Hay
Date
July 20, 2025, 11:12 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.726524] ==================================================================
[   17.727520] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   17.727610] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.727679] 
[   17.727712] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.727797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.727825] Hardware name: linux,dummy-virt (DT)
[   17.727858] Call trace:
[   17.727977]  show_stack+0x20/0x38 (C)
[   17.728029]  dump_stack_lvl+0x8c/0xd0
[   17.728076]  print_report+0x118/0x5d0
[   17.728158]  kasan_report+0xdc/0x128
[   17.728205]  kasan_check_range+0x100/0x1a8
[   17.728286]  __kasan_check_write+0x20/0x30
[   17.728333]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   17.728415]  kasan_bitops_generic+0x110/0x1c8
[   17.728474]  kunit_try_run_case+0x170/0x3f0
[   17.728527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.728598]  kthread+0x328/0x630
[   17.728834]  ret_from_fork+0x10/0x20
[   17.728891] 
[   17.728918] Allocated by task 261:
[   17.728957]  kasan_save_stack+0x3c/0x68
[   17.729119]  kasan_save_track+0x20/0x40
[   17.729161]  kasan_save_alloc_info+0x40/0x58
[   17.729249]  __kasan_kmalloc+0xd4/0xd8
[   17.729312]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.729471]  kasan_bitops_generic+0xa0/0x1c8
[   17.729514]  kunit_try_run_case+0x170/0x3f0
[   17.729594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.730308]  kthread+0x328/0x630
[   17.730384]  ret_from_fork+0x10/0x20
[   17.730423] 
[   17.730445] The buggy address belongs to the object at fff00000c3fc6220
[   17.730445]  which belongs to the cache kmalloc-16 of size 16
[   17.730505] The buggy address is located 8 bytes inside of
[   17.730505]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.730658] 
[   17.730692] The buggy address belongs to the physical page:
[   17.730725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.730800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.730875] page_type: f5(slab)
[   17.730945] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.731120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.731168] page dumped because: kasan: bad access detected
[   17.731286] 
[   17.731309] Memory state around the buggy address:
[   17.731354]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.731458]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.731558] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.731624]                                   ^
[   17.731659]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.731711]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.731751] ==================================================================
[   17.702049] ==================================================================
[   17.702113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   17.702169] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.702222] 
[   17.702746] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.702967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.703001] Hardware name: linux,dummy-virt (DT)
[   17.703101] Call trace:
[   17.703127]  show_stack+0x20/0x38 (C)
[   17.703440]  dump_stack_lvl+0x8c/0xd0
[   17.703512]  print_report+0x118/0x5d0
[   17.703807]  kasan_report+0xdc/0x128
[   17.704114]  kasan_check_range+0x100/0x1a8
[   17.704236]  __kasan_check_write+0x20/0x30
[   17.704629]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   17.704803]  kasan_bitops_generic+0x110/0x1c8
[   17.704856]  kunit_try_run_case+0x170/0x3f0
[   17.705329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.705396]  kthread+0x328/0x630
[   17.705441]  ret_from_fork+0x10/0x20
[   17.705955] 
[   17.706051] Allocated by task 261:
[   17.706155]  kasan_save_stack+0x3c/0x68
[   17.706493]  kasan_save_track+0x20/0x40
[   17.706538]  kasan_save_alloc_info+0x40/0x58
[   17.706947]  __kasan_kmalloc+0xd4/0xd8
[   17.707051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.707103]  kasan_bitops_generic+0xa0/0x1c8
[   17.707232]  kunit_try_run_case+0x170/0x3f0
[   17.707276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.707320]  kthread+0x328/0x630
[   17.707660]  ret_from_fork+0x10/0x20
[   17.707783] 
[   17.707833] The buggy address belongs to the object at fff00000c3fc6220
[   17.707833]  which belongs to the cache kmalloc-16 of size 16
[   17.707967] The buggy address is located 8 bytes inside of
[   17.707967]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.708563] 
[   17.708591] The buggy address belongs to the physical page:
[   17.708793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.709128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.709227] page_type: f5(slab)
[   17.709336] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.709620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.709879] page dumped because: kasan: bad access detected
[   17.709969] 
[   17.710071] Memory state around the buggy address:
[   17.710411]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.710464]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.710579] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.710679]                                   ^
[   17.710714]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.711179]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.711320] ==================================================================
[   17.662436] ==================================================================
[   17.662765] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   17.663143] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.663490] 
[   17.663528] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.663931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.664039] Hardware name: linux,dummy-virt (DT)
[   17.664654] Call trace:
[   17.664807]  show_stack+0x20/0x38 (C)
[   17.664912]  dump_stack_lvl+0x8c/0xd0
[   17.664959]  print_report+0x118/0x5d0
[   17.665007]  kasan_report+0xdc/0x128
[   17.665053]  kasan_check_range+0x100/0x1a8
[   17.665103]  __kasan_check_write+0x20/0x30
[   17.665516]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   17.666200]  kasan_bitops_generic+0x110/0x1c8
[   17.666462]  kunit_try_run_case+0x170/0x3f0
[   17.666964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.667143]  kthread+0x328/0x630
[   17.667267]  ret_from_fork+0x10/0x20
[   17.667427] 
[   17.667786] Allocated by task 261:
[   17.667835]  kasan_save_stack+0x3c/0x68
[   17.667972]  kasan_save_track+0x20/0x40
[   17.668121]  kasan_save_alloc_info+0x40/0x58
[   17.668169]  __kasan_kmalloc+0xd4/0xd8
[   17.668780]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.668830]  kasan_bitops_generic+0xa0/0x1c8
[   17.669275]  kunit_try_run_case+0x170/0x3f0
[   17.669582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.670029]  kthread+0x328/0x630
[   17.670266]  ret_from_fork+0x10/0x20
[   17.670433] 
[   17.671090] The buggy address belongs to the object at fff00000c3fc6220
[   17.671090]  which belongs to the cache kmalloc-16 of size 16
[   17.671221] The buggy address is located 8 bytes inside of
[   17.671221]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.671287] 
[   17.671335] The buggy address belongs to the physical page:
[   17.671658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.671730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.671781] page_type: f5(slab)
