Hay
Date
July 23, 2025, 2:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.886736] ==================================================================
[   17.887049] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   17.887346] Call trace:
[   17.887582]  __asan_report_load8_noabort+0x20/0x30
[   17.887709]  kasan_bitops_generic+0x11c/0x1c8
[   17.889135]  __kasan_kmalloc+0xd4/0xd8
[   17.891839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.893886]  fff00000c5961200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.894696]  fff00000c5961380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.896165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   17.896837] Hardware name: linux,dummy-virt (DT)
[   17.897463]  kasan_report+0xdc/0x128
[   17.899015]  ret_from_fork+0x10/0x20
[   17.899668]  kasan_save_alloc_info+0x40/0x58
[   17.900949]  ret_from_fork+0x10/0x20
[   17.901371] 
[   17.901979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105961
[   17.903403]  fff00000c5961200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.903784]  fff00000c5961380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.905673] Read of size 8 at addr fff00000c59612a8 by task kunit_try_catch/261
[   17.906127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.906678]  print_report+0x118/0x5d0
[   17.907270]  kasan_bitops_generic+0x11c/0x1c8
[   17.908984]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.910307] The buggy address is located 8 bytes inside of
[   17.910307]  allocated 9-byte region [fff00000c59612a0, fff00000c59612a9)
[   17.911393] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.912065]  fff00000c5961200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.912608] ==================================================================

[   14.840566] ==================================================================
[   14.841138] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.841505] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.842006] 
[   14.842116] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.842161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.842173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.842194] Call Trace:
[   14.842208]  <TASK>
[   14.842223]  dump_stack_lvl+0x73/0xb0
[   14.842251]  print_report+0xd1/0x610
[   14.842273]  ? __virt_addr_valid+0x1db/0x2d0
[   14.842317]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.842344]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.842366]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.842394]  kasan_report+0x141/0x180
[   14.842416]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.842448]  kasan_check_range+0x10c/0x1c0
[   14.842470]  __kasan_check_write+0x18/0x20
[   14.842490]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.842517]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.842546]  ? ret_from_fork_asm+0x1a/0x30
[   14.842567]  ? kthread+0x337/0x6f0
[   14.842591]  kasan_bitops_generic+0x121/0x1c0
[   14.842613]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.842637]  ? __pfx_read_tsc+0x10/0x10
[   14.842659]  ? ktime_get_ts64+0x86/0x230
[   14.842681]  kunit_try_run_case+0x1a5/0x480
[   14.842705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.842746]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.842771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.842794]  ? __kthread_parkme+0x82/0x180
[   14.842823]  ? preempt_count_sub+0x50/0x80
[   14.842847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.842870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.842893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.842917]  kthread+0x337/0x6f0
[   14.842937]  ? trace_preempt_on+0x20/0xc0
[   14.842960]  ? __pfx_kthread+0x10/0x10
[   14.842980]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.843001]  ? calculate_sigpending+0x7b/0xa0
[   14.843024]  ? __pfx_kthread+0x10/0x10
[   14.843045]  ret_from_fork+0x116/0x1d0
[   14.843063]  ? __pfx_kthread+0x10/0x10
[   14.843083]  ret_from_fork_asm+0x1a/0x30
[   14.843126]  </TASK>
[   14.843137] 
[   14.851266] Allocated by task 278:
[   14.851448]  kasan_save_stack+0x45/0x70
[   14.851613]  kasan_save_track+0x18/0x40
[   14.851830]  kasan_save_alloc_info+0x3b/0x50
[   14.852019]  __kasan_kmalloc+0xb7/0xc0
[   14.852221]  __kmalloc_cache_noprof+0x189/0x420
[   14.852453]  kasan_bitops_generic+0x92/0x1c0
[   14.852662]  kunit_try_run_case+0x1a5/0x480
[   14.852888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.853229]  kthread+0x337/0x6f0
[   14.853381]  ret_from_fork+0x116/0x1d0
[   14.853571]  ret_from_fork_asm+0x1a/0x30
[   14.853764] 
[   14.853854] The buggy address belongs to the object at ffff8881025ca080
[   14.853854]  which belongs to the cache kmalloc-16 of size 16
