Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   19.023316] ==================================================================
[   19.023474] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.023551] Write of size 8 at addr fff00000c1376c68 by task kunit_try_catch/262
[   19.023604] 
[   19.023887] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.024186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.024226] Hardware name: linux,dummy-virt (DT)
[   19.024413] Call trace:
[   19.024455]  show_stack+0x20/0x38 (C)
[   19.024509]  dump_stack_lvl+0x8c/0xd0
[   19.024594]  print_report+0x118/0x608
[   19.024643]  kasan_report+0xdc/0x128
[   19.024690]  kasan_check_range+0x100/0x1a8
[   19.025035]  __kasan_check_write+0x20/0x30
[   19.025135]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.025198]  kasan_bitops_generic+0x110/0x1c8
[   19.025247]  kunit_try_run_case+0x170/0x3f0
[   19.025431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.025625]  kthread+0x328/0x630
[   19.025762]  ret_from_fork+0x10/0x20
[   19.025817] 
[   19.025838] Allocated by task 262:
[   19.025868]  kasan_save_stack+0x3c/0x68
[   19.026033]  kasan_save_track+0x20/0x40
[   19.026087]  kasan_save_alloc_info+0x40/0x58
[   19.026151]  __kasan_kmalloc+0xd4/0xd8
[   19.026307]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.026359]  kasan_bitops_generic+0xa0/0x1c8
[   19.026514]  kunit_try_run_case+0x170/0x3f0
[   19.026569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.026615]  kthread+0x328/0x630
[   19.026648]  ret_from_fork+0x10/0x20
[   19.026873] 
[   19.027038] The buggy address belongs to the object at fff00000c1376c60
[   19.027038]  which belongs to the cache kmalloc-16 of size 16
[   19.027156] The buggy address is located 8 bytes inside of
[   19.027156]  allocated 9-byte region [fff00000c1376c60, fff00000c1376c69)
[   19.027512] 
[   19.027593] The buggy address belongs to the physical page:
[   19.027727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101376
[   19.027786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.027887] page_type: f5(slab)
[   19.028388] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.028458] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.028502] page dumped because: kasan: bad access detected
[   19.029722] 
[   19.029764] Memory state around the buggy address:
[   19.029803]  fff00000c1376b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   19.029862]  fff00000c1376b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.030325] >fff00000c1376c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.030389]                                                           ^
[   19.030432]  fff00000c1376c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.030512]  fff00000c1376d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.031004] ==================================================================
[   19.007440] ==================================================================
[   19.007503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.007564] Write of size 8 at addr fff00000c1376c68 by task kunit_try_catch/262
[   19.007617] 
[   19.007693] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.007780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.007807] Hardware name: linux,dummy-virt (DT)
[   19.008244] Call trace:
[   19.008287]  show_stack+0x20/0x38 (C)
[   19.008343]  dump_stack_lvl+0x8c/0xd0
[   19.008437]  print_report+0x118/0x608
[   19.008514]  kasan_report+0xdc/0x128
[   19.008632]  kasan_check_range+0x100/0x1a8
[   19.008690]  __kasan_check_write+0x20/0x30
[   19.008765]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.008827]  kasan_bitops_generic+0x110/0x1c8
[   19.008876]  kunit_try_run_case+0x170/0x3f0
[   19.009240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.009344]  kthread+0x328/0x630
[   19.009508]  ret_from_fork+0x10/0x20
[   19.009580] 
[   19.009602] Allocated by task 262:
[   19.009794]  kasan_save_stack+0x3c/0x68
[   19.009851]  kasan_save_track+0x20/0x40
[   19.010237]  kasan_save_alloc_info+0x40/0x58
[   19.010490]  __kasan_kmalloc+0xd4/0xd8
[   19.010565]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.010616]  kasan_bitops_generic+0xa0/0x1c8
[   19.010658]  kunit_try_run_case+0x170/0x3f0
[   19.010698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.011057]  kthread+0x328/0x630
[   19.011195]  ret_from_fork+0x10/0x20
[   19.011339] 
[   19.011399] The buggy address belongs to the object at fff00000c1376c60
[   19.011399]  which belongs to the cache kmalloc-16 of size 16
[   19.011574] The buggy address is located 8 bytes inside of
[   19.011574]  allocated 9-byte region [fff00000c1376c60, fff00000c1376c69)
[   19.011892] 
[   19.012035] The buggy address belongs to the physical page:
[   19.012154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101376
[   19.012335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.012541] page_type: f5(slab)
[   19.012634] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.012850] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.013055] page dumped because: kasan: bad access detected
[   19.013240] 
[   19.013306] Memory state around the buggy address:
[   19.013402]  fff00000c1376b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   19.013522]  fff00000c1376b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.013583] >fff00000c1376c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.013656]                                                           ^
[   19.014032]  fff00000c1376c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.014194]  fff00000c1376d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.014260] ==================================================================
[   19.037978] ==================================================================
[   19.038779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.038861] Read of size 8 at addr fff00000c1376c68 by task kunit_try_catch/262
[   19.040995] 
[   19.042333] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.043012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.043087] Hardware name: linux,dummy-virt (DT)
[   19.043297] Call trace:
[   19.043354]  show_stack+0x20/0x38 (C)
[   19.043570]  dump_stack_lvl+0x8c/0xd0
[   19.043827]  print_report+0x118/0x608
[   19.043949]  kasan_report+0xdc/0x128
[   19.044121]  __asan_report_load8_noabort+0x20/0x30
[   19.044294]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.044354]  kasan_bitops_generic+0x110/0x1c8
[   19.044647]  kunit_try_run_case+0x170/0x3f0
[   19.044855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.045099]  kthread+0x328/0x630
[   19.045258]  ret_from_fork+0x10/0x20
[   19.045347] 
[   19.045512] Allocated by task 262:
[   19.045723]  kasan_save_stack+0x3c/0x68
[   19.045804]  kasan_save_track+0x20/0x40
[   19.045959]  kasan_save_alloc_info+0x40/0x58
[   19.046111]  __kasan_kmalloc+0xd4/0xd8
[   19.046241]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.046289]  kasan_bitops_generic+0xa0/0x1c8
[   19.046750]  kunit_try_run_case+0x170/0x3f0
[   19.047003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.047170]  kthread+0x328/0x630
[   19.047288]  ret_from_fork+0x10/0x20
[   19.048896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101376
[   19.049468]  fff00000c1376d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.050529] ==================================================================
[   19.016868] ==================================================================
[   19.017091] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.017164] Read of size 8 at addr fff00000c1376c68 by task kunit_try_catch/262
[   19.017385] 
[   19.017447] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.017542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.017569] Hardware name: linux,dummy-virt (DT)
[   19.017927] Call trace:
[   19.017983]  show_stack+0x20/0x38 (C)
[   19.018141]  dump_stack_lvl+0x8c/0xd0
[   19.018475]  print_report+0x118/0x608
[   19.018534]  kasan_report+0xdc/0x128
[   19.018583]  __asan_report_load8_noabort+0x20/0x30
[   19.018639]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.018710]  kasan_bitops_generic+0x110/0x1c8
[   19.018759]  kunit_try_run_case+0x170/0x3f0
[   19.018809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.018871]  kthread+0x328/0x630
[   19.018928]  ret_from_fork+0x10/0x20
[   19.018978] 
[   19.019008] Allocated by task 262:
[   19.019042]  kasan_save_stack+0x3c/0x68
[   19.019100]  kasan_save_track+0x20/0x40
[   19.019141]  kasan_save_alloc_info+0x40/0x58
[   19.019183]  __kasan_kmalloc+0xd4/0xd8
[   19.019220]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.019261]  kasan_bitops_generic+0xa0/0x1c8
[   19.019309]  kunit_try_run_case+0x170/0x3f0
[   19.019349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.019403]  kthread+0x328/0x630
[   19.019442]  ret_from_fork+0x10/0x20
[   19.019500] 
[   19.019520] The buggy address belongs to the object at fff00000c1376c60
[   19.019520]  which belongs to the cache kmalloc-16 of size 16
[   19.019588] The buggy address is located 8 bytes inside of
[   19.019588]  allocated 9-byte region [fff00000c1376c60, fff00000c1376c69)
[   19.019652] 
[   19.019691] The buggy address belongs to the physical page:
[   19.019725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101376
[   19.019779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.019829] page_type: f5(slab)
[   19.019881] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.019945] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.020131] page dumped because: kasan: bad access detected
[   19.020446] 
[   19.020814] Memory state around the buggy address:
[   19.020887]  fff00000c1376b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   19.020981]  fff00000c1376b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.021055] >fff00000c1376c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.021117]                                                           ^
[   19.021186]  fff00000c1376c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.021979]  fff00000c1376d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.022033] ==================================================================

[   15.816181] ==================================================================
[   15.816954] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.817557] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.818012] 
[   15.818201] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.818283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.818305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.818342] Call Trace:
[   15.818370]  <TASK>
[   15.818397]  dump_stack_lvl+0x73/0xb0
[   15.818448]  print_report+0xd1/0x650
[   15.818471]  ? __virt_addr_valid+0x1db/0x2d0
[   15.818495]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.818519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.818542]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.818563]  kasan_report+0x141/0x180
[   15.818583]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.818662]  kasan_check_range+0x10c/0x1c0
[   15.818711]  __kasan_check_write+0x18/0x20
[   15.818749]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.818796]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.818845]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.818887]  ? trace_hardirqs_on+0x37/0xe0
[   15.818932]  ? kasan_bitops_generic+0x92/0x1c0
[   15.818984]  kasan_bitops_generic+0x116/0x1c0
[   15.819009]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.819031]  ? __pfx_read_tsc+0x10/0x10
[   15.819050]  ? ktime_get_ts64+0x86/0x230
[   15.819072]  kunit_try_run_case+0x1a5/0x480
[   15.819093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.819132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.819155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.819175]  ? __kthread_parkme+0x82/0x180
[   15.819193]  ? preempt_count_sub+0x50/0x80
[   15.819215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.819235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.819255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.819276]  kthread+0x337/0x6f0
[   15.819294]  ? trace_preempt_on+0x20/0xc0
[   15.819313]  ? __pfx_kthread+0x10/0x10
[   15.819332]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.819350]  ? calculate_sigpending+0x7b/0xa0
[   15.819371]  ? __pfx_kthread+0x10/0x10
[   15.819392]  ret_from_fork+0x116/0x1d0
[   15.819409]  ? __pfx_kthread+0x10/0x10
[   15.819427]  ret_from_fork_asm+0x1a/0x30
[   15.819456]  </TASK>
[   15.819468] 
[   15.831142] Allocated by task 279:
[   15.831437]  kasan_save_stack+0x45/0x70
[   15.831735]  kasan_save_track+0x18/0x40
[   15.831984]  kasan_save_alloc_info+0x3b/0x50
[   15.832339]  __kasan_kmalloc+0xb7/0xc0
[   15.832595]  __kmalloc_cache_noprof+0x189/0x420
[   15.832969]  kasan_bitops_generic+0x92/0x1c0
[   15.833316]  kunit_try_run_case+0x1a5/0x480
[   15.833687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.833993]  kthread+0x337/0x6f0
[   15.834273]  ret_from_fork+0x116/0x1d0
[   15.834549]  ret_from_fork_asm+0x1a/0x30
[   15.834739] 
[   15.834897] The buggy address belongs to the object at ffff8881024eb440
[   15.834897]  which belongs to the cache kmalloc-16 of size 16
[   15.835750] The buggy address is located 8 bytes inside of
[   15.835750]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.836301] 
[   15.836489] The buggy address belongs to the physical page:
