Hay
Date
July 12, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   22.355347] ==================================================================
[   22.355543] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   22.355711] Write of size 8 at addr fff00000c3f4d8a8 by task kunit_try_catch/262
[   22.355859] 
[   22.355939] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.356210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.356304] Hardware name: linux,dummy-virt (DT)
[   22.356408] Call trace:
[   22.356480]  show_stack+0x20/0x38 (C)
[   22.356619]  dump_stack_lvl+0x8c/0xd0
[   22.356751]  print_report+0x118/0x608
[   22.356969]  kasan_report+0xdc/0x128
[   22.357316]  kasan_check_range+0x100/0x1a8
[   22.357450]  __kasan_check_write+0x20/0x30
[   22.357564]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   22.358609]  kasan_save_track+0x20/0x40
[   22.359599] 
[   22.359791] The buggy address is located 8 bytes inside of
[   22.359791]  allocated 9-byte region [fff00000c3f4d8a0, fff00000c3f4d8a9)
[   22.360120] The buggy address belongs to the physical page:
[   22.360959] page dumped because: kasan: bad access detected
[   22.361043] 
[   22.361115] Memory state around the buggy address:
[   22.361238]  fff00000c3f4d780: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   22.361361]  fff00000c3f4d800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.361479] >fff00000c3f4d880: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.361603]                                   ^
[   22.362918] ==================================================================
[   22.376711] ==================================================================
[   22.376834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   22.377766] Read of size 8 at addr fff00000c3f4d8a8 by task kunit_try_catch/262
[   22.377928] 
[   22.378003] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.378367] Call trace:
[   22.382618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.387223] ==================================================================

[   14.744060] ==================================================================
[   14.744356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.744763] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.745046] 
[   14.745152] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.745193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.745205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.745225] Call Trace:
[   14.745239]  <TASK>
[   14.745254]  dump_stack_lvl+0x73/0xb0
[   14.745281]  print_report+0xd1/0x650
[   14.745302]  ? __virt_addr_valid+0x1db/0x2d0
[   14.745325]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.745351]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.745375]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.745402]  kasan_report+0x141/0x180
[   14.745424]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.745457]  kasan_check_range+0x10c/0x1c0
[   14.745482]  __kasan_check_write+0x18/0x20
[   14.745502]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.745529]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.745558]  ? kasan_save_alloc_info+0x3b/0x50
[   14.745582]  ? kasan_save_stack+0x45/0x70
[   14.745606]  kasan_bitops_generic+0x116/0x1c0
[   14.745630]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.745671]  ? __pfx_read_tsc+0x10/0x10
[   14.745692]  ? ktime_get_ts64+0x86/0x230
[   14.745715]  kunit_try_run_case+0x1a5/0x480
[   14.745739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.745774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.745798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.745822]  ? __kthread_parkme+0x82/0x180
[   14.745842]  ? preempt_count_sub+0x50/0x80
[   14.745866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.745891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.745916]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.745942]  kthread+0x337/0x6f0
[   14.745961]  ? trace_preempt_on+0x20/0xc0
[   14.745985]  ? __pfx_kthread+0x10/0x10
[   14.746008]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.746029]  ? calculate_sigpending+0x7b/0xa0
[   14.746053]  ? __pfx_kthread+0x10/0x10
[   14.746074]  ret_from_fork+0x116/0x1d0
[   14.746094]  ? __pfx_kthread+0x10/0x10
[   14.746115]  ret_from_fork_asm+0x1a/0x30
[   14.746145]  </TASK>
[   14.746154] 
[   14.754078] Allocated by task 279:
[   14.754247]  kasan_save_stack+0x45/0x70
[   14.754455]  kasan_save_track+0x18/0x40
[   14.754619]  kasan_save_alloc_info+0x3b/0x50
[   14.754877]  __kasan_kmalloc+0xb7/0xc0
[   14.755063]  __kmalloc_cache_noprof+0x189/0x420
[   14.755260]  kasan_bitops_generic+0x92/0x1c0
[   14.755446]  kunit_try_run_case+0x1a5/0x480
[   14.755591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.755872]  kthread+0x337/0x6f0
[   14.756104]  ret_from_fork+0x116/0x1d0
[   14.756608]  ret_from_fork_asm+0x1a/0x30
