Hay
Date
July 15, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.863920] ==================================================================
[   17.864036] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   17.864095] Read of size 8 at addr fff00000c591d628 by task kunit_try_catch/262
[   17.864159] 
[   17.864227] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.864318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.864356] Hardware name: linux,dummy-virt (DT)
[   17.864402] Call trace:
[   17.864431]  show_stack+0x20/0x38 (C)
[   17.864509]  dump_stack_lvl+0x8c/0xd0
[   17.864559]  print_report+0x118/0x5d0
[   17.864615]  kasan_report+0xdc/0x128
[   17.864668]  __asan_report_load8_noabort+0x20/0x30
[   17.864726]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   17.865072]  kasan_bitops_generic+0x110/0x1c8
[   17.865200]  kunit_try_run_case+0x170/0x3f0
[   17.865284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.865342]  kthread+0x328/0x630
[   17.865409]  ret_from_fork+0x10/0x20
[   17.865672] 
[   17.865730] Allocated by task 262:
[   17.865813]  kasan_save_stack+0x3c/0x68
[   17.865941]  kasan_save_track+0x20/0x40
[   17.866005]  kasan_save_alloc_info+0x40/0x58
[   17.866076]  __kasan_kmalloc+0xd4/0xd8
[   17.866127]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.866177]  kasan_bitops_generic+0xa0/0x1c8
[   17.866470]  kunit_try_run_case+0x170/0x3f0
[   17.866549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.866619]  kthread+0x328/0x630
[   17.866690]  ret_from_fork+0x10/0x20
[   17.866778] 
[   17.866819] The buggy address belongs to the object at fff00000c591d620
[   17.866819]  which belongs to the cache kmalloc-16 of size 16
[   17.867336] The buggy address is located 8 bytes inside of
[   17.867336]  allocated 9-byte region [fff00000c591d620, fff00000c591d629)
[   17.867457] 
[   17.867499] The buggy address belongs to the physical page:
[   17.867533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d
[   17.867611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.867931] page_type: f5(slab)
[   17.867993] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.868049] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.868093] page dumped because: kasan: bad access detected
[   17.868130] 
[   17.868166] Memory state around the buggy address:
[   17.868228]  fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.868274]  fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.868319] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.868368]                                   ^
[   17.868406]  fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.868470]  fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.868511] ==================================================================
[   17.858377] ==================================================================
[   17.858501] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   17.858557] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262
[   17.858610] 
[   17.858808] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.858903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.858932] Hardware name: linux,dummy-virt (DT)
[   17.858964] Call trace:
[   17.858987]  show_stack+0x20/0x38 (C)
[   17.859043]  dump_stack_lvl+0x8c/0xd0
[   17.859360]  print_report+0x118/0x5d0
[   17.859447]  kasan_report+0xdc/0x128
[   17.859513]  kasan_check_range+0x100/0x1a8
[   17.859572]  __kasan_check_write+0x20/0x30
[   17.859628]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   17.861322]  kasan_bitops_generic+0x110/0x1c8
[   17.861427]  kunit_try_run_case+0x170/0x3f0
[   17.861489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.861562]  kthread+0x328/0x630
[   17.861634]  ret_from_fork+0x10/0x20
[   17.861747] 
[   17.861796] Allocated by task 262:
[   17.861889]  kasan_save_stack+0x3c/0x68
[   17.861935]  kasan_save_track+0x20/0x40
[   17.861975]  kasan_save_alloc_info+0x40/0x58
[   17.862022]  __kasan_kmalloc+0xd4/0xd8
[   17.862059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.862099]  kasan_bitops_generic+0xa0/0x1c8
[   17.862139]  kunit_try_run_case+0x170/0x3f0
[   17.862190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.862262]  kthread+0x328/0x630
[   17.862434]  ret_from_fork+0x10/0x20
[   17.862545] 
[   17.862586] The buggy address belongs to the object at fff00000c591d620
[   17.862586]  which belongs to the cache kmalloc-16 of size 16
[   17.862663] The buggy address is located 8 bytes inside of
[   17.862663]  allocated 9-byte region [fff00000c591d620, fff00000c591d629)
[   17.862752] 
[   17.862789] The buggy address belongs to the physical page:
[   17.862865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d
[   17.862927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.862977] page_type: f5(slab)
[   17.863016] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.863069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.863115] page dumped because: kasan: bad access detected
[   17.863149] 
[   17.863170] Memory state around the buggy address:
[   17.863214]  fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.863259]  fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.863310] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.863351]                                   ^
[   17.863383]  fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.863428]  fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.863468] ==================================================================
[   17.806144] ==================================================================
[   17.809725] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   17.810474] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262
[   17.811102] 
[   17.811150] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.811250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.811277] Hardware name: linux,dummy-virt (DT)
[   17.811310] Call trace:
[   17.812801]  show_stack+0x20/0x38 (C)
[   17.812913]  dump_stack_lvl+0x8c/0xd0
[   17.812963]  print_report+0x118/0x5d0
[   17.813014]  kasan_report+0xdc/0x128
[   17.813061]  kasan_check_range+0x100/0x1a8
[   17.814692]  __kasan_check_write+0x20/0x30
[   17.814829]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   17.815588]  kasan_bitops_generic+0x110/0x1c8
[   17.816667]  kunit_try_run_case+0x170/0x3f0
[   17.816945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.817002]  kthread+0x328/0x630
[   17.817046]  ret_from_fork+0x10/0x20
[   17.817097] 
[   17.817118] Allocated by task 262:
[   17.817149]  kasan_save_stack+0x3c/0x68
[   17.817202]  kasan_save_track+0x20/0x40
[   17.817243]  kasan_save_alloc_info+0x40/0x58
[   17.817285]  __kasan_kmalloc+0xd4/0xd8
[   17.817324]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.817364]  kasan_bitops_generic+0xa0/0x1c8
[   17.817405]  kunit_try_run_case+0x170/0x3f0
[   17.819876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.820261]  kthread+0x328/0x630
[   17.820300]  ret_from_fork+0x10/0x20
[   17.820337] 
[   17.822045] The buggy address belongs to the object at fff00000c591d620
[   17.822045]  which belongs to the cache kmalloc-16 of size 16
[   17.822592] The buggy address is located 8 bytes inside of
[   17.822592]  allocated 9-byte region [fff00000c591d620, fff00000c591d629)
[   17.822752] 
[   17.823670] The buggy address belongs to the physical page:
[   17.823894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d
[   17.824746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.824808] page_type: f5(slab)
