Hay
Date
July 19, 2025, 11:11 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.588226] ==================================================================
[   17.588291] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   17.588346] Write of size 8 at addr fff00000c5f9c4e8 by task kunit_try_catch/262
[   17.588397] 
[   17.588435] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.588518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.589424] Hardware name: linux,dummy-virt (DT)
[   17.589768] Call trace:
[   17.589812]  show_stack+0x20/0x38 (C)
[   17.590151]  dump_stack_lvl+0x8c/0xd0
[   17.590332]  print_report+0x118/0x5d0
[   17.590576]  kasan_report+0xdc/0x128
[   17.590641]  kasan_check_range+0x100/0x1a8
[   17.590833]  __kasan_check_write+0x20/0x30
[   17.591044]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   17.591144]  kasan_bitops_generic+0x110/0x1c8
[   17.591451]  kunit_try_run_case+0x170/0x3f0
[   17.591517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.592172]  kthread+0x328/0x630
[   17.592589]  ret_from_fork+0x10/0x20
[   17.592722] 
[   17.592745] Allocated by task 262:
[   17.592952]  kasan_save_stack+0x3c/0x68
[   17.593452]  kasan_save_track+0x20/0x40
[   17.593690]  kasan_save_alloc_info+0x40/0x58
[   17.593886]  __kasan_kmalloc+0xd4/0xd8
[   17.593940]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.594101]  kasan_bitops_generic+0xa0/0x1c8
[   17.594296]  kunit_try_run_case+0x170/0x3f0
[   17.594430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.594576]  kthread+0x328/0x630
[   17.594635]  ret_from_fork+0x10/0x20
[   17.594686] 
[   17.594963] The buggy address belongs to the object at fff00000c5f9c4e0
[   17.594963]  which belongs to the cache kmalloc-16 of size 16
[   17.595146] The buggy address is located 8 bytes inside of
[   17.595146]  allocated 9-byte region [fff00000c5f9c4e0, fff00000c5f9c4e9)
[   17.595214] 
[   17.595583] The buggy address belongs to the physical page:
[   17.595948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9c
[   17.596224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.596375] page_type: f5(slab)
[   17.596497] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.596689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.596942] page dumped because: kasan: bad access detected
[   17.597081] 
[   17.597147] Memory state around the buggy address:
[   17.597186]  fff00000c5f9c380: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   17.597497]  fff00000c5f9c400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.597732] >fff00000c5f9c480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   17.597787]                                                           ^
[   17.598171]  fff00000c5f9c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.598515]  fff00000c5f9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.598664] ==================================================================
[   17.601219] ==================================================================
[   17.601551] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   17.601715] Read of size 8 at addr fff00000c5f9c4e8 by task kunit_try_catch/262
[   17.601794] 
[   17.601877] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.601966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.602311] Hardware name: linux,dummy-virt (DT)
[   17.602390] Call trace:
[   17.602477]  show_stack+0x20/0x38 (C)
[   17.602562]  dump_stack_lvl+0x8c/0xd0
[   17.602695]  print_report+0x118/0x5d0
[   17.602748]  kasan_report+0xdc/0x128
[   17.602795]  __asan_report_load8_noabort+0x20/0x30
[   17.602855]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   17.603072]  kasan_bitops_generic+0x110/0x1c8
[   17.603274]  kunit_try_run_case+0x170/0x3f0
[   17.603567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.603781]  kthread+0x328/0x630
[   17.603900]  ret_from_fork+0x10/0x20
[   17.604236] 
[   17.604428] Allocated by task 262:
[   17.604494]  kasan_save_stack+0x3c/0x68
[   17.604610]  kasan_save_track+0x20/0x40
[   17.604768]  kasan_save_alloc_info+0x40/0x58
[   17.605017]  __kasan_kmalloc+0xd4/0xd8
[   17.605217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.605341]  kasan_bitops_generic+0xa0/0x1c8
[   17.605476]  kunit_try_run_case+0x170/0x3f0
[   17.605597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.605683]  kthread+0x328/0x630
[   17.605725]  ret_from_fork+0x10/0x20
[   17.605770] 
[   17.605964] The buggy address belongs to the object at fff00000c5f9c4e0
[   17.605964]  which belongs to the cache kmalloc-16 of size 16
[   17.606140] The buggy address is located 8 bytes inside of
[   17.606140]  allocated 9-byte region [fff00000c5f9c4e0, fff00000c5f9c4e9)
[   17.606646] 
[   17.606727] The buggy address belongs to the physical page:
[   17.606864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f9c
[   17.606960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.607102] page_type: f5(slab)
[   17.607180] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.607476] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.607628] page dumped because: kasan: bad access detected
[   17.607791] 
[   17.607871] Memory state around the buggy address:
[   17.607958]  fff00000c5f9c380: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   17.608078]  fff00000c5f9c400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.608165] >fff00000c5f9c480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   17.608398]                                                           ^
[   17.608719]  fff00000c5f9c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.608801]  fff00000c5f9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.608922] ==================================================================
[   17.610359] ==================================================================
[   17.610420] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   17.610477] Write of size 8 at addr fff00000c5f9c4e8 by task kunit_try_catch/262
[   17.610526] 
[   17.610665] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.610756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.610808] Hardware name: linux,dummy-virt (DT)
[   17.610850] Call trace:
[   17.610881]  show_stack+0x20/0x38 (C)
[   17.610932]  dump_stack_lvl+0x8c/0xd0
[   17.610982]  print_report+0x118/0x5d0
[   17.611032]  kasan_report+0xdc/0x128
[   17.611080]  kasan_check_range+0x100/0x1a8
[   17.611128]  __kasan_check_write+0x20/0x30
[   17.611175]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   17.611227]  kasan_bitops_generic+0x110/0x1c8
[   17.611276]  kunit_try_run_case+0x170/0x3f0
[   17.611325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.611379]  kthread+0x328/0x630
[   17.611422]  ret_from_fork+0x10/0x20
[   17.611471] 
[   17.611491] Allocated by task 262:
[   17.611519]  kasan_save_stack+0x3c/0x68
[   17.612174]  kasan_save_track+0x20/0x40
[   17.612248]  kasan_save_alloc_info+0x40/0x58
[   17.612338]  __kasan_kmalloc+0xd4/0xd8
[   17.612382]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.612509]  kunit_try_run_case+0x170/0x3f0
[   17.613847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.614644]  fff00000c5f9c400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.615853]  fff00000c5f9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.616974] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   17.618709]  print_report+0x118/0x5d0
[   17.619170]  kasan_bitops_generic+0x110/0x1c8
[   17.621620]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.623368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.624948] >fff00000c5f9c480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   17.625465]  fff00000c5f9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.627669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.627830]  dump_stack_lvl+0x8c/0xd0
[   17.628132]  kasan_check_range+0x100/0x1a8
[   17.628296]  kasan_bitops_generic+0x110/0x1c8
[   17.628780] 
[   17.629128]  kasan_save_track+0x20/0x40
[   17.629574]  kasan_bitops_generic+0xa0/0x1c8
[   17.630749] 
[   17.631092] page_type: f5(slab)
[   17.632320]  fff00000c5f9c380: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   17.632782]  fff00000c5f9c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.634517] 
[   17.635002] Hardware name: linux,dummy-virt (DT)
[   17.636065]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   17.637415] Allocated by task 262:
[   17.638452] 
[   17.638564] The buggy address is located 8 bytes inside of
[   17.638564]  allocated 9-byte region [fff00000c5f9c4e0, fff00000c5f9c4e9)
[   17.638991] page dumped because: kasan: bad access detected
[   17.639208] >fff00000c5f9c480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   17.640940] ==================================================================

[   14.047550] ==================================================================
[   14.048007] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.048396] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.048707] 
[   14.048811] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.048860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.048871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.048894] Call Trace:
[   14.048906]  <TASK>
[   14.048924]  dump_stack_lvl+0x73/0xb0
[   14.048953]  print_report+0xd1/0x610
[   14.048976]  ? __virt_addr_valid+0x1db/0x2d0
[   14.049000]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.049025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.049048]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.049074]  kasan_report+0x141/0x180
[   14.049095]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.049125]  kasan_check_range+0x10c/0x1c0
[   14.049148]  __kasan_check_write+0x18/0x20
[   14.049167]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.049193]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.049221]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.049246]  ? trace_hardirqs_on+0x37/0xe0
[   14.049268]  ? kasan_bitops_generic+0x92/0x1c0
[   14.049296]  kasan_bitops_generic+0x116/0x1c0
[   14.049319]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.049345]  ? __pfx_read_tsc+0x10/0x10
[   14.049366]  ? ktime_get_ts64+0x86/0x230
[   14.049390]  kunit_try_run_case+0x1a5/0x480
[   14.049415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.049437]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.049481]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.049514]  ? __kthread_parkme+0x82/0x180
