Hay
Date
July 9, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.040655] ==================================================================
[   19.040708] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   19.041403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.041834]  show_stack+0x20/0x38 (C)
[   19.043463] Allocated by task 261:
[   19.044165]  kunit_try_run_case+0x170/0x3f0
[   19.044631] The buggy address belongs to the physical page:
[   19.044744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.044797] page_type: f5(slab)
[   19.044901] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.044978] 
[   19.044997] Memory state around the buggy address:
[   19.045991]                                               ^
[   19.065560]     ok 64 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   19.069391] Read of size 4 at addr fff00000c7692130 by task kunit_try_catch/265
[   19.071211]  kthread+0x328/0x630
[   19.071798]  __kasan_kmalloc+0xd4/0xd8
[   19.073022]  kthread+0x328/0x630
[   19.073956] 
[   19.073983] The buggy address belongs to the physical page:
[   19.074816] page_type: f5(slab)
[   19.074926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.075674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.075757] page dumped because: kasan: bad access detected
[   19.075881] 
[   19.075906] Memory state around the buggy address:
[   19.075990]  fff00000c7692080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.076137]                                      ^
[   19.076274] ==================================================================

[   14.796193] ==================================================================
[   14.796939] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.797641] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278
[   14.798252] 
[   14.798505] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.798549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.798562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.798581] Call Trace:
[   14.798595]  <TASK>
[   14.798610]  dump_stack_lvl+0x73/0xb0
[   14.798764]  print_report+0xd1/0x650
[   14.798789]  ? __virt_addr_valid+0x1db/0x2d0
[   14.798813]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.798843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.798867]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.798897]  kasan_report+0x141/0x180
[   14.798919]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.798953]  kasan_check_range+0x10c/0x1c0
[   14.798977]  __kasan_check_write+0x18/0x20
[   14.798996]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.799026]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.799064]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.799088]  ? trace_hardirqs_on+0x37/0xe0
[   14.799110]  ? kasan_bitops_generic+0x92/0x1c0
[   14.799137]  kasan_bitops_generic+0x121/0x1c0
[   14.799161]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.799186]  ? __pfx_read_tsc+0x10/0x10
[   14.799223]  ? ktime_get_ts64+0x86/0x230
[   14.799247]  kunit_try_run_case+0x1a5/0x480
[   14.799294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.799318]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.799343]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.799367]  ? __kthread_parkme+0x82/0x180
[   14.799388]  ? preempt_count_sub+0x50/0x80
[   14.799412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.799436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.799461]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.799487]  kthread+0x337/0x6f0
[   14.799506]  ? trace_preempt_on+0x20/0xc0
[   14.799529]  ? __pfx_kthread+0x10/0x10
[   14.799550]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.799571]  ? calculate_sigpending+0x7b/0xa0
[   14.799596]  ? __pfx_kthread+0x10/0x10
[   14.799617]  ret_from_fork+0x116/0x1d0
[   14.799635]  ? __pfx_kthread+0x10/0x10
[   14.799655]  ret_from_fork_asm+0x1a/0x30
[   14.799686]  </TASK>
[   14.799697] 
[   14.812854] Allocated by task 278:
[   14.813220]  kasan_save_stack+0x45/0x70
[   14.813507]  kasan_save_track+0x18/0x40
[   14.813786]  kasan_save_alloc_info+0x3b/0x50
[   14.814128]  __kasan_kmalloc+0xb7/0xc0
[   14.814503]  __kmalloc_cache_noprof+0x189/0x420
[   14.814689]  kasan_bitops_generic+0x92/0x1c0
[   14.815115]  kunit_try_run_case+0x1a5/0x480
[   14.815491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.815769]  kthread+0x337/0x6f0
[   14.815938]  ret_from_fork+0x116/0x1d0
[   14.816334]  ret_from_fork_asm+0x1a/0x30
[   14.816622] 
[   14.816735] The buggy address belongs to the object at ffff88810226cfe0
[   14.816735]  which belongs to the cache kmalloc-16 of size 16
[   14.817601] The buggy address is located 8 bytes inside of
[   14.817601]  allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9)
[   14.818475] 
[   14.818687] The buggy address belongs to the physical page:
