Hay
Date
July 17, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.879288] ==================================================================
[   17.879373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   17.879432] Read of size 8 at addr fff00000c433ec88 by task kunit_try_catch/262
[   17.879509] 
[   17.879566] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.879678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.879747] Hardware name: linux,dummy-virt (DT)
[   17.879806] Call trace:
[   17.879879]  show_stack+0x20/0x38 (C)
[   17.879960]  dump_stack_lvl+0x8c/0xd0
[   17.880051]  print_report+0x118/0x5d0
[   17.880117]  kasan_report+0xdc/0x128
[   17.880187]  __asan_report_load8_noabort+0x20/0x30
[   17.880241]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   17.880313]  kasan_bitops_generic+0x110/0x1c8
[   17.880542]  kunit_try_run_case+0x170/0x3f0
[   17.880652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.880718]  kthread+0x328/0x630
[   17.880790]  ret_from_fork+0x10/0x20
[   17.880882] 
[   17.880995] Allocated by task 262:
[   17.881038]  kasan_save_stack+0x3c/0x68
[   17.881082]  kasan_save_track+0x20/0x40
[   17.881122]  kasan_save_alloc_info+0x40/0x58
[   17.881162]  __kasan_kmalloc+0xd4/0xd8
[   17.881200]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.881251]  kasan_bitops_generic+0xa0/0x1c8
[   17.881292]  kunit_try_run_case+0x170/0x3f0
[   17.881474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.881552]  kthread+0x328/0x630
[   17.881636]  ret_from_fork+0x10/0x20
[   17.881746] 
[   17.881804] The buggy address belongs to the object at fff00000c433ec80
[   17.881804]  which belongs to the cache kmalloc-16 of size 16
[   17.881952] The buggy address is located 8 bytes inside of
[   17.881952]  allocated 9-byte region [fff00000c433ec80, fff00000c433ec89)
[   17.882031] 
[   17.882052] The buggy address belongs to the physical page:
[   17.882085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10433e
[   17.882142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.882378] page_type: f5(slab)
[   17.882459] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.882542] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.882612] page dumped because: kasan: bad access detected
[   17.882657] 
[   17.882678] Memory state around the buggy address:
[   17.882712]  fff00000c433eb80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.882882]  fff00000c433ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.882957] >fff00000c433ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.883010]                       ^
[   17.883060]  fff00000c433ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.883117]  fff00000c433ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.883160] ==================================================================
[   17.884159] ==================================================================
[   17.884219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   17.884272] Write of size 8 at addr fff00000c433ec88 by task kunit_try_catch/262
[   17.884325] 
[   17.884358] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.884455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.884484] Hardware name: linux,dummy-virt (DT)
[   17.884518] Call trace:
[   17.884541]  show_stack+0x20/0x38 (C)
[   17.884589]  dump_stack_lvl+0x8c/0xd0
[   17.884638]  print_report+0x118/0x5d0
[   17.884685]  kasan_report+0xdc/0x128
[   17.884732]  kasan_check_range+0x100/0x1a8
[   17.884780]  __kasan_check_write+0x20/0x30
[   17.884840]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   17.884902]  kasan_bitops_generic+0x110/0x1c8
[   17.884950]  kunit_try_run_case+0x170/0x3f0
[   17.885010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.885062]  kthread+0x328/0x630
[   17.885340]  ret_from_fork+0x10/0x20
[   17.885524] 
[   17.885605] Allocated by task 262:
[   17.885645]  kasan_save_stack+0x3c/0x68
[   17.885687]  kasan_save_track+0x20/0x40
[   17.885727]  kasan_save_alloc_info+0x40/0x58
[   17.885878]  __kasan_kmalloc+0xd4/0xd8
[   17.885991]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.886073]  kasan_bitops_generic+0xa0/0x1c8
[   17.886183]  kunit_try_run_case+0x170/0x3f0
[   17.886318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.886445]  kthread+0x328/0x630
[   17.887132] The buggy address is located 8 bytes inside of
[   17.887132]  allocated 9-byte region [fff00000c433ec80, fff00000c433ec89)
[   17.888652] >fff00000c433ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.889596] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   17.890331]  print_report+0x118/0x5d0
[   17.891054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.892166] The buggy address is located 8 bytes inside of
[   17.892166]  allocated 9-byte region [fff00000c433ec80, fff00000c433ec89)
[   17.892488] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.892799]  fff00000c433ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.893782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.894085]  kasan_report+0xdc/0x128
[   17.894679]  ret_from_fork+0x10/0x20
[   17.895318]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.895836] 
[   17.896334] page_type: f5(slab)
[   17.896446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.896932]  fff00000c433ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.897917] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.899678]  kasan_save_track+0x20/0x40
[   17.900334] The buggy address belongs to the object at fff00000c433ec80
[   17.900334]  which belongs to the cache kmalloc-16 of size 16
[   17.900914] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.901796] ==================================================================
[   17.874106] ==================================================================
