Hay
Date
July 5, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.551515] ==================================================================
[   20.551940] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   20.552528] Read of size 8 at addr fff00000c59fcc48 by task kunit_try_catch/261
[   20.552797] 
[   20.553319] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.553796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.554005] Hardware name: linux,dummy-virt (DT)
[   20.554629] Call trace:
[   20.571973] ==================================================================
[   20.490594] ==================================================================
[   20.491074] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.491136] Write of size 8 at addr fff00000c59fcc48 by task kunit_try_catch/261
[   20.491199] 
[   20.491234] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.491317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.491346] Hardware name: linux,dummy-virt (DT)
[   20.491377] Call trace:
[   20.491413]  show_stack+0x20/0x38 (C)
[   20.491463]  dump_stack_lvl+0x8c/0xd0
[   20.491684]  print_report+0x118/0x608
[   20.492201]  kasan_report+0xdc/0x128
[   20.492284]  kasan_check_range+0x100/0x1a8
[   20.492335]  __kasan_check_write+0x20/0x30
[   20.492380]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.492432]  kasan_bitops_generic+0x110/0x1c8
[   20.492758]  kunit_try_run_case+0x170/0x3f0
[   20.492816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.493027]  kthread+0x328/0x630
[   20.493497]  ret_from_fork+0x10/0x20
[   20.493687] 
[   20.493761] Allocated by task 261:
[   20.493799]  kasan_save_stack+0x3c/0x68
[   20.493861]  kasan_save_track+0x20/0x40
[   20.494033]  kasan_save_alloc_info+0x40/0x58
[   20.494081]  __kasan_kmalloc+0xd4/0xd8
[   20.494119]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.494303]  kasan_bitops_generic+0xa0/0x1c8
[   20.494375]  kunit_try_run_case+0x170/0x3f0
[   20.494469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.494560]  kthread+0x328/0x630
[   20.494637]  ret_from_fork+0x10/0x20
[   20.494674] 
[   20.494740] The buggy address belongs to the object at fff00000c59fcc40
[   20.494740]  which belongs to the cache kmalloc-16 of size 16
[   20.494859] The buggy address is located 8 bytes inside of
[   20.494859]  allocated 9-byte region [fff00000c59fcc40, fff00000c59fcc49)
[   20.495001] 
[   20.495028] The buggy address belongs to the physical page:
[   20.495172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fc
[   20.495225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.495682] page_type: f5(slab)
[   20.495867] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.495991] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.496034] page dumped because: kasan: bad access detected
[   20.496069] 
[   20.496401] Memory state around the buggy address:
[   20.496619]  fff00000c59fcb00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   20.496860]  fff00000c59fcb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.496942] >fff00000c59fcc00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   20.497049]                                               ^
[   20.497134]  fff00000c59fcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.497199]  fff00000c59fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.497238] ==================================================================
[   20.525971] ==================================================================
[   20.527205] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   20.527462] Write of size 8 at addr fff00000c59fcc48 by task kunit_try_catch/261
[   20.527519] 
[   20.527553] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.527636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.527664] Hardware name: linux,dummy-virt (DT)
[   20.527697] Call trace:
[   20.527720]  show_stack+0x20/0x38 (C)
[   20.527771]  dump_stack_lvl+0x8c/0xd0
[   20.527818]  print_report+0x118/0x608
[   20.527866]  kasan_report+0xdc/0x128
[   20.531177]  kasan_check_range+0x100/0x1a8
[   20.531702]  __kasan_check_write+0x20/0x30
[   20.532366]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   20.532512]  kasan_bitops_generic+0x110/0x1c8
[   20.532929]  kunit_try_run_case+0x170/0x3f0
[   20.534271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.534650]  kthread+0x328/0x630
[   20.534758]  ret_from_fork+0x10/0x20
[   20.535387] 
[   20.535497] Allocated by task 261:
[   20.535604]  kasan_save_stack+0x3c/0x68
[   20.535658]  kasan_save_track+0x20/0x40
[   20.535698]  kasan_save_alloc_info+0x40/0x58
[   20.536569]  __kasan_kmalloc+0xd4/0xd8
[   20.537024]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.537505]  kasan_bitops_generic+0xa0/0x1c8
[   20.537560]  kunit_try_run_case+0x170/0x3f0
[   20.537602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.537646]  kthread+0x328/0x630
[   20.537683]  ret_from_fork+0x10/0x20
[   20.537721] 
[   20.538918] The buggy address belongs to the object at fff00000c59fcc40
[   20.538918]  which belongs to the cache kmalloc-16 of size 16
[   20.539567] The buggy address is located 8 bytes inside of
[   20.539567]  allocated 9-byte region [fff00000c59fcc40, fff00000c59fcc49)
[   20.539697] 