[   14.854355] The buggy address is located 8 bytes inside of
[   14.854355]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.854710] 
[   14.854785] The buggy address belongs to the physical page:
[   14.854969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.855341] flags: 0x200000000000000(node=0|zone=2)
[   14.855761] page_type: f5(slab)
[   14.855942] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.856472] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.856804] page dumped because: kasan: bad access detected
[   14.857040] 
[   14.857150] Memory state around the buggy address:
[   14.857368]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.857672]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.857902] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.858118]                       ^
[   14.858242]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.858558]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.858902] ==================================================================
[   14.788686] ==================================================================
[   14.789063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.789477] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.790606] 
[   14.790729] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.790786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.790799] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.790831] Call Trace:
[   14.790846]  <TASK>
[   14.790860]  dump_stack_lvl+0x73/0xb0
[   14.790889]  print_report+0xd1/0x610
[   14.790910]  ? __virt_addr_valid+0x1db/0x2d0
[   14.790932]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.790959]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.790981]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.791008]  kasan_report+0x141/0x180
[   14.791029]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.791061]  kasan_check_range+0x10c/0x1c0
[   14.791085]  __kasan_check_write+0x18/0x20
[   14.791104]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.791131]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.791160]  ? ret_from_fork_asm+0x1a/0x30
[   14.791182]  ? kthread+0x337/0x6f0
[   14.791205]  kasan_bitops_generic+0x121/0x1c0
[   14.791228]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.791252]  ? __pfx_read_tsc+0x10/0x10
[   14.791272]  ? ktime_get_ts64+0x86/0x230
[   14.791295]  kunit_try_run_case+0x1a5/0x480
[   14.791321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.791344]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.791366]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.791389]  ? __kthread_parkme+0x82/0x180
[   14.791409]  ? preempt_count_sub+0x50/0x80
[   14.791431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.791455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.791478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.791501]  kthread+0x337/0x6f0
[   14.791520]  ? trace_preempt_on+0x20/0xc0
[   14.791542]  ? __pfx_kthread+0x10/0x10
[   14.791563]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.791583]  ? calculate_sigpending+0x7b/0xa0
[   14.791606]  ? __pfx_kthread+0x10/0x10
[   14.791627]  ret_from_fork+0x116/0x1d0
[   14.791645]  ? __pfx_kthread+0x10/0x10
[   14.791665]  ret_from_fork_asm+0x1a/0x30
[   14.791694]  </TASK>
[   14.791704] 
[   14.807591] Allocated by task 278:
[   14.807740]  kasan_save_stack+0x45/0x70
[   14.807904]  kasan_save_track+0x18/0x40
[   14.808043]  kasan_save_alloc_info+0x3b/0x50
[   14.808194]  __kasan_kmalloc+0xb7/0xc0
[   14.808361]  __kmalloc_cache_noprof+0x189/0x420
[   14.808547]  kasan_bitops_generic+0x92/0x1c0
[   14.808698]  kunit_try_run_case+0x1a5/0x480
[   14.808910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.809249]  kthread+0x337/0x6f0
[   14.809403]  ret_from_fork+0x116/0x1d0
[   14.809569]  ret_from_fork_asm+0x1a/0x30
[   14.809744] 
[   14.809828] The buggy address belongs to the object at ffff8881025ca080
[   14.809828]  which belongs to the cache kmalloc-16 of size 16
[   14.810451] The buggy address is located 8 bytes inside of
[   14.810451]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.810945] 
[   14.811025] The buggy address belongs to the physical page:
[   14.811380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.811739] flags: 0x200000000000000(node=0|zone=2)
[   14.811959] page_type: f5(slab)
[   14.812141] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.812380] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.812705] page dumped because: kasan: bad access detected
[   14.812940] 
[   14.813012] Memory state around the buggy address:
[   14.813168]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.813551]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.813875] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.814221]                       ^