[   17.874169] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   17.874222] Write of size 8 at addr fff00000c433ec88 by task kunit_try_catch/262
[   17.874309] 
[   17.874341] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.874464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.874621] Hardware name: linux,dummy-virt (DT)
[   17.874678] Call trace:
[   17.874718]  show_stack+0x20/0x38 (C)
[   17.874769]  dump_stack_lvl+0x8c/0xd0
[   17.874856]  print_report+0x118/0x5d0
[   17.874911]  kasan_report+0xdc/0x128
[   17.874960]  kasan_check_range+0x100/0x1a8
[   17.875021]  __kasan_check_write+0x20/0x30
[   17.875067]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   17.875120]  kasan_bitops_generic+0x110/0x1c8
[   17.875195]  kunit_try_run_case+0x170/0x3f0
[   17.875250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.875342]  kthread+0x328/0x630
[   17.875386]  ret_from_fork+0x10/0x20
[   17.875436] 
[   17.875471] Allocated by task 262:
[   17.875501]  kasan_save_stack+0x3c/0x68
[   17.875544]  kasan_save_track+0x20/0x40
[   17.875600]  kasan_save_alloc_info+0x40/0x58
[   17.875643]  __kasan_kmalloc+0xd4/0xd8
[   17.875680]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.875761]  kasan_bitops_generic+0xa0/0x1c8
[   17.875800]  kunit_try_run_case+0x170/0x3f0
[   17.875943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.876035]  kthread+0x328/0x630
[   17.876253]  ret_from_fork+0x10/0x20
[   17.876464] 
[   17.876512] The buggy address belongs to the object at fff00000c433ec80
[   17.876512]  which belongs to the cache kmalloc-16 of size 16
[   17.876576] The buggy address is located 8 bytes inside of
[   17.876576]  allocated 9-byte region [fff00000c433ec80, fff00000c433ec89)
[   17.876823] 
[   17.876912] The buggy address belongs to the physical page:
[   17.877155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10433e
[   17.877407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.877643] page_type: f5(slab)
[   17.877722] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.877813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.877921] page dumped because: kasan: bad access detected
[   17.878042] 
[   17.878087] Memory state around the buggy address:
[   17.878122]  fff00000c433eb80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.878187]  fff00000c433ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.878385] >fff00000c433ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.878542]                       ^
[   17.878601]  fff00000c433ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.878852]  fff00000c433ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.878913] ==================================================================
[   17.863492] ==================================================================
[   17.863556] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   17.863614] Write of size 8 at addr fff00000c433ec88 by task kunit_try_catch/262
[   17.863670] 
[   17.863788] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.863874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.863949] Hardware name: linux,dummy-virt (DT)
[   17.864104] Call trace:
[   17.864134]  show_stack+0x20/0x38 (C)
[   17.864188]  dump_stack_lvl+0x8c/0xd0
[   17.864235]  print_report+0x118/0x5d0
[   17.864342]  kasan_report+0xdc/0x128
[   17.864388]  kasan_check_range+0x100/0x1a8
[   17.864466]  __kasan_check_write+0x20/0x30
[   17.864571]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   17.864645]  kasan_bitops_generic+0x110/0x1c8
[   17.864708]  kunit_try_run_case+0x170/0x3f0
[   17.864759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.864914]  kthread+0x328/0x630
[   17.865008]  ret_from_fork+0x10/0x20
[   17.865060] 
[   17.865207] Allocated by task 262:
[   17.865282]  kasan_save_stack+0x3c/0x68
[   17.865359]  kasan_save_track+0x20/0x40
[   17.865480]  kasan_save_alloc_info+0x40/0x58
[   17.865575]  __kasan_kmalloc+0xd4/0xd8
[   17.865688]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.865812]  kasan_bitops_generic+0xa0/0x1c8
[   17.865952]  kunit_try_run_case+0x170/0x3f0
[   17.866018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.866064]  kthread+0x328/0x630
[   17.866254]  ret_from_fork+0x10/0x20
[   17.866300] 
[   17.866321] The buggy address belongs to the object at fff00000c433ec80
[   17.866321]  which belongs to the cache kmalloc-16 of size 16
[   17.866384] The buggy address is located 8 bytes inside of
[   17.866384]  allocated 9-byte region [fff00000c433ec80, fff00000c433ec89)
[   17.866598] 
[   17.866681] The buggy address belongs to the physical page:
[   17.866749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10433e
[   17.866838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.866930] page_type: f5(slab)
[   17.866969] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.867067] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.867226] page dumped because: kasan: bad access detected
[   17.867261] 
[   17.867292] Memory state around the buggy address:
[   17.867560]  fff00000c433eb80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.867656]  fff00000c433ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.867770] >fff00000c433ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.867859]                       ^
[   17.867913]  fff00000c433ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.868034]  fff00000c433ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.868137] ==================================================================
[   17.869746] ==================================================================
[   17.869799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   17.869916] Read of size 8 at addr fff00000c433ec88 by task kunit_try_catch/262
[   17.869975] 
