Hay
Date
July 8, 2025, 7:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.692812] ==================================================================
[   21.693175] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   21.693279] Write of size 8 at addr fff00000c6404068 by task kunit_try_catch/261
[   21.693689] 
[   21.693750] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.693870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.693901] Hardware name: linux,dummy-virt (DT)
[   21.693933] Call trace:
[   21.694005]  show_stack+0x20/0x38 (C)
[   21.694185]  dump_stack_lvl+0x8c/0xd0
[   21.694416]  print_report+0x118/0x608
[   21.694484]  kasan_report+0xdc/0x128
[   21.694531]  kasan_check_range+0x100/0x1a8
[   21.694832]  __kasan_check_write+0x20/0x30
[   21.694902]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   21.694956]  kasan_bitops_generic+0x110/0x1c8
[   21.695093]  kunit_try_run_case+0x170/0x3f0
[   21.695153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.695476]  kthread+0x328/0x630
[   21.695573]  ret_from_fork+0x10/0x20
[   21.695779] 
[   21.695903] Allocated by task 261:
[   21.696126]  kasan_save_stack+0x3c/0x68
[   21.696244]  kasan_save_track+0x20/0x40
[   21.696324]  kasan_save_alloc_info+0x40/0x58
[   21.696555]  __kasan_kmalloc+0xd4/0xd8
[   21.696860]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.697007]  kasan_bitops_generic+0xa0/0x1c8
[   21.697117]  kunit_try_run_case+0x170/0x3f0
[   21.697299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.697526]  kthread+0x328/0x630
[   21.697644]  ret_from_fork+0x10/0x20
[   21.697720] 
[   21.697964] The buggy address belongs to the object at fff00000c6404060
[   21.697964]  which belongs to the cache kmalloc-16 of size 16
[   21.698100] The buggy address is located 8 bytes inside of
[   21.698100]  allocated 9-byte region [fff00000c6404060, fff00000c6404069)
[   21.698317] 
[   21.698373] The buggy address belongs to the physical page:
[   21.698423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106404
[   21.698490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.698580] page_type: f5(slab)
[   21.698636] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.698687] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.698741] page dumped because: kasan: bad access detected
[   21.698784] 
[   21.698813] Memory state around the buggy address:
[   21.698847]  fff00000c6403f00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   21.698893]  fff00000c6403f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.698942] >fff00000c6404000: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   21.698980]                                                           ^
[   21.699028]  fff00000c6404080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.699077]  fff00000c6404100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.699117] ==================================================================
[   21.684449] ==================================================================
[   21.684512] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   21.684620] Read of size 8 at addr fff00000c6404068 by task kunit_try_catch/261
[   21.684699] 
[   21.684790] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.684872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.684901] Hardware name: linux,dummy-virt (DT)
[   21.684934] Call trace:
[   21.685164]  show_stack+0x20/0x38 (C)
[   21.685734]  dump_stack_lvl+0x8c/0xd0
[   21.685803]  print_report+0x118/0x608
[   21.686121]  kasan_report+0xdc/0x128
[   21.686184]  __asan_report_load8_noabort+0x20/0x30
[   21.686237]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   21.686290]  kasan_bitops_generic+0x110/0x1c8
[   21.686339]  kunit_try_run_case+0x170/0x3f0
[   21.686624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.686702]  kthread+0x328/0x630
[   21.686759]  ret_from_fork+0x10/0x20
[   21.686817] 
[   21.686838] Allocated by task 261:
[   21.687371]  kasan_save_stack+0x3c/0x68
[   21.687480]  kasan_save_track+0x20/0x40
[   21.687549]  kasan_save_alloc_info+0x40/0x58
[   21.687701]  __kasan_kmalloc+0xd4/0xd8
[   21.687916]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.688088]  kasan_bitops_generic+0xa0/0x1c8
[   21.688244]  kunit_try_run_case+0x170/0x3f0
[   21.688567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.688707]  kthread+0x328/0x630
[   21.688815]  ret_from_fork+0x10/0x20
[   21.688951] 
[   21.689038] The buggy address belongs to the object at fff00000c6404060
[   21.689038]  which belongs to the cache kmalloc-16 of size 16
[   21.689162] The buggy address is located 8 bytes inside of
[   21.689162]  allocated 9-byte region [fff00000c6404060, fff00000c6404069)
[   21.689311] 
[   21.689378] The buggy address belongs to the physical page:
[   21.689701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106404
[   21.689921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.690019] page_type: f5(slab)
[   21.690385] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.690631] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.690846] page dumped because: kasan: bad access detected
[   21.690911] 
[   21.690955] Memory state around the buggy address:
[   21.691016]  fff00000c6403f00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   21.691158]  fff00000c6403f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.691213] >fff00000c6404000: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   21.691255]                                                           ^
[   21.691308]  fff00000c6404080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.691353]  fff00000c6404100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.691409] ==================================================================
[   21.674883] ==================================================================
