Hay
Date
July 20, 2025, 8:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.606688] ==================================================================
[   17.606858] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   17.607128] Call trace:
[   17.607552]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   17.607750]  kunit_try_run_case+0x170/0x3f0
[   17.607808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.608405]  ret_from_fork+0x10/0x20
[   17.609178]  kasan_bitops_generic+0xa0/0x1c8
[   17.609419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.609843] 
[   17.610061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.610208] page_type: f5(slab)
[   17.610305] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.610359] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.610403] page dumped because: kasan: bad access detected
[   17.610520]  fff00000c43b3b80: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   17.610750] >fff00000c43b3c80: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.610940]  fff00000c43b3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.611112] ==================================================================
[   17.621326] ==================================================================
[   17.621381] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   17.621715] Read of size 8 at addr fff00000c43b3ca8 by task kunit_try_catch/262
[   17.621776] 
[   17.621808] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.621913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.621950] Hardware name: linux,dummy-virt (DT)
[   17.621985] Call trace:
[   17.622009]  show_stack+0x20/0x38 (C)
[   17.622059]  dump_stack_lvl+0x8c/0xd0
[   17.622128]  print_report+0x118/0x5d0
[   17.622180]  kasan_report+0xdc/0x128
[   17.622263]  __asan_report_load8_noabort+0x20/0x30
[   17.622326]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   17.622385]  kasan_bitops_generic+0x11c/0x1c8
[   17.622436]  kunit_try_run_case+0x170/0x3f0
[   17.622540]  kthread+0x328/0x630
[   17.623038]  kasan_bitops_generic+0xa0/0x1c8
[   17.623255] 
[   17.623347] The buggy address is located 8 bytes inside of
[   17.623347]  allocated 9-byte region [fff00000c43b3ca0, fff00000c43b3ca9)
[   17.623487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043b3
[   17.623772] 
[   17.623834]  fff00000c43b3b80: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   17.623890]  fff00000c43b3c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.623976] >fff00000c43b3c80: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.624070]  fff00000c43b3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.624324] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   17.624426] 
[   17.624782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.624868] Call trace:
[   17.625269]  kasan_bitops_generic+0x11c/0x1c8
[   17.625422]  kthread+0x328/0x630
[   17.625608]  kasan_save_track+0x20/0x40
[   17.625931]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.626111]  kunit_try_run_case+0x170/0x3f0
[   17.626213]  kthread+0x328/0x630
[   17.626388] The buggy address is located 8 bytes inside of
[   17.626388]  allocated 9-byte region [fff00000c43b3ca0, fff00000c43b3ca9)
[   17.626462] 
[   17.626550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1043b3
[   17.626639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.626728] page_type: f5(slab)
[   17.626774] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.626830] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.627390]  fff00000c43b3b80: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   17.627458]  fff00000c43b3c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.627614]                                   ^
[   17.627784]  fff00000c43b3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.632583]     ok 63 kasan_bitops_generic
[   17.635171]     ok 64 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   17.636528] Read of size 4 at addr fff00000c767ae30 by task kunit_try_catch/266
[   17.636615] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.636982]  __asan_report_load4_noabort+0x20/0x30
[   17.638142]  kthread+0x328/0x630
[   17.638418] 
[   17.638648]  kasan_save_alloc_info+0x40/0x58
[   17.639305]  kthread+0x328/0x630
[   17.639352]  ret_from_fork+0x10/0x20
[   17.639800] The buggy address is located 0 bytes to the right of
[   17.639800]  allocated 48-byte region [fff00000c767ae00, fff00000c767ae30)
[   17.639977] 
[   17.640037] The buggy address belongs to the physical page:
[   17.640106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767a
[   17.640293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.640502] page_type: f5(slab)
[   17.640624] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.640748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.640973] 
[   17.641125]  fff00000c767ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.641392]                                      ^
[   17.641708]  fff00000c767af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.643482] ==================================================================

[   15.176172] ==================================================================