[   14.049536]  ? preempt_count_sub+0x50/0x80
[   14.049561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.049585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.049609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.049632]  kthread+0x337/0x6f0
[   14.049652]  ? trace_preempt_on+0x20/0xc0
[   14.049673]  ? __pfx_kthread+0x10/0x10
[   14.049692]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.049714]  ? calculate_sigpending+0x7b/0xa0
[   14.049739]  ? __pfx_kthread+0x10/0x10
[   14.049760]  ret_from_fork+0x116/0x1d0
[   14.049780]  ? __pfx_kthread+0x10/0x10
[   14.049800]  ret_from_fork_asm+0x1a/0x30
[   14.049831]  </TASK>
[   14.049841] 
[   14.060142] Allocated by task 279:
[   14.060411]  kasan_save_stack+0x45/0x70
[   14.061119]  kasan_save_track+0x18/0x40
[   14.061434]  kasan_save_alloc_info+0x3b/0x50
[   14.061667]  __kasan_kmalloc+0xb7/0xc0
[   14.062014]  __kmalloc_cache_noprof+0x189/0x420
[   14.062480]  kasan_bitops_generic+0x92/0x1c0
[   14.062779]  kunit_try_run_case+0x1a5/0x480
[   14.062941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.063215]  kthread+0x337/0x6f0
[   14.063646]  ret_from_fork+0x116/0x1d0
[   14.063832]  ret_from_fork_asm+0x1a/0x30
[   14.064000] 
[   14.064095] The buggy address belongs to the object at ffff888101642a40
[   14.064095]  which belongs to the cache kmalloc-16 of size 16
[   14.064981] The buggy address is located 8 bytes inside of
[   14.064981]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.065736] 
[   14.065999] The buggy address belongs to the physical page:
[   14.066510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.066861] flags: 0x200000000000000(node=0|zone=2)
[   14.067359] page_type: f5(slab)
[   14.067545] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.067924] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.068390] page dumped because: kasan: bad access detected
[   14.068737] 
[   14.068839] Memory state around the buggy address:
[   14.069028]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.069399]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.069740] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.069969]                                               ^
[   14.070509]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.070841]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.071414] ==================================================================
[   14.160173] ==================================================================
[   14.160639] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.161521] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.161844] 
[   14.161950] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.161998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.162009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.162031] Call Trace:
[   14.162044]  <TASK>
[   14.162064]  dump_stack_lvl+0x73/0xb0
[   14.162095]  print_report+0xd1/0x610
[   14.162118]  ? __virt_addr_valid+0x1db/0x2d0
[   14.162141]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.162170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.162199]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.162225]  kasan_report+0x141/0x180
[   14.162248]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.162278]  kasan_check_range+0x10c/0x1c0
[   14.162303]  __kasan_check_write+0x18/0x20
[   14.162323]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.162349]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.162376]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.162401]  ? trace_hardirqs_on+0x37/0xe0
[   14.162699]  ? kasan_bitops_generic+0x92/0x1c0
[   14.162728]  kasan_bitops_generic+0x116/0x1c0
[   14.162752]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.162778]  ? __pfx_read_tsc+0x10/0x10
[   14.162798]  ? ktime_get_ts64+0x86/0x230
[   14.162822]  kunit_try_run_case+0x1a5/0x480
[   14.162846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.162869]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.162894]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.162918]  ? __kthread_parkme+0x82/0x180
[   14.162939]  ? preempt_count_sub+0x50/0x80
[   14.162963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.162986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.163009]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.163033]  kthread+0x337/0x6f0
[   14.163138]  ? trace_preempt_on+0x20/0xc0
[   14.163161]  ? __pfx_kthread+0x10/0x10
[   14.163181]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.163202]  ? calculate_sigpending+0x7b/0xa0
[   14.163226]  ? __pfx_kthread+0x10/0x10
[   14.163247]  ret_from_fork+0x116/0x1d0
[   14.163265]  ? __pfx_kthread+0x10/0x10
[   14.163285]  ret_from_fork_asm+0x1a/0x30
[   14.163315]  </TASK>
[   14.163326] 
[   14.172005] Allocated by task 279:
[   14.172346]  kasan_save_stack+0x45/0x70
[   14.172575]  kasan_save_track+0x18/0x40
[   14.172772]  kasan_save_alloc_info+0x3b/0x50
[   14.172961]  __kasan_kmalloc+0xb7/0xc0
[   14.173218]  __kmalloc_cache_noprof+0x189/0x420
[   14.173380]  kasan_bitops_generic+0x92/0x1c0
[   14.173543]  kunit_try_run_case+0x1a5/0x480
[   14.173691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.173896]  kthread+0x337/0x6f0