[   15.836815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.837290] flags: 0x200000000000000(node=0|zone=2)
[   15.837612] page_type: f5(slab)
[   15.837783] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.838337] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.838840] page dumped because: kasan: bad access detected
[   15.839331] 
[   15.839531] Memory state around the buggy address:
[   15.839961]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.840312]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.840456] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.840572]                                               ^
[   15.840737]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.841204]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.841697] ==================================================================
[   15.751114] ==================================================================
[   15.751597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.751909] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.752517] 
[   15.753342] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.753435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.753459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.753499] Call Trace:
[   15.753526]  <TASK>
[   15.753562]  dump_stack_lvl+0x73/0xb0
[   15.753640]  print_report+0xd1/0x650
[   15.753676]  ? __virt_addr_valid+0x1db/0x2d0
[   15.753709]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.753743]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.753777]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.753806]  kasan_report+0x141/0x180
[   15.753827]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.753853]  kasan_check_range+0x10c/0x1c0
[   15.753873]  __kasan_check_write+0x18/0x20
[   15.753891]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.753923]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.753949]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.753971]  ? trace_hardirqs_on+0x37/0xe0
[   15.753992]  ? kasan_bitops_generic+0x92/0x1c0
[   15.754017]  kasan_bitops_generic+0x116/0x1c0
[   15.754038]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.754060]  ? __pfx_read_tsc+0x10/0x10
[   15.754078]  ? ktime_get_ts64+0x86/0x230
[   15.754102]  kunit_try_run_case+0x1a5/0x480
[   15.754132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.754152]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.754172]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.754192]  ? __kthread_parkme+0x82/0x180
[   15.754210]  ? preempt_count_sub+0x50/0x80
[   15.754232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.754253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.754272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.754292]  kthread+0x337/0x6f0
[   15.754310]  ? trace_preempt_on+0x20/0xc0
[   15.754330]  ? __pfx_kthread+0x10/0x10
[   15.754349]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.754367]  ? calculate_sigpending+0x7b/0xa0
[   15.754388]  ? __pfx_kthread+0x10/0x10
[   15.754408]  ret_from_fork+0x116/0x1d0
[   15.754424]  ? __pfx_kthread+0x10/0x10
[   15.754442]  ret_from_fork_asm+0x1a/0x30
[   15.754470]  </TASK>
[   15.754481] 
[   15.766708] Allocated by task 279:
[   15.767094]  kasan_save_stack+0x45/0x70
[   15.767495]  kasan_save_track+0x18/0x40
[   15.767987]  kasan_save_alloc_info+0x3b/0x50
[   15.768341]  __kasan_kmalloc+0xb7/0xc0
[   15.768509]  __kmalloc_cache_noprof+0x189/0x420
[   15.769450]  kasan_bitops_generic+0x92/0x1c0
[   15.770019]  kunit_try_run_case+0x1a5/0x480
[   15.770349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.770782]  kthread+0x337/0x6f0
[   15.771121]  ret_from_fork+0x116/0x1d0
[   15.771457]  ret_from_fork_asm+0x1a/0x30
[   15.771934] 
[   15.772050] The buggy address belongs to the object at ffff8881024eb440
[   15.772050]  which belongs to the cache kmalloc-16 of size 16
[   15.773019] The buggy address is located 8 bytes inside of
[   15.773019]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.773800] 
[   15.774455] The buggy address belongs to the physical page:
[   15.774878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.775341] flags: 0x200000000000000(node=0|zone=2)
[   15.775697] page_type: f5(slab)
[   15.775981] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.776397] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.777181] page dumped because: kasan: bad access detected
[   15.777640] 
[   15.777944] Memory state around the buggy address:
[   15.778220]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.779120]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.779802] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.780235]                                               ^
[   15.780696]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781452]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.782185] ==================================================================
[   15.625124] ==================================================================
[   15.625535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.626059] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.626673] 
[   15.626829] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.626893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.626909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.626936] Call Trace:
[   15.626956]  <TASK>
[   15.626979]  dump_stack_lvl+0x73/0xb0
[   15.627022]  print_report+0xd1/0x650
[   15.627049]  ? __virt_addr_valid+0x1db/0x2d0
[   15.627078]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.627108]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.627645]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.627711]  kasan_report+0x141/0x180
[   15.627757]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.627806]  kasan_check_range+0x10c/0x1c0
[   15.627842]  __kasan_check_write+0x18/0x20
[   15.627876]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.627919]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.627984]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.628029]  ? trace_hardirqs_on+0x37/0xe0
[   15.628064]  ? kasan_bitops_generic+0x92/0x1c0
[   15.628126]  kasan_bitops_generic+0x116/0x1c0
[   15.628168]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.628209]  ? __pfx_read_tsc+0x10/0x10
[   15.628286]  ? ktime_get_ts64+0x86/0x230
[   15.628335]  kunit_try_run_case+0x1a5/0x480
[   15.628375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.628396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.628419]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.628440]  ? __kthread_parkme+0x82/0x180
[   15.628458]  ? preempt_count_sub+0x50/0x80
[   15.628480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.628512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.628572]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.628604]  kthread+0x337/0x6f0
[   15.628649]  ? trace_preempt_on+0x20/0xc0
[   15.628672]  ? __pfx_kthread+0x10/0x10
[   15.628691]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.628710]  ? calculate_sigpending+0x7b/0xa0
[   15.628732]  ? __pfx_kthread+0x10/0x10
[   15.628752]  ret_from_fork+0x116/0x1d0
[   15.628768]  ? __pfx_kthread+0x10/0x10
[   15.628787]  ret_from_fork_asm+0x1a/0x30
[   15.628815]  </TASK>
[   15.628828] 
[   15.641492] Allocated by task 279:
[   15.641929]  kasan_save_stack+0x45/0x70
[   15.642198]  kasan_save_track+0x18/0x40
[   15.642564]  kasan_save_alloc_info+0x3b/0x50
[   15.642807]  __kasan_kmalloc+0xb7/0xc0
[   15.643556]  __kmalloc_cache_noprof+0x189/0x420
[   15.643925]  kasan_bitops_generic+0x92/0x1c0
[   15.644246]  kunit_try_run_case+0x1a5/0x480
[   15.644696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.645096]  kthread+0x337/0x6f0
[   15.645411]  ret_from_fork+0x116/0x1d0
[   15.645769]  ret_from_fork_asm+0x1a/0x30
[   15.646074] 
[   15.646228] The buggy address belongs to the object at ffff8881024eb440
[   15.646228]  which belongs to the cache kmalloc-16 of size 16
[   15.647010] The buggy address is located 8 bytes inside of
[   15.647010]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.648123] 
[   15.648409] The buggy address belongs to the physical page:
[   15.648757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.649367] flags: 0x200000000000000(node=0|zone=2)
[   15.649760] page_type: f5(slab)
[   15.650041] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.650340] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.650725] page dumped because: kasan: bad access detected
[   15.650972] 
[   15.651373] Memory state around the buggy address:
[   15.652046]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.652461]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.652846] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.653056]                                               ^
[   15.653841]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.654430]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.654765] ==================================================================
[   15.655246] ==================================================================
[   15.655833] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.656354] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.656958] 
[   15.657121] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.657203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.657227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.657264] Call Trace:
[   15.657286]  <TASK>
[   15.657312]  dump_stack_lvl+0x73/0xb0
[   15.657368]  print_report+0xd1/0x650
[   15.657408]  ? __virt_addr_valid+0x1db/0x2d0
[   15.657449]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.657625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.657684]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.657730]  kasan_report+0x141/0x180
[   15.657774]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.657831]  kasan_check_range+0x10c/0x1c0
[   15.657874]  __kasan_check_write+0x18/0x20
[   15.657917]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.657962]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.657998]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.658025]  ? trace_hardirqs_on+0x37/0xe0
[   15.658045]  ? kasan_bitops_generic+0x92/0x1c0
[   15.658070]  kasan_bitops_generic+0x116/0x1c0
[   15.658091]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.658120]  ? __pfx_read_tsc+0x10/0x10
[   15.658142]  ? ktime_get_ts64+0x86/0x230
[   15.658164]  kunit_try_run_case+0x1a5/0x480
[   15.658184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.658203]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.658224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.658243]  ? __kthread_parkme+0x82/0x180
[   15.658261]  ? preempt_count_sub+0x50/0x80
[   15.658282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.658302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.658322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.658342]  kthread+0x337/0x6f0
[   15.658359]  ? trace_preempt_on+0x20/0xc0
[   15.658379]  ? __pfx_kthread+0x10/0x10
[   15.658396]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.658414]  ? calculate_sigpending+0x7b/0xa0
[   15.658435]  ? __pfx_kthread+0x10/0x10
[   15.658453]  ret_from_fork+0x116/0x1d0
[   15.658470]  ? __pfx_kthread+0x10/0x10
[   15.658488]  ret_from_fork_asm+0x1a/0x30
[   15.658528]  </TASK>
[   15.658544] 
[   15.671045] Allocated by task 279:
[   15.671466]  kasan_save_stack+0x45/0x70
[   15.671664]  kasan_save_track+0x18/0x40
[   15.671878]  kasan_save_alloc_info+0x3b/0x50
[   15.672596]  __kasan_kmalloc+0xb7/0xc0
[   15.673063]  __kmalloc_cache_noprof+0x189/0x420
[   15.673574]  kasan_bitops_generic+0x92/0x1c0
[   15.673774]  kunit_try_run_case+0x1a5/0x480
[   15.673920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.674098]  kthread+0x337/0x6f0
[   15.674215]  ret_from_fork+0x116/0x1d0
[   15.674770]  ret_from_fork_asm+0x1a/0x30
[   15.675075] 
[   15.675954] The buggy address belongs to the object at ffff8881024eb440
[   15.675954]  which belongs to the cache kmalloc-16 of size 16
[   15.676498] The buggy address is located 8 bytes inside of
[   15.676498]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.678980] 
[   15.679441] The buggy address belongs to the physical page:
[   15.679976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.681243] flags: 0x200000000000000(node=0|zone=2)
[   15.682161] page_type: f5(slab)
[   15.682437] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.682694] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.682902] page dumped because: kasan: bad access detected
[   15.683075] 
[   15.683164] Memory state around the buggy address:
[   15.683897]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.684697]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.685340] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.685997]                                               ^
[   15.686463]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.687166]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.687532] ==================================================================
[   15.718182] ==================================================================
[   15.718647] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.719161] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.719682] 
[   15.719811] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.719867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.719880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.719905] Call Trace:
[   15.719923]  <TASK>
[   15.719943]  dump_stack_lvl+0x73/0xb0
[   15.719977]  print_report+0xd1/0x650
[   15.719997]  ? __virt_addr_valid+0x1db/0x2d0
[   15.720018]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.720040]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.720063]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.720086]  kasan_report+0x141/0x180
[   15.720111]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.720153]  kasan_check_range+0x10c/0x1c0
[   15.720191]  __kasan_check_write+0x18/0x20
[   15.720223]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.720261]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.720298]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.720337]  ? trace_hardirqs_on+0x37/0xe0
[   15.720375]  ? kasan_bitops_generic+0x92/0x1c0
[   15.720425]  kasan_bitops_generic+0x116/0x1c0
[   15.720463]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.720503]  ? __pfx_read_tsc+0x10/0x10
[   15.720538]  ? ktime_get_ts64+0x86/0x230
[   15.720585]  kunit_try_run_case+0x1a5/0x480
[   15.720734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.720778]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.720822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.720859]  ? __kthread_parkme+0x82/0x180
[   15.720896]  ? preempt_count_sub+0x50/0x80
[   15.720941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.720978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.721015]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.721055]  kthread+0x337/0x6f0
[   15.721091]  ? trace_preempt_on+0x20/0xc0
[   15.721130]  ? __pfx_kthread+0x10/0x10
[   15.721168]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.721205]  ? calculate_sigpending+0x7b/0xa0
[   15.721245]  ? __pfx_kthread+0x10/0x10
[   15.721286]  ret_from_fork+0x116/0x1d0
[   15.721320]  ? __pfx_kthread+0x10/0x10
[   15.721361]  ret_from_fork_asm+0x1a/0x30
[   15.721415]  </TASK>
[   15.721436] 
[   15.735934] Allocated by task 279:
[   15.736283]  kasan_save_stack+0x45/0x70
[   15.736491]  kasan_save_track+0x18/0x40
[   15.736673]  kasan_save_alloc_info+0x3b/0x50
[   15.737019]  __kasan_kmalloc+0xb7/0xc0
[   15.737336]  __kmalloc_cache_noprof+0x189/0x420
[   15.737672]  kasan_bitops_generic+0x92/0x1c0
[   15.737849]  kunit_try_run_case+0x1a5/0x480
[   15.738157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.738386]  kthread+0x337/0x6f0
[   15.738535]  ret_from_fork+0x116/0x1d0
[   15.738997]  ret_from_fork_asm+0x1a/0x30
[   15.739393] 
[   15.739541] The buggy address belongs to the object at ffff8881024eb440
[   15.739541]  which belongs to the cache kmalloc-16 of size 16
[   15.740106] The buggy address is located 8 bytes inside of
[   15.740106]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.741091] 
[   15.741205] The buggy address belongs to the physical page:
[   15.741845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.742799] flags: 0x200000000000000(node=0|zone=2)
[   15.743581] page_type: f5(slab)
[   15.744015] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.744371] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.744873] page dumped because: kasan: bad access detected
[   15.745105] 
[   15.745253] Memory state around the buggy address:
[   15.746032]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.746635]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.747071] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.747553]                                               ^
[   15.748132]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.748355]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.749404] ==================================================================
[   15.842738] ==================================================================
[   15.843228] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.843783] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.844057] 
[   15.844261] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.844353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.844372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.844402] Call Trace:
[   15.844423]  <TASK>
[   15.844460]  dump_stack_lvl+0x73/0xb0
[   15.844529]  print_report+0xd1/0x650
[   15.844567]  ? __virt_addr_valid+0x1db/0x2d0
[   15.844604]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.844659]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.844704]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.844748]  kasan_report+0x141/0x180
[   15.844832]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.844885]  kasan_check_range+0x10c/0x1c0
[   15.844925]  __kasan_check_write+0x18/0x20
[   15.844958]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.845005]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.845054]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.845099]  ? trace_hardirqs_on+0x37/0xe0
[   15.845181]  ? kasan_bitops_generic+0x92/0x1c0
[   15.845237]  kasan_bitops_generic+0x116/0x1c0
[   15.845281]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.845330]  ? __pfx_read_tsc+0x10/0x10
[   15.845368]  ? ktime_get_ts64+0x86/0x230
[   15.845415]  kunit_try_run_case+0x1a5/0x480
[   15.845461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.845504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.845549]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.845591]  ? __kthread_parkme+0x82/0x180
[   15.845635]  ? preempt_count_sub+0x50/0x80
[   15.845673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.845707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.845738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.845770]  kthread+0x337/0x6f0
[   15.845799]  ? trace_preempt_on+0x20/0xc0
[   15.845821]  ? __pfx_kthread+0x10/0x10
[   15.845839]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.845858]  ? calculate_sigpending+0x7b/0xa0
[   15.845880]  ? __pfx_kthread+0x10/0x10
[   15.845899]  ret_from_fork+0x116/0x1d0
[   15.845926]  ? __pfx_kthread+0x10/0x10
[   15.845946]  ret_from_fork_asm+0x1a/0x30
[   15.845974]  </TASK>
[   15.845986] 
[   15.858297] Allocated by task 279:
[   15.858574]  kasan_save_stack+0x45/0x70
[   15.858804]  kasan_save_track+0x18/0x40
[   15.859063]  kasan_save_alloc_info+0x3b/0x50
[   15.859665]  __kasan_kmalloc+0xb7/0xc0
[   15.859911]  __kmalloc_cache_noprof+0x189/0x420
[   15.860150]  kasan_bitops_generic+0x92/0x1c0
[   15.860489]  kunit_try_run_case+0x1a5/0x480
[   15.860743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.860949]  kthread+0x337/0x6f0
[   15.861218]  ret_from_fork+0x116/0x1d0
[   15.861510]  ret_from_fork_asm+0x1a/0x30
[   15.861754] 
[   15.861888] The buggy address belongs to the object at ffff8881024eb440
[   15.861888]  which belongs to the cache kmalloc-16 of size 16
[   15.862783] The buggy address is located 8 bytes inside of
[   15.862783]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.863817] 
[   15.863930] The buggy address belongs to the physical page:
[   15.864126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.865010] flags: 0x200000000000000(node=0|zone=2)
[   15.865193] page_type: f5(slab)
[   15.865717] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.866264] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.866574] page dumped because: kasan: bad access detected
[   15.866886] 
[   15.867016] Memory state around the buggy address:
[   15.867628]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.868067]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.868505] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.869035]                                               ^
[   15.869577]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.869995]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.870403] ==================================================================
[   15.783055] ==================================================================
[   15.783330] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.783962] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.784296] 
[   15.784429] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.784512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.784537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.784579] Call Trace:
[   15.784607]  <TASK>
[   15.784650]  dump_stack_lvl+0x73/0xb0
[   15.784707]  print_report+0xd1/0x650
[   15.784750]  ? __virt_addr_valid+0x1db/0x2d0
[   15.784790]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.784836]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.784904]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.784940]  kasan_report+0x141/0x180
[   15.784972]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.785014]  kasan_check_range+0x10c/0x1c0
[   15.785048]  __kasan_check_write+0x18/0x20
[   15.785077]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.785148]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.785212]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.785255]  ? trace_hardirqs_on+0x37/0xe0
[   15.785293]  ? kasan_bitops_generic+0x92/0x1c0
[   15.785343]  kasan_bitops_generic+0x116/0x1c0
[   15.785388]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.785433]  ? __pfx_read_tsc+0x10/0x10
[   15.785473]  ? ktime_get_ts64+0x86/0x230
[   15.785528]  kunit_try_run_case+0x1a5/0x480
[   15.785576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.785631]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.785678]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.785722]  ? __kthread_parkme+0x82/0x180
[   15.785762]  ? preempt_count_sub+0x50/0x80
[   15.785805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.785849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.785891]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.785937]  kthread+0x337/0x6f0
[   15.785971]  ? trace_preempt_on+0x20/0xc0
[   15.786063]  ? __pfx_kthread+0x10/0x10
[   15.786094]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.786145]  ? calculate_sigpending+0x7b/0xa0
[   15.786181]  ? __pfx_kthread+0x10/0x10
[   15.786231]  ret_from_fork+0x116/0x1d0
[   15.786268]  ? __pfx_kthread+0x10/0x10
[   15.786300]  ret_from_fork_asm+0x1a/0x30
[   15.786332]  </TASK>
[   15.786345] 
[   15.800554] Allocated by task 279:
[   15.800737]  kasan_save_stack+0x45/0x70
[   15.800978]  kasan_save_track+0x18/0x40
[   15.801254]  kasan_save_alloc_info+0x3b/0x50
[   15.802287]  __kasan_kmalloc+0xb7/0xc0
[   15.803038]  __kmalloc_cache_noprof+0x189/0x420
[   15.803480]  kasan_bitops_generic+0x92/0x1c0
[   15.803892]  kunit_try_run_case+0x1a5/0x480
[   15.804067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.804453]  kthread+0x337/0x6f0
[   15.805002]  ret_from_fork+0x116/0x1d0
[   15.805565]  ret_from_fork_asm+0x1a/0x30
[   15.805757] 
[   15.805848] The buggy address belongs to the object at ffff8881024eb440
[   15.805848]  which belongs to the cache kmalloc-16 of size 16
[   15.806458] The buggy address is located 8 bytes inside of
[   15.806458]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.807777] 
[   15.807886] The buggy address belongs to the physical page:
[   15.808092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.808511] flags: 0x200000000000000(node=0|zone=2)
[   15.809217] page_type: f5(slab)
[   15.809416] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.809936] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.810336] page dumped because: kasan: bad access detected
[   15.810736] 
[   15.811207] Memory state around the buggy address:
[   15.811397]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.812248]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.812566] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.813177]                                               ^
[   15.813433]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.814042]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.814847] ==================================================================
[   15.688270] ==================================================================
[   15.688687] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.689216] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.689703] 
[   15.689964] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.690042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.690067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.690129] Call Trace:
[   15.690160]  <TASK>
[   15.690190]  dump_stack_lvl+0x73/0xb0
[   15.690241]  print_report+0xd1/0x650
[   15.690277]  ? __virt_addr_valid+0x1db/0x2d0
[   15.690312]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.690353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.690431]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.690492]  kasan_report+0x141/0x180
[   15.690541]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.690599]  kasan_check_range+0x10c/0x1c0
[   15.690661]  __kasan_check_write+0x18/0x20
[   15.690699]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.690746]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.690783]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.690824]  ? trace_hardirqs_on+0x37/0xe0
[   15.690860]  ? kasan_bitops_generic+0x92/0x1c0
[   15.690905]  kasan_bitops_generic+0x116/0x1c0
[   15.690943]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.690984]  ? __pfx_read_tsc+0x10/0x10
[   15.691017]  ? ktime_get_ts64+0x86/0x230
[   15.691059]  kunit_try_run_case+0x1a5/0x480
[   15.691101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.691138]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.691167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.691187]  ? __kthread_parkme+0x82/0x180