[   14.818987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c
[   14.819590] flags: 0x200000000000000(node=0|zone=2)
[   14.820085] page_type: f5(slab)
[   14.820376] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.820864] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.821284] page dumped because: kasan: bad access detected
[   14.821685] 
[   14.821968] Memory state around the buggy address:
[   14.822278]  ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc
[   14.822622]  ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.822913] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.823523]                                                           ^
[   14.823826]  ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.824294]  ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.824823] ==================================================================
[   14.825607] ==================================================================
[   14.825889] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.826693] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278
[   14.827368] 
[   14.827583] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.827630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.827642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.827662] Call Trace:
[   14.827676]  <TASK>
[   14.827691]  dump_stack_lvl+0x73/0xb0
[   14.827734]  print_report+0xd1/0x650
[   14.827756]  ? __virt_addr_valid+0x1db/0x2d0
[   14.827778]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.827893]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.827916]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.827946]  kasan_report+0x141/0x180
[   14.827968]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.828002]  kasan_check_range+0x10c/0x1c0
[   14.828048]  __kasan_check_write+0x18/0x20
[   14.828069]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.828110]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.828141]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.828167]  ? trace_hardirqs_on+0x37/0xe0
[   14.828190]  ? kasan_bitops_generic+0x92/0x1c0
[   14.828218]  kasan_bitops_generic+0x121/0x1c0
[   14.828241]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.828267]  ? __pfx_read_tsc+0x10/0x10
[   14.828287]  ? ktime_get_ts64+0x86/0x230
[   14.828311]  kunit_try_run_case+0x1a5/0x480
[   14.828341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.828364]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.828388]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.828412]  ? __kthread_parkme+0x82/0x180
[   14.828432]  ? preempt_count_sub+0x50/0x80
[   14.828456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.828480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.828504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.828530]  kthread+0x337/0x6f0
[   14.828548]  ? trace_preempt_on+0x20/0xc0
[   14.828571]  ? __pfx_kthread+0x10/0x10
[   14.828591]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.828612]  ? calculate_sigpending+0x7b/0xa0
[   14.828636]  ? __pfx_kthread+0x10/0x10
[   14.828657]  ret_from_fork+0x116/0x1d0
[   14.828675]  ? __pfx_kthread+0x10/0x10
[   14.828695]  ret_from_fork_asm+0x1a/0x30
[   14.828738]  </TASK>
[   14.828747] 
[   14.840993] Allocated by task 278:
[   14.841182]  kasan_save_stack+0x45/0x70
[   14.841617]  kasan_save_track+0x18/0x40
[   14.841890]  kasan_save_alloc_info+0x3b/0x50
[   14.842070]  __kasan_kmalloc+0xb7/0xc0
[   14.842480]  __kmalloc_cache_noprof+0x189/0x420
[   14.842659]  kasan_bitops_generic+0x92/0x1c0
[   14.843026]  kunit_try_run_case+0x1a5/0x480
[   14.843262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.843611]  kthread+0x337/0x6f0
[   14.843894]  ret_from_fork+0x116/0x1d0
[   14.844120]  ret_from_fork_asm+0x1a/0x30
[   14.844548] 
[   14.844740] The buggy address belongs to the object at ffff88810226cfe0
[   14.844740]  which belongs to the cache kmalloc-16 of size 16
[   14.845684] The buggy address is located 8 bytes inside of
[   14.845684]  allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9)
[   14.846400] 
[   14.846486] The buggy address belongs to the physical page:
[   14.846913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c
[   14.847434] flags: 0x200000000000000(node=0|zone=2)
[   14.847642] page_type: f5(slab)
[   14.847884] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.848559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.848895] page dumped because: kasan: bad access detected
[   14.849301] 
[   14.849468] Memory state around the buggy address:
[   14.849671]  ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc
[   14.850008]  ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.850553] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.850929]                                                           ^
