Hay
Date
July 12, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.807047] ==================================================================
[   18.807101] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.807155] Read of size 8 at addr fff00000c45d1b08 by task kunit_try_catch/261
[   18.807228] 
[   18.807261] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.807344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.808438] Hardware name: linux,dummy-virt (DT)
[   18.808492] Call trace:
[   18.808665]  show_stack+0x20/0x38 (C)
[   18.808723]  dump_stack_lvl+0x8c/0xd0
[   18.808848]  print_report+0x118/0x5d0
[   18.808898]  kasan_report+0xdc/0x128
[   18.808947]  __asan_report_load8_noabort+0x20/0x30
[   18.809075]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.809132]  kasan_bitops_generic+0x110/0x1c8
[   18.809682]  kunit_try_run_case+0x170/0x3f0
[   18.810393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.810738]  kthread+0x328/0x630
[   18.811019]  ret_from_fork+0x10/0x20
[   18.811368] 
[   18.811392] Allocated by task 261:
[   18.811645]  kasan_save_stack+0x3c/0x68
[   18.811719]  kasan_save_track+0x20/0x40
[   18.811918]  kasan_save_alloc_info+0x40/0x58
[   18.812180]  __kasan_kmalloc+0xd4/0xd8
[   18.812784]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.813055]  kasan_bitops_generic+0xa0/0x1c8
[   18.813101]  kunit_try_run_case+0x170/0x3f0
[   18.813338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.813477]  kthread+0x328/0x630
[   18.813515]  ret_from_fork+0x10/0x20
[   18.813892] 
[   18.814187] The buggy address belongs to the object at fff00000c45d1b00
[   18.814187]  which belongs to the cache kmalloc-16 of size 16
[   18.814474] The buggy address is located 8 bytes inside of
[   18.814474]  allocated 9-byte region [fff00000c45d1b00, fff00000c45d1b09)
[   18.814546] 
[   18.814986] The buggy address belongs to the physical page:
[   18.815037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d1
[   18.815107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.815392] page_type: f5(slab)
[   18.815444] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.815890] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.816167] page dumped because: kasan: bad access detected
[   18.816253] 
[   18.816503] Memory state around the buggy address:
[   18.816542]  fff00000c45d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.816865]  fff00000c45d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.816999] >fff00000c45d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.817313]                       ^
[   18.817580]  fff00000c45d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.817762]  fff00000c45d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.818039] ==================================================================
[   18.832761] ==================================================================
[   18.832825] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   18.832881] Read of size 8 at addr fff00000c45d1b08 by task kunit_try_catch/261
[   18.833421] 
[   18.833545] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.833639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.833668] Hardware name: linux,dummy-virt (DT)
[   18.833704] Call trace:
[   18.833727]  show_stack+0x20/0x38 (C)
[   18.833780]  dump_stack_lvl+0x8c/0xd0
[   18.833828]  print_report+0x118/0x5d0
[   18.833877]  kasan_report+0xdc/0x128
[   18.833923]  __asan_report_load8_noabort+0x20/0x30
[   18.835337]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   18.835595]  kasan_bitops_generic+0x110/0x1c8
[   18.835784]  kunit_try_run_case+0x170/0x3f0
[   18.836390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.836787]  kthread+0x328/0x630
[   18.836843]  ret_from_fork+0x10/0x20
[   18.836903] 
[   18.836923] Allocated by task 261:
[   18.836955]  kasan_save_stack+0x3c/0x68
[   18.837534]  kasan_save_track+0x20/0x40
[   18.837596]  kasan_save_alloc_info+0x40/0x58
[   18.837971]  __kasan_kmalloc+0xd4/0xd8
[   18.838091]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.838416]  kasan_bitops_generic+0xa0/0x1c8
[   18.838572]  kunit_try_run_case+0x170/0x3f0
[   18.838860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.839115]  kthread+0x328/0x630
[   18.839320]  ret_from_fork+0x10/0x20
[   18.839759] 
[   18.839838] The buggy address belongs to the object at fff00000c45d1b00
[   18.839838]  which belongs to the cache kmalloc-16 of size 16
[   18.839910] The buggy address is located 8 bytes inside of
[   18.839910]  allocated 9-byte region [fff00000c45d1b00, fff00000c45d1b09)
[   18.839976] 
[   18.840696] The buggy address belongs to the physical page:
[   18.840733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d1
[   18.840797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.840853] page_type: f5(slab)
[   18.840896] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.841109] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.841794] page dumped because: kasan: bad access detected
[   18.841974] 
[   18.841995] Memory state around the buggy address:
[   18.842380]  fff00000c45d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.842434]  fff00000c45d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.843064] >fff00000c45d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.843259]                       ^
[   18.843298]  fff00000c45d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.843346]  fff00000c45d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.843575] ==================================================================
[   18.845776] ==================================================================
[   18.845830] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   18.845884] Write of size 8 at addr fff00000c45d1b08 by task kunit_try_catch/261
[   18.845944] 