[   17.870020] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.870245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.870314] Hardware name: linux,dummy-virt (DT)
[   17.870351] Call trace:
[   17.870379]  show_stack+0x20/0x38 (C)
[   17.870451]  dump_stack_lvl+0x8c/0xd0
[   17.870507]  print_report+0x118/0x5d0
[   17.870573]  kasan_report+0xdc/0x128
[   17.870621]  __asan_report_load8_noabort+0x20/0x30
[   17.870700]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   17.870813]  kasan_bitops_generic+0x110/0x1c8
[   17.870899]  kunit_try_run_case+0x170/0x3f0
[   17.870971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.871039]  kthread+0x328/0x630
[   17.871094]  ret_from_fork+0x10/0x20
[   17.871151] 
[   17.871171] Allocated by task 262:
[   17.871210]  kasan_save_stack+0x3c/0x68
[   17.871252]  kasan_save_track+0x20/0x40
[   17.871291]  kasan_save_alloc_info+0x40/0x58
[   17.871331]  __kasan_kmalloc+0xd4/0xd8
[   17.871369]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.871410]  kasan_bitops_generic+0xa0/0x1c8
[   17.871453]  kunit_try_run_case+0x170/0x3f0
[   17.871500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.871554]  kthread+0x328/0x630
[   17.871600]  ret_from_fork+0x10/0x20
[   17.871642] 
[   17.871664] The buggy address belongs to the object at fff00000c433ec80
[   17.871664]  which belongs to the cache kmalloc-16 of size 16
[   17.871725] The buggy address is located 8 bytes inside of
[   17.871725]  allocated 9-byte region [fff00000c433ec80, fff00000c433ec89)
[   17.871807] 
[   17.871837] The buggy address belongs to the physical page:
[   17.871871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10433e
[   17.871927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.871995] page_type: f5(slab)
[   17.872034] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.872087] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.872701] page dumped because: kasan: bad access detected
[   17.872832] 
[   17.872868] Memory state around the buggy address:
[   17.872917]  fff00000c433eb80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.873027]  fff00000c433ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.873081] >fff00000c433ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.873130]                       ^
[   17.873235]  fff00000c433ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.873326]  fff00000c433ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.873396] ==================================================================

[   15.161091] ==================================================================
[   15.161366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.161816] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.162161] 
[   15.162360] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.162408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.162419] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.162441] Call Trace:
[   15.162455]  <TASK>
[   15.162471]  dump_stack_lvl+0x73/0xb0
[   15.162498]  print_report+0xd1/0x610
[   15.162520]  ? __virt_addr_valid+0x1db/0x2d0
[   15.162542]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.162582]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.162607]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.162634]  kasan_report+0x141/0x180
[   15.162656]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.162687]  kasan_check_range+0x10c/0x1c0
[   15.162712]  __kasan_check_write+0x18/0x20
[   15.162731]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.162758]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.162787]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.162813]  ? kasan_bitops_generic+0x92/0x1c0
[   15.162840]  kasan_bitops_generic+0x116/0x1c0
[   15.162864]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.162926]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.162980]  kunit_try_run_case+0x1a5/0x480
[   15.163004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.163027]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.163052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.163075]  ? __kthread_parkme+0x82/0x180
[   15.163097]  ? preempt_count_sub+0x50/0x80
[   15.163121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.163146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.163171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.163228]  kthread+0x337/0x6f0
[   15.163299]  ? trace_preempt_on+0x20/0xc0
[   15.163325]  ? __pfx_kthread+0x10/0x10
[   15.163347]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.163406]  ? calculate_sigpending+0x7b/0xa0
[   15.163431]  ? __pfx_kthread+0x10/0x10
[   15.163461]  ret_from_fork+0x116/0x1d0
[   15.163481]  ? __pfx_kthread+0x10/0x10
[   15.163502]  ret_from_fork_asm+0x1a/0x30
[   15.163533]  </TASK>
[   15.163543] 
[   15.172952] Allocated by task 278:
[   15.173181]  kasan_save_stack+0x45/0x70
[   15.173435]  kasan_save_track+0x18/0x40
[   15.173660]  kasan_save_alloc_info+0x3b/0x50
[   15.173943]  __kasan_kmalloc+0xb7/0xc0
[   15.174159]  __kmalloc_cache_noprof+0x189/0x420
[   15.174347]  kasan_bitops_generic+0x92/0x1c0
[   15.174724]  kunit_try_run_case+0x1a5/0x480
[   15.174922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.175178]  kthread+0x337/0x6f0
[   15.175382]  ret_from_fork+0x116/0x1d0
[   15.175791]  ret_from_fork_asm+0x1a/0x30
[   15.176010] 
[   15.176153] The buggy address belongs to the object at ffff888101679da0
[   15.176153]  which belongs to the cache kmalloc-16 of size 16
[   15.176807] The buggy address is located 8 bytes inside of
[   15.176807]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.177432] 
[   15.177527] The buggy address belongs to the physical page:
[   15.177806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.178149] flags: 0x200000000000000(node=0|zone=2)