[   14.814345]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.814561]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.814883] ==================================================================
[   14.859469] ==================================================================
[   14.860219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.860563] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.860911] 
[   14.860997] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.861063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.861075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.861096] Call Trace:
[   14.861108]  <TASK>
[   14.861123]  dump_stack_lvl+0x73/0xb0
[   14.861149]  print_report+0xd1/0x610
[   14.861170]  ? __virt_addr_valid+0x1db/0x2d0
[   14.861191]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.861218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.861240]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.861268]  kasan_report+0x141/0x180
[   14.861291]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.861322]  kasan_check_range+0x10c/0x1c0
[   14.861346]  __kasan_check_write+0x18/0x20
[   14.861365]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.861392]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.861421]  ? ret_from_fork_asm+0x1a/0x30
[   14.861442]  ? kthread+0x337/0x6f0
[   14.861488]  kasan_bitops_generic+0x121/0x1c0
[   14.861512]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.861537]  ? __pfx_read_tsc+0x10/0x10
[   14.861556]  ? ktime_get_ts64+0x86/0x230
[   14.861579]  kunit_try_run_case+0x1a5/0x480
[   14.861603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.861625]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.861665]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.861689]  ? __kthread_parkme+0x82/0x180
[   14.861708]  ? preempt_count_sub+0x50/0x80
[   14.861731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.861754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.861778]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.861800]  kthread+0x337/0x6f0
[   14.861829]  ? trace_preempt_on+0x20/0xc0
[   14.861851]  ? __pfx_kthread+0x10/0x10
[   14.861871]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.861892]  ? calculate_sigpending+0x7b/0xa0
[   14.861915]  ? __pfx_kthread+0x10/0x10
[   14.861936]  ret_from_fork+0x116/0x1d0
[   14.861954]  ? __pfx_kthread+0x10/0x10
[   14.861975]  ret_from_fork_asm+0x1a/0x30
[   14.862005]  </TASK>
[   14.862015] 
[   14.870027] Allocated by task 278:
[   14.870203]  kasan_save_stack+0x45/0x70
[   14.870464]  kasan_save_track+0x18/0x40
[   14.870602]  kasan_save_alloc_info+0x3b/0x50
[   14.870755]  __kasan_kmalloc+0xb7/0xc0
[   14.870898]  __kmalloc_cache_noprof+0x189/0x420
[   14.871053]  kasan_bitops_generic+0x92/0x1c0
[   14.871515]  kunit_try_run_case+0x1a5/0x480
[   14.871727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.872014]  kthread+0x337/0x6f0
[   14.872299]  ret_from_fork+0x116/0x1d0
[   14.872487]  ret_from_fork_asm+0x1a/0x30
[   14.872676] 
[   14.872774] The buggy address belongs to the object at ffff8881025ca080
[   14.872774]  which belongs to the cache kmalloc-16 of size 16
[   14.873353] The buggy address is located 8 bytes inside of
[   14.873353]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.873761] 
[   14.873844] The buggy address belongs to the physical page:
[   14.874017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.874582] flags: 0x200000000000000(node=0|zone=2)
[   14.874830] page_type: f5(slab)
[   14.874996] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.875329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.875657] page dumped because: kasan: bad access detected
[   14.875848] 
[   14.875918] Memory state around the buggy address:
[   14.876241]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.876512]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.876729] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.877054]                       ^
[   14.877225]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.877535]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.877880] ==================================================================
[   14.915692] ==================================================================
[   14.915959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.916232] Read of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.916647] 
[   14.916795] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.916852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.916864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.916884] Call Trace:
[   14.916897]  <TASK>
[   14.916910]  dump_stack_lvl+0x73/0xb0
[   14.916937]  print_report+0xd1/0x610
[   14.916958]  ? __virt_addr_valid+0x1db/0x2d0
[   14.916981]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.917008]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.917030]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.917057]  kasan_report+0x141/0x180
[   14.917078]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.917119]  __asan_report_load8_noabort+0x18/0x20
[   14.917144]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.917172]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.917199]  ? ret_from_fork_asm+0x1a/0x30
[   14.917221]  ? kthread+0x337/0x6f0
[   14.917245]  kasan_bitops_generic+0x121/0x1c0
[   14.917268]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.917292]  ? __pfx_read_tsc+0x10/0x10
[   14.917312]  ? ktime_get_ts64+0x86/0x230
[   14.917335]  kunit_try_run_case+0x1a5/0x480
[   14.917359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.917381]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.917405]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.917427]  ? __kthread_parkme+0x82/0x180
[   14.917447]  ? preempt_count_sub+0x50/0x80
[   14.917470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.917493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.917515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.917538]  kthread+0x337/0x6f0
[   14.917557]  ? trace_preempt_on+0x20/0xc0
[   14.917579]  ? __pfx_kthread+0x10/0x10
[   14.917599]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.917621]  ? calculate_sigpending+0x7b/0xa0
[   14.917644]  ? __pfx_kthread+0x10/0x10
[   14.917665]  ret_from_fork+0x116/0x1d0
[   14.917683]  ? __pfx_kthread+0x10/0x10
[   14.917703]  ret_from_fork_asm+0x1a/0x30
[   14.917756]  </TASK>
[   14.917765] 
[   14.925404] Allocated by task 278:
[   14.925535]  kasan_save_stack+0x45/0x70
[   14.925678]  kasan_save_track+0x18/0x40
[   14.925825]  kasan_save_alloc_info+0x3b/0x50
[   14.926037]  __kasan_kmalloc+0xb7/0xc0
[   14.926378]  __kmalloc_cache_noprof+0x189/0x420
[   14.926624]  kasan_bitops_generic+0x92/0x1c0
[   14.926869]  kunit_try_run_case+0x1a5/0x480
[   14.927101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.927375]  kthread+0x337/0x6f0
[   14.927563]  ret_from_fork+0x116/0x1d0
[   14.927717]  ret_from_fork_asm+0x1a/0x30
[   14.927869] 
[   14.927970] The buggy address belongs to the object at ffff8881025ca080
[   14.927970]  which belongs to the cache kmalloc-16 of size 16
[   14.928735] The buggy address is located 8 bytes inside of
[   14.928735]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.929176] 
[   14.929252] The buggy address belongs to the physical page:
[   14.929426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.930121] flags: 0x200000000000000(node=0|zone=2)
[   14.930376] page_type: f5(slab)
[   14.930543] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.930790] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.931062] page dumped because: kasan: bad access detected
[   14.931326] 
[   14.931421] Memory state around the buggy address:
[   14.931658]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.931929]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.932244] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.932555]                       ^
[   14.932677]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.933026]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.933443] ==================================================================
[   14.750871] ==================================================================
[   14.751416] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.751799] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.752125] 
[   14.752222] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.752265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.752278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.752298] Call Trace:
[   14.752310]  <TASK>
[   14.752323]  dump_stack_lvl+0x73/0xb0
[   14.752350]  print_report+0xd1/0x610
[   14.752371]  ? __virt_addr_valid+0x1db/0x2d0
[   14.752394]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.752420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.752442]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.752469]  kasan_report+0x141/0x180
[   14.752491]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.752522]  kasan_check_range+0x10c/0x1c0
[   14.752544]  __kasan_check_write+0x18/0x20
[   14.752564]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.752591]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.752620]  ? ret_from_fork_asm+0x1a/0x30
[   14.752642]  ? kthread+0x337/0x6f0
[   14.752666]  kasan_bitops_generic+0x121/0x1c0