[   14.851416]  ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.851754]  ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.852241] ==================================================================
[   14.852890] ==================================================================
[   14.853134] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.854134] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278
[   14.854635] 
[   14.854845] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.854890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.854901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.854922] Call Trace:
[   14.854935]  <TASK>
[   14.854948]  dump_stack_lvl+0x73/0xb0
[   14.854978]  print_report+0xd1/0x650
[   14.855246]  ? __virt_addr_valid+0x1db/0x2d0
[   14.855271]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.855300]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.855325]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.855357]  kasan_report+0x141/0x180
[   14.855380]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.855414]  kasan_check_range+0x10c/0x1c0
[   14.855437]  __kasan_check_write+0x18/0x20
[   14.855457]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.855486]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.855516]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.855541]  ? trace_hardirqs_on+0x37/0xe0
[   14.855564]  ? kasan_bitops_generic+0x92/0x1c0
[   14.855591]  kasan_bitops_generic+0x121/0x1c0
[   14.855615]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.855640]  ? __pfx_read_tsc+0x10/0x10
[   14.855660]  ? ktime_get_ts64+0x86/0x230
[   14.855683]  kunit_try_run_case+0x1a5/0x480
[   14.855719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.855741]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.855766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.855790]  ? __kthread_parkme+0x82/0x180
[   14.855810]  ? preempt_count_sub+0x50/0x80
[   14.855834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.855858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.855882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.855908]  kthread+0x337/0x6f0
[   14.855927]  ? trace_preempt_on+0x20/0xc0
[   14.855949]  ? __pfx_kthread+0x10/0x10
[   14.855970]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.855991]  ? calculate_sigpending+0x7b/0xa0
[   14.856015]  ? __pfx_kthread+0x10/0x10
[   14.856069]  ret_from_fork+0x116/0x1d0
[   14.856095]  ? __pfx_kthread+0x10/0x10
[   14.856115]  ret_from_fork_asm+0x1a/0x30
[   14.856146]  </TASK>
[   14.856156] 
[   14.867261] Allocated by task 278:
[   14.867674]  kasan_save_stack+0x45/0x70
[   14.867982]  kasan_save_track+0x18/0x40
[   14.868231]  kasan_save_alloc_info+0x3b/0x50
[   14.868651]  __kasan_kmalloc+0xb7/0xc0
[   14.868836]  __kmalloc_cache_noprof+0x189/0x420
[   14.869247]  kasan_bitops_generic+0x92/0x1c0
[   14.869436]  kunit_try_run_case+0x1a5/0x480
[   14.869739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.869989]  kthread+0x337/0x6f0
[   14.870331]  ret_from_fork+0x116/0x1d0
[   14.870560]  ret_from_fork_asm+0x1a/0x30
[   14.870957] 
[   14.871040] The buggy address belongs to the object at ffff88810226cfe0
[   14.871040]  which belongs to the cache kmalloc-16 of size 16
[   14.871657] The buggy address is located 8 bytes inside of
[   14.871657]  allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9)
[   14.872654] 
[   14.872769] The buggy address belongs to the physical page:
[   14.873157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c
[   14.873698] flags: 0x200000000000000(node=0|zone=2)
[   14.874017] page_type: f5(slab)
[   14.874369] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.874684] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.875278] page dumped because: kasan: bad access detected
[   14.875468] 
[   14.875565] Memory state around the buggy address:
[   14.875888]  ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc
[   14.876559]  ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.876854] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.877316]                                                           ^
[   14.877603]  ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.878064]  ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.878589] ==================================================================
[   14.769009] ==================================================================
[   14.769639] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.770023] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278
[   14.770401] 
[   14.770515] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.770575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.770587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.770606] Call Trace:
[   14.770636]  <TASK>
[   14.770651]  dump_stack_lvl+0x73/0xb0
[   14.770756]  print_report+0xd1/0x650