[   21.675062] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.675123] Write of size 8 at addr fff00000c6404068 by task kunit_try_catch/261
[   21.675339] 
[   21.675394] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.675524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.675592] Hardware name: linux,dummy-virt (DT)
[   21.675640] Call trace:
[   21.675667]  show_stack+0x20/0x38 (C)
[   21.675999]  dump_stack_lvl+0x8c/0xd0
[   21.676108]  print_report+0x118/0x608
[   21.676277]  kasan_report+0xdc/0x128
[   21.676382]  kasan_check_range+0x100/0x1a8
[   21.676539]  __kasan_check_write+0x20/0x30
[   21.676667]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.677040]  kasan_bitops_generic+0x110/0x1c8
[   21.677176]  kunit_try_run_case+0x170/0x3f0
[   21.677318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.677433]  kthread+0x328/0x630
[   21.677506]  ret_from_fork+0x10/0x20
[   21.677795] 
[   21.677825] Allocated by task 261:
[   21.678192]  kasan_save_stack+0x3c/0x68
[   21.678276]  kasan_save_track+0x20/0x40
[   21.678414]  kasan_save_alloc_info+0x40/0x58
[   21.678545]  __kasan_kmalloc+0xd4/0xd8
[   21.678937]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.679129]  kasan_bitops_generic+0xa0/0x1c8
[   21.679295]  kunit_try_run_case+0x170/0x3f0
[   21.679359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.679422]  kthread+0x328/0x630
[   21.679831]  ret_from_fork+0x10/0x20
[   21.680021] 
[   21.680125] The buggy address belongs to the object at fff00000c6404060
[   21.680125]  which belongs to the cache kmalloc-16 of size 16
[   21.680293] The buggy address is located 8 bytes inside of
[   21.680293]  allocated 9-byte region [fff00000c6404060, fff00000c6404069)
[   21.680356] 
[   21.680390] The buggy address belongs to the physical page:
[   21.680586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106404
[   21.680697] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.680876] page_type: f5(slab)
[   21.680999] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.681095] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.681259] page dumped because: kasan: bad access detected
[   21.681343] 
[   21.681366] Memory state around the buggy address:
[   21.681420]  fff00000c6403f00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   21.681475]  fff00000c6403f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.681684] >fff00000c6404000: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   21.681898]                                                           ^
[   21.682268]  fff00000c6404080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.682380]  fff00000c6404100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.682490] ==================================================================
[   21.659227] ==================================================================
[   21.659294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.659351] Write of size 8 at addr fff00000c6404068 by task kunit_try_catch/261
[   21.659404] 
[   21.659439] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.659735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.659765] Hardware name: linux,dummy-virt (DT)
[   21.660089] Call trace:
[   21.660304]  show_stack+0x20/0x38 (C)
[   21.660380]  dump_stack_lvl+0x8c/0xd0
[   21.660579]  print_report+0x118/0x608
[   21.660737]  kasan_report+0xdc/0x128
[   21.661097]  kasan_check_range+0x100/0x1a8
[   21.661222]  __kasan_check_write+0x20/0x30
[   21.661337]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.661671]  kasan_bitops_generic+0x110/0x1c8
[   21.662107]  kunit_try_run_case+0x170/0x3f0
[   21.662216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.662450]  kthread+0x328/0x630
[   21.662693]  ret_from_fork+0x10/0x20
[   21.662763] 
[   21.662944] Allocated by task 261:
[   21.663208]  kasan_save_stack+0x3c/0x68
[   21.663303]  kasan_save_track+0x20/0x40
[   21.663344]  kasan_save_alloc_info+0x40/0x58
[   21.663387]  __kasan_kmalloc+0xd4/0xd8
[   21.663567]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.663917]  kasan_bitops_generic+0xa0/0x1c8
[   21.664125]  kunit_try_run_case+0x170/0x3f0
[   21.664229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.664346]  kthread+0x328/0x630
[   21.664454]  ret_from_fork+0x10/0x20
[   21.664517] 
[   21.664579] The buggy address belongs to the object at fff00000c6404060
[   21.664579]  which belongs to the cache kmalloc-16 of size 16
[   21.664793] The buggy address is located 8 bytes inside of
[   21.664793]  allocated 9-byte region [fff00000c6404060, fff00000c6404069)
[   21.665007] 
[   21.665047] The buggy address belongs to the physical page:
[   21.665099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106404
[   21.665229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.665330] page_type: f5(slab)
[   21.665571] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.665674] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.666016] page dumped because: kasan: bad access detected
[   21.666070] 
[   21.666125] Memory state around the buggy address:
[   21.666167]  fff00000c6403f00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   21.666215]  fff00000c6403f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.666259] >fff00000c6404000: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   21.666323]                                                           ^
[   21.666369]  fff00000c6404080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.666427]  fff00000c6404100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.666475] ==================================================================
[   21.669007] ==================================================================
[   21.669506] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.669578] Read of size 8 at addr fff00000c6404068 by task kunit_try_catch/261
[   21.669900] 
[   21.670022] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.670122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.670152] Hardware name: linux,dummy-virt (DT)