[   18.845976] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.846063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.846092] Hardware name: linux,dummy-virt (DT)
[   18.847312] Call trace:
[   18.847357]  show_stack+0x20/0x38 (C)
[   18.847418]  dump_stack_lvl+0x8c/0xd0
[   18.847475]  print_report+0x118/0x5d0
[   18.847524]  kasan_report+0xdc/0x128
[   18.847572]  kasan_check_range+0x100/0x1a8
[   18.848042]  __kasan_check_write+0x20/0x30
[   18.848130]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   18.848198]  kasan_bitops_generic+0x110/0x1c8
[   18.848248]  kunit_try_run_case+0x170/0x3f0
[   18.848728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.848886]  kthread+0x328/0x630
[   18.849264]  ret_from_fork+0x10/0x20
[   18.849343] 
[   18.849365] Allocated by task 261:
[   18.849401]  kasan_save_stack+0x3c/0x68
[   18.849448]  kasan_save_track+0x20/0x40
[   18.849490]  kasan_save_alloc_info+0x40/0x58
[   18.849532]  __kasan_kmalloc+0xd4/0xd8
[   18.850282]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.850355]  kasan_bitops_generic+0xa0/0x1c8
[   18.850619]  kunit_try_run_case+0x170/0x3f0
[   18.850664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.850712]  kthread+0x328/0x630
[   18.851164]  ret_from_fork+0x10/0x20
[   18.851375] 
[   18.851403] The buggy address belongs to the object at fff00000c45d1b00
[   18.851403]  which belongs to the cache kmalloc-16 of size 16
[   18.851849] The buggy address is located 8 bytes inside of
[   18.851849]  allocated 9-byte region [fff00000c45d1b00, fff00000c45d1b09)
[   18.851924] 
[   18.852305] The buggy address belongs to the physical page:
[   18.852583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d1
[   18.852848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.853140] page_type: f5(slab)
[   18.853320] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.853597] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.853645] page dumped because: kasan: bad access detected
[   18.854437]  fff00000c45d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.857296] Call trace:
[   18.859066]  __kasan_check_write+0x20/0x30
[   18.859578]  kasan_save_alloc_info+0x40/0x58
[   18.862725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.863978] 
[   18.865198]                       ^
[   18.865918] ==================================================================
[   18.819376] ==================================================================
[   18.819438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   18.819494] Write of size 8 at addr fff00000c45d1b08 by task kunit_try_catch/261
[   18.819548] 
[   18.819580] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.819666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.819694] Hardware name: linux,dummy-virt (DT)
[   18.820744] Call trace:
[   18.820786]  show_stack+0x20/0x38 (C)
[   18.822297]  dump_stack_lvl+0x8c/0xd0
[   18.822397]  print_report+0x118/0x5d0
[   18.822692]  kasan_report+0xdc/0x128
[   18.822827]  kasan_check_range+0x100/0x1a8
[   18.823091]  __kasan_check_write+0x20/0x30
[   18.823498]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   18.823566]  kasan_bitops_generic+0x110/0x1c8
[   18.823989]  kunit_try_run_case+0x170/0x3f0
[   18.824054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.824521]  kthread+0x328/0x630
[   18.824602]  ret_from_fork+0x10/0x20
[   18.825023] 
[   18.825057] Allocated by task 261:
[   18.825268]  kasan_save_stack+0x3c/0x68
[   18.825564]  kasan_save_track+0x20/0x40
[   18.825848]  kasan_save_alloc_info+0x40/0x58
[   18.825997]  __kasan_kmalloc+0xd4/0xd8
[   18.826041]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.826084]  kasan_bitops_generic+0xa0/0x1c8
[   18.826124]  kunit_try_run_case+0x170/0x3f0
[   18.826165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.826222]  kthread+0x328/0x630
[   18.826967]  ret_from_fork+0x10/0x20
[   18.827335] 
[   18.827360] The buggy address belongs to the object at fff00000c45d1b00
[   18.827360]  which belongs to the cache kmalloc-16 of size 16
[   18.827675] The buggy address is located 8 bytes inside of
[   18.827675]  allocated 9-byte region [fff00000c45d1b00, fff00000c45d1b09)
[   18.827819] 
[   18.828045] The buggy address belongs to the physical page:
[   18.828085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d1
[   18.828578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.828721] page_type: f5(slab)
[   18.828764] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.829106] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.829415] page dumped because: kasan: bad access detected
[   18.829469] 
[   18.829661] Memory state around the buggy address:
[   18.829700]  fff00000c45d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.830116]  fff00000c45d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.830180] >fff00000c45d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.830908]                       ^
[   18.831208]  fff00000c45d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.831285]  fff00000c45d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.831327] ==================================================================
[   18.794315] ==================================================================
[   18.794380] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.794437] Write of size 8 at addr fff00000c45d1b08 by task kunit_try_catch/261
[   18.794489] 
[   18.794521] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   18.796318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.796369] Hardware name: linux,dummy-virt (DT)
[   18.796882] Call trace:
[   18.797116]  show_stack+0x20/0x38 (C)
[   18.797256]  dump_stack_lvl+0x8c/0xd0
[   18.797550]  print_report+0x118/0x5d0
[   18.797602]  kasan_report+0xdc/0x128
[   18.798082]  kasan_check_range+0x100/0x1a8
[   18.798142]  __kasan_check_write+0x20/0x30