[   14.752689]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.752713]  ? __pfx_read_tsc+0x10/0x10
[   14.752734]  ? ktime_get_ts64+0x86/0x230
[   14.752757]  kunit_try_run_case+0x1a5/0x480
[   14.752781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.752803]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.752837]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.752866]  ? __kthread_parkme+0x82/0x180
[   14.752886]  ? preempt_count_sub+0x50/0x80
[   14.752909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.752933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.752956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.752979]  kthread+0x337/0x6f0
[   14.752998]  ? trace_preempt_on+0x20/0xc0
[   14.753021]  ? __pfx_kthread+0x10/0x10
[   14.753042]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.753062]  ? calculate_sigpending+0x7b/0xa0
[   14.753086]  ? __pfx_kthread+0x10/0x10
[   14.753118]  ret_from_fork+0x116/0x1d0
[   14.753136]  ? __pfx_kthread+0x10/0x10
[   14.753157]  ret_from_fork_asm+0x1a/0x30
[   14.753187]  </TASK>
[   14.753197] 
[   14.760754] Allocated by task 278:
[   14.760895]  kasan_save_stack+0x45/0x70
[   14.761038]  kasan_save_track+0x18/0x40
[   14.761175]  kasan_save_alloc_info+0x3b/0x50
[   14.761324]  __kasan_kmalloc+0xb7/0xc0
[   14.761458]  __kmalloc_cache_noprof+0x189/0x420
[   14.761682]  kasan_bitops_generic+0x92/0x1c0
[   14.761903]  kunit_try_run_case+0x1a5/0x480
[   14.762111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.762505]  kthread+0x337/0x6f0
[   14.762678]  ret_from_fork+0x116/0x1d0
[   14.762874]  ret_from_fork_asm+0x1a/0x30
[   14.763067] 
[   14.763160] The buggy address belongs to the object at ffff8881025ca080
[   14.763160]  which belongs to the cache kmalloc-16 of size 16
[   14.763650] The buggy address is located 8 bytes inside of
[   14.763650]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.764012] 
[   14.764084] The buggy address belongs to the physical page:
[   14.764257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.764498] flags: 0x200000000000000(node=0|zone=2)
[   14.764745] page_type: f5(slab)
[   14.764927] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.765491] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.765842] page dumped because: kasan: bad access detected
[   14.766102] 
[   14.766199] Memory state around the buggy address:
[   14.766431]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.766715]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.766982] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.767488]                       ^
[   14.767618]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.767850]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.768284] ==================================================================
[   14.878439] ==================================================================
[   14.878805] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.879249] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.879542] 
[   14.879652] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.879715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.879727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.879749] Call Trace:
[   14.879762]  <TASK>
[   14.879776]  dump_stack_lvl+0x73/0xb0
[   14.879802]  print_report+0xd1/0x610
[   14.879834]  ? __virt_addr_valid+0x1db/0x2d0
[   14.879856]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.879902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.879924]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.879951]  kasan_report+0x141/0x180
[   14.879973]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.880004]  kasan_check_range+0x10c/0x1c0
[   14.880028]  __kasan_check_write+0x18/0x20
[   14.880047]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.880074]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.880103]  ? ret_from_fork_asm+0x1a/0x30
[   14.880124]  ? kthread+0x337/0x6f0
[   14.880148]  kasan_bitops_generic+0x121/0x1c0
[   14.880170]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.880194]  ? __pfx_read_tsc+0x10/0x10
[   14.880215]  ? ktime_get_ts64+0x86/0x230
[   14.880237]  kunit_try_run_case+0x1a5/0x480
[   14.880262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.880284]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.880307]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.880331]  ? __kthread_parkme+0x82/0x180
[   14.880350]  ? preempt_count_sub+0x50/0x80
[   14.880372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.880396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.880419]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.880443]  kthread+0x337/0x6f0
[   14.880462]  ? trace_preempt_on+0x20/0xc0