[   15.176560] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.177122] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.177406] 
[   15.177535] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.177582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.177594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.177615] Call Trace:
[   15.177632]  <TASK>
[   15.177648]  dump_stack_lvl+0x73/0xb0
[   15.177679]  print_report+0xd1/0x610
[   15.177702]  ? __virt_addr_valid+0x1db/0x2d0
[   15.177725]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.177753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.177775]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.177803]  kasan_report+0x141/0x180
[   15.177825]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.177857]  kasan_check_range+0x10c/0x1c0
[   15.177880]  __kasan_check_write+0x18/0x20
[   15.177901]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.177936]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.177965]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.177989]  ? trace_hardirqs_on+0x37/0xe0
[   15.178011]  ? kasan_bitops_generic+0x92/0x1c0
[   15.178039]  kasan_bitops_generic+0x121/0x1c0
[   15.178063]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.178088]  ? __pfx_read_tsc+0x10/0x10
[   15.178114]  ? ktime_get_ts64+0x86/0x230
[   15.178139]  kunit_try_run_case+0x1a5/0x480
[   15.178163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.178186]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.178211]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.178236]  ? __kthread_parkme+0x82/0x180
[   15.178257]  ? preempt_count_sub+0x50/0x80
[   15.178281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.178305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.178329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.178353]  kthread+0x337/0x6f0
[   15.178372]  ? trace_preempt_on+0x20/0xc0
[   15.178395]  ? __pfx_kthread+0x10/0x10
[   15.178416]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.178438]  ? calculate_sigpending+0x7b/0xa0
[   15.178462]  ? __pfx_kthread+0x10/0x10
[   15.178495]  ret_from_fork+0x116/0x1d0
[   15.178514]  ? __pfx_kthread+0x10/0x10
[   15.178535]  ret_from_fork_asm+0x1a/0x30
[   15.178566]  </TASK>
[   15.178575] 
[   15.193694] Allocated by task 279:
[   15.194189]  kasan_save_stack+0x45/0x70
[   15.194416]  kasan_save_track+0x18/0x40
[   15.194582]  kasan_save_alloc_info+0x3b/0x50
[   15.195041]  __kasan_kmalloc+0xb7/0xc0
[   15.195336]  __kmalloc_cache_noprof+0x189/0x420
[   15.195586]  kasan_bitops_generic+0x92/0x1c0
[   15.195925]  kunit_try_run_case+0x1a5/0x480
[   15.196224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.196605]  kthread+0x337/0x6f0
[   15.196907]  ret_from_fork+0x116/0x1d0
[   15.197075]  ret_from_fork_asm+0x1a/0x30
[   15.197312] 
[   15.197607] The buggy address belongs to the object at ffff888102641aa0
[   15.197607]  which belongs to the cache kmalloc-16 of size 16
[   15.198384] The buggy address is located 8 bytes inside of
[   15.198384]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.199059] 
[   15.199269] The buggy address belongs to the physical page:
[   15.199562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.200093] flags: 0x200000000000000(node=0|zone=2)
[   15.200418] page_type: f5(slab)
[   15.200631] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.201091] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.201531] page dumped because: kasan: bad access detected
[   15.201920] 
[   15.202002] Memory state around the buggy address:
[   15.202238]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.202574]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.203143] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.203510]                                   ^
[   15.203784]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.204088]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.204590] ==================================================================
[   15.266465] ==================================================================
[   15.266851] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.267318] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.267628] 
[   15.267739] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.267804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.267816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.267837] Call Trace:
[   15.267854]  <TASK>
[   15.267868]  dump_stack_lvl+0x73/0xb0
[   15.267897]  print_report+0xd1/0x610
[   15.267919]  ? __virt_addr_valid+0x1db/0x2d0
[   15.267942]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.267969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.267992]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.268043]  kasan_report+0x141/0x180
[   15.268066]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.268098]  kasan_check_range+0x10c/0x1c0
[   15.268138]  __kasan_check_write+0x18/0x20
[   15.268158]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.268186]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.268230]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.268255]  ? trace_hardirqs_on+0x37/0xe0
[   15.268277]  ? kasan_bitops_generic+0x92/0x1c0
[   15.268321]  kasan_bitops_generic+0x121/0x1c0