[   14.174060]  ret_from_fork+0x116/0x1d0
[   14.174253]  ret_from_fork_asm+0x1a/0x30
[   14.174447] 
[   14.174549] The buggy address belongs to the object at ffff888101642a40
[   14.174549]  which belongs to the cache kmalloc-16 of size 16
[   14.175554] The buggy address is located 8 bytes inside of
[   14.175554]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.176034] 
[   14.176109] The buggy address belongs to the physical page:
[   14.176516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.176804] flags: 0x200000000000000(node=0|zone=2)
[   14.177042] page_type: f5(slab)
[   14.177375] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.177718] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.177978] page dumped because: kasan: bad access detected
[   14.178279] 
[   14.178513] Memory state around the buggy address:
[   14.178725]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.178993]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.179617] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.179908]                                               ^
[   14.180121]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.180341]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.180677] ==================================================================
[   14.100972] ==================================================================
[   14.101442] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.102284] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.102827] 
[   14.102942] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.102987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.102998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.103019] Call Trace:
[   14.103034]  <TASK>
[   14.103047]  dump_stack_lvl+0x73/0xb0
[   14.103077]  print_report+0xd1/0x610
[   14.103099]  ? __virt_addr_valid+0x1db/0x2d0
[   14.103120]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.103146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.103465]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.103493]  kasan_report+0x141/0x180
[   14.103532]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.103563]  kasan_check_range+0x10c/0x1c0
[   14.103586]  __kasan_check_write+0x18/0x20
[   14.103604]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.103630]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.103657]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.103680]  ? trace_hardirqs_on+0x37/0xe0
[   14.103703]  ? kasan_bitops_generic+0x92/0x1c0
[   14.103730]  kasan_bitops_generic+0x116/0x1c0
[   14.103752]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.103777]  ? __pfx_read_tsc+0x10/0x10
[   14.103797]  ? ktime_get_ts64+0x86/0x230
[   14.103820]  kunit_try_run_case+0x1a5/0x480
[   14.103844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.103866]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.103890]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.103913]  ? __kthread_parkme+0x82/0x180
[   14.103932]  ? preempt_count_sub+0x50/0x80
[   14.103955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.103980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.104003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.104027]  kthread+0x337/0x6f0
[   14.104084]  ? trace_preempt_on+0x20/0xc0
[   14.104106]  ? __pfx_kthread+0x10/0x10
[   14.104126]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.104147]  ? calculate_sigpending+0x7b/0xa0
[   14.104171]  ? __pfx_kthread+0x10/0x10
[   14.104192]  ret_from_fork+0x116/0x1d0
[   14.104210]  ? __pfx_kthread+0x10/0x10
[   14.104230]  ret_from_fork_asm+0x1a/0x30
[   14.104260]  </TASK>
[   14.104270] 
[   14.117677] Allocated by task 279:
[   14.117858]  kasan_save_stack+0x45/0x70
[   14.118441]  kasan_save_track+0x18/0x40
[   14.118752]  kasan_save_alloc_info+0x3b/0x50
[   14.119235]  __kasan_kmalloc+0xb7/0xc0
[   14.119422]  __kmalloc_cache_noprof+0x189/0x420
[   14.119611]  kasan_bitops_generic+0x92/0x1c0
[   14.119836]  kunit_try_run_case+0x1a5/0x480
[   14.120043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.120603]  kthread+0x337/0x6f0
[   14.120862]  ret_from_fork+0x116/0x1d0
[   14.121178]  ret_from_fork_asm+0x1a/0x30
[   14.121517] 
[   14.121860] The buggy address belongs to the object at ffff888101642a40
[   14.121860]  which belongs to the cache kmalloc-16 of size 16
[   14.122870] The buggy address is located 8 bytes inside of
[   14.122870]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.123768] 
[   14.123974] The buggy address belongs to the physical page:
[   14.124343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.124828] flags: 0x200000000000000(node=0|zone=2)
[   14.125079] page_type: f5(slab)
[   14.125487] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.125940] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.126648] page dumped because: kasan: bad access detected
[   14.126894] 
[   14.126973] Memory state around the buggy address:
[   14.127547]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.127910]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.128366] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.128829]                                               ^
