Hay
Date
July 20, 2025, 11:12 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.788525] ==================================================================
[   17.788951] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   17.789168] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.789401] 
[   17.789469] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.789556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.789815] Hardware name: linux,dummy-virt (DT)
[   17.789972] Call trace:
[   17.790212]  show_stack+0x20/0x38 (C)
[   17.790430]  dump_stack_lvl+0x8c/0xd0
[   17.790589]  print_report+0x118/0x5d0
[   17.790907]  kasan_report+0xdc/0x128
[   17.790995]  kasan_check_range+0x100/0x1a8
[   17.791483]  __kasan_check_write+0x20/0x30
[   17.791570]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   17.791629]  kasan_bitops_generic+0x11c/0x1c8
[   17.791691]  kunit_try_run_case+0x170/0x3f0
[   17.791764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.791819]  kthread+0x328/0x630
[   17.791861]  ret_from_fork+0x10/0x20
[   17.791910] 
[   17.791943] Allocated by task 261:
[   17.791995]  kasan_save_stack+0x3c/0x68
[   17.792039]  kasan_save_track+0x20/0x40
[   17.792080]  kasan_save_alloc_info+0x40/0x58
[   17.792123]  __kasan_kmalloc+0xd4/0xd8
[   17.792162]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.792211]  kasan_bitops_generic+0xa0/0x1c8
[   17.792252]  kunit_try_run_case+0x170/0x3f0
[   17.792294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.792355]  kthread+0x328/0x630
[   17.792404]  ret_from_fork+0x10/0x20
[   17.792449] 
[   17.792470] The buggy address belongs to the object at fff00000c3fc6220
[   17.792470]  which belongs to the cache kmalloc-16 of size 16
[   17.792530] The buggy address is located 8 bytes inside of
[   17.792530]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.792619] 
[   17.792641] The buggy address belongs to the physical page:
[   17.792699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.792752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.792801] page_type: f5(slab)
[   17.792863] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.792931] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.792975] page dumped because: kasan: bad access detected
[   17.793009] 
[   17.793039] Memory state around the buggy address:
[   17.793072]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.793123]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.793167] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.793206]                                   ^
[   17.793242]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.793292]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.793351] ==================================================================
[   17.777283] ==================================================================
[   17.777497] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   17.777591] Read of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.777652] 
[   17.777811] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.777900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.778133] Hardware name: linux,dummy-virt (DT)
[   17.778181] Call trace:
[   17.778311]  show_stack+0x20/0x38 (C)
[   17.778447]  dump_stack_lvl+0x8c/0xd0
[   17.778654]  print_report+0x118/0x5d0
[   17.778735]  kasan_report+0xdc/0x128
[   17.778784]  __asan_report_load8_noabort+0x20/0x30
[   17.779258]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   17.779342]  kasan_bitops_generic+0x11c/0x1c8
[   17.779393]  kunit_try_run_case+0x170/0x3f0
[   17.779443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.779498]  kthread+0x328/0x630
[   17.779543]  ret_from_fork+0x10/0x20
[   17.780008] 
[   17.780743] Allocated by task 261:
[   17.780810]  kasan_save_stack+0x3c/0x68
[   17.780881]  kasan_save_track+0x20/0x40
[   17.781193]  kasan_save_alloc_info+0x40/0x58
[   17.781470]  __kasan_kmalloc+0xd4/0xd8
[   17.781577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.781714]  kasan_bitops_generic+0xa0/0x1c8
[   17.781781]  kunit_try_run_case+0x170/0x3f0
[   17.781856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.782198]  kthread+0x328/0x630
[   17.782649]  ret_from_fork+0x10/0x20
[   17.782744] 
[   17.782836] The buggy address belongs to the object at fff00000c3fc6220
[   17.782836]  which belongs to the cache kmalloc-16 of size 16
[   17.782901] The buggy address is located 8 bytes inside of
[   17.782901]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.783061] 
[   17.783253] The buggy address belongs to the physical page:
[   17.783592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.784080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.784266] page_type: f5(slab)
[   17.784325] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.784598] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.784996] page dumped because: kasan: bad access detected
[   17.785282] 
[   17.785311] Memory state around the buggy address:
[   17.785517]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.785784]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.785878] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.785928]                                   ^
[   17.786095]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.786149]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.786191] ==================================================================
[   17.747366] ==================================================================
[   17.747641] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   17.747714] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.747818] 
[   17.748267] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.748398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.748475] Hardware name: linux,dummy-virt (DT)
[   17.748695] Call trace:
[   17.748948]  show_stack+0x20/0x38 (C)
[   17.749018]  dump_stack_lvl+0x8c/0xd0
[   17.749230]  print_report+0x118/0x5d0
[   17.749685]  kasan_report+0xdc/0x128
[   17.749847]  kasan_check_range+0x100/0x1a8
[   17.750275]  __kasan_check_write+0x20/0x30
[   17.750765]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   17.750921]  kasan_bitops_generic+0x11c/0x1c8
[   17.751197]  kunit_try_run_case+0x170/0x3f0
[   17.751461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.751798]  kthread+0x328/0x630