[   20.539721] The buggy address belongs to the physical page:
[   20.539756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fc
[   20.541070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.541506] page_type: f5(slab)
[   20.541814] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.541868] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.541911] page dumped because: kasan: bad access detected
[   20.542605] 
[   20.542920] Memory state around the buggy address:
[   20.543346]  fff00000c59fcb00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   20.544229]  fff00000c59fcb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.544307] >fff00000c59fcc00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   20.545174]                                               ^
[   20.545413]  fff00000c59fcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.546135]  fff00000c59fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.546287] ==================================================================
[   20.501135] ==================================================================
[   20.501549] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.502021] Read of size 8 at addr fff00000c59fcc48 by task kunit_try_catch/261
[   20.502095] 
[   20.502248] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.502610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.502650] Hardware name: linux,dummy-virt (DT)
[   20.502684] Call trace:
[   20.502708]  show_stack+0x20/0x38 (C)
[   20.502770]  dump_stack_lvl+0x8c/0xd0
[   20.502820]  print_report+0x118/0x608
[   20.503251]  kasan_report+0xdc/0x128
[   20.503330]  __asan_report_load8_noabort+0x20/0x30
[   20.503380]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.503481]  kasan_bitops_generic+0x110/0x1c8
[   20.503904]  kunit_try_run_case+0x170/0x3f0
[   20.503959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.504470]  kthread+0x328/0x630
[   20.504916]  ret_from_fork+0x10/0x20
[   20.505408] 
[   20.505713] Allocated by task 261:
[   20.506022]  kasan_save_stack+0x3c/0x68
[   20.507011]  kasan_save_track+0x20/0x40
[   20.507057]  kasan_save_alloc_info+0x40/0x58
[   20.507298]  __kasan_kmalloc+0xd4/0xd8
[   20.507344]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.507385]  kasan_bitops_generic+0xa0/0x1c8
[   20.507426]  kunit_try_run_case+0x170/0x3f0
[   20.507465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.508475]  kthread+0x328/0x630
[   20.508630]  ret_from_fork+0x10/0x20
[   20.508678] 
[   20.508701] The buggy address belongs to the object at fff00000c59fcc40
[   20.508701]  which belongs to the cache kmalloc-16 of size 16
[   20.510001] The buggy address is located 8 bytes inside of
[   20.510001]  allocated 9-byte region [fff00000c59fcc40, fff00000c59fcc49)
[   20.510704] 
[   20.510808] The buggy address belongs to the physical page:
[   20.511331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fc
[   20.511702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.512305] page_type: f5(slab)
[   20.512357] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.512961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.513543] page dumped because: kasan: bad access detected
[   20.513646] 
[   20.513668] Memory state around the buggy address:
[   20.514128]  fff00000c59fcb00: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   20.514299]  fff00000c59fcb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.515078] >fff00000c59fcc00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   20.515410]                                               ^
[   20.515786]  fff00000c59fcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.516456]  fff00000c59fcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.516504] ==================================================================

[   15.849092] ==================================================================
[   15.849520] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.850341] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   15.850731] 
[   15.850874] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.850926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.850941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.850968] Call Trace:
[   15.850985]  <TASK>
[   15.851005]  dump_stack_lvl+0x73/0xb0
[   15.851041]  print_report+0xd1/0x650
[   15.851068]  ? __virt_addr_valid+0x1db/0x2d0
[   15.851095]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.851125]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.851150]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.851180]  kasan_report+0x141/0x180
[   15.851205]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.851240]  kasan_check_range+0x10c/0x1c0
[   15.851267]  __kasan_check_write+0x18/0x20
[   15.851291]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.851322]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.851352]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.851382]  ? trace_hardirqs_on+0x37/0xe0
[   15.851409]  ? kasan_bitops_generic+0x92/0x1c0
[   15.851441]  kasan_bitops_generic+0x116/0x1c0
[   15.851484]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.851514]  ? __pfx_read_tsc+0x10/0x10
[   15.851538]  ? ktime_get_ts64+0x86/0x230
[   15.851566]  kunit_try_run_case+0x1a5/0x480
