Hay
Date
July 8, 2025, 11:09 p.m.

Environment
qemu-x86_64

[   14.622078] ==================================================================
[   14.622401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.622872] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.623118] 
[   14.623356] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.623405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.623417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.623438] Call Trace:
[   14.623458]  <TASK>
[   14.623475]  dump_stack_lvl+0x73/0xb0
[   14.623507]  print_report+0xd1/0x650
[   14.623530]  ? __virt_addr_valid+0x1db/0x2d0
[   14.623552]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.623588]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.623626]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.623653]  kasan_report+0x141/0x180
[   14.623675]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.623707]  kasan_check_range+0x10c/0x1c0
[   14.623730]  __kasan_check_write+0x18/0x20
[   14.623750]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.623777]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.623805]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.623830]  ? trace_hardirqs_on+0x37/0xe0
[   14.623853]  ? kasan_bitops_generic+0x92/0x1c0
[   14.623881]  kasan_bitops_generic+0x116/0x1c0
[   14.623905]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.623929]  ? trace_hardirqs_on+0x37/0xe0
[   14.623951]  ? __pfx_read_tsc+0x10/0x10
[   14.623972]  ? ktime_get_ts64+0x86/0x230
[   14.623995]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.624024]  kunit_try_run_case+0x1a5/0x480
[   14.624049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.624074]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.624100]  ? __kthread_parkme+0x82/0x180
[   14.624120]  ? preempt_count_sub+0x50/0x80
[   14.624145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.624170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.624194]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.624219]  kthread+0x337/0x6f0
[   14.624238]  ? trace_preempt_on+0x20/0xc0
[   14.624260]  ? __pfx_kthread+0x10/0x10
[   14.624280]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.624302]  ? calculate_sigpending+0x7b/0xa0
[   14.624327]  ? __pfx_kthread+0x10/0x10
[   14.624348]  ret_from_fork+0x116/0x1d0
[   14.624366]  ? __pfx_kthread+0x10/0x10
[   14.624387]  ret_from_fork_asm+0x1a/0x30
[   14.624419]  </TASK>
[   14.624428] 
[   14.633612] Allocated by task 279:
[   14.633765]  kasan_save_stack+0x45/0x70
[   14.634037]  kasan_save_track+0x18/0x40
[   14.634333]  kasan_save_alloc_info+0x3b/0x50
[   14.634677]  __kasan_kmalloc+0xb7/0xc0
[   14.634863]  __kmalloc_cache_noprof+0x189/0x420
[   14.635020]  kasan_bitops_generic+0x92/0x1c0
[   14.635170]  kunit_try_run_case+0x1a5/0x480
[   14.635429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.635712]  kthread+0x337/0x6f0
[   14.635890]  ret_from_fork+0x116/0x1d0
[   14.636087]  ret_from_fork_asm+0x1a/0x30
[   14.636227] 
[   14.636300] The buggy address belongs to the object at ffff8881026260e0
[   14.636300]  which belongs to the cache kmalloc-16 of size 16
[   14.637086] The buggy address is located 8 bytes inside of
[   14.637086]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.638067] 
[   14.638144] The buggy address belongs to the physical page:
[   14.638311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.638762] flags: 0x200000000000000(node=0|zone=2)
[   14.639009] page_type: f5(slab)
[   14.639239] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.639568] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.639888] page dumped because: kasan: bad access detected
[   14.640215] 
[   14.640317] Memory state around the buggy address:
[   14.640533]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.640884]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.641199] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.641483]                                                           ^
[   14.641738]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.642121]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.642399] ==================================================================
[   14.578546] ==================================================================
[   14.578875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.579410] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.579740] 
[   14.579828] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.579869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.579881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.579901] Call Trace:
[   14.579918]  <TASK>
[   14.579932]  dump_stack_lvl+0x73/0xb0
[   14.579962]  print_report+0xd1/0x650
[   14.579984]  ? __virt_addr_valid+0x1db/0x2d0