[   17.671822] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.672267] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.672322] page dumped because: kasan: bad access detected
[   17.672760] 
[   17.672830] Memory state around the buggy address:
[   17.673169]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.673319]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.673638] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.673947]                                   ^
[   17.674081]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.674132]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.674457] ==================================================================
[   17.712446] ==================================================================
[   17.712499] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   17.712554] Read of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.712609] 
[   17.714017] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.714326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.714359] Hardware name: linux,dummy-virt (DT)
[   17.714395] Call trace:
[   17.714421]  show_stack+0x20/0x38 (C)
[   17.714475]  dump_stack_lvl+0x8c/0xd0
[   17.714523]  print_report+0x118/0x5d0
[   17.715613]  kasan_report+0xdc/0x128
[   17.715718]  __asan_report_load8_noabort+0x20/0x30
[   17.715912]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   17.716197]  kasan_bitops_generic+0x110/0x1c8
[   17.716515]  kunit_try_run_case+0x170/0x3f0
[   17.717049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.717555]  kthread+0x328/0x630
[   17.717918]  ret_from_fork+0x10/0x20
[   17.718033] 
[   17.718056] Allocated by task 261:
[   17.718564]  kasan_save_stack+0x3c/0x68
[   17.719080]  kasan_save_track+0x20/0x40
[   17.719152]  kasan_save_alloc_info+0x40/0x58
[   17.719349]  __kasan_kmalloc+0xd4/0xd8
[   17.719629]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.719814]  kasan_bitops_generic+0xa0/0x1c8
[   17.720076]  kunit_try_run_case+0x170/0x3f0
[   17.720132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.720647]  kthread+0x328/0x630
[   17.720709]  ret_from_fork+0x10/0x20
[   17.720746] 
[   17.720768] The buggy address belongs to the object at fff00000c3fc6220
[   17.720768]  which belongs to the cache kmalloc-16 of size 16
[   17.721154] The buggy address is located 8 bytes inside of
[   17.721154]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.721452] 
[   17.721607] The buggy address belongs to the physical page:
[   17.721646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.722090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.722457] page_type: f5(slab)
[   17.722520] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.722736] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.722783] page dumped because: kasan: bad access detected
[   17.723237] 
[   17.723264] Memory state around the buggy address:
[   17.723646]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.723712]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.724571] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.724689]                                   ^
[   17.724732]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.724780]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.725504] ==================================================================
[   17.633100] ==================================================================
[   17.633171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   17.633233] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.634754] 
[   17.634822] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.635031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.635061] Hardware name: linux,dummy-virt (DT)
[   17.635094] Call trace:
[   17.635156]  show_stack+0x20/0x38 (C)
[   17.635674]  dump_stack_lvl+0x8c/0xd0
[   17.635745]  print_report+0x118/0x5d0
[   17.635919]  kasan_report+0xdc/0x128
[   17.635969]  kasan_check_range+0x100/0x1a8
[   17.636213]  __kasan_check_write+0x20/0x30
[   17.636599]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   17.636897]  kasan_bitops_generic+0x110/0x1c8
[   17.637379]  kunit_try_run_case+0x170/0x3f0
[   17.637552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.638061]  kthread+0x328/0x630
[   17.638135]  ret_from_fork+0x10/0x20
[   17.638630] 
[   17.638795] Allocated by task 261:
[   17.639112]  kasan_save_stack+0x3c/0x68
[   17.639172]  kasan_save_track+0x20/0x40
[   17.639283]  kasan_save_alloc_info+0x40/0x58
[   17.639449]  __kasan_kmalloc+0xd4/0xd8
[   17.639726]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.639792]  kasan_bitops_generic+0xa0/0x1c8
[   17.639834]  kunit_try_run_case+0x170/0x3f0
[   17.640223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.640300]  kthread+0x328/0x630
[   17.640336]  ret_from_fork+0x10/0x20
[   17.640806] 
[   17.640833] The buggy address belongs to the object at fff00000c3fc6220
[   17.640833]  which belongs to the cache kmalloc-16 of size 16
[   17.640989] The buggy address is located 8 bytes inside of
[   17.640989]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.641450] 
[   17.641623] The buggy address belongs to the physical page:
[   17.641961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.642127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.642610] page_type: f5(slab)
[   17.642858] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.643065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.643294] page dumped because: kasan: bad access detected
[   17.643544] 
[   17.643728] Memory state around the buggy address:
[   17.644223]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.644475]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.644710] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.644751]                                   ^
[   17.645047]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.645440]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.645489] ==================================================================
[   17.739559] ==================================================================
[   17.739612] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   17.739753] Read of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.739817] 
[   17.739862] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.740107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.740241] Hardware name: linux,dummy-virt (DT)
[   17.740296] Call trace:
[   17.740320]  show_stack+0x20/0x38 (C)
[   17.740478]  dump_stack_lvl+0x8c/0xd0
[   17.740590]  print_report+0x118/0x5d0
[   17.740641]  kasan_report+0xdc/0x128
[   17.740702]  __asan_report_load8_noabort+0x20/0x30
[   17.740754]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   17.740809]  kasan_bitops_generic+0x110/0x1c8
[   17.740858]  kunit_try_run_case+0x170/0x3f0
[   17.740916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.740973]  kthread+0x328/0x630
[   17.741027]  ret_from_fork+0x10/0x20
[   17.741078] 
[   17.741098] Allocated by task 261:
[   17.741129]  kasan_save_stack+0x3c/0x68
[   17.741170]  kasan_save_track+0x20/0x40
[   17.741215]  kasan_save_alloc_info+0x40/0x58
[   17.741257]  __kasan_kmalloc+0xd4/0xd8
[   17.741295]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.741349]  kasan_bitops_generic+0xa0/0x1c8
[   17.741391]  kunit_try_run_case+0x170/0x3f0
[   17.741436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.741480]  kthread+0x328/0x630
[   17.741515]  ret_from_fork+0x10/0x20