[   15.851597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.851622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.851651]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.851678]  ? __kthread_parkme+0x82/0x180
[   15.851702]  ? preempt_count_sub+0x50/0x80
[   15.851730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.851757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.851784]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.851822]  kthread+0x337/0x6f0
[   15.851845]  ? trace_preempt_on+0x20/0xc0
[   15.851870]  ? __pfx_kthread+0x10/0x10
[   15.851895]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.851920]  ? calculate_sigpending+0x7b/0xa0
[   15.851948]  ? __pfx_kthread+0x10/0x10
[   15.851973]  ret_from_fork+0x116/0x1d0
[   15.851996]  ? __pfx_kthread+0x10/0x10
[   15.852020]  ret_from_fork_asm+0x1a/0x30
[   15.852055]  </TASK>
[   15.852069] 
[   15.861863] Allocated by task 279:
[   15.862067]  kasan_save_stack+0x45/0x70
[   15.862505]  kasan_save_track+0x18/0x40
[   15.862719]  kasan_save_alloc_info+0x3b/0x50
[   15.862975]  __kasan_kmalloc+0xb7/0xc0
[   15.863238]  __kmalloc_cache_noprof+0x189/0x420
[   15.863450]  kasan_bitops_generic+0x92/0x1c0
[   15.863713]  kunit_try_run_case+0x1a5/0x480
[   15.863948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.864196]  kthread+0x337/0x6f0
[   15.864335]  ret_from_fork+0x116/0x1d0
[   15.867377]  ret_from_fork_asm+0x1a/0x30
[   15.868644] 
[   15.868797] The buggy address belongs to the object at ffff88810216f120
[   15.868797]  which belongs to the cache kmalloc-16 of size 16
[   15.870561] The buggy address is located 8 bytes inside of
[   15.870561]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   15.871899] 
[   15.872001] The buggy address belongs to the physical page:
[   15.872213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   15.872497] flags: 0x200000000000000(node=0|zone=2)
[   15.872692] page_type: f5(slab)
[   15.873914] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.874393] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.874820] page dumped because: kasan: bad access detected
[   15.875691] 
[   15.875827] Memory state around the buggy address:
[   15.876289]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   15.876912]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.877221] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.877667]                                   ^
[   15.877921]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.878322]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.878747] ==================================================================
[   15.902118] ==================================================================
[   15.902526] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.902968] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   15.903341] 
[   15.903521] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.903572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.903586] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.903612] Call Trace:
[   15.903629]  <TASK>
[   15.903647]  dump_stack_lvl+0x73/0xb0
[   15.903681]  print_report+0xd1/0x650
[   15.903707]  ? __virt_addr_valid+0x1db/0x2d0
[   15.903733]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.903763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.903803]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.903834]  kasan_report+0x141/0x180
[   15.903860]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.903894]  kasan_check_range+0x10c/0x1c0
[   15.903927]  __kasan_check_write+0x18/0x20
[   15.903952]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.903981]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.904012]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.904040]  ? trace_hardirqs_on+0x37/0xe0
[   15.904067]  ? kasan_bitops_generic+0x92/0x1c0
[   15.904115]  kasan_bitops_generic+0x116/0x1c0
[   15.904143]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.904173]  ? __pfx_read_tsc+0x10/0x10
[   15.904198]  ? ktime_get_ts64+0x86/0x230
[   15.904225]  kunit_try_run_case+0x1a5/0x480
[   15.904255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.904281]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.904309]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.904336]  ? __kthread_parkme+0x82/0x180
[   15.904360]  ? preempt_count_sub+0x50/0x80
[   15.904388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.904415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.904441]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.904468]  kthread+0x337/0x6f0
[   15.904489]  ? trace_preempt_on+0x20/0xc0
[   15.904514]  ? __pfx_kthread+0x10/0x10
[   15.904538]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.904562]  ? calculate_sigpending+0x7b/0xa0
[   15.904590]  ? __pfx_kthread+0x10/0x10
[   15.904613]  ret_from_fork+0x116/0x1d0
[   15.904635]  ? __pfx_kthread+0x10/0x10
[   15.904659]  ret_from_fork_asm+0x1a/0x30
[   15.904694]  </TASK>
[   15.904708] 
[   15.913619] Allocated by task 279:
[   15.913841]  kasan_save_stack+0x45/0x70
[   15.914066]  kasan_save_track+0x18/0x40
[   15.914281]  kasan_save_alloc_info+0x3b/0x50
[   15.914697]  __kasan_kmalloc+0xb7/0xc0
[   15.914858]  __kmalloc_cache_noprof+0x189/0x420
