Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   43.754770] ==================================================================
[   43.761826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.769984] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   43.777276] 
[   43.778756] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   43.778806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.778822] Hardware name: WinLink E850-96 board (DT)
[   43.778843] Call trace:
[   43.778856]  show_stack+0x20/0x38 (C)
[   43.778889]  dump_stack_lvl+0x8c/0xd0
[   43.778924]  print_report+0x118/0x608
[   43.778959]  kasan_report+0xdc/0x128
[   43.778993]  __asan_report_load8_noabort+0x20/0x30
[   43.779033]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.779069]  kasan_bitops_generic+0x110/0x1c8
[   43.779102]  kunit_try_run_case+0x170/0x3f0
[   43.779137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.779174]  kthread+0x328/0x630
[   43.779201]  ret_from_fork+0x10/0x20
[   43.779234] 
[   43.847066] Allocated by task 308:
[   43.850452]  kasan_save_stack+0x3c/0x68
[   43.854271]  kasan_save_track+0x20/0x40
[   43.858090]  kasan_save_alloc_info+0x40/0x58
[   43.862344]  __kasan_kmalloc+0xd4/0xd8
[   43.866076]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.870590]  kasan_bitops_generic+0xa0/0x1c8
[   43.874843]  kunit_try_run_case+0x170/0x3f0
[   43.879010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.884479]  kthread+0x328/0x630
[   43.887690]  ret_from_fork+0x10/0x20
[   43.891249] 
[   43.892725] The buggy address belongs to the object at ffff000800d63060
[   43.892725]  which belongs to the cache kmalloc-16 of size 16
[   43.905052] The buggy address is located 8 bytes inside of
[   43.905052]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   43.917291] 
[   43.918767] The buggy address belongs to the physical page:
[   43.924326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.932309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.938818] page_type: f5(slab)
[   43.941952] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.949676] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.957394] page dumped because: kasan: bad access detected
[   43.962950] 
[   43.964425] Memory state around the buggy address:
[   43.969204]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.976408]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.983613] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   43.990814]                                                           ^
[   43.997415]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.004620]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.011821] ==================================================================
[   41.622131] ==================================================================
[   41.629221] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.637377] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   41.644669] 
[   41.646153] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   41.646206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.646225] Hardware name: WinLink E850-96 board (DT)
[   41.646247] Call trace:
[   41.646264]  show_stack+0x20/0x38 (C)
[   41.646298]  dump_stack_lvl+0x8c/0xd0
[   41.646335]  print_report+0x118/0x608
[   41.646370]  kasan_report+0xdc/0x128
[   41.646405]  __asan_report_load8_noabort+0x20/0x30
[   41.646444]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.646478]  kasan_bitops_generic+0x110/0x1c8
[   41.646510]  kunit_try_run_case+0x170/0x3f0
[   41.646546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.646586]  kthread+0x328/0x630
[   41.646615]  ret_from_fork+0x10/0x20
[   41.646649] 
[   41.714459] Allocated by task 308:
[   41.717848]  kasan_save_stack+0x3c/0x68
[   41.721664]  kasan_save_track+0x20/0x40
[   41.725483]  kasan_save_alloc_info+0x40/0x58
[   41.729737]  __kasan_kmalloc+0xd4/0xd8
[   41.733470]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.737983]  kasan_bitops_generic+0xa0/0x1c8
[   41.742237]  kunit_try_run_case+0x170/0x3f0
[   41.746403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.751872]  kthread+0x328/0x630
[   41.755084]  ret_from_fork+0x10/0x20
[   41.758642] 
[   41.760120] The buggy address belongs to the object at ffff000800d63060
[   41.760120]  which belongs to the cache kmalloc-16 of size 16
[   41.772445] The buggy address is located 8 bytes inside of
[   41.772445]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   41.784684] 
[   41.786161] The buggy address belongs to the physical page:
[   41.791719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   41.799703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.806213] page_type: f5(slab)
[   41.809348] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.817069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.824788] page dumped because: kasan: bad access detected
[   41.830343] 
[   41.831819] Memory state around the buggy address:
[   41.836600]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.843802]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.851006] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   41.858207]                                                           ^
[   41.864808]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.872013]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.879214] ==================================================================
[   42.954736] ==================================================================
[   42.961666] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   42.969823] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   42.977114] 
[   42.978597] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   42.978650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.978668] Hardware name: WinLink E850-96 board (DT)
[   42.978690] Call trace:
[   42.978706]  show_stack+0x20/0x38 (C)
[   42.978740]  dump_stack_lvl+0x8c/0xd0
[   42.978778]  print_report+0x118/0x608
[   42.978812]  kasan_report+0xdc/0x128
[   42.978844]  __asan_report_load8_noabort+0x20/0x30
[   42.978883]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   42.978920]  kasan_bitops_generic+0x110/0x1c8
[   42.978952]  kunit_try_run_case+0x170/0x3f0
[   42.978990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.979030]  kthread+0x328/0x630
[   42.979057]  ret_from_fork+0x10/0x20
[   42.979090] 
[   43.046904] Allocated by task 308:
[   43.050291]  kasan_save_stack+0x3c/0x68
[   43.054109]  kasan_save_track+0x20/0x40
[   43.057929]  kasan_save_alloc_info+0x40/0x58
[   43.062182]  __kasan_kmalloc+0xd4/0xd8
[   43.065915]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.070428]  kasan_bitops_generic+0xa0/0x1c8
[   43.074682]  kunit_try_run_case+0x170/0x3f0
[   43.078848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.084317]  kthread+0x328/0x630
[   43.087529]  ret_from_fork+0x10/0x20
[   43.091088] 
[   43.092563] The buggy address belongs to the object at ffff000800d63060
[   43.092563]  which belongs to the cache kmalloc-16 of size 16
[   43.104890] The buggy address is located 8 bytes inside of
[   43.104890]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   43.117129] 
[   43.118605] The buggy address belongs to the physical page:
[   43.124162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.132149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.138658] page_type: f5(slab)
[   43.141791] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.149514] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.157233] page dumped because: kasan: bad access detected
[   43.162788] 
[   43.164264] Memory state around the buggy address:
[   43.169043]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.176247]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.183451] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   43.190652]                                                           ^
[   43.197253]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.204458]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.211659] ==================================================================
[   42.419014] ==================================================================
[   42.425910] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.434067] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   42.441445] 
[   42.442929] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   42.442980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.442998] Hardware name: WinLink E850-96 board (DT)
[   42.443018] Call trace:
[   42.443033]  show_stack+0x20/0x38 (C)
[   42.443068]  dump_stack_lvl+0x8c/0xd0
[   42.443109]  print_report+0x118/0x608
[   42.443142]  kasan_report+0xdc/0x128
[   42.443174]  kasan_check_range+0x100/0x1a8
[   42.443211]  __kasan_check_write+0x20/0x30
[   42.443242]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.443276]  kasan_bitops_generic+0x110/0x1c8
[   42.443310]  kunit_try_run_case+0x170/0x3f0
[   42.443344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.443382]  kthread+0x328/0x630
[   42.443410]  ret_from_fork+0x10/0x20
[   42.443443] 
[   42.514622] Allocated by task 308:
[   42.518006]  kasan_save_stack+0x3c/0x68
[   42.521825]  kasan_save_track+0x20/0x40
[   42.525645]  kasan_save_alloc_info+0x40/0x58
[   42.529898]  __kasan_kmalloc+0xd4/0xd8
[   42.533631]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.538145]  kasan_bitops_generic+0xa0/0x1c8
[   42.542398]  kunit_try_run_case+0x170/0x3f0
[   42.546565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.552033]  kthread+0x328/0x630
[   42.555245]  ret_from_fork+0x10/0x20
[   42.558804] 
[   42.560280] The buggy address belongs to the object at ffff000800d63060
[   42.560280]  which belongs to the cache kmalloc-16 of size 16
[   42.572607] The buggy address is located 8 bytes inside of
[   42.572607]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   42.584845] 
[   42.586322] The buggy address belongs to the physical page:
[   42.591881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.599863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.606375] page_type: f5(slab)
[   42.609508] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.617231] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.624949] page dumped because: kasan: bad access detected
[   42.630505] 
[   42.631980] Memory state around the buggy address:
[   42.636761]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.643963]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.651168] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   42.658369]                                                           ^
[   42.664970]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.672175]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.679376] ==================================================================
[   42.686685] ==================================================================
[   42.693788] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.701945] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   42.709323] 
[   42.710805] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   42.710853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.710871] Hardware name: WinLink E850-96 board (DT)
[   42.710892] Call trace:
[   42.710906]  show_stack+0x20/0x38 (C)
[   42.710942]  dump_stack_lvl+0x8c/0xd0
[   42.710977]  print_report+0x118/0x608
[   42.711012]  kasan_report+0xdc/0x128
[   42.711046]  kasan_check_range+0x100/0x1a8
[   42.711080]  __kasan_check_write+0x20/0x30
[   42.711110]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.711146]  kasan_bitops_generic+0x110/0x1c8
[   42.711178]  kunit_try_run_case+0x170/0x3f0
[   42.711210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.711248]  kthread+0x328/0x630
[   42.711274]  ret_from_fork+0x10/0x20
[   42.711306] 
[   42.782499] Allocated by task 308:
[   42.785886]  kasan_save_stack+0x3c/0x68
[   42.789704]  kasan_save_track+0x20/0x40
[   42.793523]  kasan_save_alloc_info+0x40/0x58
[   42.797776]  __kasan_kmalloc+0xd4/0xd8
[   42.801509]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.806023]  kasan_bitops_generic+0xa0/0x1c8
[   42.810276]  kunit_try_run_case+0x170/0x3f0
[   42.814443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.819912]  kthread+0x328/0x630
[   42.823123]  ret_from_fork+0x10/0x20
[   42.826682] 
[   42.828158] The buggy address belongs to the object at ffff000800d63060
[   42.828158]  which belongs to the cache kmalloc-16 of size 16
[   42.840485] The buggy address is located 8 bytes inside of
[   42.840485]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   42.852723] 
[   42.854199] The buggy address belongs to the physical page:
[   42.859757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.867743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.874252] page_type: f5(slab)
[   42.877384] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.885109] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.892827] page dumped because: kasan: bad access detected
[   42.898382] 
[   42.899858] Memory state around the buggy address:
[   42.904639]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.911841]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.919046] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   42.926247]                                                           ^
[   42.932848]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.940053]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.947253] ==================================================================
[   42.154405] ==================================================================
[   42.161503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.169661] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   42.176952] 
[   42.178436] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   42.178487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.178504] Hardware name: WinLink E850-96 board (DT)
[   42.178525] Call trace:
[   42.178541]  show_stack+0x20/0x38 (C)
[   42.178576]  dump_stack_lvl+0x8c/0xd0
[   42.178611]  print_report+0x118/0x608
[   42.178644]  kasan_report+0xdc/0x128
[   42.178678]  __asan_report_load8_noabort+0x20/0x30
[   42.178717]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.178755]  kasan_bitops_generic+0x110/0x1c8
[   42.178786]  kunit_try_run_case+0x170/0x3f0
[   42.178822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.178861]  kthread+0x328/0x630
[   42.178888]  ret_from_fork+0x10/0x20
[   42.178922] 
[   42.246743] Allocated by task 308:
[   42.250128]  kasan_save_stack+0x3c/0x68
[   42.253948]  kasan_save_track+0x20/0x40
[   42.257767]  kasan_save_alloc_info+0x40/0x58
[   42.262020]  __kasan_kmalloc+0xd4/0xd8
[   42.265753]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.270267]  kasan_bitops_generic+0xa0/0x1c8
[   42.274520]  kunit_try_run_case+0x170/0x3f0
[   42.278687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.284155]  kthread+0x328/0x630
[   42.287367]  ret_from_fork+0x10/0x20
[   42.290926] 
[   42.292402] The buggy address belongs to the object at ffff000800d63060
[   42.292402]  which belongs to the cache kmalloc-16 of size 16
[   42.304729] The buggy address is located 8 bytes inside of
[   42.304729]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   42.316968] 
[   42.318445] The buggy address belongs to the physical page:
[   42.323999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.331985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.338496] page_type: f5(slab)
[   42.341628] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.349353] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.357071] page dumped because: kasan: bad access detected
