Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   44.554430] ==================================================================
[   44.561467] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.570406] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   44.577785] 
[   44.579265] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   44.579312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.579328] Hardware name: WinLink E850-96 board (DT)
[   44.579344] Call trace:
[   44.579358]  show_stack+0x20/0x38 (C)
[   44.579393]  dump_stack_lvl+0x8c/0xd0
[   44.579427]  print_report+0x118/0x608
[   44.579461]  kasan_report+0xdc/0x128
[   44.579494]  kasan_check_range+0x100/0x1a8
[   44.579529]  __kasan_check_write+0x20/0x30
[   44.579558]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   44.579594]  kasan_bitops_generic+0x11c/0x1c8
[   44.579628]  kunit_try_run_case+0x170/0x3f0
[   44.579661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.579698]  kthread+0x328/0x630
[   44.579725]  ret_from_fork+0x10/0x20
[   44.579758] 
[   44.651741] Allocated by task 308:
[   44.655127]  kasan_save_stack+0x3c/0x68
[   44.658946]  kasan_save_track+0x20/0x40
[   44.662766]  kasan_save_alloc_info+0x40/0x58
[   44.667019]  __kasan_kmalloc+0xd4/0xd8
[   44.670752]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.675265]  kasan_bitops_generic+0xa0/0x1c8
[   44.679519]  kunit_try_run_case+0x170/0x3f0
[   44.683686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.689154]  kthread+0x328/0x630
[   44.692366]  ret_from_fork+0x10/0x20
[   44.695925] 
[   44.697400] The buggy address belongs to the object at ffff000800d63060
[   44.697400]  which belongs to the cache kmalloc-16 of size 16
[   44.709727] The buggy address is located 8 bytes inside of
[   44.709727]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   44.721966] 
[   44.723442] The buggy address belongs to the physical page:
[   44.728998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   44.736983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.743494] page_type: f5(slab)
[   44.746627] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.754351] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.762070] page dumped because: kasan: bad access detected
[   44.767625] 
[   44.769101] Memory state around the buggy address:
[   44.773879]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.781084]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.788289] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   44.795489]                                                           ^
[   44.802090]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.809296]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.816496] ==================================================================
[   45.625215] ==================================================================
[   45.632284] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.641224] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   45.648602] 
[   45.650082] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   45.650127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.650143] Hardware name: WinLink E850-96 board (DT)
[   45.650160] Call trace:
[   45.650176]  show_stack+0x20/0x38 (C)
[   45.650206]  dump_stack_lvl+0x8c/0xd0
[   45.650239]  print_report+0x118/0x608
[   45.650273]  kasan_report+0xdc/0x128
[   45.650303]  kasan_check_range+0x100/0x1a8
[   45.650339]  __kasan_check_write+0x20/0x30
[   45.650369]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   45.650407]  kasan_bitops_generic+0x11c/0x1c8
[   45.650440]  kunit_try_run_case+0x170/0x3f0
[   45.650472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.650509]  kthread+0x328/0x630
[   45.650537]  ret_from_fork+0x10/0x20
[   45.650566] 
[   45.722559] Allocated by task 308:
[   45.725944]  kasan_save_stack+0x3c/0x68
[   45.729764]  kasan_save_track+0x20/0x40
[   45.733583]  kasan_save_alloc_info+0x40/0x58
[   45.737836]  __kasan_kmalloc+0xd4/0xd8
[   45.741569]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.746083]  kasan_bitops_generic+0xa0/0x1c8
[   45.750336]  kunit_try_run_case+0x170/0x3f0
[   45.754503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.759971]  kthread+0x328/0x630
[   45.763183]  ret_from_fork+0x10/0x20
[   45.766742] 
[   45.768218] The buggy address belongs to the object at ffff000800d63060
[   45.768218]  which belongs to the cache kmalloc-16 of size 16
[   45.780545] The buggy address is located 8 bytes inside of
[   45.780545]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   45.792784] 
[   45.794260] The buggy address belongs to the physical page:
[   45.799815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   45.807802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.814311] page_type: f5(slab)
[   45.817444] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.825169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.832887] page dumped because: kasan: bad access detected
[   45.838442] 
[   45.839918] Memory state around the buggy address:
[   45.844697]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.851901]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.859106] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.866307]                                                           ^
[   45.872908]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.880112]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.887313] ==================================================================
[   46.160653] ==================================================================
[   46.167694] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.176632] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   46.183924] 
[   46.185405] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   46.185450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.185466] Hardware name: WinLink E850-96 board (DT)
[   46.185485] Call trace:
[   46.185498]  show_stack+0x20/0x38 (C)
[   46.185533]  dump_stack_lvl+0x8c/0xd0
[   46.185565]  print_report+0x118/0x608
[   46.185599]  kasan_report+0xdc/0x128
[   46.185631]  __asan_report_load8_noabort+0x20/0x30
[   46.185669]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   46.185707]  kasan_bitops_generic+0x11c/0x1c8
[   46.185741]  kunit_try_run_case+0x170/0x3f0
[   46.185777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.185816]  kthread+0x328/0x630
[   46.185841]  ret_from_fork+0x10/0x20
[   46.185872] 
[   46.254495] Allocated by task 308:
[   46.257881]  kasan_save_stack+0x3c/0x68
[   46.261700]  kasan_save_track+0x20/0x40
[   46.265519]  kasan_save_alloc_info+0x40/0x58
[   46.269773]  __kasan_kmalloc+0xd4/0xd8
[   46.273505]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.278019]  kasan_bitops_generic+0xa0/0x1c8
[   46.282273]  kunit_try_run_case+0x170/0x3f0
[   46.286439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.291908]  kthread+0x328/0x630
[   46.295120]  ret_from_fork+0x10/0x20
[   46.298678] 
[   46.300154] The buggy address belongs to the object at ffff000800d63060
[   46.300154]  which belongs to the cache kmalloc-16 of size 16
[   46.312481] The buggy address is located 8 bytes inside of
[   46.312481]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   46.324720] 
[   46.326196] The buggy address belongs to the physical page:
[   46.331752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   46.339739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.346247] page_type: f5(slab)
[   46.349381] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.357105] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.364823] page dumped because: kasan: bad access detected
[   46.370379] 
[   46.371854] Memory state around the buggy address:
[   46.376633]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.383838]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.391042] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   46.398243]                                                           ^
[   46.404844]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.412049]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.419250] ==================================================================
[   45.089838] ==================================================================
[   45.096875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.105815] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   45.113193] 
[   45.114674] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   45.114720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.114738] Hardware name: WinLink E850-96 board (DT)
[   45.114756] Call trace:
[   45.114769]  show_stack+0x20/0x38 (C)
[   45.114803]  dump_stack_lvl+0x8c/0xd0
[   45.114839]  print_report+0x118/0x608
[   45.114873]  kasan_report+0xdc/0x128
[   45.114906]  kasan_check_range+0x100/0x1a8
[   45.114941]  __kasan_check_write+0x20/0x30
[   45.114971]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   45.115009]  kasan_bitops_generic+0x11c/0x1c8
[   45.115041]  kunit_try_run_case+0x170/0x3f0
[   45.115076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.115114]  kthread+0x328/0x630
[   45.115141]  ret_from_fork+0x10/0x20
[   45.115171] 
[   45.187150] Allocated by task 308:
[   45.190536]  kasan_save_stack+0x3c/0x68
[   45.194355]  kasan_save_track+0x20/0x40
[   45.198174]  kasan_save_alloc_info+0x40/0x58
[   45.202428]  __kasan_kmalloc+0xd4/0xd8
[   45.206160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.210674]  kasan_bitops_generic+0xa0/0x1c8
[   45.214928]  kunit_try_run_case+0x170/0x3f0
[   45.219094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.224563]  kthread+0x328/0x630
[   45.227774]  ret_from_fork+0x10/0x20
[   45.231334] 
[   45.232809] The buggy address belongs to the object at ffff000800d63060
[   45.232809]  which belongs to the cache kmalloc-16 of size 16
[   45.245137] The buggy address is located 8 bytes inside of
[   45.245137]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   45.257375] 
[   45.258851] The buggy address belongs to the physical page:
[   45.264407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   45.272392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.278902] page_type: f5(slab)
[   45.282036] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.289760] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.297478] page dumped because: kasan: bad access detected
[   45.303034] 
[   45.304509] Memory state around the buggy address:
[   45.309288]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.316492]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.323697] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.330898]                                                           ^
[   45.337499]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.344704]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.351905] ==================================================================
[   45.359255] ==================================================================
[   45.366315] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.375255] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   45.382547] 
[   45.384028] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   45.384074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.384092] Hardware name: WinLink E850-96 board (DT)
[   45.384109] Call trace:
[   45.384123]  show_stack+0x20/0x38 (C)
[   45.384155]  dump_stack_lvl+0x8c/0xd0
[   45.384190]  print_report+0x118/0x608
[   45.384223]  kasan_report+0xdc/0x128
[   45.384255]  __asan_report_load8_noabort+0x20/0x30
[   45.384293]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   45.384331]  kasan_bitops_generic+0x11c/0x1c8
[   45.384364]  kunit_try_run_case+0x170/0x3f0
[   45.384398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.384436]  kthread+0x328/0x630
[   45.384464]  ret_from_fork+0x10/0x20
[   45.384494] 
[   45.453118] Allocated by task 308:
[   45.456504]  kasan_save_stack+0x3c/0x68
[   45.460323]  kasan_save_track+0x20/0x40
[   45.464143]  kasan_save_alloc_info+0x40/0x58
[   45.468396]  __kasan_kmalloc+0xd4/0xd8
[   45.472128]  __kmalloc_cache_noprof+0x16c/0x3c0
[   45.476642]  kasan_bitops_generic+0xa0/0x1c8
[   45.480896]  kunit_try_run_case+0x170/0x3f0
[   45.485063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.490531]  kthread+0x328/0x630
[   45.493743]  ret_from_fork+0x10/0x20
[   45.497302] 
[   45.498777] The buggy address belongs to the object at ffff000800d63060
[   45.498777]  which belongs to the cache kmalloc-16 of size 16
[   45.511104] The buggy address is located 8 bytes inside of
[   45.511104]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   45.523343] 
[   45.524819] The buggy address belongs to the physical page:
[   45.530375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   45.538360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.544870] page_type: f5(slab)
[   45.548004] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.555728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.563446] page dumped because: kasan: bad access detected
[   45.569002] 
[   45.570477] Memory state around the buggy address:
[   45.575256]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.582461]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.589665] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.596866]                                                           ^
[   45.603467]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.610672]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.617873] ==================================================================
[   45.894629] ==================================================================
[   45.901724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   45.910664] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   45.917955] 
[   45.919435] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   45.919483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.919501] Hardware name: WinLink E850-96 board (DT)
[   45.919520] Call trace:
[   45.919532]  show_stack+0x20/0x38 (C)
[   45.919567]  dump_stack_lvl+0x8c/0xd0
[   45.919599]  print_report+0x118/0x608
[   45.919631]  kasan_report+0xdc/0x128
[   45.919664]  __asan_report_load8_noabort+0x20/0x30
[   45.919700]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   45.919738]  kasan_bitops_generic+0x11c/0x1c8
[   45.919771]  kunit_try_run_case+0x170/0x3f0
[   45.919804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.919842]  kthread+0x328/0x630
[   45.919867]  ret_from_fork+0x10/0x20
[   45.919899] 
[   45.988527] Allocated by task 308:
[   45.991912]  kasan_save_stack+0x3c/0x68
[   45.995732]  kasan_save_track+0x20/0x40
[   45.999551]  kasan_save_alloc_info+0x40/0x58
[   46.003804]  __kasan_kmalloc+0xd4/0xd8
[   46.007537]  __kmalloc_cache_noprof+0x16c/0x3c0
[   46.012051]  kasan_bitops_generic+0xa0/0x1c8
[   46.016305]  kunit_try_run_case+0x170/0x3f0
[   46.020471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.025940]  kthread+0x328/0x630
[   46.029151]  ret_from_fork+0x10/0x20
[   46.032710] 
[   46.034186] The buggy address belongs to the object at ffff000800d63060
[   46.034186]  which belongs to the cache kmalloc-16 of size 16
[   46.046513] The buggy address is located 8 bytes inside of
