Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-x86_64
x86

[   15.897317] ==================================================================
[   15.897833] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.898480] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.898887] 
[   15.899022] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.899157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.899181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.899215] Call Trace:
[   15.899257]  <TASK>
[   15.899286]  dump_stack_lvl+0x73/0xb0
[   15.899361]  print_report+0xd1/0x650
[   15.899420]  ? __virt_addr_valid+0x1db/0x2d0
[   15.899477]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.899540]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.899590]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.899664]  kasan_report+0x141/0x180
[   15.899714]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.899768]  kasan_check_range+0x10c/0x1c0
[   15.899834]  __kasan_check_write+0x18/0x20
[   15.899873]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.899944]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.899999]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.900053]  ? trace_hardirqs_on+0x37/0xe0
[   15.900097]  ? kasan_bitops_generic+0x92/0x1c0
[   15.900168]  kasan_bitops_generic+0x121/0x1c0
[   15.900190]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.900212]  ? __pfx_read_tsc+0x10/0x10
[   15.900231]  ? ktime_get_ts64+0x86/0x230
[   15.900254]  kunit_try_run_case+0x1a5/0x480
[   15.900276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.900295]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.900316]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.900335]  ? __kthread_parkme+0x82/0x180
[   15.900354]  ? preempt_count_sub+0x50/0x80
[   15.900376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.900396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.900417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.900437]  kthread+0x337/0x6f0
[   15.900455]  ? trace_preempt_on+0x20/0xc0
[   15.900475]  ? __pfx_kthread+0x10/0x10
[   15.900493]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.900513]  ? calculate_sigpending+0x7b/0xa0
[   15.900534]  ? __pfx_kthread+0x10/0x10
[   15.900553]  ret_from_fork+0x116/0x1d0
[   15.900570]  ? __pfx_kthread+0x10/0x10
[   15.900588]  ret_from_fork_asm+0x1a/0x30
[   15.900632]  </TASK>
[   15.900647] 
[   15.911321] Allocated by task 279:
[   15.911573]  kasan_save_stack+0x45/0x70
[   15.911918]  kasan_save_track+0x18/0x40
[   15.912159]  kasan_save_alloc_info+0x3b/0x50
[   15.912353]  __kasan_kmalloc+0xb7/0xc0
[   15.912541]  __kmalloc_cache_noprof+0x189/0x420
[   15.912761]  kasan_bitops_generic+0x92/0x1c0
[   15.913039]  kunit_try_run_case+0x1a5/0x480
[   15.913408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.913806]  kthread+0x337/0x6f0
[   15.914077]  ret_from_fork+0x116/0x1d0
[   15.914391]  ret_from_fork_asm+0x1a/0x30
[   15.914695] 
[   15.914850] The buggy address belongs to the object at ffff8881024eb440
[   15.914850]  which belongs to the cache kmalloc-16 of size 16
[   15.915737] The buggy address is located 8 bytes inside of
[   15.915737]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.916399] 
[   15.916587] The buggy address belongs to the physical page:
[   15.916867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.917137] flags: 0x200000000000000(node=0|zone=2)
[   15.917338] page_type: f5(slab)
[   15.917601] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.918208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.918664] page dumped because: kasan: bad access detected
[   15.919087] 
[   15.919286] Memory state around the buggy address:
[   15.919589]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.920155]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.920439] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.920890]                                               ^
[   15.921087]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.921343]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.921862] ==================================================================
[   16.003982] ==================================================================
[   16.005052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.005475] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   16.005956] 
[   16.006094] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.006508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.006533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.006562] Call Trace:
[   16.006577]  <TASK>
[   16.006592]  dump_stack_lvl+0x73/0xb0
[   16.006643]  print_report+0xd1/0x650
[   16.006665]  ? __virt_addr_valid+0x1db/0x2d0
[   16.006684]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.006708]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.006730]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.006754]  kasan_report+0x141/0x180
[   16.006774]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.006803]  kasan_check_range+0x10c/0x1c0
[   16.006824]  __kasan_check_write+0x18/0x20
[   16.006841]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   16.006864]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.006888]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.006909]  ? trace_hardirqs_on+0x37/0xe0
[   16.006929]  ? kasan_bitops_generic+0x92/0x1c0
[   16.006953]  kasan_bitops_generic+0x121/0x1c0
[   16.006974]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.006996]  ? __pfx_read_tsc+0x10/0x10
[   16.007014]  ? ktime_get_ts64+0x86/0x230
[   16.007036]  kunit_try_run_case+0x1a5/0x480
[   16.007057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.007076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.007096]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.007133]  ? __kthread_parkme+0x82/0x180
[   16.007151]  ? preempt_count_sub+0x50/0x80
[   16.007173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.007194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.007214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.007234]  kthread+0x337/0x6f0
[   16.007251]  ? trace_preempt_on+0x20/0xc0
[   16.007272]  ? __pfx_kthread+0x10/0x10
[   16.007289]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.007308]  ? calculate_sigpending+0x7b/0xa0
[   16.007329]  ? __pfx_kthread+0x10/0x10
[   16.007348]  ret_from_fork+0x116/0x1d0
[   16.007365]  ? __pfx_kthread+0x10/0x10
[   16.007383]  ret_from_fork_asm+0x1a/0x30
[   16.007411]  </TASK>
[   16.007422] 
[   16.019771] Allocated by task 279:
[   16.019954]  kasan_save_stack+0x45/0x70
[   16.020602]  kasan_save_track+0x18/0x40
[   16.020884]  kasan_save_alloc_info+0x3b/0x50
[   16.021072]  __kasan_kmalloc+0xb7/0xc0
[   16.021441]  __kmalloc_cache_noprof+0x189/0x420
[   16.021704]  kasan_bitops_generic+0x92/0x1c0
[   16.021918]  kunit_try_run_case+0x1a5/0x480
[   16.022281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.023053]  kthread+0x337/0x6f0
[   16.023300]  ret_from_fork+0x116/0x1d0
[   16.023791]  ret_from_fork_asm+0x1a/0x30
[   16.024150] 
[   16.024327] The buggy address belongs to the object at ffff8881024eb440
[   16.024327]  which belongs to the cache kmalloc-16 of size 16
[   16.025082] The buggy address is located 8 bytes inside of
[   16.025082]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   16.026046] 
[   16.026269] The buggy address belongs to the physical page:
[   16.026561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   16.027016] flags: 0x200000000000000(node=0|zone=2)
[   16.027312] page_type: f5(slab)
[   16.027870] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.028329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.028748] page dumped because: kasan: bad access detected
[   16.029084] 
[   16.029261] Memory state around the buggy address:
[   16.029664]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.030079]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.030721] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.031093]                                               ^
[   16.031578]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.031963]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.032516] ==================================================================
[   16.085666] ==================================================================
[   16.086003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.086760] Read of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   16.086986] 
[   16.087206] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.087283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.087304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.087341] Call Trace:
[   16.087396]  <TASK>
[   16.087423]  dump_stack_lvl+0x73/0xb0
[   16.087495]  print_report+0xd1/0x650
[   16.087534]  ? __virt_addr_valid+0x1db/0x2d0
[   16.087573]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.087654]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.087715]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.087749]  kasan_report+0x141/0x180
[   16.087770]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.087798]  __asan_report_load8_noabort+0x18/0x20
[   16.087819]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.087843]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.087867]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.087900]  ? trace_hardirqs_on+0x37/0xe0
[   16.087935]  ? kasan_bitops_generic+0x92/0x1c0
[   16.087980]  kasan_bitops_generic+0x121/0x1c0
[   16.088048]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.088109]  ? __pfx_read_tsc+0x10/0x10
[   16.088141]  ? ktime_get_ts64+0x86/0x230
[   16.088198]  kunit_try_run_case+0x1a5/0x480
[   16.088262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.088300]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.088358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.088396]  ? __kthread_parkme+0x82/0x180
[   16.088422]  ? preempt_count_sub+0x50/0x80
[   16.088444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.088465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.088486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.088507]  kthread+0x337/0x6f0
[   16.088525]  ? trace_preempt_on+0x20/0xc0
[   16.088546]  ? __pfx_kthread+0x10/0x10
[   16.088564]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.088582]  ? calculate_sigpending+0x7b/0xa0
[   16.088603]  ? __pfx_kthread+0x10/0x10
[   16.088640]  ret_from_fork+0x116/0x1d0
[   16.088659]  ? __pfx_kthread+0x10/0x10
[   16.088678]  ret_from_fork_asm+0x1a/0x30
[   16.088706]  </TASK>
[   16.088718] 
[   16.099227] Allocated by task 279:
[   16.099528]  kasan_save_stack+0x45/0x70
[   16.099889]  kasan_save_track+0x18/0x40
[   16.100264]  kasan_save_alloc_info+0x3b/0x50
[   16.100647]  __kasan_kmalloc+0xb7/0xc0
[   16.100981]  __kmalloc_cache_noprof+0x189/0x420
[   16.101351]  kasan_bitops_generic+0x92/0x1c0
[   16.101604]  kunit_try_run_case+0x1a5/0x480
[   16.101877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.102165]  kthread+0x337/0x6f0
[   16.102393]  ret_from_fork+0x116/0x1d0
[   16.102718]  ret_from_fork_asm+0x1a/0x30
[   16.103033] 
[   16.103220] The buggy address belongs to the object at ffff8881024eb440
[   16.103220]  which belongs to the cache kmalloc-16 of size 16
[   16.103994] The buggy address is located 8 bytes inside of
[   16.103994]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   16.104871] 
[   16.105073] The buggy address belongs to the physical page:
[   16.105494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   16.106001] flags: 0x200000000000000(node=0|zone=2)
[   16.106389] page_type: f5(slab)
[   16.106722] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.106989] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.107482] page dumped because: kasan: bad access detected
[   16.107962] 
[   16.108154] Memory state around the buggy address:
[   16.108500]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.108899]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.109406] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.109671]                                               ^
[   16.109873]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.110112]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.110670] ==================================================================
[   15.871272] ==================================================================
[   15.871689] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.871981] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.872404] 
[   15.872580] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.872811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.872842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.872907] Call Trace:
[   15.872961]  <TASK>
[   15.872990]  dump_stack_lvl+0x73/0xb0
[   15.873046]  print_report+0xd1/0x650
[   15.873086]  ? __virt_addr_valid+0x1db/0x2d0
[   15.873154]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.873203]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.873250]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.873301]  kasan_report+0x141/0x180
[   15.873343]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.873404]  kasan_check_range+0x10c/0x1c0
[   15.873450]  __kasan_check_write+0x18/0x20
[   15.873486]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.873537]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.873589]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.873648]  ? trace_hardirqs_on+0x37/0xe0
[   15.873693]  ? kasan_bitops_generic+0x92/0x1c0
[   15.873897]  kasan_bitops_generic+0x121/0x1c0
[   15.873941]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.873976]  ? __pfx_read_tsc+0x10/0x10
[   15.874006]  ? ktime_get_ts64+0x86/0x230