[   21.670305] Call trace:
[   21.670363]  show_stack+0x20/0x38 (C)
[   21.670544]  dump_stack_lvl+0x8c/0xd0
[   21.670610]  print_report+0x118/0x608
[   21.670688]  kasan_report+0xdc/0x128
[   21.670938]  __asan_report_load8_noabort+0x20/0x30
[   21.671008]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.671062]  kasan_bitops_generic+0x110/0x1c8
[   21.671557]  kunit_try_run_case+0x170/0x3f0
[   21.671635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.671964]  kthread+0x328/0x630
[   21.672122]  ret_from_fork+0x10/0x20
[   21.672207] 
[   21.672302] Allocated by task 261:
[   21.672392]  kasan_save_stack+0x3c/0x68
[   21.672581]  kasan_save_track+0x20/0x40
[   21.672669]  kasan_save_alloc_info+0x40/0x58
[   21.672723]  __kasan_kmalloc+0xd4/0xd8
[   21.672762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.672811]  kasan_bitops_generic+0xa0/0x1c8
[   21.672861]  kunit_try_run_case+0x170/0x3f0
[   21.672900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.672945]  kthread+0x328/0x630
[   21.672990]  ret_from_fork+0x10/0x20
[   21.673027] 
[   21.673049] The buggy address belongs to the object at fff00000c6404060
[   21.673049]  which belongs to the cache kmalloc-16 of size 16
[   21.673111] The buggy address is located 8 bytes inside of
[   21.673111]  allocated 9-byte region [fff00000c6404060, fff00000c6404069)
[   21.673174] 
[   21.673205] The buggy address belongs to the physical page:
[   21.673254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106404
[   21.673308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.673365] page_type: f5(slab)
[   21.673409] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.673466] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.673508] page dumped because: kasan: bad access detected
[   21.673552] 
[   21.673582] Memory state around the buggy address:
[   21.673615]  fff00000c6403f00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   21.673668]  fff00000c6403f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.673734] >fff00000c6404000: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   21.673775]                                                           ^
[   21.673813]  fff00000c6404080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.673856]  fff00000c6404100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.673897] ==================================================================

[   15.228371] ==================================================================
[   15.229114] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.229794] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.230576] 
[   15.230699] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.230747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.230759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.230781] Call Trace:
[   15.230800]  <TASK>
[   15.230817]  dump_stack_lvl+0x73/0xb0
[   15.230848]  print_report+0xd1/0x650
[   15.230870]  ? __virt_addr_valid+0x1db/0x2d0
[   15.230894]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.230919]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.230944]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.230969]  kasan_report+0x141/0x180
[   15.230991]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.231021]  kasan_check_range+0x10c/0x1c0
[   15.231054]  __kasan_check_write+0x18/0x20
[   15.231072]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.231096]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.231123]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.231146]  ? trace_hardirqs_on+0x37/0xe0
[   15.231168]  ? kasan_bitops_generic+0x92/0x1c0
[   15.231194]  kasan_bitops_generic+0x116/0x1c0
[   15.231216]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.231240]  ? __pfx_read_tsc+0x10/0x10
[   15.231261]  ? ktime_get_ts64+0x86/0x230
[   15.231285]  kunit_try_run_case+0x1a5/0x480
[   15.231308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.231329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.231352]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.231375]  ? __kthread_parkme+0x82/0x180
[   15.231394]  ? preempt_count_sub+0x50/0x80
[   15.231417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.231440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.231462]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.231484]  kthread+0x337/0x6f0
[   15.231502]  ? trace_preempt_on+0x20/0xc0
[   15.231523]  ? __pfx_kthread+0x10/0x10
[   15.231542]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.231562]  ? calculate_sigpending+0x7b/0xa0
[   15.231585]  ? __pfx_kthread+0x10/0x10
[   15.231606]  ret_from_fork+0x116/0x1d0
[   15.231623]  ? __pfx_kthread+0x10/0x10
[   15.231643]  ret_from_fork_asm+0x1a/0x30
[   15.231673]  </TASK>
[   15.231685] 
[   15.245688] Allocated by task 278:
[   15.245871]  kasan_save_stack+0x45/0x70
[   15.246234]  kasan_save_track+0x18/0x40
[   15.246552]  kasan_save_alloc_info+0x3b/0x50
[   15.246864]  __kasan_kmalloc+0xb7/0xc0
[   15.247240]  __kmalloc_cache_noprof+0x189/0x420
[   15.247556]  kasan_bitops_generic+0x92/0x1c0
[   15.247904]  kunit_try_run_case+0x1a5/0x480
[   15.248408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.248667]  kthread+0x337/0x6f0
[   15.248842]  ret_from_fork+0x116/0x1d0
[   15.249448]  ret_from_fork_asm+0x1a/0x30
[   15.249909] 
[   15.250012] The buggy address belongs to the object at ffff8881022bacc0
[   15.250012]  which belongs to the cache kmalloc-16 of size 16
[   15.250953] The buggy address is located 8 bytes inside of
[   15.250953]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.251818] 
[   15.252034] The buggy address belongs to the physical page:
[   15.252452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.252921] flags: 0x200000000000000(node=0|zone=2)
[   15.253457] page_type: f5(slab)