[   46.046513]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   46.058752] 
[   46.060228] The buggy address belongs to the physical page:
[   46.065784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   46.073769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.080279] page_type: f5(slab)
[   46.083412] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   46.091137] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.098855] page dumped because: kasan: bad access detected
[   46.104411] 
[   46.105886] Memory state around the buggy address:
[   46.110665]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.117870]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.125074] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   46.132275]                                                           ^
[   46.138876]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.146081]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.153282] ==================================================================
[   44.823844] ==================================================================
[   44.830909] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.839847] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   44.847138] 
[   44.848619] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   44.848664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.848680] Hardware name: WinLink E850-96 board (DT)
[   44.848699] Call trace:
[   44.848711]  show_stack+0x20/0x38 (C)
[   44.848746]  dump_stack_lvl+0x8c/0xd0
[   44.848781]  print_report+0x118/0x608
[   44.848813]  kasan_report+0xdc/0x128
[   44.848847]  __asan_report_load8_noabort+0x20/0x30
[   44.848885]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   44.848923]  kasan_bitops_generic+0x11c/0x1c8
[   44.848955]  kunit_try_run_case+0x170/0x3f0
[   44.848991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.849029]  kthread+0x328/0x630
[   44.849056]  ret_from_fork+0x10/0x20
[   44.849087] 
[   44.917710] Allocated by task 308:
[   44.921095]  kasan_save_stack+0x3c/0x68
[   44.924915]  kasan_save_track+0x20/0x40
[   44.928734]  kasan_save_alloc_info+0x40/0x58
[   44.932987]  __kasan_kmalloc+0xd4/0xd8
[   44.936720]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.941234]  kasan_bitops_generic+0xa0/0x1c8
[   44.945487]  kunit_try_run_case+0x170/0x3f0
[   44.949654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.955122]  kthread+0x328/0x630
[   44.958334]  ret_from_fork+0x10/0x20
[   44.961893] 
[   44.963369] The buggy address belongs to the object at ffff000800d63060
[   44.963369]  which belongs to the cache kmalloc-16 of size 16
[   44.975696] The buggy address is located 8 bytes inside of
[   44.975696]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   44.987935] 
[   44.989410] The buggy address belongs to the physical page:
[   44.994966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   45.002952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   45.009462] page_type: f5(slab)
[   45.012595] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   45.020320] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.028038] page dumped because: kasan: bad access detected
[   45.033593] 
[   45.035069] Memory state around the buggy address:
[   45.039847]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.047052]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.054257] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.061457]                                                           ^
[   45.068058]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.075263]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.082465] ==================================================================
[   44.288411] ==================================================================
[   44.295498] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.304438] Read of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   44.311730] 
[   44.313210] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   44.313255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.313276] Hardware name: WinLink E850-96 board (DT)
[   44.313293] Call trace:
[   44.313307]  show_stack+0x20/0x38 (C)
[   44.313342]  dump_stack_lvl+0x8c/0xd0
[   44.313378]  print_report+0x118/0x608
[   44.313410]  kasan_report+0xdc/0x128
[   44.313443]  __asan_report_load8_noabort+0x20/0x30
[   44.313480]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   44.313518]  kasan_bitops_generic+0x11c/0x1c8
[   44.313549]  kunit_try_run_case+0x170/0x3f0
[   44.313584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.313623]  kthread+0x328/0x630
[   44.313649]  ret_from_fork+0x10/0x20
[   44.313681] 
[   44.382301] Allocated by task 308:
[   44.385687]  kasan_save_stack+0x3c/0x68
[   44.389506]  kasan_save_track+0x20/0x40
[   44.393325]  kasan_save_alloc_info+0x40/0x58
[   44.397579]  __kasan_kmalloc+0xd4/0xd8
[   44.401311]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.405825]  kasan_bitops_generic+0xa0/0x1c8
[   44.410078]  kunit_try_run_case+0x170/0x3f0
[   44.414245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.419714]  kthread+0x328/0x630
[   44.422926]  ret_from_fork+0x10/0x20
[   44.426485] 
[   44.427960] The buggy address belongs to the object at ffff000800d63060
[   44.427960]  which belongs to the cache kmalloc-16 of size 16
[   44.440287] The buggy address is located 8 bytes inside of
[   44.440287]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   44.452526] 
[   44.454002] The buggy address belongs to the physical page:
[   44.459559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   44.467543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.474054] page_type: f5(slab)
[   44.477187] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.484911] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.492630] page dumped because: kasan: bad access detected
[   44.498185] 
[   44.499660] Memory state around the buggy address:
[   44.504438]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.511644]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.518848] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   44.526049]                                                           ^
[   44.532650]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.539855]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.547056] ==================================================================
[   44.019166] ==================================================================
[   44.026233] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.035084] Write of size 8 at addr ffff000800d63068 by task kunit_try_catch/308
[   44.042463] 
[   44.043942] CPU: 7 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   44.043991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.044006] Hardware name: WinLink E850-96 board (DT)
[   44.044026] Call trace:
[   44.044040]  show_stack+0x20/0x38 (C)
[   44.044075]  dump_stack_lvl+0x8c/0xd0
[   44.044112]  print_report+0x118/0x608
[   44.044144]  kasan_report+0xdc/0x128
[   44.044178]  kasan_check_range+0x100/0x1a8
[   44.044212]  __kasan_check_write+0x20/0x30
[   44.044241]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   44.044280]  kasan_bitops_generic+0x11c/0x1c8
[   44.044312]  kunit_try_run_case+0x170/0x3f0
[   44.044346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.044385]  kthread+0x328/0x630
[   44.044411]  ret_from_fork+0x10/0x20
[   44.044444] 
[   44.116333] Allocated by task 308:
[   44.119718]  kasan_save_stack+0x3c/0x68
[   44.123538]  kasan_save_track+0x20/0x40
[   44.127357]  kasan_save_alloc_info+0x40/0x58
[   44.131611]  __kasan_kmalloc+0xd4/0xd8
[   44.135343]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.139857]  kasan_bitops_generic+0xa0/0x1c8
[   44.144110]  kunit_try_run_case+0x170/0x3f0
[   44.148277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.153746]  kthread+0x328/0x630
[   44.156957]  ret_from_fork+0x10/0x20
[   44.160516] 
[   44.161992] The buggy address belongs to the object at ffff000800d63060
[   44.161992]  which belongs to the cache kmalloc-16 of size 16
[   44.174319] The buggy address is located 8 bytes inside of
[   44.174319]  allocated 9-byte region [ffff000800d63060, ffff000800d63069)
[   44.186558] 
[   44.188034] The buggy address belongs to the physical page:
[   44.193590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   44.201575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.208085] page_type: f5(slab)
[   44.211218] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   44.218943] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.226661] page dumped because: kasan: bad access detected
[   44.232217] 
[   44.233692] Memory state around the buggy address:
[   44.238471]  ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.245675]  ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.252880] >ffff000800d63000: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   44.260081]                                                           ^
[   44.266682]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.273887]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.281087] ==================================================================

[   29.274767] ==================================================================
[   29.274884] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   29.275026] Read of size 8 at addr fff00000c62bd348 by task kunit_try_catch/261
[   29.281860]  dump_stack_lvl+0x8c/0xd0
[   29.283022]  print_report+0x118/0x608
[   29.283831]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   29.286509]  kasan_bitops_generic+0xa0/0x1c8
[   29.287976] 
[   29.288508] page_type: f5(slab)
[   29.289759]  fff00000c62bd280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.293255] ==================================================================

[   23.073944] ==================================================================
[   23.074791] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   23.075585] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   23.076840] 
[   23.077342] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.077454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.077488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.077562] Call Trace:
[   23.077608]  <TASK>
[   23.077668]  dump_stack_lvl+0x73/0xb0
[   23.077762]  print_report+0xd1/0x650
[   23.077830]  ? __virt_addr_valid+0x1db/0x2d0
[   23.077911]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   23.077996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.078134]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   23.078254]  kasan_report+0x141/0x180
[   23.078329]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   23.078425]  kasan_check_range+0x10c/0x1c0
[   23.078553]  __kasan_check_write+0x18/0x20
[   23.078640]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   23.078703]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.078759]  kasan_bitops_generic+0x121/0x1c0
[   23.078795]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.078836]  ? __pfx_read_tsc+0x10/0x10
[   23.078869]  ? ktime_get_ts64+0x86/0x230
[   23.078904]  kunit_try_run_case+0x1a5/0x480
[   23.078944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.078980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.079015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.079048]  ? __kthread_parkme+0x82/0x180
[   23.079077]  ? preempt_count_sub+0x50/0x80
[   23.079109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.079146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.079180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.079216]  kthread+0x337/0x6f0
[   23.079283]  ? trace_preempt_on+0x20/0xc0
[   23.079322]  ? __pfx_kthread+0x10/0x10
[   23.079353]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.079384]  ? calculate_sigpending+0x7b/0xa0
[   23.079419]  ? __pfx_kthread+0x10/0x10
[   23.079449]  ret_from_fork+0x116/0x1d0
[   23.079475]  ? __pfx_kthread+0x10/0x10
[   23.079528]  ret_from_fork_asm+0x1a/0x30
[   23.079616]  </TASK>
[   23.079663] 
[   23.104877] Allocated by task 279:
[   23.105776]  kasan_save_stack+0x45/0x70
[   23.106164]  kasan_save_track+0x18/0x40
[   23.106913]  kasan_save_alloc_info+0x3b/0x50
[   23.107960]  __kasan_kmalloc+0xb7/0xc0
[   23.108477]  __kmalloc_cache_noprof+0x189/0x420
[   23.109346]  kasan_bitops_generic+0x92/0x1c0
[   23.109628]  kunit_try_run_case+0x1a5/0x480
[   23.110494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.111249]  kthread+0x337/0x6f0
[   23.111567]  ret_from_fork+0x116/0x1d0
[   23.111840]  ret_from_fork_asm+0x1a/0x30
[   23.112120] 
[   23.112287] The buggy address belongs to the object at ffff8881023e2400
[   23.112287]  which belongs to the cache kmalloc-16 of size 16
[   23.114970] The buggy address is located 8 bytes inside of
[   23.114970]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   23.116066] 
[   23.116251] The buggy address belongs to the physical page:
[   23.116726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   23.118395] flags: 0x200000000000000(node=0|zone=2)
[   23.119132] page_type: f5(slab)
[   23.119697] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.120407] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.121871] page dumped because: kasan: bad access detected
[   23.122255] 
[   23.122981] Memory state around the buggy address:
[   23.123463]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   23.124204]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   23.124941] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.125977]                       ^
[   23.126849]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.127420]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.128586] ==================================================================
[   22.810899] ==================================================================
[   22.812342] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   22.814032] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.814983] 
[   22.815282] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.815386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.815404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.815436] Call Trace:
[   22.815460]  <TASK>
[   22.815490]  dump_stack_lvl+0x73/0xb0
[   22.815609]  print_report+0xd1/0x650
[   22.815688]  ? __virt_addr_valid+0x1db/0x2d0
[   22.815771]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   22.815855]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.815928]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   22.816030]  kasan_report+0x141/0x180
[   22.816067]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   22.816112]  kasan_check_range+0x10c/0x1c0
[   22.816147]  __kasan_check_write+0x18/0x20
[   22.816174]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   22.816216]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.816304]  kasan_bitops_generic+0x121/0x1c0
[   22.816343]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.816380]  ? __pfx_read_tsc+0x10/0x10
[   22.816413]  ? ktime_get_ts64+0x86/0x230
[   22.816446]  kunit_try_run_case+0x1a5/0x480
[   22.816556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.816635]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.816704]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.816774]  ? __kthread_parkme+0x82/0x180