[   18.798910]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.799205]  kasan_bitops_generic+0x110/0x1c8
[   18.799314]  kunit_try_run_case+0x170/0x3f0
[   18.799366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.799524]  kthread+0x328/0x630
[   18.799577]  ret_from_fork+0x10/0x20
[   18.799771] 
[   18.799797] Allocated by task 261:
[   18.799977]  kasan_save_stack+0x3c/0x68
[   18.800159]  kasan_save_track+0x20/0x40
[   18.800236]  kasan_save_alloc_info+0x40/0x58
[   18.800996]  __kasan_kmalloc+0xd4/0xd8
[   18.801241]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.801355]  kasan_bitops_generic+0xa0/0x1c8
[   18.801403]  kunit_try_run_case+0x170/0x3f0
[   18.801883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.801953]  kthread+0x328/0x630
[   18.801989]  ret_from_fork+0x10/0x20
[   18.802496] 
[   18.802694] The buggy address belongs to the object at fff00000c45d1b00
[   18.802694]  which belongs to the cache kmalloc-16 of size 16
[   18.802928] The buggy address is located 8 bytes inside of
[   18.802928]  allocated 9-byte region [fff00000c45d1b00, fff00000c45d1b09)
[   18.803089] 
[   18.803114] The buggy address belongs to the physical page:
[   18.803469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d1
[   18.803536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.803731] page_type: f5(slab)
[   18.804044] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.804232] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.804278] page dumped because: kasan: bad access detected
[   18.804316] 
[   18.804409] Memory state around the buggy address:
[   18.804447]  fff00000c45d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.804874]  fff00000c45d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.805195] >fff00000c45d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.805402]                       ^
[   18.805474]  fff00000c45d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.805540]  fff00000c45d1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.805584] ==================================================================

[   15.060506] ==================================================================
[   15.060825] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.061131] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278
[   15.061601] 
[   15.061722] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.061766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.061778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.061800] Call Trace:
[   15.061818]  <TASK>
[   15.061833]  dump_stack_lvl+0x73/0xb0
[   15.061863]  print_report+0xd1/0x610
[   15.061886]  ? __virt_addr_valid+0x1db/0x2d0
[   15.061910]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.061937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.061961]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.061988]  kasan_report+0x141/0x180
[   15.062010]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.062042]  kasan_check_range+0x10c/0x1c0
[   15.062128]  __kasan_check_write+0x18/0x20
[   15.062153]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.062181]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.062210]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.062236]  ? trace_hardirqs_on+0x37/0xe0
[   15.062259]  ? kasan_bitops_generic+0x92/0x1c0
[   15.062299]  kasan_bitops_generic+0x116/0x1c0
[   15.062323]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.062350]  ? __pfx_read_tsc+0x10/0x10
[   15.062372]  ? ktime_get_ts64+0x86/0x230
[   15.062397]  kunit_try_run_case+0x1a5/0x480
[   15.062422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.062445]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.062471]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.062496]  ? __kthread_parkme+0x82/0x180
[   15.062518]  ? preempt_count_sub+0x50/0x80
[   15.062542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.062567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.062593]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.062619]  kthread+0x337/0x6f0
[   15.062639]  ? trace_preempt_on+0x20/0xc0
[   15.062661]  ? __pfx_kthread+0x10/0x10
[   15.062682]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.062708]  ? calculate_sigpending+0x7b/0xa0
[   15.062734]  ? __pfx_kthread+0x10/0x10
[   15.062755]  ret_from_fork+0x116/0x1d0
[   15.062774]  ? __pfx_kthread+0x10/0x10
[   15.062794]  ret_from_fork_asm+0x1a/0x30
[   15.062826]  </TASK>
[   15.062836] 
[   15.070805] Allocated by task 278:
[   15.070951]  kasan_save_stack+0x45/0x70
[   15.071149]  kasan_save_track+0x18/0x40
[   15.071351]  kasan_save_alloc_info+0x3b/0x50
[   15.071558]  __kasan_kmalloc+0xb7/0xc0
[   15.071745]  __kmalloc_cache_noprof+0x189/0x420
[   15.071962]  kasan_bitops_generic+0x92/0x1c0
[   15.072165]  kunit_try_run_case+0x1a5/0x480
[   15.072398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.072739]  kthread+0x337/0x6f0
[   15.072859]  ret_from_fork+0x116/0x1d0
[   15.073051]  ret_from_fork_asm+0x1a/0x30
[   15.073422] 
[   15.073551] The buggy address belongs to the object at ffff888101c9b4a0
[   15.073551]  which belongs to the cache kmalloc-16 of size 16
[   15.074242] The buggy address is located 8 bytes inside of
[   15.074242]  allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9)
[   15.074687] 
[   15.074791] The buggy address belongs to the physical page:
[   15.075058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b
[   15.075511] flags: 0x200000000000000(node=0|zone=2)
[   15.075725] page_type: f5(slab)
[   15.075893] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.076294] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.076560] page dumped because: kasan: bad access detected
[   15.076731] 
[   15.076801] Memory state around the buggy address:
[   15.077041]  ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   15.077368]  ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   15.077679] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.077972]                                   ^