[   15.691205]  ? preempt_count_sub+0x50/0x80
[   15.691227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.691248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.691267]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.691287]  kthread+0x337/0x6f0
[   15.691304]  ? trace_preempt_on+0x20/0xc0
[   15.691324]  ? __pfx_kthread+0x10/0x10
[   15.691342]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.691360]  ? calculate_sigpending+0x7b/0xa0
[   15.691381]  ? __pfx_kthread+0x10/0x10
[   15.691399]  ret_from_fork+0x116/0x1d0
[   15.691417]  ? __pfx_kthread+0x10/0x10
[   15.691435]  ret_from_fork_asm+0x1a/0x30
[   15.691462]  </TASK>
[   15.691474] 
[   15.704664] Allocated by task 279:
[   15.704934]  kasan_save_stack+0x45/0x70
[   15.705221]  kasan_save_track+0x18/0x40
[   15.705402]  kasan_save_alloc_info+0x3b/0x50
[   15.706234]  __kasan_kmalloc+0xb7/0xc0
[   15.706614]  __kmalloc_cache_noprof+0x189/0x420
[   15.707061]  kasan_bitops_generic+0x92/0x1c0
[   15.707365]  kunit_try_run_case+0x1a5/0x480
[   15.707641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.708085]  kthread+0x337/0x6f0
[   15.708403]  ret_from_fork+0x116/0x1d0
[   15.708734]  ret_from_fork_asm+0x1a/0x30
[   15.709051] 
[   15.709236] The buggy address belongs to the object at ffff8881024eb440
[   15.709236]  which belongs to the cache kmalloc-16 of size 16
[   15.709962] The buggy address is located 8 bytes inside of
[   15.709962]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.711056] 
[   15.711272] The buggy address belongs to the physical page:
[   15.711596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.712003] flags: 0x200000000000000(node=0|zone=2)
[   15.712636] page_type: f5(slab)
[   15.712813] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.713437] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.714006] page dumped because: kasan: bad access detected
[   15.714262] 
[   15.714421] Memory state around the buggy address:
[   15.714871]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.715279]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.715653] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.716148]                                               ^
[   15.716391]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.716814]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.717186] ==================================================================

[   15.629956] ==================================================================
[   15.630463] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.630978] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.631507] 
[   15.631628] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.631677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.631777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.631814] Call Trace:
[   15.631827]  <TASK>
[   15.631843]  dump_stack_lvl+0x73/0xb0
[   15.631888]  print_report+0xd1/0x650
[   15.631910]  ? __virt_addr_valid+0x1db/0x2d0
[   15.631934]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.631960]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.631986]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.632012]  kasan_report+0x141/0x180
[   15.632043]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.632084]  kasan_check_range+0x10c/0x1c0
[   15.632118]  __kasan_check_write+0x18/0x20
[   15.632138]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.632164]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.632192]  ? kasan_save_alloc_info+0x3b/0x50
[   15.632215]  ? kasan_save_stack+0x45/0x70
[   15.632240]  kasan_bitops_generic+0x116/0x1c0
[   15.632264]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.632289]  ? __pfx_read_tsc+0x10/0x10
[   15.632311]  ? ktime_get_ts64+0x86/0x230
[   15.632338]  kunit_try_run_case+0x1a5/0x480
[   15.632365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.632391]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.632416]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.632441]  ? __kthread_parkme+0x82/0x180
[   15.632462]  ? preempt_count_sub+0x50/0x80
[   15.632488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.632513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.632535]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.632559]  kthread+0x337/0x6f0
[   15.632580]  ? trace_preempt_on+0x20/0xc0
[   15.632605]  ? __pfx_kthread+0x10/0x10
[   15.632626]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.632647]  ? calculate_sigpending+0x7b/0xa0
[   15.632671]  ? __pfx_kthread+0x10/0x10
[   15.632763]  ret_from_fork+0x116/0x1d0
[   15.632788]  ? __pfx_kthread+0x10/0x10
[   15.632810]  ret_from_fork_asm+0x1a/0x30
[   15.632843]  </TASK>
[   15.632855] 
[   15.641821] Allocated by task 278:
[   15.642028]  kasan_save_stack+0x45/0x70
[   15.642278]  kasan_save_track+0x18/0x40
[   15.642478]  kasan_save_alloc_info+0x3b/0x50
[   15.642798]  __kasan_kmalloc+0xb7/0xc0
[   15.643004]  __kmalloc_cache_noprof+0x189/0x420
[   15.643180]  kasan_bitops_generic+0x92/0x1c0
[   15.643372]  kunit_try_run_case+0x1a5/0x480
[   15.643599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.643944]  kthread+0x337/0x6f0
[   15.644103]  ret_from_fork+0x116/0x1d0
[   15.644329]  ret_from_fork_asm+0x1a/0x30
[   15.644499] 
[   15.644622] The buggy address belongs to the object at ffff888102873120
[   15.644622]  which belongs to the cache kmalloc-16 of size 16
[   15.645146] The buggy address is located 8 bytes inside of
[   15.645146]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.645887] 
[   15.645982] The buggy address belongs to the physical page:
[   15.646178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.646544] flags: 0x200000000000000(node=0|zone=2)
[   15.646801] page_type: f5(slab)
[   15.646944] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.647232] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.647587] page dumped because: kasan: bad access detected
[   15.647847] 
[   15.647945] Memory state around the buggy address:
[   15.648387]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.648767]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.649133] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.649447]                                   ^
[   15.649635]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.650066]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.650361] ==================================================================
[   15.694900] ==================================================================
[   15.695242] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.695608] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.695907] 
[   15.695996] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.696039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.696060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.696082] Call Trace:
[   15.696095]  <TASK>
[   15.696110]  dump_stack_lvl+0x73/0xb0
[   15.696136]  print_report+0xd1/0x650
[   15.696157]  ? __virt_addr_valid+0x1db/0x2d0
[   15.696179]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.696204]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.696229]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.696255]  kasan_report+0x141/0x180
[   15.696277]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.696307]  kasan_check_range+0x10c/0x1c0
[   15.696331]  __kasan_check_write+0x18/0x20
[   15.696350]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   15.696376]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.696403]  ? kasan_save_alloc_info+0x3b/0x50
[   15.696427]  ? kasan_save_stack+0x45/0x70
[   15.696451]  kasan_bitops_generic+0x116/0x1c0
[   15.696473]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.696499]  ? __pfx_read_tsc+0x10/0x10
[   15.696519]  ? ktime_get_ts64+0x86/0x230
[   15.696544]  kunit_try_run_case+0x1a5/0x480
[   15.696567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.696588]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.696612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.696634]  ? __kthread_parkme+0x82/0x180
[   15.696655]  ? preempt_count_sub+0x50/0x80
[   15.696678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.696702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.696725]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.696748]  kthread+0x337/0x6f0
[   15.696768]  ? trace_preempt_on+0x20/0xc0
[   15.696791]  ? __pfx_kthread+0x10/0x10
[   15.696811]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.696832]  ? calculate_sigpending+0x7b/0xa0
[   15.696855]  ? __pfx_kthread+0x10/0x10
[   15.696878]  ret_from_fork+0x116/0x1d0
[   15.696896]  ? __pfx_kthread+0x10/0x10
[   15.696917]  ret_from_fork_asm+0x1a/0x30
[   15.696949]  </TASK>
[   15.696959] 
[   15.707091] Allocated by task 278:
[   15.707295]  kasan_save_stack+0x45/0x70
[   15.707498]  kasan_save_track+0x18/0x40
[   15.707682]  kasan_save_alloc_info+0x3b/0x50
[   15.707889]  __kasan_kmalloc+0xb7/0xc0
[   15.708500]  __kmalloc_cache_noprof+0x189/0x420
[   15.708886]  kasan_bitops_generic+0x92/0x1c0
[   15.709155]  kunit_try_run_case+0x1a5/0x480
[   15.709398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.709596]  kthread+0x337/0x6f0
[   15.710003]  ret_from_fork+0x116/0x1d0
[   15.710234]  ret_from_fork_asm+0x1a/0x30
[   15.710539] 
[   15.710659] The buggy address belongs to the object at ffff888102873120
[   15.710659]  which belongs to the cache kmalloc-16 of size 16
[   15.711402] The buggy address is located 8 bytes inside of
[   15.711402]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.712090] 
[   15.712206] The buggy address belongs to the physical page:
[   15.712489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.713169] flags: 0x200000000000000(node=0|zone=2)
[   15.713436] page_type: f5(slab)
[   15.713610] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.714129] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.714484] page dumped because: kasan: bad access detected
[   15.714736] 
[   15.714837] Memory state around the buggy address:
[   15.715076]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.715408]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.715729] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.716127]                                   ^
[   15.716345]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.716594]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.717105] ==================================================================
[   15.719469] ==================================================================
[   15.719924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.720225] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.720471] 
[   15.720568] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.720616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.720629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.720652] Call Trace:
[   15.720665]  <TASK>
[   15.720681]  dump_stack_lvl+0x73/0xb0
[   15.720709]  print_report+0xd1/0x650
[   15.720733]  ? __virt_addr_valid+0x1db/0x2d0
[   15.720756]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.720783]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.720810]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.720837]  kasan_report+0x141/0x180
[   15.720860]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.721290]  kasan_check_range+0x10c/0x1c0
[   15.721353]  __kasan_check_write+0x18/0x20
[   15.721454]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   15.721559]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.721591]  ? kasan_save_alloc_info+0x3b/0x50
[   15.721616]  ? kasan_save_stack+0x45/0x70
[   15.721641]  kasan_bitops_generic+0x116/0x1c0
[   15.721667]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.721693]  ? __pfx_read_tsc+0x10/0x10
[   15.721715]  ? ktime_get_ts64+0x86/0x230
[   15.721741]  kunit_try_run_case+0x1a5/0x480
[   15.721766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.721789]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.721813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.721837]  ? __kthread_parkme+0x82/0x180
[   15.721857]  ? preempt_count_sub+0x50/0x80
[   15.721882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.721906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.721930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.721953]  kthread+0x337/0x6f0
[   15.721974]  ? trace_preempt_on+0x20/0xc0
[   15.721998]  ? __pfx_kthread+0x10/0x10
[   15.722021]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.722044]  ? calculate_sigpending+0x7b/0xa0
[   15.722080]  ? __pfx_kthread+0x10/0x10
[   15.722103]  ret_from_fork+0x116/0x1d0
[   15.722123]  ? __pfx_kthread+0x10/0x10
[   15.722145]  ret_from_fork_asm+0x1a/0x30
[   15.722180]  </TASK>
[   15.722192] 
[   15.737173] Allocated by task 278:
[   15.737335]  kasan_save_stack+0x45/0x70
[   15.737549]  kasan_save_track+0x18/0x40
[   15.737695]  kasan_save_alloc_info+0x3b/0x50
[   15.738312]  __kasan_kmalloc+0xb7/0xc0
[   15.738555]  __kmalloc_cache_noprof+0x189/0x420
[   15.738801]  kasan_bitops_generic+0x92/0x1c0
[   15.739132]  kunit_try_run_case+0x1a5/0x480
[   15.739404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.739632]  kthread+0x337/0x6f0
[   15.739804]  ret_from_fork+0x116/0x1d0
[   15.740220]  ret_from_fork_asm+0x1a/0x30
[   15.740406] 
[   15.740497] The buggy address belongs to the object at ffff888102873120