[   15.874041]  kunit_try_run_case+0x1a5/0x480
[   15.874074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.874142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.874257]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.874308]  ? __kthread_parkme+0x82/0x180
[   15.874343]  ? preempt_count_sub+0x50/0x80
[   15.874383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.874426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.874470]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.874512]  kthread+0x337/0x6f0
[   15.874541]  ? trace_preempt_on+0x20/0xc0
[   15.874563]  ? __pfx_kthread+0x10/0x10
[   15.874581]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.874600]  ? calculate_sigpending+0x7b/0xa0
[   15.874641]  ? __pfx_kthread+0x10/0x10
[   15.874662]  ret_from_fork+0x116/0x1d0
[   15.874680]  ? __pfx_kthread+0x10/0x10
[   15.874698]  ret_from_fork_asm+0x1a/0x30
[   15.874726]  </TASK>
[   15.874739] 
[   15.884949] Allocated by task 279:
[   15.885309]  kasan_save_stack+0x45/0x70
[   15.885648]  kasan_save_track+0x18/0x40
[   15.885955]  kasan_save_alloc_info+0x3b/0x50
[   15.886293]  __kasan_kmalloc+0xb7/0xc0
[   15.886645]  __kmalloc_cache_noprof+0x189/0x420
[   15.886970]  kasan_bitops_generic+0x92/0x1c0
[   15.887263]  kunit_try_run_case+0x1a5/0x480
[   15.887523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.887920]  kthread+0x337/0x6f0
[   15.888246]  ret_from_fork+0x116/0x1d0
[   15.888498]  ret_from_fork_asm+0x1a/0x30
[   15.888682] 
[   15.888790] The buggy address belongs to the object at ffff8881024eb440
[   15.888790]  which belongs to the cache kmalloc-16 of size 16
[   15.889626] The buggy address is located 8 bytes inside of
[   15.889626]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.890353] 
[   15.890528] The buggy address belongs to the physical page:
[   15.890827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.891084] flags: 0x200000000000000(node=0|zone=2)
[   15.891516] page_type: f5(slab)
[   15.891799] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.892418] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.892912] page dumped because: kasan: bad access detected
[   15.893142] 
[   15.893243] Memory state around the buggy address:
[   15.893426]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.894027]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.894590] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.895012]                                               ^
[   15.895415]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.895833]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.896293] ==================================================================
[   16.059817] ==================================================================
[   16.060115] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.060407] Read of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   16.060936] 
[   16.061178] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.061260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.061284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.061323] Call Trace:
[   16.061352]  <TASK>
[   16.061382]  dump_stack_lvl+0x73/0xb0
[   16.061435]  print_report+0xd1/0x650
[   16.061473]  ? __virt_addr_valid+0x1db/0x2d0
[   16.061504]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.061549]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.061590]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.061674]  kasan_report+0x141/0x180
[   16.061717]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.061781]  kasan_check_range+0x10c/0x1c0
[   16.061826]  __kasan_check_read+0x15/0x20
[   16.061859]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.061901]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.061957]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.062002]  ? trace_hardirqs_on+0x37/0xe0
[   16.062045]  ? kasan_bitops_generic+0x92/0x1c0
[   16.062111]  kasan_bitops_generic+0x121/0x1c0
[   16.062163]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.062204]  ? __pfx_read_tsc+0x10/0x10
[   16.062238]  ? ktime_get_ts64+0x86/0x230
[   16.062295]  kunit_try_run_case+0x1a5/0x480
[   16.062372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.062409]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.062446]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.062485]  ? __kthread_parkme+0x82/0x180
[   16.062521]  ? preempt_count_sub+0x50/0x80
[   16.062566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.062607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.062664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.062705]  kthread+0x337/0x6f0
[   16.062742]  ? trace_preempt_on+0x20/0xc0
[   16.062807]  ? __pfx_kthread+0x10/0x10
[   16.062846]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.062886]  ? calculate_sigpending+0x7b/0xa0
[   16.062929]  ? __pfx_kthread+0x10/0x10
[   16.062963]  ret_from_fork+0x116/0x1d0
[   16.062982]  ? __pfx_kthread+0x10/0x10
[   16.063001]  ret_from_fork_asm+0x1a/0x30
[   16.063030]  </TASK>
[   16.063042] 
[   16.072002] Allocated by task 279:
[   16.072172]  kasan_save_stack+0x45/0x70
[   16.072572]  kasan_save_track+0x18/0x40
[   16.072885]  kasan_save_alloc_info+0x3b/0x50
[   16.073201]  __kasan_kmalloc+0xb7/0xc0
[   16.073477]  __kmalloc_cache_noprof+0x189/0x420
[   16.073813]  kasan_bitops_generic+0x92/0x1c0
[   16.074099]  kunit_try_run_case+0x1a5/0x480
[   16.074399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.074678]  kthread+0x337/0x6f0
[   16.074944]  ret_from_fork+0x116/0x1d0
[   16.075203]  ret_from_fork_asm+0x1a/0x30
[   16.075482] 
[   16.075665] The buggy address belongs to the object at ffff8881024eb440
[   16.075665]  which belongs to the cache kmalloc-16 of size 16
[   16.076193] The buggy address is located 8 bytes inside of
[   16.076193]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   16.076607] 
[   16.076726] The buggy address belongs to the physical page:
[   16.076915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   16.077226] flags: 0x200000000000000(node=0|zone=2)
[   16.077574] page_type: f5(slab)
[   16.077850] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.078553] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.079077] page dumped because: kasan: bad access detected
[   16.079437] 
[   16.079539] Memory state around the buggy address:
[   16.079737]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.080001]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.080480] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.080977]                                               ^
[   16.081354]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.081735]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.082114] ==================================================================
[   15.922781] ==================================================================
[   15.923589] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.924192] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.924633] 
[   15.924865] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.924945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.924969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.925032] Call Trace:
[   15.925061]  <TASK>
[   15.925129]  dump_stack_lvl+0x73/0xb0
[   15.925214]  print_report+0xd1/0x650
[   15.925257]  ? __virt_addr_valid+0x1db/0x2d0
[   15.925323]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.925388]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.925669]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.925722]  kasan_report+0x141/0x180
[   15.925949]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.926002]  kasan_check_range+0x10c/0x1c0
[   15.926030]  __kasan_check_write+0x18/0x20
[   15.926048]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.926073]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.926097]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.926137]  ? trace_hardirqs_on+0x37/0xe0
[   15.926160]  ? kasan_bitops_generic+0x92/0x1c0
[   15.926185]  kasan_bitops_generic+0x121/0x1c0
[   15.926206]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.926228]  ? __pfx_read_tsc+0x10/0x10
[   15.926247]  ? ktime_get_ts64+0x86/0x230
[   15.926269]  kunit_try_run_case+0x1a5/0x480
[   15.926290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.926311]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.926333]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.926353]  ? __kthread_parkme+0x82/0x180
[   15.926371]  ? preempt_count_sub+0x50/0x80
[   15.926393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.926414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.926434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.926454]  kthread+0x337/0x6f0
[   15.926472]  ? trace_preempt_on+0x20/0xc0
[   15.926492]  ? __pfx_kthread+0x10/0x10
[   15.926511]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.926530]  ? calculate_sigpending+0x7b/0xa0
[   15.926551]  ? __pfx_kthread+0x10/0x10
[   15.926571]  ret_from_fork+0x116/0x1d0
[   15.926587]  ? __pfx_kthread+0x10/0x10
[   15.926606]  ret_from_fork_asm+0x1a/0x30
[   15.926651]  </TASK>
[   15.926664] 
[   15.937563] Allocated by task 279:
[   15.937863]  kasan_save_stack+0x45/0x70
[   15.938048]  kasan_save_track+0x18/0x40
[   15.938352]  kasan_save_alloc_info+0x3b/0x50
[   15.938518]  __kasan_kmalloc+0xb7/0xc0
[   15.938812]  __kmalloc_cache_noprof+0x189/0x420
[   15.938980]  kasan_bitops_generic+0x92/0x1c0
[   15.939243]  kunit_try_run_case+0x1a5/0x480
[   15.939462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.939794]  kthread+0x337/0x6f0
[   15.940074]  ret_from_fork+0x116/0x1d0
[   15.940321]  ret_from_fork_asm+0x1a/0x30
[   15.940942] 
[   15.941814] The buggy address belongs to the object at ffff8881024eb440
[   15.941814]  which belongs to the cache kmalloc-16 of size 16
[   15.944196] The buggy address is located 8 bytes inside of
[   15.944196]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.944550] 
[   15.944714] The buggy address belongs to the physical page:
[   15.945084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.945364] flags: 0x200000000000000(node=0|zone=2)
[   15.945542] page_type: f5(slab)
[   15.945731] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.945963] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.946329] page dumped because: kasan: bad access detected
[   15.946650] 
[   15.946808] Memory state around the buggy address:
[   15.947157]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.947659]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.948149] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.948375]                                               ^
[   15.948566]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.948801]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.949014] ==================================================================
[   15.949757] ==================================================================
[   15.950382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.951079] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.951447] 
[   15.951610] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.951693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.951723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.951758] Call Trace:
[   15.951796]  <TASK>
[   15.951824]  dump_stack_lvl+0x73/0xb0
[   15.951874]  print_report+0xd1/0x650
[   15.951914]  ? __virt_addr_valid+0x1db/0x2d0
[   15.951959]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.952010]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.952069]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.952145]  kasan_report+0x141/0x180
[   15.952197]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.952266]  kasan_check_range+0x10c/0x1c0
[   15.952341]  __kasan_check_write+0x18/0x20
[   15.952380]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.952432]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.952495]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.952540]  ? trace_hardirqs_on+0x37/0xe0
[   15.952582]  ? kasan_bitops_generic+0x92/0x1c0
[   15.952655]  kasan_bitops_generic+0x121/0x1c0
[   15.952701]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.952759]  ? __pfx_read_tsc+0x10/0x10
[   15.952793]  ? ktime_get_ts64+0x86/0x230
[   15.952837]  kunit_try_run_case+0x1a5/0x480
[   15.952879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.952927]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.952984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.953024]  ? __kthread_parkme+0x82/0x180
[   15.953060]  ? preempt_count_sub+0x50/0x80
[   15.953137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.953199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.953242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.953284]  kthread+0x337/0x6f0
[   15.953327]  ? trace_preempt_on+0x20/0xc0
[   15.953383]  ? __pfx_kthread+0x10/0x10
[   15.953423]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.953462]  ? calculate_sigpending+0x7b/0xa0
[   15.953512]  ? __pfx_kthread+0x10/0x10
[   15.953554]  ret_from_fork+0x116/0x1d0
[   15.953604]  ? __pfx_kthread+0x10/0x10
[   15.953667]  ret_from_fork_asm+0x1a/0x30
[   15.953732]  </TASK>
[   15.953755] 
[   15.963580] Allocated by task 279:
[   15.963871]  kasan_save_stack+0x45/0x70
[   15.964225]  kasan_save_track+0x18/0x40
[   15.964452]  kasan_save_alloc_info+0x3b/0x50
[   15.964765]  __kasan_kmalloc+0xb7/0xc0
[   15.964933]  __kmalloc_cache_noprof+0x189/0x420
[   15.965146]  kasan_bitops_generic+0x92/0x1c0
[   15.965328]  kunit_try_run_case+0x1a5/0x480
[   15.965598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.966014]  kthread+0x337/0x6f0
[   15.966312]  ret_from_fork+0x116/0x1d0
[   15.966595]  ret_from_fork_asm+0x1a/0x30