[   15.078199]  ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.078429]  ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.078670] ==================================================================
[   15.140898] ==================================================================
[   15.141180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.141576] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278
[   15.141900] 
[   15.142006] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.142047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.142060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.142081] Call Trace:
[   15.142093]  <TASK>
[   15.142106]  dump_stack_lvl+0x73/0xb0
[   15.142133]  print_report+0xd1/0x610
[   15.142155]  ? __virt_addr_valid+0x1db/0x2d0
[   15.142177]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.142205]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.142228]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.142256]  kasan_report+0x141/0x180
[   15.142289]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.142321]  kasan_check_range+0x10c/0x1c0
[   15.142345]  __kasan_check_write+0x18/0x20
[   15.142364]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.142391]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.142420]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.142444]  ? trace_hardirqs_on+0x37/0xe0
[   15.142467]  ? kasan_bitops_generic+0x92/0x1c0
[   15.142494]  kasan_bitops_generic+0x116/0x1c0
[   15.142518]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.142544]  ? __pfx_read_tsc+0x10/0x10
[   15.142563]  ? ktime_get_ts64+0x86/0x230
[   15.142586]  kunit_try_run_case+0x1a5/0x480
[   15.142610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.142633]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.142657]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.142682]  ? __kthread_parkme+0x82/0x180
[   15.142701]  ? preempt_count_sub+0x50/0x80
[   15.142729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.142754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.142779]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.142805]  kthread+0x337/0x6f0
[   15.142823]  ? trace_preempt_on+0x20/0xc0
[   15.142845]  ? __pfx_kthread+0x10/0x10
[   15.142865]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.142887]  ? calculate_sigpending+0x7b/0xa0
[   15.142910]  ? __pfx_kthread+0x10/0x10
[   15.142931]  ret_from_fork+0x116/0x1d0
[   15.142950]  ? __pfx_kthread+0x10/0x10
[   15.142970]  ret_from_fork_asm+0x1a/0x30
[   15.143000]  </TASK>
[   15.143010] 
[   15.151406] Allocated by task 278:
[   15.151576]  kasan_save_stack+0x45/0x70
[   15.151774]  kasan_save_track+0x18/0x40
[   15.151932]  kasan_save_alloc_info+0x3b/0x50
[   15.152228]  __kasan_kmalloc+0xb7/0xc0
[   15.152396]  __kmalloc_cache_noprof+0x189/0x420
[   15.152553]  kasan_bitops_generic+0x92/0x1c0
[   15.152704]  kunit_try_run_case+0x1a5/0x480
[   15.152851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.153104]  kthread+0x337/0x6f0
[   15.153295]  ret_from_fork+0x116/0x1d0
[   15.153481]  ret_from_fork_asm+0x1a/0x30
[   15.153838] 
[   15.154166] The buggy address belongs to the object at ffff888101c9b4a0
[   15.154166]  which belongs to the cache kmalloc-16 of size 16
[   15.154658] The buggy address is located 8 bytes inside of
[   15.154658]  allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9)
[   15.155079] 
[   15.155179] The buggy address belongs to the physical page:
[   15.155446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b
[   15.155803] flags: 0x200000000000000(node=0|zone=2)
[   15.156114] page_type: f5(slab)
[   15.156246] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.156509] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.156823] page dumped because: kasan: bad access detected
[   15.157084] 
[   15.157181] Memory state around the buggy address:
[   15.157394]  ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   15.157625]  ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   15.157946] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.158238]                                   ^
[   15.158526]  ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.158831]  ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.159158] ==================================================================
[   15.041683] ==================================================================
[   15.042006] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.042530] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278
[   15.042801] 
[   15.042916] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.042960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.042971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.042993] Call Trace:
[   15.043007]  <TASK>
[   15.043023]  dump_stack_lvl+0x73/0xb0
[   15.043110]  print_report+0xd1/0x610
[   15.043134]  ? __virt_addr_valid+0x1db/0x2d0
[   15.043158]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.043186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.043210]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.043238]  kasan_report+0x141/0x180
[   15.043259]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.043303]  kasan_check_range+0x10c/0x1c0
[   15.043327]  __kasan_check_write+0x18/0x20
[   15.043347]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.043374]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.043403]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.043428]  ? trace_hardirqs_on+0x37/0xe0
[   15.043452]  ? kasan_bitops_generic+0x92/0x1c0
[   15.043480]  kasan_bitops_generic+0x116/0x1c0
[   15.043504]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.043529]  ? __pfx_read_tsc+0x10/0x10