[   17.751984]  ret_from_fork+0x10/0x20
[   17.752156] 
[   17.752199] Allocated by task 261:
[   17.752442]  kasan_save_stack+0x3c/0x68
[   17.752617]  kasan_save_track+0x20/0x40
[   17.752728]  kasan_save_alloc_info+0x40/0x58
[   17.752831]  __kasan_kmalloc+0xd4/0xd8
[   17.753057]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.753213]  kasan_bitops_generic+0xa0/0x1c8
[   17.753334]  kunit_try_run_case+0x170/0x3f0
[   17.753514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.753688]  kthread+0x328/0x630
[   17.753811]  ret_from_fork+0x10/0x20
[   17.753917] 
[   17.753960] The buggy address belongs to the object at fff00000c3fc6220
[   17.753960]  which belongs to the cache kmalloc-16 of size 16
[   17.754171] The buggy address is located 8 bytes inside of
[   17.754171]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.754425] 
[   17.754474] The buggy address belongs to the physical page:
[   17.754509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.754926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.755160] page_type: f5(slab)
[   17.755234] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.755564] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.755723] page dumped because: kasan: bad access detected
[   17.755761] 
[   17.755782] Memory state around the buggy address:
[   17.756070]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.756336]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.756699] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.756908]                                   ^
[   17.756951]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.756999]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.757042] ==================================================================
[   17.761584] ==================================================================
[   17.761658] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   17.761730] Read of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.761783] 
[   17.761830] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.761915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.761954] Hardware name: linux,dummy-virt (DT)
[   17.761990] Call trace:
[   17.762015]  show_stack+0x20/0x38 (C)
[   17.762066]  dump_stack_lvl+0x8c/0xd0
[   17.762118]  print_report+0x118/0x5d0
[   17.762169]  kasan_report+0xdc/0x128
[   17.762228]  __asan_report_load8_noabort+0x20/0x30
[   17.762283]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   17.762341]  kasan_bitops_generic+0x11c/0x1c8
[   17.762390]  kunit_try_run_case+0x170/0x3f0
[   17.762449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.762506]  kthread+0x328/0x630
[   17.762550]  ret_from_fork+0x10/0x20
[   17.762597] 
[   17.762627] Allocated by task 261:
[   17.762657]  kasan_save_stack+0x3c/0x68
[   17.762711]  kasan_save_track+0x20/0x40
[   17.762749]  kasan_save_alloc_info+0x40/0x58
[   17.762791]  __kasan_kmalloc+0xd4/0xd8
[   17.762829]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.762871]  kasan_bitops_generic+0xa0/0x1c8
[   17.762909]  kunit_try_run_case+0x170/0x3f0
[   17.762964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.764071]  kthread+0x328/0x630
[   17.764162]  ret_from_fork+0x10/0x20
[   17.764227] 
[   17.764249] The buggy address belongs to the object at fff00000c3fc6220
[   17.764249]  which belongs to the cache kmalloc-16 of size 16
[   17.764335] The buggy address is located 8 bytes inside of
[   17.764335]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.764410] 
[   17.764433] The buggy address belongs to the physical page:
[   17.764465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.764703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.764972] page_type: f5(slab)
[   17.765263] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.765349] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.765401] page dumped because: kasan: bad access detected
[   17.765436] 
[   17.765717] Memory state around the buggy address:
[   17.765985]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.766167]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.766243] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.766338]                                   ^
[   17.766375]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.766425]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.766829] ==================================================================
[   17.794457] ==================================================================
[   17.794510] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   17.794563] Read of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.794616] 
[   17.795206] Hardware name: linux,dummy-virt (DT)
[   17.800098]  kunit_try_run_case+0x170/0x3f0
[   17.801389] 
[   17.801764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.802361] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.803484] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.804354] ==================================================================
[   17.768049] ==================================================================
[   17.768111] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   17.768166] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.768450] 
[   17.768496] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.768684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.768720] Hardware name: linux,dummy-virt (DT)
[   17.768797] Call trace:
[   17.768825]  show_stack+0x20/0x38 (C)
[   17.768878]  dump_stack_lvl+0x8c/0xd0
[   17.769215]  print_report+0x118/0x5d0
[   17.769354]  kasan_report+0xdc/0x128
[   17.769438]  kasan_check_range+0x100/0x1a8
[   17.769534]  __kasan_check_write+0x20/0x30
[   17.769633]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   17.769707]  kasan_bitops_generic+0x11c/0x1c8
[   17.769757]  kunit_try_run_case+0x170/0x3f0
[   17.769813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.769869]  kthread+0x328/0x630
[   17.769915]  ret_from_fork+0x10/0x20
[   17.770491] 
[   17.770574] Allocated by task 261:
[   17.770612]  kasan_save_stack+0x3c/0x68
[   17.770670]  kasan_save_track+0x20/0x40
[   17.771202]  kasan_save_alloc_info+0x40/0x58
[   17.771294]  __kasan_kmalloc+0xd4/0xd8
[   17.771390]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.771583]  kasan_bitops_generic+0xa0/0x1c8
[   17.771634]  kunit_try_run_case+0x170/0x3f0