[   15.253814] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.254370] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.254923] page dumped because: kasan: bad access detected
[   15.255344] 
[   15.255669] Memory state around the buggy address:
[   15.255907]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.256621]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.256954] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.257338]                                               ^
[   15.257987]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.258461]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.259248] ==================================================================
[   15.037893] ==================================================================
[   15.038314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.038587] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.038814] 
[   15.038911] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.038958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.038970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.038992] Call Trace:
[   15.039005]  <TASK>
[   15.039022]  dump_stack_lvl+0x73/0xb0
[   15.039063]  print_report+0xd1/0x650
[   15.039085]  ? __virt_addr_valid+0x1db/0x2d0
[   15.039108]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.039133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.039158]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.039182]  kasan_report+0x141/0x180
[   15.039203]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.039232]  kasan_check_range+0x10c/0x1c0
[   15.039255]  __kasan_check_write+0x18/0x20
[   15.039273]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.039297]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.039322]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.039346]  ? trace_hardirqs_on+0x37/0xe0
[   15.039369]  ? kasan_bitops_generic+0x92/0x1c0
[   15.039395]  kasan_bitops_generic+0x116/0x1c0
[   15.039417]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.039442]  ? __pfx_read_tsc+0x10/0x10
[   15.039462]  ? ktime_get_ts64+0x86/0x230
[   15.039487]  kunit_try_run_case+0x1a5/0x480
[   15.039512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.039533]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.039558]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.039580]  ? __kthread_parkme+0x82/0x180
[   15.039600]  ? preempt_count_sub+0x50/0x80
[   15.039624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.039647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.039669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.039691]  kthread+0x337/0x6f0
[   15.039710]  ? trace_preempt_on+0x20/0xc0
[   15.039730]  ? __pfx_kthread+0x10/0x10
[   15.039750]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.039770]  ? calculate_sigpending+0x7b/0xa0
[   15.039793]  ? __pfx_kthread+0x10/0x10
[   15.039815]  ret_from_fork+0x116/0x1d0
[   15.039832]  ? __pfx_kthread+0x10/0x10
[   15.039851]  ret_from_fork_asm+0x1a/0x30
[   15.039882]  </TASK>
[   15.039893] 
[   15.053625] Allocated by task 278:
[   15.054184]  kasan_save_stack+0x45/0x70
[   15.054394]  kasan_save_track+0x18/0x40
[   15.054608]  kasan_save_alloc_info+0x3b/0x50
[   15.055203]  __kasan_kmalloc+0xb7/0xc0
[   15.055670]  __kmalloc_cache_noprof+0x189/0x420
[   15.055893]  kasan_bitops_generic+0x92/0x1c0
[   15.056423]  kunit_try_run_case+0x1a5/0x480
[   15.056867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.057361]  kthread+0x337/0x6f0
[   15.057763]  ret_from_fork+0x116/0x1d0
[   15.058420]  ret_from_fork_asm+0x1a/0x30
[   15.058758] 
[   15.058866] The buggy address belongs to the object at ffff8881022bacc0
[   15.058866]  which belongs to the cache kmalloc-16 of size 16
[   15.059914] The buggy address is located 8 bytes inside of
[   15.059914]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.060832] 
[   15.061088] The buggy address belongs to the physical page:
[   15.061349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.061984] flags: 0x200000000000000(node=0|zone=2)
[   15.062612] page_type: f5(slab)
[   15.062792] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.063528] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.063832] page dumped because: kasan: bad access detected
[   15.064496] 
[   15.064624] Memory state around the buggy address:
[   15.064849]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.065432]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.065745] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.066452]                                               ^
[   15.066927]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.067529]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.067804] ==================================================================
[   15.196443] ==================================================================
[   15.196685] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.197885] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.198366] 
[   15.198483] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.198732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.198750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.198773] Call Trace:
[   15.198792]  <TASK>
[   15.198812]  dump_stack_lvl+0x73/0xb0
[   15.198844]  print_report+0xd1/0x650
[   15.198866]  ? __virt_addr_valid+0x1db/0x2d0
[   15.198889]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.198915]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.198940]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.198964]  kasan_report+0x141/0x180
[   15.198986]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.199015]  kasan_check_range+0x10c/0x1c0
[   15.199038]  __kasan_check_write+0x18/0x20
[   15.199068]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.199093]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.199118]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.199142]  ? trace_hardirqs_on+0x37/0xe0