[   42.362626] 
[   42.364102] Memory state around the buggy address:
[   42.368882]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.376085]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.383292] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   42.390491]                                                           ^
[   42.397092]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.404297]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.411497] ==================================================================
[   43.219061] ==================================================================
[   43.226070] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.234228] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   43.241607] 
[   43.243090] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   43.243140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.243159] Hardware name: WinLink E850-96 board (DT)
[   43.243180] Call trace:
[   43.243194]  show_stack+0x20/0x38 (C)
[   43.243228]  dump_stack_lvl+0x8c/0xd0
[   43.243263]  print_report+0x118/0x608
[   43.243297]  kasan_report+0xdc/0x128
[   43.243330]  kasan_check_range+0x100/0x1a8
[   43.243365]  __kasan_check_write+0x20/0x30
[   43.243394]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.243429]  kasan_bitops_generic+0x110/0x1c8
[   43.243462]  kunit_try_run_case+0x170/0x3f0
[   43.243497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.243535]  kthread+0x328/0x630
[   43.243563]  ret_from_fork+0x10/0x20
[   43.243596] 
[   43.314782] Allocated by task 308:
[   43.318168]  kasan_save_stack+0x3c/0x68
[   43.321987]  kasan_save_track+0x20/0x40
[   43.325807]  kasan_save_alloc_info+0x40/0x58
[   43.330060]  __kasan_kmalloc+0xd4/0xd8
[   43.333793]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.338307]  kasan_bitops_generic+0xa0/0x1c8
[   43.342560]  kunit_try_run_case+0x170/0x3f0
[   43.346727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.352195]  kthread+0x328/0x630
[   43.355407]  ret_from_fork+0x10/0x20
[   43.358966] 
[   43.360442] The buggy address belongs to the object at ffff000800d63060
[   43.360442]  which belongs to the cache kmalloc-16 of size 16
[   43.372768] The buggy address is located 8 bytes inside of
[   43.372768]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   43.385007] 
[   43.386483] The buggy address belongs to the physical page:
[   43.392039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.400028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.406536] page_type: f5(slab)
[   43.409668] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.417392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.425111] page dumped because: kasan: bad access detected
[   43.430666] 
[   43.432142] Memory state around the buggy address:
[   43.436921]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.444125]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.451330] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   43.458531]                                                           ^
[   43.465131]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.472336]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.479537] ==================================================================
[   43.486941] ==================================================================
[   43.493948] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.502106] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   43.509484] 
[   43.510967] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   43.511017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.511035] Hardware name: WinLink E850-96 board (DT)
[   43.511057] Call trace:
[   43.511068]  show_stack+0x20/0x38 (C)
[   43.511105]  dump_stack_lvl+0x8c/0xd0
[   43.511140]  print_report+0x118/0x608
[   43.511175]  kasan_report+0xdc/0x128
[   43.511209]  kasan_check_range+0x100/0x1a8
[   43.511244]  __kasan_check_write+0x20/0x30
[   43.511273]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.511309]  kasan_bitops_generic+0x110/0x1c8
[   43.511341]  kunit_try_run_case+0x170/0x3f0
[   43.511377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.511416]  kthread+0x328/0x630
[   43.511443]  ret_from_fork+0x10/0x20
[   43.511476] 
[   43.582660] Allocated by task 308:
[   43.586047]  kasan_save_stack+0x3c/0x68
[   43.589865]  kasan_save_track+0x20/0x40
[   43.593685]  kasan_save_alloc_info+0x40/0x58
[   43.597938]  __kasan_kmalloc+0xd4/0xd8
[   43.601670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.606184]  kasan_bitops_generic+0xa0/0x1c8
[   43.610438]  kunit_try_run_case+0x170/0x3f0
[   43.614604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.620073]  kthread+0x328/0x630
[   43.623285]  ret_from_fork+0x10/0x20
[   43.626844] 
[   43.628319] The buggy address belongs to the object at ffff000800d63060
[   43.628319]  which belongs to the cache kmalloc-16 of size 16
[   43.640646] The buggy address is located 8 bytes inside of
[   43.640646]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   43.652885] 
[   43.654362] The buggy address belongs to the physical page:
[   43.659917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   43.667904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.674412] page_type: f5(slab)
[   43.677546] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.685270] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.692989] page dumped because: kasan: bad access detected
[   43.698544] 
[   43.700019] Memory state around the buggy address:
[   43.704799]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.712003]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.719207] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   43.726408]                                                           ^
[   43.733009]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.740214]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.747415] ==================================================================
[   41.352004] ==================================================================
[   41.361343] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.369500] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   41.376878] 
[   41.378364] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   41.378423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.378442] Hardware name: WinLink E850-96 board (DT)
[   41.378465] Call trace:
[   41.378480]  show_stack+0x20/0x38 (C)
[   41.378518]  dump_stack_lvl+0x8c/0xd0
[   41.378557]  print_report+0x118/0x608
[   41.378596]  kasan_report+0xdc/0x128
[   41.378633]  kasan_check_range+0x100/0x1a8
[   41.378670]  __kasan_check_write+0x20/0x30
[   41.378703]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.378738]  kasan_bitops_generic+0x110/0x1c8
[   41.378774]  kunit_try_run_case+0x170/0x3f0
[   41.378812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.378850]  kthread+0x328/0x630
[   41.378881]  ret_from_fork+0x10/0x20
[   41.378918] 
[   41.450054] Allocated by task 308:
[   41.453442]  kasan_save_stack+0x3c/0x68
[   41.457258]  kasan_save_track+0x20/0x40
[   41.461079]  kasan_save_alloc_info+0x40/0x58
[   41.465331]  __kasan_kmalloc+0xd4/0xd8
[   41.469065]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.473577]  kasan_bitops_generic+0xa0/0x1c8
[   41.477831]  kunit_try_run_case+0x170/0x3f0
[   41.481997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.487467]  kthread+0x328/0x630
[   41.490678]  ret_from_fork+0x10/0x20
[   41.494237] 
[   41.495714] The buggy address belongs to the object at ffff000800d63060
[   41.495714]  which belongs to the cache kmalloc-16 of size 16
[   41.508041] The buggy address is located 8 bytes inside of
[   41.508041]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   41.520278] 
[   41.521757] The buggy address belongs to the physical page:
[   41.527313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   41.535298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.541807] page_type: f5(slab)
[   41.544944] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.552663] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.560382] page dumped because: kasan: bad access detected
[   41.565937] 
[   41.567413] Memory state around the buggy address:
[   41.572194]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.579396]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.586602] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   41.593801]                                                           ^
[   41.600402]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.607607]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.614810] ==================================================================
[   41.886599] ==================================================================
[   41.893625] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   41.901783] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   41.909162] 
[   41.910648] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   41.910701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.910718] Hardware name: WinLink E850-96 board (DT)
[   41.910739] Call trace:
[   41.910756]  show_stack+0x20/0x38 (C)
[   41.910793]  dump_stack_lvl+0x8c/0xd0
[   41.910829]  print_report+0x118/0x608
[   41.910862]  kasan_report+0xdc/0x128
[   41.910897]  kasan_check_range+0x100/0x1a8
[   41.910932]  __kasan_check_write+0x20/0x30
[   41.910962]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   41.910999]  kasan_bitops_generic+0x110/0x1c8
[   41.911031]  kunit_try_run_case+0x170/0x3f0
[   41.911065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.911102]  kthread+0x328/0x630
[   41.911130]  ret_from_fork+0x10/0x20
[   41.911165] 
[   41.982337] Allocated by task 308:
[   41.985724]  kasan_save_stack+0x3c/0x68
[   41.989544]  kasan_save_track+0x20/0x40
[   41.993363]  kasan_save_alloc_info+0x40/0x58
[   41.997615]  __kasan_kmalloc+0xd4/0xd8
[   42.001347]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.005861]  kasan_bitops_generic+0xa0/0x1c8
[   42.010115]  kunit_try_run_case+0x170/0x3f0
[   42.014281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.019750]  kthread+0x328/0x630
[   42.022962]  ret_from_fork+0x10/0x20
[   42.026521] 
[   42.027998] The buggy address belongs to the object at ffff000800d63060
[   42.027998]  which belongs to the cache kmalloc-16 of size 16
[   42.040323] The buggy address is located 8 bytes inside of
[   42.040323]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   42.052562] 
[   42.054039] The buggy address belongs to the physical page:
[   42.059593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   42.067581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.074091] page_type: f5(slab)
[   42.077223] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.084947] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.092665] page dumped because: kasan: bad access detected
[   42.098221] 
[   42.099696] Memory state around the buggy address:
[   42.104476]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.111680]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.118886] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   42.126085]                                                           ^
[   42.132686]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.139891]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.147092] ==================================================================

[   29.198001] ==================================================================
[   29.198113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   29.198350] 
[   29.200443]  kasan_bitops_generic+0x110/0x1c8
[   29.205009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062bd
[   29.208563] ==================================================================
[   29.074580] ==================================================================
[   29.075249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   29.075470] Read of size 8 at addr fff00000c62bd348 by task kunit_try_catch/261
[   29.076155] 
[   29.076366] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.076550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.076823] Hardware name: linux,dummy-virt (DT)
[   29.076926] Call trace:
[   29.077098]  show_stack+0x20/0x38 (C)
[   29.077327]  dump_stack_lvl+0x8c/0xd0
[   29.077653]  print_report+0x118/0x608
[   29.078033]  kasan_report+0xdc/0x128
[   29.078461]  __asan_report_load8_noabort+0x20/0x30
[   29.079164]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   29.079666]  kasan_bitops_generic+0x110/0x1c8
[   29.079842]  kunit_try_run_case+0x170/0x3f0
[   29.079999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.080362]  kthread+0x328/0x630
[   29.081266]  ret_from_fork+0x10/0x20
[   29.081776] 
[   29.083384]  __kasan_kmalloc+0xd4/0xd8
[   29.085665] 
[   29.085720] The buggy address belongs to the object at fff00000c62bd340
[   29.085720]  which belongs to the cache kmalloc-16 of size 16
[   29.085867] The buggy address is located 8 bytes inside of
[   29.085867]  allocated 9-byte region [fff00000c62bd340, fff00000c62bd349)
[   29.087696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.089269] page dumped because: kasan: bad access detected
[   29.089570]  fff00000c62bd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.090674] ==================================================================
[   29.053613] ==================================================================
[   29.053779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   29.053959] Write of size 8 at addr fff00000c62bd348 by task kunit_try_catch/261
[   29.054169] 
[   29.054268] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.054657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.054870] Hardware name: linux,dummy-virt (DT)
[   29.054983] Call trace:
[   29.055063]  show_stack+0x20/0x38 (C)
[   29.055442]  dump_stack_lvl+0x8c/0xd0
[   29.055612]  print_report+0x118/0x608
[   29.055752]  kasan_report+0xdc/0x128
[   29.056064]  kasan_check_range+0x100/0x1a8
[   29.056467]  __kasan_check_write+0x20/0x30
[   29.056590]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   29.056964]  kasan_bitops_generic+0x110/0x1c8
[   29.057105]  kunit_try_run_case+0x170/0x3f0
[   29.059364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.059580]  kthread+0x328/0x630
[   29.059685]  ret_from_fork+0x10/0x20
[   29.059758] 
[   29.059784] Allocated by task 261:
[   29.059825]  kasan_save_stack+0x3c/0x68
[   29.059883]  kasan_save_track+0x20/0x40
[   29.059963]  kasan_save_alloc_info+0x40/0x58
[   29.060243]  __kasan_kmalloc+0xd4/0xd8
[   29.061011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.061259]  kasan_bitops_generic+0xa0/0x1c8
[   29.061743]  kunit_try_run_case+0x170/0x3f0
[   29.062280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.062683]  kthread+0x328/0x630
[   29.063171]  ret_from_fork+0x10/0x20
[   29.063295] 
[   29.063352] The buggy address belongs to the object at fff00000c62bd340
[   29.063352]  which belongs to the cache kmalloc-16 of size 16
[   29.063993] The buggy address is located 8 bytes inside of
[   29.063993]  allocated 9-byte region [fff00000c62bd340, fff00000c62bd349)
[   29.064189] 
[   29.064261] The buggy address belongs to the physical page:
[   29.064596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062bd
[   29.065478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.065650] page_type: f5(slab)
[   29.065791] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.066320] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.066893] page dumped because: kasan: bad access detected