[   15.915032]  kasan_bitops_generic+0x92/0x1c0
[   15.915197]  kunit_try_run_case+0x1a5/0x480
[   15.915392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.915834]  kthread+0x337/0x6f0
[   15.916193]  ret_from_fork+0x116/0x1d0
[   15.916439]  ret_from_fork_asm+0x1a/0x30
[   15.916678] 
[   15.916823] The buggy address belongs to the object at ffff88810216f120
[   15.916823]  which belongs to the cache kmalloc-16 of size 16
[   15.917464] The buggy address is located 8 bytes inside of
[   15.917464]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   15.918016] 
[   15.918159] The buggy address belongs to the physical page:
[   15.918448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   15.918814] flags: 0x200000000000000(node=0|zone=2)
[   15.919009] page_type: f5(slab)
[   15.919147] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.919403] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.919916] page dumped because: kasan: bad access detected
[   15.920346] 
[   15.920428] Memory state around the buggy address:
[   15.920604]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   15.920863]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.921103] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.921340]                                   ^
[   15.921654]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.922038]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.922620] ==================================================================
[   15.825834] ==================================================================
[   15.826390] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.827035] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   15.827686] 
[   15.827841] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.827900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.827915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.827942] Call Trace:
[   15.827957]  <TASK>
[   15.827979]  dump_stack_lvl+0x73/0xb0
[   15.828020]  print_report+0xd1/0x650
[   15.828048]  ? __virt_addr_valid+0x1db/0x2d0
[   15.828075]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.828105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.828130]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.828160]  kasan_report+0x141/0x180
[   15.828185]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.828392]  kasan_check_range+0x10c/0x1c0
[   15.828430]  __kasan_check_write+0x18/0x20
[   15.828453]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.828483]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.828514]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.828543]  ? trace_hardirqs_on+0x37/0xe0
[   15.828570]  ? kasan_bitops_generic+0x92/0x1c0
[   15.828601]  kasan_bitops_generic+0x116/0x1c0
[   15.828630]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.828659]  ? __pfx_read_tsc+0x10/0x10
[   15.828684]  ? ktime_get_ts64+0x86/0x230
[   15.828714]  kunit_try_run_case+0x1a5/0x480
[   15.828743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.828769]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.828815]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.828842]  ? __kthread_parkme+0x82/0x180
[   15.828867]  ? preempt_count_sub+0x50/0x80
[   15.828898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.828925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.828953]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.828979]  kthread+0x337/0x6f0
[   15.829001]  ? trace_preempt_on+0x20/0xc0
[   15.829026]  ? __pfx_kthread+0x10/0x10
[   15.829050]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.829075]  ? calculate_sigpending+0x7b/0xa0
[   15.829117]  ? __pfx_kthread+0x10/0x10
[   15.829161]  ret_from_fork+0x116/0x1d0
[   15.829184]  ? __pfx_kthread+0x10/0x10
[   15.829208]  ret_from_fork_asm+0x1a/0x30
[   15.829245]  </TASK>
[   15.829261] 
[   15.839254] Allocated by task 279:
[   15.839424]  kasan_save_stack+0x45/0x70
[   15.839594]  kasan_save_track+0x18/0x40
[   15.839748]  kasan_save_alloc_info+0x3b/0x50
[   15.840005]  __kasan_kmalloc+0xb7/0xc0
[   15.840421]  __kmalloc_cache_noprof+0x189/0x420
[   15.840692]  kasan_bitops_generic+0x92/0x1c0
[   15.840958]  kunit_try_run_case+0x1a5/0x480
[   15.841165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.841374]  kthread+0x337/0x6f0
[   15.841515]  ret_from_fork+0x116/0x1d0
[   15.841691]  ret_from_fork_asm+0x1a/0x30
[   15.841988] 
[   15.842113] The buggy address belongs to the object at ffff88810216f120
[   15.842113]  which belongs to the cache kmalloc-16 of size 16
[   15.842726] The buggy address is located 8 bytes inside of
[   15.842726]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   15.843629] 
[   15.843751] The buggy address belongs to the physical page:
[   15.844027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   15.844429] flags: 0x200000000000000(node=0|zone=2)
[   15.844628] page_type: f5(slab)
[   15.844772] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.845250] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.845657] page dumped because: kasan: bad access detected
[   15.845970] 
[   15.846097] Memory state around the buggy address:
[   15.846482]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   15.846890]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.847146] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.847537]                                   ^
[   15.847771]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.848177]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.848503] ==================================================================
[   15.972154] ==================================================================
[   15.972744] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.973133] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   15.973683] 
[   15.973808] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.973863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.973878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.973905] Call Trace:
[   15.973926]  <TASK>
[   15.973948]  dump_stack_lvl+0x73/0xb0
[   15.973983]  print_report+0xd1/0x650
[   15.974233]  ? __virt_addr_valid+0x1db/0x2d0
[   15.974267]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.974297]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.974323]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.974353]  kasan_report+0x141/0x180
[   15.974379]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.974414]  kasan_check_range+0x10c/0x1c0
[   15.974442]  __kasan_check_write+0x18/0x20
[   15.974465]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.974494]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.974525]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.974554]  ? trace_hardirqs_on+0x37/0xe0
[   15.974581]  ? kasan_bitops_generic+0x92/0x1c0
[   15.974613]  kasan_bitops_generic+0x116/0x1c0
[   15.974639]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.974668]  ? __pfx_read_tsc+0x10/0x10
[   15.974693]  ? ktime_get_ts64+0x86/0x230
[   15.974721]  kunit_try_run_case+0x1a5/0x480
[   15.974750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.974776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.974817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.974843]  ? __kthread_parkme+0x82/0x180
[   15.974868]  ? preempt_count_sub+0x50/0x80
[   15.974895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.974921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.974947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.974973]  kthread+0x337/0x6f0
[   15.974997]  ? trace_preempt_on+0x20/0xc0
[   15.975021]  ? __pfx_kthread+0x10/0x10
[   15.975045]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.975070]  ? calculate_sigpending+0x7b/0xa0
[   15.975112]  ? __pfx_kthread+0x10/0x10
[   15.975137]  ret_from_fork+0x116/0x1d0
[   15.975158]  ? __pfx_kthread+0x10/0x10
[   15.975182]  ret_from_fork_asm+0x1a/0x30
[   15.975218]  </TASK>
[   15.975234] 
[   15.986569] Allocated by task 279:
[   15.986767]  kasan_save_stack+0x45/0x70
[   15.987139]  kasan_save_track+0x18/0x40
[   15.987359]  kasan_save_alloc_info+0x3b/0x50
[   15.987727]  __kasan_kmalloc+0xb7/0xc0
[   15.988047]  __kmalloc_cache_noprof+0x189/0x420
[   15.988378]  kasan_bitops_generic+0x92/0x1c0
[   15.988633]  kunit_try_run_case+0x1a5/0x480
[   15.988864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.989118]  kthread+0x337/0x6f0
[   15.989545]  ret_from_fork+0x116/0x1d0
[   15.989757]  ret_from_fork_asm+0x1a/0x30
[   15.990101] 
[   15.990286] The buggy address belongs to the object at ffff88810216f120
[   15.990286]  which belongs to the cache kmalloc-16 of size 16
[   15.990955] The buggy address is located 8 bytes inside of
[   15.990955]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   15.991746] 
[   15.991883] The buggy address belongs to the physical page:
[   15.992138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   15.992519] flags: 0x200000000000000(node=0|zone=2)
[   15.992776] page_type: f5(slab)
[   15.992983] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.993742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.994211] page dumped because: kasan: bad access detected
[   15.994444] 
[   15.994726] Memory state around the buggy address:
[   15.994965]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   15.995634]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.996059] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.996517]                                   ^
[   15.996708]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.997305]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.997673] ==================================================================
[   15.923885] ==================================================================
[   15.924622] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.925085] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   15.925447] 
[   15.925582] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.925635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.925650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.925676] Call Trace:
[   15.925696]  <TASK>
[   15.925715]  dump_stack_lvl+0x73/0xb0
[   15.925750]  print_report+0xd1/0x650
[   15.925776]  ? __virt_addr_valid+0x1db/0x2d0
[   15.925816]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.925846]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.925872]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.925903]  kasan_report+0x141/0x180