[   17.824851] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.825979] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.826379] page dumped because: kasan: bad access detected
[   17.826843] 
[   17.826871] Memory state around the buggy address:
[   17.827220]  fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.827280]  fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.827327] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.827368]                                   ^
[   17.827405]  fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.827451]  fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.827494] ==================================================================
[   17.878843] ==================================================================
[   17.878891] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   17.878938] Read of size 8 at addr fff00000c591d628 by task kunit_try_catch/262
[   17.878991] 
[   17.879021] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.879423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.879491] Hardware name: linux,dummy-virt (DT)
[   17.879526] Call trace:
[   17.879550]  show_stack+0x20/0x38 (C)
[   17.879852]  dump_stack_lvl+0x8c/0xd0
[   17.879930]  print_report+0x118/0x5d0
[   17.880002]  kasan_report+0xdc/0x128
[   17.880053]  __asan_report_load8_noabort+0x20/0x30
[   17.880106]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   17.880165]  kasan_bitops_generic+0x110/0x1c8
[   17.880231]  kunit_try_run_case+0x170/0x3f0
[   17.880293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.880349]  kthread+0x328/0x630
[   17.880445]  ret_from_fork+0x10/0x20
[   17.880505] 
[   17.880535] Allocated by task 262:
[   17.880572]  kasan_save_stack+0x3c/0x68
[   17.880623]  kasan_save_track+0x20/0x40
[   17.880664]  kasan_save_alloc_info+0x40/0x58
[   17.880706]  __kasan_kmalloc+0xd4/0xd8
[   17.880743]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.880783]  kasan_bitops_generic+0xa0/0x1c8
[   17.880821]  kunit_try_run_case+0x170/0x3f0
[   17.880861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.880909]  kthread+0x328/0x630
[   17.880941]  ret_from_fork+0x10/0x20
[   17.881028] 
[   17.881554] The buggy address belongs to the object at fff00000c591d620
[   17.881554]  which belongs to the cache kmalloc-16 of size 16
[   17.882238] The buggy address is located 8 bytes inside of
[   17.882238]  allocated 9-byte region [fff00000c591d620, fff00000c591d629)
[   17.882337] 
[   17.882477] The buggy address belongs to the physical page:
[   17.882526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d
[   17.882653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.882721] page_type: f5(slab)
[   17.882776] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.883105] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.883260] page dumped because: kasan: bad access detected
[   17.883319] 
[   17.883408] Memory state around the buggy address:
[   17.883478]  fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.883551]  fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.883747] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.883981]                                   ^
[   17.884106]  fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.884203]  fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.884311] ==================================================================
[   17.855349] ==================================================================
[   17.855413] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   17.855469] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262
[   17.855522] 
[   17.855553] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.855646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.855675] Hardware name: linux,dummy-virt (DT)
[   17.855708] Call trace:
[   17.855731]  show_stack+0x20/0x38 (C)
[   17.855787]  dump_stack_lvl+0x8c/0xd0
[   17.855837]  print_report+0x118/0x5d0
[   17.855905]  kasan_report+0xdc/0x128
[   17.855954]  kasan_check_range+0x100/0x1a8
[   17.856019]  __kasan_check_write+0x20/0x30
[   17.856080]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   17.856133]  kasan_bitops_generic+0x110/0x1c8
[   17.856192]  kunit_try_run_case+0x170/0x3f0
[   17.856250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.856310]  kthread+0x328/0x630
[   17.856352]  ret_from_fork+0x10/0x20
[   17.856403] 
[   17.856422] Allocated by task 262:
[   17.856457]  kasan_save_stack+0x3c/0x68
[   17.856512]  kasan_save_track+0x20/0x40
[   17.856560]  kasan_save_alloc_info+0x40/0x58
[   17.856603]  __kasan_kmalloc+0xd4/0xd8
[   17.856663]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.856707]  kasan_bitops_generic+0xa0/0x1c8
[   17.856756]  kunit_try_run_case+0x170/0x3f0
[   17.856797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.856844]  kthread+0x328/0x630
[   17.856877]  ret_from_fork+0x10/0x20
[   17.856929] 
[   17.856951] The buggy address belongs to the object at fff00000c591d620
[   17.856951]  which belongs to the cache kmalloc-16 of size 16
[   17.857021] The buggy address is located 8 bytes inside of
[   17.857021]  allocated 9-byte region [fff00000c591d620, fff00000c591d629)
[   17.857086] 
[   17.857128] The buggy address belongs to the physical page:
[   17.857166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d
[   17.857230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.857279] page_type: f5(slab)
[   17.857323] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.857376] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.857425] page dumped because: kasan: bad access detected
[   17.857458] 
[   17.857478] Memory state around the buggy address:
[   17.857511]  fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.857557]  fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.857600] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.857645]                                   ^
[   17.857679]  fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.857724]  fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.857766] ==================================================================
[   17.868736] ==================================================================
[   17.868802] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   17.868854] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262
[   17.868914] 
[   17.869609] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.869765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.869859] Hardware name: linux,dummy-virt (DT)
[   17.869897] Call trace:
[   17.869921]  show_stack+0x20/0x38 (C)
[   17.869992]  dump_stack_lvl+0x8c/0xd0
[   17.870049]  print_report+0x118/0x5d0
[   17.870097]  kasan_report+0xdc/0x128
[   17.870145]  kasan_check_range+0x100/0x1a8
[   17.870206]  __kasan_check_write+0x20/0x30
[   17.871399]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   17.871516]  kasan_bitops_generic+0x110/0x1c8
[   17.871567]  kunit_try_run_case+0x170/0x3f0
[   17.871647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.871724]  kthread+0x328/0x630
[   17.871811]  ret_from_fork+0x10/0x20
[   17.871869] 
[   17.871889] Allocated by task 262:
[   17.871924]  kasan_save_stack+0x3c/0x68
[   17.871972]  kasan_save_track+0x20/0x40
[   17.872011]  kasan_save_alloc_info+0x40/0x58
[   17.872053]  __kasan_kmalloc+0xd4/0xd8
[   17.872612]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.872735]  kasan_bitops_generic+0xa0/0x1c8
[   17.872811]  kunit_try_run_case+0x170/0x3f0