[   14.580008]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.580035]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.580059]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.580086]  kasan_report+0x141/0x180
[   14.580108]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.580140]  kasan_check_range+0x10c/0x1c0
[   14.580164]  __kasan_check_write+0x18/0x20
[   14.580238]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.580267]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.580296]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.580321]  ? trace_hardirqs_on+0x37/0xe0
[   14.580343]  ? kasan_bitops_generic+0x92/0x1c0
[   14.580373]  kasan_bitops_generic+0x116/0x1c0
[   14.580397]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.580422]  ? trace_hardirqs_on+0x37/0xe0
[   14.580444]  ? __pfx_read_tsc+0x10/0x10
[   14.580465]  ? ktime_get_ts64+0x86/0x230
[   14.580489]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.580516]  kunit_try_run_case+0x1a5/0x480
[   14.580542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.580568]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.580593]  ? __kthread_parkme+0x82/0x180
[   14.580624]  ? preempt_count_sub+0x50/0x80
[   14.580649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.580682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.580708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.580733]  kthread+0x337/0x6f0
[   14.580752]  ? trace_preempt_on+0x20/0xc0
[   14.580775]  ? __pfx_kthread+0x10/0x10
[   14.580796]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.580817]  ? calculate_sigpending+0x7b/0xa0
[   14.580842]  ? __pfx_kthread+0x10/0x10
[   14.580863]  ret_from_fork+0x116/0x1d0
[   14.580882]  ? __pfx_kthread+0x10/0x10
[   14.580902]  ret_from_fork_asm+0x1a/0x30
[   14.580969]  </TASK>
[   14.580979] 
[   14.591682] Allocated by task 279:
[   14.591846]  kasan_save_stack+0x45/0x70
[   14.592056]  kasan_save_track+0x18/0x40
[   14.592769]  kasan_save_alloc_info+0x3b/0x50
[   14.592938]  __kasan_kmalloc+0xb7/0xc0
[   14.593270]  __kmalloc_cache_noprof+0x189/0x420
[   14.593502]  kasan_bitops_generic+0x92/0x1c0
[   14.594105]  kunit_try_run_case+0x1a5/0x480
[   14.594313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.594774]  kthread+0x337/0x6f0
[   14.594940]  ret_from_fork+0x116/0x1d0
[   14.595219]  ret_from_fork_asm+0x1a/0x30
[   14.595406] 
[   14.595492] The buggy address belongs to the object at ffff8881026260e0
[   14.595492]  which belongs to the cache kmalloc-16 of size 16
[   14.596270] The buggy address is located 8 bytes inside of
[   14.596270]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.597015] 
[   14.597110] The buggy address belongs to the physical page:
[   14.597343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.597668] flags: 0x200000000000000(node=0|zone=2)
[   14.597969] page_type: f5(slab)
[   14.598138] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.598426] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.598746] page dumped because: kasan: bad access detected
[   14.599002] 
[   14.599084] Memory state around the buggy address:
[   14.599271]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.599594]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.599835] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.600152]                                                           ^
[   14.600367]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.600699]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.601014] ==================================================================
[   14.537362] ==================================================================
[   14.537918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.538411] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.538775] 
[   14.538896] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.538944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.538956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.538978] Call Trace:
[   14.538991]  <TASK>
[   14.539008]  dump_stack_lvl+0x73/0xb0
[   14.539042]  print_report+0xd1/0x650
[   14.539065]  ? __virt_addr_valid+0x1db/0x2d0
[   14.539090]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.539117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.539141]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.539168]  kasan_report+0x141/0x180
[   14.539189]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.539221]  kasan_check_range+0x10c/0x1c0
[   14.539246]  __kasan_check_write+0x18/0x20
[   14.539266]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.539293]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.539322]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.539347]  ? trace_hardirqs_on+0x37/0xe0
