Hay
Date
July 8, 2025, 4:38 p.m.

Environment
qemu-x86_64

[   13.498697] ==================================================================
[   13.499259] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.499729] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.500165] 
[   13.500288] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.500345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.500358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.500381] Call Trace:
[   13.500406]  <TASK>
[   13.500422]  dump_stack_lvl+0x73/0xb0
[   13.500448]  print_report+0xd1/0x650
[   13.500472]  ? __virt_addr_valid+0x1db/0x2d0
[   13.500504]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.500534]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.500558]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.500592]  kasan_report+0x141/0x180
[   13.500615]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.500643]  kasan_check_range+0x10c/0x1c0
[   13.500665]  __kasan_check_write+0x18/0x20
[   13.500686]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.500709]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.500733]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.500765]  ? trace_hardirqs_on+0x37/0xe0
[   13.500788]  ? kasan_bitops_generic+0x92/0x1c0
[   13.500815]  kasan_bitops_generic+0x116/0x1c0
[   13.500930]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.500958]  ? trace_hardirqs_on+0x37/0xe0
[   13.500983]  ? __pfx_read_tsc+0x10/0x10
[   13.501005]  ? ktime_get_ts64+0x86/0x230
[   13.501029]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.501056]  kunit_try_run_case+0x1a5/0x480
[   13.501078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.501111]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.501138]  ? __kthread_parkme+0x82/0x180
[   13.501161]  ? preempt_count_sub+0x50/0x80
[   13.501199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.501220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.501244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.501268]  kthread+0x337/0x6f0
[   13.501286]  ? trace_preempt_on+0x20/0xc0
[   13.501309]  ? __pfx_kthread+0x10/0x10
[   13.501327]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.501350]  ? calculate_sigpending+0x7b/0xa0
[   13.501372]  ? __pfx_kthread+0x10/0x10
[   13.501391]  ret_from_fork+0x41/0x80
[   13.501412]  ? __pfx_kthread+0x10/0x10
[   13.501431]  ret_from_fork_asm+0x1a/0x30
[   13.501461]  </TASK>
[   13.501473] 
[   13.510542] Allocated by task 281:
[   13.510730]  kasan_save_stack+0x45/0x70
[   13.511163]  kasan_save_track+0x18/0x40
[   13.511385]  kasan_save_alloc_info+0x3b/0x50
[   13.511665]  __kasan_kmalloc+0xb7/0xc0
[   13.511904]  __kmalloc_cache_noprof+0x189/0x420
[   13.512142]  kasan_bitops_generic+0x92/0x1c0
[   13.512339]  kunit_try_run_case+0x1a5/0x480
[   13.512596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.512832]  kthread+0x337/0x6f0
[   13.513183]  ret_from_fork+0x41/0x80
[   13.513374]  ret_from_fork_asm+0x1a/0x30
[   13.513601] 
[   13.513695] The buggy address belongs to the object at ffff888102171600
[   13.513695]  which belongs to the cache kmalloc-16 of size 16
[   13.514219] The buggy address is located 8 bytes inside of
[   13.514219]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.514686] 
[   13.514805] The buggy address belongs to the physical page:
[   13.515072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.515620] flags: 0x200000000000000(node=0|zone=2)
[   13.515787] page_type: f5(slab)
[   13.515970] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.516360] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.516803] page dumped because: kasan: bad access detected
[   13.517181] 
[   13.517279] Memory state around the buggy address:
[   13.517502]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.517776]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.518231] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.518513]                       ^
[   13.518645]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.519034]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.519427] ==================================================================
[   13.366031] ==================================================================
[   13.366392] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.366730] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.367060] 
[   13.367171] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.367213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.367225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.367246] Call Trace:
[   13.367260]  <TASK>
[   13.367274]  dump_stack_lvl+0x73/0xb0
[   13.367298]  print_report+0xd1/0x650