[   17.741551] 
[   17.741581] The buggy address belongs to the object at fff00000c3fc6220
[   17.741581]  which belongs to the cache kmalloc-16 of size 16
[   17.741651] The buggy address is located 8 bytes inside of
[   17.741651]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.742217] 
[   17.742393] The buggy address belongs to the physical page:
[   17.742494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.742555] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.742632] page_type: f5(slab)
[   17.742937] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.743212] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.743267] page dumped because: kasan: bad access detected
[   17.743328] 
[   17.743514] Memory state around the buggy address:
[   17.743654]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.743895]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.744080] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.744232]                                   ^
[   17.744395]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.744758]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.745554] ==================================================================
[   17.651642] ==================================================================
[   17.651724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   17.652035] Read of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.652166] 
[   17.652203] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.652557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.652864] Hardware name: linux,dummy-virt (DT)
[   17.652904] Call trace:
[   17.652968]  show_stack+0x20/0x38 (C)
[   17.653368]  dump_stack_lvl+0x8c/0xd0
[   17.653648]  print_report+0x118/0x5d0
[   17.654007]  kasan_report+0xdc/0x128
[   17.654120]  __asan_report_load8_noabort+0x20/0x30
[   17.654369]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   17.654605]  kasan_bitops_generic+0x110/0x1c8
[   17.654766]  kunit_try_run_case+0x170/0x3f0
[   17.654816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.654871]  kthread+0x328/0x630
[   17.654914]  ret_from_fork+0x10/0x20
[   17.655494] 
[   17.655531] Allocated by task 261:
[   17.655616]  kasan_save_stack+0x3c/0x68
[   17.655675]  kasan_save_track+0x20/0x40
[   17.655839]  kasan_save_alloc_info+0x40/0x58
[   17.655945]  __kasan_kmalloc+0xd4/0xd8
[   17.656307]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.656357]  kasan_bitops_generic+0xa0/0x1c8
[   17.656890]  kunit_try_run_case+0x170/0x3f0
[   17.656944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.657162]  kthread+0x328/0x630
[   17.657316]  ret_from_fork+0x10/0x20
[   17.657723] 
[   17.657885] The buggy address belongs to the object at fff00000c3fc6220
[   17.657885]  which belongs to the cache kmalloc-16 of size 16
[   17.658018] The buggy address is located 8 bytes inside of
[   17.658018]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.658084] 
[   17.658687] The buggy address belongs to the physical page:
[   17.658878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.658940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.658996] page_type: f5(slab)
[   17.659737] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.659799] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.659925] page dumped because: kasan: bad access detected
[   17.659989] 
[   17.660038] Memory state around the buggy address:
[   17.660141]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.660420]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.660472] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.660511]                                   ^
[   17.660546]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.660589]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.660632] ==================================================================
[   17.675765] ==================================================================
[   17.677014] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   17.677099] Read of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.677198] 
[   17.677234] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.677316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.677347] Hardware name: linux,dummy-virt (DT)
[   17.677381] Call trace:
[   17.677405]  show_stack+0x20/0x38 (C)
[   17.677455]  dump_stack_lvl+0x8c/0xd0
[   17.677504]  print_report+0x118/0x5d0
[   17.677552]  kasan_report+0xdc/0x128
[   17.677601]  __asan_report_load8_noabort+0x20/0x30
[   17.677654]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   17.678054]  kasan_bitops_generic+0x110/0x1c8
[   17.678434]  kunit_try_run_case+0x170/0x3f0
[   17.678489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.678791]  kthread+0x328/0x630
[   17.678917]  ret_from_fork+0x10/0x20
[   17.679240] 
[   17.679311] Allocated by task 261:
[   17.679345]  kasan_save_stack+0x3c/0x68
[   17.679392]  kasan_save_track+0x20/0x40
[   17.679430]  kasan_save_alloc_info+0x40/0x58
[   17.680135]  __kasan_kmalloc+0xd4/0xd8
[   17.680199]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.680581]  kasan_bitops_generic+0xa0/0x1c8
[   17.680638]  kunit_try_run_case+0x170/0x3f0
[   17.680946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.680996]  kthread+0x328/0x630
[   17.681054]  ret_from_fork+0x10/0x20
[   17.681469] 
[   17.681495] The buggy address belongs to the object at fff00000c3fc6220
[   17.681495]  which belongs to the cache kmalloc-16 of size 16
[   17.681997] The buggy address is located 8 bytes inside of
[   17.681997]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.682214] 
[   17.682241] The buggy address belongs to the physical page:
[   17.682568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.682916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.683113] page_type: f5(slab)
[   17.683228] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.683290] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.683747] page dumped because: kasan: bad access detected
[   17.683791] 
[   17.683820] Memory state around the buggy address:
[   17.684201]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.684551]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.685052] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.685492]                                   ^
[   17.685672]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.685768]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.686230] ==================================================================
[   17.687843] ==================================================================
[   17.688797] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   17.688902] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.688979] 
[   17.689108] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.689559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.689765] Hardware name: linux,dummy-virt (DT)
[   17.690117] Call trace:
[   17.690154]  show_stack+0x20/0x38 (C)
[   17.690209]  dump_stack_lvl+0x8c/0xd0
[   17.690257]  print_report+0x118/0x5d0
[   17.690306]  kasan_report+0xdc/0x128
[   17.690352]  kasan_check_range+0x100/0x1a8
[   17.691178]  __kasan_check_write+0x20/0x30
[   17.691283]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   17.691410]  kasan_bitops_generic+0x110/0x1c8
[   17.691583]  kunit_try_run_case+0x170/0x3f0
[   17.691631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.692286]  kthread+0x328/0x630
[   17.692388]  ret_from_fork+0x10/0x20
