Hay
Date
June 24, 2025, 12:47 p.m.

Environment
qemu-arm64
qemu-x86_64

[   27.507442] ==================================================================
[   27.509212] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   27.510302] 
[   27.510760] Call trace:
[   27.511765]  __asan_report_load8_noabort+0x20/0x30
[   27.512553]  kunit_try_run_case+0x170/0x3f0
[   27.513660] Allocated by task 263:
[   27.514310]  __kasan_kmalloc+0xd4/0xd8
[   27.516117] 
[   27.516184] The buggy address belongs to the physical page:
[   27.516549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.517997]                                               ^
[   27.519686] ==================================================================

[   14.109781] ==================================================================
[   14.110159] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.111028] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.111830] 
[   14.111988] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.112065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.112079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.112104] Call Trace:
[   14.112126]  <TASK>
[   14.112151]  dump_stack_lvl+0x73/0xb0
[   14.112203]  print_report+0xd1/0x650
[   14.112227]  ? __virt_addr_valid+0x1db/0x2d0
[   14.112249]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.112271]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.112293]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.112314]  kasan_report+0x141/0x180
[   14.112335]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.112361]  kasan_check_range+0x10c/0x1c0
[   14.112380]  __kasan_check_write+0x18/0x20
[   14.112399]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.112420]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.112441]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.112461]  ? trace_hardirqs_on+0x37/0xe0
[   14.112482]  ? kasan_bitops_generic+0x92/0x1c0
[   14.112506]  kasan_bitops_generic+0x116/0x1c0
[   14.112525]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.112545]  ? __pfx_read_tsc+0x10/0x10
[   14.112564]  ? ktime_get_ts64+0x86/0x230
[   14.112588]  kunit_try_run_case+0x1a5/0x480
[   14.112613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.112706]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.112748]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.112784]  ? __kthread_parkme+0x82/0x180
[   14.112816]  ? preempt_count_sub+0x50/0x80
[   14.112857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.112899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.112945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.112991]  kthread+0x337/0x6f0
[   14.113029]  ? trace_preempt_on+0x20/0xc0
[   14.113066]  ? __pfx_kthread+0x10/0x10
[   14.113087]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.113108]  ? calculate_sigpending+0x7b/0xa0
[   14.113129]  ? __pfx_kthread+0x10/0x10
[   14.113154]  ret_from_fork+0x41/0x80
[   14.113174]  ? __pfx_kthread+0x10/0x10
[   14.113191]  ret_from_fork_asm+0x1a/0x30
[   14.113220]  </TASK>
[   14.113233] 
[   14.125809] Allocated by task 281:
[   14.126096]  kasan_save_stack+0x45/0x70
[   14.126376]  kasan_save_track+0x18/0x40
[   14.126585]  kasan_save_alloc_info+0x3b/0x50
[   14.126832]  __kasan_kmalloc+0xb7/0xc0
[   14.127059]  __kmalloc_cache_noprof+0x189/0x420
[   14.127295]  kasan_bitops_generic+0x92/0x1c0
[   14.127526]  kunit_try_run_case+0x1a5/0x480
[   14.128312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.128558]  kthread+0x337/0x6f0
[   14.128708]  ret_from_fork+0x41/0x80
[   14.128873]  ret_from_fork_asm+0x1a/0x30
[   14.129164] 
[   14.129449] The buggy address belongs to the object at ffff888102662fc0
[   14.129449]  which belongs to the cache kmalloc-16 of size 16
[   14.130260] The buggy address is located 8 bytes inside of
[   14.130260]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.130998] 
[   14.131487] The buggy address belongs to the physical page:
[   14.132692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.133321] flags: 0x200000000000000(node=0|zone=2)
[   14.133823] page_type: f5(slab)
[   14.134096] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.134634] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.135270] page dumped because: kasan: bad access detected
[   14.135941] 
[   14.136064] Memory state around the buggy address:
[   14.136226]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.137343]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.137767] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.138435]                                               ^
[   14.138970]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.139274]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.139844] ==================================================================