[   29.067021] 
[   29.067071] Memory state around the buggy address:
[   29.067162]  fff00000c62bd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.067282]  fff00000c62bd280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.067844] >fff00000c62bd300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   29.068128]                                               ^
[   29.068741]  fff00000c62bd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.068877]  fff00000c62bd400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.069003] ==================================================================

[   29.228920] ==================================================================
[   29.229466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   29.239291]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   29.251461] The buggy address is located 8 bytes inside of
[   29.251461]  allocated 9-byte region [fff00000c60a60c0, fff00000c60a60c9)
[   29.257351] >fff00000c60a6080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   29.257403]                                               ^
[   29.257940] ==================================================================

[   22.439411] ==================================================================
[   22.441822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   22.443829] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.445432] 
[   22.445730] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.445859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.445882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.445915] Call Trace:
[   22.445940]  <TASK>
[   22.445965]  dump_stack_lvl+0x73/0xb0
[   22.446056]  print_report+0xd1/0x650
[   22.446131]  ? __virt_addr_valid+0x1db/0x2d0
[   22.446205]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   22.446287]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.446365]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   22.446450]  kasan_report+0x141/0x180
[   22.446561]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   22.446661]  kasan_check_range+0x10c/0x1c0
[   22.446743]  __kasan_check_write+0x18/0x20
[   22.446813]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   22.446872]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   22.446913]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.446958]  ? finish_task_switch.isra.0+0x156/0x700
[   22.446993]  ? kasan_bitops_generic+0x92/0x1c0
[   22.447032]  kasan_bitops_generic+0x116/0x1c0
[   22.447067]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.447103]  ? __pfx_read_tsc+0x10/0x10
[   22.447134]  ? ktime_get_ts64+0x86/0x230
[   22.447168]  kunit_try_run_case+0x1a5/0x480
[   22.447205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.447278]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.447323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.447359]  ? __kthread_parkme+0x82/0x180
[   22.447389]  ? preempt_count_sub+0x50/0x80
[   22.447421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.447457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.447491]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.447643]  kthread+0x337/0x6f0
[   22.447706]  ? trace_preempt_on+0x20/0xc0
[   22.447747]  ? __pfx_kthread+0x10/0x10
[   22.447777]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.447808]  ? calculate_sigpending+0x7b/0xa0
[   22.447843]  ? __pfx_kthread+0x10/0x10
[   22.447872]  ret_from_fork+0x116/0x1d0
[   22.447897]  ? __pfx_kthread+0x10/0x10
[   22.447925]  ret_from_fork_asm+0x1a/0x30
[   22.447966]  </TASK>
[   22.447982] 
[   22.467553] Allocated by task 279:
[   22.468899]  kasan_save_stack+0x45/0x70
[   22.469323]  kasan_save_track+0x18/0x40
[   22.469936]  kasan_save_alloc_info+0x3b/0x50
[   22.470406]  __kasan_kmalloc+0xb7/0xc0
[   22.470750]  __kmalloc_cache_noprof+0x189/0x420
[   22.471121]  kasan_bitops_generic+0x92/0x1c0
[   22.472109]  kunit_try_run_case+0x1a5/0x480
[   22.472615]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.473144]  kthread+0x337/0x6f0
[   22.473674]  ret_from_fork+0x116/0x1d0
[   22.474303]  ret_from_fork_asm+0x1a/0x30
[   22.474704] 
[   22.474896] The buggy address belongs to the object at ffff8881023e2400
[   22.474896]  which belongs to the cache kmalloc-16 of size 16
[   22.475597] The buggy address is located 8 bytes inside of
[   22.475597]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   22.476654] 
[   22.477608] The buggy address belongs to the physical page:
[   22.478123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   22.479581] flags: 0x200000000000000(node=0|zone=2)
[   22.480098] page_type: f5(slab)
[   22.480456] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.481935] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.482641] page dumped because: kasan: bad access detected
[   22.483081] 
[   22.483269] Memory state around the buggy address:
[   22.483666]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   22.484558]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.485749] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.486847]                       ^
[   22.487242]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.488096]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.488773] ==================================================================
[   22.376162] ==================================================================
[   22.376790] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   22.378131] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.379518] 
[   22.379992] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.380162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.380204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.380288] Call Trace:
[   22.380337]  <TASK>
[   22.380367]  dump_stack_lvl+0x73/0xb0
[   22.380419]  print_report+0xd1/0x650
[   22.380454]  ? __virt_addr_valid+0x1db/0x2d0
[   22.380487]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   22.380563]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.380598]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   22.380655]  kasan_report+0x141/0x180
[   22.380689]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   22.380732]  kasan_check_range+0x10c/0x1c0
[   22.380767]  __kasan_check_write+0x18/0x20
[   22.380794]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   22.380831]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   22.380869]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.380911]  ? finish_task_switch.isra.0+0x156/0x700
[   22.380944]  ? kasan_bitops_generic+0x92/0x1c0
[   22.380982]  kasan_bitops_generic+0x116/0x1c0
[   22.381016]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.381052]  ? __pfx_read_tsc+0x10/0x10
[   22.381082]  ? ktime_get_ts64+0x86/0x230
[   22.381115]  kunit_try_run_case+0x1a5/0x480
[   22.381151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.381185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.381220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.381253]  ? __kthread_parkme+0x82/0x180
[   22.381280]  ? preempt_count_sub+0x50/0x80
[   22.381310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.381346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.381379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.381414]  kthread+0x337/0x6f0
[   22.381439]  ? trace_preempt_on+0x20/0xc0
[   22.381472]  ? __pfx_kthread+0x10/0x10
[   22.381541]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.381629]  ? calculate_sigpending+0x7b/0xa0
[   22.381707]  ? __pfx_kthread+0x10/0x10
[   22.381776]  ret_from_fork+0x116/0x1d0
[   22.381807]  ? __pfx_kthread+0x10/0x10
[   22.381839]  ret_from_fork_asm+0x1a/0x30
[   22.381880]  </TASK>
[   22.381895] 
[   22.410579] Allocated by task 279:
[   22.411153]  kasan_save_stack+0x45/0x70
[   22.411802]  kasan_save_track+0x18/0x40
[   22.412342]  kasan_save_alloc_info+0x3b/0x50
[   22.413188]  __kasan_kmalloc+0xb7/0xc0
[   22.413989]  __kmalloc_cache_noprof+0x189/0x420
[   22.414892]  kasan_bitops_generic+0x92/0x1c0
[   22.415196]  kunit_try_run_case+0x1a5/0x480
[   22.416247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.417083]  kthread+0x337/0x6f0
[   22.417453]  ret_from_fork+0x116/0x1d0
[   22.417892]  ret_from_fork_asm+0x1a/0x30
[   22.418667] 
[   22.418937] The buggy address belongs to the object at ffff8881023e2400
[   22.418937]  which belongs to the cache kmalloc-16 of size 16
[   22.420568] The buggy address is located 8 bytes inside of
[   22.420568]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   22.421819] 
[   22.422175] The buggy address belongs to the physical page:
[   22.423072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   22.423807] flags: 0x200000000000000(node=0|zone=2)
[   22.424231] page_type: f5(slab)
[   22.424627] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.425400] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.425974] page dumped because: kasan: bad access detected
[   22.426608] 
[   22.426834] Memory state around the buggy address:
[   22.428224]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   22.430747]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.431654] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.432027]                       ^
[   22.433057]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.434893]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.436962] ==================================================================
[   22.591201] ==================================================================
[   22.591822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   22.593426] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.594372] 
[   22.595069] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.595297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.595340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.595399] Call Trace:
[   22.595447]  <TASK>
[   22.595517]  dump_stack_lvl+0x73/0xb0
[   22.595619]  print_report+0xd1/0x650
[   22.595892]  ? __virt_addr_valid+0x1db/0x2d0
[   22.595975]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   22.596050]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.596086]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   22.596124]  kasan_report+0x141/0x180
[   22.596157]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   22.596200]  kasan_check_range+0x10c/0x1c0
[   22.596254]  __kasan_check_write+0x18/0x20
[   22.596299]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   22.596341]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   22.596380]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.596424]  ? finish_task_switch.isra.0+0x156/0x700
[   22.596459]  ? kasan_bitops_generic+0x92/0x1c0
[   22.596520]  kasan_bitops_generic+0x116/0x1c0
[   22.596611]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.596691]  ? __pfx_read_tsc+0x10/0x10
[   22.596748]  ? ktime_get_ts64+0x86/0x230
[   22.596815]  kunit_try_run_case+0x1a5/0x480
[   22.596895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.596964]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.597032]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.597089]  ? __kthread_parkme+0x82/0x180
[   22.597119]  ? preempt_count_sub+0x50/0x80
[   22.597150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.597186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.597221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.597295]  kthread+0x337/0x6f0
[   22.597326]  ? trace_preempt_on+0x20/0xc0
[   22.597360]  ? __pfx_kthread+0x10/0x10
[   22.597388]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.597419]  ? calculate_sigpending+0x7b/0xa0
[   22.597452]  ? __pfx_kthread+0x10/0x10
[   22.597541]  ret_from_fork+0x116/0x1d0
[   22.597606]  ? __pfx_kthread+0x10/0x10
[   22.597694]  ret_from_fork_asm+0x1a/0x30
[   22.597759]  </TASK>
[   22.597775] 
[   22.621272] Allocated by task 279:
[   22.621932]  kasan_save_stack+0x45/0x70
[   22.623156]  kasan_save_track+0x18/0x40
[   22.623723]  kasan_save_alloc_info+0x3b/0x50
[   22.624209]  __kasan_kmalloc+0xb7/0xc0
[   22.624893]  __kmalloc_cache_noprof+0x189/0x420
[   22.625466]  kasan_bitops_generic+0x92/0x1c0
[   22.626075]  kunit_try_run_case+0x1a5/0x480
[   22.627132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.627729]  kthread+0x337/0x6f0
[   22.628082]  ret_from_fork+0x116/0x1d0
[   22.628920]  ret_from_fork_asm+0x1a/0x30
[   22.629101] 
[   22.629198] The buggy address belongs to the object at ffff8881023e2400
[   22.629198]  which belongs to the cache kmalloc-16 of size 16
[   22.630766] The buggy address is located 8 bytes inside of
[   22.630766]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   22.631802] 
[   22.631965] The buggy address belongs to the physical page:
[   22.633194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   22.634247] flags: 0x200000000000000(node=0|zone=2)
[   22.634837] page_type: f5(slab)
[   22.635200] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.635818] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.636745] page dumped because: kasan: bad access detected
[   22.637795] 
[   22.638023] Memory state around the buggy address:
[   22.638930]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   22.639806]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.640634] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.641970]                       ^
[   22.642731]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.643034]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.643344] ==================================================================
[   22.700786] ==================================================================
[   22.701190] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   22.702660] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.704098] 
[   22.704469] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.705200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.705269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.705326] Call Trace:
[   22.705373]  <TASK>
[   22.705413]  dump_stack_lvl+0x73/0xb0
[   22.705701]  print_report+0xd1/0x650
[   22.705791]  ? __virt_addr_valid+0x1db/0x2d0
[   22.705911]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   22.706031]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.706108]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   22.706186]  kasan_report+0x141/0x180
[   22.706294]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   22.706382]  kasan_check_range+0x10c/0x1c0
[   22.706454]  __kasan_check_write+0x18/0x20
[   22.707012]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   22.707106]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   22.707190]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.707282]  ? finish_task_switch.isra.0+0x156/0x700
[   22.707345]  ? kasan_bitops_generic+0x92/0x1c0
[   22.707419]  kasan_bitops_generic+0x116/0x1c0
[   22.707477]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.707583]  ? __pfx_read_tsc+0x10/0x10
[   22.707638]  ? ktime_get_ts64+0x86/0x230
[   22.707694]  kunit_try_run_case+0x1a5/0x480
[   22.707755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.707807]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.707863]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.707918]  ? __kthread_parkme+0x82/0x180
[   22.707964]  ? preempt_count_sub+0x50/0x80
[   22.708019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.708074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.708130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.708186]  kthread+0x337/0x6f0
[   22.708232]  ? trace_preempt_on+0x20/0xc0