[   15.925929]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.925964]  kasan_check_range+0x10c/0x1c0
[   15.925992]  __kasan_check_write+0x18/0x20
[   15.926015]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.926069]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.926102]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.926132]  ? trace_hardirqs_on+0x37/0xe0
[   15.926158]  ? kasan_bitops_generic+0x92/0x1c0
[   15.926189]  kasan_bitops_generic+0x116/0x1c0
[   15.926217]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.926246]  ? __pfx_read_tsc+0x10/0x10
[   15.926271]  ? ktime_get_ts64+0x86/0x230
[   15.926299]  kunit_try_run_case+0x1a5/0x480
[   15.926326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.926352]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.926381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.926408]  ? __kthread_parkme+0x82/0x180
[   15.926431]  ? preempt_count_sub+0x50/0x80
[   15.926459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.926486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.926513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.926540]  kthread+0x337/0x6f0
[   15.926564]  ? trace_preempt_on+0x20/0xc0
[   15.926590]  ? __pfx_kthread+0x10/0x10
[   15.926614]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.926638]  ? calculate_sigpending+0x7b/0xa0
[   15.926667]  ? __pfx_kthread+0x10/0x10
[   15.926693]  ret_from_fork+0x116/0x1d0
[   15.926714]  ? __pfx_kthread+0x10/0x10
[   15.926739]  ret_from_fork_asm+0x1a/0x30
[   15.926774]  </TASK>
[   15.926797] 
[   15.936033] Allocated by task 279:
[   15.936270]  kasan_save_stack+0x45/0x70
[   15.936521]  kasan_save_track+0x18/0x40
[   15.936741]  kasan_save_alloc_info+0x3b/0x50
[   15.936944]  __kasan_kmalloc+0xb7/0xc0
[   15.937120]  __kmalloc_cache_noprof+0x189/0x420
[   15.937400]  kasan_bitops_generic+0x92/0x1c0
[   15.937642]  kunit_try_run_case+0x1a5/0x480
[   15.937900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.938205]  kthread+0x337/0x6f0
[   15.938364]  ret_from_fork+0x116/0x1d0
[   15.938517]  ret_from_fork_asm+0x1a/0x30
[   15.938729] 
[   15.938852] The buggy address belongs to the object at ffff88810216f120
[   15.938852]  which belongs to the cache kmalloc-16 of size 16
[   15.939405] The buggy address is located 8 bytes inside of
[   15.939405]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   15.940149] 
[   15.940263] The buggy address belongs to the physical page:
[   15.940548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   15.940832] flags: 0x200000000000000(node=0|zone=2)
[   15.941097] page_type: f5(slab)
[   15.941359] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.941708] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.941977] page dumped because: kasan: bad access detected
[   15.942173] 
[   15.942252] Memory state around the buggy address:
[   15.942497]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   15.942881]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.943441] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.943847]                                   ^
[   15.944101]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.944461]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.944783] ==================================================================
[   15.945408] ==================================================================
[   15.946293] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.946700] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   15.946979] 
[   15.947085] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.947137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.947152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.947178] Call Trace:
[   15.947198]  <TASK>
[   15.947217]  dump_stack_lvl+0x73/0xb0
[   15.947251]  print_report+0xd1/0x650
[   15.947278]  ? __virt_addr_valid+0x1db/0x2d0
[   15.947335]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.947365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.947392]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.947422]  kasan_report+0x141/0x180
[   15.947447]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.947483]  kasan_check_range+0x10c/0x1c0
[   15.947510]  __kasan_check_write+0x18/0x20
[   15.947532]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.947562]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.947592]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.947638]  ? trace_hardirqs_on+0x37/0xe0
[   15.947664]  ? kasan_bitops_generic+0x92/0x1c0
[   15.947696]  kasan_bitops_generic+0x116/0x1c0
[   15.947723]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.947751]  ? __pfx_read_tsc+0x10/0x10
[   15.947775]  ? ktime_get_ts64+0x86/0x230
[   15.947815]  kunit_try_run_case+0x1a5/0x480
[   15.947842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.947867]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.947896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.947923]  ? __kthread_parkme+0x82/0x180
[   15.947947]  ? preempt_count_sub+0x50/0x80
[   15.947974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.948001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.948027]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.948052]  kthread+0x337/0x6f0