[   17.771781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.771940]  kthread+0x328/0x630
[   17.772177]  ret_from_fork+0x10/0x20
[   17.772295] 
[   17.772374] The buggy address belongs to the object at fff00000c3fc6220
[   17.772374]  which belongs to the cache kmalloc-16 of size 16
[   17.772517] The buggy address is located 8 bytes inside of
[   17.772517]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.772610] 
[   17.772787] The buggy address belongs to the physical page:
[   17.773036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.773172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.773284] page_type: f5(slab)
[   17.773393] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.773809] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.773877] page dumped because: kasan: bad access detected
[   17.774026] 
[   17.774125] Memory state around the buggy address:
[   17.774311]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.774390]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.774933] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.774990]                                   ^
[   17.775111]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.775174]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.775781] ==================================================================

[   14.647564] ==================================================================
[   14.647921] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.648461] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.648884] 
[   14.649131] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.649173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.649185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.649205] Call Trace:
[   14.649216]  <TASK>
[   14.649229]  dump_stack_lvl+0x73/0xb0
[   14.649256]  print_report+0xd1/0x610
[   14.649277]  ? __virt_addr_valid+0x1db/0x2d0
[   14.649297]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.649323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.649343]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.649402]  kasan_report+0x141/0x180
[   14.649424]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.649465]  kasan_check_range+0x10c/0x1c0
[   14.649488]  __kasan_check_write+0x18/0x20
[   14.649506]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.649542]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.649569]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.649594]  ? trace_hardirqs_on+0x37/0xe0
[   14.649615]  ? kasan_bitops_generic+0x92/0x1c0
[   14.649640]  kasan_bitops_generic+0x121/0x1c0
[   14.649663]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.649715]  ? __pfx_read_tsc+0x10/0x10
[   14.649735]  ? ktime_get_ts64+0x86/0x230
[   14.649758]  kunit_try_run_case+0x1a5/0x480
[   14.649791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.649813]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.649836]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.649857]  ? __kthread_parkme+0x82/0x180
[   14.649900]  ? preempt_count_sub+0x50/0x80
[   14.649933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.649956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.650006]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.650030]  kthread+0x337/0x6f0
[   14.650049]  ? trace_preempt_on+0x20/0xc0
[   14.650080]  ? __pfx_kthread+0x10/0x10
[   14.650100]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.650119]  ? calculate_sigpending+0x7b/0xa0
[   14.650142]  ? __pfx_kthread+0x10/0x10
[   14.650187]  ret_from_fork+0x116/0x1d0
[   14.650205]  ? __pfx_kthread+0x10/0x10
[   14.650223]  ret_from_fork_asm+0x1a/0x30
[   14.650264]  </TASK>
[   14.650275] 
[   14.658877] Allocated by task 279:
[   14.659047]  kasan_save_stack+0x45/0x70
[   14.659265]  kasan_save_track+0x18/0x40
[   14.659485]  kasan_save_alloc_info+0x3b/0x50
[   14.659747]  __kasan_kmalloc+0xb7/0xc0
[   14.659976]  __kmalloc_cache_noprof+0x189/0x420
[   14.660239]  kasan_bitops_generic+0x92/0x1c0
[   14.660526]  kunit_try_run_case+0x1a5/0x480
[   14.660670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.660930]  kthread+0x337/0x6f0
[   14.661059]  ret_from_fork+0x116/0x1d0
[   14.661241]  ret_from_fork_asm+0x1a/0x30
[   14.661432] 
[   14.661539] The buggy address belongs to the object at ffff888100fffac0
[   14.661539]  which belongs to the cache kmalloc-16 of size 16
[   14.662095] The buggy address is located 8 bytes inside of
[   14.662095]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.662606] 
[   14.662712] The buggy address belongs to the physical page:
[   14.662968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.663332] flags: 0x200000000000000(node=0|zone=2)
[   14.663563] page_type: f5(slab)
[   14.663770] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.664137] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.664481] page dumped because: kasan: bad access detected
[   14.664762] 
[   14.664854] Memory state around the buggy address:
[   14.665112]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.665356]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.665697] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.666021]                                               ^
[   14.666276]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.666603]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.666964] ==================================================================
[   14.535166] ==================================================================
[   14.535541] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.536326] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.537026] 
[   14.537246] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.537287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.537298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.537318] Call Trace:
[   14.537334]  <TASK>
[   14.537348]  dump_stack_lvl+0x73/0xb0
[   14.537373]  print_report+0xd1/0x610
[   14.537394]  ? __virt_addr_valid+0x1db/0x2d0
[   14.537415]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.537441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.537462]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.537488]  kasan_report+0x141/0x180
[   14.537519]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.537550]  kasan_check_range+0x10c/0x1c0
[   14.537572]  __kasan_check_write+0x18/0x20