[   22.816838]  ? preempt_count_sub+0x50/0x80
[   22.816903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.816980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.817031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.817068]  kthread+0x337/0x6f0
[   22.817096]  ? trace_preempt_on+0x20/0xc0
[   22.817130]  ? __pfx_kthread+0x10/0x10
[   22.817159]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.817189]  ? calculate_sigpending+0x7b/0xa0
[   22.817234]  ? __pfx_kthread+0x10/0x10
[   22.817297]  ret_from_fork+0x116/0x1d0
[   22.817325]  ? __pfx_kthread+0x10/0x10
[   22.817355]  ret_from_fork_asm+0x1a/0x30
[   22.817397]  </TASK>
[   22.817411] 
[   22.831983] Allocated by task 279:
[   22.832386]  kasan_save_stack+0x45/0x70
[   22.832777]  kasan_save_track+0x18/0x40
[   22.833096]  kasan_save_alloc_info+0x3b/0x50
[   22.833442]  __kasan_kmalloc+0xb7/0xc0
[   22.833878]  __kmalloc_cache_noprof+0x189/0x420
[   22.835103]  kasan_bitops_generic+0x92/0x1c0
[   22.836074]  kunit_try_run_case+0x1a5/0x480
[   22.836898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.837420]  kthread+0x337/0x6f0
[   22.838465]  ret_from_fork+0x116/0x1d0
[   22.838984]  ret_from_fork_asm+0x1a/0x30
[   22.839314] 
[   22.839570] The buggy address belongs to the object at ffff8881023e2400
[   22.839570]  which belongs to the cache kmalloc-16 of size 16
[   22.841016] The buggy address is located 8 bytes inside of
[   22.841016]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   22.841770] 
[   22.841967] The buggy address belongs to the physical page:
[   22.842341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   22.843047] flags: 0x200000000000000(node=0|zone=2)
[   22.844263] page_type: f5(slab)
[   22.844946] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.845961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.846781] page dumped because: kasan: bad access detected
[   22.847379] 
[   22.848016] Memory state around the buggy address:
[   22.848481]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   22.849077]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.849990] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.850576]                       ^
[   22.850956]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.853427]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.853905] ==================================================================
[   22.903831] ==================================================================
[   22.904645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   22.905460] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.906090] 
[   22.906378] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.906726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.906773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.906836] Call Trace:
[   22.906891]  <TASK>
[   22.906944]  dump_stack_lvl+0x73/0xb0
[   22.907104]  print_report+0xd1/0x650
[   22.907190]  ? __virt_addr_valid+0x1db/0x2d0
[   22.907315]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   22.907400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.907472]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   22.908057]  kasan_report+0x141/0x180
[   22.908185]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   22.908361]  kasan_check_range+0x10c/0x1c0
[   22.908451]  __kasan_check_write+0x18/0x20
[   22.908693]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   22.908768]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.908826]  kasan_bitops_generic+0x121/0x1c0
[   22.908862]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.908899]  ? __pfx_read_tsc+0x10/0x10
[   22.908931]  ? ktime_get_ts64+0x86/0x230
[   22.908965]  kunit_try_run_case+0x1a5/0x480
[   22.909003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.909037]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.909071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.909105]  ? __kthread_parkme+0x82/0x180
[   22.909134]  ? preempt_count_sub+0x50/0x80
[   22.909166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.909201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.909237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.909272]  kthread+0x337/0x6f0
[   22.909301]  ? trace_preempt_on+0x20/0xc0
[   22.909386]  ? __pfx_kthread+0x10/0x10
[   22.909422]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.909453]  ? calculate_sigpending+0x7b/0xa0
[   22.909488]  ? __pfx_kthread+0x10/0x10
[   22.909558]  ret_from_fork+0x116/0x1d0
[   22.909686]  ? __pfx_kthread+0x10/0x10
[   22.909729]  ret_from_fork_asm+0x1a/0x30
[   22.909773]  </TASK>
[   22.909789] 
[   22.934118] Allocated by task 279:
[   22.935076]  kasan_save_stack+0x45/0x70
[   22.935686]  kasan_save_track+0x18/0x40
[   22.936424]  kasan_save_alloc_info+0x3b/0x50
[   22.937469]  __kasan_kmalloc+0xb7/0xc0
[   22.937964]  __kmalloc_cache_noprof+0x189/0x420
[   22.938452]  kasan_bitops_generic+0x92/0x1c0
[   22.939323]  kunit_try_run_case+0x1a5/0x480
[   22.940002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.941068]  kthread+0x337/0x6f0
[   22.941388]  ret_from_fork+0x116/0x1d0
[   22.942191]  ret_from_fork_asm+0x1a/0x30
[   22.942855] 
[   22.943298] The buggy address belongs to the object at ffff8881023e2400
[   22.943298]  which belongs to the cache kmalloc-16 of size 16
[   22.945065] The buggy address is located 8 bytes inside of
[   22.945065]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   22.946682] 
[   22.946944] The buggy address belongs to the physical page:
[   22.947396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   22.948299] flags: 0x200000000000000(node=0|zone=2)
[   22.949002] page_type: f5(slab)
[   22.949291] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.950937] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.951801] page dumped because: kasan: bad access detected
[   22.952300] 
[   22.952474] Memory state around the buggy address:
[   22.952815]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   22.953281]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.954483] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.955733]                       ^
[   22.956074]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.956647]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.958063] ==================================================================
[   22.959398] ==================================================================
[   22.959891] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   22.960974] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.961940] 
[   22.962200] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.962336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.962377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.962438] Call Trace:
[   22.962493]  <TASK>
[   22.962568]  dump_stack_lvl+0x73/0xb0
[   22.962664]  print_report+0xd1/0x650
[   22.962748]  ? __virt_addr_valid+0x1db/0x2d0
[   22.962827]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   22.962918]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.963000]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   22.963092]  kasan_report+0x141/0x180
[   22.963181]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   22.964452]  kasan_check_range+0x10c/0x1c0
[   22.965892]  __kasan_check_write+0x18/0x20
[   22.965986]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   22.966067]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.966155]  kasan_bitops_generic+0x121/0x1c0
[   22.966234]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.966303]  ? __pfx_read_tsc+0x10/0x10
[   22.966362]  ? ktime_get_ts64+0x86/0x230
[   22.966432]  kunit_try_run_case+0x1a5/0x480
[   22.966520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.966590]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.966657]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.966727]  ? __kthread_parkme+0x82/0x180
[   22.966796]  ? preempt_count_sub+0x50/0x80
[   22.966866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.966941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.967013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.967082]  kthread+0x337/0x6f0
[   22.967136]  ? trace_preempt_on+0x20/0xc0
[   22.967204]  ? __pfx_kthread+0x10/0x10
[   22.967258]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.967313]  ? calculate_sigpending+0x7b/0xa0
[   22.967373]  ? __pfx_kthread+0x10/0x10
[   22.967424]  ret_from_fork+0x116/0x1d0
[   22.967470]  ? __pfx_kthread+0x10/0x10
[   22.968160]  ret_from_fork_asm+0x1a/0x30
[   22.968284]  </TASK>
[   22.968317] 
[   22.994150] Allocated by task 279:
[   22.995200]  kasan_save_stack+0x45/0x70
[   22.995829]  kasan_save_track+0x18/0x40
[   22.996290]  kasan_save_alloc_info+0x3b/0x50
[   22.996898]  __kasan_kmalloc+0xb7/0xc0
[   22.997270]  __kmalloc_cache_noprof+0x189/0x420
[   22.998000]  kasan_bitops_generic+0x92/0x1c0
[   22.998468]  kunit_try_run_case+0x1a5/0x480
[   22.999455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.000094]  kthread+0x337/0x6f0
[   23.000515]  ret_from_fork+0x116/0x1d0
[   23.001021]  ret_from_fork_asm+0x1a/0x30
[   23.001433] 
[   23.001856] The buggy address belongs to the object at ffff8881023e2400
[   23.001856]  which belongs to the cache kmalloc-16 of size 16
[   23.002761] The buggy address is located 8 bytes inside of
[   23.002761]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   23.003610] 
[   23.003846] The buggy address belongs to the physical page:
[   23.005320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   23.006183] flags: 0x200000000000000(node=0|zone=2)
[   23.006812] page_type: f5(slab)
[   23.007176] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.008482] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.009336] page dumped because: kasan: bad access detected
[   23.009962] 
[   23.010626] Memory state around the buggy address:
[   23.011550]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   23.012217]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   23.013764] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.014367]                       ^
[   23.014967]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.016032]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.017253] ==================================================================
[   23.129758] ==================================================================
[   23.130983] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   23.131722] Read of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   23.132229] 
[   23.133154] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.133335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.133375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.133437] Call Trace:
[   23.133489]  <TASK>
[   23.133559]  dump_stack_lvl+0x73/0xb0
[   23.133676]  print_report+0xd1/0x650
[   23.133759]  ? __virt_addr_valid+0x1db/0x2d0
[   23.133834]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   23.133917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.133988]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   23.134070]  kasan_report+0x141/0x180
[   23.134142]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   23.134202]  kasan_check_range+0x10c/0x1c0
[   23.134279]  __kasan_check_read+0x15/0x20
[   23.134313]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   23.134356]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.134409]  kasan_bitops_generic+0x121/0x1c0
[   23.134444]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.134484]  ? __pfx_read_tsc+0x10/0x10
[   23.134556]  ? ktime_get_ts64+0x86/0x230
[   23.134635]  kunit_try_run_case+0x1a5/0x480
[   23.134723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.134778]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.134815]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.134851]  ? __kthread_parkme+0x82/0x180
[   23.134880]  ? preempt_count_sub+0x50/0x80
[   23.134911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.134947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.134981]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.135017]  kthread+0x337/0x6f0
[   23.135045]  ? trace_preempt_on+0x20/0xc0
[   23.135081]  ? __pfx_kthread+0x10/0x10
[   23.135109]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.135140]  ? calculate_sigpending+0x7b/0xa0
[   23.135173]  ? __pfx_kthread+0x10/0x10
[   23.135202]  ret_from_fork+0x116/0x1d0
[   23.135229]  ? __pfx_kthread+0x10/0x10
[   23.135257]  ret_from_fork_asm+0x1a/0x30
[   23.135299]  </TASK>
[   23.135313] 
[   23.159513] Allocated by task 279:
[   23.160294]  kasan_save_stack+0x45/0x70
[   23.161145]  kasan_save_track+0x18/0x40
[   23.162009]  kasan_save_alloc_info+0x3b/0x50
[   23.162389]  __kasan_kmalloc+0xb7/0xc0
[   23.162735]  __kmalloc_cache_noprof+0x189/0x420
[   23.163237]  kasan_bitops_generic+0x92/0x1c0
[   23.163781]  kunit_try_run_case+0x1a5/0x480
[   23.164142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.164738]  kthread+0x337/0x6f0
[   23.165585]  ret_from_fork+0x116/0x1d0
[   23.165983]  ret_from_fork_asm+0x1a/0x30
[   23.167119] 
[   23.167390] The buggy address belongs to the object at ffff8881023e2400
[   23.167390]  which belongs to the cache kmalloc-16 of size 16
[   23.168302] The buggy address is located 8 bytes inside of
[   23.168302]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   23.170384] 
[   23.171009] The buggy address belongs to the physical page:
[   23.171430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   23.172583] flags: 0x200000000000000(node=0|zone=2)
[   23.173906] page_type: f5(slab)
[   23.174200] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.174713] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.175287] page dumped because: kasan: bad access detected
[   23.175896] 
[   23.176792] Memory state around the buggy address:
[   23.177221]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   23.178433]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   23.178984] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.180157]                       ^
[   23.181018]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.182152]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.182924] ==================================================================
[   23.018491] ==================================================================
[   23.019187] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   23.021271] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   23.022908] 
[   23.023407] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.023518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.023560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.023670] Call Trace:
[   23.023726]  <TASK>
[   23.023804]  dump_stack_lvl+0x73/0xb0
[   23.023880]  print_report+0xd1/0x650
[   23.023919]  ? __virt_addr_valid+0x1db/0x2d0
[   23.023955]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   23.023999]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.024032]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   23.024075]  kasan_report+0x141/0x180
[   23.024106]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   23.024151]  kasan_check_range+0x10c/0x1c0