[   22.708288]  ? __pfx_kthread+0x10/0x10
[   22.708339]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.708390]  ? calculate_sigpending+0x7b/0xa0
[   22.708446]  ? __pfx_kthread+0x10/0x10
[   22.708517]  ret_from_fork+0x116/0x1d0
[   22.709335]  ? __pfx_kthread+0x10/0x10
[   22.709404]  ret_from_fork_asm+0x1a/0x30
[   22.709478]  </TASK>
[   22.709556] 
[   22.734382] Allocated by task 279:
[   22.734788]  kasan_save_stack+0x45/0x70
[   22.735183]  kasan_save_track+0x18/0x40
[   22.735567]  kasan_save_alloc_info+0x3b/0x50
[   22.735963]  __kasan_kmalloc+0xb7/0xc0
[   22.736327]  __kmalloc_cache_noprof+0x189/0x420
[   22.737463]  kasan_bitops_generic+0x92/0x1c0
[   22.738076]  kunit_try_run_case+0x1a5/0x480
[   22.738787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.739371]  kthread+0x337/0x6f0
[   22.739974]  ret_from_fork+0x116/0x1d0
[   22.740442]  ret_from_fork_asm+0x1a/0x30
[   22.741336] 
[   22.741788] The buggy address belongs to the object at ffff8881023e2400
[   22.741788]  which belongs to the cache kmalloc-16 of size 16
[   22.742996] The buggy address is located 8 bytes inside of
[   22.742996]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   22.744241] 
[   22.745179] The buggy address belongs to the physical page:
[   22.745931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   22.746770] flags: 0x200000000000000(node=0|zone=2)
[   22.747304] page_type: f5(slab)
[   22.747897] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.749157] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.749837] page dumped because: kasan: bad access detected
[   22.750437] 
[   22.750866] Memory state around the buggy address:
[   22.751409]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   22.752144]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.753311] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.753873]                       ^
[   22.754265]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.754941]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.755577] ==================================================================
[   22.319941] ==================================================================
[   22.320653] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   22.321963] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.323375] 
[   22.323906] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.324039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.324081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.324147] Call Trace:
[   22.324194]  <TASK>
[   22.324262]  dump_stack_lvl+0x73/0xb0
[   22.324326]  print_report+0xd1/0x650
[   22.324363]  ? __virt_addr_valid+0x1db/0x2d0
[   22.324401]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   22.324438]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.324471]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   22.324536]  kasan_report+0x141/0x180
[   22.324619]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   22.324705]  kasan_check_range+0x10c/0x1c0
[   22.324745]  __kasan_check_write+0x18/0x20
[   22.324775]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   22.324816]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   22.324858]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.324903]  ? finish_task_switch.isra.0+0x156/0x700
[   22.324938]  ? kasan_bitops_generic+0x92/0x1c0
[   22.324978]  kasan_bitops_generic+0x116/0x1c0
[   22.325014]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.325051]  ? __pfx_read_tsc+0x10/0x10
[   22.325082]  ? ktime_get_ts64+0x86/0x230
[   22.325118]  kunit_try_run_case+0x1a5/0x480
[   22.325158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.325193]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.325247]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.325297]  ? __kthread_parkme+0x82/0x180
[   22.325328]  ? preempt_count_sub+0x50/0x80
[   22.325360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.325396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.325431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.325466]  kthread+0x337/0x6f0
[   22.325513]  ? trace_preempt_on+0x20/0xc0
[   22.325602]  ? __pfx_kthread+0x10/0x10
[   22.325695]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.325761]  ? calculate_sigpending+0x7b/0xa0
[   22.325836]  ? __pfx_kthread+0x10/0x10
[   22.325907]  ret_from_fork+0x116/0x1d0
[   22.325974]  ? __pfx_kthread+0x10/0x10
[   22.326025]  ret_from_fork_asm+0x1a/0x30
[   22.326072]  </TASK>
[   22.326087] 
[   22.349215] Allocated by task 279:
[   22.349605]  kasan_save_stack+0x45/0x70
[   22.349985]  kasan_save_track+0x18/0x40
[   22.351485]  kasan_save_alloc_info+0x3b/0x50
[   22.352761]  __kasan_kmalloc+0xb7/0xc0
[   22.353272]  __kmalloc_cache_noprof+0x189/0x420
[   22.354233]  kasan_bitops_generic+0x92/0x1c0
[   22.354442]  kunit_try_run_case+0x1a5/0x480
[   22.354841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.356019]  kthread+0x337/0x6f0
[   22.356428]  ret_from_fork+0x116/0x1d0
[   22.356847]  ret_from_fork_asm+0x1a/0x30
[   22.357444] 
[   22.357692] The buggy address belongs to the object at ffff8881023e2400
[   22.357692]  which belongs to the cache kmalloc-16 of size 16
[   22.358936] The buggy address is located 8 bytes inside of
[   22.358936]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   22.360385] 
[   22.360778] The buggy address belongs to the physical page:
[   22.362153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   22.362793] flags: 0x200000000000000(node=0|zone=2)
[   22.363585] page_type: f5(slab)
[   22.363956] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.364943] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.365595] page dumped because: kasan: bad access detected
[   22.366530] 
[   22.367227] Memory state around the buggy address:
[   22.368153]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   22.369074]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.370198] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.372275]                       ^
[   22.372772]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.373596]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.374883] ==================================================================
[   22.537467] ==================================================================
[   22.538171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   22.539094] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.540244] 
[   22.540542] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.540673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.540887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.540961] Call Trace:
[   22.541014]  <TASK>
[   22.541069]  dump_stack_lvl+0x73/0xb0
[   22.541180]  print_report+0xd1/0x650
[   22.541262]  ? __virt_addr_valid+0x1db/0x2d0
[   22.541381]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   22.541468]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.541707]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   22.541761]  kasan_report+0x141/0x180
[   22.541797]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   22.541843]  kasan_check_range+0x10c/0x1c0
[   22.541878]  __kasan_check_write+0x18/0x20
[   22.541907]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   22.541947]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   22.541986]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.542031]  ? finish_task_switch.isra.0+0x156/0x700
[   22.542064]  ? kasan_bitops_generic+0x92/0x1c0
[   22.542104]  kasan_bitops_generic+0x116/0x1c0
[   22.542139]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.542177]  ? __pfx_read_tsc+0x10/0x10
[   22.542209]  ? ktime_get_ts64+0x86/0x230
[   22.542242]  kunit_try_run_case+0x1a5/0x480
[   22.542282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.542315]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.542398]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.542440]  ? __kthread_parkme+0x82/0x180
[   22.542467]  ? preempt_count_sub+0x50/0x80
[   22.542524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.542622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.542700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.542740]  kthread+0x337/0x6f0
[   22.542769]  ? trace_preempt_on+0x20/0xc0
[   22.542803]  ? __pfx_kthread+0x10/0x10
[   22.542832]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.542864]  ? calculate_sigpending+0x7b/0xa0
[   22.542897]  ? __pfx_kthread+0x10/0x10
[   22.542927]  ret_from_fork+0x116/0x1d0
[   22.542952]  ? __pfx_kthread+0x10/0x10
[   22.542981]  ret_from_fork_asm+0x1a/0x30
[   22.543022]  </TASK>
[   22.543036] 
[   22.565875] Allocated by task 279:
[   22.566393]  kasan_save_stack+0x45/0x70
[   22.566977]  kasan_save_track+0x18/0x40
[   22.567516]  kasan_save_alloc_info+0x3b/0x50
[   22.568732]  __kasan_kmalloc+0xb7/0xc0
[   22.569006]  __kmalloc_cache_noprof+0x189/0x420
[   22.569793]  kasan_bitops_generic+0x92/0x1c0
[   22.570292]  kunit_try_run_case+0x1a5/0x480
[   22.570918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.571520]  kthread+0x337/0x6f0
[   22.572469]  ret_from_fork+0x116/0x1d0
[   22.572844]  ret_from_fork_asm+0x1a/0x30
[   22.573877] 
[   22.573984] The buggy address belongs to the object at ffff8881023e2400
[   22.573984]  which belongs to the cache kmalloc-16 of size 16
[   22.575211] The buggy address is located 8 bytes inside of
[   22.575211]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   22.577374] 
[   22.577845] The buggy address belongs to the physical page:
[   22.578936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   22.579746] flags: 0x200000000000000(node=0|zone=2)
[   22.580288] page_type: f5(slab)
[   22.580592] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.581258] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.581895] page dumped because: kasan: bad access detected
[   22.583247] 
[   22.583637] Memory state around the buggy address:
[   22.584485]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   22.585599]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.586346] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.587493]                       ^
[   22.587960]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.589667]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.590181] ==================================================================
[   22.644593] ==================================================================
[   22.647009] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   22.647898] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.648416] 
[   22.648655] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.648786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.648826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.648889] Call Trace:
[   22.648941]  <TASK>
[   22.648994]  dump_stack_lvl+0x73/0xb0
[   22.649151]  print_report+0xd1/0x650
[   22.649241]  ? __virt_addr_valid+0x1db/0x2d0
[   22.649322]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   22.649437]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.649535]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   22.649663]  kasan_report+0x141/0x180
[   22.649730]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   22.649820]  kasan_check_range+0x10c/0x1c0
[   22.649901]  __kasan_check_write+0x18/0x20
[   22.649968]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   22.650045]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   22.650125]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.650217]  ? finish_task_switch.isra.0+0x156/0x700
[   22.650294]  ? kasan_bitops_generic+0x92/0x1c0
[   22.650382]  kasan_bitops_generic+0x116/0x1c0
[   22.650457]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.650529]  ? __pfx_read_tsc+0x10/0x10
[   22.650869]  ? ktime_get_ts64+0x86/0x230
[   22.650911]  kunit_try_run_case+0x1a5/0x480
[   22.650952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.650987]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.651020]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.651054]  ? __kthread_parkme+0x82/0x180
[   22.651080]  ? preempt_count_sub+0x50/0x80
[   22.651110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.651145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.651178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.651214]  kthread+0x337/0x6f0
[   22.651284]  ? trace_preempt_on+0x20/0xc0
[   22.651324]  ? __pfx_kthread+0x10/0x10
[   22.651353]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.651384]  ? calculate_sigpending+0x7b/0xa0
[   22.651417]  ? __pfx_kthread+0x10/0x10
[   22.651446]  ret_from_fork+0x116/0x1d0
[   22.651471]  ? __pfx_kthread+0x10/0x10
[   22.651523]  ret_from_fork_asm+0x1a/0x30
[   22.651643]  </TASK>
[   22.651688] 
[   22.675477] Allocated by task 279:
[   22.676180]  kasan_save_stack+0x45/0x70
[   22.676661]  kasan_save_track+0x18/0x40
[   22.677406]  kasan_save_alloc_info+0x3b/0x50
[   22.678064]  __kasan_kmalloc+0xb7/0xc0
[   22.679015]  __kmalloc_cache_noprof+0x189/0x420
[   22.679599]  kasan_bitops_generic+0x92/0x1c0
[   22.680076]  kunit_try_run_case+0x1a5/0x480
[   22.680530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.681159]  kthread+0x337/0x6f0
[   22.681688]  ret_from_fork+0x116/0x1d0
[   22.682032]  ret_from_fork_asm+0x1a/0x30
[   22.682576] 
[   22.682807] The buggy address belongs to the object at ffff8881023e2400
[   22.682807]  which belongs to the cache kmalloc-16 of size 16
[   22.683881] The buggy address is located 8 bytes inside of
[   22.683881]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   22.685517] 
[   22.685831] The buggy address belongs to the physical page:
[   22.686380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   22.687077] flags: 0x200000000000000(node=0|zone=2)
[   22.687715] page_type: f5(slab)
[   22.688097] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.688729] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.689652] page dumped because: kasan: bad access detected
[   22.690103] 
[   22.690408] Memory state around the buggy address:
[   22.691096]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   22.691859]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.692917] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.694403]                       ^
[   22.695928]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.697783]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.698962] ==================================================================
[   22.489783] ==================================================================
[   22.490363] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   22.490976] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.491471] 
[   22.491764] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.491894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.491936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.492000] Call Trace:
[   22.492050]  <TASK>
[   22.492103]  dump_stack_lvl+0x73/0xb0
[   22.492197]  print_report+0xd1/0x650
[   22.492269]  ? __virt_addr_valid+0x1db/0x2d0
[   22.492349]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   22.492432]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.493302]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   22.493398]  kasan_report+0x141/0x180
[   22.493480]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   22.493737]  kasan_check_range+0x10c/0x1c0
[   22.493819]  __kasan_check_write+0x18/0x20
[   22.493887]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   22.493971]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   22.494058]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.494155]  ? finish_task_switch.isra.0+0x156/0x700