[   15.178494] page_type: f5(slab)
[   15.178816] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.179093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.179353] page dumped because: kasan: bad access detected
[   15.179708] 
[   15.179807] Memory state around the buggy address:
[   15.179965]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.180225]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.180939] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.181220]                                   ^
[   15.181367]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.181868]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.182325] ==================================================================
[   15.139390] ==================================================================
[   15.139849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.140223] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.140797] 
[   15.140882] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.140924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.140935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.140956] Call Trace:
[   15.140968]  <TASK>
[   15.140981]  dump_stack_lvl+0x73/0xb0
[   15.141011]  print_report+0xd1/0x610
[   15.141067]  ? __virt_addr_valid+0x1db/0x2d0
[   15.141119]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.141146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.141170]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.141197]  kasan_report+0x141/0x180
[   15.141219]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.141251]  kasan_check_range+0x10c/0x1c0
[   15.141275]  __kasan_check_write+0x18/0x20
[   15.141368]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.141396]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.141425]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.141450]  ? kasan_bitops_generic+0x92/0x1c0
[   15.141479]  kasan_bitops_generic+0x116/0x1c0
[   15.141504]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.141529]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.141573]  kunit_try_run_case+0x1a5/0x480
[   15.141598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.141622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.141646]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.141670]  ? __kthread_parkme+0x82/0x180
[   15.141691]  ? preempt_count_sub+0x50/0x80
[   15.141715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.141740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.141765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.141791]  kthread+0x337/0x6f0
[   15.141811]  ? trace_preempt_on+0x20/0xc0
[   15.141835]  ? __pfx_kthread+0x10/0x10
[   15.141856]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.141878]  ? calculate_sigpending+0x7b/0xa0
[   15.141902]  ? __pfx_kthread+0x10/0x10
[   15.141924]  ret_from_fork+0x116/0x1d0
[   15.141943]  ? __pfx_kthread+0x10/0x10
[   15.141964]  ret_from_fork_asm+0x1a/0x30
[   15.141994]  </TASK>
[   15.142005] 
[   15.150918] Allocated by task 278:
[   15.151456]  kasan_save_stack+0x45/0x70
[   15.151679]  kasan_save_track+0x18/0x40
[   15.151900]  kasan_save_alloc_info+0x3b/0x50
[   15.152126]  __kasan_kmalloc+0xb7/0xc0
[   15.152400]  __kmalloc_cache_noprof+0x189/0x420
[   15.152704]  kasan_bitops_generic+0x92/0x1c0
[   15.152896]  kunit_try_run_case+0x1a5/0x480
[   15.153046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.153219]  kthread+0x337/0x6f0
[   15.153455]  ret_from_fork+0x116/0x1d0
[   15.153765]  ret_from_fork_asm+0x1a/0x30
[   15.153963] 
[   15.154058] The buggy address belongs to the object at ffff888101679da0
[   15.154058]  which belongs to the cache kmalloc-16 of size 16
[   15.154746] The buggy address is located 8 bytes inside of
[   15.154746]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.155166] 
[   15.155296] The buggy address belongs to the physical page:
[   15.155919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.156216] flags: 0x200000000000000(node=0|zone=2)
[   15.156650] page_type: f5(slab)
[   15.156854] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.157100] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.157717] page dumped because: kasan: bad access detected
[   15.157921] 
[   15.157989] Memory state around the buggy address:
[   15.158190]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.158739]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.159036] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.159473]                                   ^
[   15.159775]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.160096]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.160445] ==================================================================
[   15.094507] ==================================================================
[   15.095000] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.095336] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.095705] 
[   15.095817] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.095860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.095872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.095892] Call Trace:
[   15.095905]  <TASK>
[   15.095920]  dump_stack_lvl+0x73/0xb0
[   15.095951]  print_report+0xd1/0x610
[   15.095973]  ? __virt_addr_valid+0x1db/0x2d0
[   15.095997]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.096025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.096048]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.096082]  kasan_report+0x141/0x180
[   15.096104]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.096136]  kasan_check_range+0x10c/0x1c0
[   15.096160]  __kasan_check_write+0x18/0x20