[   23.024186]  __kasan_check_write+0x18/0x20
[   23.024212]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   23.024323]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.024421]  kasan_bitops_generic+0x121/0x1c0
[   23.024459]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.024516]  ? __pfx_read_tsc+0x10/0x10
[   23.024596]  ? ktime_get_ts64+0x86/0x230
[   23.024670]  kunit_try_run_case+0x1a5/0x480
[   23.024744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.024783]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.024819]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.024854]  ? __kthread_parkme+0x82/0x180
[   23.024883]  ? preempt_count_sub+0x50/0x80
[   23.024915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.024951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.024983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.025017]  kthread+0x337/0x6f0
[   23.025044]  ? trace_preempt_on+0x20/0xc0
[   23.025077]  ? __pfx_kthread+0x10/0x10
[   23.025105]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.025135]  ? calculate_sigpending+0x7b/0xa0
[   23.025168]  ? __pfx_kthread+0x10/0x10
[   23.025197]  ret_from_fork+0x116/0x1d0
[   23.025229]  ? __pfx_kthread+0x10/0x10
[   23.025300]  ret_from_fork_asm+0x1a/0x30
[   23.025345]  </TASK>
[   23.025359] 
[   23.048024] Allocated by task 279:
[   23.048616]  kasan_save_stack+0x45/0x70
[   23.049018]  kasan_save_track+0x18/0x40
[   23.049462]  kasan_save_alloc_info+0x3b/0x50
[   23.049957]  __kasan_kmalloc+0xb7/0xc0
[   23.050518]  __kmalloc_cache_noprof+0x189/0x420
[   23.050888]  kasan_bitops_generic+0x92/0x1c0
[   23.051257]  kunit_try_run_case+0x1a5/0x480
[   23.051813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.052440]  kthread+0x337/0x6f0
[   23.052844]  ret_from_fork+0x116/0x1d0
[   23.053117]  ret_from_fork_asm+0x1a/0x30
[   23.053459] 
[   23.053669] The buggy address belongs to the object at ffff8881023e2400
[   23.053669]  which belongs to the cache kmalloc-16 of size 16
[   23.054339] The buggy address is located 8 bytes inside of
[   23.054339]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   23.056298] 
[   23.056569] The buggy address belongs to the physical page:
[   23.057074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   23.060940] flags: 0x200000000000000(node=0|zone=2)
[   23.061953] page_type: f5(slab)
[   23.062932] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.064124] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.065562] page dumped because: kasan: bad access detected
[   23.066092] 
[   23.066385] Memory state around the buggy address:
[   23.066824]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   23.067832]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   23.068285] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.069491]                       ^
[   23.069810]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.070921]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.071954] ==================================================================
[   22.758820] ==================================================================
[   22.759588] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   22.760608] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.761241] 
[   22.761989] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.762551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.762573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.762638] Call Trace:
[   22.762683]  <TASK>
[   22.762733]  dump_stack_lvl+0x73/0xb0
[   22.762786]  print_report+0xd1/0x650
[   22.762820]  ? __virt_addr_valid+0x1db/0x2d0
[   22.762852]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   22.762890]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.762921]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   22.762961]  kasan_report+0x141/0x180
[   22.762991]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   22.763035]  kasan_check_range+0x10c/0x1c0
[   22.763069]  __kasan_check_write+0x18/0x20
[   22.763094]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   22.763133]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.763182]  kasan_bitops_generic+0x121/0x1c0
[   22.763216]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.763279]  ? __pfx_read_tsc+0x10/0x10
[   22.763313]  ? ktime_get_ts64+0x86/0x230
[   22.763348]  kunit_try_run_case+0x1a5/0x480
[   22.763386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.763419]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.763453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.763488]  ? __kthread_parkme+0x82/0x180
[   22.763557]  ? preempt_count_sub+0x50/0x80
[   22.763642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.763693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.763729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.763764]  kthread+0x337/0x6f0
[   22.763792]  ? trace_preempt_on+0x20/0xc0
[   22.763828]  ? __pfx_kthread+0x10/0x10
[   22.763855]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.763887]  ? calculate_sigpending+0x7b/0xa0
[   22.763920]  ? __pfx_kthread+0x10/0x10
[   22.763950]  ret_from_fork+0x116/0x1d0
[   22.763976]  ? __pfx_kthread+0x10/0x10
[   22.764005]  ret_from_fork_asm+0x1a/0x30
[   22.764048]  </TASK>
[   22.764063] 
[   22.787353] Allocated by task 279:
[   22.788055]  kasan_save_stack+0x45/0x70
[   22.788827]  kasan_save_track+0x18/0x40
[   22.789121]  kasan_save_alloc_info+0x3b/0x50
[   22.790067]  __kasan_kmalloc+0xb7/0xc0
[   22.790991]  __kmalloc_cache_noprof+0x189/0x420
[   22.791891]  kasan_bitops_generic+0x92/0x1c0
[   22.792139]  kunit_try_run_case+0x1a5/0x480
[   22.792323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.792603]  kthread+0x337/0x6f0
[   22.792900]  ret_from_fork+0x116/0x1d0
[   22.793319]  ret_from_fork_asm+0x1a/0x30
[   22.794384] 
[   22.794700] The buggy address belongs to the object at ffff8881023e2400
[   22.794700]  which belongs to the cache kmalloc-16 of size 16
[   22.795991] The buggy address is located 8 bytes inside of
[   22.795991]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   22.797396] 
[   22.798030] The buggy address belongs to the physical page:
[   22.798811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   22.799754] flags: 0x200000000000000(node=0|zone=2)
[   22.800383] page_type: f5(slab)
[   22.801209] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.802147] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.802906] page dumped because: kasan: bad access detected
[   22.803392] 
[   22.803810] Memory state around the buggy address:
[   22.804180]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   22.805051]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.805571] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.806746]                       ^
[   22.807314]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.808314]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.809515] ==================================================================
[   22.855319] ==================================================================
[   22.856530] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   22.857533] Write of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   22.858450] 
[   22.858760] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.858884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.858922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.858983] Call Trace:
[   22.859032]  <TASK>
[   22.859084]  dump_stack_lvl+0x73/0xb0
[   22.859173]  print_report+0xd1/0x650
[   22.859337]  ? __virt_addr_valid+0x1db/0x2d0
[   22.859415]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   22.859513]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.859595]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   22.859685]  kasan_report+0x141/0x180
[   22.859762]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   22.859859]  kasan_check_range+0x10c/0x1c0
[   22.859942]  __kasan_check_write+0x18/0x20
[   22.860013]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   22.860096]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   22.860202]  kasan_bitops_generic+0x121/0x1c0
[   22.861146]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   22.861232]  ? __pfx_read_tsc+0x10/0x10
[   22.861324]  ? ktime_get_ts64+0x86/0x230
[   22.861403]  kunit_try_run_case+0x1a5/0x480
[   22.861488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.861748]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.861798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.861838]  ? __kthread_parkme+0x82/0x180
[   22.861871]  ? preempt_count_sub+0x50/0x80
[   22.861904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.861942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.861979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.862015]  kthread+0x337/0x6f0
[   22.862042]  ? trace_preempt_on+0x20/0xc0
[   22.862079]  ? __pfx_kthread+0x10/0x10
[   22.862110]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.862142]  ? calculate_sigpending+0x7b/0xa0
[   22.862178]  ? __pfx_kthread+0x10/0x10
[   22.862209]  ret_from_fork+0x116/0x1d0
[   22.862289]  ? __pfx_kthread+0x10/0x10
[   22.862325]  ret_from_fork_asm+0x1a/0x30
[   22.862370]  </TASK>
[   22.862386] 
[   22.882468] Allocated by task 279:
[   22.883176]  kasan_save_stack+0x45/0x70
[   22.883685]  kasan_save_track+0x18/0x40
[   22.884040]  kasan_save_alloc_info+0x3b/0x50
[   22.884534]  __kasan_kmalloc+0xb7/0xc0
[   22.884883]  __kmalloc_cache_noprof+0x189/0x420
[   22.885304]  kasan_bitops_generic+0x92/0x1c0
[   22.886429]  kunit_try_run_case+0x1a5/0x480
[   22.887198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.887902]  kthread+0x337/0x6f0
[   22.888276]  ret_from_fork+0x116/0x1d0
[   22.888806]  ret_from_fork_asm+0x1a/0x30
[   22.889283] 
[   22.889526] The buggy address belongs to the object at ffff8881023e2400
[   22.889526]  which belongs to the cache kmalloc-16 of size 16
[   22.891253] The buggy address is located 8 bytes inside of
[   22.891253]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   22.892359] 
[   22.892772] The buggy address belongs to the physical page:
[   22.893238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   22.894433] flags: 0x200000000000000(node=0|zone=2)
[   22.895118] page_type: f5(slab)
[   22.895580] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.896234] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.897008] page dumped because: kasan: bad access detected
[   22.898171] 
[   22.898455] Memory state around the buggy address:
[   22.899117]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   22.899901]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.900885] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.901453]                       ^
[   22.901835]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.902354]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.902878] ==================================================================
[   23.184174] ==================================================================
[   23.184796] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   23.186126] Read of size 8 at addr ffff8881023e2408 by task kunit_try_catch/279
[   23.187975] 
[   23.188197] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   23.188320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.188360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.188620] Call Trace:
[   23.188682]  <TASK>
[   23.188737]  dump_stack_lvl+0x73/0xb0
[   23.188807]  print_report+0xd1/0x650
[   23.188845]  ? __virt_addr_valid+0x1db/0x2d0
[   23.188879]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   23.188917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.188950]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   23.188989]  kasan_report+0x141/0x180
[   23.189020]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   23.189065]  __asan_report_load8_noabort+0x18/0x20
[   23.189101]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   23.189141]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   23.189190]  kasan_bitops_generic+0x121/0x1c0
[   23.189233]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   23.189299]  ? __pfx_read_tsc+0x10/0x10
[   23.189334]  ? ktime_get_ts64+0x86/0x230
[   23.189368]  kunit_try_run_case+0x1a5/0x480
[   23.189406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.189440]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.189473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.189529]  ? __kthread_parkme+0x82/0x180
[   23.189598]  ? preempt_count_sub+0x50/0x80
[   23.189697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.189770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.189841]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.189906]  kthread+0x337/0x6f0
[   23.189968]  ? trace_preempt_on+0x20/0xc0
[   23.190045]  ? __pfx_kthread+0x10/0x10
[   23.190082]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.190116]  ? calculate_sigpending+0x7b/0xa0
[   23.190150]  ? __pfx_kthread+0x10/0x10
[   23.190179]  ret_from_fork+0x116/0x1d0
[   23.190206]  ? __pfx_kthread+0x10/0x10
[   23.190285]  ret_from_fork_asm+0x1a/0x30
[   23.190335]  </TASK>
[   23.190352] 
[   23.211358] Allocated by task 279:
[   23.211754]  kasan_save_stack+0x45/0x70
[   23.212293]  kasan_save_track+0x18/0x40
[   23.212707]  kasan_save_alloc_info+0x3b/0x50
[   23.213124]  __kasan_kmalloc+0xb7/0xc0
[   23.213609]  __kmalloc_cache_noprof+0x189/0x420
[   23.214010]  kasan_bitops_generic+0x92/0x1c0
[   23.214390]  kunit_try_run_case+0x1a5/0x480
[   23.214805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.215339]  kthread+0x337/0x6f0
[   23.215800]  ret_from_fork+0x116/0x1d0
[   23.216216]  ret_from_fork_asm+0x1a/0x30
[   23.216905] 
[   23.217142] The buggy address belongs to the object at ffff8881023e2400
[   23.217142]  which belongs to the cache kmalloc-16 of size 16
[   23.218414] The buggy address is located 8 bytes inside of
[   23.218414]  allocated 9-byte region [ffff8881023e2400, ffff8881023e2409)
[   23.219361] 
[   23.219725] The buggy address belongs to the physical page:
[   23.220354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1023e2
[   23.221030] flags: 0x200000000000000(node=0|zone=2)
[   23.221477] page_type: f5(slab)
[   23.221935] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.222717] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.223347] page dumped because: kasan: bad access detected
[   23.223889] 
[   23.224160] Memory state around the buggy address:
[   23.224698]  ffff8881023e2300: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   23.225399]  ffff8881023e2380: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   23.226097] >ffff8881023e2400: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.226844]                       ^
[   23.227287]  ffff8881023e2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.228842]  ffff8881023e2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.235467] ==================================================================

[   21.588029] ==================================================================
[   21.588505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.589601] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.590869] 
