150] The buggy address belongs to the physical page:
[   15.959419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   15.959988] flags: 0x200000000000000(node=0|zone=2)
[   15.960285] page_type: f5(slab)
[   15.960486] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.960896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.961535] page dumped because: kasan: bad access detected
[   15.961888] 
[   15.962064] Memory state around the buggy address:
[   15.962322]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.962700]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.963206] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   15.963590]                                               ^
[   15.964066]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.964537]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.965160] ==================================================================
[   16.106320] ==================================================================
[   16.106914] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.107392] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.107885] 
[   16.108024] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.108080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.108096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.108123] Call Trace:
[   16.108145]  <TASK>
[   16.108169]  dump_stack_lvl+0x73/0xb0
[   16.108202]  print_report+0xd1/0x650
[   16.108229]  ? __virt_addr_valid+0x1db/0x2d0
[   16.108256]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.108286]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.108313]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.108342]  kasan_report+0x141/0x180
[   16.108368]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.108402]  kasan_check_range+0x10c/0x1c0
[   16.108429]  __kasan_check_write+0x18/0x20
[   16.108452]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.108481]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.108512]  ? ret_from_fork_asm+0x1a/0x30
[   16.108537]  ? kthread+0x337/0x6f0
[   16.108567]  kasan_bitops_generic+0x116/0x1c0
[   16.108593]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.108622]  ? __pfx_read_tsc+0x10/0x10
[   16.108664]  ? ktime_get_ts64+0x86/0x230
[   16.108693]  kunit_try_run_case+0x1a5/0x480
[   16.108722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.108747]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.108775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.108801]  ? __kthread_parkme+0x82/0x180
[   16.108824]  ? preempt_count_sub+0x50/0x80
[   16.108853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.108879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.108971]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.109002]  kthread+0x337/0x6f0
[   16.109027]  ? trace_preempt_on+0x20/0xc0
[   16.109054]  ? __pfx_kthread+0x10/0x10
[   16.109078]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.109102]  ? calculate_sigpending+0x7b/0xa0
[   16.109131]  ? __pfx_kthread+0x10/0x10
[   16.109156]  ret_from_fork+0x116/0x1d0
[   16.109179]  ? __pfx_kthread+0x10/0x10
[   16.109202]  ret_from_fork_asm+0x1a/0x30
[   16.109238]  </TASK>
[   16.109251] 
[   16.119625] Allocated by task 279:
[   16.119860]  kasan_save_stack+0x45/0x70
[   16.120038]  kasan_save_track+0x18/0x40
[   16.120285]  kasan_save_alloc_info+0x3b/0x50
[   16.120791]  __kasan_kmalloc+0xb7/0xc0
[   16.120974]  __kmalloc_cache_noprof+0x189/0x420
[   16.121260]  kasan_bitops_generic+0x92/0x1c0
[   16.121527]  kunit_try_run_case+0x1a5/0x480
[   16.121793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.122114]  kthread+0x337/0x6f0
[   16.122320]  ret_from_fork+0x116/0x1d0
[   16.122513]  ret_from_fork_asm+0x1a/0x30
[   16.122697] 
[   16.122831] The buggy address belongs to the object at ffff88810267b740
[   16.122831]  which belongs to the cache kmalloc-16 of size 16
[   16.123486] The buggy address is located 8 bytes inside of
[   16.123486]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.124277] 
[   16.124376] The buggy address belongs to the physical page:
[   16.124585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.124959] flags: 0x200000000000000(node=0|zone=2)
[   16.125363] page_type: f5(slab)
[   16.125573] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.125941] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.126216] page dumped because: kasan: bad access detected
[   16.126728] 
[   16.126812] Memory state around the buggy address:
[   16.127290]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.127660]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.127940] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.128616]                                               ^
[   16.129071]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.129385]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.129805] ==================================================================
[   16.078811] ==================================================================
[   16.079231] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.079682] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279
[   16.079973] 
[   16.080081] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.080136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.080150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.080177] Call Trace:
[   16.080201]  <TASK>
[   16.080224]  dump_stack_lvl+0x73/0xb0
[   16.080258]  print_report+0xd1/0x650
[   16.080285]  ? __virt_addr_valid+0x1db/0x2d0
[   16.080313]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.080343]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.080369]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.080399]  kasan_report+0x141/0x180
[   16.080425]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.080461]  kasan_check_range+0x10c/0x1c0
[   16.080489]  __kasan_check_write+0x18/0x20
[   16.080513]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.080544]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.080576]  ? ret_from_fork_asm+0x1a/0x30
[   16.080603]  ? kthread+0x337/0x6f0
[   16.080758]  kasan_bitops_generic+0x116/0x1c0
[   16.080789]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.081017]  ? __pfx_read_tsc+0x10/0x10
[   16.081045]  ? ktime_get_ts64+0x86/0x230
[   16.081076]  kunit_try_run_case+0x1a5/0x480
[   16.081106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.081133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.081160]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.081187]  ? __kthread_parkme+0x82/0x180
[   16.081210]  ? preempt_count_sub+0x50/0x80
[   16.081239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.081267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.081293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.081320]  kthread+0x337/0x6f0
[   16.081343]  ? trace_preempt_on+0x20/0xc0
[   16.081370]  ? __pfx_kthread+0x10/0x10
[   16.081395]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.081419]  ? calculate_sigpending+0x7b/0xa0
[   16.081449]  ? __pfx_kthread+0x10/0x10
[   16.081475]  ret_from_fork+0x116/0x1d0
[   16.081496]  ? __pfx_kthread+0x10/0x10
[   16.081520]  ret_from_fork_asm+0x1a/0x30
[   16.081556]  </TASK>
[   16.081568] 
[   16.092106] Allocated by task 279:
[   16.092335]  kasan_save_stack+0x45/0x70
[   16.092675]  kasan_save_track+0x18/0x40
[   16.093113]  kasan_save_alloc_info+0x3b/0x50
[   16.093314]  __kasan_kmalloc+0xb7/0xc0
[   16.093544]  __kmalloc_cache_noprof+0x189/0x420
[   16.093877]  kasan_bitops_generic+0x92/0x1c0
[   16.094085]  kunit_try_run_case+0x1a5/0x480
[   16.094262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.094481]  kthread+0x337/0x6f0
[   16.094701]  ret_from_fork+0x116/0x1d0
[   16.094923]  ret_from_fork_asm+0x1a/0x30
[   16.095156] 
[   16.095414] The buggy address belongs to the object at ffff88810267b740
[   16.095414]  which belongs to the cache kmalloc-16 of size 16
[   16.097337] The buggy address is located 8 bytes inside of
[   16.097337]  allocated 9-byte region [ffff88810267b740, ffff88810267b749)
[   16.098354] 
[   16.098571] The buggy address belongs to the physical page:
[   16.099297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b
[   16.100177] flags: 0x200000000000000(node=0|zone=2)
[   16.100773] page_type: f5(slab)
[   16.100944] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.101731] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.102642] page dumped because: kasan: bad access detected
[   16.103340] 
[   16.103544] Memory state around the buggy address:
[   16.103948]  ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   16.104224]  ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.104486] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   16.104764]                                               ^
[   16.105073]  ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.105420]  ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.105747] ==================================================================