[   15.043551]  ? ktime_get_ts64+0x86/0x230
[   15.043577]  kunit_try_run_case+0x1a5/0x480
[   15.043603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.043626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.043652]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.043676]  ? __kthread_parkme+0x82/0x180
[   15.043699]  ? preempt_count_sub+0x50/0x80
[   15.043724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.043749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.043774]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.043800]  kthread+0x337/0x6f0
[   15.043819]  ? trace_preempt_on+0x20/0xc0
[   15.043841]  ? __pfx_kthread+0x10/0x10
[   15.043862]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.043883]  ? calculate_sigpending+0x7b/0xa0
[   15.043910]  ? __pfx_kthread+0x10/0x10
[   15.043932]  ret_from_fork+0x116/0x1d0
[   15.043951]  ? __pfx_kthread+0x10/0x10
[   15.043972]  ret_from_fork_asm+0x1a/0x30
[   15.044052]  </TASK>
[   15.044061] 
[   15.052517] Allocated by task 278:
[   15.052677]  kasan_save_stack+0x45/0x70
[   15.052825]  kasan_save_track+0x18/0x40
[   15.052959]  kasan_save_alloc_info+0x3b/0x50
[   15.053180]  __kasan_kmalloc+0xb7/0xc0
[   15.053383]  __kmalloc_cache_noprof+0x189/0x420
[   15.053603]  kasan_bitops_generic+0x92/0x1c0
[   15.053821]  kunit_try_run_case+0x1a5/0x480
[   15.053987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.054227]  kthread+0x337/0x6f0
[   15.054360]  ret_from_fork+0x116/0x1d0
[   15.054508]  ret_from_fork_asm+0x1a/0x30
[   15.054717] 
[   15.054812] The buggy address belongs to the object at ffff888101c9b4a0
[   15.054812]  which belongs to the cache kmalloc-16 of size 16
[   15.055250] The buggy address is located 8 bytes inside of
[   15.055250]  allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9)
[   15.055894] 
[   15.055970] The buggy address belongs to the physical page:
[   15.056303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b
[   15.056657] flags: 0x200000000000000(node=0|zone=2)
[   15.056822] page_type: f5(slab)
[   15.056945] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.057469] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.057720] page dumped because: kasan: bad access detected
[   15.057892] 
[   15.058025] Memory state around the buggy address:
[   15.058256]  ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   15.058584]  ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   15.058917] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.059234]                                   ^
[   15.059449]  ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059735]  ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059998] ==================================================================
[   15.103442] ==================================================================
[   15.103718] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.104014] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278
[   15.104473] 
[   15.104589] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.104630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.104644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.104665] Call Trace:
[   15.104679]  <TASK>
[   15.104694]  dump_stack_lvl+0x73/0xb0
[   15.104722]  print_report+0xd1/0x610
[   15.104744]  ? __virt_addr_valid+0x1db/0x2d0
[   15.104767]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.104794]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.104818]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.104845]  kasan_report+0x141/0x180
[   15.104867]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.104899]  kasan_check_range+0x10c/0x1c0
[   15.104923]  __kasan_check_write+0x18/0x20
[   15.104943]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.104970]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.105012]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.105036]  ? trace_hardirqs_on+0x37/0xe0
[   15.105058]  ? kasan_bitops_generic+0x92/0x1c0
[   15.105086]  kasan_bitops_generic+0x116/0x1c0
[   15.105110]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.105137]  ? __pfx_read_tsc+0x10/0x10
[   15.105158]  ? ktime_get_ts64+0x86/0x230
[   15.105182]  kunit_try_run_case+0x1a5/0x480
[   15.105206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.105230]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.105254]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.105290]  ? __kthread_parkme+0x82/0x180
[   15.105311]  ? preempt_count_sub+0x50/0x80
[   15.105334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.105359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.105385]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.105412]  kthread+0x337/0x6f0
[   15.105430]  ? trace_preempt_on+0x20/0xc0
[   15.105452]  ? __pfx_kthread+0x10/0x10
[   15.105473]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.105494]  ? calculate_sigpending+0x7b/0xa0
[   15.105518]  ? __pfx_kthread+0x10/0x10
[   15.105540]  ret_from_fork+0x116/0x1d0
[   15.105558]  ? __pfx_kthread+0x10/0x10
[   15.105579]  ret_from_fork_asm+0x1a/0x30
[   15.105609]  </TASK>
[   15.105619] 
[   15.113553] Allocated by task 278:
[   15.113732]  kasan_save_stack+0x45/0x70
[   15.113917]  kasan_save_track+0x18/0x40
[   15.114345]  kasan_save_alloc_info+0x3b/0x50
[   15.114557]  __kasan_kmalloc+0xb7/0xc0
[   15.114733]  __kmalloc_cache_noprof+0x189/0x420
[   15.114924]  kasan_bitops_generic+0x92/0x1c0
[   15.115184]  kunit_try_run_case+0x1a5/0x480
[   15.115416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.115611]  kthread+0x337/0x6f0
[   15.115783]  ret_from_fork+0x116/0x1d0
[   15.116038]  ret_from_fork_asm+0x1a/0x30
[   15.116218] 
[   15.116329] The buggy address belongs to the object at ffff888101c9b4a0
[   15.116329]  which belongs to the cache kmalloc-16 of size 16
[   15.116798] The buggy address is located 8 bytes inside of