[   15.268345]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.268371]  ? __pfx_read_tsc+0x10/0x10
[   15.268392]  ? ktime_get_ts64+0x86/0x230
[   15.268416]  kunit_try_run_case+0x1a5/0x480
[   15.268440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.268463]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.268497]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.268520]  ? __kthread_parkme+0x82/0x180
[   15.268541]  ? preempt_count_sub+0x50/0x80
[   15.268564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.268589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.268612]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.268635]  kthread+0x337/0x6f0
[   15.268656]  ? trace_preempt_on+0x20/0xc0
[   15.268678]  ? __pfx_kthread+0x10/0x10
[   15.268699]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.268721]  ? calculate_sigpending+0x7b/0xa0
[   15.268744]  ? __pfx_kthread+0x10/0x10
[   15.268801]  ret_from_fork+0x116/0x1d0
[   15.268821]  ? __pfx_kthread+0x10/0x10
[   15.268842]  ret_from_fork_asm+0x1a/0x30
[   15.268872]  </TASK>
[   15.268882] 
[   15.277391] Allocated by task 279:
[   15.277624]  kasan_save_stack+0x45/0x70
[   15.277775]  kasan_save_track+0x18/0x40
[   15.277970]  kasan_save_alloc_info+0x3b/0x50
[   15.278191]  __kasan_kmalloc+0xb7/0xc0
[   15.278348]  __kmalloc_cache_noprof+0x189/0x420
[   15.278624]  kasan_bitops_generic+0x92/0x1c0
[   15.278881]  kunit_try_run_case+0x1a5/0x480
[   15.279100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.279314]  kthread+0x337/0x6f0
[   15.279436]  ret_from_fork+0x116/0x1d0
[   15.279580]  ret_from_fork_asm+0x1a/0x30
[   15.279738] 
[   15.279890] The buggy address belongs to the object at ffff888102641aa0
[   15.279890]  which belongs to the cache kmalloc-16 of size 16
[   15.281952] The buggy address is located 8 bytes inside of
[   15.281952]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.282666] 
[   15.282782] The buggy address belongs to the physical page:
[   15.283197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.283544] flags: 0x200000000000000(node=0|zone=2)
[   15.284038] page_type: f5(slab)
[   15.284216] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.284638] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.285246] page dumped because: kasan: bad access detected
[   15.285615] 
[   15.285866] Memory state around the buggy address:
[   15.286184]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.286578]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.287096] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.287579]                                   ^
[   15.287967]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.288438]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.288880] ==================================================================
[   15.336942] ==================================================================
[   15.337402] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.337796] Read of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.338146] 
[   15.338265] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.338311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.338322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.338347] Call Trace:
[   15.338364]  <TASK>
[   15.338379]  dump_stack_lvl+0x73/0xb0
[   15.338411]  print_report+0xd1/0x610
[   15.338434]  ? __virt_addr_valid+0x1db/0x2d0
[   15.338458]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.338501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.338524]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.338552]  kasan_report+0x141/0x180
[   15.338574]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.338608]  __asan_report_load8_noabort+0x18/0x20
[   15.338633]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.338661]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.338690]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.338715]  ? trace_hardirqs_on+0x37/0xe0
[   15.338737]  ? kasan_bitops_generic+0x92/0x1c0
[   15.338765]  kasan_bitops_generic+0x121/0x1c0
[   15.338796]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.338823]  ? __pfx_read_tsc+0x10/0x10
[   15.338845]  ? ktime_get_ts64+0x86/0x230
[   15.338869]  kunit_try_run_case+0x1a5/0x480
[   15.338894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.338917]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.338941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.338967]  ? __kthread_parkme+0x82/0x180
[   15.338988]  ? preempt_count_sub+0x50/0x80
[   15.339012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.339037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.339061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.339085]  kthread+0x337/0x6f0
[   15.339105]  ? trace_preempt_on+0x20/0xc0
[   15.339128]  ? __pfx_kthread+0x10/0x10
[   15.339149]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.339172]  ? calculate_sigpending+0x7b/0xa0
[   15.339196]  ? __pfx_kthread+0x10/0x10
[   15.339218]  ret_from_fork+0x116/0x1d0
[   15.339237]  ? __pfx_kthread+0x10/0x10
[   15.339259]  ret_from_fork_asm+0x1a/0x30
[   15.339290]  </TASK>
[   15.339300] 
[   15.347277] Allocated by task 279:
[   15.347454]  kasan_save_stack+0x45/0x70
[   15.347631]  kasan_save_track+0x18/0x40