[   15.948074]  ? trace_preempt_on+0x20/0xc0
[   15.948099]  ? __pfx_kthread+0x10/0x10
[   15.948123]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.948146]  ? calculate_sigpending+0x7b/0xa0
[   15.948174]  ? __pfx_kthread+0x10/0x10
[   15.948197]  ret_from_fork+0x116/0x1d0
[   15.948219]  ? __pfx_kthread+0x10/0x10
[   15.948242]  ret_from_fork_asm+0x1a/0x30
[   15.948278]  </TASK>
[   15.948291] 
[   15.960925] Allocated by task 279:
[   15.961151]  kasan_save_stack+0x45/0x70
[   15.961387]  kasan_save_track+0x18/0x40
[   15.961546]  kasan_save_alloc_info+0x3b/0x50
[   15.961810]  __kasan_kmalloc+0xb7/0xc0
[   15.962055]  __kmalloc_cache_noprof+0x189/0x420
[   15.962306]  kasan_bitops_generic+0x92/0x1c0
[   15.962563]  kunit_try_run_case+0x1a5/0x480
[   15.962818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.963068]  kthread+0x337/0x6f0
[   15.963381]  ret_from_fork+0x116/0x1d0
[   15.963594]  ret_from_fork_asm+0x1a/0x30
[   15.963809] 
[   15.963893] The buggy address belongs to the object at ffff88810216f120
[   15.963893]  which belongs to the cache kmalloc-16 of size 16
[   15.964407] The buggy address is located 8 bytes inside of
[   15.964407]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   15.965104] 
[   15.965190] The buggy address belongs to the physical page:
[   15.965399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   15.966027] flags: 0x200000000000000(node=0|zone=2)
[   15.966653] page_type: f5(slab)
[   15.966842] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.967111] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.967594] page dumped because: kasan: bad access detected
[   15.968290] 
[   15.968414] Memory state around the buggy address:
[   15.968651]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   15.969024]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.969647] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.970117]                                   ^
[   15.970332]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.970686]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.971039] ==================================================================
[   15.998705] ==================================================================
[   15.999088] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.000124] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   16.000402] 
[   16.000523] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.000579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.000595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.000621] Call Trace:
[   16.000643]  <TASK>
[   16.000664]  dump_stack_lvl+0x73/0xb0
[   16.000701]  print_report+0xd1/0x650
[   16.000728]  ? __virt_addr_valid+0x1db/0x2d0
[   16.000755]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.000799]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.000827]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.000857]  kasan_report+0x141/0x180
[   16.000883]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.000918]  kasan_check_range+0x10c/0x1c0
[   16.000946]  __kasan_check_write+0x18/0x20
[   16.000968]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.000997]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.001028]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.001057]  ? trace_hardirqs_on+0x37/0xe0
[   16.001082]  ? kasan_bitops_generic+0x92/0x1c0
[   16.001115]  kasan_bitops_generic+0x116/0x1c0
[   16.001142]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.001172]  ? __pfx_read_tsc+0x10/0x10
[   16.001197]  ? ktime_get_ts64+0x86/0x230
[   16.001225]  kunit_try_run_case+0x1a5/0x480
[   16.001252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.001277]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.001305]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.001339]  ? __kthread_parkme+0x82/0x180
[   16.001363]  ? preempt_count_sub+0x50/0x80
[   16.001391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.001478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.001506]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.001547]  kthread+0x337/0x6f0
[   16.001570]  ? trace_preempt_on+0x20/0xc0
[   16.001595]  ? __pfx_kthread+0x10/0x10
[   16.001619]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.001645]  ? calculate_sigpending+0x7b/0xa0
[   16.001672]  ? __pfx_kthread+0x10/0x10
[   16.001697]  ret_from_fork+0x116/0x1d0
[   16.001719]  ? __pfx_kthread+0x10/0x10
[   16.001744]  ret_from_fork_asm+0x1a/0x30
[   16.001806]  </TASK>
[   16.001820] 
[   16.016180] Allocated by task 279:
[   16.016435]  kasan_save_stack+0x45/0x70
[   16.016694]  kasan_save_track+0x18/0x40
[   16.016869]  kasan_save_alloc_info+0x3b/0x50
[   16.017126]  __kasan_kmalloc+0xb7/0xc0
[   16.017411]  __kmalloc_cache_noprof+0x189/0x420
[   16.017762]  kasan_bitops_generic+0x92/0x1c0
[   16.018076]  kunit_try_run_case+0x1a5/0x480
[   16.018367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.018615]  kthread+0x337/0x6f0
[   16.018878]  ret_from_fork+0x116/0x1d0
[   16.019157]  ret_from_fork_asm+0x1a/0x30
[   16.019455] 
[   16.019546] The buggy address belongs to the object at ffff88810216f120
[   16.019546]  which belongs to the cache kmalloc-16 of size 16
[   16.020124] The buggy address is located 8 bytes inside of