[   14.880484]  ? __pfx_kthread+0x10/0x10
[   14.880504]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.880525]  ? calculate_sigpending+0x7b/0xa0
[   14.880548]  ? __pfx_kthread+0x10/0x10
[   14.880569]  ret_from_fork+0x116/0x1d0
[   14.880586]  ? __pfx_kthread+0x10/0x10
[   14.880606]  ret_from_fork_asm+0x1a/0x30
[   14.880635]  </TASK>
[   14.880644] 
[   14.888566] Allocated by task 278:
[   14.888743]  kasan_save_stack+0x45/0x70
[   14.888957]  kasan_save_track+0x18/0x40
[   14.889184]  kasan_save_alloc_info+0x3b/0x50
[   14.889387]  __kasan_kmalloc+0xb7/0xc0
[   14.889568]  __kmalloc_cache_noprof+0x189/0x420
[   14.889721]  kasan_bitops_generic+0x92/0x1c0
[   14.889876]  kunit_try_run_case+0x1a5/0x480
[   14.890019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.890504]  kthread+0x337/0x6f0
[   14.890674]  ret_from_fork+0x116/0x1d0
[   14.890848]  ret_from_fork_asm+0x1a/0x30
[   14.890998] 
[   14.891075] The buggy address belongs to the object at ffff8881025ca080
[   14.891075]  which belongs to the cache kmalloc-16 of size 16
[   14.891540] The buggy address is located 8 bytes inside of
[   14.891540]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.892030] 
[   14.892104] The buggy address belongs to the physical page:
[   14.892273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.892504] flags: 0x200000000000000(node=0|zone=2)
[   14.892663] page_type: f5(slab)
[   14.892781] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.893555] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.893899] page dumped because: kasan: bad access detected
[   14.894224] 
[   14.894304] Memory state around the buggy address:
[   14.894458]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.894682]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.894916] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.895392]                       ^
[   14.895566]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.895891]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.896225] ==================================================================
[   14.897161] ==================================================================
[   14.897479] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.897806] Read of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.898210] 
[   14.898322] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.898365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.898377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.898399] Call Trace:
[   14.898417]  <TASK>
[   14.898433]  dump_stack_lvl+0x73/0xb0
[   14.898461]  print_report+0xd1/0x610
[   14.898482]  ? __virt_addr_valid+0x1db/0x2d0
[   14.898504]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.898530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.898553]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.898579]  kasan_report+0x141/0x180
[   14.898601]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.898633]  kasan_check_range+0x10c/0x1c0
[   14.898655]  __kasan_check_read+0x15/0x20
[   14.898673]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.898700]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.898728]  ? ret_from_fork_asm+0x1a/0x30
[   14.898751]  ? kthread+0x337/0x6f0
[   14.898774]  kasan_bitops_generic+0x121/0x1c0
[   14.898797]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.898834]  ? __pfx_read_tsc+0x10/0x10
[   14.898854]  ? ktime_get_ts64+0x86/0x230
[   14.898877]  kunit_try_run_case+0x1a5/0x480
[   14.898901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.898923]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.898946]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.898969]  ? __kthread_parkme+0x82/0x180
[   14.898988]  ? preempt_count_sub+0x50/0x80
[   14.899011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.899034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.899057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.899080]  kthread+0x337/0x6f0
[   14.899109]  ? trace_preempt_on+0x20/0xc0
[   14.899155]  ? __pfx_kthread+0x10/0x10
[   14.899175]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.899196]  ? calculate_sigpending+0x7b/0xa0
[   14.899219]  ? __pfx_kthread+0x10/0x10
[   14.899240]  ret_from_fork+0x116/0x1d0
[   14.899258]  ? __pfx_kthread+0x10/0x10
[   14.899278]  ret_from_fork_asm+0x1a/0x30
[   14.899308]  </TASK>
[   14.899318] 
[   14.907087] Allocated by task 278:
[   14.907446]  kasan_save_stack+0x45/0x70
[   14.907642]  kasan_save_track+0x18/0x40
[   14.907842]  kasan_save_alloc_info+0x3b/0x50
[   14.908050]  __kasan_kmalloc+0xb7/0xc0
[   14.908439]  __kmalloc_cache_noprof+0x189/0x420
[   14.908605]  kasan_bitops_generic+0x92/0x1c0
[   14.908755]  kunit_try_run_case+0x1a5/0x480