[   15.096180]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.096208]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.096237]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.096301]  ? kasan_bitops_generic+0x92/0x1c0
[   15.096331]  kasan_bitops_generic+0x116/0x1c0
[   15.096382]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.096409]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.096451]  kunit_try_run_case+0x1a5/0x480
[   15.096476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.096500]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.096525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.096558]  ? __kthread_parkme+0x82/0x180
[   15.096580]  ? preempt_count_sub+0x50/0x80
[   15.096605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.096630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.096655]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.096681]  kthread+0x337/0x6f0
[   15.096701]  ? trace_preempt_on+0x20/0xc0
[   15.096724]  ? __pfx_kthread+0x10/0x10
[   15.096745]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.096767]  ? calculate_sigpending+0x7b/0xa0
[   15.096792]  ? __pfx_kthread+0x10/0x10
[   15.096814]  ret_from_fork+0x116/0x1d0
[   15.096834]  ? __pfx_kthread+0x10/0x10
[   15.096855]  ret_from_fork_asm+0x1a/0x30
[   15.096886]  </TASK>
[   15.096898] 
[   15.107537] Allocated by task 278:
[   15.107874]  kasan_save_stack+0x45/0x70
[   15.108127]  kasan_save_track+0x18/0x40
[   15.108267]  kasan_save_alloc_info+0x3b/0x50
[   15.108788]  __kasan_kmalloc+0xb7/0xc0
[   15.108943]  __kmalloc_cache_noprof+0x189/0x420
[   15.109208]  kasan_bitops_generic+0x92/0x1c0
[   15.109488]  kunit_try_run_case+0x1a5/0x480
[   15.109701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.109932]  kthread+0x337/0x6f0
[   15.110094]  ret_from_fork+0x116/0x1d0
[   15.110226]  ret_from_fork_asm+0x1a/0x30
[   15.110425] 
[   15.110565] The buggy address belongs to the object at ffff888101679da0
[   15.110565]  which belongs to the cache kmalloc-16 of size 16
[   15.111320] The buggy address is located 8 bytes inside of
[   15.111320]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.112050] 
[   15.112179] The buggy address belongs to the physical page:
[   15.112377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.112871] flags: 0x200000000000000(node=0|zone=2)
[   15.113128] page_type: f5(slab)
[   15.113298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.113724] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.113967] page dumped because: kasan: bad access detected
[   15.114177] 
[   15.114270] Memory state around the buggy address:
[   15.114683]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.114969]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.115421] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.115699]                                   ^
[   15.115955]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.116643]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.116934] ==================================================================
[   15.227909] ==================================================================
[   15.228337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.228714] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.229027] 
[   15.229119] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.229161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.229173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.229195] Call Trace:
[   15.229209]  <TASK>
[   15.229287]  dump_stack_lvl+0x73/0xb0
[   15.229322]  print_report+0xd1/0x610
[   15.229345]  ? __virt_addr_valid+0x1db/0x2d0
[   15.229368]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.229396]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.229419]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.229464]  kasan_report+0x141/0x180
[   15.229486]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.229519]  kasan_check_range+0x10c/0x1c0
[   15.229543]  __kasan_check_write+0x18/0x20
[   15.229572]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.229600]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.229630]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.229658]  ? kasan_bitops_generic+0x92/0x1c0
[   15.229688]  kasan_bitops_generic+0x116/0x1c0
[   15.229714]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.229739]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.229768]  kunit_try_run_case+0x1a5/0x480
[   15.229793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.229816]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.229841]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.229865]  ? __kthread_parkme+0x82/0x180
[   15.229887]  ? preempt_count_sub+0x50/0x80
[   15.229912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.229938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.229964]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.229990]  kthread+0x337/0x6f0
[   15.230009]  ? trace_preempt_on+0x20/0xc0
[   15.230033]  ? __pfx_kthread+0x10/0x10
[   15.230054]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.230076]  ? calculate_sigpending+0x7b/0xa0
[   15.230100]  ? __pfx_kthread+0x10/0x10
[   15.230121]  ret_from_fork+0x116/0x1d0
[   15.230140]  ? __pfx_kthread+0x10/0x10
[   15.230160]  ret_from_fork_asm+0x1a/0x30
[   15.230190]  </TASK>
[   15.230200] 
[   15.238024] Allocated by task 278:
[   15.238201]  kasan_save_stack+0x45/0x70
[   15.238489]  kasan_save_track+0x18/0x40
[   15.238695]  kasan_save_alloc_info+0x3b/0x50
[   15.238888]  __kasan_kmalloc+0xb7/0xc0
[   15.239022]  __kmalloc_cache_noprof+0x189/0x420
[   15.239179]  kasan_bitops_generic+0x92/0x1c0
[   15.239566]  kunit_try_run_case+0x1a5/0x480
[   15.239784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.240040]  kthread+0x337/0x6f0
[   15.240216]  ret_from_fork+0x116/0x1d0