[   16.020124]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   16.020886] 
[   16.020977] The buggy address belongs to the physical page:
[   16.021233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   16.021760] flags: 0x200000000000000(node=0|zone=2)
[   16.022054] page_type: f5(slab)
[   16.022266] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.022759] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.023117] page dumped because: kasan: bad access detected
[   16.023482] 
[   16.023612] Memory state around the buggy address:
[   16.023862]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   16.024291]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.024668] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.025054]                                   ^
[   16.025347]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.025688]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.026078] ==================================================================
[   15.880424] ==================================================================
[   15.881115] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.881754] Write of size 8 at addr ffff88810216f128 by task kunit_try_catch/279
[   15.882094] 
[   15.882238] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.882292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.882307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.882333] Call Trace:
[   15.882350]  <TASK>
[   15.882371]  dump_stack_lvl+0x73/0xb0
[   15.882406]  print_report+0xd1/0x650
[   15.882434]  ? __virt_addr_valid+0x1db/0x2d0
[   15.882459]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.882489]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.882515]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.882546]  kasan_report+0x141/0x180
[   15.882573]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.882608]  kasan_check_range+0x10c/0x1c0
[   15.882635]  __kasan_check_write+0x18/0x20
[   15.882657]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.882686]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.882715]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.882744]  ? trace_hardirqs_on+0x37/0xe0
[   15.882770]  ? kasan_bitops_generic+0x92/0x1c0
[   15.882814]  kasan_bitops_generic+0x116/0x1c0
[   15.882841]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.882870]  ? __pfx_read_tsc+0x10/0x10
[   15.882895]  ? ktime_get_ts64+0x86/0x230
[   15.882923]  kunit_try_run_case+0x1a5/0x480
[   15.882951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.882977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.883004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.883031]  ? __kthread_parkme+0x82/0x180
[   15.883055]  ? preempt_count_sub+0x50/0x80
[   15.883082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.883126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.883152]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.883178]  kthread+0x337/0x6f0
[   15.883201]  ? trace_preempt_on+0x20/0xc0
[   15.883226]  ? __pfx_kthread+0x10/0x10
[   15.883250]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.883274]  ? calculate_sigpending+0x7b/0xa0
[   15.883302]  ? __pfx_kthread+0x10/0x10
[   15.883327]  ret_from_fork+0x116/0x1d0
[   15.883349]  ? __pfx_kthread+0x10/0x10
[   15.883372]  ret_from_fork_asm+0x1a/0x30
[   15.883408]  </TASK>
[   15.883422] 
[   15.892472] Allocated by task 279:
[   15.892679]  kasan_save_stack+0x45/0x70
[   15.892918]  kasan_save_track+0x18/0x40
[   15.893075]  kasan_save_alloc_info+0x3b/0x50
[   15.893338]  __kasan_kmalloc+0xb7/0xc0
[   15.893556]  __kmalloc_cache_noprof+0x189/0x420
[   15.893781]  kasan_bitops_generic+0x92/0x1c0
[   15.894021]  kunit_try_run_case+0x1a5/0x480
[   15.894347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.894566]  kthread+0x337/0x6f0
[   15.894711]  ret_from_fork+0x116/0x1d0
[   15.894941]  ret_from_fork_asm+0x1a/0x30
[   15.895166] 
[   15.895286] The buggy address belongs to the object at ffff88810216f120
[   15.895286]  which belongs to the cache kmalloc-16 of size 16
[   15.895853] The buggy address is located 8 bytes inside of
[   15.895853]  allocated 9-byte region [ffff88810216f120, ffff88810216f129)
[   15.896402] 
[   15.896608] The buggy address belongs to the physical page:
[   15.896874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10216f
[   15.897346] flags: 0x200000000000000(node=0|zone=2)
[   15.897545] page_type: f5(slab)
[   15.897685] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.898042] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.898434] page dumped because: kasan: bad access detected
[   15.898833] 
[   15.898931] Memory state around the buggy address:
[   15.899116]  ffff88810216f000: fa fb fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   15.899481]  ffff88810216f080: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.899977] >ffff88810216f100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.900351]                                   ^
[   15.900563]  ffff88810216f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.900899]  ffff88810216f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.901208] ==================================================================