[   15.347866]  kasan_save_alloc_info+0x3b/0x50
[   15.348045]  __kasan_kmalloc+0xb7/0xc0
[   15.348198]  __kmalloc_cache_noprof+0x189/0x420
[   15.348415]  kasan_bitops_generic+0x92/0x1c0
[   15.348630]  kunit_try_run_case+0x1a5/0x480
[   15.348877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.349091]  kthread+0x337/0x6f0
[   15.349241]  ret_from_fork+0x116/0x1d0
[   15.349378]  ret_from_fork_asm+0x1a/0x30
[   15.349533] 
[   15.349607] The buggy address belongs to the object at ffff888102641aa0
[   15.349607]  which belongs to the cache kmalloc-16 of size 16
[   15.349964] The buggy address is located 8 bytes inside of
[   15.349964]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.350326] 
[   15.350401] The buggy address belongs to the physical page:
[   15.350742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.351536] flags: 0x200000000000000(node=0|zone=2)
[   15.351788] page_type: f5(slab)
[   15.351961] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.352311] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.352666] page dumped because: kasan: bad access detected
[   15.353097] 
[   15.353170] Memory state around the buggy address:
[   15.353329]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.353558]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.353791] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.354132]                                   ^
[   15.354356]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.354703]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.355377] ==================================================================
[   15.246271] ==================================================================
[   15.246711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.247146] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.247484] 
[   15.247604] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.247651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.247663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.247685] Call Trace:
[   15.247702]  <TASK>
[   15.247718]  dump_stack_lvl+0x73/0xb0
[   15.247747]  print_report+0xd1/0x610
[   15.247778]  ? __virt_addr_valid+0x1db/0x2d0
[   15.247802]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.247830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.247853]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.247881]  kasan_report+0x141/0x180
[   15.247903]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.247936]  kasan_check_range+0x10c/0x1c0
[   15.247959]  __kasan_check_write+0x18/0x20
[   15.247979]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.248007]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.248036]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.248062]  ? trace_hardirqs_on+0x37/0xe0
[   15.248084]  ? kasan_bitops_generic+0x92/0x1c0
[   15.248112]  kasan_bitops_generic+0x121/0x1c0
[   15.248135]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.248161]  ? __pfx_read_tsc+0x10/0x10
[   15.248182]  ? ktime_get_ts64+0x86/0x230
[   15.248206]  kunit_try_run_case+0x1a5/0x480
[   15.248230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.248254]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.248279]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.248303]  ? __kthread_parkme+0x82/0x180
[   15.248323]  ? preempt_count_sub+0x50/0x80
[   15.248347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.248372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.248395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.248419]  kthread+0x337/0x6f0
[   15.248438]  ? trace_preempt_on+0x20/0xc0
[   15.248461]  ? __pfx_kthread+0x10/0x10
[   15.248534]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.248556]  ? calculate_sigpending+0x7b/0xa0
[   15.248580]  ? __pfx_kthread+0x10/0x10
[   15.248603]  ret_from_fork+0x116/0x1d0
[   15.248622]  ? __pfx_kthread+0x10/0x10
[   15.248644]  ret_from_fork_asm+0x1a/0x30
[   15.248676]  </TASK>
[   15.248686] 
[   15.257492] Allocated by task 279:
[   15.257682]  kasan_save_stack+0x45/0x70
[   15.257943]  kasan_save_track+0x18/0x40
[   15.258122]  kasan_save_alloc_info+0x3b/0x50
[   15.258362]  __kasan_kmalloc+0xb7/0xc0
[   15.258555]  __kmalloc_cache_noprof+0x189/0x420
[   15.258814]  kasan_bitops_generic+0x92/0x1c0
[   15.259050]  kunit_try_run_case+0x1a5/0x480
[   15.259242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.259514]  kthread+0x337/0x6f0
[   15.259691]  ret_from_fork+0x116/0x1d0
[   15.259910]  ret_from_fork_asm+0x1a/0x30
[   15.260116] 
[   15.260214] The buggy address belongs to the object at ffff888102641aa0
[   15.260214]  which belongs to the cache kmalloc-16 of size 16
[   15.260716] The buggy address is located 8 bytes inside of
[   15.260716]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.261329] 
[   15.261448] The buggy address belongs to the physical page:
[   15.261743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.262149] flags: 0x200000000000000(node=0|zone=2)
[   15.262393] page_type: f5(slab)
[   15.262577] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.262962] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.263312] page dumped because: kasan: bad access detected
[   15.263584] 
[   15.263681] Memory state around the buggy address:
[   15.263938]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.264270]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.264520] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.264820]                                   ^
[   15.265064]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.265392]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.265746] ==================================================================
[   15.289703] ==================================================================
[   15.290010] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.290372] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.291305] 
[   15.291408] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.291652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.291665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.291690] Call Trace:
[   15.291706]  <TASK>
[   15.291721]  dump_stack_lvl+0x73/0xb0
[   15.291755]  print_report+0xd1/0x610
[   15.291788]  ? __virt_addr_valid+0x1db/0x2d0
[   15.291812]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.291840]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.291862]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.291890]  kasan_report+0x141/0x180
[   15.291913]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.291946]  kasan_check_range+0x10c/0x1c0
[   15.291970]  __kasan_check_write+0x18/0x20
[   15.291989]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.292016]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.292045]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.292069]  ? trace_hardirqs_on+0x37/0xe0
[   15.292092]  ? kasan_bitops_generic+0x92/0x1c0
[   15.292120]  kasan_bitops_generic+0x121/0x1c0
[   15.292143]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.292168]  ? __pfx_read_tsc+0x10/0x10
[   15.292191]  ? ktime_get_ts64+0x86/0x230
[   15.292215]  kunit_try_run_case+0x1a5/0x480
[   15.292241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.292264]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.292288]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.292312]  ? __kthread_parkme+0x82/0x180
[   15.292334]  ? preempt_count_sub+0x50/0x80
[   15.292357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.292382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.292405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.292429]  kthread+0x337/0x6f0
[   15.292449]  ? trace_preempt_on+0x20/0xc0
[   15.292484]  ? __pfx_kthread+0x10/0x10
[   15.292506]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.292528]  ? calculate_sigpending+0x7b/0xa0
[   15.292552]  ? __pfx_kthread+0x10/0x10
[   15.292574]  ret_from_fork+0x116/0x1d0
[   15.292594]  ? __pfx_kthread+0x10/0x10
[   15.292615]  ret_from_fork_asm+0x1a/0x30
[   15.292646]  </TASK>
[   15.292656] 
[   15.305350] Allocated by task 279:
[   15.305585]  kasan_save_stack+0x45/0x70
[   15.305973]  kasan_save_track+0x18/0x40
[   15.306282]  kasan_save_alloc_info+0x3b/0x50
[   15.306623]  __kasan_kmalloc+0xb7/0xc0
[   15.307027]  __kmalloc_cache_noprof+0x189/0x420
[   15.307346]  kasan_bitops_generic+0x92/0x1c0
[   15.307566]  kunit_try_run_case+0x1a5/0x480
[   15.307766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.308263]  kthread+0x337/0x6f0
[   15.308519]  ret_from_fork+0x116/0x1d0
[   15.308854]  ret_from_fork_asm+0x1a/0x30
[   15.309077] 
[   15.309183] The buggy address belongs to the object at ffff888102641aa0
[   15.309183]  which belongs to the cache kmalloc-16 of size 16
[   15.310094] The buggy address is located 8 bytes inside of
[   15.310094]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.310729] 
[   15.310834] The buggy address belongs to the physical page:
[   15.311168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.311509] flags: 0x200000000000000(node=0|zone=2)
[   15.311758] page_type: f5(slab)
[   15.312191] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.312601] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.313161] page dumped because: kasan: bad access detected
[   15.313536] 
[   15.313649] Memory state around the buggy address:
[   15.314056]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.314487]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.314986] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.315410]                                   ^
[   15.315735]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.316246]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.316684] ==================================================================
[   15.226631] ==================================================================
[   15.227072] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.227522] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.227865] 
[   15.227974] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.228018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.228029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.228049] Call Trace:
[   15.228065]  <TASK>
[   15.228080]  dump_stack_lvl+0x73/0xb0
[   15.228110]  print_report+0xd1/0x610
[   15.228132]  ? __virt_addr_valid+0x1db/0x2d0
[   15.228156]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.228183]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.228205]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.228233]  kasan_report+0x141/0x180