[   13.367321]  ? __virt_addr_valid+0x1db/0x2d0
[   13.367343]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.367364]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.367387]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.367411]  kasan_report+0x141/0x180
[   13.367433]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.367459]  kasan_check_range+0x10c/0x1c0
[   13.367480]  __kasan_check_write+0x18/0x20
[   13.367500]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.367522]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.367547]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.367568]  ? trace_hardirqs_on+0x37/0xe0
[   13.367599]  ? kasan_bitops_generic+0x92/0x1c0
[   13.367623]  kasan_bitops_generic+0x116/0x1c0
[   13.367646]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.367666]  ? trace_hardirqs_on+0x37/0xe0
[   13.367688]  ? __pfx_read_tsc+0x10/0x10
[   13.367708]  ? ktime_get_ts64+0x86/0x230
[   13.367730]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.367753]  kunit_try_run_case+0x1a5/0x480
[   13.367774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.367795]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.367821]  ? __kthread_parkme+0x82/0x180
[   13.367843]  ? preempt_count_sub+0x50/0x80
[   13.367868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.368186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.368213]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.368239]  kthread+0x337/0x6f0
[   13.368258]  ? trace_preempt_on+0x20/0xc0
[   13.368281]  ? __pfx_kthread+0x10/0x10
[   13.368300]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.368324]  ? calculate_sigpending+0x7b/0xa0
[   13.368346]  ? __pfx_kthread+0x10/0x10
[   13.368366]  ret_from_fork+0x41/0x80
[   13.368387]  ? __pfx_kthread+0x10/0x10
[   13.368405]  ret_from_fork_asm+0x1a/0x30
[   13.368436]  </TASK>
[   13.368447] 
[   13.389420] Allocated by task 281:
[   13.389844]  kasan_save_stack+0x45/0x70
[   13.390474]  kasan_save_track+0x18/0x40
[   13.391151]  kasan_save_alloc_info+0x3b/0x50
[   13.391799]  __kasan_kmalloc+0xb7/0xc0
[   13.392176]  __kmalloc_cache_noprof+0x189/0x420
[   13.392344]  kasan_bitops_generic+0x92/0x1c0
[   13.392493]  kunit_try_run_case+0x1a5/0x480
[   13.393425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.394079]  kthread+0x337/0x6f0
[   13.394561]  ret_from_fork+0x41/0x80
[   13.395161]  ret_from_fork_asm+0x1a/0x30
[   13.395869] 
[   13.396121] The buggy address belongs to the object at ffff888102171600
[   13.396121]  which belongs to the cache kmalloc-16 of size 16
[   13.397429] The buggy address is located 8 bytes inside of
[   13.397429]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.398779] 
[   13.399144] The buggy address belongs to the physical page:
[   13.399741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.400671] flags: 0x200000000000000(node=0|zone=2)
[   13.401118] page_type: f5(slab)
[   13.401250] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.401490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.403017] page dumped because: kasan: bad access detected
[   13.403730] 
[   13.404068] Memory state around the buggy address:
[   13.404677]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.405479]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.406404] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.407271]                       ^
[   13.407917]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.408753]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.409296] ==================================================================
[   13.476695] ==================================================================
[   13.477036] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.477666] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.478051] 
[   13.478171] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.478216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.478229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.478250] Call Trace:
[   13.478265]  <TASK>
[   13.478282]  dump_stack_lvl+0x73/0xb0
[   13.478308]  print_report+0xd1/0x650
[   13.478332]  ? __virt_addr_valid+0x1db/0x2d0
[   13.478355]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.478377]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.478401]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.478424]  kasan_report+0x141/0x180
[   13.478447]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.478474]  kasan_check_range+0x10c/0x1c0
[   13.478495]  __kasan_check_write+0x18/0x20
[   13.478516]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.478539]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.478562]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.478598]  ? trace_hardirqs_on+0x37/0xe0