[   14.908918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.909244]  kthread+0x337/0x6f0
[   14.909415]  ret_from_fork+0x116/0x1d0
[   14.909628]  ret_from_fork_asm+0x1a/0x30
[   14.909862] 
[   14.909960] The buggy address belongs to the object at ffff8881025ca080
[   14.909960]  which belongs to the cache kmalloc-16 of size 16
[   14.910466] The buggy address is located 8 bytes inside of
[   14.910466]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.910831] 
[   14.910926] The buggy address belongs to the physical page:
[   14.911196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.911549] flags: 0x200000000000000(node=0|zone=2)
[   14.911783] page_type: f5(slab)
[   14.911966] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.912506] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.912910] page dumped because: kasan: bad access detected
[   14.913127] 
[   14.913223] Memory state around the buggy address:
[   14.913449]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.913729]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.914037] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.914342]                       ^
[   14.914467]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.914808]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.915121] ==================================================================
[   14.815874] ==================================================================
[   14.816244] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.816606] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.816890] 
[   14.816979] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.817023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.817035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.817057] Call Trace:
[   14.817073]  <TASK>
[   14.817090]  dump_stack_lvl+0x73/0xb0
[   14.817127]  print_report+0xd1/0x610
[   14.817149]  ? __virt_addr_valid+0x1db/0x2d0
[   14.817170]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.817197]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.817220]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.817248]  kasan_report+0x141/0x180
[   14.817269]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.817301]  kasan_check_range+0x10c/0x1c0
[   14.817324]  __kasan_check_write+0x18/0x20
[   14.817343]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.817370]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.817409]  ? ret_from_fork_asm+0x1a/0x30
[   14.817430]  ? kthread+0x337/0x6f0
[   14.817454]  kasan_bitops_generic+0x121/0x1c0
[   14.817477]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.817501]  ? __pfx_read_tsc+0x10/0x10
[   14.817521]  ? ktime_get_ts64+0x86/0x230
[   14.817544]  kunit_try_run_case+0x1a5/0x480
[   14.817568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.817590]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.817614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.817636]  ? __kthread_parkme+0x82/0x180
[   14.817656]  ? preempt_count_sub+0x50/0x80
[   14.817678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.817701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.817724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.817747]  kthread+0x337/0x6f0
[   14.817766]  ? trace_preempt_on+0x20/0xc0
[   14.817787]  ? __pfx_kthread+0x10/0x10
[   14.817807]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.817840]  ? calculate_sigpending+0x7b/0xa0
[   14.817863]  ? __pfx_kthread+0x10/0x10
[   14.817885]  ret_from_fork+0x116/0x1d0
[   14.817903]  ? __pfx_kthread+0x10/0x10
[   14.817924]  ret_from_fork_asm+0x1a/0x30
[   14.817953]  </TASK>
[   14.817963] 
[   14.828070] Allocated by task 278:
[   14.828568]  kasan_save_stack+0x45/0x70
[   14.828759]  kasan_save_track+0x18/0x40
[   14.828956]  kasan_save_alloc_info+0x3b/0x50
[   14.829494]  __kasan_kmalloc+0xb7/0xc0
[   14.829760]  __kmalloc_cache_noprof+0x189/0x420
[   14.830188]  kasan_bitops_generic+0x92/0x1c0
[   14.830398]  kunit_try_run_case+0x1a5/0x480
[   14.830590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.830837]  kthread+0x337/0x6f0
[   14.830994]  ret_from_fork+0x116/0x1d0
[   14.831252]  ret_from_fork_asm+0x1a/0x30
[   14.831434] 
[   14.831525] The buggy address belongs to the object at ffff8881025ca080
[   14.831525]  which belongs to the cache kmalloc-16 of size 16
[   14.832482] The buggy address is located 8 bytes inside of
[   14.832482]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.833486] 
[   14.833751] The buggy address belongs to the physical page:
[   14.834210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.834552] flags: 0x200000000000000(node=0|zone=2)
[   14.834771] page_type: f5(slab)