[   15.966885] 
[   15.967041] The buggy address belongs to the object at ffff8881024eb440
[   15.967041]  which belongs to the cache kmalloc-16 of size 16
[   15.967586] The buggy address is located 8 bytes inside of
[   15.967586]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.967953] 
[   15.968097] The buggy address belongs to the physical page:
[   15.968516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.969055] flags: 0x200000000000000(node=0|zone=2)
[   15.969456] page_type: f5(slab)
[   15.969736] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.970162] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.970562] page dumped because: kasan: bad access detected
[   15.970877] 
[   15.971069] Memory state around the buggy address:
[   15.971385]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.971798]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.972198] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.972531]                                               ^
[   15.972878]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.973305]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.973536] ==================================================================
[   15.975078] ==================================================================
[   15.976267] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.976769] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   15.977297] 
[   15.977457] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.977550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.977569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.977592] Call Trace:
[   15.977611]  <TASK>
[   15.977645]  dump_stack_lvl+0x73/0xb0
[   15.977685]  print_report+0xd1/0x650
[   15.977716]  ? __virt_addr_valid+0x1db/0x2d0
[   15.977752]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.977787]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.977825]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.977871]  kasan_report+0x141/0x180
[   15.977908]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.977974]  kasan_check_range+0x10c/0x1c0
[   15.978028]  __kasan_check_write+0x18/0x20
[   15.978067]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.978142]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.978199]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.978258]  ? trace_hardirqs_on+0x37/0xe0
[   15.978300]  ? kasan_bitops_generic+0x92/0x1c0
[   15.978351]  kasan_bitops_generic+0x121/0x1c0
[   15.978394]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.978440]  ? __pfx_read_tsc+0x10/0x10
[   15.978477]  ? ktime_get_ts64+0x86/0x230
[   15.978524]  kunit_try_run_case+0x1a5/0x480
[   15.978569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.978611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.978668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.978714]  ? __kthread_parkme+0x82/0x180
[   15.978752]  ? preempt_count_sub+0x50/0x80
[   15.978809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.978854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.978901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.978943]  kthread+0x337/0x6f0
[   15.978982]  ? trace_preempt_on+0x20/0xc0
[   15.979025]  ? __pfx_kthread+0x10/0x10
[   15.979064]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.979133]  ? calculate_sigpending+0x7b/0xa0
[   15.979181]  ? __pfx_kthread+0x10/0x10
[   15.979224]  ret_from_fork+0x116/0x1d0
[   15.979255]  ? __pfx_kthread+0x10/0x10
[   15.979289]  ret_from_fork_asm+0x1a/0x30
[   15.979336]  </TASK>
[   15.979356] 
[   15.990151] Allocated by task 279:
[   15.990335]  kasan_save_stack+0x45/0x70
[   15.990524]  kasan_save_track+0x18/0x40
[   15.991712]  kasan_save_alloc_info+0x3b/0x50
[   15.991928]  __kasan_kmalloc+0xb7/0xc0
[   15.992401]  __kmalloc_cache_noprof+0x189/0x420
[   15.992678]  kasan_bitops_generic+0x92/0x1c0
[   15.992884]  kunit_try_run_case+0x1a5/0x480
[   15.993067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.993753]  kthread+0x337/0x6f0
[   15.993954]  ret_from_fork+0x116/0x1d0
[   15.994238]  ret_from_fork_asm+0x1a/0x30
[   15.994419] 
[   15.994577] The buggy address belongs to the object at ffff8881024eb440
[   15.994577]  which belongs to the cache kmalloc-16 of size 16
[   15.995689] The buggy address is located 8 bytes inside of
[   15.995689]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   15.996520] 
[   15.996751] The buggy address belongs to the physical page:
[   15.996947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   15.997398] flags: 0x200000000000000(node=0|zone=2)
[   15.997651] page_type: f5(slab)
[   15.997838] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.998561] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.998864] page dumped because: kasan: bad access detected
[   15.999593] 
[   15.999702] Memory state around the buggy address:
[   15.999896]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.000426]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.000710] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.001111]                                               ^
[   16.001733]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.002466]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.002960] ==================================================================
[   16.033586] ==================================================================
[   16.034201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.034667] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279
[   16.034965] 
[   16.035092] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.035628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.035648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.035668] Call Trace:
[   16.035685]  <TASK>
[   16.035702]  dump_stack_lvl+0x73/0xb0
[   16.035733]  print_report+0xd1/0x650
[   16.035754]  ? __virt_addr_valid+0x1db/0x2d0
[   16.035773]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.035797]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.035819]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.035842]  kasan_report+0x141/0x180
[   16.035861]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.035889]  kasan_check_range+0x10c/0x1c0
[   16.035910]  __kasan_check_write+0x18/0x20
[   16.035928]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.035952]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.035976]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.035997]  ? trace_hardirqs_on+0x37/0xe0
[   16.036017]  ? kasan_bitops_generic+0x92/0x1c0
[   16.036042]  kasan_bitops_generic+0x121/0x1c0
[   16.036062]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.036084]  ? __pfx_read_tsc+0x10/0x10
[   16.036106]  ? ktime_get_ts64+0x86/0x230
[   16.036143]  kunit_try_run_case+0x1a5/0x480
[   16.036164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.036184]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.036204]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.036224]  ? __kthread_parkme+0x82/0x180
[   16.036242]  ? preempt_count_sub+0x50/0x80
[   16.036263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.036283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.036303]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.036322]  kthread+0x337/0x6f0
[   16.036340]  ? trace_preempt_on+0x20/0xc0
[   16.036359]  ? __pfx_kthread+0x10/0x10
[   16.036377]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.036395]  ? calculate_sigpending+0x7b/0xa0
[   16.036416]  ? __pfx_kthread+0x10/0x10
[   16.036435]  ret_from_fork+0x116/0x1d0
[   16.036451]  ? __pfx_kthread+0x10/0x10
[   16.036469]  ret_from_fork_asm+0x1a/0x30
[   16.036497]  </TASK>
[   16.036507] 
[   16.047691] Allocated by task 279:
[   16.048079]  kasan_save_stack+0x45/0x70
[   16.048385]  kasan_save_track+0x18/0x40
[   16.048836]  kasan_save_alloc_info+0x3b/0x50
[   16.049140]  __kasan_kmalloc+0xb7/0xc0
[   16.049341]  __kmalloc_cache_noprof+0x189/0x420
[   16.049713]  kasan_bitops_generic+0x92/0x1c0
[   16.050249]  kunit_try_run_case+0x1a5/0x480
[   16.050603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.051084]  kthread+0x337/0x6f0
[   16.051250]  ret_from_fork+0x116/0x1d0
[   16.051708]  ret_from_fork_asm+0x1a/0x30
[   16.051937] 
[   16.052088] The buggy address belongs to the object at ffff8881024eb440
[   16.052088]  which belongs to the cache kmalloc-16 of size 16
[   16.052826] The buggy address is located 8 bytes inside of
[   16.052826]  allocated 9-byte region [ffff8881024eb440, ffff8881024eb449)
[   16.053350] 
[   16.053548] The buggy address belongs to the physical page:
[   16.053963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   16.054296] flags: 0x200000000000000(node=0|zone=2)
[   16.054566] page_type: f5(slab)
[   16.054866] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.055435] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.055688] page dumped because: kasan: bad access detected
[   16.056074] 
[   16.056199] Memory state around the buggy address:
[   16.056629]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.056890]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.057124] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.057633]                                               ^
[   16.058018]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.058413]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.058774] ==================================================================

[   15.866803] ==================================================================
[   15.867571] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.868391] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.869084] 
[   15.869279] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.869326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.869339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.869360] Call Trace:
[   15.869375]  <TASK>
[   15.869392]  dump_stack_lvl+0x73/0xb0
[   15.869419]  print_report+0xd1/0x650
[   15.869442]  ? __virt_addr_valid+0x1db/0x2d0
[   15.869464]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.869492]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.869520]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.869553]  kasan_report+0x141/0x180
[   15.869577]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.869611]  kasan_check_range+0x10c/0x1c0
[   15.869636]  __kasan_check_write+0x18/0x20
[   15.869656]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.869684]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.869737]  ? kasan_save_alloc_info+0x3b/0x50
[   15.869761]  ? kasan_save_stack+0x45/0x70
[   15.869786]  kasan_bitops_generic+0x121/0x1c0
[   15.869810]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.869836]  ? __pfx_read_tsc+0x10/0x10
[   15.869858]  ? ktime_get_ts64+0x86/0x230
[   15.869883]  kunit_try_run_case+0x1a5/0x480
[   15.869907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.869930]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.869953]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.869978]  ? __kthread_parkme+0x82/0x180
[   15.869998]  ? preempt_count_sub+0x50/0x80
[   15.870023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.870057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.870080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.870105]  kthread+0x337/0x6f0
[   15.870126]  ? trace_preempt_on+0x20/0xc0
[   15.870150]  ? __pfx_kthread+0x10/0x10
[   15.870172]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.870194]  ? calculate_sigpending+0x7b/0xa0
[   15.870218]  ? __pfx_kthread+0x10/0x10
[   15.870241]  ret_from_fork+0x116/0x1d0
[   15.870260]  ? __pfx_kthread+0x10/0x10
[   15.870282]  ret_from_fork_asm+0x1a/0x30
[   15.870315]  </TASK>
[   15.870327] 
[   15.883482] Allocated by task 278:
[   15.883624]  kasan_save_stack+0x45/0x70
[   15.883918]  kasan_save_track+0x18/0x40
[   15.884287]  kasan_save_alloc_info+0x3b/0x50
[   15.884675]  __kasan_kmalloc+0xb7/0xc0
[   15.885069]  __kmalloc_cache_noprof+0x189/0x420
[   15.885498]  kasan_bitops_generic+0x92/0x1c0
[   15.885915]  kunit_try_run_case+0x1a5/0x480
[   15.886305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.886807]  kthread+0x337/0x6f0
[   15.887122]  ret_from_fork+0x116/0x1d0
[   15.887475]  ret_from_fork_asm+0x1a/0x30
[   15.887870] 
[   15.888032] The buggy address belongs to the object at ffff888102873120
[   15.888032]  which belongs to the cache kmalloc-16 of size 16
[   15.888966] The buggy address is located 8 bytes inside of
[   15.888966]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.889470] 
[   15.889649] The buggy address belongs to the physical page:
[   15.890168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.890880] flags: 0x200000000000000(node=0|zone=2)
[   15.891333] page_type: f5(slab)
[   15.891625] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.891999] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.892246] page dumped because: kasan: bad access detected
[   15.892425] 
[   15.892498] Memory state around the buggy address:
[   15.892658]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.893243]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.893887] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.894512]                                   ^
[   15.894927]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.895557]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.896195] ==================================================================
[   15.926575] ==================================================================
[   15.926845] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.927155] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.927398] 