[   14.756812] 
[   14.756885] The buggy address belongs to the object at ffff888102894300
[   14.756885]  which belongs to the cache kmalloc-16 of size 16
[   14.757235] The buggy address is located 8 bytes inside of
[   14.757235]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.757581] 
[   14.757650] The buggy address belongs to the physical page:
[   14.757905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.758645] flags: 0x200000000000000(node=0|zone=2)
[   14.759048] page_type: f5(slab)
[   14.759170] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.759398] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.759620] page dumped because: kasan: bad access detected
[   14.759800] 
[   14.759868] Memory state around the buggy address:
[   14.760022]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.760594]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.761330] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.761651]                       ^
[   14.762167]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.762518]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.762859] ==================================================================
[   14.763341] ==================================================================
[   14.763836] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.764097] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.764428] 
[   14.764536] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.764576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.764587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.764607] Call Trace:
[   14.764621]  <TASK>
[   14.764634]  dump_stack_lvl+0x73/0xb0
[   14.764680]  print_report+0xd1/0x650
[   14.764703]  ? __virt_addr_valid+0x1db/0x2d0
[   14.764726]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.764764]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.764788]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.764814]  kasan_report+0x141/0x180
[   14.764836]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.764867]  kasan_check_range+0x10c/0x1c0
[   14.764891]  __kasan_check_write+0x18/0x20
[   14.764911]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.764937]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.764966]  ? kasan_save_alloc_info+0x3b/0x50
[   14.764990]  ? kasan_save_stack+0x45/0x70
[   14.765014]  kasan_bitops_generic+0x116/0x1c0
[   14.765039]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.765064]  ? __pfx_read_tsc+0x10/0x10
[   14.765086]  ? ktime_get_ts64+0x86/0x230
[   14.765113]  kunit_try_run_case+0x1a5/0x480
[   14.765140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.765163]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.765188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.765213]  ? __kthread_parkme+0x82/0x180
[   14.765235]  ? preempt_count_sub+0x50/0x80
[   14.765259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.765283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.765308]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.765333]  kthread+0x337/0x6f0
[   14.765353]  ? trace_preempt_on+0x20/0xc0
[   14.765378]  ? __pfx_kthread+0x10/0x10
[   14.765398]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.765420]  ? calculate_sigpending+0x7b/0xa0
[   14.765444]  ? __pfx_kthread+0x10/0x10
[   14.765466]  ret_from_fork+0x116/0x1d0
[   14.765485]  ? __pfx_kthread+0x10/0x10
[   14.765506]  ret_from_fork_asm+0x1a/0x30
[   14.765536]  </TASK>
[   14.765546] 
[   14.773498] Allocated by task 279:
[   14.773710]  kasan_save_stack+0x45/0x70
[   14.773933]  kasan_save_track+0x18/0x40
[   14.774075]  kasan_save_alloc_info+0x3b/0x50
[   14.774288]  __kasan_kmalloc+0xb7/0xc0
[   14.774442]  __kmalloc_cache_noprof+0x189/0x420
[   14.774600]  kasan_bitops_generic+0x92/0x1c0
[   14.775073]  kunit_try_run_case+0x1a5/0x480
[   14.775298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.775510]  kthread+0x337/0x6f0
[   14.775630]  ret_from_fork+0x116/0x1d0
[   14.775885]  ret_from_fork_asm+0x1a/0x30
[   14.776090] 
[   14.776186] The buggy address belongs to the object at ffff888102894300
[   14.776186]  which belongs to the cache kmalloc-16 of size 16
[   14.776941] The buggy address is located 8 bytes inside of
[   14.776941]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.777317] 
[   14.777389] The buggy address belongs to the physical page:
[   14.777589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.778351] flags: 0x200000000000000(node=0|zone=2)
[   14.778523] page_type: f5(slab)
[   14.778641] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.778968] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.779317] page dumped because: kasan: bad access detected
[   14.779574] 
[   14.779718] Memory state around the buggy address:
[   14.779966]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.780302]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.780609] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.780923]                       ^
[   14.781048]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.781261]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.781469] ==================================================================
[   14.724656] ==================================================================
[   14.725477] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.725881] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.726177] 
[   14.726327] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.726377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.726388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.726407] Call Trace:
[   14.726423]  <TASK>
[   14.726436]  dump_stack_lvl+0x73/0xb0
[   14.726465]  print_report+0xd1/0x650
[   14.726487]  ? __virt_addr_valid+0x1db/0x2d0
[   14.726510]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.726537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.726561]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.726588]  kasan_report+0x141/0x180
[   14.726610]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.726641]  kasan_check_range+0x10c/0x1c0
[   14.726717]  __kasan_check_write+0x18/0x20
[   14.726737]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.726774]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.726805]  ? kasan_save_alloc_info+0x3b/0x50
[   14.726829]  ? kasan_save_stack+0x45/0x70
[   14.726853]  kasan_bitops_generic+0x116/0x1c0
[   14.726877]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.726902]  ? __pfx_read_tsc+0x10/0x10
[   14.726923]  ? ktime_get_ts64+0x86/0x230
[   14.726948]  kunit_try_run_case+0x1a5/0x480
[   14.726973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.726997]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.727021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.727046]  ? __kthread_parkme+0x82/0x180
[   14.727067]  ? preempt_count_sub+0x50/0x80
[   14.727091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.727116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.727141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.727166]  kthread+0x337/0x6f0
[   14.727186]  ? trace_preempt_on+0x20/0xc0
[   14.727210]  ? __pfx_kthread+0x10/0x10
[   14.727230]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.727253]  ? calculate_sigpending+0x7b/0xa0
[   14.727276]  ? __pfx_kthread+0x10/0x10
[   14.727297]  ret_from_fork+0x116/0x1d0
[   14.727316]  ? __pfx_kthread+0x10/0x10
[   14.727336]  ret_from_fork_asm+0x1a/0x30
[   14.727366]  </TASK>
[   14.727375] 
[   14.735458] Allocated by task 279:
[   14.735756]  kasan_save_stack+0x45/0x70
[   14.735974]  kasan_save_track+0x18/0x40
[   14.736169]  kasan_save_alloc_info+0x3b/0x50
[   14.736391]  __kasan_kmalloc+0xb7/0xc0
[   14.736587]  __kmalloc_cache_noprof+0x189/0x420
[   14.737004]  kasan_bitops_generic+0x92/0x1c0
[   14.737212]  kunit_try_run_case+0x1a5/0x480
[   14.737389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.737630]  kthread+0x337/0x6f0
[   14.737868]  ret_from_fork+0x116/0x1d0
[   14.738033]  ret_from_fork_asm+0x1a/0x30
[   14.738201] 
[   14.738304] The buggy address belongs to the object at ffff888102894300
[   14.738304]  which belongs to the cache kmalloc-16 of size 16
[   14.738685] The buggy address is located 8 bytes inside of
[   14.738685]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.739041] 
[   14.739131] The buggy address belongs to the physical page:
[   14.739789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.740156] flags: 0x200000000000000(node=0|zone=2)
[   14.740625] page_type: f5(slab)
[   14.740773] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.741004] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.741307] page dumped because: kasan: bad access detected
[   14.741560] 
[   14.741651] Memory state around the buggy address:
[   14.741935]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.742246]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.742512] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.742842]                       ^
[   14.742981]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.743304]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.743595] ==================================================================
[   14.829043] ==================================================================
[   14.829613] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.830278] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.831151] 
[   14.831441] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.831490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.831501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.831523] Call Trace:
[   14.831536]  <TASK>
[   14.831552]  dump_stack_lvl+0x73/0xb0
[   14.831583]  print_report+0xd1/0x650
[   14.831606]  ? __virt_addr_valid+0x1db/0x2d0