[   14.770778]  ? __virt_addr_valid+0x1db/0x2d0
[   14.770800]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.770829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.770853]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.770882]  kasan_report+0x141/0x180
[   14.770904]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.770937]  kasan_check_range+0x10c/0x1c0
[   14.770961]  __kasan_check_write+0x18/0x20
[   14.770980]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.771009]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.771066]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.771100]  ? trace_hardirqs_on+0x37/0xe0
[   14.771124]  ? kasan_bitops_generic+0x92/0x1c0
[   14.771153]  kasan_bitops_generic+0x121/0x1c0
[   14.771194]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.771222]  ? __pfx_read_tsc+0x10/0x10
[   14.771258]  ? ktime_get_ts64+0x86/0x230
[   14.771291]  kunit_try_run_case+0x1a5/0x480
[   14.771315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.771338]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.771363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.771387]  ? __kthread_parkme+0x82/0x180
[   14.771407]  ? preempt_count_sub+0x50/0x80
[   14.771433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.771458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.771484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.771509]  kthread+0x337/0x6f0
[   14.771529]  ? trace_preempt_on+0x20/0xc0
[   14.771551]  ? __pfx_kthread+0x10/0x10
[   14.771571]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.771592]  ? calculate_sigpending+0x7b/0xa0
[   14.771616]  ? __pfx_kthread+0x10/0x10
[   14.771638]  ret_from_fork+0x116/0x1d0
[   14.771656]  ? __pfx_kthread+0x10/0x10
[   14.771676]  ret_from_fork_asm+0x1a/0x30
[   14.771716]  </TASK>
[   14.771725] 
[   14.781518] Allocated by task 278:
[   14.781690]  kasan_save_stack+0x45/0x70
[   14.781894]  kasan_save_track+0x18/0x40
[   14.782748]  kasan_save_alloc_info+0x3b/0x50
[   14.783205]  __kasan_kmalloc+0xb7/0xc0
[   14.783616]  __kmalloc_cache_noprof+0x189/0x420
[   14.783796]  kasan_bitops_generic+0x92/0x1c0
[   14.783951]  kunit_try_run_case+0x1a5/0x480
[   14.784106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.784284]  kthread+0x337/0x6f0
[   14.784410]  ret_from_fork+0x116/0x1d0
[   14.784544]  ret_from_fork_asm+0x1a/0x30
[   14.784683] 
[   14.785404] The buggy address belongs to the object at ffff88810226cfe0
[   14.785404]  which belongs to the cache kmalloc-16 of size 16
[   14.787113] The buggy address is located 8 bytes inside of
[   14.787113]  allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9)
[   14.788605] 
[   14.788947] The buggy address belongs to the physical page:
[   14.789722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c
[   14.790790] flags: 0x200000000000000(node=0|zone=2)
[   14.791017] page_type: f5(slab)
[   14.791416] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.791868] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.792319] page dumped because: kasan: bad access detected
[   14.792662] 
[   14.792757] Memory state around the buggy address:
[   14.793239]  ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc
[   14.793559]  ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.793827] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.794409]                                                           ^
[   14.794780]  ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.795153]  ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.795733] ==================================================================
[   14.933724] ==================================================================
[   14.933971] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.934668] Read of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278
[   14.934993] 
[   14.935092] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.935135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.935147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.935166] Call Trace:
[   14.935183]  <TASK>
[   14.935198]  dump_stack_lvl+0x73/0xb0
[   14.935227]  print_report+0xd1/0x650
[   14.935248]  ? __virt_addr_valid+0x1db/0x2d0
[   14.935271]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.935300]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.935323]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.935352]  kasan_report+0x141/0x180
[   14.935374]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.935407]  kasan_check_range+0x10c/0x1c0
[   14.935431]  __kasan_check_read+0x15/0x20
[   14.935450]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.935479]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.935509]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.935533]  ? trace_hardirqs_on+0x37/0xe0
[   14.935556]  ? kasan_bitops_generic+0x92/0x1c0
[   14.935584]  kasan_bitops_generic+0x121/0x1c0