[   15.199163]  ? kasan_bitops_generic+0x92/0x1c0
[   15.199191]  kasan_bitops_generic+0x116/0x1c0
[   15.199213]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.199237]  ? __pfx_read_tsc+0x10/0x10
[   15.199259]  ? ktime_get_ts64+0x86/0x230
[   15.199283]  kunit_try_run_case+0x1a5/0x480
[   15.199308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.199328]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.199352]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.199373]  ? __kthread_parkme+0x82/0x180
[   15.199393]  ? preempt_count_sub+0x50/0x80
[   15.199416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.199439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.199461]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.199483]  kthread+0x337/0x6f0
[   15.199501]  ? trace_preempt_on+0x20/0xc0
[   15.199522]  ? __pfx_kthread+0x10/0x10
[   15.199541]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.199561]  ? calculate_sigpending+0x7b/0xa0
[   15.199583]  ? __pfx_kthread+0x10/0x10
[   15.199604]  ret_from_fork+0x116/0x1d0
[   15.199621]  ? __pfx_kthread+0x10/0x10
[   15.199641]  ret_from_fork_asm+0x1a/0x30
[   15.199672]  </TASK>
[   15.199683] 
[   15.213878] Allocated by task 278:
[   15.214318]  kasan_save_stack+0x45/0x70
[   15.214720]  kasan_save_track+0x18/0x40
[   15.215008]  kasan_save_alloc_info+0x3b/0x50
[   15.215411]  __kasan_kmalloc+0xb7/0xc0
[   15.215772]  __kmalloc_cache_noprof+0x189/0x420
[   15.216292]  kasan_bitops_generic+0x92/0x1c0
[   15.216520]  kunit_try_run_case+0x1a5/0x480
[   15.216862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.217500]  kthread+0x337/0x6f0
[   15.217658]  ret_from_fork+0x116/0x1d0
[   15.218020]  ret_from_fork_asm+0x1a/0x30
[   15.218344] 
[   15.218450] The buggy address belongs to the object at ffff8881022bacc0
[   15.218450]  which belongs to the cache kmalloc-16 of size 16
[   15.219614] The buggy address is located 8 bytes inside of
[   15.219614]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.220246] 
[   15.220713] The buggy address belongs to the physical page:
[   15.220974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.221711] flags: 0x200000000000000(node=0|zone=2)
[   15.222217] page_type: f5(slab)
[   15.222393] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.222982] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.223670] page dumped because: kasan: bad access detected
[   15.224136] 
[   15.224265] Memory state around the buggy address:
[   15.224727]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.225055]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.225432] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.226078]                                               ^
[   15.226458]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.227015]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.227518] ==================================================================
[   15.101831] ==================================================================
[   15.102609] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.102962] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.103760] 
[   15.103883] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.103931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.103944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.103966] Call Trace:
[   15.103985]  <TASK>
[   15.104003]  dump_stack_lvl+0x73/0xb0
[   15.104218]  print_report+0xd1/0x650
[   15.104249]  ? __virt_addr_valid+0x1db/0x2d0
[   15.104273]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.104298]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.104323]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.104348]  kasan_report+0x141/0x180
[   15.104369]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.104400]  kasan_check_range+0x10c/0x1c0
[   15.104422]  __kasan_check_write+0x18/0x20
[   15.104441]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.104466]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.104492]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.104532]  ? trace_hardirqs_on+0x37/0xe0
[   15.104554]  ? kasan_bitops_generic+0x92/0x1c0
[   15.104584]  kasan_bitops_generic+0x116/0x1c0
[   15.104608]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.104632]  ? __pfx_read_tsc+0x10/0x10
[   15.104652]  ? ktime_get_ts64+0x86/0x230
[   15.104676]  kunit_try_run_case+0x1a5/0x480
[   15.104699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.104721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.104745]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.104767]  ? __kthread_parkme+0x82/0x180
[   15.104787]  ? preempt_count_sub+0x50/0x80
[   15.104811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.104834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.104857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.104879]  kthread+0x337/0x6f0
[   15.104897]  ? trace_preempt_on+0x20/0xc0
[   15.104918]  ? __pfx_kthread+0x10/0x10
[   15.104939]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.104959]  ? calculate_sigpending+0x7b/0xa0
[   15.104983]  ? __pfx_kthread+0x10/0x10
[   15.105004]  ret_from_fork+0x116/0x1d0
[   15.105022]  ? __pfx_kthread+0x10/0x10
[   15.105055]  ret_from_fork_asm+0x1a/0x30
[   15.105239]  </TASK>
[   15.105253] 
[   15.119721] Allocated by task 278:
[   15.119899]  kasan_save_stack+0x45/0x70
[   15.120440]  kasan_save_track+0x18/0x40
[   15.120707]  kasan_save_alloc_info+0x3b/0x50
[   15.120974]  __kasan_kmalloc+0xb7/0xc0
[   15.121417]  __kmalloc_cache_noprof+0x189/0x420
[   15.121832]  kasan_bitops_generic+0x92/0x1c0
[   15.122137]  kunit_try_run_case+0x1a5/0x480
[   15.122528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.122880]  kthread+0x337/0x6f0
[   15.123284]  ret_from_fork+0x116/0x1d0
[   15.123594]  ret_from_fork_asm+0x1a/0x30
[   15.123887] 