[   17.872857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.873153]  kthread+0x328/0x630
[   17.873242]  ret_from_fork+0x10/0x20
[   17.873331] 
[   17.873380] The buggy address belongs to the object at fff00000c591d620
[   17.873380]  which belongs to the cache kmalloc-16 of size 16
[   17.873456] The buggy address is located 8 bytes inside of
[   17.873456]  allocated 9-byte region [fff00000c591d620, fff00000c591d629)
[   17.873561] 
[   17.873585] The buggy address belongs to the physical page:
[   17.873619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d
[   17.873677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.873727] page_type: f5(slab)
[   17.873767] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.873938] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.874051] page dumped because: kasan: bad access detected
[   17.874092] 
[   17.874112] Memory state around the buggy address:
[   17.874145]  fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.874205]  fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.874252] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.874309]                                   ^
[   17.874345]  fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.874391]  fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.874913] ==================================================================
[   17.849156] ==================================================================
[   17.849247] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   17.849306] Read of size 8 at addr fff00000c591d628 by task kunit_try_catch/262
[   17.849360] 
[   17.849391] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.849475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.849503] Hardware name: linux,dummy-virt (DT)
[   17.849538] Call trace:
[   17.849562]  show_stack+0x20/0x38 (C)
[   17.849612]  dump_stack_lvl+0x8c/0xd0
[   17.849659]  print_report+0x118/0x5d0
[   17.849710]  kasan_report+0xdc/0x128
[   17.849756]  __asan_report_load8_noabort+0x20/0x30
[   17.849809]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   17.849862]  kasan_bitops_generic+0x110/0x1c8
[   17.849909]  kunit_try_run_case+0x170/0x3f0
[   17.849959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.850012]  kthread+0x328/0x630
[   17.850056]  ret_from_fork+0x10/0x20
[   17.850371] 
[   17.850502] Allocated by task 262:
[   17.850611]  kasan_save_stack+0x3c/0x68
[   17.850703]  kasan_save_track+0x20/0x40
[   17.850763]  kasan_save_alloc_info+0x40/0x58
[   17.850806]  __kasan_kmalloc+0xd4/0xd8
[   17.850874]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.850919]  kasan_bitops_generic+0xa0/0x1c8
[   17.851330]  kunit_try_run_case+0x170/0x3f0
[   17.851421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.851551]  kthread+0x328/0x630
[   17.851656]  ret_from_fork+0x10/0x20
[   17.851740] 
[   17.851828] The buggy address belongs to the object at fff00000c591d620
[   17.851828]  which belongs to the cache kmalloc-16 of size 16
[   17.851921] The buggy address is located 8 bytes inside of
[   17.851921]  allocated 9-byte region [fff00000c591d620, fff00000c591d629)
[   17.852049] 
[   17.852086] The buggy address belongs to the physical page:
[   17.852120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d
[   17.852177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.852239] page_type: f5(slab)
[   17.852280] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.852333] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.852376] page dumped because: kasan: bad access detected
[   17.852412] 
[   17.852433] Memory state around the buggy address:
[   17.852469]  fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.852515]  fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.852561] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.852601]                                   ^
[   17.852634]  fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.852681]  fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.852722] ==================================================================
[   17.833319] ==================================================================
[   17.833376] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   17.833431] Read of size 8 at addr fff00000c591d628 by task kunit_try_catch/262
[   17.833486] 
[   17.833519] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.833602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.833631] Hardware name: linux,dummy-virt (DT)
[   17.833662] Call trace:
[   17.833685]  show_stack+0x20/0x38 (C)
[   17.833736]  dump_stack_lvl+0x8c/0xd0
[   17.833784]  print_report+0x118/0x5d0
[   17.833833]  kasan_report+0xdc/0x128
[   17.833878]  __asan_report_load8_noabort+0x20/0x30
[   17.833931]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   17.833988]  kasan_bitops_generic+0x110/0x1c8
[   17.834039]  kunit_try_run_case+0x170/0x3f0
[   17.834088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.834142]  kthread+0x328/0x630
[   17.838731]  ret_from_fork+0x10/0x20
[   17.838795] 
[   17.838816] Allocated by task 262:
[   17.838850]  kasan_save_stack+0x3c/0x68
[   17.838897]  kasan_save_track+0x20/0x40
[   17.838937]  kasan_save_alloc_info+0x40/0x58
[   17.838984]  __kasan_kmalloc+0xd4/0xd8
[   17.839021]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.839063]  kasan_bitops_generic+0xa0/0x1c8
[   17.839101]  kunit_try_run_case+0x170/0x3f0
[   17.839141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.839196]  kthread+0x328/0x630
[   17.839229]  ret_from_fork+0x10/0x20
[   17.839265] 
[   17.839289] The buggy address belongs to the object at fff00000c591d620
[   17.839289]  which belongs to the cache kmalloc-16 of size 16
[   17.839368] The buggy address is located 8 bytes inside of
[   17.839368]  allocated 9-byte region [fff00000c591d620, fff00000c591d629)
[   17.839446] 
[   17.839513] The buggy address belongs to the physical page:
[   17.839613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d
[   17.839736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.839802] page_type: f5(slab)
[   17.839893] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.839985] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.840029] page dumped because: kasan: bad access detected
[   17.840064] 
[   17.840087] Memory state around the buggy address:
[   17.840122]  fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.840168]  fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.840224] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.840265]                                   ^
[   17.840297]  fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.840346]  fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.840458] ==================================================================
[   17.842054] ==================================================================
[   17.842195] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   17.842315] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262
[   17.842387] 
[   17.842432] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.842519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.842556] Hardware name: linux,dummy-virt (DT)
[   17.842604] Call trace:
[   17.842630]  show_stack+0x20/0x38 (C)
[   17.843025]  dump_stack_lvl+0x8c/0xd0
[   17.843123]  print_report+0x118/0x5d0
[   17.843236]  kasan_report+0xdc/0x128
[   17.843315]  kasan_check_range+0x100/0x1a8
[   17.843393]  __kasan_check_write+0x20/0x30
[   17.843445]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   17.843498]  kasan_bitops_generic+0x110/0x1c8