[   14.831629]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.831689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.831713]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.831741]  kasan_report+0x141/0x180
[   14.831776]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.831807]  kasan_check_range+0x10c/0x1c0
[   14.831831]  __kasan_check_write+0x18/0x20
[   14.831850]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.831877]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.831906]  ? kasan_save_alloc_info+0x3b/0x50
[   14.831930]  ? kasan_save_stack+0x45/0x70
[   14.831954]  kasan_bitops_generic+0x116/0x1c0
[   14.831978]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.832004]  ? __pfx_read_tsc+0x10/0x10
[   14.832024]  ? ktime_get_ts64+0x86/0x230
[   14.832048]  kunit_try_run_case+0x1a5/0x480
[   14.832072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.832096]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.832120]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.832144]  ? __kthread_parkme+0x82/0x180
[   14.832164]  ? preempt_count_sub+0x50/0x80
[   14.832188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.832213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.832238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.832263]  kthread+0x337/0x6f0
[   14.832282]  ? trace_preempt_on+0x20/0xc0
[   14.832305]  ? __pfx_kthread+0x10/0x10
[   14.832326]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.832347]  ? calculate_sigpending+0x7b/0xa0
[   14.832371]  ? __pfx_kthread+0x10/0x10
[   14.832393]  ret_from_fork+0x116/0x1d0
[   14.832411]  ? __pfx_kthread+0x10/0x10
[   14.832431]  ret_from_fork_asm+0x1a/0x30
[   14.832461]  </TASK>
[   14.832471] 
[   14.844709] Allocated by task 279:
[   14.844899]  kasan_save_stack+0x45/0x70
[   14.845188]  kasan_save_track+0x18/0x40
[   14.845463]  kasan_save_alloc_info+0x3b/0x50
[   14.845940]  __kasan_kmalloc+0xb7/0xc0
[   14.846131]  __kmalloc_cache_noprof+0x189/0x420
[   14.846429]  kasan_bitops_generic+0x92/0x1c0
[   14.846841]  kunit_try_run_case+0x1a5/0x480
[   14.847180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.847533]  kthread+0x337/0x6f0
[   14.848060]  ret_from_fork+0x116/0x1d0
[   14.848205]  ret_from_fork_asm+0x1a/0x30
[   14.848414] 
[   14.848511] The buggy address belongs to the object at ffff888102894300
[   14.848511]  which belongs to the cache kmalloc-16 of size 16
[   14.849475] The buggy address is located 8 bytes inside of
[   14.849475]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.850443] 
[   14.850656] The buggy address belongs to the physical page:
[   14.851124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.851579] flags: 0x200000000000000(node=0|zone=2)
[   14.851915] page_type: f5(slab)
[   14.852093] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.852377] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.852999] page dumped because: kasan: bad access detected
[   14.853223] 
[   14.853494] Memory state around the buggy address:
[   14.853902]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.854390]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.855051] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.855343]                       ^
[   14.855764]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.856063]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.856489] ==================================================================
[   14.702176] ==================================================================
[   14.702910] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.703278] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.703507] 
[   14.703593] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.703637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.703692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.703713] Call Trace:
[   14.703725]  <TASK>
[   14.703741]  dump_stack_lvl+0x73/0xb0
[   14.703787]  print_report+0xd1/0x650
[   14.703810]  ? __virt_addr_valid+0x1db/0x2d0
[   14.703835]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.703862]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.703896]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.703924]  kasan_report+0x141/0x180
[   14.703946]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.703978]  kasan_check_range+0x10c/0x1c0
[   14.704002]  __kasan_check_write+0x18/0x20
[   14.704021]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.704049]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.704079]  ? kasan_save_alloc_info+0x3b/0x50
[   14.704103]  ? kasan_save_stack+0x45/0x70
[   14.704127]  kasan_bitops_generic+0x116/0x1c0
[   14.704151]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.704176]  ? __pfx_read_tsc+0x10/0x10
[   14.704199]  ? ktime_get_ts64+0x86/0x230
[   14.704225]  kunit_try_run_case+0x1a5/0x480