[   15.927490] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.927535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.927547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.927570] Call Trace:
[   15.927587]  <TASK>
[   15.927604]  dump_stack_lvl+0x73/0xb0
[   15.927631]  print_report+0xd1/0x650
[   15.927654]  ? __virt_addr_valid+0x1db/0x2d0
[   15.927677]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.927705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.927731]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.927760]  kasan_report+0x141/0x180
[   15.927783]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.927817]  kasan_check_range+0x10c/0x1c0
[   15.927842]  __kasan_check_write+0x18/0x20
[   15.927860]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.927889]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.927918]  ? kasan_save_alloc_info+0x3b/0x50
[   15.927942]  ? kasan_save_stack+0x45/0x70
[   15.927966]  kasan_bitops_generic+0x121/0x1c0
[   15.927990]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.928016]  ? __pfx_read_tsc+0x10/0x10
[   15.928037]  ? ktime_get_ts64+0x86/0x230
[   15.928241]  kunit_try_run_case+0x1a5/0x480
[   15.928268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.928292]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.928317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.928341]  ? __kthread_parkme+0x82/0x180
[   15.928361]  ? preempt_count_sub+0x50/0x80
[   15.928386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.928411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.928434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.928458]  kthread+0x337/0x6f0
[   15.928479]  ? trace_preempt_on+0x20/0xc0
[   15.928502]  ? __pfx_kthread+0x10/0x10
[   15.928524]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.928545]  ? calculate_sigpending+0x7b/0xa0
[   15.928571]  ? __pfx_kthread+0x10/0x10
[   15.928594]  ret_from_fork+0x116/0x1d0
[   15.928612]  ? __pfx_kthread+0x10/0x10
[   15.928635]  ret_from_fork_asm+0x1a/0x30
[   15.928667]  </TASK>
[   15.928679] 
[   15.943283] Allocated by task 278:
[   15.943422]  kasan_save_stack+0x45/0x70
[   15.943571]  kasan_save_track+0x18/0x40
[   15.943737]  kasan_save_alloc_info+0x3b/0x50
[   15.944128]  __kasan_kmalloc+0xb7/0xc0
[   15.944461]  __kmalloc_cache_noprof+0x189/0x420
[   15.944890]  kasan_bitops_generic+0x92/0x1c0
[   15.945293]  kunit_try_run_case+0x1a5/0x480
[   15.945669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.946196]  kthread+0x337/0x6f0
[   15.946504]  ret_from_fork+0x116/0x1d0
[   15.946868]  ret_from_fork_asm+0x1a/0x30
[   15.947237] 
[   15.947400] The buggy address belongs to the object at ffff888102873120
[   15.947400]  which belongs to the cache kmalloc-16 of size 16
[   15.948192] The buggy address is located 8 bytes inside of
[   15.948192]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.948558] 
[   15.948634] The buggy address belongs to the physical page:
[   15.949020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.949736] flags: 0x200000000000000(node=0|zone=2)
[   15.950180] page_type: f5(slab)
[   15.950481] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.951158] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.951823] page dumped because: kasan: bad access detected
[   15.952324] 
[   15.952463] Memory state around the buggy address:
[   15.952624]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.953137]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.953781] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.954241]                                   ^
[   15.954398]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.954623]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.955129] ==================================================================
[   16.066715] ==================================================================
[   16.067356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.067647] Read of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   16.068071] 
[   16.068194] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.068238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.068250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.068271] Call Trace:
[   16.068285]  <TASK>
[   16.068301]  dump_stack_lvl+0x73/0xb0
[   16.068329]  print_report+0xd1/0x650
[   16.068352]  ? __virt_addr_valid+0x1db/0x2d0
[   16.068375]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.068401]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.068427]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.068454]  kasan_report+0x141/0x180
[   16.068478]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.068511]  __asan_report_load8_noabort+0x18/0x20
[   16.068536]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   16.068564]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.068594]  ? kasan_save_alloc_info+0x3b/0x50
[   16.068618]  ? kasan_save_stack+0x45/0x70
[   16.068642]  kasan_bitops_generic+0x121/0x1c0
[   16.068666]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.068691]  ? __pfx_read_tsc+0x10/0x10
[   16.068712]  ? ktime_get_ts64+0x86/0x230
[   16.068752]  kunit_try_run_case+0x1a5/0x480
[   16.068776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.068799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.068822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.068844]  ? __kthread_parkme+0x82/0x180
[   16.068865]  ? preempt_count_sub+0x50/0x80
[   16.068889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.068913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.068936]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.068959]  kthread+0x337/0x6f0
[   16.068979]  ? trace_preempt_on+0x20/0xc0
[   16.069003]  ? __pfx_kthread+0x10/0x10
[   16.069024]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.069044]  ? calculate_sigpending+0x7b/0xa0
[   16.069079]  ? __pfx_kthread+0x10/0x10
[   16.069102]  ret_from_fork+0x116/0x1d0
[   16.069120]  ? __pfx_kthread+0x10/0x10
[   16.069141]  ret_from_fork_asm+0x1a/0x30
[   16.069173]  </TASK>
[   16.069185] 
[   16.077372] Allocated by task 278:
[   16.077572]  kasan_save_stack+0x45/0x70
[   16.077807]  kasan_save_track+0x18/0x40
[   16.077999]  kasan_save_alloc_info+0x3b/0x50
[   16.078195]  __kasan_kmalloc+0xb7/0xc0
[   16.078390]  __kmalloc_cache_noprof+0x189/0x420
[   16.078558]  kasan_bitops_generic+0x92/0x1c0
[   16.078838]  kunit_try_run_case+0x1a5/0x480
[   16.079071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.079315]  kthread+0x337/0x6f0
[   16.079488]  ret_from_fork+0x116/0x1d0
[   16.079652]  ret_from_fork_asm+0x1a/0x30
[   16.079829] 
[   16.079932] The buggy address belongs to the object at ffff888102873120
[   16.079932]  which belongs to the cache kmalloc-16 of size 16
[   16.080501] The buggy address is located 8 bytes inside of
[   16.080501]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   16.080989] 
[   16.081099] The buggy address belongs to the physical page:
[   16.081369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   16.081659] flags: 0x200000000000000(node=0|zone=2)
[   16.081902] page_type: f5(slab)
[   16.082126] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.082432] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.082789] page dumped because: kasan: bad access detected
[   16.083129] 
[   16.083204] Memory state around the buggy address:
[   16.083369]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   16.083600]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.083830] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.084190]                                   ^
[   16.084424]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.084814]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.085164] ==================================================================
[   15.956641] ==================================================================
[   15.957334] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.958128] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.958666] 
[   15.958821] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.958866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.958878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.958899] Call Trace:
[   15.958915]  <TASK>
[   15.958930]  dump_stack_lvl+0x73/0xb0
[   15.958958]  print_report+0xd1/0x650
[   15.958981]  ? __virt_addr_valid+0x1db/0x2d0
[   15.959003]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.959030]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.959068]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.959096]  kasan_report+0x141/0x180
[   15.959118]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.959151]  kasan_check_range+0x10c/0x1c0
[   15.959175]  __kasan_check_write+0x18/0x20
[   15.959194]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.959222]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.959250]  ? kasan_save_alloc_info+0x3b/0x50
[   15.959274]  ? kasan_save_stack+0x45/0x70
[   15.959297]  kasan_bitops_generic+0x121/0x1c0
[   15.959320]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.959345]  ? __pfx_read_tsc+0x10/0x10
[   15.959366]  ? ktime_get_ts64+0x86/0x230
[   15.959390]  kunit_try_run_case+0x1a5/0x480
[   15.959414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.959436]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.959459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.959482]  ? __kthread_parkme+0x82/0x180
[   15.959501]  ? preempt_count_sub+0x50/0x80
[   15.959525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.959549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.959573]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.959595]  kthread+0x337/0x6f0
[   15.959616]  ? trace_preempt_on+0x20/0xc0
[   15.959638]  ? __pfx_kthread+0x10/0x10
[   15.959659]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.959680]  ? calculate_sigpending+0x7b/0xa0
[   15.959704]  ? __pfx_kthread+0x10/0x10
[   15.959746]  ret_from_fork+0x116/0x1d0
[   15.959765]  ? __pfx_kthread+0x10/0x10
[   15.959785]  ret_from_fork_asm+0x1a/0x30
[   15.959817]  </TASK>
[   15.959828] 
[   15.972792] Allocated by task 278:
[   15.973142]  kasan_save_stack+0x45/0x70
[   15.973532]  kasan_save_track+0x18/0x40
[   15.973932]  kasan_save_alloc_info+0x3b/0x50
[   15.974358]  __kasan_kmalloc+0xb7/0xc0
[   15.974754]  __kmalloc_cache_noprof+0x189/0x420
[   15.974976]  kasan_bitops_generic+0x92/0x1c0
[   15.975307]  kunit_try_run_case+0x1a5/0x480
[   15.975699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.976167]  kthread+0x337/0x6f0
[   15.976299]  ret_from_fork+0x116/0x1d0
[   15.976443]  ret_from_fork_asm+0x1a/0x30
[   15.976595] 
[   15.976672] The buggy address belongs to the object at ffff888102873120
[   15.976672]  which belongs to the cache kmalloc-16 of size 16
[   15.977799] The buggy address is located 8 bytes inside of
[   15.977799]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.978885] 
[   15.979063] The buggy address belongs to the physical page:
[   15.979563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.980035] flags: 0x200000000000000(node=0|zone=2)
[   15.980224] page_type: f5(slab)
[   15.980357] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.980604] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.981179] page dumped because: kasan: bad access detected
[   15.981680] 
[   15.981871] Memory state around the buggy address:
[   15.982317]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.982965]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.983617] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.984262]                                   ^
[   15.984677]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.985222]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.985449] ==================================================================
[   15.837376] ==================================================================
[   15.838464] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.839350] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.839867] 
[   15.839960] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.840006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.840019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.840040] Call Trace:
[   15.840417]  <TASK>
[   15.840440]  dump_stack_lvl+0x73/0xb0
[   15.840471]  print_report+0xd1/0x650
[   15.840493]  ? __virt_addr_valid+0x1db/0x2d0
[   15.840516]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.840544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.840569]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.840596]  kasan_report+0x141/0x180
[   15.840618]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.840649]  kasan_check_range+0x10c/0x1c0
[   15.840673]  __kasan_check_write+0x18/0x20
[   15.840692]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.840748]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.840778]  ? kasan_save_alloc_info+0x3b/0x50
[   15.840801]  ? kasan_save_stack+0x45/0x70
[   15.840825]  kasan_bitops_generic+0x121/0x1c0
[   15.840849]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.840873]  ? __pfx_read_tsc+0x10/0x10
[   15.840893]  ? ktime_get_ts64+0x86/0x230
[   15.840918]  kunit_try_run_case+0x1a5/0x480
[   15.840941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.840962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.840986]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.841008]  ? __kthread_parkme+0x82/0x180
[   15.841027]  ? preempt_count_sub+0x50/0x80
[   15.841062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.841086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.841107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.841130]  kthread+0x337/0x6f0
[   15.841149]  ? trace_preempt_on+0x20/0xc0
[   15.841171]  ? __pfx_kthread+0x10/0x10