[   14.935607]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.935632]  ? __pfx_read_tsc+0x10/0x10
[   14.935653]  ? ktime_get_ts64+0x86/0x230
[   14.935677]  kunit_try_run_case+0x1a5/0x480
[   14.935994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.936038]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.936072]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.936110]  ? __kthread_parkme+0x82/0x180
[   14.936131]  ? preempt_count_sub+0x50/0x80
[   14.936155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.936179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.936204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.936230]  kthread+0x337/0x6f0
[   14.936249]  ? trace_preempt_on+0x20/0xc0
[   14.936272]  ? __pfx_kthread+0x10/0x10
[   14.936293]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.936319]  ? calculate_sigpending+0x7b/0xa0
[   14.936343]  ? __pfx_kthread+0x10/0x10
[   14.936364]  ret_from_fork+0x116/0x1d0
[   14.936383]  ? __pfx_kthread+0x10/0x10
[   14.936404]  ret_from_fork_asm+0x1a/0x30
[   14.936435]  </TASK>
[   14.936445] 
[   14.948534] Allocated by task 278:
[   14.948726]  kasan_save_stack+0x45/0x70
[   14.948909]  kasan_save_track+0x18/0x40
[   14.949093]  kasan_save_alloc_info+0x3b/0x50
[   14.949581]  __kasan_kmalloc+0xb7/0xc0
[   14.949757]  __kmalloc_cache_noprof+0x189/0x420
[   14.949993]  kasan_bitops_generic+0x92/0x1c0
[   14.950262]  kunit_try_run_case+0x1a5/0x480
[   14.950462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.950695]  kthread+0x337/0x6f0
[   14.950868]  ret_from_fork+0x116/0x1d0
[   14.951030]  ret_from_fork_asm+0x1a/0x30
[   14.951814] 
[   14.951911] The buggy address belongs to the object at ffff88810226cfe0
[   14.951911]  which belongs to the cache kmalloc-16 of size 16
[   14.952742] The buggy address is located 8 bytes inside of
[   14.952742]  allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9)
[   14.953459] 
[   14.953567] The buggy address belongs to the physical page:
[   14.953821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c
[   14.954376] flags: 0x200000000000000(node=0|zone=2)
[   14.954599] page_type: f5(slab)
[   14.954903] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.955579] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.956266] page dumped because: kasan: bad access detected
[   14.956755] 
[   14.956831] Memory state around the buggy address:
[   14.956989]  ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc
[   14.957993]  ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.958862] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.959573]                                                           ^
[   14.960013]  ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.960812]  ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.961033] ==================================================================
[   14.879333] ==================================================================
[   14.879775] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.880298] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278
[   14.881012] 
[   14.881166] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.881208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.881220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.881240] Call Trace:
[   14.881255]  <TASK>
[   14.881269]  dump_stack_lvl+0x73/0xb0
[   14.881435]  print_report+0xd1/0x650
[   14.881460]  ? __virt_addr_valid+0x1db/0x2d0
[   14.881483]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.881512]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.881536]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.881566]  kasan_report+0x141/0x180
[   14.881587]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.881622]  kasan_check_range+0x10c/0x1c0
[   14.881645]  __kasan_check_write+0x18/0x20
[   14.881664]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.881694]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.881738]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.881762]  ? trace_hardirqs_on+0x37/0xe0
[   14.881784]  ? kasan_bitops_generic+0x92/0x1c0
[   14.881812]  kasan_bitops_generic+0x121/0x1c0
[   14.881837]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.881862]  ? __pfx_read_tsc+0x10/0x10
[   14.881883]  ? ktime_get_ts64+0x86/0x230
[   14.881908]  kunit_try_run_case+0x1a5/0x480
[   14.881931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.881954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.881979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.882003]  ? __kthread_parkme+0x82/0x180
[   14.882023]  ? preempt_count_sub+0x50/0x80
[   14.882046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.882070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.882095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.882119]  kthread+0x337/0x6f0