[   14.269519] ==================================================================
[   14.270748] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.271697] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.272045] 
[   14.272190] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.272263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.272278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.272310] Call Trace:
[   14.272345]  <TASK>
[   14.272375]  dump_stack_lvl+0x73/0xb0
[   14.272414]  print_report+0xd1/0x650
[   14.272437]  ? __virt_addr_valid+0x1db/0x2d0
[   14.272460]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.272481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.272502]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.272523]  kasan_report+0x141/0x180
[   14.272553]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.272580]  kasan_check_range+0x10c/0x1c0
[   14.272600]  __kasan_check_write+0x18/0x20
[   14.272619]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.272667]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.272703]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.272739]  ? trace_hardirqs_on+0x37/0xe0
[   14.272777]  ? kasan_bitops_generic+0x92/0x1c0
[   14.272819]  kasan_bitops_generic+0x116/0x1c0
[   14.272859]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.272901]  ? __pfx_read_tsc+0x10/0x10
[   14.272941]  ? ktime_get_ts64+0x86/0x230
[   14.272970]  kunit_try_run_case+0x1a5/0x480
[   14.272998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.273017]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.273041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.273062]  ? __kthread_parkme+0x82/0x180
[   14.273083]  ? preempt_count_sub+0x50/0x80
[   14.273119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.273147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.273168]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.273190]  kthread+0x337/0x6f0
[   14.273206]  ? trace_preempt_on+0x20/0xc0
[   14.273228]  ? __pfx_kthread+0x10/0x10
[   14.273245]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.273265]  ? calculate_sigpending+0x7b/0xa0
[   14.273284]  ? __pfx_kthread+0x10/0x10
[   14.273302]  ret_from_fork+0x41/0x80
[   14.273320]  ? __pfx_kthread+0x10/0x10
[   14.273337]  ret_from_fork_asm+0x1a/0x30
[   14.273367]  </TASK>
[   14.273379] 
[   14.287116] Allocated by task 281:
[   14.287651]  kasan_save_stack+0x45/0x70
[   14.288007]  kasan_save_track+0x18/0x40
[   14.288227]  kasan_save_alloc_info+0x3b/0x50
[   14.288600]  __kasan_kmalloc+0xb7/0xc0
[   14.289124]  __kmalloc_cache_noprof+0x189/0x420
[   14.289290]  kasan_bitops_generic+0x92/0x1c0
[   14.289989]  kunit_try_run_case+0x1a5/0x480
[   14.290215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.291337]  kthread+0x337/0x6f0
[   14.291564]  ret_from_fork+0x41/0x80
[   14.291716]  ret_from_fork_asm+0x1a/0x30
[   14.291922] 
[   14.292231] The buggy address belongs to the object at ffff888102662fc0
[   14.292231]  which belongs to the cache kmalloc-16 of size 16
[   14.293084] The buggy address is located 8 bytes inside of
[   14.293084]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.293936] 
[   14.294088] The buggy address belongs to the physical page:
[   14.294692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.295195] flags: 0x200000000000000(node=0|zone=2)
[   14.295354] page_type: f5(slab)
[   14.295486] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.296683] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.297155] page dumped because: kasan: bad access detected
[   14.297537] 
[   14.297858] Memory state around the buggy address:
[   14.298227]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.298816]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.299112] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.299417]                                               ^
[   14.300126]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.300834]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.301294] ==================================================================
[   14.172716] ==================================================================
[   14.173155] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.173620] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.175005] 
[   14.175425] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.175526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.175542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.175565] Call Trace:
[   14.175593]  <TASK>
[   14.175615]  dump_stack_lvl+0x73/0xb0
[   14.175686]  print_report+0xd1/0x650
[   14.175776]  ? __virt_addr_valid+0x1db/0x2d0