[   21.591187] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.591310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.591344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.591375] Call Trace:
[   21.591395]  <TASK>
[   21.591415]  dump_stack_lvl+0x73/0xb0
[   21.591474]  print_report+0xd1/0x650
[   21.591534]  ? __virt_addr_valid+0x1db/0x2d0
[   21.591569]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.591611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.591643]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.591684]  kasan_report+0x141/0x180
[   21.591715]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.591759]  kasan_check_range+0x10c/0x1c0
[   21.591793]  __kasan_check_write+0x18/0x20
[   21.591819]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   21.591859]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.591950]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.592031]  ? trace_hardirqs_on+0x37/0xe0
[   21.592085]  ? kasan_bitops_generic+0x92/0x1c0
[   21.592204]  kasan_bitops_generic+0x121/0x1c0
[   21.592291]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.592353]  ? __pfx_read_tsc+0x10/0x10
[   21.592386]  ? ktime_get_ts64+0x86/0x230
[   21.592418]  kunit_try_run_case+0x1a5/0x480
[   21.592455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.592488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.592521]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.592556]  ? __kthread_parkme+0x82/0x180
[   21.592586]  ? preempt_count_sub+0x50/0x80
[   21.592618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.592655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.592689]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.592762]  kthread+0x337/0x6f0
[   21.592820]  ? trace_preempt_on+0x20/0xc0
[   21.592900]  ? __pfx_kthread+0x10/0x10
[   21.592964]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.593029]  ? calculate_sigpending+0x7b/0xa0
[   21.593100]  ? __pfx_kthread+0x10/0x10
[   21.593170]  ret_from_fork+0x116/0x1d0
[   21.593368]  ? __pfx_kthread+0x10/0x10
[   21.593444]  ret_from_fork_asm+0x1a/0x30
[   21.593528]  </TASK>
[   21.593559] 
[   21.616282] Allocated by task 279:
[   21.616570]  kasan_save_stack+0x45/0x70
[   21.616922]  kasan_save_track+0x18/0x40
[   21.618262]  kasan_save_alloc_info+0x3b/0x50
[   21.619042]  __kasan_kmalloc+0xb7/0xc0
[   21.619327]  __kmalloc_cache_noprof+0x189/0x420
[   21.619800]  kasan_bitops_generic+0x92/0x1c0
[   21.620738]  kunit_try_run_case+0x1a5/0x480
[   21.621288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.621786]  kthread+0x337/0x6f0
[   21.622538]  ret_from_fork+0x116/0x1d0
[   21.622862]  ret_from_fork_asm+0x1a/0x30
[   21.623711] 
[   21.623922] The buggy address belongs to the object at ffff888101e49ec0
[   21.623922]  which belongs to the cache kmalloc-16 of size 16
[   21.625279] The buggy address is located 8 bytes inside of
[   21.625279]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.626486] 
[   21.626683] The buggy address belongs to the physical page:
[   21.627698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.628266] flags: 0x200000000000000(node=0|zone=2)
[   21.628902] page_type: f5(slab)
[   21.629388] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.630018] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.630979] page dumped because: kasan: bad access detected
[   21.631515] 
[   21.632039] Memory state around the buggy address:
[   21.632701]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.633447]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.634206] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.634722]                                               ^
[   21.635460]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.636166]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.636848] ==================================================================
[   21.496668] ==================================================================
[   21.498015] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.498780] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.499340] 
[   21.499703] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.500033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.500071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.500126] Call Trace:
[   21.500168]  <TASK>
[   21.500204]  dump_stack_lvl+0x73/0xb0
[   21.500284]  print_report+0xd1/0x650
[   21.500357]  ? __virt_addr_valid+0x1db/0x2d0
[   21.500432]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.500862]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.500961]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.501041]  kasan_report+0x141/0x180
[   21.501080]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.501167]  kasan_check_range+0x10c/0x1c0
[   21.501232]  __kasan_check_write+0x18/0x20
[   21.501266]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   21.501308]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.501351]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.501385]  ? trace_hardirqs_on+0x37/0xe0
[   21.501414]  ? kasan_bitops_generic+0x92/0x1c0
[   21.501453]  kasan_bitops_generic+0x121/0x1c0
[   21.501486]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.501561]  ? __pfx_read_tsc+0x10/0x10
[   21.501645]  ? ktime_get_ts64+0x86/0x230
[   21.501727]  kunit_try_run_case+0x1a5/0x480
[   21.501814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.501873]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.501935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.501970]  ? __kthread_parkme+0x82/0x180
[   21.502001]  ? preempt_count_sub+0x50/0x80
[   21.502033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.502069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.502144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.502187]  kthread+0x337/0x6f0
[   21.502218]  ? trace_preempt_on+0x20/0xc0
[   21.502248]  ? __pfx_kthread+0x10/0x10
[   21.502290]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.502322]  ? calculate_sigpending+0x7b/0xa0
[   21.502357]  ? __pfx_kthread+0x10/0x10
[   21.502387]  ret_from_fork+0x116/0x1d0
[   21.502412]  ? __pfx_kthread+0x10/0x10
[   21.502440]  ret_from_fork_asm+0x1a/0x30
[   21.502482]  </TASK>
[   21.502496] 
[   21.519359] Allocated by task 279:
[   21.519730]  kasan_save_stack+0x45/0x70
[   21.520248]  kasan_save_track+0x18/0x40
[   21.520686]  kasan_save_alloc_info+0x3b/0x50
[   21.521262]  __kasan_kmalloc+0xb7/0xc0
[   21.521690]  __kmalloc_cache_noprof+0x189/0x420
[   21.522283]  kasan_bitops_generic+0x92/0x1c0
[   21.522747]  kunit_try_run_case+0x1a5/0x480
[   21.523290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.523848]  kthread+0x337/0x6f0
[   21.524311]  ret_from_fork+0x116/0x1d0
[   21.524729]  ret_from_fork_asm+0x1a/0x30
[   21.525235] 
[   21.525474] The buggy address belongs to the object at ffff888101e49ec0
[   21.525474]  which belongs to the cache kmalloc-16 of size 16
[   21.526428] The buggy address is located 8 bytes inside of
[   21.526428]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.527369] 
[   21.527628] The buggy address belongs to the physical page:
[   21.528245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.529006] flags: 0x200000000000000(node=0|zone=2)
[   21.529564] page_type: f5(slab)
[   21.529981] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.530685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.531434] page dumped because: kasan: bad access detected
[   21.531979] 
[   21.532266] Memory state around the buggy address:
[   21.532739]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.533993]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.534687] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.535219]                                               ^
[   21.535588]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.537197]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.538075] ==================================================================
[   21.772722] ==================================================================
[   21.774243] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.775643] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.776562] 
[   21.777022] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.777255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.777299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.777358] Call Trace:
[   21.777380]  <TASK>
[   21.777399]  dump_stack_lvl+0x73/0xb0
[   21.777443]  print_report+0xd1/0x650
[   21.777477]  ? __virt_addr_valid+0x1db/0x2d0
[   21.777509]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.777550]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.777581]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.777622]  kasan_report+0x141/0x180
[   21.777652]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.777700]  kasan_check_range+0x10c/0x1c0
[   21.777734]  __kasan_check_write+0x18/0x20
[   21.777761]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   21.777802]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.777844]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.777904]  ? trace_hardirqs_on+0x37/0xe0
[   21.777942]  ? kasan_bitops_generic+0x92/0x1c0
[   21.777982]  kasan_bitops_generic+0x121/0x1c0
[   21.778015]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.778051]  ? __pfx_read_tsc+0x10/0x10
[   21.778079]  ? ktime_get_ts64+0x86/0x230
[   21.778156]  kunit_try_run_case+0x1a5/0x480
[   21.778196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.778232]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.778274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.778310]  ? __kthread_parkme+0x82/0x180
[   21.778339]  ? preempt_count_sub+0x50/0x80
[   21.778369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.778404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.778438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.778473]  kthread+0x337/0x6f0
[   21.778500]  ? trace_preempt_on+0x20/0xc0
[   21.778531]  ? __pfx_kthread+0x10/0x10
[   21.778558]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.778589]  ? calculate_sigpending+0x7b/0xa0
[   21.778623]  ? __pfx_kthread+0x10/0x10
[   21.778653]  ret_from_fork+0x116/0x1d0
[   21.778679]  ? __pfx_kthread+0x10/0x10
[   21.778707]  ret_from_fork_asm+0x1a/0x30
[   21.778747]  </TASK>
[   21.778761] 
[   21.797822] Allocated by task 279:
[   21.798327]  kasan_save_stack+0x45/0x70
[   21.798795]  kasan_save_track+0x18/0x40
[   21.799247]  kasan_save_alloc_info+0x3b/0x50
[   21.799749]  __kasan_kmalloc+0xb7/0xc0
[   21.800229]  __kmalloc_cache_noprof+0x189/0x420
[   21.800719]  kasan_bitops_generic+0x92/0x1c0
[   21.801197]  kunit_try_run_case+0x1a5/0x480
[   21.801678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.802147]  kthread+0x337/0x6f0
[   21.802593]  ret_from_fork+0x116/0x1d0
[   21.803014]  ret_from_fork_asm+0x1a/0x30
[   21.803702] 
[   21.803979] The buggy address belongs to the object at ffff888101e49ec0
[   21.803979]  which belongs to the cache kmalloc-16 of size 16
[   21.804710] The buggy address is located 8 bytes inside of
[   21.804710]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.805774] 
[   21.806058] The buggy address belongs to the physical page:
[   21.806577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.807252] flags: 0x200000000000000(node=0|zone=2)
[   21.807780] page_type: f5(slab)
[   21.808257] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.808949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.809693] page dumped because: kasan: bad access detected
[   21.810232] 
[   21.810488] Memory state around the buggy address:
[   21.810981]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.811787]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.812602] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.813262]                                               ^
[   21.813761]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.814441]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.815055] ==================================================================
[   21.686268] ==================================================================
[   21.687248] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.688006] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.688678] 
[   21.688981] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.689099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.689136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.689201] Call Trace:
[   21.689240]  <TASK>
[   21.689284]  dump_stack_lvl+0x73/0xb0
[   21.689392]  print_report+0xd1/0x650
[   21.689500]  ? __virt_addr_valid+0x1db/0x2d0
[   21.689577]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.689662]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.689764]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.689898]  kasan_report+0x141/0x180
[   21.689977]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.690096]  kasan_check_range+0x10c/0x1c0
[   21.690209]  __kasan_check_write+0x18/0x20
[   21.690305]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   21.690352]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.690394]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.690431]  ? trace_hardirqs_on+0x37/0xe0
[   21.690464]  ? kasan_bitops_generic+0x92/0x1c0
[   21.690504]  kasan_bitops_generic+0x121/0x1c0
[   21.690539]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.690577]  ? __pfx_read_tsc+0x10/0x10
[   21.690608]  ? ktime_get_ts64+0x86/0x230
[   21.690642]  kunit_try_run_case+0x1a5/0x480
[   21.690676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.690712]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.690747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.690781]  ? __kthread_parkme+0x82/0x180
[   21.690810]  ? preempt_count_sub+0x50/0x80
[   21.690841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.690895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.690941]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.690977]  kthread+0x337/0x6f0
[   21.691005]  ? trace_preempt_on+0x20/0xc0
[   21.691037]  ? __pfx_kthread+0x10/0x10
[   21.691066]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.691106]  ? calculate_sigpending+0x7b/0xa0
[   21.691165]  ? __pfx_kthread+0x10/0x10
[   21.691199]  ret_from_fork+0x116/0x1d0
[   21.691225]  ? __pfx_kthread+0x10/0x10
[   21.691255]  ret_from_fork_asm+0x1a/0x30
[   21.691296]  </TASK>
[   21.691310] 
[   21.708602] Allocated by task 279:
[   21.708990]  kasan_save_stack+0x45/0x70
[   21.709556]  kasan_save_track+0x18/0x40
[   21.710039]  kasan_save_alloc_info+0x3b/0x50
[   21.710504]  __kasan_kmalloc+0xb7/0xc0
[   21.710968]  __kmalloc_cache_noprof+0x189/0x420
[   21.711598]  kasan_bitops_generic+0x92/0x1c0
[   21.712102]  kunit_try_run_case+0x1a5/0x480
[   21.712503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.712997]  kthread+0x337/0x6f0
[   21.713298]  ret_from_fork+0x116/0x1d0
[   21.713615]  ret_from_fork_asm+0x1a/0x30
[   21.713994] 
[   21.714328] The buggy address belongs to the object at ffff888101e49ec0
[   21.714328]  which belongs to the cache kmalloc-16 of size 16
[   21.715559] The buggy address is located 8 bytes inside of
[   21.715559]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.717999] 