[   14.882138]  ? trace_preempt_on+0x20/0xc0
[   14.882162]  ? __pfx_kthread+0x10/0x10
[   14.882182]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.882223]  ? calculate_sigpending+0x7b/0xa0
[   14.882260]  ? __pfx_kthread+0x10/0x10
[   14.882281]  ret_from_fork+0x116/0x1d0
[   14.882299]  ? __pfx_kthread+0x10/0x10
[   14.882319]  ret_from_fork_asm+0x1a/0x30
[   14.882350]  </TASK>
[   14.882360] 
[   14.893246] Allocated by task 278:
[   14.893806]  kasan_save_stack+0x45/0x70
[   14.894015]  kasan_save_track+0x18/0x40
[   14.894201]  kasan_save_alloc_info+0x3b/0x50
[   14.894512]  __kasan_kmalloc+0xb7/0xc0
[   14.894853]  __kmalloc_cache_noprof+0x189/0x420
[   14.895026]  kasan_bitops_generic+0x92/0x1c0
[   14.895367]  kunit_try_run_case+0x1a5/0x480
[   14.895657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.895934]  kthread+0x337/0x6f0
[   14.896192]  ret_from_fork+0x116/0x1d0
[   14.896498]  ret_from_fork_asm+0x1a/0x30
[   14.896676] 
[   14.896784] The buggy address belongs to the object at ffff88810226cfe0
[   14.896784]  which belongs to the cache kmalloc-16 of size 16
[   14.897520] The buggy address is located 8 bytes inside of
[   14.897520]  allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9)
[   14.898095] 
[   14.898269] The buggy address belongs to the physical page:
[   14.898681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c
[   14.899171] flags: 0x200000000000000(node=0|zone=2)
[   14.899407] page_type: f5(slab)
[   14.899610] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.899907] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.900136] page dumped because: kasan: bad access detected
[   14.900306] 
[   14.900387] Memory state around the buggy address:
[   14.900724]  ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc
[   14.901048]  ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.901369] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.901677]                                                           ^
[   14.902492]  ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.902773]  ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.903292] ==================================================================
[   14.903977] ==================================================================
[   14.904230] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.905084] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278
[   14.905557] 
[   14.905797] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.905842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.905853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.905873] Call Trace:
[   14.905886]  <TASK>
[   14.905900]  dump_stack_lvl+0x73/0xb0
[   14.905930]  print_report+0xd1/0x650
[   14.905951]  ? __virt_addr_valid+0x1db/0x2d0
[   14.905974]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.906003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.906026]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.906239]  kasan_report+0x141/0x180
[   14.906262]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.906296]  kasan_check_range+0x10c/0x1c0
[   14.906319]  __kasan_check_write+0x18/0x20
[   14.906339]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.906369]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.906399]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.906423]  ? trace_hardirqs_on+0x37/0xe0
[   14.906448]  ? kasan_bitops_generic+0x92/0x1c0
[   14.906475]  kasan_bitops_generic+0x121/0x1c0
[   14.906499]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.906524]  ? __pfx_read_tsc+0x10/0x10
[   14.906546]  ? ktime_get_ts64+0x86/0x230
[   14.906569]  kunit_try_run_case+0x1a5/0x480
[   14.906592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.906615]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.906640]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.906663]  ? __kthread_parkme+0x82/0x180
[   14.906684]  ? preempt_count_sub+0x50/0x80
[   14.906723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.906748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.906773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.906798]  kthread+0x337/0x6f0
[   14.906817]  ? trace_preempt_on+0x20/0xc0
[   14.906839]  ? __pfx_kthread+0x10/0x10
[   14.906860]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.906882]  ? calculate_sigpending+0x7b/0xa0
[   14.906906]  ? __pfx_kthread+0x10/0x10
[   14.906927]  ret_from_fork+0x116/0x1d0
[   14.906946]  ? __pfx_kthread+0x10/0x10
[   14.906966]  ret_from_fork_asm+0x1a/0x30
[   14.906997]  </TASK>
[   14.907006] 
[   14.917616] Allocated by task 278:
[   14.918008]  kasan_save_stack+0x45/0x70
[   14.918505]  kasan_save_track+0x18/0x40
[   14.918672]  kasan_save_alloc_info+0x3b/0x50
[   14.918891]  __kasan_kmalloc+0xb7/0xc0
[   14.919292]  __kmalloc_cache_noprof+0x189/0x420
[   14.919487]  kasan_bitops_generic+0x92/0x1c0