[   14.704251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.704274]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.704299]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.704324]  ? __kthread_parkme+0x82/0x180
[   14.704346]  ? preempt_count_sub+0x50/0x80
[   14.704372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.704397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.704421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.704447]  kthread+0x337/0x6f0
[   14.704467]  ? trace_preempt_on+0x20/0xc0
[   14.704492]  ? __pfx_kthread+0x10/0x10
[   14.704512]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.704534]  ? calculate_sigpending+0x7b/0xa0
[   14.704559]  ? __pfx_kthread+0x10/0x10
[   14.704581]  ret_from_fork+0x116/0x1d0
[   14.704599]  ? __pfx_kthread+0x10/0x10
[   14.704620]  ret_from_fork_asm+0x1a/0x30
[   14.704671]  </TASK>
[   14.704683] 
[   14.716060] Allocated by task 279:
[   14.716242]  kasan_save_stack+0x45/0x70
[   14.716443]  kasan_save_track+0x18/0x40
[   14.716641]  kasan_save_alloc_info+0x3b/0x50
[   14.716905]  __kasan_kmalloc+0xb7/0xc0
[   14.717186]  __kmalloc_cache_noprof+0x189/0x420
[   14.717352]  kasan_bitops_generic+0x92/0x1c0
[   14.717502]  kunit_try_run_case+0x1a5/0x480
[   14.717831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.718102]  kthread+0x337/0x6f0
[   14.718275]  ret_from_fork+0x116/0x1d0
[   14.718456]  ret_from_fork_asm+0x1a/0x30
[   14.718647] 
[   14.718717] The buggy address belongs to the object at ffff888102894300
[   14.718717]  which belongs to the cache kmalloc-16 of size 16
[   14.719338] The buggy address is located 8 bytes inside of
[   14.719338]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.720201] 
[   14.720306] The buggy address belongs to the physical page:
[   14.720567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.720991] flags: 0x200000000000000(node=0|zone=2)
[   14.721162] page_type: f5(slab)
[   14.721283] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.721611] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.721955] page dumped because: kasan: bad access detected
[   14.722304] 
[   14.722381] Memory state around the buggy address:
[   14.722543]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.722946]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.723268] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.723547]                       ^
[   14.723705]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.724017]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.724228] ==================================================================
[   14.670871] ==================================================================
[   14.671906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.672175] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.672399] 
[   14.672491] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.672535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.672546] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.672568] Call Trace:
[   14.672581]  <TASK>
[   14.672598]  dump_stack_lvl+0x73/0xb0
[   14.672627]  print_report+0xd1/0x650
[   14.672936]  ? __virt_addr_valid+0x1db/0x2d0
[   14.672967]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.672995]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.673020]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.673048]  kasan_report+0x141/0x180
[   14.673246]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.673283]  kasan_check_range+0x10c/0x1c0
[   14.673308]  __kasan_check_write+0x18/0x20
[   14.673331]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.673359]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.673390]  ? kasan_save_alloc_info+0x3b/0x50
[   14.673414]  ? kasan_save_stack+0x45/0x70
[   14.673439]  kasan_bitops_generic+0x116/0x1c0
[   14.673463]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.673489]  ? __pfx_read_tsc+0x10/0x10
[   14.673510]  ? ktime_get_ts64+0x86/0x230
[   14.673534]  kunit_try_run_case+0x1a5/0x480
[   14.673559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.673582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.673606]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.673631]  ? __kthread_parkme+0x82/0x180
[   14.673670]  ? preempt_count_sub+0x50/0x80
[   14.673704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.673743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.673779]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.673804]  kthread+0x337/0x6f0
[   14.673823]  ? trace_preempt_on+0x20/0xc0
[   14.673849]  ? __pfx_kthread+0x10/0x10
[   14.673870]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.673893]  ? calculate_sigpending+0x7b/0xa0
[   14.673918]  ? __pfx_kthread+0x10/0x10
[   14.673939]  ret_from_fork+0x116/0x1d0
[   14.673957]  ? __pfx_kthread+0x10/0x10
[   14.673978]  ret_from_fork_asm+0x1a/0x30
[   14.674008]  </TASK>
[   14.674020] 