[   14.176125]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.176152]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.176176]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.176197]  kasan_report+0x141/0x180
[   14.176220]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.176248]  kasan_check_range+0x10c/0x1c0
[   14.176267]  __kasan_check_write+0x18/0x20
[   14.176293]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.176327]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.176362]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.176393]  ? trace_hardirqs_on+0x37/0xe0
[   14.176421]  ? kasan_bitops_generic+0x92/0x1c0
[   14.176445]  kasan_bitops_generic+0x116/0x1c0
[   14.176464]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.176485]  ? __pfx_read_tsc+0x10/0x10
[   14.176504]  ? ktime_get_ts64+0x86/0x230
[   14.176529]  kunit_try_run_case+0x1a5/0x480
[   14.176560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.176581]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.176604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.176644]  ? __kthread_parkme+0x82/0x180
[   14.176669]  ? preempt_count_sub+0x50/0x80
[   14.176693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.176715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.176737]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.176758]  kthread+0x337/0x6f0
[   14.176774]  ? trace_preempt_on+0x20/0xc0
[   14.176795]  ? __pfx_kthread+0x10/0x10
[   14.176813]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.176833]  ? calculate_sigpending+0x7b/0xa0
[   14.176854]  ? __pfx_kthread+0x10/0x10
[   14.176872]  ret_from_fork+0x41/0x80
[   14.176891]  ? __pfx_kthread+0x10/0x10
[   14.176908]  ret_from_fork_asm+0x1a/0x30
[   14.176938]  </TASK>
[   14.176951] 
[   14.190317] Allocated by task 281:
[   14.191167]  kasan_save_stack+0x45/0x70
[   14.191540]  kasan_save_track+0x18/0x40
[   14.191732]  kasan_save_alloc_info+0x3b/0x50
[   14.191969]  __kasan_kmalloc+0xb7/0xc0
[   14.192611]  __kmalloc_cache_noprof+0x189/0x420
[   14.193036]  kasan_bitops_generic+0x92/0x1c0
[   14.193363]  kunit_try_run_case+0x1a5/0x480
[   14.194012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.194286]  kthread+0x337/0x6f0
[   14.194900]  ret_from_fork+0x41/0x80
[   14.195215]  ret_from_fork_asm+0x1a/0x30
[   14.195571] 
[   14.195776] The buggy address belongs to the object at ffff888102662fc0
[   14.195776]  which belongs to the cache kmalloc-16 of size 16
[   14.196441] The buggy address is located 8 bytes inside of
[   14.196441]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.196887] 
[   14.196993] The buggy address belongs to the physical page:
[   14.197187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.197636] flags: 0x200000000000000(node=0|zone=2)
[   14.197888] page_type: f5(slab)
[   14.198174] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.198441] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.198946] page dumped because: kasan: bad access detected
[   14.199261] 
[   14.199426] Memory state around the buggy address:
[   14.199815]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.200066]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.200480] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.201977]                                               ^
[   14.202352]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.202492]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.202893] ==================================================================
[   14.302579] ==================================================================
[   14.303199] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.304678] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.305325] 
[   14.305713] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.305826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.305848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.305884] Call Trace:
[   14.305912]  <TASK>
[   14.305936]  dump_stack_lvl+0x73/0xb0
[   14.305988]  print_report+0xd1/0x650
[   14.306013]  ? __virt_addr_valid+0x1db/0x2d0
[   14.306035]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.306057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.306079]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.306100]  kasan_report+0x141/0x180
[   14.306121]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.306148]  kasan_check_range+0x10c/0x1c0
[   14.306166]  __kasan_check_write+0x18/0x20
[   14.306185]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.306205]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.306227]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.306247]  ? trace_hardirqs_on+0x37/0xe0
[   14.306269]  ? kasan_bitops_generic+0x92/0x1c0
[   14.306291]  kasan_bitops_generic+0x116/0x1c0
[   14.306311]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.306331]  ? __pfx_read_tsc+0x10/0x10