[   21.718281] The buggy address belongs to the physical page:
[   21.718666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.719479] flags: 0x200000000000000(node=0|zone=2)
[   21.721019] page_type: f5(slab)
[   21.721587] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.722410] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.723591] page dumped because: kasan: bad access detected
[   21.724202] 
[   21.724388] Memory state around the buggy address:
[   21.724834]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.725455]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.726425] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.727166]                                               ^
[   21.727688]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.728640]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.729438] ==================================================================
[   21.816167] ==================================================================
[   21.817324] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.818060] Read of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.818792] 
[   21.819529] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.819652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.819692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.819750] Call Trace:
[   21.819791]  <TASK>
[   21.819832]  dump_stack_lvl+0x73/0xb0
[   21.819935]  print_report+0xd1/0x650
[   21.820008]  ? __virt_addr_valid+0x1db/0x2d0
[   21.820082]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.820167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.820241]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.820321]  kasan_report+0x141/0x180
[   21.820395]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.820489]  kasan_check_range+0x10c/0x1c0
[   21.820565]  __kasan_check_read+0x15/0x20
[   21.820632]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   21.820718]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.820808]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.820967]  ? trace_hardirqs_on+0x37/0xe0
[   21.821111]  ? kasan_bitops_generic+0x92/0x1c0
[   21.821202]  kasan_bitops_generic+0x121/0x1c0
[   21.821278]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.821359]  ? __pfx_read_tsc+0x10/0x10
[   21.821431]  ? ktime_get_ts64+0x86/0x230
[   21.821506]  kunit_try_run_case+0x1a5/0x480
[   21.821581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.821641]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.821681]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.821716]  ? __kthread_parkme+0x82/0x180
[   21.821746]  ? preempt_count_sub+0x50/0x80
[   21.821777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.821812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.821846]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.821908]  kthread+0x337/0x6f0
[   21.821942]  ? trace_preempt_on+0x20/0xc0
[   21.821975]  ? __pfx_kthread+0x10/0x10
[   21.822004]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.822036]  ? calculate_sigpending+0x7b/0xa0
[   21.822072]  ? __pfx_kthread+0x10/0x10
[   21.822113]  ret_from_fork+0x116/0x1d0
[   21.822162]  ? __pfx_kthread+0x10/0x10
[   21.822191]  ret_from_fork_asm+0x1a/0x30
[   21.822234]  </TASK>
[   21.822250] 
[   21.840249] Allocated by task 279:
[   21.840687]  kasan_save_stack+0x45/0x70
[   21.841172]  kasan_save_track+0x18/0x40
[   21.841663]  kasan_save_alloc_info+0x3b/0x50
[   21.842187]  __kasan_kmalloc+0xb7/0xc0
[   21.842696]  __kmalloc_cache_noprof+0x189/0x420
[   21.843246]  kasan_bitops_generic+0x92/0x1c0
[   21.843772]  kunit_try_run_case+0x1a5/0x480
[   21.844134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.844528]  kthread+0x337/0x6f0
[   21.844822]  ret_from_fork+0x116/0x1d0
[   21.845393]  ret_from_fork_asm+0x1a/0x30
[   21.845852] 
[   21.846105] The buggy address belongs to the object at ffff888101e49ec0
[   21.846105]  which belongs to the cache kmalloc-16 of size 16
[   21.847615] The buggy address is located 8 bytes inside of
[   21.847615]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.848326] 
[   21.848515] The buggy address belongs to the physical page:
[   21.849153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.849906] flags: 0x200000000000000(node=0|zone=2)
[   21.851776] page_type: f5(slab)
[   21.852164] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.852832] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.854306] page dumped because: kasan: bad access detected
[   21.855064] 
[   21.855456] Memory state around the buggy address:
[   21.855791]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.856478]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.857017] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.857644]                                               ^
[   21.858528]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.859076]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.860934] ==================================================================
[   21.638723] ==================================================================
[   21.639285] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.640414] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.641214] 
[   21.641646] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.641940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.642174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.642239] Call Trace:
[   21.642300]  <TASK>
[   21.642347]  dump_stack_lvl+0x73/0xb0
[   21.642643]  print_report+0xd1/0x650
[   21.642685]  ? __virt_addr_valid+0x1db/0x2d0
[   21.642721]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.642762]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.642792]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.642832]  kasan_report+0x141/0x180
[   21.642864]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.642941]  kasan_check_range+0x10c/0x1c0
[   21.642978]  __kasan_check_write+0x18/0x20
[   21.643007]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   21.643046]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.643087]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.643160]  ? trace_hardirqs_on+0x37/0xe0
[   21.643196]  ? kasan_bitops_generic+0x92/0x1c0
[   21.643237]  kasan_bitops_generic+0x121/0x1c0
[   21.643271]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.643308]  ? __pfx_read_tsc+0x10/0x10
[   21.643337]  ? ktime_get_ts64+0x86/0x230
[   21.643370]  kunit_try_run_case+0x1a5/0x480
[   21.643404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.643438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.643471]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.643504]  ? __kthread_parkme+0x82/0x180
[   21.643533]  ? preempt_count_sub+0x50/0x80
[   21.643565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.643601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.643636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.643670]  kthread+0x337/0x6f0
[   21.643697]  ? trace_preempt_on+0x20/0xc0
[   21.643728]  ? __pfx_kthread+0x10/0x10
[   21.643756]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.643787]  ? calculate_sigpending+0x7b/0xa0
[   21.643820]  ? __pfx_kthread+0x10/0x10
[   21.643849]  ret_from_fork+0x116/0x1d0
[   21.643894]  ? __pfx_kthread+0x10/0x10
[   21.643931]  ret_from_fork_asm+0x1a/0x30
[   21.643973]  </TASK>
[   21.643989] 
[   21.665631] Allocated by task 279:
[   21.666007]  kasan_save_stack+0x45/0x70
[   21.667001]  kasan_save_track+0x18/0x40
[   21.667698]  kasan_save_alloc_info+0x3b/0x50
[   21.668069]  __kasan_kmalloc+0xb7/0xc0
[   21.668930]  __kmalloc_cache_noprof+0x189/0x420
[   21.669569]  kasan_bitops_generic+0x92/0x1c0
[   21.669986]  kunit_try_run_case+0x1a5/0x480
[   21.670925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.671447]  kthread+0x337/0x6f0
[   21.671810]  ret_from_fork+0x116/0x1d0
[   21.672607]  ret_from_fork_asm+0x1a/0x30
[   21.672978] 
[   21.673182] The buggy address belongs to the object at ffff888101e49ec0
[   21.673182]  which belongs to the cache kmalloc-16 of size 16
[   21.674594] The buggy address is located 8 bytes inside of
[   21.674594]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.675940] 
[   21.676146] The buggy address belongs to the physical page:
[   21.676485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.677685] flags: 0x200000000000000(node=0|zone=2)
[   21.678122] page_type: f5(slab)
[   21.678502] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.679386] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.679645] page dumped because: kasan: bad access detected
[   21.679840] 
[   21.679958] Memory state around the buggy address:
[   21.680211]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.681593]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.682236] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.682755]                                               ^
[   21.683177]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.683809]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.684623] ==================================================================
[   21.730614] ==================================================================
[   21.731282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.732034] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.732940] 
[   21.733158] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.733257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.733291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.733341] Call Trace:
[   21.733375]  <TASK>
[   21.733413]  dump_stack_lvl+0x73/0xb0
[   21.733530]  print_report+0xd1/0x650
[   21.733616]  ? __virt_addr_valid+0x1db/0x2d0
[   21.733692]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.733778]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.733859]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.733970]  kasan_report+0x141/0x180
[   21.734048]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.734149]  kasan_check_range+0x10c/0x1c0
[   21.734233]  __kasan_check_write+0x18/0x20
[   21.734312]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   21.734433]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.734529]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.734609]  ? trace_hardirqs_on+0x37/0xe0
[   21.734682]  ? kasan_bitops_generic+0x92/0x1c0
[   21.734770]  kasan_bitops_generic+0x121/0x1c0
[   21.734845]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.734944]  ? __pfx_read_tsc+0x10/0x10
[   21.735015]  ? ktime_get_ts64+0x86/0x230
[   21.735098]  kunit_try_run_case+0x1a5/0x480
[   21.735215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.735327]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.735409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.735490]  ? __kthread_parkme+0x82/0x180
[   21.735559]  ? preempt_count_sub+0x50/0x80
[   21.735633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.735684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.735720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.735756]  kthread+0x337/0x6f0
[   21.735783]  ? trace_preempt_on+0x20/0xc0
[   21.735814]  ? __pfx_kthread+0x10/0x10
[   21.735842]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.735893]  ? calculate_sigpending+0x7b/0xa0
[   21.735940]  ? __pfx_kthread+0x10/0x10
[   21.735972]  ret_from_fork+0x116/0x1d0
[   21.735999]  ? __pfx_kthread+0x10/0x10
[   21.736028]  ret_from_fork_asm+0x1a/0x30
[   21.736069]  </TASK>
[   21.736084] 
[   21.753363] Allocated by task 279:
[   21.753727]  kasan_save_stack+0x45/0x70
[   21.754213]  kasan_save_track+0x18/0x40
[   21.754633]  kasan_save_alloc_info+0x3b/0x50
[   21.755072]  __kasan_kmalloc+0xb7/0xc0
[   21.755392]  __kmalloc_cache_noprof+0x189/0x420
[   21.755864]  kasan_bitops_generic+0x92/0x1c0
[   21.756465]  kunit_try_run_case+0x1a5/0x480
[   21.757055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.757621]  kthread+0x337/0x6f0
[   21.757951]  ret_from_fork+0x116/0x1d0
[   21.758589]  ret_from_fork_asm+0x1a/0x30
[   21.759008] 
[   21.759337] The buggy address belongs to the object at ffff888101e49ec0
[   21.759337]  which belongs to the cache kmalloc-16 of size 16
[   21.760341] The buggy address is located 8 bytes inside of
[   21.760341]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.761056] 
[   21.761250] The buggy address belongs to the physical page:
[   21.761772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.762721] flags: 0x200000000000000(node=0|zone=2)
[   21.763379] page_type: f5(slab)
[   21.763663] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.764326] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.765029] page dumped because: kasan: bad access detected
[   21.765538] 
[   21.765729] Memory state around the buggy address:
[   21.766137]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.766991]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.767962] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.768828]                                               ^
[   21.769452]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.769944]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.770628] ==================================================================
[   21.861818] ==================================================================
[   21.862518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.864803] Read of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.865448] 
[   21.865677] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.865774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.865802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.865849] Call Trace:
[   21.865895]  <TASK>
[   21.865925]  dump_stack_lvl+0x73/0xb0
[   21.865989]  print_report+0xd1/0x650
[   21.866042]  ? __virt_addr_valid+0x1db/0x2d0
[   21.866107]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.866189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.866272]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.866353]  kasan_report+0x141/0x180
[   21.866424]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.866517]  __asan_report_load8_noabort+0x18/0x20
[   21.866597]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   21.866679]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.866756]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.866815]  ? trace_hardirqs_on+0x37/0xe0
[   21.869217]  ? kasan_bitops_generic+0x92/0x1c0
[   21.869310]  kasan_bitops_generic+0x121/0x1c0
[   21.869387]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.869457]  ? __pfx_read_tsc+0x10/0x10
[   21.869511]  ? ktime_get_ts64+0x86/0x230
[   21.869568]  kunit_try_run_case+0x1a5/0x480
[   21.869627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.869682]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.869737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.869793]  ? __kthread_parkme+0x82/0x180
[   21.869843]  ? preempt_count_sub+0x50/0x80
[   21.869920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.869982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.870040]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.870097]  kthread+0x337/0x6f0
[   21.870149]  ? trace_preempt_on+0x20/0xc0
[   21.870203]  ? __pfx_kthread+0x10/0x10