[   17.692593] 
[   17.692896] Allocated by task 261:
[   17.692934]  kasan_save_stack+0x3c/0x68
[   17.693306]  kasan_save_track+0x20/0x40
[   17.693398]  kasan_save_alloc_info+0x40/0x58
[   17.693443]  __kasan_kmalloc+0xd4/0xd8
[   17.693725]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.694075]  kasan_bitops_generic+0xa0/0x1c8
[   17.694164]  kunit_try_run_case+0x170/0x3f0
[   17.694620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.694772]  kthread+0x328/0x630
[   17.694810]  ret_from_fork+0x10/0x20
[   17.695136] 
[   17.695160] The buggy address belongs to the object at fff00000c3fc6220
[   17.695160]  which belongs to the cache kmalloc-16 of size 16
[   17.695221] The buggy address is located 8 bytes inside of
[   17.695221]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.695285] 
[   17.695308] The buggy address belongs to the physical page:
[   17.695813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.696155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.696522] page_type: f5(slab)
[   17.696738] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.697114] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.697261] page dumped because: kasan: bad access detected
[   17.697558] 
[   17.697581] Memory state around the buggy address:
[   17.697948]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.698156]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.698214] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.698639]                                   ^
[   17.698843]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.698913]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.699265] ==================================================================
[   17.732274] ==================================================================
[   17.732329] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   17.732390] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261
[   17.732441] 
[   17.732472] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.732553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.732581] Hardware name: linux,dummy-virt (DT)
[   17.732614] Call trace:
[   17.732638]  show_stack+0x20/0x38 (C)
[   17.732702]  dump_stack_lvl+0x8c/0xd0
[   17.732750]  print_report+0x118/0x5d0
[   17.733393]  kasan_report+0xdc/0x128
[   17.733483]  kasan_check_range+0x100/0x1a8
[   17.733620]  __kasan_check_write+0x20/0x30
[   17.733684]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   17.733737]  kasan_bitops_generic+0x110/0x1c8
[   17.733836]  kunit_try_run_case+0x170/0x3f0
[   17.733924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.734021]  kthread+0x328/0x630
[   17.734091]  ret_from_fork+0x10/0x20
[   17.734202] 
[   17.734227] Allocated by task 261:
[   17.734261]  kasan_save_stack+0x3c/0x68
[   17.734469]  kasan_save_track+0x20/0x40
[   17.734622]  kasan_save_alloc_info+0x40/0x58
[   17.734686]  __kasan_kmalloc+0xd4/0xd8
[   17.734726]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.734866]  kasan_bitops_generic+0xa0/0x1c8
[   17.734918]  kunit_try_run_case+0x170/0x3f0
[   17.734959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.735014]  kthread+0x328/0x630
[   17.735048]  ret_from_fork+0x10/0x20
[   17.735087] 
[   17.735109] The buggy address belongs to the object at fff00000c3fc6220
[   17.735109]  which belongs to the cache kmalloc-16 of size 16
[   17.735353] The buggy address is located 8 bytes inside of
[   17.735353]  allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229)
[   17.736233] 
[   17.736313] The buggy address belongs to the physical page:
[   17.736433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6
[   17.736589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.737003] page_type: f5(slab)
[   17.737056] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.737276] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.737478] page dumped because: kasan: bad access detected
[   17.737577] 
[   17.737696] Memory state around the buggy address:
[   17.737752]  fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.737830]  fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.738218] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.738290]                                   ^
[   17.738429]  fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.738522]  fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.738652] ==================================================================

[   14.376415] ==================================================================
[   14.376748] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.377145] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.377899] 
[   14.378029] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.378089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.378101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.378121] Call Trace:
[   14.378137]  <TASK>
[   14.378152]  dump_stack_lvl+0x73/0xb0
[   14.378181]  print_report+0xd1/0x610
[   14.378203]  ? __virt_addr_valid+0x1db/0x2d0
[   14.378224]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.378248]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.378270]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.378294]  kasan_report+0x141/0x180
[   14.378317]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.378347]  kasan_check_range+0x10c/0x1c0
[   14.378369]  __kasan_check_write+0x18/0x20
[   14.378388]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.378412]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.378437]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.378460]  ? trace_hardirqs_on+0x37/0xe0
[   14.378480]  ? kasan_bitops_generic+0x92/0x1c0
[   14.378507]  kasan_bitops_generic+0x116/0x1c0
[   14.378529]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.378555]  ? __pfx_read_tsc+0x10/0x10
[   14.378575]  ? ktime_get_ts64+0x86/0x230
[   14.378598]  kunit_try_run_case+0x1a5/0x480
[   14.378621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.378642]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.378664]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.378686]  ? __kthread_parkme+0x82/0x180
[   14.378705]  ? preempt_count_sub+0x50/0x80
[   14.378727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.378750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.378772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.378807]  kthread+0x337/0x6f0
[   14.378826]  ? trace_preempt_on+0x20/0xc0
[   14.378847]  ? __pfx_kthread+0x10/0x10
[   14.378866]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.378887]  ? calculate_sigpending+0x7b/0xa0
[   14.378919]  ? __pfx_kthread+0x10/0x10
[   14.378940]  ret_from_fork+0x116/0x1d0
[   14.378957]  ? __pfx_kthread+0x10/0x10
[   14.378977]  ret_from_fork_asm+0x1a/0x30
[   14.379006]  </TASK>
[   14.379016] 
[   14.390679] Allocated by task 279:
[   14.391083]  kasan_save_stack+0x45/0x70
[   14.391383]  kasan_save_track+0x18/0x40
[   14.391863]  kasan_save_alloc_info+0x3b/0x50
[   14.392222]  __kasan_kmalloc+0xb7/0xc0
[   14.392664]  __kmalloc_cache_noprof+0x189/0x420
[   14.392866]  kasan_bitops_generic+0x92/0x1c0
[   14.393095]  kunit_try_run_case+0x1a5/0x480
[   14.393288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.393850]  kthread+0x337/0x6f0
[   14.394166]  ret_from_fork+0x116/0x1d0
[   14.394351]  ret_from_fork_asm+0x1a/0x30
[   14.394771] 
[   14.394861] The buggy address belongs to the object at ffff888100fffac0