[   14.537590]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.537616]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.537643]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.537666]  ? trace_hardirqs_on+0x37/0xe0
[   14.537714]  ? kasan_bitops_generic+0x92/0x1c0
[   14.537740]  kasan_bitops_generic+0x121/0x1c0
[   14.537957]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.537981]  ? __pfx_read_tsc+0x10/0x10
[   14.538001]  ? ktime_get_ts64+0x86/0x230
[   14.538023]  kunit_try_run_case+0x1a5/0x480
[   14.538046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.538068]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.538090]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.538113]  ? __kthread_parkme+0x82/0x180
[   14.538131]  ? preempt_count_sub+0x50/0x80
[   14.538153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.538176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.538197]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.538220]  kthread+0x337/0x6f0
[   14.538239]  ? trace_preempt_on+0x20/0xc0
[   14.538260]  ? __pfx_kthread+0x10/0x10
[   14.538280]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.538300]  ? calculate_sigpending+0x7b/0xa0
[   14.538322]  ? __pfx_kthread+0x10/0x10
[   14.538342]  ret_from_fork+0x116/0x1d0
[   14.538373]  ? __pfx_kthread+0x10/0x10
[   14.538393]  ret_from_fork_asm+0x1a/0x30
[   14.538422]  </TASK>
[   14.538431] 
[   14.554938] Allocated by task 279:
[   14.555148]  kasan_save_stack+0x45/0x70
[   14.555557]  kasan_save_track+0x18/0x40
[   14.555788]  kasan_save_alloc_info+0x3b/0x50
[   14.556136]  __kasan_kmalloc+0xb7/0xc0
[   14.556548]  __kmalloc_cache_noprof+0x189/0x420
[   14.556949]  kasan_bitops_generic+0x92/0x1c0
[   14.557259]  kunit_try_run_case+0x1a5/0x480
[   14.557574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.557881]  kthread+0x337/0x6f0
[   14.558261]  ret_from_fork+0x116/0x1d0
[   14.558617]  ret_from_fork_asm+0x1a/0x30
[   14.558959] 
[   14.559179] The buggy address belongs to the object at ffff888100fffac0
[   14.559179]  which belongs to the cache kmalloc-16 of size 16
[   14.559951] The buggy address is located 8 bytes inside of
[   14.559951]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.561111] 
[   14.561449] The buggy address belongs to the physical page:
[   14.561676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.562177] flags: 0x200000000000000(node=0|zone=2)
[   14.562704] page_type: f5(slab)
[   14.563087] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.563790] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.564446] page dumped because: kasan: bad access detected
[   14.564628] 
[   14.564810] Memory state around the buggy address:
[   14.565259]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.565952]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.566563] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.567043]                                               ^
[   14.567345]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.567996]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.568491] ==================================================================
[   14.727615] ==================================================================
[   14.728019] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.728517] Read of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.729031] 
[   14.729142] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.729194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.729206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.729225] Call Trace:
[   14.729238]  <TASK>
[   14.729251]  dump_stack_lvl+0x73/0xb0
[   14.729278]  print_report+0xd1/0x610
[   14.729298]  ? __virt_addr_valid+0x1db/0x2d0
[   14.729319]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.729346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.729397]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.729424]  kasan_report+0x141/0x180
[   14.729444]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.729486]  __asan_report_load8_noabort+0x18/0x20
[   14.729509]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.729562]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.729589]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.729612]  ? trace_hardirqs_on+0x37/0xe0
[   14.729643]  ? kasan_bitops_generic+0x92/0x1c0
[   14.729670]  kasan_bitops_generic+0x121/0x1c0
[   14.729703]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.729726]  ? __pfx_read_tsc+0x10/0x10
[   14.729745]  ? ktime_get_ts64+0x86/0x230
[   14.729768]  kunit_try_run_case+0x1a5/0x480
[   14.729817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.729838]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.729862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.729895]  ? __kthread_parkme+0x82/0x180
[   14.729923]  ? preempt_count_sub+0x50/0x80
[   14.729946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.729995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.730017]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.730040]  kthread+0x337/0x6f0
[   14.730069]  ? trace_preempt_on+0x20/0xc0
[   14.730090]  ? __pfx_kthread+0x10/0x10
[   14.730110]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.730156]  ? calculate_sigpending+0x7b/0xa0
[   14.730178]  ? __pfx_kthread+0x10/0x10
[   14.730198]  ret_from_fork+0x116/0x1d0
[   14.730226]  ? __pfx_kthread+0x10/0x10
[   14.730246]  ret_from_fork_asm+0x1a/0x30
[   14.730292]  </TASK>
[   14.730311] 
[   14.738453] Allocated by task 279:
[   14.738649]  kasan_save_stack+0x45/0x70
[   14.738872]  kasan_save_track+0x18/0x40
[   14.739098]  kasan_save_alloc_info+0x3b/0x50
[   14.739380]  __kasan_kmalloc+0xb7/0xc0
[   14.739587]  __kmalloc_cache_noprof+0x189/0x420
[   14.739964]  kasan_bitops_generic+0x92/0x1c0
[   14.740170]  kunit_try_run_case+0x1a5/0x480
[   14.740370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.740613]  kthread+0x337/0x6f0
[   14.740898]  ret_from_fork+0x116/0x1d0
[   14.741092]  ret_from_fork_asm+0x1a/0x30
[   14.741286] 
[   14.741377] The buggy address belongs to the object at ffff888100fffac0
[   14.741377]  which belongs to the cache kmalloc-16 of size 16
[   14.741917] The buggy address is located 8 bytes inside of
[   14.741917]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.742462] 
[   14.742533] The buggy address belongs to the physical page:
[   14.742719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.743135] flags: 0x200000000000000(node=0|zone=2)
[   14.743417] page_type: f5(slab)
[   14.743585] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.743897] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.744133] page dumped because: kasan: bad access detected
[   14.744299] 
[   14.744365] Memory state around the buggy address:
[   14.744586]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.745282]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.745594] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.746023]                                               ^
[   14.746271]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.746606]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.746984] ==================================================================
[   14.625275] ==================================================================
[   14.625493] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.625981] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.626356] 
[   14.626463] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.626504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.626515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.626535] Call Trace:
[   14.626550]  <TASK>
[   14.626564]  dump_stack_lvl+0x73/0xb0
[   14.626590]  print_report+0xd1/0x610
[   14.626610]  ? __virt_addr_valid+0x1db/0x2d0
[   14.626630]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.626657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.626678]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.626716]  kasan_report+0x141/0x180
[   14.626736]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.626767]  kasan_check_range+0x10c/0x1c0
[   14.626790]  __kasan_check_write+0x18/0x20
[   14.626808]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.626834]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.626862]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.626884]  ? trace_hardirqs_on+0x37/0xe0
[   14.626916]  ? kasan_bitops_generic+0x92/0x1c0
[   14.626943]  kasan_bitops_generic+0x121/0x1c0
[   14.626964]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.626989]  ? __pfx_read_tsc+0x10/0x10
[   14.627008]  ? ktime_get_ts64+0x86/0x230
[   14.627031]  kunit_try_run_case+0x1a5/0x480
[   14.627057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.627079]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.627101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.627123]  ? __kthread_parkme+0x82/0x180
[   14.627141]  ? preempt_count_sub+0x50/0x80
[   14.627163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.627186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.627208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.627230]  kthread+0x337/0x6f0
[   14.627248]  ? trace_preempt_on+0x20/0xc0
[   14.627269]  ? __pfx_kthread+0x10/0x10
[   14.627288]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.627308]  ? calculate_sigpending+0x7b/0xa0
[   14.627330]  ? __pfx_kthread+0x10/0x10
[   14.627350]  ret_from_fork+0x116/0x1d0
[   14.627367]  ? __pfx_kthread+0x10/0x10
[   14.627388]  ret_from_fork_asm+0x1a/0x30
[   14.627417]  </TASK>
[   14.627426] 
[   14.637653] Allocated by task 279:
[   14.637866]  kasan_save_stack+0x45/0x70
[   14.638098]  kasan_save_track+0x18/0x40
[   14.638345]  kasan_save_alloc_info+0x3b/0x50
[   14.638553]  __kasan_kmalloc+0xb7/0xc0
[   14.638726]  __kmalloc_cache_noprof+0x189/0x420
[   14.638874]  kasan_bitops_generic+0x92/0x1c0
[   14.639072]  kunit_try_run_case+0x1a5/0x480
[   14.639424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.639672]  kthread+0x337/0x6f0
[   14.639829]  ret_from_fork+0x116/0x1d0
[   14.640048]  ret_from_fork_asm+0x1a/0x30
[   14.640261] 
[   14.640384] The buggy address belongs to the object at ffff888100fffac0
[   14.640384]  which belongs to the cache kmalloc-16 of size 16
[   14.641242] The buggy address is located 8 bytes inside of
[   14.641242]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.641833] 
[   14.641901] The buggy address belongs to the physical page:
[   14.642162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.642688] flags: 0x200000000000000(node=0|zone=2)
[   14.643056] page_type: f5(slab)
[   14.643263] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.643579] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.643971] page dumped because: kasan: bad access detected
[   14.644219] 
[   14.644305] Memory state around the buggy address:
[   14.644669]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.644998]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.645312] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.645611]                                               ^
[   14.646142]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.646494]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.646807] ==================================================================
[   14.569340] ==================================================================
[   14.569582] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.569860] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.570101] 
[   14.570186] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.570227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.570238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.570258] Call Trace:
[   14.570273]  <TASK>
[   14.570286]  dump_stack_lvl+0x73/0xb0
[   14.570311]  print_report+0xd1/0x610
[   14.570332]  ? __virt_addr_valid+0x1db/0x2d0
[   14.570353]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.570379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.570400]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.570426]  kasan_report+0x141/0x180
[   14.570447]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.570477]  kasan_check_range+0x10c/0x1c0
[   14.570499]  __kasan_check_write+0x18/0x20
[   14.570517]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.570542]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.570569]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.570591]  ? trace_hardirqs_on+0x37/0xe0
[   14.570612]  ? kasan_bitops_generic+0x92/0x1c0
[   14.570638]  kasan_bitops_generic+0x121/0x1c0
[   14.570659]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.570682]  ? __pfx_read_tsc+0x10/0x10
[   14.570702]  ? ktime_get_ts64+0x86/0x230