[   13.478621]  ? kasan_bitops_generic+0x92/0x1c0
[   13.478646]  kasan_bitops_generic+0x116/0x1c0
[   13.478679]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.478699]  ? trace_hardirqs_on+0x37/0xe0
[   13.478722]  ? __pfx_read_tsc+0x10/0x10
[   13.478742]  ? ktime_get_ts64+0x86/0x230
[   13.478766]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.478791]  kunit_try_run_case+0x1a5/0x480
[   13.478816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.478838]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.478865]  ? __kthread_parkme+0x82/0x180
[   13.478897]  ? preempt_count_sub+0x50/0x80
[   13.478923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.478945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.478970]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.479043]  kthread+0x337/0x6f0
[   13.479063]  ? trace_preempt_on+0x20/0xc0
[   13.479086]  ? __pfx_kthread+0x10/0x10
[   13.479105]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.479128]  ? calculate_sigpending+0x7b/0xa0
[   13.479151]  ? __pfx_kthread+0x10/0x10
[   13.479170]  ret_from_fork+0x41/0x80
[   13.479191]  ? __pfx_kthread+0x10/0x10
[   13.479210]  ret_from_fork_asm+0x1a/0x30
[   13.479240]  </TASK>
[   13.479250] 
[   13.489418] Allocated by task 281:
[   13.489641]  kasan_save_stack+0x45/0x70
[   13.489914]  kasan_save_track+0x18/0x40
[   13.490111]  kasan_save_alloc_info+0x3b/0x50
[   13.490265]  __kasan_kmalloc+0xb7/0xc0
[   13.490459]  __kmalloc_cache_noprof+0x189/0x420
[   13.490703]  kasan_bitops_generic+0x92/0x1c0
[   13.490926]  kunit_try_run_case+0x1a5/0x480
[   13.491341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.491657]  kthread+0x337/0x6f0
[   13.491799]  ret_from_fork+0x41/0x80
[   13.492245]  ret_from_fork_asm+0x1a/0x30
[   13.492435] 
[   13.492564] The buggy address belongs to the object at ffff888102171600
[   13.492564]  which belongs to the cache kmalloc-16 of size 16
[   13.493106] The buggy address is located 8 bytes inside of
[   13.493106]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.493634] 
[   13.493737] The buggy address belongs to the physical page:
[   13.494079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.494386] flags: 0x200000000000000(node=0|zone=2)
[   13.494811] page_type: f5(slab)
[   13.495125] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.495466] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.495809] page dumped because: kasan: bad access detected
[   13.496149] 
[   13.496250] Memory state around the buggy address:
[   13.496473]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.496772]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.497114] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.497480]                       ^
[   13.497680]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.497901]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.498227] ==================================================================
[   13.410439] ==================================================================
[   13.411705] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.412805] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.413541] 
[   13.413931] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.414090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.414104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.414140] Call Trace:
[   13.414161]  <TASK>
[   13.414213]  dump_stack_lvl+0x73/0xb0
[   13.414246]  print_report+0xd1/0x650
[   13.414270]  ? __virt_addr_valid+0x1db/0x2d0
[   13.414294]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.414317]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.414340]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.414364]  kasan_report+0x141/0x180
[   13.414388]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.414415]  kasan_check_range+0x10c/0x1c0
[   13.414436]  __kasan_check_write+0x18/0x20
[   13.414457]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.414481]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.414504]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.414527]  ? trace_hardirqs_on+0x37/0xe0
[   13.414550]  ? kasan_bitops_generic+0x92/0x1c0
[   13.414575]  kasan_bitops_generic+0x116/0x1c0
[   13.414596]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.414616]  ? trace_hardirqs_on+0x37/0xe0
[   13.414639]  ? __pfx_read_tsc+0x10/0x10
[   13.414660]  ? ktime_get_ts64+0x86/0x230
[   13.414684]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.414708]  kunit_try_run_case+0x1a5/0x480
[   13.414730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.414751]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.414777]  ? __kthread_parkme+0x82/0x180