[   15.740497]  which belongs to the cache kmalloc-16 of size 16
[   15.741123] The buggy address is located 8 bytes inside of
[   15.741123]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.741627] 
[   15.741729] The buggy address belongs to the physical page:
[   15.741945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.742305] flags: 0x200000000000000(node=0|zone=2)
[   15.742529] page_type: f5(slab)
[   15.742677] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.743433] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.743740] page dumped because: kasan: bad access detected
[   15.744099] 
[   15.744202] Memory state around the buggy address:
[   15.744549]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.745013]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.745410] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.745725]                                   ^
[   15.746081]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746459]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746890] ==================================================================
[   15.779647] ==================================================================
[   15.779992] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.781345] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.781604] 
[   15.781700] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.782679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.782695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.782737] Call Trace:
[   15.782755]  <TASK>
[   15.782772]  dump_stack_lvl+0x73/0xb0
[   15.782803]  print_report+0xd1/0x650
[   15.782826]  ? __virt_addr_valid+0x1db/0x2d0
[   15.782849]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.782875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.782901]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.782926]  kasan_report+0x141/0x180
[   15.782949]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.782979]  kasan_check_range+0x10c/0x1c0
[   15.783003]  __kasan_check_write+0x18/0x20
[   15.783022]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.783058]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.783095]  ? kasan_save_alloc_info+0x3b/0x50
[   15.783119]  ? kasan_save_stack+0x45/0x70
[   15.783143]  kasan_bitops_generic+0x116/0x1c0
[   15.783166]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.783192]  ? __pfx_read_tsc+0x10/0x10
[   15.783213]  ? ktime_get_ts64+0x86/0x230
[   15.783237]  kunit_try_run_case+0x1a5/0x480
[   15.783260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.783281]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.783304]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.783328]  ? __kthread_parkme+0x82/0x180
[   15.783348]  ? preempt_count_sub+0x50/0x80
[   15.783372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.783394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.783416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.783439]  kthread+0x337/0x6f0
[   15.783458]  ? trace_preempt_on+0x20/0xc0
[   15.783481]  ? __pfx_kthread+0x10/0x10
[   15.783501]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.783521]  ? calculate_sigpending+0x7b/0xa0
[   15.783544]  ? __pfx_kthread+0x10/0x10
[   15.783566]  ret_from_fork+0x116/0x1d0
[   15.783584]  ? __pfx_kthread+0x10/0x10
[   15.783604]  ret_from_fork_asm+0x1a/0x30
[   15.783635]  </TASK>
[   15.783646] 
[   15.795002] Allocated by task 278:
[   15.795339]  kasan_save_stack+0x45/0x70
[   15.795731]  kasan_save_track+0x18/0x40
[   15.796096]  kasan_save_alloc_info+0x3b/0x50
[   15.796498]  __kasan_kmalloc+0xb7/0xc0
[   15.796879]  __kmalloc_cache_noprof+0x189/0x420
[   15.797307]  kasan_bitops_generic+0x92/0x1c0
[   15.797516]  kunit_try_run_case+0x1a5/0x480
[   15.797673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.798173]  kthread+0x337/0x6f0
[   15.798492]  ret_from_fork+0x116/0x1d0
[   15.798878]  ret_from_fork_asm+0x1a/0x30
[   15.799246] 
[   15.799320] The buggy address belongs to the object at ffff888102873120
[   15.799320]  which belongs to the cache kmalloc-16 of size 16
[   15.799681] The buggy address is located 8 bytes inside of
[   15.799681]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.800768] 
[   15.800935] The buggy address belongs to the physical page:
[   15.801422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.802145] flags: 0x200000000000000(node=0|zone=2)
[   15.802415] page_type: f5(slab)
[   15.802545] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.802931] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.803603] page dumped because: kasan: bad access detected
[   15.804110] 
[   15.804271] Memory state around the buggy address:
[   15.804706]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.805001]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.805234] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.805457]                                   ^
[   15.805617]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.806116]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.806743] ==================================================================
[   15.672246] ==================================================================
[   15.672623] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.673141] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.673497] 
[   15.673637] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.673683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.673810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.673833] Call Trace:
[   15.673850]  <TASK>
[   15.673879]  dump_stack_lvl+0x73/0xb0
[   15.673910]  print_report+0xd1/0x650
[   15.673933]  ? __virt_addr_valid+0x1db/0x2d0
[   15.673957]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.673984]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.674011]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.674037]  kasan_report+0x141/0x180
[   15.674070]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.674103]  kasan_check_range+0x10c/0x1c0
[   15.674163]  __kasan_check_write+0x18/0x20
[   15.674183]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   15.674221]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.674249]  ? kasan_save_alloc_info+0x3b/0x50
[   15.674274]  ? kasan_save_stack+0x45/0x70
[   15.674299]  kasan_bitops_generic+0x116/0x1c0
[   15.674323]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.674350]  ? __pfx_read_tsc+0x10/0x10
[   15.674373]  ? ktime_get_ts64+0x86/0x230
[   15.674397]  kunit_try_run_case+0x1a5/0x480
[   15.674422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.674445]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.674469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.674524]  ? __kthread_parkme+0x82/0x180
[   15.674546]  ? preempt_count_sub+0x50/0x80
[   15.674571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.674607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.674631]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.674655]  kthread+0x337/0x6f0
[   15.674677]  ? trace_preempt_on+0x20/0xc0
[   15.674781]  ? __pfx_kthread+0x10/0x10
[   15.674804]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.674827]  ? calculate_sigpending+0x7b/0xa0
[   15.674853]  ? __pfx_kthread+0x10/0x10
[   15.674876]  ret_from_fork+0x116/0x1d0
[   15.674896]  ? __pfx_kthread+0x10/0x10
[   15.674918]  ret_from_fork_asm+0x1a/0x30
[   15.674952]  </TASK>
[   15.674964] 
[   15.684295] Allocated by task 278:
[   15.684490]  kasan_save_stack+0x45/0x70
[   15.684794]  kasan_save_track+0x18/0x40
[   15.684959]  kasan_save_alloc_info+0x3b/0x50
[   15.685231]  __kasan_kmalloc+0xb7/0xc0
[   15.685448]  __kmalloc_cache_noprof+0x189/0x420
[   15.685862]  kasan_bitops_generic+0x92/0x1c0
[   15.686060]  kunit_try_run_case+0x1a5/0x480
[   15.686323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.686534]  kthread+0x337/0x6f0
[   15.686666]  ret_from_fork+0x116/0x1d0
[   15.687084]  ret_from_fork_asm+0x1a/0x30
[   15.687326] 
[   15.687431] The buggy address belongs to the object at ffff888102873120
[   15.687431]  which belongs to the cache kmalloc-16 of size 16
[   15.688257] The buggy address is located 8 bytes inside of
[   15.688257]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.688901] 
[   15.689007] The buggy address belongs to the physical page:
[   15.689274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.689642] flags: 0x200000000000000(node=0|zone=2)
[   15.690015] page_type: f5(slab)
[   15.690209] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.690584] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.691068] page dumped because: kasan: bad access detected
[   15.691304] 
[   15.691402] Memory state around the buggy address:
[   15.691653]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.692140]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.692445] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.693012]                                   ^
[   15.693261]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.693621]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.694076] ==================================================================
[   15.807888] ==================================================================
[   15.808561] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.809345] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.810004] 
[   15.810204] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.810249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.810262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.810283] Call Trace:
[   15.810298]  <TASK>
[   15.810313]  dump_stack_lvl+0x73/0xb0
[   15.810341]  print_report+0xd1/0x650
[   15.810364]  ? __virt_addr_valid+0x1db/0x2d0
[   15.810386]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.810411]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.810438]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.810463]  kasan_report+0x141/0x180
[   15.810486]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.810518]  kasan_check_range+0x10c/0x1c0
[   15.810542]  __kasan_check_write+0x18/0x20
[   15.810562]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.810587]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.810615]  ? kasan_save_alloc_info+0x3b/0x50
[   15.810638]  ? kasan_save_stack+0x45/0x70
[   15.810663]  kasan_bitops_generic+0x116/0x1c0
[   15.810686]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.810734]  ? __pfx_read_tsc+0x10/0x10
[   15.810756]  ? ktime_get_ts64+0x86/0x230
[   15.810782]  kunit_try_run_case+0x1a5/0x480
[   15.810806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.810827]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.810851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.810873]  ? __kthread_parkme+0x82/0x180
[   15.810893]  ? preempt_count_sub+0x50/0x80
[   15.810916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.810940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.810963]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.810986]  kthread+0x337/0x6f0
[   15.811006]  ? trace_preempt_on+0x20/0xc0
[   15.811030]  ? __pfx_kthread+0x10/0x10
[   15.811062]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.811085]  ? calculate_sigpending+0x7b/0xa0
[   15.811108]  ? __pfx_kthread+0x10/0x10
[   15.811130]  ret_from_fork+0x116/0x1d0
[   15.811148]  ? __pfx_kthread+0x10/0x10
[   15.811168]  ret_from_fork_asm+0x1a/0x30
[   15.811201]  </TASK>
[   15.811212] 
[   15.823664] Allocated by task 278:
[   15.824035]  kasan_save_stack+0x45/0x70
[   15.824423]  kasan_save_track+0x18/0x40
[   15.824820]  kasan_save_alloc_info+0x3b/0x50
[   15.825229]  __kasan_kmalloc+0xb7/0xc0
[   15.825605]  __kmalloc_cache_noprof+0x189/0x420
[   15.826068]  kasan_bitops_generic+0x92/0x1c0
[   15.826480]  kunit_try_run_case+0x1a5/0x480
[   15.826919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.827432]  kthread+0x337/0x6f0
[   15.827785]  ret_from_fork+0x116/0x1d0
[   15.828153]  ret_from_fork_asm+0x1a/0x30
[   15.828539] 
[   15.828704] The buggy address belongs to the object at ffff888102873120
[   15.828704]  which belongs to the cache kmalloc-16 of size 16
[   15.829226] The buggy address is located 8 bytes inside of
[   15.829226]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.829605] 
[   15.829683] The buggy address belongs to the physical page:
[   15.830194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.830911] flags: 0x200000000000000(node=0|zone=2)
[   15.831366] page_type: f5(slab)
[   15.831661] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.832363] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.833063] page dumped because: kasan: bad access detected
[   15.833558] 
[   15.833736] Memory state around the buggy address:
[   15.833975]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.834219]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.834448] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.834673]                                   ^
[   15.835084]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.835694]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.836344] ==================================================================
[   15.650928] ==================================================================
[   15.651268] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.651589] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.652130] 