[   14.129081]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.129733]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.130386] ==================================================================
[   14.181401] ==================================================================
[   14.182136] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.182574] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.182827] 
[   14.182919] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.182965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.182977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.182999] Call Trace:
[   14.183012]  <TASK>
[   14.183029]  dump_stack_lvl+0x73/0xb0
[   14.183058]  print_report+0xd1/0x610
[   14.183079]  ? __virt_addr_valid+0x1db/0x2d0
[   14.183102]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.183175]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.183199]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.183225]  kasan_report+0x141/0x180
[   14.183247]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.183278]  kasan_check_range+0x10c/0x1c0
[   14.183302]  __kasan_check_write+0x18/0x20
[   14.183321]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.183346]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.183374]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.183399]  ? trace_hardirqs_on+0x37/0xe0
[   14.183421]  ? kasan_bitops_generic+0x92/0x1c0
[   14.183447]  kasan_bitops_generic+0x116/0x1c0
[   14.183471]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.183507]  ? __pfx_read_tsc+0x10/0x10
[   14.183528]  ? ktime_get_ts64+0x86/0x230
[   14.183552]  kunit_try_run_case+0x1a5/0x480
[   14.183577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.183598]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.183622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.183646]  ? __kthread_parkme+0x82/0x180
[   14.183665]  ? preempt_count_sub+0x50/0x80
[   14.183689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.183712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.183735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.183759]  kthread+0x337/0x6f0
[   14.183777]  ? trace_preempt_on+0x20/0xc0
[   14.183798]  ? __pfx_kthread+0x10/0x10
[   14.183817]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.183838]  ? calculate_sigpending+0x7b/0xa0
[   14.183863]  ? __pfx_kthread+0x10/0x10
[   14.183882]  ret_from_fork+0x116/0x1d0
[   14.183901]  ? __pfx_kthread+0x10/0x10
[   14.183921]  ret_from_fork_asm+0x1a/0x30
[   14.183952]  </TASK>
[   14.183962] 
[   14.192834] Allocated by task 279:
[   14.193019]  kasan_save_stack+0x45/0x70
[   14.193353]  kasan_save_track+0x18/0x40
[   14.193651]  kasan_save_alloc_info+0x3b/0x50
[   14.193916]  __kasan_kmalloc+0xb7/0xc0
[   14.194061]  __kmalloc_cache_noprof+0x189/0x420
[   14.194222]  kasan_bitops_generic+0x92/0x1c0
[   14.194370]  kunit_try_run_case+0x1a5/0x480
[   14.194634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.194895]  kthread+0x337/0x6f0
[   14.195101]  ret_from_fork+0x116/0x1d0
[   14.195725]  ret_from_fork_asm+0x1a/0x30
[   14.195943] 
[   14.196040] The buggy address belongs to the object at ffff888101642a40
[   14.196040]  which belongs to the cache kmalloc-16 of size 16
[   14.196651] The buggy address is located 8 bytes inside of
[   14.196651]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.197185] 
[   14.197276] The buggy address belongs to the physical page:
[   14.197492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.197824] flags: 0x200000000000000(node=0|zone=2)
[   14.198094] page_type: f5(slab)
[   14.198260] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.198504] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.198836] page dumped because: kasan: bad access detected
[   14.199290] 
[   14.199392] Memory state around the buggy address:
[   14.199605]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.199869]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.200330] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.200639]                                               ^
[   14.200853]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.201233]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.201528] ==================================================================
[   14.201948] ==================================================================
[   14.202575] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.202836] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.203059] 
[   14.203143] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.203186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.203197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.203218] Call Trace:
[   14.203236]  <TASK>
[   14.203250]  dump_stack_lvl+0x73/0xb0
[   14.203277]  print_report+0xd1/0x610
[   14.203299]  ? __virt_addr_valid+0x1db/0x2d0
[   14.203323]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.203348]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.203371]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.203396]  kasan_report+0x141/0x180
[   14.203418]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.203449]  kasan_check_range+0x10c/0x1c0