[   14.306350]  ? ktime_get_ts64+0x86/0x230
[   14.306374]  kunit_try_run_case+0x1a5/0x480
[   14.306398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.306419]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.306442]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.306463]  ? __kthread_parkme+0x82/0x180
[   14.306485]  ? preempt_count_sub+0x50/0x80
[   14.306509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.306531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.306573]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.306595]  kthread+0x337/0x6f0
[   14.306611]  ? trace_preempt_on+0x20/0xc0
[   14.306649]  ? __pfx_kthread+0x10/0x10
[   14.306668]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.306688]  ? calculate_sigpending+0x7b/0xa0
[   14.306709]  ? __pfx_kthread+0x10/0x10
[   14.306727]  ret_from_fork+0x41/0x80
[   14.306747]  ? __pfx_kthread+0x10/0x10
[   14.306764]  ret_from_fork_asm+0x1a/0x30
[   14.306793]  </TASK>
[   14.306806] 
[   14.316341] Allocated by task 281:
[   14.316737]  kasan_save_stack+0x45/0x70
[   14.317010]  kasan_save_track+0x18/0x40
[   14.317256]  kasan_save_alloc_info+0x3b/0x50
[   14.317595]  __kasan_kmalloc+0xb7/0xc0
[   14.317871]  __kmalloc_cache_noprof+0x189/0x420
[   14.318185]  kasan_bitops_generic+0x92/0x1c0
[   14.318513]  kunit_try_run_case+0x1a5/0x480
[   14.318716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.319172]  kthread+0x337/0x6f0
[   14.319454]  ret_from_fork+0x41/0x80
[   14.319725]  ret_from_fork_asm+0x1a/0x30
[   14.319903] 
[   14.320007] The buggy address belongs to the object at ffff888102662fc0
[   14.320007]  which belongs to the cache kmalloc-16 of size 16
[   14.320832] The buggy address is located 8 bytes inside of
[   14.320832]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.321407] 
[   14.321521] The buggy address belongs to the physical page:
[   14.321755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.322270] flags: 0x200000000000000(node=0|zone=2)
[   14.322719] page_type: f5(slab)
[   14.322939] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.323238] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.323518] page dumped because: kasan: bad access detected
[   14.323960] 
[   14.324112] Memory state around the buggy address:
[   14.324435]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.325104]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.325575] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.325871]                                               ^
[   14.326090]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.326335]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.326920] ==================================================================
[   14.203723] ==================================================================
[   14.204064] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.204353] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.204607] 
[   14.204809] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.204909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.204934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.204979] Call Trace:
[   14.205024]  <TASK>
[   14.205067]  dump_stack_lvl+0x73/0xb0
[   14.205117]  print_report+0xd1/0x650
[   14.205151]  ? __virt_addr_valid+0x1db/0x2d0
[   14.205182]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.205214]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.205245]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.205275]  kasan_report+0x141/0x180
[   14.205306]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.205341]  kasan_check_range+0x10c/0x1c0
[   14.205370]  __kasan_check_write+0x18/0x20
[   14.205398]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.205427]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.205457]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.205487]  ? trace_hardirqs_on+0x37/0xe0
[   14.205516]  ? kasan_bitops_generic+0x92/0x1c0
[   14.205551]  kasan_bitops_generic+0x116/0x1c0
[   14.205581]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.205613]  ? __pfx_read_tsc+0x10/0x10
[   14.205667]  ? ktime_get_ts64+0x86/0x230
[   14.205710]  kunit_try_run_case+0x1a5/0x480
[   14.205751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.205785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.205831]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.205876]  ? __kthread_parkme+0x82/0x180
[   14.205918]  ? preempt_count_sub+0x50/0x80
[   14.205977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.206021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.206057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.206091]  kthread+0x337/0x6f0
[   14.206117]  ? trace_preempt_on+0x20/0xc0
[   14.206196]  ? __pfx_kthread+0x10/0x10