[   14.539380]  ? kasan_bitops_generic+0x92/0x1c0
[   14.539420]  kasan_bitops_generic+0x116/0x1c0
[   14.539445]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.539469]  ? trace_hardirqs_on+0x37/0xe0
[   14.539491]  ? __pfx_read_tsc+0x10/0x10
[   14.539522]  ? ktime_get_ts64+0x86/0x230
[   14.539545]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.539574]  kunit_try_run_case+0x1a5/0x480
[   14.539610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.539635]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.539661]  ? __kthread_parkme+0x82/0x180
[   14.539683]  ? preempt_count_sub+0x50/0x80
[   14.539708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.539733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.539758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.539784]  kthread+0x337/0x6f0
[   14.539802]  ? trace_preempt_on+0x20/0xc0
[   14.539824]  ? __pfx_kthread+0x10/0x10
[   14.539844]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.539866]  ? calculate_sigpending+0x7b/0xa0
[   14.539890]  ? __pfx_kthread+0x10/0x10
[   14.539911]  ret_from_fork+0x116/0x1d0
[   14.539930]  ? __pfx_kthread+0x10/0x10
[   14.539952]  ret_from_fork_asm+0x1a/0x30
[   14.540035]  </TASK>
[   14.540046] 
[   14.548344] Allocated by task 279:
[   14.548503]  kasan_save_stack+0x45/0x70
[   14.548704]  kasan_save_track+0x18/0x40
[   14.548858]  kasan_save_alloc_info+0x3b/0x50
[   14.549047]  __kasan_kmalloc+0xb7/0xc0
[   14.549231]  __kmalloc_cache_noprof+0x189/0x420
[   14.549434]  kasan_bitops_generic+0x92/0x1c0
[   14.549837]  kunit_try_run_case+0x1a5/0x480
[   14.550037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.550363]  kthread+0x337/0x6f0
[   14.550557]  ret_from_fork+0x116/0x1d0
[   14.550704]  ret_from_fork_asm+0x1a/0x30
[   14.550844] 
[   14.550916] The buggy address belongs to the object at ffff8881026260e0
[   14.550916]  which belongs to the cache kmalloc-16 of size 16
[   14.551305] The buggy address is located 8 bytes inside of
[   14.551305]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.552223] 
[   14.552328] The buggy address belongs to the physical page:
[   14.552502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.552757] flags: 0x200000000000000(node=0|zone=2)
[   14.552926] page_type: f5(slab)
[   14.553047] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.553392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.554246] page dumped because: kasan: bad access detected
[   14.554539] 
[   14.554649] Memory state around the buggy address:
[   14.554880]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.555179]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.555471] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.556125]                                                           ^
[   14.556326]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.556742]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.557071] ==================================================================
[   14.642880] ==================================================================
[   14.643241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.643776] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.644086] 
[   14.644174] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.644218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.644230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.644252] Call Trace:
[   14.644270]  <TASK>
[   14.644289]  dump_stack_lvl+0x73/0xb0
[   14.644319]  print_report+0xd1/0x650
[   14.644342]  ? __virt_addr_valid+0x1db/0x2d0
[   14.644366]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.644620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.644649]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.644678]  kasan_report+0x141/0x180
[   14.644701]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.644734]  kasan_check_range+0x10c/0x1c0
[   14.644758]  __kasan_check_write+0x18/0x20
[   14.644778]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.644805]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.644834]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.644859]  ? trace_hardirqs_on+0x37/0xe0
[   14.644883]  ? kasan_bitops_generic+0x92/0x1c0
[   14.644910]  kasan_bitops_generic+0x116/0x1c0
[   14.644981]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.645005]  ? trace_hardirqs_on+0x37/0xe0
[   14.645027]  ? __pfx_read_tsc+0x10/0x10
[   14.645049]  ? ktime_get_ts64+0x86/0x230
[   14.645072]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.645099]  kunit_try_run_case+0x1a5/0x480
[   14.645124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.645149]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.645175]  ? __kthread_parkme+0x82/0x180
[   14.645196]  ? preempt_count_sub+0x50/0x80