[   14.919747]  kunit_try_run_case+0x1a5/0x480
[   14.920096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.920551]  kthread+0x337/0x6f0
[   14.920865]  ret_from_fork+0x116/0x1d0
[   14.921016]  ret_from_fork_asm+0x1a/0x30
[   14.921212] 
[   14.921304] The buggy address belongs to the object at ffff88810226cfe0
[   14.921304]  which belongs to the cache kmalloc-16 of size 16
[   14.922137] The buggy address is located 8 bytes inside of
[   14.922137]  allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9)
[   14.924136] 
[   14.924352] The buggy address belongs to the physical page:
[   14.924531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c
[   14.924787] flags: 0x200000000000000(node=0|zone=2)
[   14.924951] page_type: f5(slab)
[   14.925071] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.925300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.925521] page dumped because: kasan: bad access detected
[   14.925691] 
[   14.927426] Memory state around the buggy address:
[   14.928773]  ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc
[   14.929676]  ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.930806] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.931572]                                                           ^
[   14.931852]  ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.932541]  ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.932820] ==================================================================
[   14.735416] ==================================================================
[   14.735785] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.736793] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278
[   14.737498] 
[   14.737935] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.737984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.737996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.738023] Call Trace:
[   14.738037]  <TASK>
[   14.738052]  dump_stack_lvl+0x73/0xb0
[   14.738082]  print_report+0xd1/0x650
[   14.738104]  ? __virt_addr_valid+0x1db/0x2d0
[   14.738126]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.738156]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.738179]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.738208]  kasan_report+0x141/0x180
[   14.738231]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.738264]  kasan_check_range+0x10c/0x1c0
[   14.738288]  __kasan_check_write+0x18/0x20
[   14.738307]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.738336]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.738366]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.738390]  ? trace_hardirqs_on+0x37/0xe0
[   14.738413]  ? kasan_bitops_generic+0x92/0x1c0
[   14.738440]  kasan_bitops_generic+0x121/0x1c0
[   14.738464]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.738490]  ? __pfx_read_tsc+0x10/0x10
[   14.738512]  ? ktime_get_ts64+0x86/0x230
[   14.738534]  kunit_try_run_case+0x1a5/0x480
[   14.738558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.738582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.738606]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.738630]  ? __kthread_parkme+0x82/0x180
[   14.738650]  ? preempt_count_sub+0x50/0x80
[   14.738674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.738699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.738735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.738760]  kthread+0x337/0x6f0
[   14.738779]  ? trace_preempt_on+0x20/0xc0
[   14.738801]  ? __pfx_kthread+0x10/0x10
[   14.738822]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.738844]  ? calculate_sigpending+0x7b/0xa0
[   14.738867]  ? __pfx_kthread+0x10/0x10
[   14.738890]  ret_from_fork+0x116/0x1d0
[   14.738908]  ? __pfx_kthread+0x10/0x10
[   14.738928]  ret_from_fork_asm+0x1a/0x30
[   14.738959]  </TASK>
[   14.738969] 
[   14.757215] Allocated by task 278:
[   14.757509]  kasan_save_stack+0x45/0x70
[   14.757759]  kasan_save_track+0x18/0x40
[   14.757978]  kasan_save_alloc_info+0x3b/0x50
[   14.758413]  __kasan_kmalloc+0xb7/0xc0
[   14.758695]  __kmalloc_cache_noprof+0x189/0x420
[   14.759109]  kasan_bitops_generic+0x92/0x1c0
[   14.759443]  kunit_try_run_case+0x1a5/0x480
[   14.759766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.760021]  kthread+0x337/0x6f0
[   14.760406]  ret_from_fork+0x116/0x1d0
[   14.760560]  ret_from_fork_asm+0x1a/0x30
[   14.760970] 
[   14.761252] The buggy address belongs to the object at ffff88810226cfe0
[   14.761252]  which belongs to the cache kmalloc-16 of size 16
[   14.761764] The buggy address is located 8 bytes inside of
[   14.761764]  allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9)
[   14.762170] 
[   14.762318] The buggy address belongs to the physical page:
[   14.762745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c
[   14.763372] flags: 0x200000000000000(node=0|zone=2)