[   14.203471]  __kasan_check_write+0x18/0x20
[   14.203490]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.203528]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.203555]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.203578]  ? trace_hardirqs_on+0x37/0xe0
[   14.203600]  ? kasan_bitops_generic+0x92/0x1c0
[   14.203639]  kasan_bitops_generic+0x116/0x1c0
[   14.203662]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.203687]  ? __pfx_read_tsc+0x10/0x10
[   14.203707]  ? ktime_get_ts64+0x86/0x230
[   14.203731]  kunit_try_run_case+0x1a5/0x480
[   14.203756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.203778]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.203802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.203825]  ? __kthread_parkme+0x82/0x180
[   14.203844]  ? preempt_count_sub+0x50/0x80
[   14.203868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.203891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.203914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.203938]  kthread+0x337/0x6f0
[   14.203957]  ? trace_preempt_on+0x20/0xc0
[   14.203978]  ? __pfx_kthread+0x10/0x10
[   14.203997]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.204018]  ? calculate_sigpending+0x7b/0xa0
[   14.204041]  ? __pfx_kthread+0x10/0x10
[   14.204062]  ret_from_fork+0x116/0x1d0
[   14.204080]  ? __pfx_kthread+0x10/0x10
[   14.204100]  ret_from_fork_asm+0x1a/0x30
[   14.204129]  </TASK>
[   14.204138] 
[   14.213320] Allocated by task 279:
[   14.213459]  kasan_save_stack+0x45/0x70
[   14.213672]  kasan_save_track+0x18/0x40
[   14.213989]  kasan_save_alloc_info+0x3b/0x50
[   14.214609]  __kasan_kmalloc+0xb7/0xc0
[   14.215015]  __kmalloc_cache_noprof+0x189/0x420
[   14.215428]  kasan_bitops_generic+0x92/0x1c0
[   14.215660]  kunit_try_run_case+0x1a5/0x480
[   14.215868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.216259]  kthread+0x337/0x6f0
[   14.216393]  ret_from_fork+0x116/0x1d0
[   14.216540]  ret_from_fork_asm+0x1a/0x30
[   14.216681] 
[   14.216756] The buggy address belongs to the object at ffff888101642a40
[   14.216756]  which belongs to the cache kmalloc-16 of size 16
[   14.217632] The buggy address is located 8 bytes inside of
[   14.217632]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.218090] 
[   14.218419] The buggy address belongs to the physical page:
[   14.218683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.218971] flags: 0x200000000000000(node=0|zone=2)
[   14.219312] page_type: f5(slab)
[   14.219487] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.219802] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.220144] page dumped because: kasan: bad access detected
[   14.220381] 
[   14.220449] Memory state around the buggy address:
[   14.220684]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.220967]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.221347] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.221640]                                               ^
[   14.221815]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.222030]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.222250] ==================================================================
[   14.222685] ==================================================================
[   14.223033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.223726] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.224521] 
[   14.224643] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.224689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.224701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.224722] Call Trace:
[   14.224741]  <TASK>
[   14.224758]  dump_stack_lvl+0x73/0xb0
[   14.224788]  print_report+0xd1/0x610
[   14.224809]  ? __virt_addr_valid+0x1db/0x2d0
[   14.224832]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.224858]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.224879]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.224905]  kasan_report+0x141/0x180
[   14.224926]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.224956]  kasan_check_range+0x10c/0x1c0
[   14.224980]  __kasan_check_write+0x18/0x20
[   14.224998]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.225024]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.225062]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.225086]  ? trace_hardirqs_on+0x37/0xe0
[   14.225109]  ? kasan_bitops_generic+0x92/0x1c0
[   14.225136]  kasan_bitops_generic+0x116/0x1c0
[   14.225159]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.225184]  ? __pfx_read_tsc+0x10/0x10
[   14.225253]  ? ktime_get_ts64+0x86/0x230
[   14.225278]  kunit_try_run_case+0x1a5/0x480
[   14.225303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.225325]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.225349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.225372]  ? __kthread_parkme+0x82/0x180
[   14.225393]  ? preempt_count_sub+0x50/0x80
[   14.225416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.225440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.225463]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.225486]  kthread+0x337/0x6f0
[   14.225516]  ? trace_preempt_on+0x20/0xc0