[   15.228256]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.228309]  kasan_check_range+0x10c/0x1c0
[   15.228333]  __kasan_check_write+0x18/0x20
[   15.228352]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.228397]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.228426]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.228450]  ? trace_hardirqs_on+0x37/0xe0
[   15.228496]  ? kasan_bitops_generic+0x92/0x1c0
[   15.228524]  kasan_bitops_generic+0x121/0x1c0
[   15.228547]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.228572]  ? __pfx_read_tsc+0x10/0x10
[   15.228594]  ? ktime_get_ts64+0x86/0x230
[   15.228617]  kunit_try_run_case+0x1a5/0x480
[   15.228641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.228680]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.228705]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.228729]  ? __kthread_parkme+0x82/0x180
[   15.228749]  ? preempt_count_sub+0x50/0x80
[   15.228808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.228845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.228883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.228920]  kthread+0x337/0x6f0
[   15.228941]  ? trace_preempt_on+0x20/0xc0
[   15.228963]  ? __pfx_kthread+0x10/0x10
[   15.228983]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.229005]  ? calculate_sigpending+0x7b/0xa0
[   15.229028]  ? __pfx_kthread+0x10/0x10
[   15.229050]  ret_from_fork+0x116/0x1d0
[   15.229068]  ? __pfx_kthread+0x10/0x10
[   15.229089]  ret_from_fork_asm+0x1a/0x30
[   15.229119]  </TASK>
[   15.229129] 
[   15.237567] Allocated by task 279:
[   15.237806]  kasan_save_stack+0x45/0x70
[   15.238056]  kasan_save_track+0x18/0x40
[   15.238259]  kasan_save_alloc_info+0x3b/0x50
[   15.238489]  __kasan_kmalloc+0xb7/0xc0
[   15.238684]  __kmalloc_cache_noprof+0x189/0x420
[   15.238945]  kasan_bitops_generic+0x92/0x1c0
[   15.239164]  kunit_try_run_case+0x1a5/0x480
[   15.239367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.239621]  kthread+0x337/0x6f0
[   15.239829]  ret_from_fork+0x116/0x1d0
[   15.240034]  ret_from_fork_asm+0x1a/0x30
[   15.240221] 
[   15.240319] The buggy address belongs to the object at ffff888102641aa0
[   15.240319]  which belongs to the cache kmalloc-16 of size 16
[   15.240885] The buggy address is located 8 bytes inside of
[   15.240885]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.241380] 
[   15.241496] The buggy address belongs to the physical page:
[   15.241737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.242124] flags: 0x200000000000000(node=0|zone=2)
[   15.242364] page_type: f5(slab)
[   15.242519] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.242796] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.243180] page dumped because: kasan: bad access detected
[   15.243452] 
[   15.243558] Memory state around the buggy address:
[   15.243821]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.244152]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.244423] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.244656]                                   ^
[   15.244838]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.245164]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.245528] ==================================================================
[   15.205602] ==================================================================
[   15.206219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.206756] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.207282] 
[   15.207400] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.207447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.207606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.207630] Call Trace:
[   15.207642]  <TASK>
[   15.207658]  dump_stack_lvl+0x73/0xb0
[   15.207691]  print_report+0xd1/0x610
[   15.207714]  ? __virt_addr_valid+0x1db/0x2d0
[   15.207737]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.207790]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.207813]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.207840]  kasan_report+0x141/0x180
[   15.207862]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.207894]  kasan_check_range+0x10c/0x1c0
[   15.207918]  __kasan_check_write+0x18/0x20
[   15.207937]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.207964]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.207992]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.208016]  ? trace_hardirqs_on+0x37/0xe0
[   15.208038]  ? kasan_bitops_generic+0x92/0x1c0
[   15.208065]  kasan_bitops_generic+0x121/0x1c0
[   15.208088]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.208113]  ? __pfx_read_tsc+0x10/0x10
[   15.208135]  ? ktime_get_ts64+0x86/0x230
[   15.208159]  kunit_try_run_case+0x1a5/0x480
[   15.208184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.208206]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.208230]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.208254]  ? __kthread_parkme+0x82/0x180
[   15.208275]  ? preempt_count_sub+0x50/0x80
[   15.208298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.208322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.208345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.208369]  kthread+0x337/0x6f0