[   15.124220] The buggy address belongs to the object at ffff8881022bacc0
[   15.124220]  which belongs to the cache kmalloc-16 of size 16
[   15.124941] The buggy address is located 8 bytes inside of
[   15.124941]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.125809] 
[   15.126090] The buggy address belongs to the physical page:
[   15.126526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.126978] flags: 0x200000000000000(node=0|zone=2)
[   15.127309] page_type: f5(slab)
[   15.127659] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.128181] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.128639] page dumped because: kasan: bad access detected
[   15.128963] 
[   15.129097] Memory state around the buggy address:
[   15.129694]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.130316]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.130708] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.131084]                                               ^
[   15.131453]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.131865]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.132342] ==================================================================
[   15.165159] ==================================================================
[   15.166158] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.166672] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.167261] 
[   15.167373] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.167643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.167657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.167680] Call Trace:
[   15.167699]  <TASK>
[   15.167715]  dump_stack_lvl+0x73/0xb0
[   15.167746]  print_report+0xd1/0x650
[   15.167769]  ? __virt_addr_valid+0x1db/0x2d0
[   15.167791]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.167817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.167843]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.167867]  kasan_report+0x141/0x180
[   15.167888]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.167919]  kasan_check_range+0x10c/0x1c0
[   15.167943]  __kasan_check_write+0x18/0x20
[   15.167963]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.167988]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.168014]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.168037]  ? trace_hardirqs_on+0x37/0xe0
[   15.168076]  ? kasan_bitops_generic+0x92/0x1c0
[   15.168102]  kasan_bitops_generic+0x116/0x1c0
[   15.168125]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.168149]  ? __pfx_read_tsc+0x10/0x10
[   15.168168]  ? ktime_get_ts64+0x86/0x230
[   15.168192]  kunit_try_run_case+0x1a5/0x480
[   15.168215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.168236]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.168260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.168283]  ? __kthread_parkme+0x82/0x180
[   15.168302]  ? preempt_count_sub+0x50/0x80
[   15.168325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.168349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.168370]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.168394]  kthread+0x337/0x6f0
[   15.168411]  ? trace_preempt_on+0x20/0xc0
[   15.168432]  ? __pfx_kthread+0x10/0x10
[   15.168451]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.168471]  ? calculate_sigpending+0x7b/0xa0
[   15.168494]  ? __pfx_kthread+0x10/0x10
[   15.168514]  ret_from_fork+0x116/0x1d0
[   15.168532]  ? __pfx_kthread+0x10/0x10
[   15.168553]  ret_from_fork_asm+0x1a/0x30
[   15.168583]  </TASK>
[   15.168594] 
[   15.182459] Allocated by task 278:
[   15.183134]  kasan_save_stack+0x45/0x70
[   15.183336]  kasan_save_track+0x18/0x40
[   15.183706]  kasan_save_alloc_info+0x3b/0x50
[   15.184022]  __kasan_kmalloc+0xb7/0xc0
[   15.184359]  __kmalloc_cache_noprof+0x189/0x420
[   15.184761]  kasan_bitops_generic+0x92/0x1c0
[   15.185262]  kunit_try_run_case+0x1a5/0x480
[   15.185491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.186056]  kthread+0x337/0x6f0
[   15.186424]  ret_from_fork+0x116/0x1d0
[   15.186748]  ret_from_fork_asm+0x1a/0x30
[   15.187052] 
[   15.187269] The buggy address belongs to the object at ffff8881022bacc0
[   15.187269]  which belongs to the cache kmalloc-16 of size 16
[   15.188226] The buggy address is located 8 bytes inside of
[   15.188226]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.188946] 
[   15.189313] The buggy address belongs to the physical page:
[   15.189565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.190218] flags: 0x200000000000000(node=0|zone=2)
[   15.190546] page_type: f5(slab)
[   15.190726] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.191323] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.191682] page dumped because: kasan: bad access detected
[   15.191909] 
[   15.192244] Memory state around the buggy address:
[   15.192796]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.193419]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.193869] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.194374]                                               ^
[   15.194701]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.195278]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.195733] ==================================================================
[   15.069788] ==================================================================
[   15.070368] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.070900] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.071702] 
[   15.071831] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.072024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.072059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.072137] Call Trace:
[   15.072152]  <TASK>
[   15.072171]  dump_stack_lvl+0x73/0xb0
[   15.072202]  print_report+0xd1/0x650
[   15.072224]  ? __virt_addr_valid+0x1db/0x2d0