[   15.652240] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.652286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.652299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.652321] Call Trace:
[   15.652334]  <TASK>
[   15.652351]  dump_stack_lvl+0x73/0xb0
[   15.652378]  print_report+0xd1/0x650
[   15.652401]  ? __virt_addr_valid+0x1db/0x2d0
[   15.652482]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.652507]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.652532]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.652570]  kasan_report+0x141/0x180
[   15.652592]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.652623]  kasan_check_range+0x10c/0x1c0
[   15.652646]  __kasan_check_write+0x18/0x20
[   15.652665]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.652691]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.652805]  ? kasan_save_alloc_info+0x3b/0x50
[   15.652829]  ? kasan_save_stack+0x45/0x70
[   15.652865]  kasan_bitops_generic+0x116/0x1c0
[   15.652888]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.652914]  ? __pfx_read_tsc+0x10/0x10
[   15.652943]  ? ktime_get_ts64+0x86/0x230
[   15.652969]  kunit_try_run_case+0x1a5/0x480
[   15.653003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.653026]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.653057]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.653081]  ? __kthread_parkme+0x82/0x180
[   15.653101]  ? preempt_count_sub+0x50/0x80
[   15.653124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.653148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.653171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.653194]  kthread+0x337/0x6f0
[   15.653213]  ? trace_preempt_on+0x20/0xc0
[   15.653237]  ? __pfx_kthread+0x10/0x10
[   15.653268]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.653288]  ? calculate_sigpending+0x7b/0xa0
[   15.653312]  ? __pfx_kthread+0x10/0x10
[   15.653344]  ret_from_fork+0x116/0x1d0
[   15.653363]  ? __pfx_kthread+0x10/0x10
[   15.653384]  ret_from_fork_asm+0x1a/0x30
[   15.653416]  </TASK>
[   15.653427] 
[   15.662438] Allocated by task 278:
[   15.662649]  kasan_save_stack+0x45/0x70
[   15.662949]  kasan_save_track+0x18/0x40
[   15.663130]  kasan_save_alloc_info+0x3b/0x50
[   15.663381]  __kasan_kmalloc+0xb7/0xc0
[   15.663553]  __kmalloc_cache_noprof+0x189/0x420
[   15.663874]  kasan_bitops_generic+0x92/0x1c0
[   15.664039]  kunit_try_run_case+0x1a5/0x480
[   15.664227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.664520]  kthread+0x337/0x6f0
[   15.664767]  ret_from_fork+0x116/0x1d0
[   15.664986]  ret_from_fork_asm+0x1a/0x30
[   15.665238] 
[   15.665340] The buggy address belongs to the object at ffff888102873120
[   15.665340]  which belongs to the cache kmalloc-16 of size 16
[   15.665900] The buggy address is located 8 bytes inside of
[   15.665900]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.666537] 
[   15.666640] The buggy address belongs to the physical page:
[   15.667151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.667541] flags: 0x200000000000000(node=0|zone=2)
[   15.667883] page_type: f5(slab)
[   15.668089] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.668441] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.668688] page dumped because: kasan: bad access detected
[   15.669068] 
[   15.669175] Memory state around the buggy address:
[   15.669417]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.669840]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.670158] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.670538]                                   ^
[   15.670860]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.671195]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.671526] ==================================================================
[   15.747505] ==================================================================
[   15.748361] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.749271] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.749513] 
[   15.749607] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.749650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.749663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.749685] Call Trace:
[   15.749698]  <TASK>
[   15.749712]  dump_stack_lvl+0x73/0xb0
[   15.749741]  print_report+0xd1/0x650
[   15.749763]  ? __virt_addr_valid+0x1db/0x2d0
[   15.749785]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.749810]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.749835]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.749861]  kasan_report+0x141/0x180
[   15.749882]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.749912]  kasan_check_range+0x10c/0x1c0
[   15.749936]  __kasan_check_write+0x18/0x20
[   15.749955]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.749980]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.750009]  ? kasan_save_alloc_info+0x3b/0x50
[   15.750032]  ? kasan_save_stack+0x45/0x70
[   15.750070]  kasan_bitops_generic+0x116/0x1c0
[   15.750093]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.750118]  ? __pfx_read_tsc+0x10/0x10
[   15.750137]  ? ktime_get_ts64+0x86/0x230
[   15.750164]  kunit_try_run_case+0x1a5/0x480
[   15.750188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.750210]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.750233]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.750255]  ? __kthread_parkme+0x82/0x180
[   15.750275]  ? preempt_count_sub+0x50/0x80
[   15.750297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.750321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.750345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.750370]  kthread+0x337/0x6f0
[   15.750389]  ? trace_preempt_on+0x20/0xc0
[   15.750412]  ? __pfx_kthread+0x10/0x10
[   15.750432]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.750452]  ? calculate_sigpending+0x7b/0xa0
[   15.750475]  ? __pfx_kthread+0x10/0x10
[   15.750496]  ret_from_fork+0x116/0x1d0
[   15.750515]  ? __pfx_kthread+0x10/0x10
[   15.750535]  ret_from_fork_asm+0x1a/0x30
[   15.750566]  </TASK>
[   15.750577] 
[   15.765439] Allocated by task 278:
[   15.765594]  kasan_save_stack+0x45/0x70
[   15.765777]  kasan_save_track+0x18/0x40
[   15.766148]  kasan_save_alloc_info+0x3b/0x50
[   15.766542]  __kasan_kmalloc+0xb7/0xc0
[   15.766919]  __kmalloc_cache_noprof+0x189/0x420
[   15.767357]  kasan_bitops_generic+0x92/0x1c0
[   15.767802]  kunit_try_run_case+0x1a5/0x480
[   15.768210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.768709]  kthread+0x337/0x6f0
[   15.769085]  ret_from_fork+0x116/0x1d0
[   15.769444]  ret_from_fork_asm+0x1a/0x30
[   15.769859] 
[   15.770044] The buggy address belongs to the object at ffff888102873120
[   15.770044]  which belongs to the cache kmalloc-16 of size 16
[   15.771372] The buggy address is located 8 bytes inside of
[   15.771372]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.772443] 
[   15.772616] The buggy address belongs to the physical page:
[   15.772872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.773302] flags: 0x200000000000000(node=0|zone=2)
[   15.773760] page_type: f5(slab)
[   15.774101] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.774614] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.775150] page dumped because: kasan: bad access detected
[   15.775727] 
[   15.775813] Memory state around the buggy address:
[   15.775981]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.776230]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.776458] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.776679]                                   ^
[   15.778248]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.778612]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.778946] ==================================================================

[   45.739150] ==================================================================
[   45.746418] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.754596] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   45.761995] 
[   45.763497] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   45.763504] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   45.763507] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   45.763510] Call Trace:
[   45.763512]  <TASK>
[   45.763513]  dump_stack_lvl+0x73/0xb0
[   45.763518]  print_report+0xd1/0x650
[   45.763521]  ? __virt_addr_valid+0x1db/0x2d0
[   45.763525]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.763530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.763535]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.763540]  kasan_report+0x141/0x180
[   45.763544]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.763550]  kasan_check_range+0x10c/0x1c0
[   45.763555]  __kasan_check_write+0x18/0x20
[   45.763558]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.763563]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   45.763568]  ? __kmalloc_cache_noprof+0x189/0x420
[   45.763572]  ? trace_hardirqs_on+0x37/0xe0
[   45.763576]  ? kasan_bitops_generic+0x92/0x1c0
[   45.763581]  kasan_bitops_generic+0x116/0x1c0
[   45.763586]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   45.763591]  ? ktime_get_ts64+0x83/0x230
[   45.763595]  kunit_try_run_case+0x1a2/0x480
[   45.763599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.763604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   45.763608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   45.763612]  ? __kthread_parkme+0x82/0x180
[   45.763616]  ? preempt_count_sub+0x50/0x80
[   45.763620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.763624]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.763628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.763632]  kthread+0x334/0x6f0
[   45.763636]  ? trace_preempt_on+0x20/0xc0
[   45.763640]  ? __pfx_kthread+0x10/0x10
[   45.763644]  ? _raw_spin_unlock_irq+0x47/0x80
[   45.763647]  ? calculate_sigpending+0x7b/0xa0
[   45.763652]  ? __pfx_kthread+0x10/0x10
[   45.763656]  ret_from_fork+0x113/0x1d0
[   45.763659]  ? __pfx_kthread+0x10/0x10
[   45.763663]  ret_from_fork_asm+0x1a/0x30
[   45.763669]  </TASK>
[   45.763670] 
[   45.956552] Allocated by task 302:
[   45.959960]  kasan_save_stack+0x45/0x70
[   45.963800]  kasan_save_track+0x18/0x40
[   45.967639]  kasan_save_alloc_info+0x3b/0x50
[   45.971921]  __kasan_kmalloc+0xb7/0xc0
[   45.975673]  __kmalloc_cache_noprof+0x189/0x420
[   45.980214]  kasan_bitops_generic+0x92/0x1c0
[   45.984495]  kunit_try_run_case+0x1a2/0x480
[   45.988680]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.994080]  kthread+0x334/0x6f0
[   45.997312]  ret_from_fork+0x113/0x1d0
[   46.001064]  ret_from_fork_asm+0x1a/0x30
[   46.004992] 
[   46.006489] The buggy address belongs to the object at ffff8881067131a0
[   46.006489]  which belongs to the cache kmalloc-16 of size 16
[   46.018824] The buggy address is located 8 bytes inside of
[   46.018824]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   46.031079] 
[   46.032578] The buggy address belongs to the physical page:
[   46.038151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   46.046157] flags: 0x200000000000000(node=0|zone=2)
[   46.051037] page_type: f5(slab)
[   46.054183] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   46.061922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.069662] page dumped because: kasan: bad access detected
[   46.075236] 
[   46.076733] Memory state around the buggy address:
[   46.081526]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.088747]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.095965] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.103184]                                   ^
[   46.107716]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.114936]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.122157] ==================================================================
[   43.783794] ==================================================================
[   43.794890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.803069] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   43.810464] 
[   43.811963] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   43.811971] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   43.811974] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   43.811977] Call Trace:
[   43.811979]  <TASK>
[   43.811980]  dump_stack_lvl+0x73/0xb0
[   43.811985]  print_report+0xd1/0x650
[   43.811989]  ? __virt_addr_valid+0x1db/0x2d0
[   43.811993]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.811998]  ? kasan_complete_mode_report_info+0x2a/0x200
[   43.812003]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.812008]  kasan_report+0x141/0x180
[   43.812012]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.812018]  kasan_check_range+0x10c/0x1c0
[   43.812022]  __kasan_check_write+0x18/0x20
[   43.812026]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.812030]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   43.812036]  ? __kmalloc_cache_noprof+0x189/0x420
[   43.812040]  ? trace_hardirqs_on+0x37/0xe0
[   43.812044]  ? kasan_bitops_generic+0x92/0x1c0
[   43.812049]  kasan_bitops_generic+0x116/0x1c0
[   43.812054]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   43.812059]  ? ktime_get_ts64+0x83/0x230
[   43.812063]  kunit_try_run_case+0x1a2/0x480
[   43.812067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.812072]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   43.812076]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   43.812080]  ? __kthread_parkme+0x82/0x180