[   22.494232]  ? kasan_bitops_generic+0x92/0x1c0
[   22.494320]  kasan_bitops_generic+0x116/0x1c0
[   22.494366]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.494403]  ? __pfx_read_tsc+0x10/0x10
[   22.494436]  ? ktime_get_ts64+0x86/0x230
[   22.494471]  kunit_try_run_case+0x1a5/0x480
[   22.494543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.494669]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.494713]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.494752]  ? __kthread_parkme+0x82/0x180
[   22.494783]  ? preempt_count_sub+0x50/0x80
[   22.494815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.494851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.494886]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.494920]  kthread+0x337/0x6f0
[   22.494949]  ? trace_preempt_on+0x20/0xc0
[   22.494986]  ? __pfx_kthread+0x10/0x10
[   22.495015]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.495046]  ? calculate_sigpending+0x7b/0xa0
[   22.495081]  ? __pfx_kthread+0x10/0x10
[   22.495110]  ret_from_fork+0x116/0x1d0
[   22.495138]  ? __pfx_kthread+0x10/0x10
[   22.495166]  ret_from_fork_asm+0x1a/0x30
[   22.495208]  </TASK>
[   22.495241] 
[   22.515925] Allocated by task 279:
[   22.516401]  kasan_save_stack+0x45/0x70
[   22.517044]  kasan_save_track+0x18/0x40
[   22.517521]  kasan_save_alloc_info+0x3b/0x50
[   22.518699]  __kasan_kmalloc+0xb7/0xc0
[   22.519113]  __kmalloc_cache_noprof+0x189/0x420
[   22.519743]  kasan_bitops_generic+0x92/0x1c0
[   22.520121]  kunit_try_run_case+0x1a5/0x480
[   22.520651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.521191]  kthread+0x337/0x6f0
[   22.522084]  ret_from_fork+0x116/0x1d0
[   22.522725]  ret_from_fork_asm+0x1a/0x30
[   22.523184] 
[   22.523447] The buggy address belongs to the object at ffff8881023e2400
[   22.523447]  which belongs to the cache kmalloc-16 of size 16
[   22.524719] The buggy address is located 8 bytes inside of
[   22.524719]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   22.526245] 
[   22.526451] The buggy address belongs to the physical page:
[   22.526951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   22.527671] flags: 0x200000000000000(node=0|zone=2)
[   22.528086] page_type: f5(slab)
[   22.528466] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.529404] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.530926] page dumped because: kasan: bad access detected
[   22.531476] 
[   22.531849] Memory state around the buggy address:
[   22.532269]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   22.533032]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.533695] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.534224]                       ^
[   22.534614]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.535179]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.536344] ==================================================================

[   21.213381] ==================================================================
[   21.213845] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.215251] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.215821] 
[   21.216057] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.216173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.216212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.216271] Call Trace:
[   21.216307]  <TASK>
[   21.216353]  dump_stack_lvl+0x73/0xb0
[   21.216441]  print_report+0xd1/0x650
[   21.216522]  ? __virt_addr_valid+0x1db/0x2d0
[   21.216602]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.216686]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.216764]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.216848]  kasan_report+0x141/0x180
[   21.216946]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.217039]  kasan_check_range+0x10c/0x1c0
[   21.217122]  __kasan_check_write+0x18/0x20
[   21.217197]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.217283]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.217368]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.217446]  ? trace_hardirqs_on+0x37/0xe0
[   21.217516]  ? kasan_bitops_generic+0x92/0x1c0
[   21.217558]  kasan_bitops_generic+0x116/0x1c0
[   21.217594]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.217632]  ? __pfx_read_tsc+0x10/0x10
[   21.217663]  ? ktime_get_ts64+0x86/0x230
[   21.217697]  kunit_try_run_case+0x1a5/0x480
[   21.217735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.217768]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.217803]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.217837]  ? __kthread_parkme+0x82/0x180
[   21.217865]  ? preempt_count_sub+0x50/0x80
[   21.217964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.218007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.218045]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.218082]  kthread+0x337/0x6f0
[   21.218159]  ? trace_preempt_on+0x20/0xc0
[   21.218195]  ? __pfx_kthread+0x10/0x10
[   21.218226]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.218269]  ? calculate_sigpending+0x7b/0xa0
[   21.218308]  ? __pfx_kthread+0x10/0x10
[   21.218339]  ret_from_fork+0x116/0x1d0
[   21.218365]  ? __pfx_kthread+0x10/0x10
[   21.218394]  ret_from_fork_asm+0x1a/0x30
[   21.218435]  </TASK>
[   21.218448] 
[   21.240714] Allocated by task 279:
[   21.241076]  kasan_save_stack+0x45/0x70
[   21.241827]  kasan_save_track+0x18/0x40
[   21.242463]  kasan_save_alloc_info+0x3b/0x50
[   21.243028]  __kasan_kmalloc+0xb7/0xc0
[   21.243728]  __kmalloc_cache_noprof+0x189/0x420
[   21.244377]  kasan_bitops_generic+0x92/0x1c0
[   21.244793]  kunit_try_run_case+0x1a5/0x480
[   21.245180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.245991]  kthread+0x337/0x6f0
[   21.246618]  ret_from_fork+0x116/0x1d0
[   21.247268]  ret_from_fork_asm+0x1a/0x30
[   21.247612] 
[   21.247847] The buggy address belongs to the object at ffff888101e49ec0
[   21.247847]  which belongs to the cache kmalloc-16 of size 16
[   21.249476] The buggy address is located 8 bytes inside of
[   21.249476]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.250452] 
[   21.250680] The buggy address belongs to the physical page:
[   21.251189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.252020] flags: 0x200000000000000(node=0|zone=2)
[   21.252642] page_type: f5(slab)
[   21.253089] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.253818] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.254617] page dumped because: kasan: bad access detected
[   21.255208] 
[   21.255492] Memory state around the buggy address:
[   21.256011]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.256913]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.257627] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.258423]                                               ^
[   21.259018]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.259707]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.260397] ==================================================================
[   21.166180] ==================================================================
[   21.166463] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.167824] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.169343] 
[   21.169590] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.169708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.169751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.169810] Call Trace:
[   21.169849]  <TASK>
[   21.169909]  dump_stack_lvl+0x73/0xb0
[   21.169967]  print_report+0xd1/0x650
[   21.170001]  ? __virt_addr_valid+0x1db/0x2d0
[   21.170033]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.170071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.170113]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.170854]  kasan_report+0x141/0x180
[   21.170952]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.171030]  kasan_check_range+0x10c/0x1c0
[   21.171070]  __kasan_check_write+0x18/0x20
[   21.171115]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.171192]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.171234]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.171269]  ? trace_hardirqs_on+0x37/0xe0
[   21.171303]  ? kasan_bitops_generic+0x92/0x1c0
[   21.171344]  kasan_bitops_generic+0x116/0x1c0
[   21.171378]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.171414]  ? __pfx_read_tsc+0x10/0x10
[   21.171443]  ? ktime_get_ts64+0x86/0x230
[   21.171477]  kunit_try_run_case+0x1a5/0x480
[   21.171511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.171545]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.171580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.171614]  ? __kthread_parkme+0x82/0x180
[   21.171642]  ? preempt_count_sub+0x50/0x80
[   21.171674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.171710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.171743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.171779]  kthread+0x337/0x6f0
[   21.171826]  ? trace_preempt_on+0x20/0xc0
[   21.171865]  ? __pfx_kthread+0x10/0x10
[   21.171925]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.171958]  ? calculate_sigpending+0x7b/0xa0
[   21.171994]  ? __pfx_kthread+0x10/0x10
[   21.172024]  ret_from_fork+0x116/0x1d0
[   21.172052]  ? __pfx_kthread+0x10/0x10
[   21.172082]  ret_from_fork_asm+0x1a/0x30
[   21.172145]  </TASK>
[   21.172162] 
[   21.191352] Allocated by task 279:
[   21.192298]  kasan_save_stack+0x45/0x70
[   21.192697]  kasan_save_track+0x18/0x40
[   21.193704]  kasan_save_alloc_info+0x3b/0x50
[   21.194289]  __kasan_kmalloc+0xb7/0xc0
[   21.194728]  __kmalloc_cache_noprof+0x189/0x420
[   21.195222]  kasan_bitops_generic+0x92/0x1c0
[   21.195660]  kunit_try_run_case+0x1a5/0x480
[   21.196044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.196558]  kthread+0x337/0x6f0
[   21.196853]  ret_from_fork+0x116/0x1d0
[   21.197291]  ret_from_fork_asm+0x1a/0x30
[   21.198076] 
[   21.198492] The buggy address belongs to the object at ffff888101e49ec0
[   21.198492]  which belongs to the cache kmalloc-16 of size 16
[   21.199661] The buggy address is located 8 bytes inside of
[   21.199661]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.200837] 
[   21.201145] The buggy address belongs to the physical page:
[   21.202319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.202986] flags: 0x200000000000000(node=0|zone=2)
[   21.203780] page_type: f5(slab)
[   21.204351] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.205093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.205919] page dumped because: kasan: bad access detected
[   21.206374] 
[   21.206856] Memory state around the buggy address:
[   21.207302]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.208244]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.208768] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.210236]                                               ^
[   21.210661]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.211459]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.212071] ==================================================================
[   21.307857] ==================================================================
[   21.308796] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.309528] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.310303] 
[   21.310642] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.310757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.310846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.310937] Call Trace:
[   21.310998]  <TASK>
[   21.311042]  dump_stack_lvl+0x73/0xb0
[   21.311128]  print_report+0xd1/0x650
[   21.311244]  ? __virt_addr_valid+0x1db/0x2d0
[   21.311373]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.311473]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.311548]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.311631]  kasan_report+0x141/0x180
[   21.311682]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.311727]  kasan_check_range+0x10c/0x1c0
[   21.311762]  __kasan_check_write+0x18/0x20
[   21.311789]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.311826]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.311864]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.311936]  ? trace_hardirqs_on+0x37/0xe0
[   21.311970]  ? kasan_bitops_generic+0x92/0x1c0
[   21.312010]  kasan_bitops_generic+0x116/0x1c0
[   21.312044]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.312080]  ? __pfx_read_tsc+0x10/0x10
[   21.312151]  ? ktime_get_ts64+0x86/0x230
[   21.312193]  kunit_try_run_case+0x1a5/0x480
[   21.312231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.312265]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.312298]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.312331]  ? __kthread_parkme+0x82/0x180
[   21.312363]  ? preempt_count_sub+0x50/0x80
[   21.312395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.312431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.312466]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.312501]  kthread+0x337/0x6f0
[   21.312528]  ? trace_preempt_on+0x20/0xc0
[   21.312559]  ? __pfx_kthread+0x10/0x10
[   21.312588]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.312619]  ? calculate_sigpending+0x7b/0xa0
[   21.312653]  ? __pfx_kthread+0x10/0x10
[   21.312683]  ret_from_fork+0x116/0x1d0
[   21.312708]  ? __pfx_kthread+0x10/0x10
[   21.312738]  ret_from_fork_asm+0x1a/0x30
[   21.312779]  </TASK>
[   21.312794] 
[   21.333068] Allocated by task 279:
[   21.333674]  kasan_save_stack+0x45/0x70
[   21.334082]  kasan_save_track+0x18/0x40
[   21.336682]  kasan_save_alloc_info+0x3b/0x50
[   21.337030]  __kasan_kmalloc+0xb7/0xc0
[   21.337344]  __kmalloc_cache_noprof+0x189/0x420
[   21.337663]  kasan_bitops_generic+0x92/0x1c0
[   21.339641]  kunit_try_run_case+0x1a5/0x480
[   21.340991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.342517]  kthread+0x337/0x6f0
[   21.342829]  ret_from_fork+0x116/0x1d0
[   21.343687]  ret_from_fork_asm+0x1a/0x30
[   21.344049] 
[   21.344479] The buggy address belongs to the object at ffff888101e49ec0
[   21.344479]  which belongs to the cache kmalloc-16 of size 16
[   21.345726] The buggy address is located 8 bytes inside of
[   21.345726]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.346981] 
[   21.347246] The buggy address belongs to the physical page:
[   21.347718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.348438] flags: 0x200000000000000(node=0|zone=2)
[   21.348803] page_type: f5(slab)
[   21.349207] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.349953] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.350786] page dumped because: kasan: bad access detected
[   21.351793] 
[   21.352041] Memory state around the buggy address:
[   21.352530]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.353148]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.353729] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.354286]                                               ^
[   21.354687]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.355611]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.356326] ==================================================================
[   21.262905] ==================================================================
[   21.263792] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.264601] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.265283] 
[   21.265712] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.265832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.265872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.265984] Call Trace:
[   21.266044]  <TASK>
[   21.266180]  dump_stack_lvl+0x73/0xb0
[   21.266304]  print_report+0xd1/0x650
[   21.266377]  ? __virt_addr_valid+0x1db/0x2d0
[   21.266455]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.266500]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.266686]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.266783]  kasan_report+0x141/0x180
[   21.266868]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.266968]  kasan_check_range+0x10c/0x1c0
[   21.267009]  __kasan_check_write+0x18/0x20
[   21.267038]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.267077]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.267166]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.267207]  ? trace_hardirqs_on+0x37/0xe0
[   21.267241]  ? kasan_bitops_generic+0x92/0x1c0
[   21.267280]  kasan_bitops_generic+0x116/0x1c0
[   21.267314]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.267350]  ? __pfx_read_tsc+0x10/0x10
[   21.267380]  ? ktime_get_ts64+0x86/0x230
[   21.267413]  kunit_try_run_case+0x1a5/0x480
[   21.267448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.267482]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.267515]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.267549]  ? __kthread_parkme+0x82/0x180
[   21.267577]  ? preempt_count_sub+0x50/0x80
[   21.267609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.267644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.267678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.267712]  kthread+0x337/0x6f0
[   21.267739]  ? trace_preempt_on+0x20/0xc0
[   21.267770]  ? __pfx_kthread+0x10/0x10
[   21.267799]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.267829]  ? calculate_sigpending+0x7b/0xa0
[   21.267863]  ? __pfx_kthread+0x10/0x10
[   21.267920]  ret_from_fork+0x116/0x1d0
[   21.267949]  ? __pfx_kthread+0x10/0x10
[   21.267978]  ret_from_fork_asm+0x1a/0x30
[   21.268019]  </TASK>
[   21.268035] 
[   21.285224] Allocated by task 279:
[   21.285638]  kasan_save_stack+0x45/0x70
[   21.286396]  kasan_save_track+0x18/0x40
[   21.287142]  kasan_save_alloc_info+0x3b/0x50
[   21.287894]  __kasan_kmalloc+0xb7/0xc0
[   21.288831]  __kmalloc_cache_noprof+0x189/0x420
[   21.289820]  kasan_bitops_generic+0x92/0x1c0
[   21.290401]  kunit_try_run_case+0x1a5/0x480
[   21.290947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.291526]  kthread+0x337/0x6f0
[   21.292001]  ret_from_fork+0x116/0x1d0
[   21.292526]  ret_from_fork_asm+0x1a/0x30
[   21.293142] 
[   21.293479] The buggy address belongs to the object at ffff888101e49ec0
[   21.293479]  which belongs to the cache kmalloc-16 of size 16
[   21.294598] The buggy address is located 8 bytes inside of
[   21.294598]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.295584] 
[   21.295932] The buggy address belongs to the physical page:
[   21.296580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.297334] flags: 0x200000000000000(node=0|zone=2)
[   21.297799] page_type: f5(slab)
[   21.298325] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.298955] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.299854] page dumped because: kasan: bad access detected
[   21.300810] 
[   21.300985] Memory state around the buggy address:
[   21.301495]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.302506]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.303038] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.304023]                                               ^
[   21.304380]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.305234]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.306131] ==================================================================
[   21.446015] ==================================================================
[   21.446731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.447542] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.448573] 
[   21.448790] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.448924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.448965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.449020] Call Trace:
[   21.449055]  <TASK>
[   21.449094]  dump_stack_lvl+0x73/0xb0
[   21.449237]  print_report+0xd1/0x650
[   21.449318]  ? __virt_addr_valid+0x1db/0x2d0
[   21.449391]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.449478]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.449619]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.449704]  kasan_report+0x141/0x180
[   21.449815]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.449959]  kasan_check_range+0x10c/0x1c0
[   21.450072]  __kasan_check_write+0x18/0x20
[   21.450192]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.450284]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.450369]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.450450]  ? trace_hardirqs_on+0x37/0xe0
[   21.450522]  ? kasan_bitops_generic+0x92/0x1c0
[   21.450607]  kasan_bitops_generic+0x116/0x1c0
[   21.450684]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.450761]  ? __pfx_read_tsc+0x10/0x10
[   21.450832]  ? ktime_get_ts64+0x86/0x230
[   21.450928]  kunit_try_run_case+0x1a5/0x480
[   21.451053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.451197]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.451275]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.451355]  ? __kthread_parkme+0x82/0x180
[   21.451426]  ? preempt_count_sub+0x50/0x80
[   21.451486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.451525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.451560]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.451595]  kthread+0x337/0x6f0
[   21.451622]  ? trace_preempt_on+0x20/0xc0
[   21.451654]  ? __pfx_kthread+0x10/0x10
[   21.451684]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.451714]  ? calculate_sigpending+0x7b/0xa0
[   21.451747]  ? __pfx_kthread+0x10/0x10
[   21.451778]  ret_from_fork+0x116/0x1d0
[   21.451802]  ? __pfx_kthread+0x10/0x10
[   21.451830]  ret_from_fork_asm+0x1a/0x30
[   21.451871]  </TASK>
[   21.451914] 
[   21.473618] Allocated by task 279:
[   21.474411]  kasan_save_stack+0x45/0x70
[   21.474752]  kasan_save_track+0x18/0x40
[   21.475088]  kasan_save_alloc_info+0x3b/0x50
[   21.475461]  __kasan_kmalloc+0xb7/0xc0
[   21.475772]  __kmalloc_cache_noprof+0x189/0x420
[   21.477248]  kasan_bitops_generic+0x92/0x1c0
[   21.477606]  kunit_try_run_case+0x1a5/0x480
[   21.478162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.478802]  kthread+0x337/0x6f0
[   21.479148]  ret_from_fork+0x116/0x1d0
[   21.479892]  ret_from_fork_asm+0x1a/0x30
[   21.480605] 
[   21.480972] The buggy address belongs to the object at ffff888101e49ec0
[   21.480972]  which belongs to the cache kmalloc-16 of size 16
[   21.482620] The buggy address is located 8 bytes inside of
[   21.482620]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.483520] 
[   21.483980] The buggy address belongs to the physical page:
[   21.484581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.485538] flags: 0x200000000000000(node=0|zone=2)
[   21.486122] page_type: f5(slab)
[   21.486818] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.487746] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.488932] page dumped because: kasan: bad access detected
[   21.489346] 
[   21.489579] Memory state around the buggy address:
[   21.490496]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.491025]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.491839] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.492764]                                               ^
[   21.493846]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.494700]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.495488] ==================================================================
[   21.358334] ==================================================================
[   21.359206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.360486] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.361258] 
[   21.361476] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.361593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.361632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.361682] Call Trace:
[   21.361699]  <TASK>
[   21.361718]  dump_stack_lvl+0x73/0xb0
[   21.361761]  print_report+0xd1/0x650
[   21.361798]  ? __virt_addr_valid+0x1db/0x2d0
[   21.361867]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.361963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.362041]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.362125]  kasan_report+0x141/0x180
[   21.362203]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.362305]  kasan_check_range+0x10c/0x1c0
[   21.362384]  __kasan_check_write+0x18/0x20
[   21.362452]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.362536]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.362619]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.362673]  ? trace_hardirqs_on+0x37/0xe0
[   21.362729]  ? kasan_bitops_generic+0x92/0x1c0
[   21.362772]  kasan_bitops_generic+0x116/0x1c0
[   21.362808]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.362845]  ? __pfx_read_tsc+0x10/0x10
[   21.362918]  ? ktime_get_ts64+0x86/0x230
[   21.362961]  kunit_try_run_case+0x1a5/0x480
[   21.362998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.363033]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.363067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.363126]  ? __kthread_parkme+0x82/0x180
[   21.363173]  ? preempt_count_sub+0x50/0x80
[   21.363205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.363241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.363276]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.363311]  kthread+0x337/0x6f0
[   21.363337]  ? trace_preempt_on+0x20/0xc0
[   21.363368]  ? __pfx_kthread+0x10/0x10
[   21.363395]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.363427]  ? calculate_sigpending+0x7b/0xa0
[   21.363460]  ? __pfx_kthread+0x10/0x10
[   21.363490]  ret_from_fork+0x116/0x1d0
[   21.363514]  ? __pfx_kthread+0x10/0x10
[   21.363543]  ret_from_fork_asm+0x1a/0x30
[   21.363583]  </TASK>
[   21.363599] 
[   21.384572] Allocated by task 279:
[   21.384720]  kasan_save_stack+0x45/0x70
[   21.384936]  kasan_save_track+0x18/0x40
[   21.385346]  kasan_save_alloc_info+0x3b/0x50
[   21.385821]  __kasan_kmalloc+0xb7/0xc0
[   21.386192]  __kmalloc_cache_noprof+0x189/0x420
[   21.386675]  kasan_bitops_generic+0x92/0x1c0
[   21.387197]  kunit_try_run_case+0x1a5/0x480
[   21.387564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.388149]  kthread+0x337/0x6f0
[   21.388495]  ret_from_fork+0x116/0x1d0
[   21.388953]  ret_from_fork_asm+0x1a/0x30
[   21.389279] 
[   21.389459] The buggy address belongs to the object at ffff888101e49ec0
[   21.389459]  which belongs to the cache kmalloc-16 of size 16
[   21.390504] The buggy address is located 8 bytes inside of
[   21.390504]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.391683] 
[   21.391921] The buggy address belongs to the physical page:
[   21.392599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.393215] flags: 0x200000000000000(node=0|zone=2)
[   21.394000] page_type: f5(slab)
[   21.394323] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.395034] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.395593] page dumped because: kasan: bad access detected
[   21.396003] 
[   21.396235] Memory state around the buggy address:
[   21.396811]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.397574]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.398370] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.398985]                                               ^
[   21.399452]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.399923]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.400693] ==================================================================
[   21.402033] ==================================================================
[   21.402615] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.403441] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.403941] 
[   21.404243] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.404362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.404399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.404456] Call Trace:
[   21.404498]  <TASK>
[   21.404536]  dump_stack_lvl+0x73/0xb0
[   21.404619]  print_report+0xd1/0x650
[   21.404694]  ? __virt_addr_valid+0x1db/0x2d0
[   21.404769]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.404849]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.405016]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.405098]  kasan_report+0x141/0x180
[   21.405199]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.405284]  kasan_check_range+0x10c/0x1c0
[   21.405680]  __kasan_check_write+0x18/0x20
[   21.405759]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.405849]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.405960]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.406038]  ? trace_hardirqs_on+0x37/0xe0
[   21.406116]  ? kasan_bitops_generic+0x92/0x1c0
[   21.406204]  kasan_bitops_generic+0x116/0x1c0
[   21.406297]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.406377]  ? __pfx_read_tsc+0x10/0x10
[   21.406452]  ? ktime_get_ts64+0x86/0x230
[   21.406529]  kunit_try_run_case+0x1a5/0x480
[   21.406609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.406684]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.406757]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.406834]  ? __kthread_parkme+0x82/0x180
[   21.406905]  ? preempt_count_sub+0x50/0x80
[   21.406943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.406980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.407015]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.407052]  kthread+0x337/0x6f0
[   21.407080]  ? trace_preempt_on+0x20/0xc0
[   21.407148]  ? __pfx_kthread+0x10/0x10
[   21.407183]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.407217]  ? calculate_sigpending+0x7b/0xa0
[   21.407252]  ? __pfx_kthread+0x10/0x10
[   21.407281]  ret_from_fork+0x116/0x1d0
[   21.407306]  ? __pfx_kthread+0x10/0x10
[   21.407335]  ret_from_fork_asm+0x1a/0x30
[   21.407376]  </TASK>
[   21.407390] 
[   21.428008] Allocated by task 279:
[   21.428439]  kasan_save_stack+0x45/0x70
[   21.428858]  kasan_save_track+0x18/0x40
[   21.429359]  kasan_save_alloc_info+0x3b/0x50
[   21.429867]  __kasan_kmalloc+0xb7/0xc0
[   21.430353]  __kmalloc_cache_noprof+0x189/0x420
[   21.430796]  kasan_bitops_generic+0x92/0x1c0
[   21.431336]  kunit_try_run_case+0x1a5/0x480
[   21.431800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.432290]  kthread+0x337/0x6f0
[   21.432725]  ret_from_fork+0x116/0x1d0
[   21.433244]  ret_from_fork_asm+0x1a/0x30
[   21.433576] 
[   21.433840] The buggy address belongs to the object at ffff888101e49ec0
[   21.433840]  which belongs to the cache kmalloc-16 of size 16
[   21.434956] The buggy address is located 8 bytes inside of
[   21.434956]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.435832] 
[   21.436088] The buggy address belongs to the physical page:
[   21.436606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.437418] flags: 0x200000000000000(node=0|zone=2)
[   21.437916] page_type: f5(slab)
[   21.438341] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.439040] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.439585] page dumped because: kasan: bad access detected
[   21.439976] 
[   21.440297] Memory state around the buggy address:
[   21.440824]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.441600]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.442351] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.442864]                                               ^
[   21.443456]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.444081]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.444726] ==================================================================
[   21.123152] ==================================================================
[   21.124128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.124820] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.125523] 
[   21.125812] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.125955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.126063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.126147] Call Trace:
[   21.126191]  <TASK>
[   21.126237]  dump_stack_lvl+0x73/0xb0
[   21.126344]  print_report+0xd1/0x650
[   21.126494]  ? __virt_addr_valid+0x1db/0x2d0
[   21.126579]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.126726]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.126809]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.126911]  kasan_report+0x141/0x180
[   21.126980]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.127029]  kasan_check_range+0x10c/0x1c0
[   21.127064]  __kasan_check_write+0x18/0x20
[   21.127092]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.127161]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.127206]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.127245]  ? trace_hardirqs_on+0x37/0xe0
[   21.127278]  ? kasan_bitops_generic+0x92/0x1c0
[   21.127318]  kasan_bitops_generic+0x116/0x1c0
[   21.127352]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.127389]  ? __pfx_read_tsc+0x10/0x10
[   21.127419]  ? ktime_get_ts64+0x86/0x230
[   21.127454]  kunit_try_run_case+0x1a5/0x480
[   21.127492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.127526]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.127562]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.127596]  ? __kthread_parkme+0x82/0x180
[   21.127625]  ? preempt_count_sub+0x50/0x80
[   21.127657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.127692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.127725]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.127761]  kthread+0x337/0x6f0
[   21.127788]  ? trace_preempt_on+0x20/0xc0
[   21.127818]  ? __pfx_kthread+0x10/0x10
[   21.127846]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.127901]  ? calculate_sigpending+0x7b/0xa0
[   21.127940]  ? __pfx_kthread+0x10/0x10
[   21.127971]  ret_from_fork+0x116/0x1d0
[   21.127998]  ? __pfx_kthread+0x10/0x10
[   21.128026]  ret_from_fork_asm+0x1a/0x30
[   21.128068]  </TASK>
[   21.128083] 
[   21.145511] Allocated by task 279:
[   21.145935]  kasan_save_stack+0x45/0x70
[   21.146409]  kasan_save_track+0x18/0x40
[   21.146903]  kasan_save_alloc_info+0x3b/0x50
[   21.147440]  __kasan_kmalloc+0xb7/0xc0
[   21.147907]  __kmalloc_cache_noprof+0x189/0x420
[   21.148472]  kasan_bitops_generic+0x92/0x1c0
[   21.148895]  kunit_try_run_case+0x1a5/0x480
[   21.149238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.149629]  kthread+0x337/0x6f0
[   21.150022]  ret_from_fork+0x116/0x1d0
[   21.150510]  ret_from_fork_asm+0x1a/0x30
[   21.150976] 
[   21.151218] The buggy address belongs to the object at ffff888101e49ec0
[   21.151218]  which belongs to the cache kmalloc-16 of size 16
[   21.152271] The buggy address is located 8 bytes inside of
[   21.152271]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.153572] 
[   21.153763] The buggy address belongs to the physical page:
[   21.154374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.155220] flags: 0x200000000000000(node=0|zone=2)
[   21.155647] page_type: f5(slab)
[   21.157260] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.157751] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.158233] page dumped because: kasan: bad access detected
[   21.158612] 
[   21.158951] Memory state around the buggy address:
[   21.159756]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.161003]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.161811] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.162624]                                               ^
[   21.163058]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.163562]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.164610] ==================================================================

[   22.819967] ==================================================================
[   22.820621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   22.821364] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.822027] 
[   22.822176] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.822209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.822219] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.822230] Call trace:
[   22.822237]  show_stack+0x20/0x38 (C)
[   22.822258]  dump_stack_lvl+0x8c/0xd0
[   22.822279]  print_report+0x118/0x608
[   22.822301]  kasan_report+0xdc/0x128
[   22.822322]  __asan_report_load8_noabort+0x20/0x30
[   22.822347]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   22.822370]  kasan_bitops_generic+0x110/0x1c8
[   22.822392]  kunit_try_run_case+0x170/0x3f0
[   22.822413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.822438]  kthread+0x328/0x630
[   22.822454]  ret_from_fork+0x10/0x20
[   22.822475] 
[   22.828485] Allocated by task 314:
[   22.828801]  kasan_save_stack+0x3c/0x68
[   22.829163]  kasan_save_track+0x20/0x40
[   22.829524]  kasan_save_alloc_info+0x40/0x58
[   22.829925]  __kasan_kmalloc+0xd4/0xd8
[   22.830280]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.830701]  kasan_bitops_generic+0xa0/0x1c8
[   22.831100]  kunit_try_run_case+0x170/0x3f0
[   22.831493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.832001]  kthread+0x328/0x630
[   22.832305]  ret_from_fork+0x10/0x20
[   22.832642] 
[   22.832789] The buggy address belongs to the object at ffff00000223e620
[   22.832789]  which belongs to the cache kmalloc-16 of size 16
[   22.833890] The buggy address is located 8 bytes inside of
[   22.833890]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.834986] 
[   22.835133] The buggy address belongs to the physical page:
[   22.835637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.836345] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.836939] page_type: f5(slab)
[   22.837237] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.837937] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.838633] page dumped because: kasan: bad access detected
[   22.839137] 
[   22.839282] Memory state around the buggy address:
[   22.839721]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.840373]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.841026] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.841675]                                   ^
[   22.842091]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.842743]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.843393] ==================================================================
[   22.770764] ==================================================================
[   22.771420] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   22.772162] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.772833] 
[   22.772983] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.773016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.773026] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.773037] Call trace:
[   22.773045]  show_stack+0x20/0x38 (C)
[   22.773066]  dump_stack_lvl+0x8c/0xd0
[   22.773088]  print_report+0x118/0x608
[   22.773110]  kasan_report+0xdc/0x128
[   22.773132]  kasan_check_range+0x100/0x1a8
[   22.773155]  __kasan_check_write+0x20/0x30
[   22.773174]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   22.773197]  kasan_bitops_generic+0x110/0x1c8
[   22.773217]  kunit_try_run_case+0x170/0x3f0
[   22.773239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.773264]  kthread+0x328/0x630
[   22.773280]  ret_from_fork+0x10/0x20
[   22.773301] 
[   22.779615] Allocated by task 314:
[   22.779931]  kasan_save_stack+0x3c/0x68
[   22.780293]  kasan_save_track+0x20/0x40
[   22.780655]  kasan_save_alloc_info+0x40/0x58
[   22.781057]  __kasan_kmalloc+0xd4/0xd8
[   22.781411]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.781832]  kasan_bitops_generic+0xa0/0x1c8
[   22.782232]  kunit_try_run_case+0x170/0x3f0
[   22.782624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.783132]  kthread+0x328/0x630
[   22.783436]  ret_from_fork+0x10/0x20
[   22.783774] 
[   22.783919] The buggy address belongs to the object at ffff00000223e620
[   22.783919]  which belongs to the cache kmalloc-16 of size 16
[   22.785020] The buggy address is located 8 bytes inside of
[   22.785020]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.786116] 
[   22.786262] The buggy address belongs to the physical page:
[   22.786766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.787475] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.788068] page_type: f5(slab)
[   22.788366] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.789066] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.789763] page dumped because: kasan: bad access detected
[   22.790266] 
[   22.790413] Memory state around the buggy address:
[   22.790851]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.791504]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.792157] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.792807]                                   ^
[   22.793223]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.793875]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.794525] ==================================================================
[   22.746277] ==================================================================
[   22.746954] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   22.747710] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.748376] 
[   22.748532] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.748571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.748581] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.748595] Call trace:
[   22.748604]  show_stack+0x20/0x38 (C)
[   22.748631]  dump_stack_lvl+0x8c/0xd0
[   22.748656]  print_report+0x118/0x608
[   22.748679]  kasan_report+0xdc/0x128
[   22.748701]  __asan_report_load8_noabort+0x20/0x30
[   22.748726]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   22.748749]  kasan_bitops_generic+0x110/0x1c8
[   22.748771]  kunit_try_run_case+0x170/0x3f0
[   22.748794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.748819]  kthread+0x328/0x630
[   22.748837]  ret_from_fork+0x10/0x20
[   22.748858] 
[   22.754869] Allocated by task 314:
[   22.755187]  kasan_save_stack+0x3c/0x68
[   22.755553]  kasan_save_track+0x20/0x40
[   22.755915]  kasan_save_alloc_info+0x40/0x58
[   22.756316]  __kasan_kmalloc+0xd4/0xd8
[   22.756672]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.757095]  kasan_bitops_generic+0xa0/0x1c8
[   22.757493]  kunit_try_run_case+0x170/0x3f0
[   22.757884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.758392]  kthread+0x328/0x630
[   22.758696]  ret_from_fork+0x10/0x20
[   22.759034] 
[   22.759181] The buggy address belongs to the object at ffff00000223e620
[   22.759181]  which belongs to the cache kmalloc-16 of size 16
[   22.760282] The buggy address is located 8 bytes inside of
[   22.760282]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.761380] 
[   22.761526] The buggy address belongs to the physical page:
[   22.762031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.762741] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.763338] page_type: f5(slab)
[   22.763638] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.764339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.765034] page dumped because: kasan: bad access detected
[   22.765539] 
[   22.765685] Memory state around the buggy address:
[   22.766123]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.766777]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.767429] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.768079]                                   ^
[   22.768495]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.769148]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.769798] ==================================================================
[   22.893201] ==================================================================
[   22.893855] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   22.894597] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.895259] 
[   22.895408] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.895440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.895450] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.895461] Call trace:
[   22.895468]  show_stack+0x20/0x38 (C)
[   22.895488]  dump_stack_lvl+0x8c/0xd0
[   22.895510]  print_report+0x118/0x608
[   22.895531]  kasan_report+0xdc/0x128
[   22.895553]  __asan_report_load8_noabort+0x20/0x30
[   22.895578]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   22.895601]  kasan_bitops_generic+0x110/0x1c8
[   22.895622]  kunit_try_run_case+0x170/0x3f0
[   22.895643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.895667]  kthread+0x328/0x630
[   22.895683]  ret_from_fork+0x10/0x20
[   22.895704] 
[   22.901714] Allocated by task 314:
[   22.902029]  kasan_save_stack+0x3c/0x68
[   22.902390]  kasan_save_track+0x20/0x40
[   22.902753]  kasan_save_alloc_info+0x40/0x58
[   22.903155]  __kasan_kmalloc+0xd4/0xd8
[   22.903509]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.903931]  kasan_bitops_generic+0xa0/0x1c8
[   22.904329]  kunit_try_run_case+0x170/0x3f0
[   22.904721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.905228]  kthread+0x328/0x630
[   22.905531]  ret_from_fork+0x10/0x20
[   22.905868] 
[   22.906014] The buggy address belongs to the object at ffff00000223e620
[   22.906014]  which belongs to the cache kmalloc-16 of size 16
[   22.907115] The buggy address is located 8 bytes inside of
[   22.907115]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.908209] 
[   22.908355] The buggy address belongs to the physical page:
[   22.908860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.909568] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.910160] page_type: f5(slab)
[   22.910459] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.911158] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.911855] page dumped because: kasan: bad access detected
[   22.912359] 
[   22.912504] Memory state around the buggy address:
[   22.912943]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.913594]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.914247] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.914896]                                   ^
[   22.915312]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.915965]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.916615] ==================================================================
[   22.671062] ==================================================================
[   22.672107] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   22.672876] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.673561] 
[   22.673724] CPU: 3 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.673774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.673789] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.673807] Call trace:
[   22.673819]  show_stack+0x20/0x38 (C)
[   22.673852]  dump_stack_lvl+0x8c/0xd0