[   13.414800]  ? preempt_count_sub+0x50/0x80
[   13.414826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.414847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.414885]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.414911]  kthread+0x337/0x6f0
[   13.414928]  ? trace_preempt_on+0x20/0xc0
[   13.414951]  ? __pfx_kthread+0x10/0x10
[   13.414970]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.414993]  ? calculate_sigpending+0x7b/0xa0
[   13.415016]  ? __pfx_kthread+0x10/0x10
[   13.415035]  ret_from_fork+0x41/0x80
[   13.415056]  ? __pfx_kthread+0x10/0x10
[   13.415076]  ret_from_fork_asm+0x1a/0x30
[   13.415107]  </TASK>
[   13.415119] 
[   13.430321] Allocated by task 281:
[   13.430744]  kasan_save_stack+0x45/0x70
[   13.431254]  kasan_save_track+0x18/0x40
[   13.431667]  kasan_save_alloc_info+0x3b/0x50
[   13.432236]  __kasan_kmalloc+0xb7/0xc0
[   13.432638]  __kmalloc_cache_noprof+0x189/0x420
[   13.433200]  kasan_bitops_generic+0x92/0x1c0
[   13.433362]  kunit_try_run_case+0x1a5/0x480
[   13.433521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.434049]  kthread+0x337/0x6f0
[   13.434428]  ret_from_fork+0x41/0x80
[   13.434849]  ret_from_fork_asm+0x1a/0x30
[   13.435291] 
[   13.435454] The buggy address belongs to the object at ffff888102171600
[   13.435454]  which belongs to the cache kmalloc-16 of size 16
[   13.436177] The buggy address is located 8 bytes inside of
[   13.436177]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.436571] 
[   13.436732] The buggy address belongs to the physical page:
[   13.437455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.438287] flags: 0x200000000000000(node=0|zone=2)
[   13.438832] page_type: f5(slab)
[   13.439236] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.440266] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.440611] page dumped because: kasan: bad access detected
[   13.441280] 
[   13.441444] Memory state around the buggy address:
[   13.441940]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.442267]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.442486] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.442829]                       ^
[   13.443242]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.443767]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.444376] ==================================================================
[   13.520285] ==================================================================
[   13.520650] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.521019] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.521535] 
[   13.521672] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.521716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.521729] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.521752] Call Trace:
[   13.521960]  <TASK>
[   13.521987]  dump_stack_lvl+0x73/0xb0
[   13.522014]  print_report+0xd1/0x650
[   13.522038]  ? __virt_addr_valid+0x1db/0x2d0
[   13.522086]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.522109]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.522133]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.522166]  kasan_report+0x141/0x180
[   13.522190]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.522217]  kasan_check_range+0x10c/0x1c0
[   13.522249]  __kasan_check_write+0x18/0x20
[   13.522270]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.522294]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.522318]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.522340]  ? trace_hardirqs_on+0x37/0xe0
[   13.522362]  ? kasan_bitops_generic+0x92/0x1c0
[   13.522387]  kasan_bitops_generic+0x116/0x1c0
[   13.522407]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.522428]  ? trace_hardirqs_on+0x37/0xe0
[   13.522451]  ? __pfx_read_tsc+0x10/0x10
[   13.522471]  ? ktime_get_ts64+0x86/0x230
[   13.522494]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.522531]  kunit_try_run_case+0x1a5/0x480
[   13.522555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.522575]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.522601]  ? __kthread_parkme+0x82/0x180
[   13.522623]  ? preempt_count_sub+0x50/0x80
[   13.522649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.522670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.522693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.522718]  kthread+0x337/0x6f0
[   13.522735]  ? trace_preempt_on+0x20/0xc0
[   13.522758]  ? __pfx_kthread+0x10/0x10
[   13.522777]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.522800]  ? calculate_sigpending+0x7b/0xa0
[   13.522822]  ? __pfx_kthread+0x10/0x10
[   13.522849]  ret_from_fork+0x41/0x80
[   13.522871]  ? __pfx_kthread+0x10/0x10
[   13.522907]  ret_from_fork_asm+0x1a/0x30