[   14.225537]  ? __pfx_kthread+0x10/0x10
[   14.225557]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.225578]  ? calculate_sigpending+0x7b/0xa0
[   14.225602]  ? __pfx_kthread+0x10/0x10
[   14.225623]  ret_from_fork+0x116/0x1d0
[   14.225642]  ? __pfx_kthread+0x10/0x10
[   14.225661]  ret_from_fork_asm+0x1a/0x30
[   14.225692]  </TASK>
[   14.225702] 
[   14.234015] Allocated by task 279:
[   14.234146]  kasan_save_stack+0x45/0x70
[   14.234377]  kasan_save_track+0x18/0x40
[   14.234579]  kasan_save_alloc_info+0x3b/0x50
[   14.234793]  __kasan_kmalloc+0xb7/0xc0
[   14.234986]  __kmalloc_cache_noprof+0x189/0x420
[   14.235203]  kasan_bitops_generic+0x92/0x1c0
[   14.235465]  kunit_try_run_case+0x1a5/0x480
[   14.235635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.235826]  kthread+0x337/0x6f0
[   14.235993]  ret_from_fork+0x116/0x1d0
[   14.236179]  ret_from_fork_asm+0x1a/0x30
[   14.236377] 
[   14.236462] The buggy address belongs to the object at ffff888101642a40
[   14.236462]  which belongs to the cache kmalloc-16 of size 16
[   14.236829] The buggy address is located 8 bytes inside of
[   14.236829]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.237181] 
[   14.237253] The buggy address belongs to the physical page:
[   14.237429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.238008] flags: 0x200000000000000(node=0|zone=2)
[   14.238613] page_type: f5(slab)
[   14.238809] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.239337] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.239941] page dumped because: kasan: bad access detected
[   14.240189] 
[   14.240297] Memory state around the buggy address:
[   14.240525]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.240850]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.241655] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.241883]                                               ^
[   14.242101]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.242839]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.243298] ==================================================================
[   14.071934] ==================================================================
[   14.072425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.072832] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.073149] 
[   14.073265] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.073323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.073335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.073355] Call Trace:
[   14.073370]  <TASK>
[   14.073385]  dump_stack_lvl+0x73/0xb0
[   14.073412]  print_report+0xd1/0x610
[   14.073434]  ? __virt_addr_valid+0x1db/0x2d0
[   14.073458]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.073485]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.073520]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.073548]  kasan_report+0x141/0x180
[   14.073571]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.073604]  kasan_check_range+0x10c/0x1c0
[   14.073628]  __kasan_check_write+0x18/0x20
[   14.073648]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.073673]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.073700]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.073727]  ? trace_hardirqs_on+0x37/0xe0
[   14.073749]  ? kasan_bitops_generic+0x92/0x1c0
[   14.073776]  kasan_bitops_generic+0x116/0x1c0
[   14.073800]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.073824]  ? __pfx_read_tsc+0x10/0x10
[   14.073844]  ? ktime_get_ts64+0x86/0x230
[   14.073868]  kunit_try_run_case+0x1a5/0x480
[   14.073893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.073915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.073939]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.073963]  ? __kthread_parkme+0x82/0x180
[   14.073983]  ? preempt_count_sub+0x50/0x80
[   14.074007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.074031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.074054]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.074078]  kthread+0x337/0x6f0
[   14.074096]  ? trace_preempt_on+0x20/0xc0
[   14.074119]  ? __pfx_kthread+0x10/0x10
[   14.074139]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.074250]  ? calculate_sigpending+0x7b/0xa0
[   14.074277]  ? __pfx_kthread+0x10/0x10
[   14.074297]  ret_from_fork+0x116/0x1d0
[   14.074317]  ? __pfx_kthread+0x10/0x10
[   14.074337]  ret_from_fork_asm+0x1a/0x30
[   14.074366]  </TASK>
[   14.074376] 
[   14.087165] Allocated by task 279:
[   14.087647]  kasan_save_stack+0x45/0x70
[   14.087964]  kasan_save_track+0x18/0x40
[   14.088369]  kasan_save_alloc_info+0x3b/0x50
[   14.088608]  __kasan_kmalloc+0xb7/0xc0
[   14.088788]  __kmalloc_cache_noprof+0x189/0x420
[   14.089005]  kasan_bitops_generic+0x92/0x1c0
[   14.089685]  kunit_try_run_case+0x1a5/0x480
[   14.089894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.090355]  kthread+0x337/0x6f0
[   14.090662]  ret_from_fork+0x116/0x1d0
[   14.090960]  ret_from_fork_asm+0x1a/0x30
[   14.091332] 
[   14.091632] The buggy address belongs to the object at ffff888101642a40
[   14.091632]  which belongs to the cache kmalloc-16 of size 16
[   14.092173] The buggy address is located 8 bytes inside of