[   15.240401]  ret_from_fork_asm+0x1a/0x30
[   15.240578] 
[   15.240679] The buggy address belongs to the object at ffff888101679da0
[   15.240679]  which belongs to the cache kmalloc-16 of size 16
[   15.241078] The buggy address is located 8 bytes inside of
[   15.241078]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.241628] 
[   15.241819] The buggy address belongs to the physical page:
[   15.242038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.242455] flags: 0x200000000000000(node=0|zone=2)
[   15.242677] page_type: f5(slab)
[   15.242829] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.243137] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.243481] page dumped because: kasan: bad access detected
[   15.243670] 
[   15.243742] Memory state around the buggy address:
[   15.243952]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.244350]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.244711] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.245028]                                   ^
[   15.245540]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.245918]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.246291] ==================================================================
[   15.182825] ==================================================================
[   15.183230] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.183616] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.183989] 
[   15.184136] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.184179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.184190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.184210] Call Trace:
[   15.184223]  <TASK>
[   15.184238]  dump_stack_lvl+0x73/0xb0
[   15.184352]  print_report+0xd1/0x610
[   15.184376]  ? __virt_addr_valid+0x1db/0x2d0
[   15.184400]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.184477]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.184501]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.184528]  kasan_report+0x141/0x180
[   15.184562]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.184595]  kasan_check_range+0x10c/0x1c0
[   15.184651]  __kasan_check_write+0x18/0x20
[   15.184671]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.184699]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.184728]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.184753]  ? kasan_bitops_generic+0x92/0x1c0
[   15.184807]  kasan_bitops_generic+0x116/0x1c0
[   15.184832]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.184857]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.184887]  kunit_try_run_case+0x1a5/0x480
[   15.184912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.184935]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.184960]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.184986]  ? __kthread_parkme+0x82/0x180
[   15.185007]  ? preempt_count_sub+0x50/0x80
[   15.185032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.185057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.185082]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.185109]  kthread+0x337/0x6f0
[   15.185128]  ? trace_preempt_on+0x20/0xc0
[   15.185152]  ? __pfx_kthread+0x10/0x10
[   15.185173]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.185195]  ? calculate_sigpending+0x7b/0xa0
[   15.185220]  ? __pfx_kthread+0x10/0x10
[   15.185308]  ret_from_fork+0x116/0x1d0
[   15.185332]  ? __pfx_kthread+0x10/0x10
[   15.185354]  ret_from_fork_asm+0x1a/0x30
[   15.185385]  </TASK>
[   15.185394] 
[   15.194892] Allocated by task 278:
[   15.195065]  kasan_save_stack+0x45/0x70
[   15.195267]  kasan_save_track+0x18/0x40
[   15.195534]  kasan_save_alloc_info+0x3b/0x50
[   15.195772]  __kasan_kmalloc+0xb7/0xc0
[   15.195965]  __kmalloc_cache_noprof+0x189/0x420
[   15.196219]  kasan_bitops_generic+0x92/0x1c0
[   15.196563]  kunit_try_run_case+0x1a5/0x480
[   15.196736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.196942]  kthread+0x337/0x6f0
[   15.197133]  ret_from_fork+0x116/0x1d0
[   15.197324]  ret_from_fork_asm+0x1a/0x30
[   15.197467] 
[   15.197539] The buggy address belongs to the object at ffff888101679da0
[   15.197539]  which belongs to the cache kmalloc-16 of size 16
[   15.200176] The buggy address is located 8 bytes inside of
[   15.200176]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.201455] 
[   15.201539] The buggy address belongs to the physical page:
[   15.201721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.201957] flags: 0x200000000000000(node=0|zone=2)
[   15.202117] page_type: f5(slab)
[   15.202235] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.203515] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.204545] page dumped because: kasan: bad access detected
[   15.205438] 
[   15.205782] Memory state around the buggy address:
[   15.206403]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.206761]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.207095] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.207424]                                   ^
[   15.207638]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.207956]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.208275] ==================================================================
[   15.246770] ==================================================================
[   15.247112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.247533] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.247856] 
[   15.247957] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.248000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.248011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.248033] Call Trace:
[   15.248045]  <TASK>
[   15.248065]  dump_stack_lvl+0x73/0xb0
[   15.248092]  print_report+0xd1/0x610