[   17.843586]  kunit_try_run_case+0x170/0x3f0
[   17.843671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.843731]  kthread+0x328/0x630
[   17.843772]  ret_from_fork+0x10/0x20
[   17.843821] 
[   17.843841] Allocated by task 262:
[   17.843878]  kasan_save_stack+0x3c/0x68
[   17.843933]  kasan_save_track+0x20/0x40
[   17.844041]  kasan_save_alloc_info+0x40/0x58
[   17.844083]  __kasan_kmalloc+0xd4/0xd8
[   17.844122]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.844343]  kasan_bitops_generic+0xa0/0x1c8
[   17.844543]  kunit_try_run_case+0x170/0x3f0
[   17.844597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.844663]  kthread+0x328/0x630
[   17.844698]  ret_from_fork+0x10/0x20
[   17.845963] 
[   17.846001] The buggy address belongs to the object at fff00000c591d620
[   17.846001]  which belongs to the cache kmalloc-16 of size 16
[   17.846065] The buggy address is located 8 bytes inside of
[   17.846065]  allocated 9-byte region [fff00000c591d620, fff00000c591d629)
[   17.846130] 
[   17.846152] The buggy address belongs to the physical page:
[   17.846204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d
[   17.846261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.846311] page_type: f5(slab)
[   17.846350] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.848240] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.848305] page dumped because: kasan: bad access detected
[   17.848341] 
[   17.848363] Memory state around the buggy address:
[   17.848398]  fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.848445]  fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.848497] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.848537]                                   ^
[   17.848572]  fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.848618]  fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.848660] ==================================================================
[   17.875559] ==================================================================
[   17.875628] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   17.875702] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262
[   17.875868] 
[   17.875906] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.875991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.876028] Hardware name: linux,dummy-virt (DT)
[   17.876065] Call trace:
[   17.876121]  show_stack+0x20/0x38 (C)
[   17.876208]  dump_stack_lvl+0x8c/0xd0
[   17.876257]  print_report+0x118/0x5d0
[   17.876377]  kasan_report+0xdc/0x128
[   17.876554]  kasan_check_range+0x100/0x1a8
[   17.876729]  __kasan_check_write+0x20/0x30
[   17.876792]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   17.876892]  kasan_bitops_generic+0x110/0x1c8
[   17.876942]  kunit_try_run_case+0x170/0x3f0
[   17.877024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.877079]  kthread+0x328/0x630
[   17.877127]  ret_from_fork+0x10/0x20
[   17.877177] 
[   17.877214] Allocated by task 262:
[   17.877424]  kasan_save_stack+0x3c/0x68
[   17.877474]  kasan_save_track+0x20/0x40
[   17.877515]  kasan_save_alloc_info+0x40/0x58
[   17.877557]  __kasan_kmalloc+0xd4/0xd8
[   17.877602]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.877643]  kasan_bitops_generic+0xa0/0x1c8
[   17.877683]  kunit_try_run_case+0x170/0x3f0
[   17.877723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.877769]  kthread+0x328/0x630
[   17.877804]  ret_from_fork+0x10/0x20
[   17.877840] 
[   17.877863] The buggy address belongs to the object at fff00000c591d620
[   17.877863]  which belongs to the cache kmalloc-16 of size 16
[   17.877926] The buggy address is located 8 bytes inside of
[   17.877926]  allocated 9-byte region [fff00000c591d620, fff00000c591d629)
[   17.877995] 
[   17.878015] The buggy address belongs to the physical page:
[   17.878048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d
[   17.878104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.878153] page_type: f5(slab)
[   17.878203] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.878257] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.878300] page dumped because: kasan: bad access detected
[   17.878334] 
[   17.878355] Memory state around the buggy address:
[   17.878392]  fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.878439]  fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.878485] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.878527]                                   ^
[   17.878561]  fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.878603]  fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.878644] ==================================================================

[   14.556882] ==================================================================
[   14.557244] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.557791] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278
[   14.558056] 
[   14.558138] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.558179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.558191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.558213] Call Trace:
[   14.558223]  <TASK>
[   14.558236]  dump_stack_lvl+0x73/0xb0
[   14.558265]  print_report+0xd1/0x610
[   14.558286]  ? __virt_addr_valid+0x1db/0x2d0
[   14.558309]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.558337]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.558361]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.558396]  kasan_report+0x141/0x180
[   14.558419]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.558451]  kasan_check_range+0x10c/0x1c0
[   14.558475]  __kasan_check_write+0x18/0x20
[   14.558496]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.558523]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.558570]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.558595]  ? trace_hardirqs_on+0x37/0xe0
[   14.558617]  ? kasan_bitops_generic+0x92/0x1c0
[   14.558646]  kasan_bitops_generic+0x116/0x1c0
[   14.558671]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.558697]  ? __pfx_read_tsc+0x10/0x10
[   14.558719]  ? ktime_get_ts64+0x86/0x230
[   14.558743]  kunit_try_run_case+0x1a5/0x480
[   14.558853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.558879]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.558905]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.558930]  ? __kthread_parkme+0x82/0x180
[   14.558951]  ? preempt_count_sub+0x50/0x80
[   14.558977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.559007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.559035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.559062]  kthread+0x337/0x6f0
[   14.559082]  ? trace_preempt_on+0x20/0xc0
[   14.559121]  ? __pfx_kthread+0x10/0x10
[   14.559142]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.559166]  ? calculate_sigpending+0x7b/0xa0
[   14.559203]  ? __pfx_kthread+0x10/0x10
[   14.559227]  ret_from_fork+0x116/0x1d0
[   14.559247]  ? __pfx_kthread+0x10/0x10
[   14.559268]  ret_from_fork_asm+0x1a/0x30
[   14.559298]  </TASK>
[   14.559308] 
[   14.568714] Allocated by task 278:
[   14.568939]  kasan_save_stack+0x45/0x70
[   14.569144]  kasan_save_track+0x18/0x40
[   14.569334]  kasan_save_alloc_info+0x3b/0x50
[   14.569610]  __kasan_kmalloc+0xb7/0xc0
[   14.569781]  __kmalloc_cache_noprof+0x189/0x420
[   14.570026]  kasan_bitops_generic+0x92/0x1c0
[   14.570254]  kunit_try_run_case+0x1a5/0x480
[   14.570572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.570853]  kthread+0x337/0x6f0
[   14.571025]  ret_from_fork+0x116/0x1d0