[   14.394861]  which belongs to the cache kmalloc-16 of size 16
[   14.395341] The buggy address is located 8 bytes inside of
[   14.395341]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.396322] 
[   14.396755] The buggy address belongs to the physical page:
[   14.397014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.397527] flags: 0x200000000000000(node=0|zone=2)
[   14.397893] page_type: f5(slab)
[   14.398176] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.398639] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.399153] page dumped because: kasan: bad access detected
[   14.399664] 
[   14.399854] Memory state around the buggy address:
[   14.400069]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.400735]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.401025] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.401470]                                               ^
[   14.401858]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.402316]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.402800] ==================================================================
[   14.321124] ==================================================================
[   14.322236] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.322514] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.322740] 
[   14.322826] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.322870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.322881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.322901] Call Trace:
[   14.322957]  <TASK>
[   14.322972]  dump_stack_lvl+0x73/0xb0
[   14.323026]  print_report+0xd1/0x610
[   14.323047]  ? __virt_addr_valid+0x1db/0x2d0
[   14.323075]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.323099]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.323162]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.323189]  kasan_report+0x141/0x180
[   14.323210]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.323239]  kasan_check_range+0x10c/0x1c0
[   14.323262]  __kasan_check_write+0x18/0x20
[   14.323280]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.323305]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.323403]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.323427]  ? trace_hardirqs_on+0x37/0xe0
[   14.323448]  ? kasan_bitops_generic+0x92/0x1c0
[   14.323503]  kasan_bitops_generic+0x116/0x1c0
[   14.323526]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.323550]  ? __pfx_read_tsc+0x10/0x10
[   14.323570]  ? ktime_get_ts64+0x86/0x230
[   14.323594]  kunit_try_run_case+0x1a5/0x480
[   14.323619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.323642]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.323671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.323733]  ? __kthread_parkme+0x82/0x180
[   14.323777]  ? preempt_count_sub+0x50/0x80
[   14.323801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.323823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.323846]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.323868]  kthread+0x337/0x6f0
[   14.323888]  ? trace_preempt_on+0x20/0xc0
[   14.323920]  ? __pfx_kthread+0x10/0x10
[   14.323940]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.323960]  ? calculate_sigpending+0x7b/0xa0
[   14.323983]  ? __pfx_kthread+0x10/0x10
[   14.324004]  ret_from_fork+0x116/0x1d0
[   14.324021]  ? __pfx_kthread+0x10/0x10
[   14.324040]  ret_from_fork_asm+0x1a/0x30
[   14.324070]  </TASK>
[   14.324080] 
[   14.334229] Allocated by task 279:
[   14.334501]  kasan_save_stack+0x45/0x70
[   14.334674]  kasan_save_track+0x18/0x40
[   14.334892]  kasan_save_alloc_info+0x3b/0x50
[   14.335068]  __kasan_kmalloc+0xb7/0xc0
[   14.335259]  __kmalloc_cache_noprof+0x189/0x420
[   14.335547]  kasan_bitops_generic+0x92/0x1c0
[   14.335756]  kunit_try_run_case+0x1a5/0x480
[   14.335913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.336087]  kthread+0x337/0x6f0
[   14.336207]  ret_from_fork+0x116/0x1d0
[   14.336426]  ret_from_fork_asm+0x1a/0x30
[   14.336624] 
[   14.336738] The buggy address belongs to the object at ffff888100fffac0
[   14.336738]  which belongs to the cache kmalloc-16 of size 16
[   14.337268] The buggy address is located 8 bytes inside of
[   14.337268]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.337883] 
[   14.337993] The buggy address belongs to the physical page:
[   14.338213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.338603] flags: 0x200000000000000(node=0|zone=2)
[   14.338794] page_type: f5(slab)
[   14.338976] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.339325] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.339762] page dumped because: kasan: bad access detected
[   14.339989] 
[   14.340060] Memory state around the buggy address:
[   14.340283]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.340663]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.340983] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.341271]                                               ^
[   14.341551]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.341793]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.342014] ==================================================================
[   14.403802] ==================================================================
[   14.404123] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.405009] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.405626] 
[   14.405751] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.405895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.405921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.405942] Call Trace:
[   14.405957]  <TASK>
[   14.405971]  dump_stack_lvl+0x73/0xb0
[   14.405999]  print_report+0xd1/0x610
[   14.406021]  ? __virt_addr_valid+0x1db/0x2d0
[   14.406042]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.406067]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.406088]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.406112]  kasan_report+0x141/0x180
[   14.406133]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.406163]  kasan_check_range+0x10c/0x1c0
[   14.406185]  __kasan_check_write+0x18/0x20
[   14.406203]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.406228]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.406253]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.406276]  ? trace_hardirqs_on+0x37/0xe0
[   14.406297]  ? kasan_bitops_generic+0x92/0x1c0
[   14.406323]  kasan_bitops_generic+0x116/0x1c0
[   14.406407]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.406433]  ? __pfx_read_tsc+0x10/0x10
[   14.406453]  ? ktime_get_ts64+0x86/0x230
[   14.406476]  kunit_try_run_case+0x1a5/0x480
[   14.406498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.406520]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.406543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.406565]  ? __kthread_parkme+0x82/0x180
[   14.406584]  ? preempt_count_sub+0x50/0x80
[   14.406606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.406629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.406651]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.406673]  kthread+0x337/0x6f0
[   14.406692]  ? trace_preempt_on+0x20/0xc0
[   14.406712]  ? __pfx_kthread+0x10/0x10
[   14.406732]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.406752]  ? calculate_sigpending+0x7b/0xa0
[   14.406774]  ? __pfx_kthread+0x10/0x10
[   14.406795]  ret_from_fork+0x116/0x1d0
[   14.406811]  ? __pfx_kthread+0x10/0x10