[   15.208389]  ? trace_preempt_on+0x20/0xc0
[   15.208411]  ? __pfx_kthread+0x10/0x10
[   15.208432]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.208453]  ? calculate_sigpending+0x7b/0xa0
[   15.208486]  ? __pfx_kthread+0x10/0x10
[   15.208508]  ret_from_fork+0x116/0x1d0
[   15.208526]  ? __pfx_kthread+0x10/0x10
[   15.208547]  ret_from_fork_asm+0x1a/0x30
[   15.208578]  </TASK>
[   15.208587] 
[   15.217868] Allocated by task 279:
[   15.218056]  kasan_save_stack+0x45/0x70
[   15.218223]  kasan_save_track+0x18/0x40
[   15.218369]  kasan_save_alloc_info+0x3b/0x50
[   15.218599]  __kasan_kmalloc+0xb7/0xc0
[   15.218840]  __kmalloc_cache_noprof+0x189/0x420
[   15.219103]  kasan_bitops_generic+0x92/0x1c0
[   15.219324]  kunit_try_run_case+0x1a5/0x480
[   15.219488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.219789]  kthread+0x337/0x6f0
[   15.219985]  ret_from_fork+0x116/0x1d0
[   15.220193]  ret_from_fork_asm+0x1a/0x30
[   15.220386] 
[   15.220508] The buggy address belongs to the object at ffff888102641aa0
[   15.220508]  which belongs to the cache kmalloc-16 of size 16
[   15.221009] The buggy address is located 8 bytes inside of
[   15.221009]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.221540] 
[   15.221670] The buggy address belongs to the physical page:
[   15.221966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.222369] flags: 0x200000000000000(node=0|zone=2)
[   15.222628] page_type: f5(slab)
[   15.222831] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.223174] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.223530] page dumped because: kasan: bad access detected
[   15.223817] 
[   15.223912] Memory state around the buggy address:
[   15.224138]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.224443]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.224798] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.225121]                                   ^
[   15.225339]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.225641]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.225888] ==================================================================
[   15.155459] ==================================================================
[   15.155774] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.156644] Write of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.156950] 
[   15.157061] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.157107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.157118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.157141] Call Trace:
[   15.157158]  <TASK>
[   15.157173]  dump_stack_lvl+0x73/0xb0
[   15.157205]  print_report+0xd1/0x610
[   15.157228]  ? __virt_addr_valid+0x1db/0x2d0
[   15.157251]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.157279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.157302]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.157329]  kasan_report+0x141/0x180
[   15.157351]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.157383]  kasan_check_range+0x10c/0x1c0
[   15.157406]  __kasan_check_write+0x18/0x20
[   15.157426]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.157453]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.157493]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.157584]  ? trace_hardirqs_on+0x37/0xe0
[   15.157606]  ? kasan_bitops_generic+0x92/0x1c0
[   15.157634]  kasan_bitops_generic+0x121/0x1c0
[   15.157657]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.157682]  ? __pfx_read_tsc+0x10/0x10
[   15.157704]  ? ktime_get_ts64+0x86/0x230
[   15.157728]  kunit_try_run_case+0x1a5/0x480
[   15.157752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.157775]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.157799]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.157822]  ? __kthread_parkme+0x82/0x180
[   15.157843]  ? preempt_count_sub+0x50/0x80
[   15.157866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.157891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.157914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.157938]  kthread+0x337/0x6f0
[   15.157957]  ? trace_preempt_on+0x20/0xc0
[   15.157979]  ? __pfx_kthread+0x10/0x10
[   15.158000]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.158021]  ? calculate_sigpending+0x7b/0xa0
[   15.158045]  ? __pfx_kthread+0x10/0x10
[   15.158066]  ret_from_fork+0x116/0x1d0
[   15.158085]  ? __pfx_kthread+0x10/0x10
[   15.158112]  ret_from_fork_asm+0x1a/0x30
[   15.158143]  </TASK>
[   15.158152] 
[   15.166515] Allocated by task 279:
[   15.166702]  kasan_save_stack+0x45/0x70
[   15.166906]  kasan_save_track+0x18/0x40
[   15.167102]  kasan_save_alloc_info+0x3b/0x50
[   15.167502]  __kasan_kmalloc+0xb7/0xc0
[   15.167696]  __kmalloc_cache_noprof+0x189/0x420
[   15.168124]  kasan_bitops_generic+0x92/0x1c0
[   15.168344]  kunit_try_run_case+0x1a5/0x480
[   15.168567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.168879]  kthread+0x337/0x6f0
[   15.169051]  ret_from_fork+0x116/0x1d0
[   15.169244]  ret_from_fork_asm+0x1a/0x30
[   15.169447] 
[   15.169553] The buggy address belongs to the object at ffff888102641aa0
[   15.169553]  which belongs to the cache kmalloc-16 of size 16