[   15.841192]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.841212]  ? calculate_sigpending+0x7b/0xa0
[   15.841236]  ? __pfx_kthread+0x10/0x10
[   15.841257]  ret_from_fork+0x116/0x1d0
[   15.841275]  ? __pfx_kthread+0x10/0x10
[   15.841295]  ret_from_fork_asm+0x1a/0x30
[   15.841327]  </TASK>
[   15.841338] 
[   15.854241] Allocated by task 278:
[   15.854380]  kasan_save_stack+0x45/0x70
[   15.854527]  kasan_save_track+0x18/0x40
[   15.854667]  kasan_save_alloc_info+0x3b/0x50
[   15.855055]  __kasan_kmalloc+0xb7/0xc0
[   15.855398]  __kmalloc_cache_noprof+0x189/0x420
[   15.855837]  kasan_bitops_generic+0x92/0x1c0
[   15.856269]  kunit_try_run_case+0x1a5/0x480
[   15.856646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.857151]  kthread+0x337/0x6f0
[   15.857468]  ret_from_fork+0x116/0x1d0
[   15.857845]  ret_from_fork_asm+0x1a/0x30
[   15.858235] 
[   15.858339] The buggy address belongs to the object at ffff888102873120
[   15.858339]  which belongs to the cache kmalloc-16 of size 16
[   15.858732] The buggy address is located 8 bytes inside of
[   15.858732]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.859794] 
[   15.859959] The buggy address belongs to the physical page:
[   15.860465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.861038] flags: 0x200000000000000(node=0|zone=2)
[   15.861224] page_type: f5(slab)
[   15.861355] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.861609] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.862157] page dumped because: kasan: bad access detected
[   15.862653] 
[   15.862839] Memory state around the buggy address:
[   15.863269]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.863926]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.864564] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.865236]                                   ^
[   15.865666]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.865966]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.866207] ==================================================================
[   16.045357] ==================================================================
[   16.046006] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.046865] Read of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   16.047502] 
[   16.047680] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.047727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.047753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.047775] Call Trace:
[   16.047791]  <TASK>
[   16.047807]  dump_stack_lvl+0x73/0xb0
[   16.047835]  print_report+0xd1/0x650
[   16.047858]  ? __virt_addr_valid+0x1db/0x2d0
[   16.047880]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.047907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.047933]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.047961]  kasan_report+0x141/0x180
[   16.047982]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.048014]  kasan_check_range+0x10c/0x1c0
[   16.048037]  __kasan_check_read+0x15/0x20
[   16.048078]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   16.048105]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.048134]  ? kasan_save_alloc_info+0x3b/0x50
[   16.048157]  ? kasan_save_stack+0x45/0x70
[   16.048181]  kasan_bitops_generic+0x121/0x1c0
[   16.048204]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.048229]  ? __pfx_read_tsc+0x10/0x10
[   16.048250]  ? ktime_get_ts64+0x86/0x230
[   16.048277]  kunit_try_run_case+0x1a5/0x480
[   16.048302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.048324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.048346]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.048369]  ? __kthread_parkme+0x82/0x180
[   16.048389]  ? preempt_count_sub+0x50/0x80
[   16.048411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.048434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.048457]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.048479]  kthread+0x337/0x6f0
[   16.048498]  ? trace_preempt_on+0x20/0xc0
[   16.048522]  ? __pfx_kthread+0x10/0x10
[   16.048541]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.048562]  ? calculate_sigpending+0x7b/0xa0
[   16.048585]  ? __pfx_kthread+0x10/0x10
[   16.048608]  ret_from_fork+0x116/0x1d0
[   16.048627]  ? __pfx_kthread+0x10/0x10
[   16.048646]  ret_from_fork_asm+0x1a/0x30
[   16.048677]  </TASK>
[   16.048688] 
[   16.058164] Allocated by task 278:
[   16.058359]  kasan_save_stack+0x45/0x70
[   16.058615]  kasan_save_track+0x18/0x40
[   16.058921]  kasan_save_alloc_info+0x3b/0x50
[   16.059094]  __kasan_kmalloc+0xb7/0xc0
[   16.059232]  __kmalloc_cache_noprof+0x189/0x420
[   16.059396]  kasan_bitops_generic+0x92/0x1c0
[   16.059613]  kunit_try_run_case+0x1a5/0x480
[   16.059955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.060228]  kthread+0x337/0x6f0
[   16.060626]  ret_from_fork+0x116/0x1d0
[   16.060842]  ret_from_fork_asm+0x1a/0x30
[   16.061032] 
[   16.061140] The buggy address belongs to the object at ffff888102873120
[   16.061140]  which belongs to the cache kmalloc-16 of size 16
[   16.061552] The buggy address is located 8 bytes inside of
[   16.061552]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   16.062026] 
[   16.062137] The buggy address belongs to the physical page:
[   16.062370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   16.062619] flags: 0x200000000000000(node=0|zone=2)
[   16.062976] page_type: f5(slab)
[   16.063161] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.063516] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.063836] page dumped because: kasan: bad access detected
[   16.064110] 
[   16.064192] Memory state around the buggy address:
[   16.064415]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   16.064681]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.065037] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.065327]                                   ^
[   16.065534]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.065842]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.066141] ==================================================================
[   16.015013] ==================================================================
[   16.015690] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.016508] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   16.017191] 
[   16.017311] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.017357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.017369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.017391] Call Trace:
[   16.017407]  <TASK>
[   16.017424]  dump_stack_lvl+0x73/0xb0
[   16.017453]  print_report+0xd1/0x650
[   16.017475]  ? __virt_addr_valid+0x1db/0x2d0
[   16.017498]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.017531]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.017558]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.017587]  kasan_report+0x141/0x180
[   16.017609]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.017643]  kasan_check_range+0x10c/0x1c0
[   16.017667]  __kasan_check_write+0x18/0x20
[   16.017687]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   16.017742]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   16.017773]  ? kasan_save_alloc_info+0x3b/0x50
[   16.017796]  ? kasan_save_stack+0x45/0x70
[   16.017821]  kasan_bitops_generic+0x121/0x1c0
[   16.017846]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.017872]  ? __pfx_read_tsc+0x10/0x10
[   16.017892]  ? ktime_get_ts64+0x86/0x230
[   16.017918]  kunit_try_run_case+0x1a5/0x480
[   16.017942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.017964]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.017989]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.018012]  ? __kthread_parkme+0x82/0x180
[   16.018032]  ? preempt_count_sub+0x50/0x80
[   16.018066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.018090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.018114]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.018137]  kthread+0x337/0x6f0
[   16.018157]  ? trace_preempt_on+0x20/0xc0
[   16.018181]  ? __pfx_kthread+0x10/0x10
[   16.018203]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.018224]  ? calculate_sigpending+0x7b/0xa0
[   16.018248]  ? __pfx_kthread+0x10/0x10
[   16.018270]  ret_from_fork+0x116/0x1d0
[   16.018289]  ? __pfx_kthread+0x10/0x10
[   16.018310]  ret_from_fork_asm+0x1a/0x30
[   16.018343]  </TASK>
[   16.018355] 
[   16.031741] Allocated by task 278:
[   16.032091]  kasan_save_stack+0x45/0x70
[   16.032471]  kasan_save_track+0x18/0x40
[   16.033242]  kasan_save_alloc_info+0x3b/0x50
[   16.033747]  __kasan_kmalloc+0xb7/0xc0
[   16.034159]  __kmalloc_cache_noprof+0x189/0x420
[   16.034581]  kasan_bitops_generic+0x92/0x1c0
[   16.034997]  kunit_try_run_case+0x1a5/0x480
[   16.035395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.035612]  kthread+0x337/0x6f0
[   16.035754]  ret_from_fork+0x116/0x1d0
[   16.035899]  ret_from_fork_asm+0x1a/0x30
[   16.036073] 
[   16.036245] The buggy address belongs to the object at ffff888102873120
[   16.036245]  which belongs to the cache kmalloc-16 of size 16
[   16.037300] The buggy address is located 8 bytes inside of
[   16.037300]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   16.038139] 
[   16.038221] The buggy address belongs to the physical page:
[   16.038405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   16.038660] flags: 0x200000000000000(node=0|zone=2)
[   16.038833] page_type: f5(slab)
[   16.040193] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.040489] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.040736] page dumped because: kasan: bad access detected
[   16.040917] 
[   16.041013] Memory state around the buggy address:
[   16.041245]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   16.041568]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.041877] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.043190]                                   ^
[   16.043362]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.043589]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.043812] ==================================================================
[   15.986069] ==================================================================
[   15.986743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.987516] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.988193] 
[   15.988376] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.988420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.988432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.988454] Call Trace:
[   15.988469]  <TASK>
[   15.988484]  dump_stack_lvl+0x73/0xb0
[   15.988510]  print_report+0xd1/0x650
[   15.988532]  ? __virt_addr_valid+0x1db/0x2d0
[   15.988555]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.988583]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.988609]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.988637]  kasan_report+0x141/0x180
[   15.988659]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.988692]  kasan_check_range+0x10c/0x1c0
[   15.988739]  __kasan_check_write+0x18/0x20
[   15.988759]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.988786]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.988815]  ? kasan_save_alloc_info+0x3b/0x50
[   15.988839]  ? kasan_save_stack+0x45/0x70
[   15.988863]  kasan_bitops_generic+0x121/0x1c0
[   15.988886]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.988911]  ? __pfx_read_tsc+0x10/0x10
[   15.988932]  ? ktime_get_ts64+0x86/0x230
[   15.988957]  kunit_try_run_case+0x1a5/0x480
[   15.988981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.989002]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.989025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.989060]  ? __kthread_parkme+0x82/0x180
[   15.989080]  ? preempt_count_sub+0x50/0x80
[   15.989103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.989126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.989148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.989171]  kthread+0x337/0x6f0
[   15.989191]  ? trace_preempt_on+0x20/0xc0
[   15.989214]  ? __pfx_kthread+0x10/0x10
[   15.989235]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.989255]  ? calculate_sigpending+0x7b/0xa0
[   15.989278]  ? __pfx_kthread+0x10/0x10
[   15.989299]  ret_from_fork+0x116/0x1d0
[   15.989317]  ? __pfx_kthread+0x10/0x10
[   15.989337]  ret_from_fork_asm+0x1a/0x30
[   15.989369]  </TASK>
[   15.989380] 
[   16.001534] Allocated by task 278:
[   16.001875]  kasan_save_stack+0x45/0x70
[   16.002242]  kasan_save_track+0x18/0x40
[   16.002623]  kasan_save_alloc_info+0x3b/0x50
[   16.003037]  __kasan_kmalloc+0xb7/0xc0
[   16.003400]  __kmalloc_cache_noprof+0x189/0x420
[   16.003842]  kasan_bitops_generic+0x92/0x1c0
[   16.004236]  kunit_try_run_case+0x1a5/0x480
[   16.004625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.005140]  kthread+0x337/0x6f0
[   16.005456]  ret_from_fork+0x116/0x1d0
[   16.005835]  ret_from_fork_asm+0x1a/0x30
[   16.006213] 
[   16.006292] The buggy address belongs to the object at ffff888102873120
[   16.006292]  which belongs to the cache kmalloc-16 of size 16
[   16.006654] The buggy address is located 8 bytes inside of
[   16.006654]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   16.007648] 
[   16.007833] The buggy address belongs to the physical page:
[   16.008317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   16.009013] flags: 0x200000000000000(node=0|zone=2)
[   16.009362] page_type: f5(slab)
[   16.009489] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.009766] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.010448] page dumped because: kasan: bad access detected
[   16.010956] 
[   16.011127] Memory state around the buggy address:
[   16.011559]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   16.012069]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.012295] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.012518]                                   ^
[   16.012672]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.013284]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.013959] ==================================================================
[   15.897161] ==================================================================
[   15.897817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.898209] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278
[   15.898873] 
[   15.899060] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.899105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.899118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.899138] Call Trace:
[   15.899153]  <TASK>
[   15.899168]  dump_stack_lvl+0x73/0xb0
[   15.899194]  print_report+0xd1/0x650
[   15.899216]  ? __virt_addr_valid+0x1db/0x2d0
[   15.899239]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.899268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.899294]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.899321]  kasan_report+0x141/0x180
[   15.899343]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.899376]  kasan_check_range+0x10c/0x1c0
[   15.899399]  __kasan_check_write+0x18/0x20
[   15.899418]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.899446]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.899475]  ? kasan_save_alloc_info+0x3b/0x50
[   15.899498]  ? kasan_save_stack+0x45/0x70
[   15.899522]  kasan_bitops_generic+0x121/0x1c0
[   15.899545]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.899570]  ? __pfx_read_tsc+0x10/0x10
[   15.899590]  ? ktime_get_ts64+0x86/0x230
[   15.899616]  kunit_try_run_case+0x1a5/0x480
[   15.899639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.899662]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.899686]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.899708]  ? __kthread_parkme+0x82/0x180
[   15.899750]  ? preempt_count_sub+0x50/0x80
[   15.899774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.899798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.899820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.899843]  kthread+0x337/0x6f0
[   15.899862]  ? trace_preempt_on+0x20/0xc0
[   15.899886]  ? __pfx_kthread+0x10/0x10
[   15.899906]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.899927]  ? calculate_sigpending+0x7b/0xa0
[   15.899950]  ? __pfx_kthread+0x10/0x10
[   15.899971]  ret_from_fork+0x116/0x1d0
[   15.899990]  ? __pfx_kthread+0x10/0x10
[   15.900010]  ret_from_fork_asm+0x1a/0x30
[   15.900041]  </TASK>
[   15.900061] 
[   15.913148] Allocated by task 278:
[   15.913489]  kasan_save_stack+0x45/0x70
[   15.913898]  kasan_save_track+0x18/0x40
[   15.914109]  kasan_save_alloc_info+0x3b/0x50
[   15.914269]  __kasan_kmalloc+0xb7/0xc0
[   15.914411]  __kmalloc_cache_noprof+0x189/0x420
[   15.914577]  kasan_bitops_generic+0x92/0x1c0
[   15.914790]  kunit_try_run_case+0x1a5/0x480
[   15.915231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.915734]  kthread+0x337/0x6f0
[   15.916067]  ret_from_fork+0x116/0x1d0
[   15.916434]  ret_from_fork_asm+0x1a/0x30
[   15.916832] 
[   15.917001] The buggy address belongs to the object at ffff888102873120
[   15.917001]  which belongs to the cache kmalloc-16 of size 16
[   15.918128] The buggy address is located 8 bytes inside of
[   15.918128]  allocated 9-byte region [ffff888102873120, ffff888102873129)
[   15.919035] 
[   15.919218] The buggy address belongs to the physical page:
[   15.919436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873
[   15.919693] flags: 0x200000000000000(node=0|zone=2)
[   15.920171] page_type: f5(slab)
[   15.920477] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.921201] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.921920] page dumped because: kasan: bad access detected
[   15.922190] 
[   15.922267] Memory state around the buggy address:
[   15.922436]  ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.922671]  ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.923326] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.923996]                                   ^
[   15.924429]  ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.925123]  ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.925786] ==================================================================

[   47.304860] ==================================================================
[   47.312100] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.321052] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   47.328445] 
[   47.329946] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   47.329953] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   47.329956] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   47.329959] Call Trace:
[   47.329960]  <TASK>
[   47.329962]  dump_stack_lvl+0x73/0xb0
[   47.329966]  print_report+0xd1/0x650
[   47.329970]  ? __virt_addr_valid+0x1db/0x2d0
[   47.329974]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.329979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.329984]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.329990]  kasan_report+0x141/0x180
[   47.329994]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.330000]  kasan_check_range+0x10c/0x1c0
[   47.330004]  __kasan_check_write+0x18/0x20
[   47.330008]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   47.330013]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   47.330018]  ? __kmalloc_cache_noprof+0x189/0x420
[   47.330023]  ? trace_hardirqs_on+0x37/0xe0
[   47.330027]  ? kasan_bitops_generic+0x92/0x1c0
[   47.330032]  kasan_bitops_generic+0x121/0x1c0
[   47.330036]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   47.330041]  ? ktime_get_ts64+0x83/0x230
[   47.330045]  kunit_try_run_case+0x1a2/0x480
[   47.330050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.330054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   47.330058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   47.330062]  ? __kthread_parkme+0x82/0x180
[   47.330066]  ? preempt_count_sub+0x50/0x80
[   47.330070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.330074]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.330078]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.330083]  kthread+0x334/0x6f0
[   47.330086]  ? trace_preempt_on+0x20/0xc0
[   47.330090]  ? __pfx_kthread+0x10/0x10
[   47.330094]  ? _raw_spin_unlock_irq+0x47/0x80
[   47.330097]  ? calculate_sigpending+0x7b/0xa0
[   47.330102]  ? __pfx_kthread+0x10/0x10
[   47.330106]  ret_from_fork+0x113/0x1d0
[   47.330109]  ? __pfx_kthread+0x10/0x10
[   47.330113]  ret_from_fork_asm+0x1a/0x30
[   47.330119]  </TASK>
[   47.330120] 
[   47.526904] Allocated by task 302:
[   47.530308]  kasan_save_stack+0x45/0x70
[   47.534149]  kasan_save_track+0x18/0x40
[   47.537986]  kasan_save_alloc_info+0x3b/0x50
[   47.542259]  __kasan_kmalloc+0xb7/0xc0
[   47.546014]  __kmalloc_cache_noprof+0x189/0x420
[   47.550553]  kasan_bitops_generic+0x92/0x1c0
[   47.554827]  kunit_try_run_case+0x1a2/0x480
[   47.559013]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.564411]  kthread+0x334/0x6f0
[   47.567646]  ret_from_fork+0x113/0x1d0
[   47.571409]  ret_from_fork_asm+0x1a/0x30
[   47.575366] 
[   47.576867] The buggy address belongs to the object at ffff8881067131a0
[   47.576867]  which belongs to the cache kmalloc-16 of size 16
[   47.589208] The buggy address is located 8 bytes inside of
[   47.589208]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   47.601462] 
[   47.602963] The buggy address belongs to the physical page:
[   47.608534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   47.616534] flags: 0x200000000000000(node=0|zone=2)
[   47.621413] page_type: f5(slab)
[   47.624561] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   47.632309] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   47.640054] page dumped because: kasan: bad access detected
[   47.645626] 
[   47.647117] Memory state around the buggy address:
[   47.651911]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.659130]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.666363] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   47.673585]                                   ^
[   47.678120]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.685366]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.692608] ==================================================================
[   48.094842] ==================================================================
[   48.102080] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   48.111035] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   48.118426] 
[   48.119928] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   48.119936] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   48.119939] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   48.119942] Call Trace:
[   48.119943]  <TASK>
[   48.119945]  dump_stack_lvl+0x73/0xb0
[   48.119949]  print_report+0xd1/0x650
[   48.119953]  ? __virt_addr_valid+0x1db/0x2d0
[   48.119957]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   48.119963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.119968]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   48.119973]  kasan_report+0x141/0x180
[   48.119977]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   48.119983]  kasan_check_range+0x10c/0x1c0
[   48.119988]  __kasan_check_write+0x18/0x20
[   48.119992]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   48.119997]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.120003]  ? __kmalloc_cache_noprof+0x189/0x420
[   48.120007]  ? trace_hardirqs_on+0x37/0xe0
[   48.120011]  ? kasan_bitops_generic+0x92/0x1c0
[   48.120016]  kasan_bitops_generic+0x121/0x1c0
[   48.120020]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.120025]  ? ktime_get_ts64+0x83/0x230
[   48.120030]  kunit_try_run_case+0x1a2/0x480
[   48.120034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.120038]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   48.120042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   48.120047]  ? __kthread_parkme+0x82/0x180
[   48.120050]  ? preempt_count_sub+0x50/0x80
[   48.120054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.120059]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.120063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.120067]  kthread+0x334/0x6f0
[   48.120070]  ? trace_preempt_on+0x20/0xc0
[   48.120074]  ? __pfx_kthread+0x10/0x10
[   48.120078]  ? _raw_spin_unlock_irq+0x47/0x80
[   48.120082]  ? calculate_sigpending+0x7b/0xa0
[   48.120086]  ? __pfx_kthread+0x10/0x10
[   48.120090]  ret_from_fork+0x113/0x1d0
[   48.120093]  ? __pfx_kthread+0x10/0x10
[   48.120097]  ret_from_fork_asm+0x1a/0x30
[   48.120103]  </TASK>
[   48.120104] 
[   48.316909] Allocated by task 302:
[   48.320314]  kasan_save_stack+0x45/0x70
[   48.324154]  kasan_save_track+0x18/0x40
[   48.327993]  kasan_save_alloc_info+0x3b/0x50
[   48.332268]  __kasan_kmalloc+0xb7/0xc0
[   48.336019]  __kmalloc_cache_noprof+0x189/0x420
[   48.340552]  kasan_bitops_generic+0x92/0x1c0
[   48.344825]  kunit_try_run_case+0x1a2/0x480
[   48.349009]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.354420]  kthread+0x334/0x6f0
[   48.357651]  ret_from_fork+0x113/0x1d0
[   48.361404]  ret_from_fork_asm+0x1a/0x30
[   48.365348] 
[   48.366856] The buggy address belongs to the object at ffff8881067131a0
[   48.366856]  which belongs to the cache kmalloc-16 of size 16
[   48.379198] The buggy address is located 8 bytes inside of
[   48.379198]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   48.391452] 
[   48.392950] The buggy address belongs to the physical page:
[   48.398524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   48.406530] flags: 0x200000000000000(node=0|zone=2)
[   48.411412] page_type: f5(slab)
[   48.414557] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   48.422305] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   48.430043] page dumped because: kasan: bad access detected
[   48.435616] 
[   48.437116] Memory state around the buggy address:
[   48.441909]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.449129]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.456366] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.463610]                                   ^
[   48.468143]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.475365]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.482588] ==================================================================
[   46.909854] ==================================================================
[   46.917092] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.926045] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   46.933440] 
[   46.934937] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   46.934945] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   46.934948] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   46.934951] Call Trace:
[   46.934953]  <TASK>
[   46.934954]  dump_stack_lvl+0x73/0xb0
[   46.934959]  print_report+0xd1/0x650
[   46.934963]  ? __virt_addr_valid+0x1db/0x2d0
[   46.934966]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.934972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.934977]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.934982]  kasan_report+0x141/0x180
[   46.934986]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.934993]  kasan_check_range+0x10c/0x1c0
[   46.934997]  __kasan_check_write+0x18/0x20
[   46.935000]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   46.935006]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   46.935011]  ? __kmalloc_cache_noprof+0x189/0x420