[   15.248113]  ? __virt_addr_valid+0x1db/0x2d0
[   15.248135]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.248163]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.248186]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.248214]  kasan_report+0x141/0x180
[   15.248306]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.248339]  kasan_check_range+0x10c/0x1c0
[   15.248363]  __kasan_check_write+0x18/0x20
[   15.248384]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.248411]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.248456]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.248482]  ? kasan_bitops_generic+0x92/0x1c0
[   15.248509]  kasan_bitops_generic+0x116/0x1c0
[   15.248534]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.248568]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.248598]  kunit_try_run_case+0x1a5/0x480
[   15.248622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.248646]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.248671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.248696]  ? __kthread_parkme+0x82/0x180
[   15.248717]  ? preempt_count_sub+0x50/0x80
[   15.248742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.248767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.248794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.248821]  kthread+0x337/0x6f0
[   15.248839]  ? trace_preempt_on+0x20/0xc0
[   15.248863]  ? __pfx_kthread+0x10/0x10
[   15.248883]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.248905]  ? calculate_sigpending+0x7b/0xa0
[   15.248928]  ? __pfx_kthread+0x10/0x10
[   15.248950]  ret_from_fork+0x116/0x1d0
[   15.248969]  ? __pfx_kthread+0x10/0x10
[   15.248989]  ret_from_fork_asm+0x1a/0x30
[   15.249020]  </TASK>
[   15.249030] 
[   15.257094] Allocated by task 278:
[   15.257444]  kasan_save_stack+0x45/0x70
[   15.257651]  kasan_save_track+0x18/0x40
[   15.257791]  kasan_save_alloc_info+0x3b/0x50
[   15.257965]  __kasan_kmalloc+0xb7/0xc0
[   15.258154]  __kmalloc_cache_noprof+0x189/0x420
[   15.258468]  kasan_bitops_generic+0x92/0x1c0
[   15.258700]  kunit_try_run_case+0x1a5/0x480
[   15.258907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.259150]  kthread+0x337/0x6f0
[   15.259354]  ret_from_fork+0x116/0x1d0
[   15.259576]  ret_from_fork_asm+0x1a/0x30
[   15.259717] 
[   15.259787] The buggy address belongs to the object at ffff888101679da0
[   15.259787]  which belongs to the cache kmalloc-16 of size 16
[   15.260190] The buggy address is located 8 bytes inside of
[   15.260190]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.260800] 
[   15.260897] The buggy address belongs to the physical page:
[   15.261086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.261332] flags: 0x200000000000000(node=0|zone=2)
[   15.261547] page_type: f5(slab)
[   15.261722] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.262056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.262388] page dumped because: kasan: bad access detected
[   15.262645] 
[   15.262737] Memory state around the buggy address:
[   15.262951]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.263213]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.263499] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.263839]                                   ^
[   15.264045]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.264457]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.264796] ==================================================================
[   15.208890] ==================================================================
[   15.209183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.209749] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.210049] 
[   15.210160] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.210203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.210214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.210306] Call Trace:
[   15.210322]  <TASK>
[   15.210337]  dump_stack_lvl+0x73/0xb0
[   15.210366]  print_report+0xd1/0x610
[   15.210389]  ? __virt_addr_valid+0x1db/0x2d0
[   15.210411]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.210456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.210480]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.210507]  kasan_report+0x141/0x180
[   15.210529]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.210571]  kasan_check_range+0x10c/0x1c0
[   15.210595]  __kasan_check_write+0x18/0x20
[   15.210615]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.210642]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.210671]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.210697]  ? kasan_bitops_generic+0x92/0x1c0
[   15.210724]  kasan_bitops_generic+0x116/0x1c0
[   15.210749]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.210774]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.210804]  kunit_try_run_case+0x1a5/0x480
[   15.210829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.210852]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.210876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.210901]  ? __kthread_parkme+0x82/0x180
[   15.210921]  ? preempt_count_sub+0x50/0x80
[   15.210945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.210970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.210995]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.211021]  kthread+0x337/0x6f0
[   15.211039]  ? trace_preempt_on+0x20/0xc0
[   15.211062]  ? __pfx_kthread+0x10/0x10
[   15.211083]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.211105]  ? calculate_sigpending+0x7b/0xa0
[   15.211128]  ? __pfx_kthread+0x10/0x10
[   15.211150]  ret_from_fork+0x116/0x1d0
[   15.211169]  ? __pfx_kthread+0x10/0x10
[   15.211189]  ret_from_fork_asm+0x1a/0x30
[   15.211220]  </TASK>
[   15.211288] 