[   14.092173]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.093006] 
[   14.093111] The buggy address belongs to the physical page:
[   14.094053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.094645] flags: 0x200000000000000(node=0|zone=2)
[   14.094917] page_type: f5(slab)
[   14.095093] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.095754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.096296] page dumped because: kasan: bad access detected
[   14.096638] 
[   14.096715] Memory state around the buggy address:
[   14.097267]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.097586]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.097860] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.098577]                                               ^
[   14.098824]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.099334]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.099781] ==================================================================
[   14.130942] ==================================================================
[   14.131837] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.132583] Write of size 8 at addr ffff888101642a48 by task kunit_try_catch/279
[   14.132969] 
[   14.133535] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.133589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.133601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.133624] Call Trace:
[   14.133646]  <TASK>
[   14.133666]  dump_stack_lvl+0x73/0xb0
[   14.133699]  print_report+0xd1/0x610
[   14.133722]  ? __virt_addr_valid+0x1db/0x2d0
[   14.133745]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.133771]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.133793]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.133820]  kasan_report+0x141/0x180
[   14.133841]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.133871]  kasan_check_range+0x10c/0x1c0
[   14.133894]  __kasan_check_write+0x18/0x20
[   14.133913]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.133939]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.133965]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.133990]  ? trace_hardirqs_on+0x37/0xe0
[   14.134013]  ? kasan_bitops_generic+0x92/0x1c0
[   14.134040]  kasan_bitops_generic+0x116/0x1c0
[   14.134063]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.134087]  ? __pfx_read_tsc+0x10/0x10
[   14.134107]  ? ktime_get_ts64+0x86/0x230
[   14.134131]  kunit_try_run_case+0x1a5/0x480
[   14.134155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.134177]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.134208]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.134243]  ? __kthread_parkme+0x82/0x180
[   14.134265]  ? preempt_count_sub+0x50/0x80
[   14.134293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.134318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.134341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.134366]  kthread+0x337/0x6f0
[   14.134384]  ? trace_preempt_on+0x20/0xc0
[   14.134405]  ? __pfx_kthread+0x10/0x10
[   14.134425]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.134446]  ? calculate_sigpending+0x7b/0xa0
[   14.134470]  ? __pfx_kthread+0x10/0x10
[   14.134491]  ret_from_fork+0x116/0x1d0
[   14.134520]  ? __pfx_kthread+0x10/0x10
[   14.134540]  ret_from_fork_asm+0x1a/0x30
[   14.134570]  </TASK>
[   14.134580] 
[   14.146815] Allocated by task 279:
[   14.147315]  kasan_save_stack+0x45/0x70
[   14.147636]  kasan_save_track+0x18/0x40
[   14.147815]  kasan_save_alloc_info+0x3b/0x50
[   14.148026]  __kasan_kmalloc+0xb7/0xc0
[   14.148669]  __kmalloc_cache_noprof+0x189/0x420
[   14.148892]  kasan_bitops_generic+0x92/0x1c0
[   14.149062]  kunit_try_run_case+0x1a5/0x480
[   14.149534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.149935]  kthread+0x337/0x6f0
[   14.150321]  ret_from_fork+0x116/0x1d0
[   14.150593]  ret_from_fork_asm+0x1a/0x30
[   14.150786] 
[   14.150872] The buggy address belongs to the object at ffff888101642a40
[   14.150872]  which belongs to the cache kmalloc-16 of size 16
[   14.151663] The buggy address is located 8 bytes inside of
[   14.151663]  allocated 9-byte region [ffff888101642a40, ffff888101642a49)
[   14.152743] 
[   14.152854] The buggy address belongs to the physical page:
[   14.153143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101642
[   14.153646] flags: 0x200000000000000(node=0|zone=2)
[   14.153888] page_type: f5(slab)
[   14.154036] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.154713] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.155162] page dumped because: kasan: bad access detected
[   14.155414] 
[   14.155486] Memory state around the buggy address:
[   14.155713]  ffff888101642900: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.156016]  ffff888101642980: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.156832] >ffff888101642a00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.157350]                                               ^
[   14.157618]  ffff888101642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.157862]  ffff888101642b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.158212] ==================================================================