[   14.645220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.645245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.645269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.645295]  kthread+0x337/0x6f0
[   14.645314]  ? trace_preempt_on+0x20/0xc0
[   14.645336]  ? __pfx_kthread+0x10/0x10
[   14.645356]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.645378]  ? calculate_sigpending+0x7b/0xa0
[   14.645402]  ? __pfx_kthread+0x10/0x10
[   14.645423]  ret_from_fork+0x116/0x1d0
[   14.645441]  ? __pfx_kthread+0x10/0x10
[   14.645462]  ret_from_fork_asm+0x1a/0x30
[   14.645494]  </TASK>
[   14.645504] 
[   14.657761] Allocated by task 279:
[   14.657971]  kasan_save_stack+0x45/0x70
[   14.658408]  kasan_save_track+0x18/0x40
[   14.658642]  kasan_save_alloc_info+0x3b/0x50
[   14.658836]  __kasan_kmalloc+0xb7/0xc0
[   14.659260]  __kmalloc_cache_noprof+0x189/0x420
[   14.659479]  kasan_bitops_generic+0x92/0x1c0
[   14.659856]  kunit_try_run_case+0x1a5/0x480
[   14.660396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.660676]  kthread+0x337/0x6f0
[   14.660849]  ret_from_fork+0x116/0x1d0
[   14.661139]  ret_from_fork_asm+0x1a/0x30
[   14.661330] 
[   14.661430] The buggy address belongs to the object at ffff8881026260e0
[   14.661430]  which belongs to the cache kmalloc-16 of size 16
[   14.661902] The buggy address is located 8 bytes inside of
[   14.661902]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.662357] 
[   14.662450] The buggy address belongs to the physical page:
[   14.662792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.663134] flags: 0x200000000000000(node=0|zone=2)
[   14.663377] page_type: f5(slab)
[   14.663549] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.663900] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.664285] page dumped because: kasan: bad access detected
[   14.664496] 
[   14.664614] Memory state around the buggy address:
[   14.664796]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.665394]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.665748] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.666054]                                                           ^
[   14.666459]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.666780]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.667234] ==================================================================
[   14.601501] ==================================================================
[   14.601842] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.602110] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.602767] 
[   14.602863] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.602907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.602918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.602939] Call Trace:
[   14.602956]  <TASK>
[   14.602971]  dump_stack_lvl+0x73/0xb0
[   14.603002]  print_report+0xd1/0x650
[   14.603026]  ? __virt_addr_valid+0x1db/0x2d0
[   14.603106]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.603133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.603157]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.603184]  kasan_report+0x141/0x180
[   14.603206]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.603238]  kasan_check_range+0x10c/0x1c0
[   14.603262]  __kasan_check_write+0x18/0x20
[   14.603281]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.603308]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.603337]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.603362]  ? trace_hardirqs_on+0x37/0xe0
[   14.603384]  ? kasan_bitops_generic+0x92/0x1c0
[   14.603413]  kasan_bitops_generic+0x116/0x1c0
[   14.603438]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.603462]  ? trace_hardirqs_on+0x37/0xe0
[   14.603485]  ? __pfx_read_tsc+0x10/0x10
[   14.603517]  ? ktime_get_ts64+0x86/0x230
[   14.603539]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.603567]  kunit_try_run_case+0x1a5/0x480
[   14.603591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.603628]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.603655]  ? __kthread_parkme+0x82/0x180
[   14.603675]  ? preempt_count_sub+0x50/0x80
[   14.603700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.603725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.603750]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.603776]  kthread+0x337/0x6f0
[   14.603794]  ? trace_preempt_on+0x20/0xc0
[   14.603817]  ? __pfx_kthread+0x10/0x10
[   14.603838]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.603860]  ? calculate_sigpending+0x7b/0xa0
[   14.603885]  ? __pfx_kthread+0x10/0x10
[   14.603906]  ret_from_fork+0x116/0x1d0
[   14.603924]  ? __pfx_kthread+0x10/0x10
[   14.603988]  ret_from_fork_asm+0x1a/0x30
[   14.604021]  </TASK>
[   14.604030] 
[   14.612870] Allocated by task 279:
[   14.613027]  kasan_save_stack+0x45/0x70
[   14.613520]  kasan_save_track+0x18/0x40
[   14.613784]  kasan_save_alloc_info+0x3b/0x50
[   14.613974]  __kasan_kmalloc+0xb7/0xc0
[   14.614107]  __kmalloc_cache_noprof+0x189/0x420
[   14.614294]  kasan_bitops_generic+0x92/0x1c0
[   14.614552]  kunit_try_run_case+0x1a5/0x480
[   14.614743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.614919]  kthread+0x337/0x6f0
[   14.615294]  ret_from_fork+0x116/0x1d0
[   14.615493]  ret_from_fork_asm+0x1a/0x30
[   14.615703] 
[   14.615791] The buggy address belongs to the object at ffff8881026260e0
[   14.615791]  which belongs to the cache kmalloc-16 of size 16
[   14.616341] The buggy address is located 8 bytes inside of
[   14.616341]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.616877] 
[   14.616950] The buggy address belongs to the physical page:
[   14.617174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.617637] flags: 0x200000000000000(node=0|zone=2)
[   14.617928] page_type: f5(slab)
[   14.618130] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.618361] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.618583] page dumped because: kasan: bad access detected
[   14.618845] 
[   14.618938] Memory state around the buggy address:
[   14.619161]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.619465]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.619975] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.620301]                                                           ^
[   14.620502]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.620891]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.621457] ==================================================================
[   14.557622] ==================================================================
[   14.557990] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.558269] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.558706] 
[   14.558816] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.558857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.558868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.558888] Call Trace:
[   14.558904]  <TASK>
[   14.558919]  dump_stack_lvl+0x73/0xb0
[   14.558947]  print_report+0xd1/0x650
[   14.558969]  ? __virt_addr_valid+0x1db/0x2d0
[   14.558992]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.559019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.559043]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.559070]  kasan_report+0x141/0x180
[   14.559092]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.559124]  kasan_check_range+0x10c/0x1c0
[   14.559148]  __kasan_check_write+0x18/0x20
[   14.559167]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.559194]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.559223]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.559246]  ? trace_hardirqs_on+0x37/0xe0
[   14.559268]  ? kasan_bitops_generic+0x92/0x1c0
[   14.559297]  kasan_bitops_generic+0x116/0x1c0
[   14.559321]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.559345]  ? trace_hardirqs_on+0x37/0xe0
[   14.559367]  ? __pfx_read_tsc+0x10/0x10
[   14.559387]  ? ktime_get_ts64+0x86/0x230
[   14.559409]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.559438]  kunit_try_run_case+0x1a5/0x480
[   14.559461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.559487]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.559564]  ? __kthread_parkme+0x82/0x180
[   14.559587]  ? preempt_count_sub+0x50/0x80
[   14.559624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.559649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.559674]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.559701]  kthread+0x337/0x6f0
[   14.559720]  ? trace_preempt_on+0x20/0xc0
[   14.559742]  ? __pfx_kthread+0x10/0x10
[   14.559763]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.559785]  ? calculate_sigpending+0x7b/0xa0
[   14.559810]  ? __pfx_kthread+0x10/0x10
[   14.559832]  ret_from_fork+0x116/0x1d0
[   14.559850]  ? __pfx_kthread+0x10/0x10
[   14.559870]  ret_from_fork_asm+0x1a/0x30
[   14.559901]  </TASK>
[   14.559911] 
[   14.569651] Allocated by task 279:
[   14.569862]  kasan_save_stack+0x45/0x70
[   14.570285]  kasan_save_track+0x18/0x40
[   14.570488]  kasan_save_alloc_info+0x3b/0x50
[   14.570716]  __kasan_kmalloc+0xb7/0xc0
[   14.570911]  __kmalloc_cache_noprof+0x189/0x420
[   14.571116]  kasan_bitops_generic+0x92/0x1c0
[   14.571292]  kunit_try_run_case+0x1a5/0x480
[   14.571450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.571941]  kthread+0x337/0x6f0
[   14.572179]  ret_from_fork+0x116/0x1d0
[   14.572350]  ret_from_fork_asm+0x1a/0x30
[   14.572517] 
[   14.572629] The buggy address belongs to the object at ffff8881026260e0