[   14.206231]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.206271]  ? calculate_sigpending+0x7b/0xa0
[   14.206678]  ? __pfx_kthread+0x10/0x10
[   14.206749]  ret_from_fork+0x41/0x80
[   14.206797]  ? __pfx_kthread+0x10/0x10
[   14.206835]  ret_from_fork_asm+0x1a/0x30
[   14.206903]  </TASK>
[   14.206928] 
[   14.220876] Allocated by task 281:
[   14.221530]  kasan_save_stack+0x45/0x70
[   14.221842]  kasan_save_track+0x18/0x40
[   14.222052]  kasan_save_alloc_info+0x3b/0x50
[   14.222255]  __kasan_kmalloc+0xb7/0xc0
[   14.222900]  __kmalloc_cache_noprof+0x189/0x420
[   14.223699]  kasan_bitops_generic+0x92/0x1c0
[   14.224135]  kunit_try_run_case+0x1a5/0x480
[   14.224686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.225085]  kthread+0x337/0x6f0
[   14.225298]  ret_from_fork+0x41/0x80
[   14.225969]  ret_from_fork_asm+0x1a/0x30
[   14.226292] 
[   14.226431] The buggy address belongs to the object at ffff888102662fc0
[   14.226431]  which belongs to the cache kmalloc-16 of size 16
[   14.227419] The buggy address is located 8 bytes inside of
[   14.227419]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.228011] 
[   14.228446] The buggy address belongs to the physical page:
[   14.229207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.229855] flags: 0x200000000000000(node=0|zone=2)
[   14.230111] page_type: f5(slab)
[   14.230298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.231221] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.231888] page dumped because: kasan: bad access detected
[   14.232244] 
[   14.233052] Memory state around the buggy address:
[   14.233526]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.234001]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.234609] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.234868]                                               ^
[   14.235265]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.235985]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.236920] ==================================================================
[   14.077983] ==================================================================
[   14.078493] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.080181] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.080715] 
[   14.080926] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.081182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.081210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.081257] Call Trace:
[   14.081373]  <TASK>
[   14.081411]  dump_stack_lvl+0x73/0xb0
[   14.081459]  print_report+0xd1/0x650
[   14.081484]  ? __virt_addr_valid+0x1db/0x2d0
[   14.081507]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.081528]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.081564]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.081585]  kasan_report+0x141/0x180
[   14.081606]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.081650]  kasan_check_range+0x10c/0x1c0
[   14.081672]  __kasan_check_write+0x18/0x20
[   14.081691]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.081712]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.081733]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.081755]  ? trace_hardirqs_on+0x37/0xe0
[   14.081778]  ? kasan_bitops_generic+0x92/0x1c0
[   14.081802]  kasan_bitops_generic+0x116/0x1c0
[   14.081820]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.081840]  ? __pfx_read_tsc+0x10/0x10
[   14.081860]  ? ktime_get_ts64+0x86/0x230
[   14.081884]  kunit_try_run_case+0x1a5/0x480
[   14.081908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.081929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.081964]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.081988]  ? __kthread_parkme+0x82/0x180
[   14.082010]  ? preempt_count_sub+0x50/0x80
[   14.082035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.082058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.082080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.082103]  kthread+0x337/0x6f0
[   14.082119]  ? trace_preempt_on+0x20/0xc0
[   14.082140]  ? __pfx_kthread+0x10/0x10
[   14.082157]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.082177]  ? calculate_sigpending+0x7b/0xa0
[   14.082197]  ? __pfx_kthread+0x10/0x10
[   14.082215]  ret_from_fork+0x41/0x80
[   14.082234]  ? __pfx_kthread+0x10/0x10
[   14.082250]  ret_from_fork_asm+0x1a/0x30
[   14.082283]  </TASK>
[   14.082304] 
[   14.093673] Allocated by task 281:
[   14.094086]  kasan_save_stack+0x45/0x70
[   14.094759]  kasan_save_track+0x18/0x40
[   14.095509]  kasan_save_alloc_info+0x3b/0x50
[   14.095876]  __kasan_kmalloc+0xb7/0xc0
[   14.096181]  __kmalloc_cache_noprof+0x189/0x420
[   14.096458]  kasan_bitops_generic+0x92/0x1c0
[   14.096945]  kunit_try_run_case+0x1a5/0x480
[   14.097152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.097476]  kthread+0x337/0x6f0