[   14.406831]  ret_from_fork_asm+0x1a/0x30
[   14.406861]  </TASK>
[   14.406871] 
[   14.419975] Allocated by task 279:
[   14.420361]  kasan_save_stack+0x45/0x70
[   14.420870]  kasan_save_track+0x18/0x40
[   14.421197]  kasan_save_alloc_info+0x3b/0x50
[   14.421589]  __kasan_kmalloc+0xb7/0xc0
[   14.421812]  __kmalloc_cache_noprof+0x189/0x420
[   14.422035]  kasan_bitops_generic+0x92/0x1c0
[   14.422260]  kunit_try_run_case+0x1a5/0x480
[   14.422902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.423163]  kthread+0x337/0x6f0
[   14.423519]  ret_from_fork+0x116/0x1d0
[   14.423892]  ret_from_fork_asm+0x1a/0x30
[   14.424204] 
[   14.424307] The buggy address belongs to the object at ffff888100fffac0
[   14.424307]  which belongs to the cache kmalloc-16 of size 16
[   14.425133] The buggy address is located 8 bytes inside of
[   14.425133]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.425955] 
[   14.426220] The buggy address belongs to the physical page:
[   14.426540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.427145] flags: 0x200000000000000(node=0|zone=2)
[   14.427649] page_type: f5(slab)
[   14.427841] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.428230] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.428866] page dumped because: kasan: bad access detected
[   14.429186] 
[   14.429262] Memory state around the buggy address:
[   14.429623]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.430130]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.430660] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.431043]                                               ^
[   14.431402]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.431715]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.432339] ==================================================================
[   14.473468] ==================================================================
[   14.473827] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.474097] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.474502] 
[   14.474620] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.474662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.474674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.474694] Call Trace:
[   14.474708]  <TASK>
[   14.474723]  dump_stack_lvl+0x73/0xb0
[   14.474749]  print_report+0xd1/0x610
[   14.474772]  ? __virt_addr_valid+0x1db/0x2d0
[   14.474794]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.474818]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.474840]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.474865]  kasan_report+0x141/0x180
[   14.474887]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.474928]  kasan_check_range+0x10c/0x1c0
[   14.474951]  __kasan_check_write+0x18/0x20
[   14.474970]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.474995]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.475020]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.475043]  ? trace_hardirqs_on+0x37/0xe0
[   14.475067]  ? kasan_bitops_generic+0x92/0x1c0
[   14.475093]  kasan_bitops_generic+0x116/0x1c0
[   14.475116]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.475139]  ? __pfx_read_tsc+0x10/0x10
[   14.475158]  ? ktime_get_ts64+0x86/0x230
[   14.475181]  kunit_try_run_case+0x1a5/0x480
[   14.475203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.475224]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.475246]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.475268]  ? __kthread_parkme+0x82/0x180
[   14.475287]  ? preempt_count_sub+0x50/0x80
[   14.475309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.475332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.475353]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.475423]  kthread+0x337/0x6f0
[   14.475446]  ? trace_preempt_on+0x20/0xc0
[   14.475467]  ? __pfx_kthread+0x10/0x10
[   14.475486]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.475506]  ? calculate_sigpending+0x7b/0xa0
[   14.475528]  ? __pfx_kthread+0x10/0x10
[   14.475548]  ret_from_fork+0x116/0x1d0
[   14.475566]  ? __pfx_kthread+0x10/0x10
[   14.475585]  ret_from_fork_asm+0x1a/0x30
[   14.475615]  </TASK>
[   14.475625] 
[   14.484289] Allocated by task 279:
[   14.484421]  kasan_save_stack+0x45/0x70
[   14.484567]  kasan_save_track+0x18/0x40
[   14.484701]  kasan_save_alloc_info+0x3b/0x50
[   14.484848]  __kasan_kmalloc+0xb7/0xc0
[   14.486277]  __kmalloc_cache_noprof+0x189/0x420
[   14.486876]  kasan_bitops_generic+0x92/0x1c0
[   14.487812]  kunit_try_run_case+0x1a5/0x480
[   14.488834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.489729]  kthread+0x337/0x6f0
[   14.490181]  ret_from_fork+0x116/0x1d0
[   14.491069]  ret_from_fork_asm+0x1a/0x30
[   14.491676] 
[   14.492046] The buggy address belongs to the object at ffff888100fffac0
[   14.492046]  which belongs to the cache kmalloc-16 of size 16
[   14.493215] The buggy address is located 8 bytes inside of
[   14.493215]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.493583] 
[   14.493656] The buggy address belongs to the physical page:
[   14.494306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.495262] flags: 0x200000000000000(node=0|zone=2)
[   14.495863] page_type: f5(slab)
[   14.496214] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.497160] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.497960] page dumped because: kasan: bad access detected
[   14.498139] 
[   14.498207] Memory state around the buggy address:
[   14.498410]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.499241]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.500027] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.500918]                                               ^
[   14.501465]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.501980]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.502198] ==================================================================
[   14.453427] ==================================================================
[   14.453702] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.454081] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.454405] 
[   14.454508] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.454550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.454560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.454580] Call Trace:
[   14.454595]  <TASK>
[   14.454609]  dump_stack_lvl+0x73/0xb0
[   14.454634]  print_report+0xd1/0x610
[   14.454656]  ? __virt_addr_valid+0x1db/0x2d0
[   14.454677]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.454706]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.454728]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.454753]  kasan_report+0x141/0x180
[   14.454773]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.454804]  kasan_check_range+0x10c/0x1c0
[   14.454826]  __kasan_check_write+0x18/0x20
[   14.455036]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.455076]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.455103]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.455126]  ? trace_hardirqs_on+0x37/0xe0
[   14.455146]  ? kasan_bitops_generic+0x92/0x1c0
[   14.455172]  kasan_bitops_generic+0x116/0x1c0
[   14.455195]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.455219]  ? __pfx_read_tsc+0x10/0x10
[   14.455238]  ? ktime_get_ts64+0x86/0x230
[   14.455261]  kunit_try_run_case+0x1a5/0x480