[   15.116798]  allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9)
[   15.117345] 
[   15.117427] The buggy address belongs to the physical page:
[   15.117598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b
[   15.117836] flags: 0x200000000000000(node=0|zone=2)
[   15.117997] page_type: f5(slab)
[   15.118137] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.118483] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.118831] page dumped because: kasan: bad access detected
[   15.119069] 
[   15.119138] Memory state around the buggy address:
[   15.119353]  ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   15.119574]  ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   15.119789] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.120223]                                   ^
[   15.120453]  ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.120785]  ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.121102] ==================================================================
[   15.020860] ==================================================================
[   15.022073] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.022466] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278
[   15.022759] 
[   15.022875] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.022920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.022933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.022955] Call Trace:
[   15.022967]  <TASK>
[   15.022983]  dump_stack_lvl+0x73/0xb0
[   15.023012]  print_report+0xd1/0x610
[   15.023035]  ? __virt_addr_valid+0x1db/0x2d0
[   15.023059]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.023087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.023110]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.023138]  kasan_report+0x141/0x180
[   15.023160]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.023191]  kasan_check_range+0x10c/0x1c0
[   15.023214]  __kasan_check_write+0x18/0x20
[   15.023235]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.023272]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.023300]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.023326]  ? trace_hardirqs_on+0x37/0xe0
[   15.023348]  ? kasan_bitops_generic+0x92/0x1c0
[   15.023376]  kasan_bitops_generic+0x116/0x1c0
[   15.023400]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.023427]  ? __pfx_read_tsc+0x10/0x10
[   15.023448]  ? ktime_get_ts64+0x86/0x230
[   15.023473]  kunit_try_run_case+0x1a5/0x480
[   15.023511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.023550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.023582]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.023606]  ? __kthread_parkme+0x82/0x180
[   15.023628]  ? preempt_count_sub+0x50/0x80
[   15.023653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.023678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.023703]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.023730]  kthread+0x337/0x6f0
[   15.023749]  ? trace_preempt_on+0x20/0xc0
[   15.023771]  ? __pfx_kthread+0x10/0x10
[   15.023792]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.023813]  ? calculate_sigpending+0x7b/0xa0
[   15.023838]  ? __pfx_kthread+0x10/0x10
[   15.023859]  ret_from_fork+0x116/0x1d0
[   15.023878]  ? __pfx_kthread+0x10/0x10
[   15.023898]  ret_from_fork_asm+0x1a/0x30
[   15.023929]  </TASK>
[   15.023940] 
[   15.032429] Allocated by task 278:
[   15.033036]  kasan_save_stack+0x45/0x70
[   15.033239]  kasan_save_track+0x18/0x40
[   15.033433]  kasan_save_alloc_info+0x3b/0x50
[   15.033602]  __kasan_kmalloc+0xb7/0xc0
[   15.033791]  __kmalloc_cache_noprof+0x189/0x420
[   15.034076]  kasan_bitops_generic+0x92/0x1c0
[   15.034232]  kunit_try_run_case+0x1a5/0x480
[   15.034392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.034602]  kthread+0x337/0x6f0
[   15.034779]  ret_from_fork+0x116/0x1d0
[   15.034967]  ret_from_fork_asm+0x1a/0x30
[   15.035162] 
[   15.035257] The buggy address belongs to the object at ffff888101c9b4a0
[   15.035257]  which belongs to the cache kmalloc-16 of size 16
[   15.035649] The buggy address is located 8 bytes inside of
[   15.035649]  allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9)
[   15.036555] 
[   15.036656] The buggy address belongs to the physical page:
[   15.036867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b
[   15.037109] flags: 0x200000000000000(node=0|zone=2)
[   15.037434] page_type: f5(slab)
[   15.037726] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.038465] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.038788] page dumped because: kasan: bad access detected
[   15.038998] 
[   15.039089] Memory state around the buggy address:
[   15.039285]  ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   15.039553]  ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   15.039865] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.040077]                                   ^
[   15.040239]  ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.040567]  ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.040889] ==================================================================
[   15.079306] ==================================================================
[   15.079652] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.080055] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278
[   15.080363] 
[   15.080471] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.080512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.080525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.080545] Call Trace:
[   15.080560]  <TASK>
[   15.080574]  dump_stack_lvl+0x73/0xb0
[   15.080602]  print_report+0xd1/0x610
[   15.080625]  ? __virt_addr_valid+0x1db/0x2d0
[   15.080648]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.080675]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.080699]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.080726]  kasan_report+0x141/0x180