[   15.170098] The buggy address is located 8 bytes inside of
[   15.170098]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.170592] 
[   15.170675] The buggy address belongs to the physical page:
[   15.171071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.171435] flags: 0x200000000000000(node=0|zone=2)
[   15.171671] page_type: f5(slab)
[   15.171850] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.172137] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.172377] page dumped because: kasan: bad access detected
[   15.172611] 
[   15.172710] Memory state around the buggy address:
[   15.173023]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.173374]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.173614] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.173838]                                   ^
[   15.174000]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.174344]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.174697] ==================================================================
[   15.317522] ==================================================================
[   15.318226] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.318638] Read of size 8 at addr ffff888102641aa8 by task kunit_try_catch/279
[   15.319330] 
[   15.319671] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.319726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.319738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.319761] Call Trace:
[   15.319782]  <TASK>
[   15.319799]  dump_stack_lvl+0x73/0xb0
[   15.319832]  print_report+0xd1/0x610
[   15.319856]  ? __virt_addr_valid+0x1db/0x2d0
[   15.319879]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.319907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.319931]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.319960]  kasan_report+0x141/0x180
[   15.319983]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.320016]  kasan_check_range+0x10c/0x1c0
[   15.320040]  __kasan_check_read+0x15/0x20
[   15.320059]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.320088]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.320117]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.320141]  ? trace_hardirqs_on+0x37/0xe0
[   15.320164]  ? kasan_bitops_generic+0x92/0x1c0
[   15.320191]  kasan_bitops_generic+0x121/0x1c0
[   15.320215]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.320241]  ? __pfx_read_tsc+0x10/0x10
[   15.320262]  ? ktime_get_ts64+0x86/0x230
[   15.320286]  kunit_try_run_case+0x1a5/0x480
[   15.320311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.320333]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.320359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.320382]  ? __kthread_parkme+0x82/0x180
[   15.320403]  ? preempt_count_sub+0x50/0x80
[   15.320427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.320451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.320490]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.320516]  kthread+0x337/0x6f0
[   15.320536]  ? trace_preempt_on+0x20/0xc0
[   15.320558]  ? __pfx_kthread+0x10/0x10
[   15.320578]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.320600]  ? calculate_sigpending+0x7b/0xa0
[   15.320625]  ? __pfx_kthread+0x10/0x10
[   15.320647]  ret_from_fork+0x116/0x1d0
[   15.320668]  ? __pfx_kthread+0x10/0x10
[   15.320689]  ret_from_fork_asm+0x1a/0x30
[   15.320721]  </TASK>
[   15.320731] 
[   15.328760] Allocated by task 279:
[   15.328934]  kasan_save_stack+0x45/0x70
[   15.329130]  kasan_save_track+0x18/0x40
[   15.329301]  kasan_save_alloc_info+0x3b/0x50
[   15.329504]  __kasan_kmalloc+0xb7/0xc0
[   15.329672]  __kmalloc_cache_noprof+0x189/0x420
[   15.329945]  kasan_bitops_generic+0x92/0x1c0
[   15.330151]  kunit_try_run_case+0x1a5/0x480
[   15.330343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.330566]  kthread+0x337/0x6f0
[   15.330705]  ret_from_fork+0x116/0x1d0
[   15.330908]  ret_from_fork_asm+0x1a/0x30
[   15.331116] 
[   15.331217] The buggy address belongs to the object at ffff888102641aa0
[   15.331217]  which belongs to the cache kmalloc-16 of size 16
[   15.331596] The buggy address is located 8 bytes inside of
[   15.331596]  allocated 9-byte region [ffff888102641aa0, ffff888102641aa9)
[   15.331954] 
[   15.332029] The buggy address belongs to the physical page:
[   15.332207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102641
[   15.332564] flags: 0x200000000000000(node=0|zone=2)
[   15.332975] page_type: f5(slab)
[   15.333149] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.333508] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.333959] page dumped because: kasan: bad access detected
[   15.334187] 
[   15.334260] Memory state around the buggy address:
[   15.334420]  ffff888102641980: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   15.334651]  ffff888102641a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.334871] >ffff888102641a80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.335202]                                   ^
[   15.335429]  ffff888102641b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.335769]  ffff888102641b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.336158] ==================================================================