[   46.935016]  ? trace_hardirqs_on+0x37/0xe0
[   46.935020]  ? kasan_bitops_generic+0x92/0x1c0
[   46.935025]  kasan_bitops_generic+0x121/0x1c0
[   46.935029]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   46.935034]  ? ktime_get_ts64+0x83/0x230
[   46.935038]  kunit_try_run_case+0x1a2/0x480
[   46.935042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.935047]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   46.935051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   46.935055]  ? __kthread_parkme+0x82/0x180
[   46.935059]  ? preempt_count_sub+0x50/0x80
[   46.935063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.935067]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.935071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.935075]  kthread+0x334/0x6f0
[   46.935079]  ? trace_preempt_on+0x20/0xc0
[   46.935083]  ? __pfx_kthread+0x10/0x10
[   46.935087]  ? _raw_spin_unlock_irq+0x47/0x80
[   46.935090]  ? calculate_sigpending+0x7b/0xa0
[   46.935095]  ? __pfx_kthread+0x10/0x10
[   46.935099]  ret_from_fork+0x113/0x1d0
[   46.935102]  ? __pfx_kthread+0x10/0x10
[   46.935106]  ret_from_fork_asm+0x1a/0x30
[   46.935111]  </TASK>
[   46.935113] 
[   47.131955] Allocated by task 302:
[   47.135364]  kasan_save_stack+0x45/0x70
[   47.139209]  kasan_save_track+0x18/0x40
[   47.143049]  kasan_save_alloc_info+0x3b/0x50
[   47.147322]  __kasan_kmalloc+0xb7/0xc0
[   47.151099]  __kmalloc_cache_noprof+0x189/0x420
[   47.155635]  kasan_bitops_generic+0x92/0x1c0
[   47.159915]  kunit_try_run_case+0x1a2/0x480
[   47.164100]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.169500]  kthread+0x334/0x6f0
[   47.172731]  ret_from_fork+0x113/0x1d0
[   47.176484]  ret_from_fork_asm+0x1a/0x30
[   47.180411] 
[   47.181910] The buggy address belongs to the object at ffff8881067131a0
[   47.181910]  which belongs to the cache kmalloc-16 of size 16
[   47.194243] The buggy address is located 8 bytes inside of
[   47.194243]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   47.206488] 
[   47.207989] The buggy address belongs to the physical page:
[   47.213560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   47.221559] flags: 0x200000000000000(node=0|zone=2)
[   47.226441] page_type: f5(slab)
[   47.229588] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   47.237351] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   47.245099] page dumped because: kasan: bad access detected
[   47.250673] 
[   47.252170] Memory state around the buggy address:
[   47.256963]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.264184]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   47.271409] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   47.278630]                                   ^
[   47.283164]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.290404]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.297635] ==================================================================
[   49.674882] ==================================================================
[   49.682128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.691082] Read of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   49.698419] 
[   49.699915] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   49.699923] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   49.699925] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   49.699929] Call Trace:
[   49.699930]  <TASK>
[   49.699932]  dump_stack_lvl+0x73/0xb0
[   49.699936]  print_report+0xd1/0x650
[   49.699940]  ? __virt_addr_valid+0x1db/0x2d0
[   49.699944]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.699949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.699955]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.699960]  kasan_report+0x141/0x180
[   49.699964]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.699970]  kasan_check_range+0x10c/0x1c0
[   49.699974]  __kasan_check_read+0x15/0x20
[   49.699978]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   49.699983]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   49.699988]  ? __kmalloc_cache_noprof+0x189/0x420
[   49.699993]  ? trace_hardirqs_on+0x37/0xe0
[   49.699997]  ? kasan_bitops_generic+0x92/0x1c0
[   49.700002]  kasan_bitops_generic+0x121/0x1c0
[   49.700006]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   49.700011]  ? ktime_get_ts64+0x83/0x230
[   49.700015]  kunit_try_run_case+0x1a2/0x480
[   49.700020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.700024]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   49.700028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   49.700032]  ? __kthread_parkme+0x82/0x180
[   49.700036]  ? preempt_count_sub+0x50/0x80
[   49.700040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.700045]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.700049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.700053]  kthread+0x334/0x6f0
[   49.700056]  ? trace_preempt_on+0x20/0xc0
[   49.700060]  ? __pfx_kthread+0x10/0x10
[   49.700064]  ? _raw_spin_unlock_irq+0x47/0x80
[   49.700068]  ? calculate_sigpending+0x7b/0xa0
[   49.700072]  ? __pfx_kthread+0x10/0x10
[   49.700076]  ret_from_fork+0x113/0x1d0
[   49.700079]  ? __pfx_kthread+0x10/0x10
[   49.700083]  ret_from_fork_asm+0x1a/0x30
[   49.700089]  </TASK>
[   49.700090] 
[   49.896817] Allocated by task 302:
[   49.900226]  kasan_save_stack+0x45/0x70
[   49.904064]  kasan_save_track+0x18/0x40
[   49.907904]  kasan_save_alloc_info+0x3b/0x50
[   49.912184]  __kasan_kmalloc+0xb7/0xc0
[   49.915938]  __kmalloc_cache_noprof+0x189/0x420
[   49.920468]  kasan_bitops_generic+0x92/0x1c0
[   49.924742]  kunit_try_run_case+0x1a2/0x480
[   49.928927]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.934328]  kthread+0x334/0x6f0
[   49.937585]  ret_from_fork+0x113/0x1d0
[   49.941364]  ret_from_fork_asm+0x1a/0x30
[   49.945316] 
[   49.946817] The buggy address belongs to the object at ffff8881067131a0
[   49.946817]  which belongs to the cache kmalloc-16 of size 16
[   49.959159] The buggy address is located 8 bytes inside of
[   49.959159]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   49.971412] 
[   49.972911] The buggy address belongs to the physical page:
[   49.978483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   49.986484] flags: 0x200000000000000(node=0|zone=2)
[   49.991364] page_type: f5(slab)
[   49.994509] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   50.002248] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   50.009988] page dumped because: kasan: bad access detected
[   50.015559] 
[   50.017059] Memory state around the buggy address:
[   50.021854]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.029082]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.036308] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   50.043528]                                   ^
[   50.048059]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.055279]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.062499] ==================================================================
[   50.069723] ==================================================================
[   50.076962] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   50.085915] Read of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   50.093221] 
[   50.094721] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   50.094729] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   50.094732] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   50.094735] Call Trace:
[   50.094736]  <TASK>
[   50.094738]  dump_stack_lvl+0x73/0xb0
[   50.094742]  print_report+0xd1/0x650
[   50.094746]  ? __virt_addr_valid+0x1db/0x2d0
[   50.094750]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   50.094755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.094760]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   50.094766]  kasan_report+0x141/0x180
[   50.094770]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   50.094776]  __asan_report_load8_noabort+0x18/0x20
[   50.094781]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   50.094786]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   50.094791]  ? __kmalloc_cache_noprof+0x189/0x420
[   50.094796]  ? trace_hardirqs_on+0x37/0xe0
[   50.094800]  ? kasan_bitops_generic+0x92/0x1c0
[   50.094805]  kasan_bitops_generic+0x121/0x1c0
[   50.094809]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   50.094814]  ? ktime_get_ts64+0x83/0x230
[   50.094818]  kunit_try_run_case+0x1a2/0x480
[   50.094823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.094827]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   50.094831]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   50.094835]  ? __kthread_parkme+0x82/0x180
[   50.094839]  ? preempt_count_sub+0x50/0x80
[   50.094843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.094847]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.094852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.094856]  kthread+0x334/0x6f0
[   50.094859]  ? trace_preempt_on+0x20/0xc0
[   50.094863]  ? __pfx_kthread+0x10/0x10
[   50.094867]  ? _raw_spin_unlock_irq+0x47/0x80
[   50.094870]  ? calculate_sigpending+0x7b/0xa0
[   50.094875]  ? __pfx_kthread+0x10/0x10
[   50.094879]  ret_from_fork+0x113/0x1d0
[   50.094882]  ? __pfx_kthread+0x10/0x10
[   50.094886]  ret_from_fork_asm+0x1a/0x30
[   50.094892]  </TASK>
[   50.094893] 
[   50.288255] Allocated by task 302:
[   50.291662]  kasan_save_stack+0x45/0x70
[   50.295508]  kasan_save_track+0x18/0x40
[   50.299366]  kasan_save_alloc_info+0x3b/0x50
[   50.303664]  __kasan_kmalloc+0xb7/0xc0
[   50.307416]  __kmalloc_cache_noprof+0x189/0x420
[   50.311948]  kasan_bitops_generic+0x92/0x1c0
[   50.316223]  kunit_try_run_case+0x1a2/0x480
[   50.320409]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.325807]  kthread+0x334/0x6f0
[   50.329039]  ret_from_fork+0x113/0x1d0
[   50.332791]  ret_from_fork_asm+0x1a/0x30
[   50.336720] 
[   50.338220] The buggy address belongs to the object at ffff8881067131a0
[   50.338220]  which belongs to the cache kmalloc-16 of size 16
[   50.350560] The buggy address is located 8 bytes inside of
[   50.350560]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   50.362814] 
[   50.364314] The buggy address belongs to the physical page:
[   50.369888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   50.377893] flags: 0x200000000000000(node=0|zone=2)
[   50.382774] page_type: f5(slab)
[   50.385922] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   50.393667] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   50.401406] page dumped because: kasan: bad access detected
[   50.406978] 
[   50.408471] Memory state around the buggy address:
[   50.413264]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.420483]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   50.427700] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   50.434922]                                   ^
[   50.439454]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.446673]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.453890] ==================================================================
[   48.884875] ==================================================================
[   48.892115] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.901074] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   48.908467] 
[   48.909967] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   48.909975] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   48.909978] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   48.909981] Call Trace:
[   48.909982]  <TASK>
[   48.909984]  dump_stack_lvl+0x73/0xb0
[   48.909989]  print_report+0xd1/0x650
[   48.909992]  ? __virt_addr_valid+0x1db/0x2d0
[   48.909996]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.910002]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.910007]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.910012]  kasan_report+0x141/0x180
[   48.910016]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.910023]  kasan_check_range+0x10c/0x1c0
[   48.910027]  __kasan_check_write+0x18/0x20
[   48.910031]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   48.910036]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.910042]  ? __kmalloc_cache_noprof+0x189/0x420
[   48.910046]  ? trace_hardirqs_on+0x37/0xe0
[   48.910050]  ? kasan_bitops_generic+0x92/0x1c0
[   48.910055]  kasan_bitops_generic+0x121/0x1c0
[   48.910060]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.910065]  ? ktime_get_ts64+0x83/0x230
[   48.910069]  kunit_try_run_case+0x1a2/0x480
[   48.910073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.910077]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   48.910082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   48.910086]  ? __kthread_parkme+0x82/0x180
[   48.910089]  ? preempt_count_sub+0x50/0x80
[   48.910093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.910098]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.910102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.910106]  kthread+0x334/0x6f0
[   48.910110]  ? trace_preempt_on+0x20/0xc0
[   48.910114]  ? __pfx_kthread+0x10/0x10
[   48.910117]  ? _raw_spin_unlock_irq+0x47/0x80
[   48.910121]  ? calculate_sigpending+0x7b/0xa0
[   48.910126]  ? __pfx_kthread+0x10/0x10
[   48.910130]  ret_from_fork+0x113/0x1d0
[   48.910133]  ? __pfx_kthread+0x10/0x10
[   48.910137]  ret_from_fork_asm+0x1a/0x30
[   48.910142]  </TASK>
[   48.910144] 
[   49.106968] Allocated by task 302:
[   49.110373]  kasan_save_stack+0x45/0x70
[   49.114214]  kasan_save_track+0x18/0x40
[   49.118052]  kasan_save_alloc_info+0x3b/0x50
[   49.122324]  __kasan_kmalloc+0xb7/0xc0
[   49.126103]  __kmalloc_cache_noprof+0x189/0x420
[   49.130636]  kasan_bitops_generic+0x92/0x1c0