[   13.522937]  </TASK>
[   13.522948] 
[   13.531595] Allocated by task 281:
[   13.531787]  kasan_save_stack+0x45/0x70
[   13.532001]  kasan_save_track+0x18/0x40
[   13.532185]  kasan_save_alloc_info+0x3b/0x50
[   13.532383]  __kasan_kmalloc+0xb7/0xc0
[   13.532562]  __kmalloc_cache_noprof+0x189/0x420
[   13.532766]  kasan_bitops_generic+0x92/0x1c0
[   13.533162]  kunit_try_run_case+0x1a5/0x480
[   13.533399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.533617]  kthread+0x337/0x6f0
[   13.533743]  ret_from_fork+0x41/0x80
[   13.533888]  ret_from_fork_asm+0x1a/0x30
[   13.534040] 
[   13.534166] The buggy address belongs to the object at ffff888102171600
[   13.534166]  which belongs to the cache kmalloc-16 of size 16
[   13.534734] The buggy address is located 8 bytes inside of
[   13.534734]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.535264] 
[   13.535343] The buggy address belongs to the physical page:
[   13.535541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.535907] flags: 0x200000000000000(node=0|zone=2)
[   13.536178] page_type: f5(slab)
[   13.536358] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.536755] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.537099] page dumped because: kasan: bad access detected
[   13.537343] 
[   13.537462] Memory state around the buggy address:
[   13.537719]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.538044]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.538366] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.538705]                       ^
[   13.538894]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.539167]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.539464] ==================================================================
[   13.344030] ==================================================================
[   13.344403] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.344901] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.345161] 
[   13.345250] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.345293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.345305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.345327] Call Trace:
[   13.345339]  <TASK>
[   13.345355]  dump_stack_lvl+0x73/0xb0
[   13.345380]  print_report+0xd1/0x650
[   13.345402]  ? __virt_addr_valid+0x1db/0x2d0
[   13.345425]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.345447]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.345470]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.345494]  kasan_report+0x141/0x180
[   13.345518]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.345545]  kasan_check_range+0x10c/0x1c0
[   13.345589]  __kasan_check_write+0x18/0x20
[   13.345610]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.345634]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.345661]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.345684]  ? trace_hardirqs_on+0x37/0xe0
[   13.345707]  ? kasan_bitops_generic+0x92/0x1c0
[   13.345732]  kasan_bitops_generic+0x116/0x1c0
[   13.345753]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.345774]  ? trace_hardirqs_on+0x37/0xe0
[   13.345796]  ? __pfx_read_tsc+0x10/0x10
[   13.345817]  ? ktime_get_ts64+0x86/0x230
[   13.346008]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.346035]  kunit_try_run_case+0x1a5/0x480
[   13.346058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.346080]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.346105]  ? __kthread_parkme+0x82/0x180
[   13.346127]  ? preempt_count_sub+0x50/0x80
[   13.346154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.346175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.346200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.346224]  kthread+0x337/0x6f0
[   13.346241]  ? trace_preempt_on+0x20/0xc0
[   13.346264]  ? __pfx_kthread+0x10/0x10
[   13.346283]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.346306]  ? calculate_sigpending+0x7b/0xa0
[   13.346328]  ? __pfx_kthread+0x10/0x10
[   13.346347]  ret_from_fork+0x41/0x80
[   13.346368]  ? __pfx_kthread+0x10/0x10
[   13.346387]  ret_from_fork_asm+0x1a/0x30
[   13.346418]  </TASK>
[   13.346428] 
[   13.355114] Allocated by task 281:
[   13.355315]  kasan_save_stack+0x45/0x70
[   13.355512]  kasan_save_track+0x18/0x40
[   13.355702]  kasan_save_alloc_info+0x3b/0x50
[   13.356006]  __kasan_kmalloc+0xb7/0xc0
[   13.356175]  __kmalloc_cache_noprof+0x189/0x420
[   13.356357]  kasan_bitops_generic+0x92/0x1c0
[   13.356592]  kunit_try_run_case+0x1a5/0x480
[   13.356784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.357128]  kthread+0x337/0x6f0
[   13.357276]  ret_from_fork+0x41/0x80
[   13.357441]  ret_from_fork_asm+0x1a/0x30
[   13.357668] 