[   14.571229]  ret_from_fork_asm+0x1a/0x30
[   14.571523] 
[   14.571639] The buggy address belongs to the object at ffff888102781700
[   14.571639]  which belongs to the cache kmalloc-16 of size 16
[   14.572159] The buggy address is located 8 bytes inside of
[   14.572159]  allocated 9-byte region [ffff888102781700, ffff888102781709)
[   14.572842] 
[   14.572961] The buggy address belongs to the physical page:
[   14.573160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781
[   14.573525] flags: 0x200000000000000(node=0|zone=2)
[   14.573886] page_type: f5(slab)
[   14.574015] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.574319] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.574842] page dumped because: kasan: bad access detected
[   14.575024] 
[   14.575093] Memory state around the buggy address:
[   14.575246]  ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.575566]  ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.576072] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.576438]                       ^
[   14.576561]  ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.576998]  ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.577401] ==================================================================
[   14.577984] ==================================================================
[   14.578282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.578723] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278
[   14.579063] 
[   14.579172] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.579215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.579236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.579257] Call Trace:
[   14.579271]  <TASK>
[   14.579285]  dump_stack_lvl+0x73/0xb0
[   14.579378]  print_report+0xd1/0x610
[   14.579403]  ? __virt_addr_valid+0x1db/0x2d0
[   14.579437]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.579474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.579510]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.579538]  kasan_report+0x141/0x180
[   14.579561]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.579593]  kasan_check_range+0x10c/0x1c0
[   14.579617]  __kasan_check_write+0x18/0x20
[   14.579637]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.579666]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.579695]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.579720]  ? trace_hardirqs_on+0x37/0xe0
[   14.579743]  ? kasan_bitops_generic+0x92/0x1c0
[   14.579782]  kasan_bitops_generic+0x116/0x1c0
[   14.579806]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.579833]  ? __pfx_read_tsc+0x10/0x10
[   14.579855]  ? ktime_get_ts64+0x86/0x230
[   14.579887]  kunit_try_run_case+0x1a5/0x480
[   14.579914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.579948]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.579973]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.579998]  ? __kthread_parkme+0x82/0x180
[   14.580020]  ? preempt_count_sub+0x50/0x80
[   14.580044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.580070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.580096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.580123]  kthread+0x337/0x6f0
[   14.580144]  ? trace_preempt_on+0x20/0xc0
[   14.580167]  ? __pfx_kthread+0x10/0x10
[   14.580188]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.580211]  ? calculate_sigpending+0x7b/0xa0
[   14.580236]  ? __pfx_kthread+0x10/0x10
[   14.580258]  ret_from_fork+0x116/0x1d0
[   14.580277]  ? __pfx_kthread+0x10/0x10
[   14.580298]  ret_from_fork_asm+0x1a/0x30
[   14.580329]  </TASK>
[   14.580340] 
[   14.589891] Allocated by task 278:
[   14.590064]  kasan_save_stack+0x45/0x70
[   14.590275]  kasan_save_track+0x18/0x40
[   14.590500]  kasan_save_alloc_info+0x3b/0x50
[   14.590651]  __kasan_kmalloc+0xb7/0xc0
[   14.590940]  __kmalloc_cache_noprof+0x189/0x420
[   14.591167]  kasan_bitops_generic+0x92/0x1c0
[   14.591346]  kunit_try_run_case+0x1a5/0x480
[   14.591689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.591952]  kthread+0x337/0x6f0
[   14.592129]  ret_from_fork+0x116/0x1d0
[   14.592306]  ret_from_fork_asm+0x1a/0x30
[   14.592671] 
[   14.592794] The buggy address belongs to the object at ffff888102781700
[   14.592794]  which belongs to the cache kmalloc-16 of size 16
[   14.593309] The buggy address is located 8 bytes inside of
[   14.593309]  allocated 9-byte region [ffff888102781700, ffff888102781709)
[   14.593900] 
[   14.594000] The buggy address belongs to the physical page:
[   14.594212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781
[   14.594626] flags: 0x200000000000000(node=0|zone=2)
[   14.594800] page_type: f5(slab)
[   14.594921] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.595151] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.595678] page dumped because: kasan: bad access detected
[   14.595948] 
[   14.596042] Memory state around the buggy address:
[   14.596266]  ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.596736]  ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.597088] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.597303]                       ^
[   14.597425]  ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.597640]  ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.598322] ==================================================================
[   14.619817] ==================================================================
[   14.620308] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.620842] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278
[   14.621069] 
[   14.621165] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.621208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.621220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.621240] Call Trace:
[   14.621253]  <TASK>
[   14.621268]  dump_stack_lvl+0x73/0xb0
[   14.621296]  print_report+0xd1/0x610
[   14.621318]  ? __virt_addr_valid+0x1db/0x2d0
[   14.621488]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.621521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.621546]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.621574]  kasan_report+0x141/0x180
[   14.621597]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.621629]  kasan_check_range+0x10c/0x1c0
[   14.621654]  __kasan_check_write+0x18/0x20
[   14.621675]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.621713]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.621742]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.621778]  ? trace_hardirqs_on+0x37/0xe0
[   14.621802]  ? kasan_bitops_generic+0x92/0x1c0
[   14.621841]  kasan_bitops_generic+0x116/0x1c0
[   14.621866]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.621903]  ? __pfx_read_tsc+0x10/0x10
[   14.621924]  ? ktime_get_ts64+0x86/0x230
[   14.621958]  kunit_try_run_case+0x1a5/0x480
[   14.621983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.622007]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.622042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.622067]  ? __kthread_parkme+0x82/0x180
[   14.622089]  ? preempt_count_sub+0x50/0x80
[   14.622114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.622139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.622166]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.622192]  kthread+0x337/0x6f0
[   14.622212]  ? trace_preempt_on+0x20/0xc0
[   14.622235]  ? __pfx_kthread+0x10/0x10
[   14.622255]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.622287]  ? calculate_sigpending+0x7b/0xa0