[   14.455285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.455306]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.455328]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.455351]  ? __kthread_parkme+0x82/0x180
[   14.455429]  ? preempt_count_sub+0x50/0x80
[   14.455452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.455474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.455497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.455519]  kthread+0x337/0x6f0
[   14.455537]  ? trace_preempt_on+0x20/0xc0
[   14.455558]  ? __pfx_kthread+0x10/0x10
[   14.455577]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.455597]  ? calculate_sigpending+0x7b/0xa0
[   14.455619]  ? __pfx_kthread+0x10/0x10
[   14.455639]  ret_from_fork+0x116/0x1d0
[   14.455656]  ? __pfx_kthread+0x10/0x10
[   14.455675]  ret_from_fork_asm+0x1a/0x30
[   14.455704]  </TASK>
[   14.455713] 
[   14.464201] Allocated by task 279:
[   14.464444]  kasan_save_stack+0x45/0x70
[   14.464622]  kasan_save_track+0x18/0x40
[   14.464844]  kasan_save_alloc_info+0x3b/0x50
[   14.465006]  __kasan_kmalloc+0xb7/0xc0
[   14.465136]  __kmalloc_cache_noprof+0x189/0x420
[   14.465290]  kasan_bitops_generic+0x92/0x1c0
[   14.465437]  kunit_try_run_case+0x1a5/0x480
[   14.465581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.465756]  kthread+0x337/0x6f0
[   14.465876]  ret_from_fork+0x116/0x1d0
[   14.466216]  ret_from_fork_asm+0x1a/0x30
[   14.466539] 
[   14.466639] The buggy address belongs to the object at ffff888100fffac0
[   14.466639]  which belongs to the cache kmalloc-16 of size 16
[   14.467386] The buggy address is located 8 bytes inside of
[   14.467386]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.468516] 
[   14.468627] The buggy address belongs to the physical page:
[   14.468996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.469247] flags: 0x200000000000000(node=0|zone=2)
[   14.469557] page_type: f5(slab)
[   14.469728] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.470169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.470470] page dumped because: kasan: bad access detected
[   14.470684] 
[   14.470836] Memory state around the buggy address:
[   14.471031]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.471308]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.471703] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.472018]                                               ^
[   14.472197]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.472460]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.472780] ==================================================================
[   14.502618] ==================================================================
[   14.503092] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.503396] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.504326] 
[   14.504520] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.504562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.504574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.504594] Call Trace:
[   14.504607]  <TASK>
[   14.504621]  dump_stack_lvl+0x73/0xb0
[   14.504648]  print_report+0xd1/0x610
[   14.504669]  ? __virt_addr_valid+0x1db/0x2d0
[   14.504690]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.504714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.504735]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.504760]  kasan_report+0x141/0x180
[   14.504781]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.504810]  kasan_check_range+0x10c/0x1c0
[   14.504831]  __kasan_check_write+0x18/0x20
[   14.504849]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.504873]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.504919]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.504942]  ? trace_hardirqs_on+0x37/0xe0
[   14.504962]  ? kasan_bitops_generic+0x92/0x1c0
[   14.505000]  kasan_bitops_generic+0x116/0x1c0
[   14.505021]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.505045]  ? __pfx_read_tsc+0x10/0x10
[   14.505065]  ? ktime_get_ts64+0x86/0x230
[   14.505088]  kunit_try_run_case+0x1a5/0x480
[   14.505112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.505133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.505155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.505177]  ? __kthread_parkme+0x82/0x180
[   14.505206]  ? preempt_count_sub+0x50/0x80
[   14.505228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.505251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.505283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.505306]  kthread+0x337/0x6f0
[   14.505324]  ? trace_preempt_on+0x20/0xc0
[   14.505344]  ? __pfx_kthread+0x10/0x10
[   14.505372]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.505393]  ? calculate_sigpending+0x7b/0xa0
[   14.505415]  ? __pfx_kthread+0x10/0x10
[   14.505444]  ret_from_fork+0x116/0x1d0
[   14.505462]  ? __pfx_kthread+0x10/0x10
[   14.505482]  ret_from_fork_asm+0x1a/0x30
[   14.505521]  </TASK>
[   14.505530] 
[   14.520769] Allocated by task 279:
[   14.521106]  kasan_save_stack+0x45/0x70
[   14.521585]  kasan_save_track+0x18/0x40
[   14.521979]  kasan_save_alloc_info+0x3b/0x50
[   14.522496]  __kasan_kmalloc+0xb7/0xc0
[   14.522932]  __kmalloc_cache_noprof+0x189/0x420
[   14.523265]  kasan_bitops_generic+0x92/0x1c0
[   14.523713]  kunit_try_run_case+0x1a5/0x480
[   14.523927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.524422]  kthread+0x337/0x6f0
[   14.524693]  ret_from_fork+0x116/0x1d0
[   14.525023]  ret_from_fork_asm+0x1a/0x30
[   14.525356] 
[   14.525427] The buggy address belongs to the object at ffff888100fffac0
[   14.525427]  which belongs to the cache kmalloc-16 of size 16
[   14.525858] The buggy address is located 8 bytes inside of
[   14.525858]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.526792] 
[   14.526987] The buggy address belongs to the physical page:
[   14.527489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.528225] flags: 0x200000000000000(node=0|zone=2)
[   14.528395] page_type: f5(slab)
[   14.528514] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.529258] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.530062] page dumped because: kasan: bad access detected
[   14.530641] 
[   14.530820] Memory state around the buggy address:
[   14.531349]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.531885]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.532410] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.532749]                                               ^
[   14.533287]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.533605]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.534289] ==================================================================
[   14.344343] ==================================================================
[   14.346296] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.347737] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.348095] 
[   14.348187] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.348231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.348243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.348263] Call Trace:
[   14.348274]  <TASK>
[   14.348288]  dump_stack_lvl+0x73/0xb0
[   14.348315]  print_report+0xd1/0x610
[   14.348336]  ? __virt_addr_valid+0x1db/0x2d0
[   14.348662]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.348690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.348711]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.348736]  kasan_report+0x141/0x180