[   22.673888]  print_report+0x118/0x608
[   22.673922]  kasan_report+0xdc/0x128
[   22.673953]  kasan_check_range+0x100/0x1a8
[   22.673988]  __kasan_check_write+0x20/0x30
[   22.674017]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   22.674052]  kasan_bitops_generic+0x110/0x1c8
[   22.674085]  kunit_try_run_case+0x170/0x3f0
[   22.674119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.674157]  kthread+0x328/0x630
[   22.674184]  ret_from_fork+0x10/0x20
[   22.674217] 
[   22.680582] Allocated by task 314:
[   22.680907]  kasan_save_stack+0x3c/0x68
[   22.681284]  kasan_save_track+0x20/0x40
[   22.681660]  kasan_save_alloc_info+0x40/0x58
[   22.682076]  __kasan_kmalloc+0xd4/0xd8
[   22.682444]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.682882]  kasan_bitops_generic+0xa0/0x1c8
[   22.683297]  kunit_try_run_case+0x170/0x3f0
[   22.683704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.684228]  kthread+0x328/0x630
[   22.684545]  ret_from_fork+0x10/0x20
[   22.684895] 
[   22.685049] The buggy address belongs to the object at ffff00000223e620
[   22.685049]  which belongs to the cache kmalloc-16 of size 16
[   22.686166] The buggy address is located 8 bytes inside of
[   22.686166]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.687279] 
[   22.687434] The buggy address belongs to the physical page:
[   22.687949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.688675] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.689287] page_type: f5(slab)
[   22.689598] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.690314] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.691022] page dumped because: kasan: bad access detected
[   22.691537] 
[   22.691690] Memory state around the buggy address:
[   22.692140]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.692807]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.693474] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.694136]                                   ^
[   22.694563]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.695229]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.695892] ==================================================================
[   22.844170] ==================================================================
[   22.844824] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   22.845566] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.846236] 
[   22.846386] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.846418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.846428] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.846439] Call trace:
[   22.846446]  show_stack+0x20/0x38 (C)
[   22.846466]  dump_stack_lvl+0x8c/0xd0
[   22.846488]  print_report+0x118/0x608
[   22.846510]  kasan_report+0xdc/0x128
[   22.846532]  kasan_check_range+0x100/0x1a8
[   22.846554]  __kasan_check_write+0x20/0x30
[   22.846573]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   22.846595]  kasan_bitops_generic+0x110/0x1c8
[   22.846616]  kunit_try_run_case+0x170/0x3f0
[   22.846638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.846662]  kthread+0x328/0x630
[   22.846678]  ret_from_fork+0x10/0x20
[   22.846699] 
[   22.853008] Allocated by task 314:
[   22.853322]  kasan_save_stack+0x3c/0x68
[   22.853684]  kasan_save_track+0x20/0x40
[   22.854045]  kasan_save_alloc_info+0x40/0x58
[   22.854447]  __kasan_kmalloc+0xd4/0xd8
[   22.854801]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.855223]  kasan_bitops_generic+0xa0/0x1c8
[   22.855623]  kunit_try_run_case+0x170/0x3f0
[   22.856014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.856521]  kthread+0x328/0x630
[   22.856826]  ret_from_fork+0x10/0x20
[   22.857163] 
[   22.857309] The buggy address belongs to the object at ffff00000223e620
[   22.857309]  which belongs to the cache kmalloc-16 of size 16
[   22.858411] The buggy address is located 8 bytes inside of
[   22.858411]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.859505] 
[   22.859651] The buggy address belongs to the physical page:
[   22.860155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.860862] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.861456] page_type: f5(slab)
[   22.861752] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.862453] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.863148] page dumped because: kasan: bad access detected
[   22.863652] 
[   22.863798] Memory state around the buggy address:
[   22.864236]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.864888]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.865540] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.866190]                                   ^
[   22.866605]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.867259]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.867908] ==================================================================
[   22.868677] ==================================================================
[   22.869331] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   22.870071] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.870740] 
[   22.870889] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.870921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.870930] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.870941] Call trace:
[   22.870949]  show_stack+0x20/0x38 (C)
[   22.870969]  dump_stack_lvl+0x8c/0xd0
[   22.870990]  print_report+0x118/0x608
[   22.871012]  kasan_report+0xdc/0x128
[   22.871033]  kasan_check_range+0x100/0x1a8
[   22.871057]  __kasan_check_write+0x20/0x30
[   22.871075]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   22.871098]  kasan_bitops_generic+0x110/0x1c8
[   22.871119]  kunit_try_run_case+0x170/0x3f0
[   22.871140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.871164]  kthread+0x328/0x630
[   22.871180]  ret_from_fork+0x10/0x20
[   22.871201] 
[   22.877511] Allocated by task 314:
[   22.877824]  kasan_save_stack+0x3c/0x68
[   22.878186]  kasan_save_track+0x20/0x40
[   22.878547]  kasan_save_alloc_info+0x40/0x58
[   22.878950]  __kasan_kmalloc+0xd4/0xd8
[   22.879303]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.879726]  kasan_bitops_generic+0xa0/0x1c8
[   22.880126]  kunit_try_run_case+0x170/0x3f0
[   22.880517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.881025]  kthread+0x328/0x630
[   22.881329]  ret_from_fork+0x10/0x20
[   22.881666] 
[   22.881812] The buggy address belongs to the object at ffff00000223e620
[   22.881812]  which belongs to the cache kmalloc-16 of size 16
[   22.882913] The buggy address is located 8 bytes inside of
[   22.882913]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.884008] 
[   22.884154] The buggy address belongs to the physical page:
[   22.884659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.885367] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.885960] page_type: f5(slab)
[   22.886258] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.886958] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.887654] page dumped because: kasan: bad access detected
[   22.888158] 
[   22.888305] Memory state around the buggy address:
[   22.888742]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.889395]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.890047] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.890697]                                   ^
[   22.891112]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.891764]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.892414] ==================================================================
[   22.696794] ==================================================================
[   22.697466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   22.698232] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.698898] 
[   22.699053] CPU: 3 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.699089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.699101] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.699114] Call trace:
[   22.699123]  show_stack+0x20/0x38 (C)
[   22.699147]  dump_stack_lvl+0x8c/0xd0
[   22.699173]  print_report+0x118/0x608
[   22.699198]  kasan_report+0xdc/0x128
[   22.699221]  __asan_report_load8_noabort+0x20/0x30
[   22.699248]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   22.699272]  kasan_bitops_generic+0x110/0x1c8
[   22.699296]  kunit_try_run_case+0x170/0x3f0
[   22.699321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.699348]  kthread+0x328/0x630
[   22.699368]  ret_from_fork+0x10/0x20
[   22.699391] 
[   22.705411] Allocated by task 314:
[   22.705729]  kasan_save_stack+0x3c/0x68
[   22.706093]  kasan_save_track+0x20/0x40
[   22.706456]  kasan_save_alloc_info+0x40/0x58
[   22.706861]  __kasan_kmalloc+0xd4/0xd8
[   22.707217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.707643]  kasan_bitops_generic+0xa0/0x1c8
[   22.708045]  kunit_try_run_case+0x170/0x3f0
[   22.708439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.708949]  kthread+0x328/0x630
[   22.709257]  ret_from_fork+0x10/0x20
[   22.709596] 
[   22.709744] The buggy address belongs to the object at ffff00000223e620
[   22.709744]  which belongs to the cache kmalloc-16 of size 16
[   22.710848] The buggy address is located 8 bytes inside of
[   22.710848]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.711946] 
[   22.712094] The buggy address belongs to the physical page:
[   22.712602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.713313] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.713913] page_type: f5(slab)
[   22.714216] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.714919] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.715617] page dumped because: kasan: bad access detected
[   22.716123] 
[   22.716269] Memory state around the buggy address:
[   22.716710]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.717367]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.718023] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.718675]                                   ^
[   22.719093]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.719747]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.720400] ==================================================================
[   22.721177] ==================================================================
[   22.721839] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   22.722586] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.723259] 
[   22.723413] CPU: 3 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.723449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.723460] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.723474] Call trace:
[   22.723482]  show_stack+0x20/0x38 (C)
[   22.723507]  dump_stack_lvl+0x8c/0xd0
[   22.723533]  print_report+0x118/0x608
[   22.723557]  kasan_report+0xdc/0x128
[   22.723579]  kasan_check_range+0x100/0x1a8
[   22.723605]  __kasan_check_write+0x20/0x30
[   22.723625]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   22.723650]  kasan_bitops_generic+0x110/0x1c8
[   22.723673]  kunit_try_run_case+0x170/0x3f0
[   22.723698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.723725]  kthread+0x328/0x630
[   22.723744]  ret_from_fork+0x10/0x20
[   22.723767] 
[   22.730086] Allocated by task 314:
[   22.730406]  kasan_save_stack+0x3c/0x68
[   22.730772]  kasan_save_track+0x20/0x40
[   22.731136]  kasan_save_alloc_info+0x40/0x58
[   22.731539]  __kasan_kmalloc+0xd4/0xd8
[   22.731896]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.732320]  kasan_bitops_generic+0xa0/0x1c8
[   22.732723]  kunit_try_run_case+0x170/0x3f0
[   22.733117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.733627]  kthread+0x328/0x630
[   22.733934]  ret_from_fork+0x10/0x20
[   22.734273] 
[   22.734421] The buggy address belongs to the object at ffff00000223e620
[   22.734421]  which belongs to the cache kmalloc-16 of size 16
[   22.735525] The buggy address is located 8 bytes inside of
[   22.735525]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.736623] 
[   22.736771] The buggy address belongs to the physical page:
[   22.737277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.737988] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.738586] page_type: f5(slab)
[   22.738887] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.739590] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.740287] page dumped because: kasan: bad access detected
[   22.740793] 
[   22.740940] Memory state around the buggy address:
[   22.741379]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.742035]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.742690] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.743341]                                   ^
[   22.743758]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.744413]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.745066] ==================================================================
[   22.795394] ==================================================================
[   22.796048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   22.796790] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.797459] 
[   22.797609] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.797641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.797651] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.797663] Call trace:
[   22.797670]  show_stack+0x20/0x38 (C)
[   22.797691]  dump_stack_lvl+0x8c/0xd0
[   22.797713]  print_report+0x118/0x608
[   22.797735]  kasan_report+0xdc/0x128
[   22.797756]  kasan_check_range+0x100/0x1a8
[   22.797779]  __kasan_check_write+0x20/0x30
[   22.797797]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   22.797821]  kasan_bitops_generic+0x110/0x1c8
[   22.797842]  kunit_try_run_case+0x170/0x3f0
[   22.797863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.797889]  kthread+0x328/0x630
[   22.797905]  ret_from_fork+0x10/0x20
[   22.797925] 
[   22.804236] Allocated by task 314:
[   22.804551]  kasan_save_stack+0x3c/0x68
[   22.804913]  kasan_save_track+0x20/0x40
[   22.805275]  kasan_save_alloc_info+0x40/0x58
[   22.805676]  __kasan_kmalloc+0xd4/0xd8
[   22.806029]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.806451]  kasan_bitops_generic+0xa0/0x1c8
[   22.806851]  kunit_try_run_case+0x170/0x3f0
[   22.807243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.807750]  kthread+0x328/0x630
[   22.808055]  ret_from_fork+0x10/0x20
[   22.808393] 
[   22.808540] The buggy address belongs to the object at ffff00000223e620
[   22.808540]  which belongs to the cache kmalloc-16 of size 16
[   22.809641] The buggy address is located 8 bytes inside of
[   22.809641]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.810737] 
[   22.810883] The buggy address belongs to the physical page:
[   22.811386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.812094] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.812687] page_type: f5(slab)
[   22.812985] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.813686] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.814380] page dumped because: kasan: bad access detected
[   22.814885] 
[   22.815031] Memory state around the buggy address:
[   22.815467]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.816121]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.816773] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.817423]                                   ^
[   22.817839]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.818492]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.819141] ==================================================================