[   14.570725]  kunit_try_run_case+0x1a5/0x480
[   14.570747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.570768]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.570791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.570812]  ? __kthread_parkme+0x82/0x180
[   14.570831]  ? preempt_count_sub+0x50/0x80
[   14.570853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.570876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.570897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.570944]  kthread+0x337/0x6f0
[   14.570962]  ? trace_preempt_on+0x20/0xc0
[   14.570982]  ? __pfx_kthread+0x10/0x10
[   14.571002]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.571021]  ? calculate_sigpending+0x7b/0xa0
[   14.571044]  ? __pfx_kthread+0x10/0x10
[   14.571069]  ret_from_fork+0x116/0x1d0
[   14.571102]  ? __pfx_kthread+0x10/0x10
[   14.571135]  ret_from_fork_asm+0x1a/0x30
[   14.571177]  </TASK>
[   14.571187] 
[   14.590363] Allocated by task 279:
[   14.590614]  kasan_save_stack+0x45/0x70
[   14.591054]  kasan_save_track+0x18/0x40
[   14.591340]  kasan_save_alloc_info+0x3b/0x50
[   14.591735]  __kasan_kmalloc+0xb7/0xc0
[   14.591993]  __kmalloc_cache_noprof+0x189/0x420
[   14.592427]  kasan_bitops_generic+0x92/0x1c0
[   14.592867]  kunit_try_run_case+0x1a5/0x480
[   14.593335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.593524]  kthread+0x337/0x6f0
[   14.593643]  ret_from_fork+0x116/0x1d0
[   14.593997]  ret_from_fork_asm+0x1a/0x30
[   14.594403] 
[   14.594592] The buggy address belongs to the object at ffff888100fffac0
[   14.594592]  which belongs to the cache kmalloc-16 of size 16
[   14.595837] The buggy address is located 8 bytes inside of
[   14.595837]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.596809] 
[   14.597076] The buggy address belongs to the physical page:
[   14.597583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.598255] flags: 0x200000000000000(node=0|zone=2)
[   14.598459] page_type: f5(slab)
[   14.598762] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.599562] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.600104] page dumped because: kasan: bad access detected
[   14.600269] 
[   14.600334] Memory state around the buggy address:
[   14.600967]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.601185]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.601393] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.601597]                                               ^
[   14.602105]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.602335]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.602787] ==================================================================
[   14.706994] ==================================================================
[   14.707700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.708113] Read of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.708436] 
[   14.708541] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.708581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.708592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.708612] Call Trace:
[   14.708627]  <TASK>
[   14.708641]  dump_stack_lvl+0x73/0xb0
[   14.708667]  print_report+0xd1/0x610
[   14.708697]  ? __virt_addr_valid+0x1db/0x2d0
[   14.708717]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.708744]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.708765]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.708828]  kasan_report+0x141/0x180
[   14.708849]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.708917]  kasan_check_range+0x10c/0x1c0
[   14.708942]  __kasan_check_read+0x15/0x20
[   14.708959]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.708986]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.709013]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.709035]  ? trace_hardirqs_on+0x37/0xe0
[   14.709055]  ? kasan_bitops_generic+0x92/0x1c0
[   14.709081]  kasan_bitops_generic+0x121/0x1c0
[   14.709103]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.709127]  ? __pfx_read_tsc+0x10/0x10
[   14.709146]  ? ktime_get_ts64+0x86/0x230
[   14.709169]  kunit_try_run_case+0x1a5/0x480
[   14.709191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.709213]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.709234]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.709257]  ? __kthread_parkme+0x82/0x180
[   14.709275]  ? preempt_count_sub+0x50/0x80
[   14.709297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.709320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.709342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.709365]  kthread+0x337/0x6f0
[   14.709384]  ? trace_preempt_on+0x20/0xc0
[   14.709406]  ? __pfx_kthread+0x10/0x10
[   14.709425]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.709445]  ? calculate_sigpending+0x7b/0xa0
[   14.709467]  ? __pfx_kthread+0x10/0x10
[   14.709488]  ret_from_fork+0x116/0x1d0
[   14.709505]  ? __pfx_kthread+0x10/0x10
[   14.709524]  ret_from_fork_asm+0x1a/0x30
[   14.709554]  </TASK>
[   14.709563] 
[   14.718603] Allocated by task 279:
[   14.718793]  kasan_save_stack+0x45/0x70
[   14.719008]  kasan_save_track+0x18/0x40
[   14.719242]  kasan_save_alloc_info+0x3b/0x50
[   14.719485]  __kasan_kmalloc+0xb7/0xc0
[   14.719681]  __kmalloc_cache_noprof+0x189/0x420
[   14.719946]  kasan_bitops_generic+0x92/0x1c0
[   14.720138]  kunit_try_run_case+0x1a5/0x480
[   14.720280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.720447]  kthread+0x337/0x6f0
[   14.720563]  ret_from_fork+0x116/0x1d0
[   14.720719]  ret_from_fork_asm+0x1a/0x30
[   14.720934] 
[   14.721027] The buggy address belongs to the object at ffff888100fffac0
[   14.721027]  which belongs to the cache kmalloc-16 of size 16
[   14.721538] The buggy address is located 8 bytes inside of
[   14.721538]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.722024] 
[   14.722092] The buggy address belongs to the physical page:
[   14.722528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.722863] flags: 0x200000000000000(node=0|zone=2)
[   14.723123] page_type: f5(slab)
[   14.723309] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.723655] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.724028] page dumped because: kasan: bad access detected
[   14.724301] 
[   14.724396] Memory state around the buggy address:
[   14.724612]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.725051]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.725398] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.725730]                                               ^
[   14.725994]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.726303]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.726629] ==================================================================
[   14.667678] ==================================================================
[   14.668000] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.668420] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.668831] 
[   14.668981] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.669022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.669033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.669052] Call Trace:
[   14.669065]  <TASK>
[   14.669077]  dump_stack_lvl+0x73/0xb0
[   14.669104]  print_report+0xd1/0x610
[   14.669125]  ? __virt_addr_valid+0x1db/0x2d0
[   14.669146]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.669173]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.669194]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.669221]  kasan_report+0x141/0x180
[   14.669242]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.669273]  kasan_check_range+0x10c/0x1c0
[   14.669295]  __kasan_check_write+0x18/0x20
[   14.669313]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.669339]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.669366]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.669388]  ? trace_hardirqs_on+0x37/0xe0
[   14.669410]  ? kasan_bitops_generic+0x92/0x1c0
[   14.669436]  kasan_bitops_generic+0x121/0x1c0
[   14.669457]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.669481]  ? __pfx_read_tsc+0x10/0x10
[   14.669500]  ? ktime_get_ts64+0x86/0x230
[   14.669523]  kunit_try_run_case+0x1a5/0x480
[   14.669546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.669618]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.669642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.669671]  ? __kthread_parkme+0x82/0x180
[   14.669690]  ? preempt_count_sub+0x50/0x80
[   14.669713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.669735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.669757]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.669780]  kthread+0x337/0x6f0
[   14.669798]  ? trace_preempt_on+0x20/0xc0
[   14.669818]  ? __pfx_kthread+0x10/0x10
[   14.669837]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.669858]  ? calculate_sigpending+0x7b/0xa0
[   14.669879]  ? __pfx_kthread+0x10/0x10
[   14.669899]  ret_from_fork+0x116/0x1d0
[   14.669927]  ? __pfx_kthread+0x10/0x10
[   14.669946]  ret_from_fork_asm+0x1a/0x30
[   14.669976]  </TASK>
[   14.669984] 
[   14.678287] Allocated by task 279:
[   14.678414]  kasan_save_stack+0x45/0x70
[   14.678553]  kasan_save_track+0x18/0x40
[   14.678721]  kasan_save_alloc_info+0x3b/0x50
[   14.678977]  __kasan_kmalloc+0xb7/0xc0
[   14.679183]  __kmalloc_cache_noprof+0x189/0x420
[   14.679406]  kasan_bitops_generic+0x92/0x1c0
[   14.679657]  kunit_try_run_case+0x1a5/0x480
[   14.679875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.680174]  kthread+0x337/0x6f0
[   14.680345]  ret_from_fork+0x116/0x1d0
[   14.680569]  ret_from_fork_asm+0x1a/0x30
[   14.680825] 
[   14.680921] The buggy address belongs to the object at ffff888100fffac0
[   14.680921]  which belongs to the cache kmalloc-16 of size 16
[   14.681470] The buggy address is located 8 bytes inside of
[   14.681470]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.682060] 
[   14.682187] The buggy address belongs to the physical page:
[   14.682453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.682877] flags: 0x200000000000000(node=0|zone=2)
[   14.683133] page_type: f5(slab)
[   14.683342] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.683726] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.684075] page dumped because: kasan: bad access detected
[   14.684335] 
[   14.684436] Memory state around the buggy address:
[   14.684644]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.685053]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.685341] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.685609]                                               ^
[   14.686080]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.686350]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.686610] ==================================================================
[   14.687428] ==================================================================
[   14.687922] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.688331] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.688671] 
[   14.688785] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.688825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.688836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.688883] Call Trace:
[   14.688896]  <TASK>
[   14.688925]  dump_stack_lvl+0x73/0xb0
[   14.688952]  print_report+0xd1/0x610
[   14.688973]  ? __virt_addr_valid+0x1db/0x2d0
[   14.688994]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.689047]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.689068]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.689095]  kasan_report+0x141/0x180
[   14.689125]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.689157]  kasan_check_range+0x10c/0x1c0
[   14.689204]  __kasan_check_write+0x18/0x20
[   14.689223]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.689249]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.689286]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.689308]  ? trace_hardirqs_on+0x37/0xe0
[   14.689329]  ? kasan_bitops_generic+0x92/0x1c0
[   14.689381]  kasan_bitops_generic+0x121/0x1c0
[   14.689403]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.689427]  ? __pfx_read_tsc+0x10/0x10
[   14.689456]  ? ktime_get_ts64+0x86/0x230
[   14.689479]  kunit_try_run_case+0x1a5/0x480
[   14.689528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.689550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.689572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.689605]  ? __kthread_parkme+0x82/0x180
[   14.689623]  ? preempt_count_sub+0x50/0x80