[   14.688975] Allocated by task 279:
[   14.689310]  kasan_save_stack+0x45/0x70
[   14.689600]  kasan_save_track+0x18/0x40
[   14.689954]  kasan_save_alloc_info+0x3b/0x50
[   14.690410]  __kasan_kmalloc+0xb7/0xc0
[   14.690671]  __kmalloc_cache_noprof+0x189/0x420
[   14.691110]  kasan_bitops_generic+0x92/0x1c0
[   14.691261]  kunit_try_run_case+0x1a5/0x480
[   14.691455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.691741]  kthread+0x337/0x6f0
[   14.692130]  ret_from_fork+0x116/0x1d0
[   14.692559]  ret_from_fork_asm+0x1a/0x30
[   14.692959] 
[   14.693128] The buggy address belongs to the object at ffff888102894300
[   14.693128]  which belongs to the cache kmalloc-16 of size 16
[   14.693493] The buggy address is located 8 bytes inside of
[   14.693493]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.694135] 
[   14.694209] The buggy address belongs to the physical page:
[   14.694389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.694630] flags: 0x200000000000000(node=0|zone=2)
[   14.695194] page_type: f5(slab)
[   14.695483] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.696364] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.697175] page dumped because: kasan: bad access detected
[   14.697805] 
[   14.697999] Memory state around the buggy address:
[   14.698422]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.699084]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.699860] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.700239]                       ^
[   14.700363]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.700577]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.701238] ==================================================================
[   14.782213] ==================================================================
[   14.782572] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.783177] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.783514] 
[   14.783596] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.783635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.783684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.783705] Call Trace:
[   14.783720]  <TASK>
[   14.783735]  dump_stack_lvl+0x73/0xb0
[   14.783775]  print_report+0xd1/0x650
[   14.783797]  ? __virt_addr_valid+0x1db/0x2d0
[   14.783820]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.783847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.783870]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.783897]  kasan_report+0x141/0x180
[   14.783919]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.783949]  kasan_check_range+0x10c/0x1c0
[   14.783973]  __kasan_check_write+0x18/0x20
[   14.783994]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.784020]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.784049]  ? kasan_save_alloc_info+0x3b/0x50
[   14.784074]  ? kasan_save_stack+0x45/0x70
[   14.784097]  kasan_bitops_generic+0x116/0x1c0
[   14.784121]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.784147]  ? __pfx_read_tsc+0x10/0x10
[   14.784167]  ? ktime_get_ts64+0x86/0x230
[   14.784192]  kunit_try_run_case+0x1a5/0x480
[   14.784216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.784239]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.784264]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.784288]  ? __kthread_parkme+0x82/0x180
[   14.784309]  ? preempt_count_sub+0x50/0x80
[   14.784333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.784358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.784383]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.784408]  kthread+0x337/0x6f0
[   14.784428]  ? trace_preempt_on+0x20/0xc0
[   14.784450]  ? __pfx_kthread+0x10/0x10
[   14.784471]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.784493]  ? calculate_sigpending+0x7b/0xa0
[   14.784517]  ? __pfx_kthread+0x10/0x10
[   14.784539]  ret_from_fork+0x116/0x1d0
[   14.784557]  ? __pfx_kthread+0x10/0x10
[   14.784578]  ret_from_fork_asm+0x1a/0x30
[   14.784608]  </TASK>
[   14.784618] 
[   14.795743] Allocated by task 279:
[   14.795932]  kasan_save_stack+0x45/0x70
[   14.796122]  kasan_save_track+0x18/0x40
[   14.796301]  kasan_save_alloc_info+0x3b/0x50
[   14.796500]  __kasan_kmalloc+0xb7/0xc0
[   14.797292]  __kmalloc_cache_noprof+0x189/0x420
[   14.797487]  kasan_bitops_generic+0x92/0x1c0
[   14.797755]  kunit_try_run_case+0x1a5/0x480
[   14.797959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.798191]  kthread+0x337/0x6f0
[   14.798350]  ret_from_fork+0x116/0x1d0
[   14.798523]  ret_from_fork_asm+0x1a/0x30
[   14.798793] 
[   14.798887] The buggy address belongs to the object at ffff888102894300
[   14.798887]  which belongs to the cache kmalloc-16 of size 16
[   14.799353] The buggy address is located 8 bytes inside of
[   14.799353]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.800586] 
[   14.800675] The buggy address belongs to the physical page:
[   14.800990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.801267] flags: 0x200000000000000(node=0|zone=2)
[   14.801483] page_type: f5(slab)
[   14.801636] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.802099] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.802427] page dumped because: kasan: bad access detected
[   14.802652] 
[   14.802805] Memory state around the buggy address:
[   14.802964]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.803301]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.803615] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.803972]                       ^
[   14.804123]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.804364]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.804737] ==================================================================
[   14.805227] ==================================================================
[   14.805555] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.805986] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279
[   14.806293] 
[   14.806408] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.806449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.806461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.806479] Call Trace:
[   14.806491]  <TASK>
[   14.806507]  dump_stack_lvl+0x73/0xb0
[   14.806536]  print_report+0xd1/0x650
[   14.806559]  ? __virt_addr_valid+0x1db/0x2d0
[   14.806582]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.806609]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.806632]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.806715]  kasan_report+0x141/0x180
[   14.806737]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.806782]  kasan_check_range+0x10c/0x1c0
[   14.806806]  __kasan_check_write+0x18/0x20
[   14.806826]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.806852]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.806882]  ? kasan_save_alloc_info+0x3b/0x50
[   14.806905]  ? kasan_save_stack+0x45/0x70
[   14.806930]  kasan_bitops_generic+0x116/0x1c0
[   14.806953]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.806979]  ? __pfx_read_tsc+0x10/0x10
[   14.806999]  ? ktime_get_ts64+0x86/0x230
[   14.807024]  kunit_try_run_case+0x1a5/0x480
[   14.807048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.807071]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.807095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.807119]  ? __kthread_parkme+0x82/0x180
[   14.807140]  ? preempt_count_sub+0x50/0x80
[   14.807163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.807187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.807211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.807237]  kthread+0x337/0x6f0
[   14.807256]  ? trace_preempt_on+0x20/0xc0
[   14.807279]  ? __pfx_kthread+0x10/0x10
[   14.807300]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.807322]  ? calculate_sigpending+0x7b/0xa0
[   14.807346]  ? __pfx_kthread+0x10/0x10
[   14.807367]  ret_from_fork+0x116/0x1d0
[   14.807386]  ? __pfx_kthread+0x10/0x10
[   14.807406]  ret_from_fork_asm+0x1a/0x30
[   14.807437]  </TASK>
[   14.807447] 
[   14.815468] Allocated by task 279:
[   14.815653]  kasan_save_stack+0x45/0x70
[   14.815845]  kasan_save_track+0x18/0x40
[   14.815999]  kasan_save_alloc_info+0x3b/0x50
[   14.816215]  __kasan_kmalloc+0xb7/0xc0
[   14.816403]  __kmalloc_cache_noprof+0x189/0x420
[   14.816628]  kasan_bitops_generic+0x92/0x1c0
[   14.816867]  kunit_try_run_case+0x1a5/0x480
[   14.817016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.817192]  kthread+0x337/0x6f0
[   14.817362]  ret_from_fork+0x116/0x1d0
[   14.817550]  ret_from_fork_asm+0x1a/0x30
[   14.817770] 
[   14.817849] The buggy address belongs to the object at ffff888102894300
[   14.817849]  which belongs to the cache kmalloc-16 of size 16
[   14.818199] The buggy address is located 8 bytes inside of
[   14.818199]  allocated 9-byte region [ffff888102894300, ffff888102894309)
[   14.818688] 
[   14.820040] The buggy address belongs to the physical page:
[   14.820228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894
[   14.820475] flags: 0x200000000000000(node=0|zone=2)
[   14.820637] page_type: f5(slab)
[   14.821954] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.822210] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.822506] page dumped because: kasan: bad access detected
[   14.823365] 
[   14.824455] Memory state around the buggy address:
[   14.824622]  ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.825317]  ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.825537] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.826066]                       ^
[   14.826806]  ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.827039]  ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.827252] ==================================================================