[   15.072247]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.072271]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.072296]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.072321]  kasan_report+0x141/0x180
[   15.072342]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.072373]  kasan_check_range+0x10c/0x1c0
[   15.072397]  __kasan_check_write+0x18/0x20
[   15.072415]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.072440]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.072465]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.072489]  ? trace_hardirqs_on+0x37/0xe0
[   15.072511]  ? kasan_bitops_generic+0x92/0x1c0
[   15.072538]  kasan_bitops_generic+0x116/0x1c0
[   15.072560]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.072584]  ? __pfx_read_tsc+0x10/0x10
[   15.072605]  ? ktime_get_ts64+0x86/0x230
[   15.072629]  kunit_try_run_case+0x1a5/0x480
[   15.072652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.072674]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.072698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.072721]  ? __kthread_parkme+0x82/0x180
[   15.072741]  ? preempt_count_sub+0x50/0x80
[   15.072764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.072788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.072811]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.072833]  kthread+0x337/0x6f0
[   15.072852]  ? trace_preempt_on+0x20/0xc0
[   15.072873]  ? __pfx_kthread+0x10/0x10
[   15.072893]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.072914]  ? calculate_sigpending+0x7b/0xa0
[   15.072937]  ? __pfx_kthread+0x10/0x10
[   15.072958]  ret_from_fork+0x116/0x1d0
[   15.072976]  ? __pfx_kthread+0x10/0x10
[   15.072996]  ret_from_fork_asm+0x1a/0x30
[   15.073026]  </TASK>
[   15.073037] 
[   15.086549] Allocated by task 278:
[   15.086945]  kasan_save_stack+0x45/0x70
[   15.087239]  kasan_save_track+0x18/0x40
[   15.087709]  kasan_save_alloc_info+0x3b/0x50
[   15.087875]  __kasan_kmalloc+0xb7/0xc0
[   15.088013]  __kmalloc_cache_noprof+0x189/0x420
[   15.088353]  kasan_bitops_generic+0x92/0x1c0
[   15.088997]  kunit_try_run_case+0x1a5/0x480
[   15.090008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.090534]  kthread+0x337/0x6f0
[   15.090704]  ret_from_fork+0x116/0x1d0
[   15.090902]  ret_from_fork_asm+0x1a/0x30
[   15.091104] 
[   15.091206] The buggy address belongs to the object at ffff8881022bacc0
[   15.091206]  which belongs to the cache kmalloc-16 of size 16
[   15.092315] The buggy address is located 8 bytes inside of
[   15.092315]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.092983] 
[   15.093142] The buggy address belongs to the physical page:
[   15.093623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.094716] flags: 0x200000000000000(node=0|zone=2)
[   15.095270] page_type: f5(slab)
[   15.095420] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.096063] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.096901] page dumped because: kasan: bad access detected
[   15.097406] 
[   15.097858] Memory state around the buggy address:
[   15.098204]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.098771]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.099145] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.099615]                                               ^
[   15.099960]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.100456]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.100886] ==================================================================
[   15.133051] ==================================================================
[   15.133771] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.134381] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.135025] 
[   15.135212] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.135261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.135273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.135296] Call Trace:
[   15.135315]  <TASK>
[   15.135332]  dump_stack_lvl+0x73/0xb0
[   15.135362]  print_report+0xd1/0x650
[   15.135384]  ? __virt_addr_valid+0x1db/0x2d0
[   15.135407]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.135431]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.135457]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.135482]  kasan_report+0x141/0x180
[   15.135504]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.135534]  kasan_check_range+0x10c/0x1c0
[   15.135557]  __kasan_check_write+0x18/0x20
[   15.135576]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.135601]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.135626]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.135650]  ? trace_hardirqs_on+0x37/0xe0
[   15.135672]  ? kasan_bitops_generic+0x92/0x1c0
[   15.135699]  kasan_bitops_generic+0x116/0x1c0
[   15.135721]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.135746]  ? __pfx_read_tsc+0x10/0x10
[   15.135767]  ? ktime_get_ts64+0x86/0x230
[   15.135790]  kunit_try_run_case+0x1a5/0x480
[   15.135814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.135835]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.135859]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.135881]  ? __kthread_parkme+0x82/0x180
[   15.135901]  ? preempt_count_sub+0x50/0x80
[   15.135924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.135947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.135969]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.135993]  kthread+0x337/0x6f0
[   15.136011]  ? trace_preempt_on+0x20/0xc0
[   15.136032]  ? __pfx_kthread+0x10/0x10
[   15.136306]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.136330]  ? calculate_sigpending+0x7b/0xa0
[   15.136370]  ? __pfx_kthread+0x10/0x10
[   15.136393]  ret_from_fork+0x116/0x1d0
[   15.136411]  ? __pfx_kthread+0x10/0x10
[   15.136432]  ret_from_fork_asm+0x1a/0x30
[   15.136463]  </TASK>
[   15.136474] 
[   15.151079] Allocated by task 278:
[   15.151436]  kasan_save_stack+0x45/0x70