[   14.689662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.689712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.689733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.689756]  kthread+0x337/0x6f0
[   14.689802]  ? trace_preempt_on+0x20/0xc0
[   14.689822]  ? __pfx_kthread+0x10/0x10
[   14.689842]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.689862]  ? calculate_sigpending+0x7b/0xa0
[   14.689884]  ? __pfx_kthread+0x10/0x10
[   14.689914]  ret_from_fork+0x116/0x1d0
[   14.689931]  ? __pfx_kthread+0x10/0x10
[   14.689951]  ret_from_fork_asm+0x1a/0x30
[   14.690006]  </TASK>
[   14.690015] 
[   14.698665] Allocated by task 279:
[   14.698883]  kasan_save_stack+0x45/0x70
[   14.699112]  kasan_save_track+0x18/0x40
[   14.699305]  kasan_save_alloc_info+0x3b/0x50
[   14.699531]  __kasan_kmalloc+0xb7/0xc0
[   14.699672]  __kmalloc_cache_noprof+0x189/0x420
[   14.699938]  kasan_bitops_generic+0x92/0x1c0
[   14.700146]  kunit_try_run_case+0x1a5/0x480
[   14.700348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.700626]  kthread+0x337/0x6f0
[   14.700977]  ret_from_fork+0x116/0x1d0
[   14.701162]  ret_from_fork_asm+0x1a/0x30
[   14.701297] 
[   14.701365] The buggy address belongs to the object at ffff888100fffac0
[   14.701365]  which belongs to the cache kmalloc-16 of size 16
[   14.701887] The buggy address is located 8 bytes inside of
[   14.701887]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.702534] 
[   14.702643] The buggy address belongs to the physical page:
[   14.702930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.703229] flags: 0x200000000000000(node=0|zone=2)
[   14.703460] page_type: f5(slab)
[   14.703597] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.703897] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.704123] page dumped because: kasan: bad access detected
[   14.704287] 
[   14.704352] Memory state around the buggy address:
[   14.704499]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.704706]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.704941] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.705282]                                               ^
[   14.705756]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.706092]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.706406] ==================================================================
[   14.603286] ==================================================================
[   14.603866] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.604256] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.604545] 
[   14.604656] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.604697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.604708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.604758] Call Trace:
[   14.604773]  <TASK>
[   14.604787]  dump_stack_lvl+0x73/0xb0
[   14.604897]  print_report+0xd1/0x610
[   14.604930]  ? __virt_addr_valid+0x1db/0x2d0
[   14.604951]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.604977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.604997]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.605023]  kasan_report+0x141/0x180
[   14.605045]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.605075]  kasan_check_range+0x10c/0x1c0
[   14.605098]  __kasan_check_write+0x18/0x20
[   14.605117]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.605144]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.605171]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.605192]  ? trace_hardirqs_on+0x37/0xe0
[   14.605213]  ? kasan_bitops_generic+0x92/0x1c0
[   14.605239]  kasan_bitops_generic+0x121/0x1c0
[   14.605261]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.605285]  ? __pfx_read_tsc+0x10/0x10
[   14.605305]  ? ktime_get_ts64+0x86/0x230
[   14.605328]  kunit_try_run_case+0x1a5/0x480
[   14.605351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.605372]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.605394]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.605416]  ? __kthread_parkme+0x82/0x180
[   14.605435]  ? preempt_count_sub+0x50/0x80
[   14.605457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.605480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.605501]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.605524]  kthread+0x337/0x6f0
[   14.605542]  ? trace_preempt_on+0x20/0xc0
[   14.605562]  ? __pfx_kthread+0x10/0x10
[   14.605581]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.605602]  ? calculate_sigpending+0x7b/0xa0
[   14.605624]  ? __pfx_kthread+0x10/0x10
[   14.605645]  ret_from_fork+0x116/0x1d0
[   14.605662]  ? __pfx_kthread+0x10/0x10
[   14.605682]  ret_from_fork_asm+0x1a/0x30
[   14.605711]  </TASK>
[   14.605721] 
[   14.615833] Allocated by task 279:
[   14.616110]  kasan_save_stack+0x45/0x70
[   14.616314]  kasan_save_track+0x18/0x40
[   14.616461]  kasan_save_alloc_info+0x3b/0x50
[   14.616604]  __kasan_kmalloc+0xb7/0xc0
[   14.616731]  __kmalloc_cache_noprof+0x189/0x420
[   14.616882]  kasan_bitops_generic+0x92/0x1c0
[   14.617157]  kunit_try_run_case+0x1a5/0x480
[   14.617507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.617927]  kthread+0x337/0x6f0
[   14.618161]  ret_from_fork+0x116/0x1d0
[   14.618416]  ret_from_fork_asm+0x1a/0x30
[   14.618551] 
[   14.618619] The buggy address belongs to the object at ffff888100fffac0
[   14.618619]  which belongs to the cache kmalloc-16 of size 16
[   14.619451] The buggy address is located 8 bytes inside of
[   14.619451]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.620206] 
[   14.620307] The buggy address belongs to the physical page:
[   14.620593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.620824] flags: 0x200000000000000(node=0|zone=2)
[   14.620991] page_type: f5(slab)
[   14.621141] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.621554] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.622150] page dumped because: kasan: bad access detected
[   14.622500] 
[   14.622639] Memory state around the buggy address:
[   14.622935]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.623272]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.623482] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.624113]                                               ^
[   14.624392]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.624723]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.624939] ==================================================================