[   14.572629]  which belongs to the cache kmalloc-16 of size 16
[   14.573163] The buggy address is located 8 bytes inside of
[   14.573163]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.573680] 
[   14.573778] The buggy address belongs to the physical page:
[   14.574055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.574378] flags: 0x200000000000000(node=0|zone=2)
[   14.574614] page_type: f5(slab)
[   14.574735] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.574982] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.575375] page dumped because: kasan: bad access detected
[   14.575655] 
[   14.575751] Memory state around the buggy address:
[   14.575930]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.576143]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.576462] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.576985]                                                           ^
[   14.577259]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.577524]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.577809] ==================================================================
[   14.667826] ==================================================================
[   14.668196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.668581] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.668891] 
[   14.669015] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.669062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.669074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.669096] Call Trace:
[   14.669169]  <TASK>
[   14.669187]  dump_stack_lvl+0x73/0xb0
[   14.669219]  print_report+0xd1/0x650
[   14.669241]  ? __virt_addr_valid+0x1db/0x2d0
[   14.669265]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.669290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.669314]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.669341]  kasan_report+0x141/0x180
[   14.669363]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.669395]  kasan_check_range+0x10c/0x1c0
[   14.669418]  __kasan_check_write+0x18/0x20
[   14.669437]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.669464]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.669492]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.669517]  ? trace_hardirqs_on+0x37/0xe0
[   14.669548]  ? kasan_bitops_generic+0x92/0x1c0
[   14.669576]  kasan_bitops_generic+0x116/0x1c0
[   14.669612]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.669636]  ? trace_hardirqs_on+0x37/0xe0
[   14.669659]  ? __pfx_read_tsc+0x10/0x10
[   14.669680]  ? ktime_get_ts64+0x86/0x230
[   14.669728]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.669758]  kunit_try_run_case+0x1a5/0x480
[   14.669782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.669807]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.669834]  ? __kthread_parkme+0x82/0x180
[   14.669855]  ? preempt_count_sub+0x50/0x80
[   14.669880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.669905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.669967]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.669996]  kthread+0x337/0x6f0
[   14.670014]  ? trace_preempt_on+0x20/0xc0
[   14.670037]  ? __pfx_kthread+0x10/0x10
[   14.670057]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.670079]  ? calculate_sigpending+0x7b/0xa0
[   14.670103]  ? __pfx_kthread+0x10/0x10
[   14.670125]  ret_from_fork+0x116/0x1d0
[   14.670143]  ? __pfx_kthread+0x10/0x10
[   14.670163]  ret_from_fork_asm+0x1a/0x30
[   14.670195]  </TASK>
[   14.670205] 
[   14.678848] Allocated by task 279:
[   14.679029]  kasan_save_stack+0x45/0x70
[   14.679179]  kasan_save_track+0x18/0x40
[   14.679314]  kasan_save_alloc_info+0x3b/0x50
[   14.679529]  __kasan_kmalloc+0xb7/0xc0
[   14.679803]  __kmalloc_cache_noprof+0x189/0x420
[   14.680104]  kasan_bitops_generic+0x92/0x1c0
[   14.680328]  kunit_try_run_case+0x1a5/0x480
[   14.680571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.680796]  kthread+0x337/0x6f0
[   14.681141]  ret_from_fork+0x116/0x1d0
[   14.681345]  ret_from_fork_asm+0x1a/0x30
[   14.681571] 
[   14.681679] The buggy address belongs to the object at ffff8881026260e0
[   14.681679]  which belongs to the cache kmalloc-16 of size 16
[   14.682289] The buggy address is located 8 bytes inside of
[   14.682289]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.682707] 
[   14.682805] The buggy address belongs to the physical page:
[   14.683133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.683490] flags: 0x200000000000000(node=0|zone=2)
[   14.683752] page_type: f5(slab)
[   14.683981] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.684298] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.684621] page dumped because: kasan: bad access detected
[   14.684855] 
[   14.684996] Memory state around the buggy address:
[   14.685201]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.685445]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.685745] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.686268]                                                           ^
[   14.686498]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.686833]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.687217] ==================================================================
[   14.689202] ==================================================================
[   14.689926] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.691204] Write of size 8 at addr ffff8881026260e8 by task kunit_try_catch/279
[   14.691654] 
[   14.691886] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.691954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.691966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.691988] Call Trace:
[   14.692004]  <TASK>
[   14.692020]  dump_stack_lvl+0x73/0xb0
[   14.692055]  print_report+0xd1/0x650
[   14.692077]  ? __virt_addr_valid+0x1db/0x2d0
[   14.692101]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.692127]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.692150]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.692178]  kasan_report+0x141/0x180
[   14.692201]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.692232]  kasan_check_range+0x10c/0x1c0
[   14.692255]  __kasan_check_write+0x18/0x20
[   14.692275]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.692301]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.692329]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.692354]  ? trace_hardirqs_on+0x37/0xe0
[   14.692377]  ? kasan_bitops_generic+0x92/0x1c0
[   14.692405]  kasan_bitops_generic+0x116/0x1c0
[   14.692429]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.692452]  ? trace_hardirqs_on+0x37/0xe0
[   14.692473]  ? __pfx_read_tsc+0x10/0x10
[   14.692496]  ? ktime_get_ts64+0x86/0x230
[   14.692597]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.692639]  kunit_try_run_case+0x1a5/0x480
[   14.692663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.692689]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.692714]  ? __kthread_parkme+0x82/0x180
[   14.692735]  ? preempt_count_sub+0x50/0x80
[   14.692759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.692783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.692808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.692833]  kthread+0x337/0x6f0
[   14.692853]  ? trace_preempt_on+0x20/0xc0
[   14.692875]  ? __pfx_kthread+0x10/0x10
[   14.692895]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.692916]  ? calculate_sigpending+0x7b/0xa0
[   14.692941]  ? __pfx_kthread+0x10/0x10
[   14.692962]  ret_from_fork+0x116/0x1d0
[   14.692981]  ? __pfx_kthread+0x10/0x10
[   14.693002]  ret_from_fork_asm+0x1a/0x30
[   14.693033]  </TASK>
[   14.693043] 
[   14.703246] Allocated by task 279:
[   14.703379]  kasan_save_stack+0x45/0x70
[   14.703696]  kasan_save_track+0x18/0x40
[   14.703909]  kasan_save_alloc_info+0x3b/0x50
[   14.704122]  __kasan_kmalloc+0xb7/0xc0
[   14.704319]  __kmalloc_cache_noprof+0x189/0x420
[   14.704566]  kasan_bitops_generic+0x92/0x1c0
[   14.704796]  kunit_try_run_case+0x1a5/0x480
[   14.705004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.705431]  kthread+0x337/0x6f0
[   14.705548]  ret_from_fork+0x116/0x1d0
[   14.705684]  ret_from_fork_asm+0x1a/0x30
[   14.705821] 
[   14.705958] The buggy address belongs to the object at ffff8881026260e0
[   14.705958]  which belongs to the cache kmalloc-16 of size 16
[   14.706511] The buggy address is located 8 bytes inside of
[   14.706511]  allocated 9-byte region [ffff8881026260e0, ffff8881026260e9)
[   14.706986] 
[   14.707056] The buggy address belongs to the physical page:
[   14.707341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102626
[   14.707936] flags: 0x200000000000000(node=0|zone=2)
[   14.708175] page_type: f5(slab)
[   14.708316] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.708538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.708773] page dumped because: kasan: bad access detected
[   14.709123] 
[   14.709238] Memory state around the buggy address:
[   14.709459]  ffff888102625f80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.709799]  ffff888102626000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.710112] >ffff888102626080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.710422]                                                           ^
[   14.710661]  ffff888102626100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.711003]  ffff888102626180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.711274] ==================================================================