[   14.622312]  ? __pfx_kthread+0x10/0x10
[   14.622334]  ret_from_fork+0x116/0x1d0
[   14.622363]  ? __pfx_kthread+0x10/0x10
[   14.622397]  ret_from_fork_asm+0x1a/0x30
[   14.622429]  </TASK>
[   14.622439] 
[   14.636983] Allocated by task 278:
[   14.637149]  kasan_save_stack+0x45/0x70
[   14.637301]  kasan_save_track+0x18/0x40
[   14.637618]  kasan_save_alloc_info+0x3b/0x50
[   14.637851]  __kasan_kmalloc+0xb7/0xc0
[   14.638042]  __kmalloc_cache_noprof+0x189/0x420
[   14.638265]  kasan_bitops_generic+0x92/0x1c0
[   14.638571]  kunit_try_run_case+0x1a5/0x480
[   14.638773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.639027]  kthread+0x337/0x6f0
[   14.639228]  ret_from_fork+0x116/0x1d0
[   14.639542]  ret_from_fork_asm+0x1a/0x30
[   14.639904] 
[   14.640009] The buggy address belongs to the object at ffff888102781700
[   14.640009]  which belongs to the cache kmalloc-16 of size 16
[   14.640461] The buggy address is located 8 bytes inside of
[   14.640461]  allocated 9-byte region [ffff888102781700, ffff888102781709)
[   14.641008] 
[   14.641107] The buggy address belongs to the physical page:
[   14.641439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781
[   14.641825] flags: 0x200000000000000(node=0|zone=2)
[   14.641989] page_type: f5(slab)
[   14.642154] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.642629] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.642994] page dumped because: kasan: bad access detected
[   14.643229] 
[   14.643516] Memory state around the buggy address:
[   14.643783]  ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.644045]  ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.644454] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.644795]                       ^
[   14.644968]  ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.645283]  ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.645689] ==================================================================
[   14.598866] ==================================================================
[   14.599218] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.599920] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278
[   14.600220] 
[   14.600329] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.600530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.600555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.600575] Call Trace:
[   14.600589]  <TASK>
[   14.600605]  dump_stack_lvl+0x73/0xb0
[   14.600646]  print_report+0xd1/0x610
[   14.600668]  ? __virt_addr_valid+0x1db/0x2d0
[   14.600691]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.600727]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.600751]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.600794]  kasan_report+0x141/0x180
[   14.600817]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.600849]  kasan_check_range+0x10c/0x1c0
[   14.600873]  __kasan_check_write+0x18/0x20
[   14.600903]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.600931]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.600970]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.600996]  ? trace_hardirqs_on+0x37/0xe0
[   14.601018]  ? kasan_bitops_generic+0x92/0x1c0
[   14.601055]  kasan_bitops_generic+0x116/0x1c0
[   14.601081]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.601108]  ? __pfx_read_tsc+0x10/0x10
[   14.601139]  ? ktime_get_ts64+0x86/0x230
[   14.601164]  kunit_try_run_case+0x1a5/0x480
[   14.601189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.601222]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.601246]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.601271]  ? __kthread_parkme+0x82/0x180
[   14.601303]  ? preempt_count_sub+0x50/0x80
[   14.601406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.601441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.601489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.601518]  kthread+0x337/0x6f0
[   14.601540]  ? trace_preempt_on+0x20/0xc0
[   14.601575]  ? __pfx_kthread+0x10/0x10
[   14.601598]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.601622]  ? calculate_sigpending+0x7b/0xa0
[   14.601648]  ? __pfx_kthread+0x10/0x10
[   14.601671]  ret_from_fork+0x116/0x1d0
[   14.601690]  ? __pfx_kthread+0x10/0x10
[   14.601719]  ret_from_fork_asm+0x1a/0x30
[   14.601752]  </TASK>
[   14.601780] 
[   14.610932] Allocated by task 278:
[   14.611106]  kasan_save_stack+0x45/0x70
[   14.611303]  kasan_save_track+0x18/0x40
[   14.611610]  kasan_save_alloc_info+0x3b/0x50
[   14.611823]  __kasan_kmalloc+0xb7/0xc0
[   14.612010]  __kmalloc_cache_noprof+0x189/0x420
[   14.612230]  kasan_bitops_generic+0x92/0x1c0
[   14.612514]  kunit_try_run_case+0x1a5/0x480
[   14.612739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.612992]  kthread+0x337/0x6f0
[   14.613174]  ret_from_fork+0x116/0x1d0
[   14.613323]  ret_from_fork_asm+0x1a/0x30
[   14.613661] 
[   14.613781] The buggy address belongs to the object at ffff888102781700
[   14.613781]  which belongs to the cache kmalloc-16 of size 16
[   14.614135] The buggy address is located 8 bytes inside of
[   14.614135]  allocated 9-byte region [ffff888102781700, ffff888102781709)
[   14.614584] 
[   14.614681] The buggy address belongs to the physical page:
[   14.615055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781
[   14.615551] flags: 0x200000000000000(node=0|zone=2)
[   14.615782] page_type: f5(slab)
[   14.615976] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.616300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.616698] page dumped because: kasan: bad access detected
[   14.616897] 
[   14.616967] Memory state around the buggy address:
[   14.617123]  ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.617651]  ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.618153] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.618638]                       ^
[   14.618797]  ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.619018]  ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.619362] ==================================================================
[   14.536723] ==================================================================
[   14.537199] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.537544] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278
[   14.538097] 
[   14.538235] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.538282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.538295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.538317] Call Trace:
[   14.538395]  <TASK>
[   14.538412]  dump_stack_lvl+0x73/0xb0
[   14.538446]  print_report+0xd1/0x610
[   14.538468]  ? __virt_addr_valid+0x1db/0x2d0
[   14.538492]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.538521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.538545]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.538573]  kasan_report+0x141/0x180
[   14.538596]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.538628]  kasan_check_range+0x10c/0x1c0
[   14.538653]  __kasan_check_write+0x18/0x20
[   14.538674]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.538701]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.538730]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.538768]  ? trace_hardirqs_on+0x37/0xe0
[   14.538792]  ? kasan_bitops_generic+0x92/0x1c0
[   14.538820]  kasan_bitops_generic+0x116/0x1c0
[   14.538845]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.538872]  ? __pfx_read_tsc+0x10/0x10
[   14.538894]  ? ktime_get_ts64+0x86/0x230