[   49.134908]  kunit_try_run_case+0x1a2/0x480
[   49.139094]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.144495]  kthread+0x334/0x6f0
[   49.147726]  ret_from_fork+0x113/0x1d0
[   49.151478]  ret_from_fork_asm+0x1a/0x30
[   49.155408] 
[   49.156904] The buggy address belongs to the object at ffff8881067131a0
[   49.156904]  which belongs to the cache kmalloc-16 of size 16
[   49.169239] The buggy address is located 8 bytes inside of
[   49.169239]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   49.181493] 
[   49.182991] The buggy address belongs to the physical page:
[   49.188563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   49.196563] flags: 0x200000000000000(node=0|zone=2)
[   49.201444] page_type: f5(slab)
[   49.204591] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   49.212365] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   49.220128] page dumped because: kasan: bad access detected
[   49.225700] 
[   49.227200] Memory state around the buggy address:
[   49.231992]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.239211]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.246431] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   49.253650]                                   ^
[   49.258185]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.265414]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.272631] ==================================================================
[   48.489815] ==================================================================
[   48.497053] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.506008] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   48.513408] 
[   48.514909] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   48.514917] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   48.514920] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   48.514923] Call Trace:
[   48.514925]  <TASK>
[   48.514926]  dump_stack_lvl+0x73/0xb0
[   48.514930]  print_report+0xd1/0x650
[   48.514934]  ? __virt_addr_valid+0x1db/0x2d0
[   48.514938]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.514944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   48.514949]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.514954]  kasan_report+0x141/0x180
[   48.514958]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.514964]  kasan_check_range+0x10c/0x1c0
[   48.514969]  __kasan_check_write+0x18/0x20
[   48.514972]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   48.514977]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   48.514983]  ? __kmalloc_cache_noprof+0x189/0x420
[   48.514988]  ? trace_hardirqs_on+0x37/0xe0
[   48.514992]  ? kasan_bitops_generic+0x92/0x1c0
[   48.514997]  kasan_bitops_generic+0x121/0x1c0
[   48.515001]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   48.515006]  ? ktime_get_ts64+0x83/0x230
[   48.515010]  kunit_try_run_case+0x1a2/0x480
[   48.515014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.515019]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   48.515023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   48.515027]  ? __kthread_parkme+0x82/0x180
[   48.515031]  ? preempt_count_sub+0x50/0x80
[   48.515035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   48.515039]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.515043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   48.515048]  kthread+0x334/0x6f0
[   48.515051]  ? trace_preempt_on+0x20/0xc0
[   48.515055]  ? __pfx_kthread+0x10/0x10
[   48.515059]  ? _raw_spin_unlock_irq+0x47/0x80
[   48.515063]  ? calculate_sigpending+0x7b/0xa0
[   48.515067]  ? __pfx_kthread+0x10/0x10
[   48.515071]  ret_from_fork+0x113/0x1d0
[   48.515074]  ? __pfx_kthread+0x10/0x10
[   48.515078]  ret_from_fork_asm+0x1a/0x30
[   48.515084]  </TASK>
[   48.515085] 
[   48.711969] Allocated by task 302:
[   48.715375]  kasan_save_stack+0x45/0x70
[   48.719241]  kasan_save_track+0x18/0x40
[   48.723081]  kasan_save_alloc_info+0x3b/0x50
[   48.727365]  __kasan_kmalloc+0xb7/0xc0
[   48.731138]  __kmalloc_cache_noprof+0x189/0x420
[   48.735673]  kasan_bitops_generic+0x92/0x1c0
[   48.739955]  kunit_try_run_case+0x1a2/0x480
[   48.744149]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   48.749546]  kthread+0x334/0x6f0
[   48.752781]  ret_from_fork+0x113/0x1d0
[   48.756532]  ret_from_fork_asm+0x1a/0x30
[   48.760458] 
[   48.761958] The buggy address belongs to the object at ffff8881067131a0
[   48.761958]  which belongs to the cache kmalloc-16 of size 16
[   48.774301] The buggy address is located 8 bytes inside of
[   48.774301]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   48.786553] 
[   48.788053] The buggy address belongs to the physical page:
[   48.793627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   48.801634] flags: 0x200000000000000(node=0|zone=2)
[   48.806513] page_type: f5(slab)
[   48.809659] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   48.817413] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   48.825155] page dumped because: kasan: bad access detected
[   48.830729] 
[   48.832227] Memory state around the buggy address:
[   48.837019]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.844238]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.851459] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.858679]                                   ^
[   48.863212]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.870430]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.877648] ==================================================================
[   49.279856] ==================================================================
[   49.287094] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.296049] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   49.303449] 
[   49.304951] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   49.304958] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   49.304961] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   49.304964] Call Trace:
[   49.304966]  <TASK>
[   49.304968]  dump_stack_lvl+0x73/0xb0
[   49.304972]  print_report+0xd1/0x650
[   49.304976]  ? __virt_addr_valid+0x1db/0x2d0
[   49.304980]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.304985]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.304990]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.304996]  kasan_report+0x141/0x180
[   49.305000]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.305006]  kasan_check_range+0x10c/0x1c0
[   49.305010]  __kasan_check_write+0x18/0x20
[   49.305014]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   49.305019]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   49.305024]  ? __kmalloc_cache_noprof+0x189/0x420
[   49.305029]  ? trace_hardirqs_on+0x37/0xe0
[   49.305033]  ? kasan_bitops_generic+0x92/0x1c0
[   49.305038]  kasan_bitops_generic+0x121/0x1c0
[   49.305042]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   49.305047]  ? ktime_get_ts64+0x83/0x230
[   49.305051]  kunit_try_run_case+0x1a2/0x480
[   49.305056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.305060]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   49.305064]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   49.305068]  ? __kthread_parkme+0x82/0x180
[   49.305072]  ? preempt_count_sub+0x50/0x80
[   49.305076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.305080]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.305085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.305089]  kthread+0x334/0x6f0
[   49.305092]  ? trace_preempt_on+0x20/0xc0
[   49.305096]  ? __pfx_kthread+0x10/0x10
[   49.305100]  ? _raw_spin_unlock_irq+0x47/0x80
[   49.305104]  ? calculate_sigpending+0x7b/0xa0
[   49.305108]  ? __pfx_kthread+0x10/0x10
[   49.305112]  ret_from_fork+0x113/0x1d0
[   49.305115]  ? __pfx_kthread+0x10/0x10
[   49.305119]  ret_from_fork_asm+0x1a/0x30
[   49.305125]  </TASK>
[   49.305126] 
[   49.501966] Allocated by task 302:
[   49.505395]  kasan_save_stack+0x45/0x70
[   49.509239]  kasan_save_track+0x18/0x40
[   49.513079]  kasan_save_alloc_info+0x3b/0x50
[   49.517366]  __kasan_kmalloc+0xb7/0xc0
[   49.521146]  __kmalloc_cache_noprof+0x189/0x420
[   49.525687]  kasan_bitops_generic+0x92/0x1c0
[   49.529961]  kunit_try_run_case+0x1a2/0x480
[   49.534154]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   49.539555]  kthread+0x334/0x6f0
[   49.542787]  ret_from_fork+0x113/0x1d0
[   49.546540]  ret_from_fork_asm+0x1a/0x30
[   49.550466] 
[   49.551964] The buggy address belongs to the object at ffff8881067131a0
[   49.551964]  which belongs to the cache kmalloc-16 of size 16
[   49.564299] The buggy address is located 8 bytes inside of
[   49.564299]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   49.576551] 
[   49.578051] The buggy address belongs to the physical page:
[   49.583623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   49.591622] flags: 0x200000000000000(node=0|zone=2)
[   49.596502] page_type: f5(slab)
[   49.599650] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   49.607409] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   49.615154] page dumped because: kasan: bad access detected
[   49.620727] 
[   49.622224] Memory state around the buggy address:
[   49.627018]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.634236]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   49.641457] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   49.648674]                                   ^
[   49.653208]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.660429]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.667657] ==================================================================
[   47.699836] ==================================================================
[   47.707082] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.716043] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302
[   47.723435] 
[   47.724937] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   47.724945] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   47.724948] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   47.724951] Call Trace:
[   47.724953]  <TASK>
[   47.724954]  dump_stack_lvl+0x73/0xb0
[   47.724959]  print_report+0xd1/0x650
[   47.724963]  ? __virt_addr_valid+0x1db/0x2d0
[   47.724966]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.724972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.724977]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.724982]  kasan_report+0x141/0x180
[   47.724986]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.724992]  kasan_check_range+0x10c/0x1c0
[   47.724997]  __kasan_check_write+0x18/0x20
[   47.725000]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   47.725005]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   47.725011]  ? __kmalloc_cache_noprof+0x189/0x420
[   47.725015]  ? trace_hardirqs_on+0x37/0xe0
[   47.725019]  ? kasan_bitops_generic+0x92/0x1c0
[   47.725024]  kasan_bitops_generic+0x121/0x1c0
[   47.725028]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   47.725033]  ? ktime_get_ts64+0x83/0x230
[   47.725038]  kunit_try_run_case+0x1a2/0x480
[   47.725042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.725046]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   47.725050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   47.725054]  ? __kthread_parkme+0x82/0x180
[   47.725058]  ? preempt_count_sub+0x50/0x80
[   47.725062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.725067]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.725071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.725075]  kthread+0x334/0x6f0
[   47.725078]  ? trace_preempt_on+0x20/0xc0
[   47.725082]  ? __pfx_kthread+0x10/0x10
[   47.725086]  ? _raw_spin_unlock_irq+0x47/0x80
[   47.725090]  ? calculate_sigpending+0x7b/0xa0
[   47.725094]  ? __pfx_kthread+0x10/0x10
[   47.725098]  ret_from_fork+0x113/0x1d0
[   47.725101]  ? __pfx_kthread+0x10/0x10
[   47.725105]  ret_from_fork_asm+0x1a/0x30
[   47.725111]  </TASK>
[   47.725112] 
[   47.921901] Allocated by task 302:
[   47.925309]  kasan_save_stack+0x45/0x70
[   47.929147]  kasan_save_track+0x18/0x40
[   47.932985]  kasan_save_alloc_info+0x3b/0x50
[   47.937259]  __kasan_kmalloc+0xb7/0xc0
[   47.941012]  __kmalloc_cache_noprof+0x189/0x420
[   47.945545]  kasan_bitops_generic+0x92/0x1c0
[   47.949816]  kunit_try_run_case+0x1a2/0x480
[   47.954004]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   47.959413]  kthread+0x334/0x6f0
[   47.962644]  ret_from_fork+0x113/0x1d0
[   47.966417]  ret_from_fork_asm+0x1a/0x30
[   47.970363] 
[   47.971863] The buggy address belongs to the object at ffff8881067131a0
[   47.971863]  which belongs to the cache kmalloc-16 of size 16
[   47.984199] The buggy address is located 8 bytes inside of
[   47.984199]  allocated 9-byte region [ffff8881067131a0, ffff8881067131a9)
[   47.996451] 
[   47.997952] The buggy address belongs to the physical page:
[   48.003524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713
[   48.011524] flags: 0x200000000000000(node=0|zone=2)
[   48.016404] page_type: f5(slab)
[   48.019550] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   48.027296] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   48.035037] page dumped because: kasan: bad access detected
[   48.040607] 
[   48.042108] Memory state around the buggy address:
[   48.046902]  ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.054129]  ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.061363] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.068612]                                   ^
[   48.073145]  ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.080373]  ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.087618] ==================================================================