[   14.097766]  ret_from_fork+0x41/0x80
[   14.098099]  ret_from_fork_asm+0x1a/0x30
[   14.098939] 
[   14.099119] The buggy address belongs to the object at ffff888102662fc0
[   14.099119]  which belongs to the cache kmalloc-16 of size 16
[   14.099968] The buggy address is located 8 bytes inside of
[   14.099968]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.100726] 
[   14.100909] The buggy address belongs to the physical page:
[   14.101174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.101918] flags: 0x200000000000000(node=0|zone=2)
[   14.102273] page_type: f5(slab)
[   14.102973] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.103376] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.104130] page dumped because: kasan: bad access detected
[   14.104493] 
[   14.104642] Memory state around the buggy address:
[   14.104984]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.105427]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.105899] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.106838]                                               ^
[   14.107194]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.107778]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.108109] ==================================================================
[   14.141039] ==================================================================
[   14.141698] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.141996] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.142244] 
[   14.142380] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.143237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.143263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.143303] Call Trace:
[   14.143440]  <TASK>
[   14.143480]  dump_stack_lvl+0x73/0xb0
[   14.143540]  print_report+0xd1/0x650
[   14.143580]  ? __virt_addr_valid+0x1db/0x2d0
[   14.143638]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.143679]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.143716]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.143755]  kasan_report+0x141/0x180
[   14.143790]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.143818]  kasan_check_range+0x10c/0x1c0
[   14.143838]  __kasan_check_write+0x18/0x20
[   14.143857]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.143878]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.143904]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.143936]  ? trace_hardirqs_on+0x37/0xe0
[   14.143958]  ? kasan_bitops_generic+0x92/0x1c0
[   14.143981]  kasan_bitops_generic+0x116/0x1c0
[   14.144000]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.144020]  ? __pfx_read_tsc+0x10/0x10
[   14.144039]  ? ktime_get_ts64+0x86/0x230
[   14.144064]  kunit_try_run_case+0x1a5/0x480
[   14.144088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.144108]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.144132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.144153]  ? __kthread_parkme+0x82/0x180
[   14.144175]  ? preempt_count_sub+0x50/0x80
[   14.144198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.144220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.144241]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.144263]  kthread+0x337/0x6f0
[   14.144279]  ? trace_preempt_on+0x20/0xc0
[   14.144444]  ? __pfx_kthread+0x10/0x10
[   14.144485]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.144517]  ? calculate_sigpending+0x7b/0xa0
[   14.144550]  ? __pfx_kthread+0x10/0x10
[   14.144575]  ret_from_fork+0x41/0x80
[   14.144606]  ? __pfx_kthread+0x10/0x10
[   14.144649]  ret_from_fork_asm+0x1a/0x30
[   14.144698]  </TASK>
[   14.144719] 
[   14.156744] Allocated by task 281:
[   14.157127]  kasan_save_stack+0x45/0x70
[   14.158164]  kasan_save_track+0x18/0x40
[   14.158605]  kasan_save_alloc_info+0x3b/0x50
[   14.158797]  __kasan_kmalloc+0xb7/0xc0
[   14.159072]  __kmalloc_cache_noprof+0x189/0x420
[   14.159669]  kasan_bitops_generic+0x92/0x1c0
[   14.159960]  kunit_try_run_case+0x1a5/0x480
[   14.160505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.160922]  kthread+0x337/0x6f0
[   14.161170]  ret_from_fork+0x41/0x80
[   14.161863]  ret_from_fork_asm+0x1a/0x30
[   14.162119] 
[   14.162233] The buggy address belongs to the object at ffff888102662fc0
[   14.162233]  which belongs to the cache kmalloc-16 of size 16
[   14.162856] The buggy address is located 8 bytes inside of
[   14.162856]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.163460] 
[   14.163609] The buggy address belongs to the physical page:
[   14.164384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.164936] flags: 0x200000000000000(node=0|zone=2)
[   14.165252] page_type: f5(slab)