[   14.538918]  kunit_try_run_case+0x1a5/0x480
[   14.538944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.538968]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.538994]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.539019]  ? __kthread_parkme+0x82/0x180
[   14.539041]  ? preempt_count_sub+0x50/0x80
[   14.539065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.539091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.539117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.539143]  kthread+0x337/0x6f0
[   14.539163]  ? trace_preempt_on+0x20/0xc0
[   14.539186]  ? __pfx_kthread+0x10/0x10
[   14.539206]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.539228]  ? calculate_sigpending+0x7b/0xa0
[   14.539253]  ? __pfx_kthread+0x10/0x10
[   14.539275]  ret_from_fork+0x116/0x1d0
[   14.539294]  ? __pfx_kthread+0x10/0x10
[   14.539315]  ret_from_fork_asm+0x1a/0x30
[   14.539400]  </TASK>
[   14.539411] 
[   14.547354] Allocated by task 278:
[   14.547538]  kasan_save_stack+0x45/0x70
[   14.547831]  kasan_save_track+0x18/0x40
[   14.548031]  kasan_save_alloc_info+0x3b/0x50
[   14.548247]  __kasan_kmalloc+0xb7/0xc0
[   14.548482]  __kmalloc_cache_noprof+0x189/0x420
[   14.548679]  kasan_bitops_generic+0x92/0x1c0
[   14.548842]  kunit_try_run_case+0x1a5/0x480
[   14.549034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.549287]  kthread+0x337/0x6f0
[   14.549508]  ret_from_fork+0x116/0x1d0
[   14.549652]  ret_from_fork_asm+0x1a/0x30
[   14.549807] 
[   14.549876] The buggy address belongs to the object at ffff888102781700
[   14.549876]  which belongs to the cache kmalloc-16 of size 16
[   14.550254] The buggy address is located 8 bytes inside of
[   14.550254]  allocated 9-byte region [ffff888102781700, ffff888102781709)
[   14.551335] 
[   14.551628] The buggy address belongs to the physical page:
[   14.551842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781
[   14.552389] flags: 0x200000000000000(node=0|zone=2)
[   14.552619] page_type: f5(slab)
[   14.552786] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.553017] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.553242] page dumped because: kasan: bad access detected
[   14.553720] 
[   14.553830] Memory state around the buggy address:
[   14.554059]  ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.554387]  ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.554791] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.555042]                       ^
[   14.555166]  ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.555645]  ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.555928] ==================================================================
[   14.646166] ==================================================================
[   14.646627] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.647028] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278
[   14.647555] 
[   14.647664] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.647708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.647721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.647741] Call Trace:
[   14.647768]  <TASK>
[   14.647782]  dump_stack_lvl+0x73/0xb0
[   14.647813]  print_report+0xd1/0x610
[   14.647836]  ? __virt_addr_valid+0x1db/0x2d0
[   14.647858]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.647886]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.647911]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.647939]  kasan_report+0x141/0x180
[   14.647961]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.647993]  kasan_check_range+0x10c/0x1c0
[   14.648018]  __kasan_check_write+0x18/0x20
[   14.648038]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.648066]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.648095]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.648121]  ? trace_hardirqs_on+0x37/0xe0
[   14.648156]  ? kasan_bitops_generic+0x92/0x1c0
[   14.648184]  kasan_bitops_generic+0x116/0x1c0
[   14.648222]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.648249]  ? __pfx_read_tsc+0x10/0x10
[   14.648271]  ? ktime_get_ts64+0x86/0x230
[   14.648294]  kunit_try_run_case+0x1a5/0x480
[   14.648388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.648415]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.648458]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.648484]  ? __kthread_parkme+0x82/0x180
[   14.648506]  ? preempt_count_sub+0x50/0x80
[   14.648532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.648560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.648586]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.648612]  kthread+0x337/0x6f0
[   14.648631]  ? trace_preempt_on+0x20/0xc0
[   14.648656]  ? __pfx_kthread+0x10/0x10
[   14.648677]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.648701]  ? calculate_sigpending+0x7b/0xa0
[   14.648726]  ? __pfx_kthread+0x10/0x10
[   14.648748]  ret_from_fork+0x116/0x1d0
[   14.648775]  ? __pfx_kthread+0x10/0x10
[   14.648797]  ret_from_fork_asm+0x1a/0x30
[   14.648829]  </TASK>
[   14.648839] 
[   14.657558] Allocated by task 278:
[   14.657744]  kasan_save_stack+0x45/0x70
[   14.657984]  kasan_save_track+0x18/0x40
[   14.658214]  kasan_save_alloc_info+0x3b/0x50
[   14.658519]  __kasan_kmalloc+0xb7/0xc0
[   14.658723]  __kmalloc_cache_noprof+0x189/0x420
[   14.658972]  kasan_bitops_generic+0x92/0x1c0
[   14.659178]  kunit_try_run_case+0x1a5/0x480
[   14.659709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.660016]  kthread+0x337/0x6f0
[   14.660185]  ret_from_fork+0x116/0x1d0
[   14.660465]  ret_from_fork_asm+0x1a/0x30
[   14.660682] 
[   14.660775] The buggy address belongs to the object at ffff888102781700
[   14.660775]  which belongs to the cache kmalloc-16 of size 16
[   14.661281] The buggy address is located 8 bytes inside of
[   14.661281]  allocated 9-byte region [ffff888102781700, ffff888102781709)
[   14.661877] 
[   14.661993] The buggy address belongs to the physical page:
[   14.662202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781
[   14.662565] flags: 0x200000000000000(node=0|zone=2)
[   14.662839] page_type: f5(slab)
[   14.663009] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.663528] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.663933] page dumped because: kasan: bad access detected
[   14.664200] 
[   14.664272] Memory state around the buggy address:
[   14.664445]  ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.664885]  ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.665241] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.665633]                       ^
[   14.665805]  ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.666126]  ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.666522] ==================================================================
[   14.666972] ==================================================================
[   14.667493] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.667887] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278
[   14.668217] 
[   14.668389] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.668452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.668464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.668493] Call Trace:
[   14.668507]  <TASK>
[   14.668521]  dump_stack_lvl+0x73/0xb0
[   14.668551]  print_report+0xd1/0x610
[   14.668586]  ? __virt_addr_valid+0x1db/0x2d0
[   14.668609]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.668637]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.668662]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.668690]  kasan_report+0x141/0x180