[   15.080748]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.080780]  kasan_check_range+0x10c/0x1c0
[   15.080804]  __kasan_check_write+0x18/0x20
[   15.080824]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.080851]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.080879]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.080903]  ? trace_hardirqs_on+0x37/0xe0
[   15.080926]  ? kasan_bitops_generic+0x92/0x1c0
[   15.080954]  kasan_bitops_generic+0x116/0x1c0
[   15.080978]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.081004]  ? __pfx_read_tsc+0x10/0x10
[   15.081025]  ? ktime_get_ts64+0x86/0x230
[   15.081049]  kunit_try_run_case+0x1a5/0x480
[   15.081073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.081097]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.081121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.081146]  ? __kthread_parkme+0x82/0x180
[   15.081166]  ? preempt_count_sub+0x50/0x80
[   15.081191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.081215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.081240]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.081275]  kthread+0x337/0x6f0
[   15.081295]  ? trace_preempt_on+0x20/0xc0
[   15.081317]  ? __pfx_kthread+0x10/0x10
[   15.081338]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.081360]  ? calculate_sigpending+0x7b/0xa0
[   15.081385]  ? __pfx_kthread+0x10/0x10
[   15.081406]  ret_from_fork+0x116/0x1d0
[   15.081425]  ? __pfx_kthread+0x10/0x10
[   15.081445]  ret_from_fork_asm+0x1a/0x30
[   15.081476]  </TASK>
[   15.081486] 
[   15.092566] Allocated by task 278:
[   15.092824]  kasan_save_stack+0x45/0x70
[   15.093146]  kasan_save_track+0x18/0x40
[   15.093426]  kasan_save_alloc_info+0x3b/0x50
[   15.093710]  __kasan_kmalloc+0xb7/0xc0
[   15.093858]  __kmalloc_cache_noprof+0x189/0x420
[   15.094082]  kasan_bitops_generic+0x92/0x1c0
[   15.094579]  kunit_try_run_case+0x1a5/0x480
[   15.094798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.095033]  kthread+0x337/0x6f0
[   15.095194]  ret_from_fork+0x116/0x1d0
[   15.095378]  ret_from_fork_asm+0x1a/0x30
[   15.095560] 
[   15.095648] The buggy address belongs to the object at ffff888101c9b4a0
[   15.095648]  which belongs to the cache kmalloc-16 of size 16
[   15.096131] The buggy address is located 8 bytes inside of
[   15.096131]  allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9)
[   15.097039] 
[   15.097302] The buggy address belongs to the physical page:
[   15.097790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b
[   15.098132] flags: 0x200000000000000(node=0|zone=2)
[   15.098486] page_type: f5(slab)
[   15.098622] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.098942] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.099564] page dumped because: kasan: bad access detected
[   15.099895] 
[   15.100108] Memory state around the buggy address:
[   15.100341]  ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   15.100753]  ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   15.101165] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.101567]                                   ^
[   15.101735]  ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.102414]  ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.102697] ==================================================================
[   15.121926] ==================================================================
[   15.122278] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.122610] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278
[   15.122945] 
[   15.123154] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.123195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.123208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.123228] Call Trace:
[   15.123242]  <TASK>
[   15.123255]  dump_stack_lvl+0x73/0xb0
[   15.123298]  print_report+0xd1/0x610
[   15.123320]  ? __virt_addr_valid+0x1db/0x2d0
[   15.123343]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.123370]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.123393]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.123421]  kasan_report+0x141/0x180
[   15.123443]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.123474]  kasan_check_range+0x10c/0x1c0
[   15.123498]  __kasan_check_write+0x18/0x20
[   15.123518]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.123545]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.123575]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.123600]  ? trace_hardirqs_on+0x37/0xe0
[   15.123623]  ? kasan_bitops_generic+0x92/0x1c0
[   15.123651]  kasan_bitops_generic+0x116/0x1c0
[   15.123674]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.123701]  ? __pfx_read_tsc+0x10/0x10
[   15.123722]  ? ktime_get_ts64+0x86/0x230
[   15.123745]  kunit_try_run_case+0x1a5/0x480
[   15.123769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.123793]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.123816]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.123840]  ? __kthread_parkme+0x82/0x180
[   15.123861]  ? preempt_count_sub+0x50/0x80
[   15.123885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.123909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.123934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.123960]  kthread+0x337/0x6f0
[   15.123979]  ? trace_preempt_on+0x20/0xc0
[   15.124054]  ? __pfx_kthread+0x10/0x10
[   15.124075]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.124097]  ? calculate_sigpending+0x7b/0xa0
[   15.124120]  ? __pfx_kthread+0x10/0x10
[   15.124142]  ret_from_fork+0x116/0x1d0
[   15.124160]  ? __pfx_kthread+0x10/0x10
[   15.124181]  ret_from_fork_asm+0x1a/0x30
[   15.124211]  </TASK>
[   15.124222] 
[   15.132535] Allocated by task 278:
[   15.132721]  kasan_save_stack+0x45/0x70
[   15.132921]  kasan_save_track+0x18/0x40
[   15.133117]  kasan_save_alloc_info+0x3b/0x50
[   15.133519]  __kasan_kmalloc+0xb7/0xc0
[   15.133730]  __kmalloc_cache_noprof+0x189/0x420
[   15.133955]  kasan_bitops_generic+0x92/0x1c0
[   15.134229]  kunit_try_run_case+0x1a5/0x480
[   15.134440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.134660]  kthread+0x337/0x6f0
[   15.134812]  ret_from_fork+0x116/0x1d0
[   15.134952]  ret_from_fork_asm+0x1a/0x30
[   15.135091] 
[   15.135160] The buggy address belongs to the object at ffff888101c9b4a0
[   15.135160]  which belongs to the cache kmalloc-16 of size 16
[   15.135780] The buggy address is located 8 bytes inside of
[   15.135780]  allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9)
[   15.136364] 
[   15.136464] The buggy address belongs to the physical page:
[   15.136716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b
[   15.137071] flags: 0x200000000000000(node=0|zone=2)
[   15.137313] page_type: f5(slab)
[   15.137460] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.137763] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.138061] page dumped because: kasan: bad access detected
[   15.138232] 
[   15.138309] Memory state around the buggy address:
[   15.138533]  ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   15.138851]  ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   15.139099] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.139405]                                   ^
[   15.139620]  ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.139933]  ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.140520] ==================================================================
[   15.159604] ==================================================================
[   15.159908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.160305] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278
[   15.160795] 
[   15.160890] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.160931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.160944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.160964] Call Trace:
[   15.160979]  <TASK>
[   15.160993]  dump_stack_lvl+0x73/0xb0
[   15.161020]  print_report+0xd1/0x610
[   15.161042]  ? __virt_addr_valid+0x1db/0x2d0
[   15.161064]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.161091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.161114]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.161141]  kasan_report+0x141/0x180
[   15.161163]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.161194]  kasan_check_range+0x10c/0x1c0
[   15.161218]  __kasan_check_write+0x18/0x20
[   15.161237]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.161340]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.161368]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.161406]  ? trace_hardirqs_on+0x37/0xe0
[   15.161428]  ? kasan_bitops_generic+0x92/0x1c0
[   15.161456]  kasan_bitops_generic+0x116/0x1c0
[   15.161481]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.161506]  ? __pfx_read_tsc+0x10/0x10
[   15.161527]  ? ktime_get_ts64+0x86/0x230
[   15.161550]  kunit_try_run_case+0x1a5/0x480
[   15.161574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.161597]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.161621]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.161645]  ? __kthread_parkme+0x82/0x180
[   15.161665]  ? preempt_count_sub+0x50/0x80
[   15.161688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.161713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.161738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.161763]  kthread+0x337/0x6f0
[   15.161782]  ? trace_preempt_on+0x20/0xc0
[   15.161804]  ? __pfx_kthread+0x10/0x10
[   15.161824]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.161846]  ? calculate_sigpending+0x7b/0xa0
[   15.161870]  ? __pfx_kthread+0x10/0x10
[   15.161891]  ret_from_fork+0x116/0x1d0
[   15.161909]  ? __pfx_kthread+0x10/0x10
[   15.161930]  ret_from_fork_asm+0x1a/0x30
[   15.161961]  </TASK>
[   15.161970] 
[   15.169894] Allocated by task 278:
[   15.170166]  kasan_save_stack+0x45/0x70
[   15.170423]  kasan_save_track+0x18/0x40
[   15.170618]  kasan_save_alloc_info+0x3b/0x50
[   15.170834]  __kasan_kmalloc+0xb7/0xc0
[   15.170974]  __kmalloc_cache_noprof+0x189/0x420
[   15.171254]  kasan_bitops_generic+0x92/0x1c0
[   15.171447]  kunit_try_run_case+0x1a5/0x480
[   15.171642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.171862]  kthread+0x337/0x6f0
[   15.172093]  ret_from_fork+0x116/0x1d0
[   15.172273]  ret_from_fork_asm+0x1a/0x30
[   15.172458] 
[   15.172529] The buggy address belongs to the object at ffff888101c9b4a0
[   15.172529]  which belongs to the cache kmalloc-16 of size 16
[   15.173022] The buggy address is located 8 bytes inside of
[   15.173022]  allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9)
[   15.173561] 
[   15.173633] The buggy address belongs to the physical page:
[   15.173806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b
[   15.174235] flags: 0x200000000000000(node=0|zone=2)
[   15.174497] page_type: f5(slab)
[   15.174663] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.174947] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.175172] page dumped because: kasan: bad access detected
[   15.175433] 
[   15.175524] Memory state around the buggy address:
[   15.175752]  ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   15.176068]  ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   15.176456] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.176703]                                   ^
[   15.176921]  ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.177254]  ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.177542] ==================================================================