[   14.763623] page_type: f5(slab)
[   14.763808] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.764322] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.764718] page dumped because: kasan: bad access detected
[   14.765079] 
[   14.765242] Memory state around the buggy address:
[   14.765425]  ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc
[   14.765944]  ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.766433] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.766875]                                                           ^
[   14.767403]  ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.767862]  ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.768395] ==================================================================
[   14.961382] ==================================================================
[   14.961613] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.961908] Read of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278
[   14.962329] 
[   14.962842] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.962890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.962902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.962922] Call Trace:
[   14.962937]  <TASK>
[   14.962953]  dump_stack_lvl+0x73/0xb0
[   14.962984]  print_report+0xd1/0x650
[   14.963006]  ? __virt_addr_valid+0x1db/0x2d0
[   14.963029]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.963059]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.963083]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.963112]  kasan_report+0x141/0x180
[   14.963135]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.963169]  __asan_report_load8_noabort+0x18/0x20
[   14.963194]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.963481]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.963518]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.963544]  ? trace_hardirqs_on+0x37/0xe0
[   14.963566]  ? kasan_bitops_generic+0x92/0x1c0
[   14.963595]  kasan_bitops_generic+0x121/0x1c0
[   14.963619]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.963644]  ? __pfx_read_tsc+0x10/0x10
[   14.963666]  ? ktime_get_ts64+0x86/0x230
[   14.963690]  kunit_try_run_case+0x1a5/0x480
[   14.963728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.963751]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.963776]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.963800]  ? __kthread_parkme+0x82/0x180
[   14.963821]  ? preempt_count_sub+0x50/0x80
[   14.963845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.963870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.963894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.963920]  kthread+0x337/0x6f0
[   14.963939]  ? trace_preempt_on+0x20/0xc0
[   14.963962]  ? __pfx_kthread+0x10/0x10
[   14.963983]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.964004]  ? calculate_sigpending+0x7b/0xa0
[   14.964040]  ? __pfx_kthread+0x10/0x10
[   14.964063]  ret_from_fork+0x116/0x1d0
[   14.964107]  ? __pfx_kthread+0x10/0x10
[   14.964128]  ret_from_fork_asm+0x1a/0x30
[   14.964158]  </TASK>
[   14.964169] 
[   14.975168] Allocated by task 278:
[   14.975819]  kasan_save_stack+0x45/0x70
[   14.975990]  kasan_save_track+0x18/0x40
[   14.976392]  kasan_save_alloc_info+0x3b/0x50
[   14.976601]  __kasan_kmalloc+0xb7/0xc0
[   14.976791]  __kmalloc_cache_noprof+0x189/0x420
[   14.976993]  kasan_bitops_generic+0x92/0x1c0
[   14.977444]  kunit_try_run_case+0x1a5/0x480
[   14.977608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.977958]  kthread+0x337/0x6f0
[   14.978147]  ret_from_fork+0x116/0x1d0
[   14.978515]  ret_from_fork_asm+0x1a/0x30
[   14.978798] 
[   14.978884] The buggy address belongs to the object at ffff88810226cfe0
[   14.978884]  which belongs to the cache kmalloc-16 of size 16
[   14.979770] The buggy address is located 8 bytes inside of
[   14.979770]  allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9)
[   14.980382] 
[   14.980476] The buggy address belongs to the physical page:
[   14.980715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c
[   14.981345] flags: 0x200000000000000(node=0|zone=2)
[   14.981573] page_type: f5(slab)
[   14.981720] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.982259] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.982618] page dumped because: kasan: bad access detected
[   14.982859] 
[   14.982954] Memory state around the buggy address:
[   14.983154]  ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc
[   14.983811]  ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.984323] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.984714]                                                           ^
[   14.985050]  ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.985330]  ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.985641] ==================================================================