[   14.668712]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.668745]  kasan_check_range+0x10c/0x1c0
[   14.668777]  __kasan_check_write+0x18/0x20
[   14.668797]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.668824]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.668862]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.668887]  ? trace_hardirqs_on+0x37/0xe0
[   14.668910]  ? kasan_bitops_generic+0x92/0x1c0
[   14.668948]  kasan_bitops_generic+0x116/0x1c0
[   14.668973]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.668999]  ? __pfx_read_tsc+0x10/0x10
[   14.669020]  ? ktime_get_ts64+0x86/0x230
[   14.669044]  kunit_try_run_case+0x1a5/0x480
[   14.669070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.669093]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.669118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.669143]  ? __kthread_parkme+0x82/0x180
[   14.669163]  ? preempt_count_sub+0x50/0x80
[   14.669186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.669213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.669238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.669264]  kthread+0x337/0x6f0
[   14.669291]  ? trace_preempt_on+0x20/0xc0
[   14.669337]  ? __pfx_kthread+0x10/0x10
[   14.669358]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.669380]  ? calculate_sigpending+0x7b/0xa0
[   14.669405]  ? __pfx_kthread+0x10/0x10
[   14.669432]  ret_from_fork+0x116/0x1d0
[   14.669451]  ? __pfx_kthread+0x10/0x10
[   14.669472]  ret_from_fork_asm+0x1a/0x30
[   14.669503]  </TASK>
[   14.669512] 
[   14.678372] Allocated by task 278:
[   14.678599]  kasan_save_stack+0x45/0x70
[   14.678776]  kasan_save_track+0x18/0x40
[   14.678913]  kasan_save_alloc_info+0x3b/0x50
[   14.679065]  __kasan_kmalloc+0xb7/0xc0
[   14.679278]  __kmalloc_cache_noprof+0x189/0x420
[   14.679694]  kasan_bitops_generic+0x92/0x1c0
[   14.679961]  kunit_try_run_case+0x1a5/0x480
[   14.680160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.680420]  kthread+0x337/0x6f0
[   14.680643]  ret_from_fork+0x116/0x1d0
[   14.680844]  ret_from_fork_asm+0x1a/0x30
[   14.681043] 
[   14.681120] The buggy address belongs to the object at ffff888102781700
[   14.681120]  which belongs to the cache kmalloc-16 of size 16
[   14.681701] The buggy address is located 8 bytes inside of
[   14.681701]  allocated 9-byte region [ffff888102781700, ffff888102781709)
[   14.682229] 
[   14.682394] The buggy address belongs to the physical page:
[   14.682677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781
[   14.683032] flags: 0x200000000000000(node=0|zone=2)
[   14.683263] page_type: f5(slab)
[   14.683429] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.683666] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.684253] page dumped because: kasan: bad access detected
[   14.684635] 
[   14.684767] Memory state around the buggy address:
[   14.684947]  ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.685262]  ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.685677] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.685986]                       ^
[   14.686111]  ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.686542]  ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.686879] ==================================================================
[   14.687316] ==================================================================
[   14.687650] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.688364] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278
[   14.688719] 
[   14.688817] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.688862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.688875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.688896] Call Trace:
[   14.688910]  <TASK>
[   14.688927]  dump_stack_lvl+0x73/0xb0
[   14.688957]  print_report+0xd1/0x610
[   14.688978]  ? __virt_addr_valid+0x1db/0x2d0
[   14.689003]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.689031]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.689055]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.689083]  kasan_report+0x141/0x180
[   14.689118]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.689150]  kasan_check_range+0x10c/0x1c0
[   14.689186]  __kasan_check_write+0x18/0x20
[   14.689206]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.689234]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.689263]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.689287]  ? trace_hardirqs_on+0x37/0xe0
[   14.689369]  ? kasan_bitops_generic+0x92/0x1c0
[   14.689404]  kasan_bitops_generic+0x116/0x1c0
[   14.689446]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.689482]  ? __pfx_read_tsc+0x10/0x10
[   14.689504]  ? ktime_get_ts64+0x86/0x230
[   14.689528]  kunit_try_run_case+0x1a5/0x480
[   14.689564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.689591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.689618]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.689643]  ? __kthread_parkme+0x82/0x180
[   14.689673]  ? preempt_count_sub+0x50/0x80
[   14.689697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.689723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.689767]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.689793]  kthread+0x337/0x6f0
[   14.689814]  ? trace_preempt_on+0x20/0xc0
[   14.689836]  ? __pfx_kthread+0x10/0x10
[   14.689858]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.689879]  ? calculate_sigpending+0x7b/0xa0
[   14.689905]  ? __pfx_kthread+0x10/0x10
[   14.689926]  ret_from_fork+0x116/0x1d0
[   14.689945]  ? __pfx_kthread+0x10/0x10
[   14.689966]  ret_from_fork_asm+0x1a/0x30
[   14.689998]  </TASK>
[   14.690007] 
[   14.698571] Allocated by task 278:
[   14.698792]  kasan_save_stack+0x45/0x70
[   14.698997]  kasan_save_track+0x18/0x40
[   14.699209]  kasan_save_alloc_info+0x3b/0x50
[   14.699442]  __kasan_kmalloc+0xb7/0xc0
[   14.699629]  __kmalloc_cache_noprof+0x189/0x420
[   14.699835]  kasan_bitops_generic+0x92/0x1c0
[   14.699986]  kunit_try_run_case+0x1a5/0x480
[   14.700133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.700502]  kthread+0x337/0x6f0
[   14.700697]  ret_from_fork+0x116/0x1d0
[   14.700902]  ret_from_fork_asm+0x1a/0x30
[   14.701098] 
[   14.701197] The buggy address belongs to the object at ffff888102781700
[   14.701197]  which belongs to the cache kmalloc-16 of size 16
[   14.701745] The buggy address is located 8 bytes inside of
[   14.701745]  allocated 9-byte region [ffff888102781700, ffff888102781709)
[   14.702233] 
[   14.702452] The buggy address belongs to the physical page:
[   14.702751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781
[   14.703117] flags: 0x200000000000000(node=0|zone=2)
[   14.703404] page_type: f5(slab)
[   14.703609] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.703994] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.704306] page dumped because: kasan: bad access detected
[   14.704744] 
[   14.704851] Memory state around the buggy address:
[   14.705077]  ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.705438]  ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.705703] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.706042]                       ^
[   14.706219]  ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.706592]  ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.706874] ==================================================================