[   13.357747] The buggy address belongs to the object at ffff888102171600
[   13.357747]  which belongs to the cache kmalloc-16 of size 16
[   13.358271] The buggy address is located 8 bytes inside of
[   13.358271]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.358928] 
[   13.359038] The buggy address belongs to the physical page:
[   13.359292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.359629] flags: 0x200000000000000(node=0|zone=2)
[   13.359800] page_type: f5(slab)
[   13.360064] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.360417] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.360792] page dumped because: kasan: bad access detected
[   13.361125] 
[   13.361231] Memory state around the buggy address:
[   13.361416]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.361740]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.362126] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.362458]                       ^
[   13.362669]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.363109]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.363425] ==================================================================
[   13.445279] ==================================================================
[   13.445777] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.446497] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.447232] 
[   13.447415] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.447472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.447493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.447515] Call Trace:
[   13.447531]  <TASK>
[   13.447548]  dump_stack_lvl+0x73/0xb0
[   13.447593]  print_report+0xd1/0x650
[   13.447617]  ? __virt_addr_valid+0x1db/0x2d0
[   13.447648]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.447671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.447694]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.447717]  kasan_report+0x141/0x180
[   13.447740]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.447767]  kasan_check_range+0x10c/0x1c0
[   13.447789]  __kasan_check_write+0x18/0x20
[   13.447809]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.447833]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.447883]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.447905]  ? trace_hardirqs_on+0x37/0xe0
[   13.447928]  ? kasan_bitops_generic+0x92/0x1c0
[   13.447953]  kasan_bitops_generic+0x116/0x1c0
[   13.447976]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.447996]  ? trace_hardirqs_on+0x37/0xe0
[   13.448020]  ? __pfx_read_tsc+0x10/0x10
[   13.448041]  ? ktime_get_ts64+0x86/0x230
[   13.448064]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.448088]  kunit_try_run_case+0x1a5/0x480
[   13.448110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.448132]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.448158]  ? __kthread_parkme+0x82/0x180
[   13.448181]  ? preempt_count_sub+0x50/0x80
[   13.448207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.448228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.448252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.448276]  kthread+0x337/0x6f0
[   13.448293]  ? trace_preempt_on+0x20/0xc0
[   13.448316]  ? __pfx_kthread+0x10/0x10
[   13.448334]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.448357]  ? calculate_sigpending+0x7b/0xa0
[   13.448379]  ? __pfx_kthread+0x10/0x10
[   13.448398]  ret_from_fork+0x41/0x80
[   13.448419]  ? __pfx_kthread+0x10/0x10
[   13.448437]  ret_from_fork_asm+0x1a/0x30
[   13.448468]  </TASK>
[   13.448479] 
[   13.463373] Allocated by task 281:
[   13.463531]  kasan_save_stack+0x45/0x70
[   13.463928]  kasan_save_track+0x18/0x40
[   13.464306]  kasan_save_alloc_info+0x3b/0x50
[   13.464817]  __kasan_kmalloc+0xb7/0xc0
[   13.465398]  __kmalloc_cache_noprof+0x189/0x420
[   13.465906]  kasan_bitops_generic+0x92/0x1c0
[   13.466368]  kunit_try_run_case+0x1a5/0x480
[   13.466807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.467296]  kthread+0x337/0x6f0
[   13.467425]  ret_from_fork+0x41/0x80
[   13.467658]  ret_from_fork_asm+0x1a/0x30
[   13.468112] 
[   13.468287] The buggy address belongs to the object at ffff888102171600
[   13.468287]  which belongs to the cache kmalloc-16 of size 16
[   13.469491] The buggy address is located 8 bytes inside of
[   13.469491]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.470157] 
[   13.470237] The buggy address belongs to the physical page:
[   13.470412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.470673] flags: 0x200000000000000(node=0|zone=2)
[   13.471183] page_type: f5(slab)
[   13.471565] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.472094] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.472507] page dumped because: kasan: bad access detected