[   43.812084]  ? preempt_count_sub+0x50/0x80
[   43.812088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.812092]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.812096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.812101]  kthread+0x334/0x6f0
[   43.812104]  ? trace_preempt_on+0x20/0xc0
[   43.812108]  ? __pfx_kthread+0x10/0x10
[   43.812112]  ? _raw_spin_unlock_irq+0x47/0x80
[   43.812116]  ? calculate_sigpending+0x7b/0xa0
[   43.812120]  ? __pfx_kthread+0x10/0x10
[   43.812124]  ret_from_fork+0x113/0x1d0
[   43.812128]  ? __pfx_kthread+0x10/0x10
[   43.812131]  ret_from_fork_asm+0x1a/0x30
[   43.812137]  </TASK>
[   43.812139] 
[   44.005047] Allocated by task 302:
[   44.008451]  kasan_save_stack+0x45/0x70
[   44.012291]  kasan_save_track+0x18/0x40
[   44.016130]  kasan_save_alloc_info+0x3b/0x50
[   44.020402]  __kasan_kmalloc+0xb7/0xc0
[   44.024156]  __kmalloc_cache_noprof+0x189/0x420
[   44.028687]  kasan_bitops_generic+0x92/0x1c0
[   44.032960]  kunit_try_run_case+0x1a2/0x480
[   44.037147]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.042546]  kthread+0x334/0x6f0
[   44.045780]  ret_from_fork+0x113/0x1d0
[   44.049530]  ret_from_fork_asm+0x1a/0x30
[   44.053456] 
[   44.054956] The buggy address belongs to the object at ffff8881067131a0
[   44.054956]  which belongs to the cache kmalloc-16 of size 16
[   44.067298] The buggy address is located 8 bytes inside of
[   44.067298]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   44.079553] 
[   44.081050] The buggy address belongs to the physical page:
[   44.086625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   44.094632] flags: 0x200000000000000(node=0|zone=2)
[   44.099512] page_type: f5(slab)
[   44.102658] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   44.110411] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.118155] page dumped because: kasan: bad access detected
[   44.123726] 
[   44.125226] Memory state around the buggy address:
[   44.130019]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.137237]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.144457] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.151678]                                   ^
[   44.156210]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.163427]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.170648] ==================================================================
[   44.177897] ==================================================================
[   44.185146] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   44.193318] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   44.200739] 
[   44.202238] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   44.202246] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   44.202249] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   44.202252] Call Trace:
[   44.202254]  <TASK>
[   44.202255]  dump_stack_lvl+0x73/0xb0
[   44.202260]  print_report+0xd1/0x650
[   44.202264]  ? __virt_addr_valid+0x1db/0x2d0
[   44.202267]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   44.202272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.202277]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   44.202282]  kasan_report+0x141/0x180
[   44.202286]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   44.202292]  kasan_check_range+0x10c/0x1c0
[   44.202296]  __kasan_check_write+0x18/0x20
[   44.202300]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   44.202305]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   44.202310]  ? __kmalloc_cache_noprof+0x189/0x420
[   44.202315]  ? trace_hardirqs_on+0x37/0xe0
[   44.202318]  ? kasan_bitops_generic+0x92/0x1c0
[   44.202324]  kasan_bitops_generic+0x116/0x1c0
[   44.202328]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   44.202350]  ? ktime_get_ts64+0x83/0x230
[   44.202354]  kunit_try_run_case+0x1a2/0x480
[   44.202359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.202363]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   44.202368]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   44.202372]  ? __kthread_parkme+0x82/0x180
[   44.202376]  ? preempt_count_sub+0x50/0x80
[   44.202380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.202385]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.202402]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.202406]  kthread+0x334/0x6f0
[   44.202409]  ? trace_preempt_on+0x20/0xc0
[   44.202413]  ? __pfx_kthread+0x10/0x10
[   44.202417]  ? _raw_spin_unlock_irq+0x47/0x80
[   44.202421]  ? calculate_sigpending+0x7b/0xa0
[   44.202426]  ? __pfx_kthread+0x10/0x10
[   44.202430]  ret_from_fork+0x113/0x1d0
[   44.202433]  ? __pfx_kthread+0x10/0x10
[   44.202437]  ret_from_fork_asm+0x1a/0x30
[   44.202443]  </TASK>
[   44.202444] 
[   44.395366] Allocated by task 302:
[   44.398798]  kasan_save_stack+0x45/0x70
[   44.402646]  kasan_save_track+0x18/0x40
[   44.406494]  kasan_save_alloc_info+0x3b/0x50
[   44.410774]  __kasan_kmalloc+0xb7/0xc0
[   44.414527]  __kmalloc_cache_noprof+0x189/0x420
[   44.419069]  kasan_bitops_generic+0x92/0x1c0
[   44.423365]  kunit_try_run_case+0x1a2/0x480
[   44.427580]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.432986]  kthread+0x334/0x6f0
[   44.436218]  ret_from_fork+0x113/0x1d0
[   44.439973]  ret_from_fork_asm+0x1a/0x30
[   44.443906] 
[   44.445406] The buggy address belongs to the object at ffff8881067131a0
[   44.445406]  which belongs to the cache kmalloc-16 of size 16
[   44.457747] The buggy address is located 8 bytes inside of
[   44.457747]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   44.470002] 
[   44.471502] The buggy address belongs to the physical page:
[   44.477073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   44.485074] flags: 0x200000000000000(node=0|zone=2)
[   44.489951] page_type: f5(slab)
[   44.493099] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   44.500837] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.508576] page dumped because: kasan: bad access detected
[   44.514150] 
[   44.515649] Memory state around the buggy address:
[   44.520443]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.527661]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.534880] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.542100]                                   ^
[   44.546633]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.553861]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.561079] ==================================================================
[   46.129394] ==================================================================
[   46.136636] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   46.144810] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   46.152204] 
[   46.153704] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   46.153712] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   46.153714] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   46.153717] Call Trace:
[   46.153719]  <TASK>
[   46.153721]  dump_stack_lvl+0x73/0xb0
[   46.153725]  print_report+0xd1/0x650
[   46.153729]  ? __virt_addr_valid+0x1db/0x2d0
[   46.153733]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   46.153738]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.153743]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   46.153748]  kasan_report+0x141/0x180
[   46.153752]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   46.153758]  kasan_check_range+0x10c/0x1c0
[   46.153762]  __kasan_check_write+0x18/0x20
[   46.153765]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   46.153770]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   46.153775]  ? __kmalloc_cache_noprof+0x189/0x420
[   46.153780]  ? trace_hardirqs_on+0x37/0xe0
[   46.153784]  ? kasan_bitops_generic+0x92/0x1c0
[   46.153789]  kasan_bitops_generic+0x116/0x1c0
[   46.153793]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   46.153798]  ? ktime_get_ts64+0x83/0x230
[   46.153803]  kunit_try_run_case+0x1a2/0x480
[   46.153807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.153811]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   46.153816]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   46.153820]  ? __kthread_parkme+0x82/0x180
[   46.153823]  ? preempt_count_sub+0x50/0x80
[   46.153828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.153832]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.153836]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.153841]  kthread+0x334/0x6f0
[   46.153844]  ? trace_preempt_on+0x20/0xc0
[   46.153848]  ? __pfx_kthread+0x10/0x10
[   46.153852]  ? _raw_spin_unlock_irq+0x47/0x80
[   46.153855]  ? calculate_sigpending+0x7b/0xa0
[   46.153860]  ? __pfx_kthread+0x10/0x10
[   46.153864]  ret_from_fork+0x113/0x1d0
[   46.153867]  ? __pfx_kthread+0x10/0x10
[   46.153871]  ret_from_fork_asm+0x1a/0x30
[   46.153876]  </TASK>
[   46.153878] 
[   46.346759] Allocated by task 302:
[   46.350165]  kasan_save_stack+0x45/0x70
[   46.354004]  kasan_save_track+0x18/0x40
[   46.357843]  kasan_save_alloc_info+0x3b/0x50
[   46.362116]  __kasan_kmalloc+0xb7/0xc0
[   46.365870]  __kmalloc_cache_noprof+0x189/0x420
[   46.370421]  kasan_bitops_generic+0x92/0x1c0
[   46.374701]  kunit_try_run_case+0x1a2/0x480
[   46.378886]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.384287]  kthread+0x334/0x6f0
[   46.387518]  ret_from_fork+0x113/0x1d0
[   46.391272]  ret_from_fork_asm+0x1a/0x30
[   46.395206] 
[   46.396705] The buggy address belongs to the object at ffff8881067131a0
[   46.396705]  which belongs to the cache kmalloc-16 of size 16
[   46.409048] The buggy address is located 8 bytes inside of
[   46.409048]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   46.421302] 
[   46.422801] The buggy address belongs to the physical page:
[   46.428374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   46.436411] flags: 0x200000000000000(node=0|zone=2)
[   46.441295] page_type: f5(slab)
[   46.444441] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   46.452183] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.459927] page dumped because: kasan: bad access detected
[   46.465501] 
[   46.467000] Memory state around the buggy address:
[   46.471795]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.479013]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.486232] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.493451]                                   ^
[   46.497984]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.505205]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.512432] ==================================================================
[   44.568305] ==================================================================
[   44.575578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.583752] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   44.591142] 
[   44.592634] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   44.592643] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   44.592645] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   44.592648] Call Trace:
[   44.592650]  <TASK>
[   44.592651]  dump_stack_lvl+0x73/0xb0
[   44.592656]  print_report+0xd1/0x650
[   44.592659]  ? __virt_addr_valid+0x1db/0x2d0
[   44.592663]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.592668]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.592673]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.592678]  kasan_report+0x141/0x180
[   44.592682]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.592688]  kasan_check_range+0x10c/0x1c0
[   44.592692]  __kasan_check_write+0x18/0x20
[   44.592695]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.592700]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   44.592705]  ? __kmalloc_cache_noprof+0x189/0x420
[   44.592710]  ? trace_hardirqs_on+0x37/0xe0
[   44.592714]  ? kasan_bitops_generic+0x92/0x1c0
[   44.592719]  kasan_bitops_generic+0x116/0x1c0
[   44.592723]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   44.592728]  ? ktime_get_ts64+0x83/0x230
[   44.592733]  kunit_try_run_case+0x1a2/0x480
[   44.592737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.592741]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   44.592745]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   44.592750]  ? __kthread_parkme+0x82/0x180
[   44.592753]  ? preempt_count_sub+0x50/0x80
[   44.592757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.592762]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.592766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.592770]  kthread+0x334/0x6f0
[   44.592774]  ? trace_preempt_on+0x20/0xc0
[   44.592778]  ? __pfx_kthread+0x10/0x10
[   44.592781]  ? _raw_spin_unlock_irq+0x47/0x80
[   44.592785]  ? calculate_sigpending+0x7b/0xa0
[   44.592790]  ? __pfx_kthread+0x10/0x10
[   44.592793]  ret_from_fork+0x113/0x1d0
[   44.592797]  ? __pfx_kthread+0x10/0x10
[   44.592800]  ret_from_fork_asm+0x1a/0x30
[   44.592806]  </TASK>
[   44.592808] 
[   44.785657] Allocated by task 302:
[   44.789062]  kasan_save_stack+0x45/0x70
[   44.792902]  kasan_save_track+0x18/0x40
[   44.796742]  kasan_save_alloc_info+0x3b/0x50
[   44.801013]  __kasan_kmalloc+0xb7/0xc0
[   44.804767]  __kmalloc_cache_noprof+0x189/0x420
[   44.809300]  kasan_bitops_generic+0x92/0x1c0
[   44.813571]  kunit_try_run_case+0x1a2/0x480
[   44.817757]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.823159]  kthread+0x334/0x6f0
[   44.826411]  ret_from_fork+0x113/0x1d0
[   44.830168]  ret_from_fork_asm+0x1a/0x30