[   14.166104] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.166525] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.167114] page dumped because: kasan: bad access detected
[   14.167431] 
[   14.167608] Memory state around the buggy address:
[   14.168103]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.168755]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.169016] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.170060]                                               ^
[   14.170422]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.171172]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.171577] ==================================================================
[   14.237565] ==================================================================
[   14.237896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.239789] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281
[   14.240214] 
[   14.240735] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   14.240839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.240858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.240893] Call Trace:
[   14.240933]  <TASK>
[   14.240968]  dump_stack_lvl+0x73/0xb0
[   14.241031]  print_report+0xd1/0x650
[   14.241082]  ? __virt_addr_valid+0x1db/0x2d0
[   14.241126]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.241165]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.241218]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.241263]  kasan_report+0x141/0x180
[   14.241301]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.241375]  kasan_check_range+0x10c/0x1c0
[   14.241414]  __kasan_check_write+0x18/0x20
[   14.241447]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.241476]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.241499]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.241520]  ? trace_hardirqs_on+0x37/0xe0
[   14.241561]  ? kasan_bitops_generic+0x92/0x1c0
[   14.241586]  kasan_bitops_generic+0x116/0x1c0
[   14.241606]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.241642]  ? __pfx_read_tsc+0x10/0x10
[   14.241663]  ? ktime_get_ts64+0x86/0x230
[   14.241689]  kunit_try_run_case+0x1a5/0x480
[   14.241715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.241735]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.241758]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.241781]  ? __kthread_parkme+0x82/0x180
[   14.241802]  ? preempt_count_sub+0x50/0x80
[   14.241826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.241848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.241868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.241889]  kthread+0x337/0x6f0
[   14.241906]  ? trace_preempt_on+0x20/0xc0
[   14.241928]  ? __pfx_kthread+0x10/0x10
[   14.241956]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.241979]  ? calculate_sigpending+0x7b/0xa0
[   14.242000]  ? __pfx_kthread+0x10/0x10
[   14.242019]  ret_from_fork+0x41/0x80
[   14.242038]  ? __pfx_kthread+0x10/0x10
[   14.242058]  ret_from_fork_asm+0x1a/0x30
[   14.242090]  </TASK>
[   14.242103] 
[   14.255201] Allocated by task 281:
[   14.255471]  kasan_save_stack+0x45/0x70
[   14.255740]  kasan_save_track+0x18/0x40
[   14.255946]  kasan_save_alloc_info+0x3b/0x50
[   14.256179]  __kasan_kmalloc+0xb7/0xc0
[   14.256420]  __kmalloc_cache_noprof+0x189/0x420
[   14.256718]  kasan_bitops_generic+0x92/0x1c0
[   14.256954]  kunit_try_run_case+0x1a5/0x480
[   14.257142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.257349]  kthread+0x337/0x6f0
[   14.257502]  ret_from_fork+0x41/0x80
[   14.258558]  ret_from_fork_asm+0x1a/0x30
[   14.258976] 
[   14.259150] The buggy address belongs to the object at ffff888102662fc0
[   14.259150]  which belongs to the cache kmalloc-16 of size 16
[   14.260210] The buggy address is located 8 bytes inside of
[   14.260210]  allocated 9-byte region [ffff888102662fc0, ffff888102662fc9)
[   14.261131] 
[   14.261833] The buggy address belongs to the physical page:
[   14.262096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662
[   14.262974] flags: 0x200000000000000(node=0|zone=2)
[   14.263281] page_type: f5(slab)
[   14.263534] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.264555] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.264901] page dumped because: kasan: bad access detected
[   14.265811] 
[   14.265920] Memory state around the buggy address:
[   14.266156]  ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   14.266669]  ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   14.266994] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.267262]                                               ^
[   14.267671]  ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.268215]  ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb
[   14.268687] ==================================================================