[   13.473180] 
[   13.473360] Memory state around the buggy address:
[   13.473812]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.474195]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.474939] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.475335]                       ^
[   13.475743]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.476068]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.476285] ==================================================================
[   13.323714] ==================================================================
[   13.324294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.324627] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281
[   13.325001] 
[   13.325106] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   13.325153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.325166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.325191] Call Trace:
[   13.325203]  <TASK>
[   13.325219]  dump_stack_lvl+0x73/0xb0
[   13.325246]  print_report+0xd1/0x650
[   13.325270]  ? __virt_addr_valid+0x1db/0x2d0
[   13.325293]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.325317]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.325340]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.325363]  kasan_report+0x141/0x180
[   13.325387]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.325415]  kasan_check_range+0x10c/0x1c0
[   13.325436]  __kasan_check_write+0x18/0x20
[   13.325457]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.325480]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.325504]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.325528]  ? trace_hardirqs_on+0x37/0xe0
[   13.325553]  ? kasan_bitops_generic+0x92/0x1c0
[   13.325578]  kasan_bitops_generic+0x116/0x1c0
[   13.325600]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.325620]  ? trace_hardirqs_on+0x37/0xe0
[   13.325643]  ? __pfx_read_tsc+0x10/0x10
[   13.325663]  ? ktime_get_ts64+0x86/0x230
[   13.325686]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.325730]  kunit_try_run_case+0x1a5/0x480
[   13.325752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.325773]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.325810]  ? __kthread_parkme+0x82/0x180
[   13.325833]  ? preempt_count_sub+0x50/0x80
[   13.325860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.325958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.325988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.326014]  kthread+0x337/0x6f0
[   13.326034]  ? trace_preempt_on+0x20/0xc0
[   13.326060]  ? __pfx_kthread+0x10/0x10
[   13.326080]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.326104]  ? calculate_sigpending+0x7b/0xa0
[   13.326127]  ? __pfx_kthread+0x10/0x10
[   13.326147]  ret_from_fork+0x41/0x80
[   13.326168]  ? __pfx_kthread+0x10/0x10
[   13.326188]  ret_from_fork_asm+0x1a/0x30
[   13.326219]  </TASK>
[   13.326230] 
[   13.334854] Allocated by task 281:
[   13.335204]  kasan_save_stack+0x45/0x70
[   13.335429]  kasan_save_track+0x18/0x40
[   13.335633]  kasan_save_alloc_info+0x3b/0x50
[   13.335937]  __kasan_kmalloc+0xb7/0xc0
[   13.336294]  __kmalloc_cache_noprof+0x189/0x420
[   13.336456]  kasan_bitops_generic+0x92/0x1c0
[   13.336603]  kunit_try_run_case+0x1a5/0x480
[   13.336996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.337275]  kthread+0x337/0x6f0
[   13.337447]  ret_from_fork+0x41/0x80
[   13.337770]  ret_from_fork_asm+0x1a/0x30
[   13.338017] 
[   13.338125] The buggy address belongs to the object at ffff888102171600
[   13.338125]  which belongs to the cache kmalloc-16 of size 16
[   13.338615] The buggy address is located 8 bytes inside of
[   13.338615]  allocated 9-byte region [ffff888102171600, ffff888102171609)
[   13.339151] 
[   13.339231] The buggy address belongs to the physical page:
[   13.339432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171
[   13.339795] flags: 0x200000000000000(node=0|zone=2)
[   13.340069] page_type: f5(slab)
[   13.340244] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.340478] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.340706] page dumped because: kasan: bad access detected
[   13.340917] 
[   13.341015] Memory state around the buggy address:
[   13.341246]  ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.341576]  ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.342089] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.342423]                       ^
[   13.342626]  ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.343020]  ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.343326] ==================================================================