[   44.834096] 
[   44.835596] The buggy address belongs to the object at ffff8881067131a0
[   44.835596]  which belongs to the cache kmalloc-16 of size 16
[   44.847936] The buggy address is located 8 bytes inside of
[   44.847936]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   44.860191] 
[   44.861688] The buggy address belongs to the physical page:
[   44.867262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   44.875261] flags: 0x200000000000000(node=0|zone=2)
[   44.880140] page_type: f5(slab)
[   44.883287] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   44.891028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.898774] page dumped because: kasan: bad access detected
[   44.904362] 
[   44.905864] Memory state around the buggy address:
[   44.910656]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.917876]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   44.925096] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   44.932314]                                   ^
[   44.936847]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.944066]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.951284] ==================================================================
[   44.958529] ==================================================================
[   44.965758] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.973931] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   44.981323] 
[   44.982851] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   44.982859] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   44.982862] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   44.982865] Call Trace:
[   44.982866]  <TASK>
[   44.982868]  dump_stack_lvl+0x73/0xb0
[   44.982872]  print_report+0xd1/0x650
[   44.982876]  ? __virt_addr_valid+0x1db/0x2d0
[   44.982880]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.982885]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.982890]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.982895]  kasan_report+0x141/0x180
[   44.982899]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.982905]  kasan_check_range+0x10c/0x1c0
[   44.982909]  __kasan_check_write+0x18/0x20
[   44.982912]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.982917]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   44.982922]  ? __kmalloc_cache_noprof+0x189/0x420
[   44.982927]  ? trace_hardirqs_on+0x37/0xe0
[   44.982931]  ? kasan_bitops_generic+0x92/0x1c0
[   44.982936]  kasan_bitops_generic+0x116/0x1c0
[   44.982940]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   44.982945]  ? ktime_get_ts64+0x83/0x230
[   44.982949]  kunit_try_run_case+0x1a2/0x480
[   44.982954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.982958]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   44.982962]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   44.982966]  ? __kthread_parkme+0x82/0x180
[   44.982970]  ? preempt_count_sub+0x50/0x80
[   44.982974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.982979]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.982983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.982987]  kthread+0x334/0x6f0
[   44.982991]  ? trace_preempt_on+0x20/0xc0
[   44.982995]  ? __pfx_kthread+0x10/0x10
[   44.982998]  ? _raw_spin_unlock_irq+0x47/0x80
[   44.983002]  ? calculate_sigpending+0x7b/0xa0
[   44.983007]  ? __pfx_kthread+0x10/0x10
[   44.983010]  ret_from_fork+0x113/0x1d0
[   44.983014]  ? __pfx_kthread+0x10/0x10
[   44.983017]  ret_from_fork_asm+0x1a/0x30
[   44.983023]  </TASK>
[   44.983025] 
[   45.175959] Allocated by task 302:
[   45.179364]  kasan_save_stack+0x45/0x70
[   45.183206]  kasan_save_track+0x18/0x40
[   45.187043]  kasan_save_alloc_info+0x3b/0x50
[   45.191315]  __kasan_kmalloc+0xb7/0xc0
[   45.195096]  __kmalloc_cache_noprof+0x189/0x420
[   45.199635]  kasan_bitops_generic+0x92/0x1c0
[   45.203910]  kunit_try_run_case+0x1a2/0x480
[   45.208103]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.213502]  kthread+0x334/0x6f0
[   45.216736]  ret_from_fork+0x113/0x1d0
[   45.220487]  ret_from_fork_asm+0x1a/0x30
[   45.224415] 
[   45.225914] The buggy address belongs to the object at ffff8881067131a0
[   45.225914]  which belongs to the cache kmalloc-16 of size 16
[   45.238256] The buggy address is located 8 bytes inside of
[   45.238256]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   45.250509] 
[   45.252008] The buggy address belongs to the physical page:
[   45.257583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   45.265588] flags: 0x200000000000000(node=0|zone=2)
[   45.270468] page_type: f5(slab)
[   45.273616] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   45.281364] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.289129] page dumped because: kasan: bad access detected
[   45.294700] 
[   45.296200] Memory state around the buggy address:
[   45.300992]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.308211]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.315433] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.322660]                                   ^
[   45.327193]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.334422]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.341639] ==================================================================
[   45.348864] ==================================================================
[   45.356105] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.364286] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   45.371686] 
[   45.373186] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   45.373194] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   45.373197] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   45.373200] Call Trace:
[   45.373201]  <TASK>
[   45.373203]  dump_stack_lvl+0x73/0xb0
[   45.373207]  print_report+0xd1/0x650
[   45.373211]  ? __virt_addr_valid+0x1db/0x2d0
[   45.373215]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.373220]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.373225]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.373230]  kasan_report+0x141/0x180
[   45.373234]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.373240]  kasan_check_range+0x10c/0x1c0
[   45.373244]  __kasan_check_write+0x18/0x20
[   45.373247]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.373252]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   45.373257]  ? __kmalloc_cache_noprof+0x189/0x420
[   45.373262]  ? trace_hardirqs_on+0x37/0xe0
[   45.373266]  ? kasan_bitops_generic+0x92/0x1c0
[   45.373271]  kasan_bitops_generic+0x116/0x1c0
[   45.373275]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   45.373280]  ? ktime_get_ts64+0x83/0x230
[   45.373284]  kunit_try_run_case+0x1a2/0x480
[   45.373289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.373293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   45.373297]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   45.373302]  ? __kthread_parkme+0x82/0x180
[   45.373305]  ? preempt_count_sub+0x50/0x80
[   45.373309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.373314]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.373318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.373322]  kthread+0x334/0x6f0
[   45.373326]  ? trace_preempt_on+0x20/0xc0
[   45.373347]  ? __pfx_kthread+0x10/0x10
[   45.373351]  ? _raw_spin_unlock_irq+0x47/0x80
[   45.373354]  ? calculate_sigpending+0x7b/0xa0
[   45.373359]  ? __pfx_kthread+0x10/0x10
[   45.373363]  ret_from_fork+0x113/0x1d0
[   45.373367]  ? __pfx_kthread+0x10/0x10
[   45.373370]  ret_from_fork_asm+0x1a/0x30
[   45.373389]  </TASK>
[   45.373390] 
[   45.566271] Allocated by task 302:
[   45.569675]  kasan_save_stack+0x45/0x70
[   45.573515]  kasan_save_track+0x18/0x40
[   45.577366]  kasan_save_alloc_info+0x3b/0x50
[   45.581661]  __kasan_kmalloc+0xb7/0xc0
[   45.585414]  __kmalloc_cache_noprof+0x189/0x420
[   45.589945]  kasan_bitops_generic+0x92/0x1c0
[   45.594220]  kunit_try_run_case+0x1a2/0x480
[   45.598420]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.603823]  kthread+0x334/0x6f0
[   45.607054]  ret_from_fork+0x113/0x1d0
[   45.610807]  ret_from_fork_asm+0x1a/0x30
[   45.614735] 
[   45.616233] The buggy address belongs to the object at ffff8881067131a0
[   45.616233]  which belongs to the cache kmalloc-16 of size 16
[   45.628574] The buggy address is located 8 bytes inside of
[   45.628574]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   45.640829] 
[   45.642328] The buggy address belongs to the physical page:
[   45.647926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   45.655925] flags: 0x200000000000000(node=0|zone=2)
[   45.660804] page_type: f5(slab)
[   45.663951] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   45.671691] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.679429] page dumped because: kasan: bad access detected
[   45.685003] 
[   45.686502] Memory state around the buggy address:
[   45.691294]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.698514]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   45.705732] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   45.712951]                                   ^
[   45.717486]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.724704]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.731923] ==================================================================
[   46.519656] ==================================================================
[   46.526895] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.535068] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   46.542460] 
[   46.543962] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   46.543969] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   46.543972] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   46.543975] Call Trace:
[   46.543977]  <TASK>
[   46.543979]  dump_stack_lvl+0x73/0xb0
[   46.543983]  print_report+0xd1/0x650
[   46.543987]  ? __virt_addr_valid+0x1db/0x2d0
[   46.543991]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.543996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.544001]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.544005]  kasan_report+0x141/0x180
[   46.544010]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.544015]  kasan_check_range+0x10c/0x1c0
[   46.544020]  __kasan_check_write+0x18/0x20
[   46.544023]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.544028]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   46.544033]  ? __kmalloc_cache_noprof+0x189/0x420
[   46.544038]  ? trace_hardirqs_on+0x37/0xe0
[   46.544042]  ? kasan_bitops_generic+0x92/0x1c0
[   46.544047]  kasan_bitops_generic+0x116/0x1c0
[   46.544051]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   46.544056]  ? ktime_get_ts64+0x83/0x230
[   46.544060]  kunit_try_run_case+0x1a2/0x480
[   46.544065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.544069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   46.544073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   46.544077]  ? __kthread_parkme+0x82/0x180
[   46.544081]  ? preempt_count_sub+0x50/0x80
[   46.544085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.544089]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.544094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.544098]  kthread+0x334/0x6f0
[   46.544101]  ? trace_preempt_on+0x20/0xc0
[   46.544105]  ? __pfx_kthread+0x10/0x10
[   46.544109]  ? _raw_spin_unlock_irq+0x47/0x80
[   46.544113]  ? calculate_sigpending+0x7b/0xa0
[   46.544117]  ? __pfx_kthread+0x10/0x10
[   46.544121]  ret_from_fork+0x113/0x1d0
[   46.544124]  ? __pfx_kthread+0x10/0x10
[   46.544128]  ret_from_fork_asm+0x1a/0x30
[   46.544134]  </TASK>
[   46.544135] 
[   46.737036] Allocated by task 302:
[   46.740440]  kasan_save_stack+0x45/0x70
[   46.744280]  kasan_save_track+0x18/0x40
[   46.748119]  kasan_save_alloc_info+0x3b/0x50
[   46.752407]  __kasan_kmalloc+0xb7/0xc0
[   46.756162]  __kmalloc_cache_noprof+0x189/0x420
[   46.760694]  kasan_bitops_generic+0x92/0x1c0
[   46.764966]  kunit_try_run_case+0x1a2/0x480
[   46.769154]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.774554]  kthread+0x334/0x6f0
[   46.777786]  ret_from_fork+0x113/0x1d0
[   46.781539]  ret_from_fork_asm+0x1a/0x30
[   46.785466] 
[   46.786962] The buggy address belongs to the object at ffff8881067131a0
[   46.786962]  which belongs to the cache kmalloc-16 of size 16
[   46.799295] The buggy address is located 8 bytes inside of
[   46.799295]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   46.811552] 
[   46.813049] The buggy address belongs to the physical page:
[   46.818623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   46.826622] flags: 0x200000000000000(node=0|zone=2)
[   46.831502] page_type: f5(slab)
[   46.834649] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   46.842396] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.850136] page dumped because: kasan: bad access detected
[   46.855709] 
[   46.857205] Memory state around the buggy address:
[   46.862000]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.869218]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   46.876438] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   46.883658]                                   ^
[   46.888191]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.895409]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.902627] ==================================================================