[   15.151849]  kasan_save_track+0x18/0x40
[   15.152130]  kasan_save_alloc_info+0x3b/0x50
[   15.152502]  __kasan_kmalloc+0xb7/0xc0
[   15.152795]  __kmalloc_cache_noprof+0x189/0x420
[   15.153246]  kasan_bitops_generic+0x92/0x1c0
[   15.153436]  kunit_try_run_case+0x1a5/0x480
[   15.153924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.154156]  kthread+0x337/0x6f0
[   15.154725]  ret_from_fork+0x116/0x1d0
[   15.155008]  ret_from_fork_asm+0x1a/0x30
[   15.155527] 
[   15.155782] The buggy address belongs to the object at ffff8881022bacc0
[   15.155782]  which belongs to the cache kmalloc-16 of size 16
[   15.156589] The buggy address is located 8 bytes inside of
[   15.156589]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.157525] 
[   15.157623] The buggy address belongs to the physical page:
[   15.157987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.158686] flags: 0x200000000000000(node=0|zone=2)
[   15.159005] page_type: f5(slab)
[   15.159341] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.159898] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.160531] page dumped because: kasan: bad access detected
[   15.160854] 
[   15.160943] Memory state around the buggy address:
[   15.161222]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.162031]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.162707] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.163237]                                               ^
[   15.163469]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.163959]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.164377] ==================================================================
[   15.259861] ==================================================================
[   15.260586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.261311] Write of size 8 at addr ffff8881022bacc8 by task kunit_try_catch/278
[   15.261953] 
[   15.262201] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.262353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.262370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.262391] Call Trace:
[   15.262407]  <TASK>
[   15.262425]  dump_stack_lvl+0x73/0xb0
[   15.262454]  print_report+0xd1/0x650
[   15.262476]  ? __virt_addr_valid+0x1db/0x2d0
[   15.262498]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.262523]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.262548]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.262572]  kasan_report+0x141/0x180
[   15.262595]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.262624]  kasan_check_range+0x10c/0x1c0
[   15.262647]  __kasan_check_write+0x18/0x20
[   15.262666]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.262689]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.262715]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.262737]  ? trace_hardirqs_on+0x37/0xe0
[   15.262757]  ? kasan_bitops_generic+0x92/0x1c0
[   15.262785]  kasan_bitops_generic+0x116/0x1c0
[   15.262808]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.262833]  ? __pfx_read_tsc+0x10/0x10
[   15.262854]  ? ktime_get_ts64+0x86/0x230
[   15.262876]  kunit_try_run_case+0x1a5/0x480
[   15.262899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.262921]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.262943]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.262965]  ? __kthread_parkme+0x82/0x180
[   15.262985]  ? preempt_count_sub+0x50/0x80
[   15.263007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.263030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.263065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.263087]  kthread+0x337/0x6f0
[   15.263105]  ? trace_preempt_on+0x20/0xc0
[   15.263126]  ? __pfx_kthread+0x10/0x10
[   15.263145]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.263165]  ? calculate_sigpending+0x7b/0xa0
[   15.263188]  ? __pfx_kthread+0x10/0x10
[   15.263208]  ret_from_fork+0x116/0x1d0
[   15.263226]  ? __pfx_kthread+0x10/0x10
[   15.263245]  ret_from_fork_asm+0x1a/0x30
[   15.263276]  </TASK>
[   15.263287] 
[   15.276959] Allocated by task 278:
[   15.277643]  kasan_save_stack+0x45/0x70
[   15.277846]  kasan_save_track+0x18/0x40
[   15.278232]  kasan_save_alloc_info+0x3b/0x50
[   15.278415]  __kasan_kmalloc+0xb7/0xc0
[   15.278642]  __kmalloc_cache_noprof+0x189/0x420
[   15.278860]  kasan_bitops_generic+0x92/0x1c0
[   15.279451]  kunit_try_run_case+0x1a5/0x480
[   15.279677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.280006]  kthread+0x337/0x6f0
[   15.280356]  ret_from_fork+0x116/0x1d0
[   15.280723]  ret_from_fork_asm+0x1a/0x30
[   15.281032] 
[   15.281451] The buggy address belongs to the object at ffff8881022bacc0
[   15.281451]  which belongs to the cache kmalloc-16 of size 16
[   15.282113] The buggy address is located 8 bytes inside of
[   15.282113]  allocated 9-byte region [ffff8881022bacc0, ffff8881022bacc9)
[   15.282863] 
[   15.283017] The buggy address belongs to the physical page:
[   15.283468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022ba
[   15.284055] flags: 0x200000000000000(node=0|zone=2)
[   15.284461] page_type: f5(slab)
[   15.284780] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.285358] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.285966] page dumped because: kasan: bad access detected
[   15.286568] 
[   15.286655] Memory state around the buggy address:
[   15.286920]  ffff8881022bab80: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   15.287422]  ffff8881022bac00: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   15.287804] >ffff8881022bac80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.288396]                                               ^
[   15.288700]  ffff8881022bad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.289395]  ffff8881022bad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.289869] ==================================================================