[   21.870260]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.870315]  ? calculate_sigpending+0x7b/0xa0
[   21.870369]  ? __pfx_kthread+0x10/0x10
[   21.870420]  ret_from_fork+0x116/0x1d0
[   21.870462]  ? __pfx_kthread+0x10/0x10
[   21.870607]  ret_from_fork_asm+0x1a/0x30
[   21.870655]  </TASK>
[   21.870673] 
[   21.892536] Allocated by task 279:
[   21.892926]  kasan_save_stack+0x45/0x70
[   21.893381]  kasan_save_track+0x18/0x40
[   21.894350]  kasan_save_alloc_info+0x3b/0x50
[   21.894697]  __kasan_kmalloc+0xb7/0xc0
[   21.895075]  __kmalloc_cache_noprof+0x189/0x420
[   21.896095]  kasan_bitops_generic+0x92/0x1c0
[   21.896543]  kunit_try_run_case+0x1a5/0x480
[   21.896914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.897355]  kthread+0x337/0x6f0
[   21.897769]  ret_from_fork+0x116/0x1d0
[   21.898193]  ret_from_fork_asm+0x1a/0x30
[   21.898676] 
[   21.898917] The buggy address belongs to the object at ffff888101e49ec0
[   21.898917]  which belongs to the cache kmalloc-16 of size 16
[   21.899971] The buggy address is located 8 bytes inside of
[   21.899971]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.900934] 
[   21.901210] The buggy address belongs to the physical page:
[   21.901724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.902317] flags: 0x200000000000000(node=0|zone=2)
[   21.903005] page_type: f5(slab)
[   21.903351] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.904154] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.905193] page dumped because: kasan: bad access detected
[   21.905576] 
[   21.905788] Memory state around the buggy address:
[   21.906340]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.907092]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.907641] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.908777]                                               ^
[   21.909829]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.910362]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.911099] ==================================================================
[   21.538953] ==================================================================
[   21.540030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.541150] Write of size 8 at addr ffff888101e49ec8 by task kunit_try_catch/279
[   21.542065] 
[   21.542481] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.542594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.542634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.542687] Call Trace:
[   21.542726]  <TASK>
[   21.542764]  dump_stack_lvl+0x73/0xb0
[   21.542848]  print_report+0xd1/0x650
[   21.542984]  ? __virt_addr_valid+0x1db/0x2d0
[   21.543083]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.543259]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.543336]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.543418]  kasan_report+0x141/0x180
[   21.543489]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.543585]  kasan_check_range+0x10c/0x1c0
[   21.543658]  __kasan_check_write+0x18/0x20
[   21.543692]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   21.543735]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   21.543776]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.543812]  ? trace_hardirqs_on+0x37/0xe0
[   21.543842]  ? kasan_bitops_generic+0x92/0x1c0
[   21.543905]  kasan_bitops_generic+0x121/0x1c0
[   21.543948]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.543986]  ? __pfx_read_tsc+0x10/0x10
[   21.544016]  ? ktime_get_ts64+0x86/0x230
[   21.544050]  kunit_try_run_case+0x1a5/0x480
[   21.544085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.544181]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.544220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.544256]  ? __kthread_parkme+0x82/0x180
[   21.544285]  ? preempt_count_sub+0x50/0x80
[   21.544317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.544352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.544387]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.544423]  kthread+0x337/0x6f0
[   21.544450]  ? trace_preempt_on+0x20/0xc0
[   21.544481]  ? __pfx_kthread+0x10/0x10
[   21.544510]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.544541]  ? calculate_sigpending+0x7b/0xa0
[   21.544574]  ? __pfx_kthread+0x10/0x10
[   21.544603]  ret_from_fork+0x116/0x1d0
[   21.544628]  ? __pfx_kthread+0x10/0x10
[   21.544657]  ret_from_fork_asm+0x1a/0x30
[   21.544698]  </TASK>
[   21.544711] 
[   21.566390] Allocated by task 279:
[   21.566824]  kasan_save_stack+0x45/0x70
[   21.567931]  kasan_save_track+0x18/0x40
[   21.568337]  kasan_save_alloc_info+0x3b/0x50
[   21.569022]  __kasan_kmalloc+0xb7/0xc0
[   21.569488]  __kmalloc_cache_noprof+0x189/0x420
[   21.569718]  kasan_bitops_generic+0x92/0x1c0
[   21.569966]  kunit_try_run_case+0x1a5/0x480
[   21.570753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.571294]  kthread+0x337/0x6f0
[   21.571666]  ret_from_fork+0x116/0x1d0
[   21.572069]  ret_from_fork_asm+0x1a/0x30
[   21.572483] 
[   21.572670] The buggy address belongs to the object at ffff888101e49ec0
[   21.572670]  which belongs to the cache kmalloc-16 of size 16
[   21.573649] The buggy address is located 8 bytes inside of
[   21.573649]  allocated 9-byte region [ffff888101e49ec0, ffff888101e49ec9)
[   21.574865] 
[   21.575491] The buggy address belongs to the physical page:
[   21.576394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e49
[   21.577063] flags: 0x200000000000000(node=0|zone=2)
[   21.577824] page_type: f5(slab)
[   21.578081] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.578840] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.579632] page dumped because: kasan: bad access detected
[   21.580053] 
[   21.580707] Memory state around the buggy address:
[   21.581628]  ffff888101e49d80: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   21.582122]  ffff888101e49e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.582771] >ffff888101e49e80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.583535]                                               ^
[   21.584038]  ffff888101e49f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.585101]  ffff888101e49f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.585954] ==================================================================

[   23.062056] ==================================================================
[   23.062700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   23.063498] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   23.064157] 
[   23.064300] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.064321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.064328] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.064336] Call trace:
[   23.064341]  show_stack+0x20/0x38 (C)
[   23.064354]  dump_stack_lvl+0x8c/0xd0
[   23.064369]  print_report+0x118/0x608
[   23.064384]  kasan_report+0xdc/0x128
[   23.064398]  kasan_check_range+0x100/0x1a8
[   23.064414]  __kasan_check_write+0x20/0x30
[   23.064426]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   23.064443]  kasan_bitops_generic+0x11c/0x1c8
[   23.064457]  kunit_try_run_case+0x170/0x3f0
[   23.064471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.064488]  kthread+0x328/0x630
[   23.064499]  ret_from_fork+0x10/0x20
[   23.064513] 
[   23.070855] Allocated by task 314:
[   23.071163]  kasan_save_stack+0x3c/0x68
[   23.071516]  kasan_save_track+0x20/0x40
[   23.071869]  kasan_save_alloc_info+0x40/0x58
[   23.072261]  __kasan_kmalloc+0xd4/0xd8
[   23.072605]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.073017]  kasan_bitops_generic+0xa0/0x1c8
[   23.073408]  kunit_try_run_case+0x170/0x3f0
[   23.073790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.074287]  kthread+0x328/0x630
[   23.074584]  ret_from_fork+0x10/0x20
[   23.074913] 
[   23.075053] The buggy address belongs to the object at ffff00000223e620
[   23.075053]  which belongs to the cache kmalloc-16 of size 16
[   23.076143] The buggy address is located 8 bytes inside of
[   23.076143]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   23.077226] 
[   23.077367] The buggy address belongs to the physical page:
[   23.077865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   23.078563] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.079148] page_type: f5(slab)
[   23.079437] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.080128] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.080816] page dumped because: kasan: bad access detected
[   23.081314] 
[   23.081454] Memory state around the buggy address:
[   23.081884]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.082528]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.083172] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.083814]                                   ^
[   23.084222]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.084865]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.085507] ==================================================================
[   22.917362] ==================================================================
[   22.918014] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   22.918815] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.919485] 
[   22.919634] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.919665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.919675] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.919686] Call trace:
[   22.919693]  show_stack+0x20/0x38 (C)
[   22.919713]  dump_stack_lvl+0x8c/0xd0
[   22.919734]  print_report+0x118/0x608
[   22.919756]  kasan_report+0xdc/0x128
[   22.919777]  kasan_check_range+0x100/0x1a8
[   22.919801]  __kasan_check_write+0x20/0x30
[   22.919819]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   22.919843]  kasan_bitops_generic+0x11c/0x1c8
[   22.919864]  kunit_try_run_case+0x170/0x3f0
[   22.919885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.919910]  kthread+0x328/0x630
[   22.919926]  ret_from_fork+0x10/0x20
[   22.919945] 
[   22.926318] Allocated by task 314:
[   22.926633]  kasan_save_stack+0x3c/0x68
[   22.926994]  kasan_save_track+0x20/0x40
[   22.927356]  kasan_save_alloc_info+0x40/0x58
[   22.927757]  __kasan_kmalloc+0xd4/0xd8
[   22.928110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.928532]  kasan_bitops_generic+0xa0/0x1c8
[   22.928931]  kunit_try_run_case+0x170/0x3f0
[   22.929322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.929830]  kthread+0x328/0x630
[   22.930134]  ret_from_fork+0x10/0x20
[   22.930471] 
[   22.930617] The buggy address belongs to the object at ffff00000223e620
[   22.930617]  which belongs to the cache kmalloc-16 of size 16
[   22.931717] The buggy address is located 8 bytes inside of
[   22.931717]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.932813] 
[   22.932959] The buggy address belongs to the physical page:
[   22.933462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.934169] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.934762] page_type: f5(slab)
[   22.935060] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.935760] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.936456] page dumped because: kasan: bad access detected
[   22.936961] 
[   22.937108] Memory state around the buggy address:
[   22.937545]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.938199]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.938851] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.939502]                                   ^
[   22.939918]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.940570]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.941218] ==================================================================
[   22.942095] ==================================================================
[   22.942741] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   22.943540] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.944192] 
[   22.944335] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.944357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.944363] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.944370] Call trace:
[   22.944375]  show_stack+0x20/0x38 (C)
[   22.944389]  dump_stack_lvl+0x8c/0xd0
[   22.944404]  print_report+0x118/0x608
[   22.944419]  kasan_report+0xdc/0x128
[   22.944433]  __asan_report_load8_noabort+0x20/0x30
[   22.944451]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   22.944467]  kasan_bitops_generic+0x11c/0x1c8
[   22.944481]  kunit_try_run_case+0x170/0x3f0
[   22.944496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.944513]  kthread+0x328/0x630
[   22.944523]  ret_from_fork+0x10/0x20
[   22.944537] 
[   22.950579] Allocated by task 314:
[   22.950888]  kasan_save_stack+0x3c/0x68
[   22.951240]  kasan_save_track+0x20/0x40
[   22.951593]  kasan_save_alloc_info+0x40/0x58
[   22.951985]  __kasan_kmalloc+0xd4/0xd8
[   22.952329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.952742]  kasan_bitops_generic+0xa0/0x1c8
[   22.953132]  kunit_try_run_case+0x170/0x3f0
[   22.953514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.954011]  kthread+0x328/0x630
[   22.954307]  ret_from_fork+0x10/0x20
[   22.954635] 
[   22.954776] The buggy address belongs to the object at ffff00000223e620
[   22.954776]  which belongs to the cache kmalloc-16 of size 16
[   22.955866] The buggy address is located 8 bytes inside of
[   22.955866]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.956950] 
[   22.957091] The buggy address belongs to the physical page:
[   22.957589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.958287] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.958870] page_type: f5(slab)
[   22.959159] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.959850] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.960537] page dumped because: kasan: bad access detected
[   22.961035] 
[   22.961174] Memory state around the buggy address:
[   22.961605]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.962249]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.962892] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.963534]                                   ^
[   22.963942]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.964585]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.965227] ==================================================================
[   22.965964] ==================================================================
[   22.966610] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   22.967408] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.968068] 
[   22.968210] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.968232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.968238] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.968246] Call trace:
[   22.968250]  show_stack+0x20/0x38 (C)
[   22.968265]  dump_stack_lvl+0x8c/0xd0
[   22.968280]  print_report+0x118/0x608
[   22.968295]  kasan_report+0xdc/0x128
[   22.968309]  kasan_check_range+0x100/0x1a8
[   22.968325]  __kasan_check_write+0x20/0x30
[   22.968337]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   22.968354]  kasan_bitops_generic+0x11c/0x1c8
[   22.968367]  kunit_try_run_case+0x170/0x3f0
[   22.968382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.968399]  kthread+0x328/0x630
[   22.968411]  ret_from_fork+0x10/0x20