[   14.834936] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.835680] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.836014] page dumped because: kasan: bad access detected
[   14.836656] 
[   14.836758] Memory state around the buggy address:
[   14.836989]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.837736]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.838172] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.838633]                       ^
[   14.838799]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.839036]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.839389] ==================================================================
[   14.769187] ==================================================================
[   14.769557] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.769886] Write of size 8 at addr ffff8881025ca088 by task kunit_try_catch/278
[   14.770540] 
[   14.770659] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.770702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.770714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.770734] Call Trace:
[   14.770748]  <TASK>
[   14.770762]  dump_stack_lvl+0x73/0xb0
[   14.770790]  print_report+0xd1/0x610
[   14.770823]  ? __virt_addr_valid+0x1db/0x2d0
[   14.770844]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.770871]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.770894]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.770923]  kasan_report+0x141/0x180
[   14.770944]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.770976]  kasan_check_range+0x10c/0x1c0
[   14.771000]  __kasan_check_write+0x18/0x20
[   14.771019]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.771046]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.771074]  ? ret_from_fork_asm+0x1a/0x30
[   14.771096]  ? kthread+0x337/0x6f0
[   14.771119]  kasan_bitops_generic+0x121/0x1c0
[   14.771142]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.771167]  ? __pfx_read_tsc+0x10/0x10
[   14.771187]  ? ktime_get_ts64+0x86/0x230
[   14.771210]  kunit_try_run_case+0x1a5/0x480
[   14.771233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.771256]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.771278]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.771301]  ? __kthread_parkme+0x82/0x180
[   14.771320]  ? preempt_count_sub+0x50/0x80
[   14.771342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.771366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.771389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.771412]  kthread+0x337/0x6f0
[   14.771431]  ? trace_preempt_on+0x20/0xc0
[   14.771453]  ? __pfx_kthread+0x10/0x10
[   14.771473]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.771494]  ? calculate_sigpending+0x7b/0xa0
[   14.771517]  ? __pfx_kthread+0x10/0x10
[   14.771538]  ret_from_fork+0x116/0x1d0
[   14.771556]  ? __pfx_kthread+0x10/0x10
[   14.771577]  ret_from_fork_asm+0x1a/0x30
[   14.771606]  </TASK>
[   14.771616] 
[   14.779629] Allocated by task 278:
[   14.779805]  kasan_save_stack+0x45/0x70
[   14.780019]  kasan_save_track+0x18/0x40
[   14.780347]  kasan_save_alloc_info+0x3b/0x50
[   14.780509]  __kasan_kmalloc+0xb7/0xc0
[   14.780698]  __kmalloc_cache_noprof+0x189/0x420
[   14.780895]  kasan_bitops_generic+0x92/0x1c0
[   14.781124]  kunit_try_run_case+0x1a5/0x480
[   14.781302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.781541]  kthread+0x337/0x6f0
[   14.781711]  ret_from_fork+0x116/0x1d0
[   14.781905]  ret_from_fork_asm+0x1a/0x30
[   14.782073] 
[   14.782180] The buggy address belongs to the object at ffff8881025ca080
[   14.782180]  which belongs to the cache kmalloc-16 of size 16
[   14.782632] The buggy address is located 8 bytes inside of
[   14.782632]  allocated 9-byte region [ffff8881025ca080, ffff8881025ca089)
[   14.783050] 
[   14.783185] The buggy address belongs to the physical page:
[   14.783440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ca
[   14.783780] flags: 0x200000000000000(node=0|zone=2)
[   14.783974] page_type: f5(slab)
[   14.784147] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.784481] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.784776] page dumped because: kasan: bad access detected
[   14.785024] 
[   14.785134] Memory state around the buggy address:
[   14.785325]  ffff8881025c9f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.785614]  ffff8881025ca000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.785866] >ffff8881025ca080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.786083]                       ^
[   14.786216]  ffff8881025ca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.786644]  ffff8881025ca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.787272] ==================================================================