[   15.219361] Allocated by task 278:
[   15.219519]  kasan_save_stack+0x45/0x70
[   15.219724]  kasan_save_track+0x18/0x40
[   15.219885]  kasan_save_alloc_info+0x3b/0x50
[   15.220102]  __kasan_kmalloc+0xb7/0xc0
[   15.220247]  __kmalloc_cache_noprof+0x189/0x420
[   15.220407]  kasan_bitops_generic+0x92/0x1c0
[   15.220809]  kunit_try_run_case+0x1a5/0x480
[   15.221029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.221357]  kthread+0x337/0x6f0
[   15.221570]  ret_from_fork+0x116/0x1d0
[   15.221749]  ret_from_fork_asm+0x1a/0x30
[   15.221925] 
[   15.222001] The buggy address belongs to the object at ffff888101679da0
[   15.222001]  which belongs to the cache kmalloc-16 of size 16
[   15.222537] The buggy address is located 8 bytes inside of
[   15.222537]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.223077] 
[   15.223173] The buggy address belongs to the physical page:
[   15.223514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.223859] flags: 0x200000000000000(node=0|zone=2)
[   15.224077] page_type: f5(slab)
[   15.224286] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.224624] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.224922] page dumped because: kasan: bad access detected
[   15.225118] 
[   15.225187] Memory state around the buggy address:
[   15.225627]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.225953]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.226295] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.226613]                                   ^
[   15.226788]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.227008]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.227378] ==================================================================
[   15.117463] ==================================================================
[   15.117750] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.118115] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278
[   15.118373] 
[   15.118623] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.118682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.118693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.118714] Call Trace:
[   15.118729]  <TASK>
[   15.118745]  dump_stack_lvl+0x73/0xb0
[   15.118773]  print_report+0xd1/0x610
[   15.118796]  ? __virt_addr_valid+0x1db/0x2d0
[   15.118818]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.118845]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.118869]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.118897]  kasan_report+0x141/0x180
[   15.118919]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.118951]  kasan_check_range+0x10c/0x1c0
[   15.118975]  __kasan_check_write+0x18/0x20
[   15.118996]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.119023]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.119052]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.119078]  ? kasan_bitops_generic+0x92/0x1c0
[   15.119131]  kasan_bitops_generic+0x116/0x1c0
[   15.119156]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.119192]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.119222]  kunit_try_run_case+0x1a5/0x480
[   15.119247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.119270]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.119296]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.119321]  ? __kthread_parkme+0x82/0x180
[   15.119341]  ? preempt_count_sub+0x50/0x80
[   15.119366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.119391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.119484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.119525]  kthread+0x337/0x6f0
[   15.119545]  ? trace_preempt_on+0x20/0xc0
[   15.119577]  ? __pfx_kthread+0x10/0x10
[   15.119598]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.119620]  ? calculate_sigpending+0x7b/0xa0
[   15.119645]  ? __pfx_kthread+0x10/0x10
[   15.119667]  ret_from_fork+0x116/0x1d0
[   15.119687]  ? __pfx_kthread+0x10/0x10
[   15.119708]  ret_from_fork_asm+0x1a/0x30
[   15.119738]  </TASK>
[   15.119748] 
[   15.128999] Allocated by task 278:
[   15.129234]  kasan_save_stack+0x45/0x70
[   15.129515]  kasan_save_track+0x18/0x40
[   15.129666]  kasan_save_alloc_info+0x3b/0x50
[   15.129898]  __kasan_kmalloc+0xb7/0xc0
[   15.130308]  __kmalloc_cache_noprof+0x189/0x420
[   15.130589]  kasan_bitops_generic+0x92/0x1c0
[   15.130806]  kunit_try_run_case+0x1a5/0x480
[   15.130986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.131185]  kthread+0x337/0x6f0
[   15.131535]  ret_from_fork+0x116/0x1d0
[   15.131838]  ret_from_fork_asm+0x1a/0x30
[   15.132062] 
[   15.132171] The buggy address belongs to the object at ffff888101679da0
[   15.132171]  which belongs to the cache kmalloc-16 of size 16
[   15.132811] The buggy address is located 8 bytes inside of
[   15.132811]  allocated 9-byte region [ffff888101679da0, ffff888101679da9)
[   15.133565] 
[   15.133641] The buggy address belongs to the physical page:
[   15.133855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679
[   15.134253] flags: 0x200000000000000(node=0|zone=2)
[   15.134604] page_type: f5(slab)
[   15.134759] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.135041] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.135664] page dumped because: kasan: bad access detected
[   15.135917] 
[   15.136011] Memory state around the buggy address:
[   15.136213]  ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc
[   15.136634]  ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.137029] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.137619]                                   ^
[   15.137827]  ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.138200]  ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.138756] ==================================================================