[   14.348758]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.348787]  kasan_check_range+0x10c/0x1c0
[   14.348809]  __kasan_check_write+0x18/0x20
[   14.348827]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.348852]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.348877]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.348900]  ? trace_hardirqs_on+0x37/0xe0
[   14.348937]  ? kasan_bitops_generic+0x92/0x1c0
[   14.348964]  kasan_bitops_generic+0x116/0x1c0
[   14.348986]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.349010]  ? __pfx_read_tsc+0x10/0x10
[   14.349029]  ? ktime_get_ts64+0x86/0x230
[   14.349052]  kunit_try_run_case+0x1a5/0x480
[   14.349074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.349096]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.349118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.349140]  ? __kthread_parkme+0x82/0x180
[   14.349159]  ? preempt_count_sub+0x50/0x80
[   14.349181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.349204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.349226]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.349249]  kthread+0x337/0x6f0
[   14.349270]  ? trace_preempt_on+0x20/0xc0
[   14.349294]  ? __pfx_kthread+0x10/0x10
[   14.349316]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.349337]  ? calculate_sigpending+0x7b/0xa0
[   14.349415]  ? __pfx_kthread+0x10/0x10
[   14.349436]  ret_from_fork+0x116/0x1d0
[   14.349454]  ? __pfx_kthread+0x10/0x10
[   14.349473]  ret_from_fork_asm+0x1a/0x30
[   14.349503]  </TASK>
[   14.349512] 
[   14.362066] Allocated by task 279:
[   14.362553]  kasan_save_stack+0x45/0x70
[   14.362788]  kasan_save_track+0x18/0x40
[   14.363260]  kasan_save_alloc_info+0x3b/0x50
[   14.363822]  __kasan_kmalloc+0xb7/0xc0
[   14.364038]  __kmalloc_cache_noprof+0x189/0x420
[   14.364316]  kasan_bitops_generic+0x92/0x1c0
[   14.364745]  kunit_try_run_case+0x1a5/0x480
[   14.365107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.365353]  kthread+0x337/0x6f0
[   14.365502]  ret_from_fork+0x116/0x1d0
[   14.366020]  ret_from_fork_asm+0x1a/0x30
[   14.366215] 
[   14.366288] The buggy address belongs to the object at ffff888100fffac0
[   14.366288]  which belongs to the cache kmalloc-16 of size 16
[   14.367239] The buggy address is located 8 bytes inside of
[   14.367239]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.368208] 
[   14.368304] The buggy address belongs to the physical page:
[   14.368861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.369379] flags: 0x200000000000000(node=0|zone=2)
[   14.369709] page_type: f5(slab)
[   14.370048] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.370564] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.370993] page dumped because: kasan: bad access detected
[   14.371332] 
[   14.371450] Memory state around the buggy address:
[   14.371940]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.372348]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.373071] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.373380]                                               ^
[   14.373614]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.374172]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.374621] ==================================================================
[   14.433266] ==================================================================
[   14.434030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.434370] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279
[   14.434815] 
[   14.435049] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.435097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.435110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.435133] Call Trace:
[   14.435144]  <TASK>
[   14.435159]  dump_stack_lvl+0x73/0xb0
[   14.435186]  print_report+0xd1/0x610
[   14.435208]  ? __virt_addr_valid+0x1db/0x2d0
[   14.435229]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.435253]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.435274]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.435299]  kasan_report+0x141/0x180
[   14.435319]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.435349]  kasan_check_range+0x10c/0x1c0
[   14.435371]  __kasan_check_write+0x18/0x20
[   14.435389]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.435414]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.435439]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.435462]  ? trace_hardirqs_on+0x37/0xe0
[   14.435483]  ? kasan_bitops_generic+0x92/0x1c0
[   14.435509]  kasan_bitops_generic+0x116/0x1c0
[   14.435531]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.435555]  ? __pfx_read_tsc+0x10/0x10
[   14.435574]  ? ktime_get_ts64+0x86/0x230
[   14.435597]  kunit_try_run_case+0x1a5/0x480
[   14.435619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.435640]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.435663]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.435687]  ? __kthread_parkme+0x82/0x180
[   14.435705]  ? preempt_count_sub+0x50/0x80
[   14.435728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.435751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.435773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.435795]  kthread+0x337/0x6f0
[   14.435814]  ? trace_preempt_on+0x20/0xc0
[   14.435834]  ? __pfx_kthread+0x10/0x10
[   14.435854]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.435875]  ? calculate_sigpending+0x7b/0xa0
[   14.435897]  ? __pfx_kthread+0x10/0x10
[   14.435984]  ret_from_fork+0x116/0x1d0
[   14.436003]  ? __pfx_kthread+0x10/0x10
[   14.436022]  ret_from_fork_asm+0x1a/0x30
[   14.436052]  </TASK>
[   14.436061] 
[   14.444864] Allocated by task 279:
[   14.445063]  kasan_save_stack+0x45/0x70
[   14.445225]  kasan_save_track+0x18/0x40
[   14.445504]  kasan_save_alloc_info+0x3b/0x50
[   14.445753]  __kasan_kmalloc+0xb7/0xc0
[   14.445926]  __kmalloc_cache_noprof+0x189/0x420
[   14.446109]  kasan_bitops_generic+0x92/0x1c0
[   14.446310]  kunit_try_run_case+0x1a5/0x480
[   14.446582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.446817]  kthread+0x337/0x6f0
[   14.446998]  ret_from_fork+0x116/0x1d0
[   14.447153]  ret_from_fork_asm+0x1a/0x30
[   14.447288] 
[   14.447356] The buggy address belongs to the object at ffff888100fffac0
[   14.447356]  which belongs to the cache kmalloc-16 of size 16
[   14.447696] The buggy address is located 8 bytes inside of
[   14.447696]  allocated 9-byte region [ffff888100fffac0, ffff888100fffac9)
[   14.448183] 
[   14.448275] The buggy address belongs to the physical page:
[   14.448701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff
[   14.449053] flags: 0x200000000000000(node=0|zone=2)
[   14.449240] page_type: f5(slab)
[   14.449355] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.449577] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.450344] page dumped because: kasan: bad access detected
[   14.450650] 
[   14.450837] Memory state around the buggy address:
[   14.451079]  ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   14.451346]  ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   14.451653] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.451996]                                               ^
[   14.452190]  ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.452617]  ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.453073] ==================================================================