[   22.968424] 
[   22.974766] Allocated by task 314:
[   22.975074]  kasan_save_stack+0x3c/0x68
[   22.975427]  kasan_save_track+0x20/0x40
[   22.975780]  kasan_save_alloc_info+0x40/0x58
[   22.976172]  __kasan_kmalloc+0xd4/0xd8
[   22.976516]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.976929]  kasan_bitops_generic+0xa0/0x1c8
[   22.977320]  kunit_try_run_case+0x170/0x3f0
[   22.977701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.978198]  kthread+0x328/0x630
[   22.978494]  ret_from_fork+0x10/0x20
[   22.978823] 
[   22.978964] The buggy address belongs to the object at ffff00000223e620
[   22.978964]  which belongs to the cache kmalloc-16 of size 16
[   22.980053] The buggy address is located 8 bytes inside of
[   22.980053]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   22.981138] 
[   22.981278] The buggy address belongs to the physical page:
[   22.981776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   22.982474] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.983059] page_type: f5(slab)
[   22.983349] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.984039] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.984726] page dumped because: kasan: bad access detected
[   22.985222] 
[   22.985362] Memory state around the buggy address:
[   22.985792]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.986436]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.987080] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.987722]                                   ^
[   22.988129]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.988774]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.989415] ==================================================================
[   23.086244] ==================================================================
[   23.086888] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   23.087686] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   23.088339] 
[   23.088482] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.088504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.088510] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.088518] Call trace:
[   23.088523]  show_stack+0x20/0x38 (C)
[   23.088536]  dump_stack_lvl+0x8c/0xd0
[   23.088552]  print_report+0x118/0x608
[   23.088566]  kasan_report+0xdc/0x128
[   23.088581]  __asan_report_load8_noabort+0x20/0x30
[   23.088599]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   23.088616]  kasan_bitops_generic+0x11c/0x1c8
[   23.088630]  kunit_try_run_case+0x170/0x3f0
[   23.088645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.088662]  kthread+0x328/0x630
[   23.088673]  ret_from_fork+0x10/0x20
[   23.088686] 
[   23.094729] Allocated by task 314:
[   23.095037]  kasan_save_stack+0x3c/0x68
[   23.095390]  kasan_save_track+0x20/0x40
[   23.095742]  kasan_save_alloc_info+0x40/0x58
[   23.096134]  __kasan_kmalloc+0xd4/0xd8
[   23.096480]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.096892]  kasan_bitops_generic+0xa0/0x1c8
[   23.097282]  kunit_try_run_case+0x170/0x3f0
[   23.097664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.098162]  kthread+0x328/0x630
[   23.098458]  ret_from_fork+0x10/0x20
[   23.098786] 
[   23.098927] The buggy address belongs to the object at ffff00000223e620
[   23.098927]  which belongs to the cache kmalloc-16 of size 16
[   23.100016] The buggy address is located 8 bytes inside of
[   23.100016]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   23.101101] 
[   23.101241] The buggy address belongs to the physical page:
[   23.101739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   23.102437] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.103022] page_type: f5(slab)
[   23.103310] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.104001] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.104688] page dumped because: kasan: bad access detected
[   23.105184] 
[   23.105324] Memory state around the buggy address:
[   23.105754]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.106398]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.107042] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.107684]                                   ^
[   23.108092]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.108735]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.109377] ==================================================================
[   23.013983] ==================================================================
[   23.014628] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   23.015426] Write of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   23.016086] 
[   23.016229] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.016251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.016258] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.016265] Call trace:
[   23.016270]  show_stack+0x20/0x38 (C)
[   23.016283]  dump_stack_lvl+0x8c/0xd0
[   23.016298]  print_report+0x118/0x608
[   23.016313]  kasan_report+0xdc/0x128
[   23.016328]  kasan_check_range+0x100/0x1a8
[   23.016344]  __kasan_check_write+0x20/0x30
[   23.016357]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   23.016373]  kasan_bitops_generic+0x11c/0x1c8
[   23.016387]  kunit_try_run_case+0x170/0x3f0
[   23.016402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.016418]  kthread+0x328/0x630
[   23.016429]  ret_from_fork+0x10/0x20
[   23.016443] 
[   23.022783] Allocated by task 314:
[   23.023091]  kasan_save_stack+0x3c/0x68
[   23.023444]  kasan_save_track+0x20/0x40
[   23.023797]  kasan_save_alloc_info+0x40/0x58
[   23.024188]  __kasan_kmalloc+0xd4/0xd8
[   23.024532]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.024945]  kasan_bitops_generic+0xa0/0x1c8
[   23.025335]  kunit_try_run_case+0x170/0x3f0
[   23.025717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.026214]  kthread+0x328/0x630
[   23.026510]  ret_from_fork+0x10/0x20
[   23.026839] 
[   23.026979] The buggy address belongs to the object at ffff00000223e620
[   23.026979]  which belongs to the cache kmalloc-16 of size 16
[   23.028068] The buggy address is located 8 bytes inside of
[   23.028068]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   23.029153] 
[   23.029294] The buggy address belongs to the physical page:
[   23.029791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   23.030489] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.031073] page_type: f5(slab)
[   23.031363] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.032053] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.032740] page dumped because: kasan: bad access detected
[   23.033236] 
[   23.033377] Memory state around the buggy address:
[   23.033806]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.034450]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.035093] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.035735]                                   ^
[   23.036143]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.036787]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.037429] ==================================================================
[   23.038196] ==================================================================
[   23.038843] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   23.039643] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   23.040295] 
[   23.040439] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.040461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.040467] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.040475] Call trace:
[   23.040480]  show_stack+0x20/0x38 (C)
[   23.040494]  dump_stack_lvl+0x8c/0xd0
[   23.040510]  print_report+0x118/0x608
[   23.040525]  kasan_report+0xdc/0x128
[   23.040540]  __asan_report_load8_noabort+0x20/0x30
[   23.040557]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   23.040574]  kasan_bitops_generic+0x11c/0x1c8
[   23.040589]  kunit_try_run_case+0x170/0x3f0
[   23.040604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.040621]  kthread+0x328/0x630
[   23.040632]  ret_from_fork+0x10/0x20
[   23.040646] 
[   23.046690] Allocated by task 314:
[   23.046998]  kasan_save_stack+0x3c/0x68
[   23.047351]  kasan_save_track+0x20/0x40
[   23.047704]  kasan_save_alloc_info+0x40/0x58
[   23.048096]  __kasan_kmalloc+0xd4/0xd8
[   23.048440]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.048853]  kasan_bitops_generic+0xa0/0x1c8
[   23.049244]  kunit_try_run_case+0x170/0x3f0
[   23.049626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.050123]  kthread+0x328/0x630
[   23.050420]  ret_from_fork+0x10/0x20
[   23.050748] 
[   23.050889] The buggy address belongs to the object at ffff00000223e620
[   23.050889]  which belongs to the cache kmalloc-16 of size 16
[   23.051979] The buggy address is located 8 bytes inside of
[   23.051979]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   23.053063] 
[   23.053204] The buggy address belongs to the physical page:
[   23.053702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   23.054399] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.054985] page_type: f5(slab)
[   23.055275] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.055965] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.056652] page dumped because: kasan: bad access detected
[   23.057149] 
[   23.057289] Memory state around the buggy address:
[   23.057719]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.058363]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.059007] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.059649]                                   ^
[   23.060056]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.060700]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.061342] ==================================================================
[   23.110108] ==================================================================
[   23.110752] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   23.111551] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   23.112204] 
[   23.112347] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.112368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.112374] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.112382] Call trace:
[   23.112386]  show_stack+0x20/0x38 (C)
[   23.112400]  dump_stack_lvl+0x8c/0xd0
[   23.112415]  print_report+0x118/0x608
[   23.112430]  kasan_report+0xdc/0x128
[   23.112445]  __asan_report_load8_noabort+0x20/0x30
[   23.112462]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   23.112479]  kasan_bitops_generic+0x11c/0x1c8
[   23.112492]  kunit_try_run_case+0x170/0x3f0
[   23.112507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.112524]  kthread+0x328/0x630
[   23.112535]  ret_from_fork+0x10/0x20
[   23.112548] 
[   23.118590] Allocated by task 314:
[   23.118898]  kasan_save_stack+0x3c/0x68
[   23.119251]  kasan_save_track+0x20/0x40
[   23.119604]  kasan_save_alloc_info+0x40/0x58
[   23.119995]  __kasan_kmalloc+0xd4/0xd8
[   23.120339]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.120751]  kasan_bitops_generic+0xa0/0x1c8
[   23.121142]  kunit_try_run_case+0x170/0x3f0
[   23.121524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.122021]  kthread+0x328/0x630
[   23.122317]  ret_from_fork+0x10/0x20
[   23.122645] 
[   23.122785] The buggy address belongs to the object at ffff00000223e620
[   23.122785]  which belongs to the cache kmalloc-16 of size 16
[   23.123875] The buggy address is located 8 bytes inside of
[   23.123875]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   23.124959] 
[   23.125100] The buggy address belongs to the physical page:
[   23.125598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   23.126296] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.126880] page_type: f5(slab)
[   23.127170] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.127861] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.128549] page dumped because: kasan: bad access detected
[   23.129047] 
[   23.129187] Memory state around the buggy address:
[   23.129616]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.130260]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.130904] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.131545]                                   ^
[   23.131954]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.132598]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.133240] ==================================================================
[   22.990128] ==================================================================
[   22.990772] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   22.991571] Read of size 8 at addr ffff00000223e628 by task kunit_try_catch/314
[   22.992224] 
[   22.992367] CPU: 4 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.992388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.992395] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.992402] Call trace:
[   22.992407]  show_stack+0x20/0x38 (C)
[   22.992421]  dump_stack_lvl+0x8c/0xd0
[   22.992435]  print_report+0x118/0x608
[   22.992450]  kasan_report+0xdc/0x128
[   22.992464]  __asan_report_load8_noabort+0x20/0x30
[   22.992482]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   22.992499]  kasan_bitops_generic+0x11c/0x1c8
[   22.992513]  kunit_try_run_case+0x170/0x3f0
[   22.992528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.992545]  kthread+0x328/0x630
[   22.992555]  ret_from_fork+0x10/0x20
[   22.992569] 
[   22.998610] Allocated by task 314:
[   22.998918]  kasan_save_stack+0x3c/0x68
[   22.999271]  kasan_save_track+0x20/0x40
[   22.999624]  kasan_save_alloc_info+0x40/0x58
[   23.000016]  __kasan_kmalloc+0xd4/0xd8
[   23.000360]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.000772]  kasan_bitops_generic+0xa0/0x1c8
[   23.001162]  kunit_try_run_case+0x170/0x3f0
[   23.001544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.002041]  kthread+0x328/0x630
[   23.002337]  ret_from_fork+0x10/0x20
[   23.002667] 
[   23.002807] The buggy address belongs to the object at ffff00000223e620
[   23.002807]  which belongs to the cache kmalloc-16 of size 16
[   23.003897] The buggy address is located 8 bytes inside of
[   23.003897]  allocated 9-byte region [ffff00000223e620, ffff00000223e629)
[   23.004981] 
[   23.005121] The buggy address belongs to the physical page:
[   23.005618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x223e
[   23.006317] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.006902] page_type: f5(slab)
[   23.007192] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   23.007883] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.008570] page dumped because: kasan: bad access detected
[   23.009067] 
[   23.009207] Memory state around the buggy address:
[   23.009636]  ffff00000223e500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.010280]  ffff00000223e580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   23.010923] >ffff00000223e600: 00 06 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   23.011565]                                   ^
[   23.011973]  ffff00000223e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.012616]  ffff00000223e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.013258] ==================================================================