Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.114808] ==================================================================
[   18.114862] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.114944] Read of size 8 at addr fff00000c5809588 by task kunit_try_catch/262
[   18.114996] 
[   18.115116] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.115331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.115411] Hardware name: linux,dummy-virt (DT)
[   18.115714] Call trace:
[   18.115768]  show_stack+0x20/0x38 (C)
[   18.116024]  dump_stack_lvl+0x8c/0xd0
[   18.116078]  print_report+0x118/0x5d0
[   18.116155]  kasan_report+0xdc/0x128
[   18.116212]  __asan_report_load8_noabort+0x20/0x30
[   18.116266]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.116320]  kasan_bitops_generic+0x110/0x1c8
[   18.116368]  kunit_try_run_case+0x170/0x3f0
[   18.116453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.116708]  kthread+0x328/0x630
[   18.116807]  ret_from_fork+0x10/0x20
[   18.116860] 
[   18.116879] Allocated by task 262:
[   18.116927]  kasan_save_stack+0x3c/0x68
[   18.116969]  kasan_save_track+0x20/0x40
[   18.117109]  kasan_save_alloc_info+0x40/0x58
[   18.117334]  __kasan_kmalloc+0xd4/0xd8
[   18.117441]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.117562]  kasan_bitops_generic+0xa0/0x1c8
[   18.117639]  kunit_try_run_case+0x170/0x3f0
[   18.117916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.119049] page_type: f5(slab)
[   18.121845] Write of size 8 at addr fff00000c5809588 by task kunit_try_catch/262
[   18.123016]  kunit_try_run_case+0x170/0x3f0
[   18.123715]  kasan_bitops_generic+0xa0/0x1c8
[   18.124259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.124785] page dumped because: kasan: bad access detected
[   18.126042] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   18.128162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.129340] page dumped because: kasan: bad access detected
[   18.134113] 
[   18.135140]  kasan_check_range+0x100/0x1a8
[   18.137171]  kasan_bitops_generic+0xa0/0x1c8
[   18.138220] page_type: f5(slab)
[   18.138356] page dumped because: kasan: bad access detected
[   18.140017] ==================================================================
[   18.110062] ==================================================================
[   18.110127] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.110182] Write of size 8 at addr fff00000c5809588 by task kunit_try_catch/262
[   18.110259] 
[   18.110291] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.110376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.110405] Hardware name: linux,dummy-virt (DT)
[   18.110437] Call trace:
[   18.110462]  show_stack+0x20/0x38 (C)
[   18.110512]  dump_stack_lvl+0x8c/0xd0
[   18.110712]  print_report+0x118/0x5d0
[   18.110801]  kasan_report+0xdc/0x128
[   18.110851]  kasan_check_range+0x100/0x1a8
[   18.110918]  __kasan_check_write+0x20/0x30
[   18.111000]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.111055]  kasan_bitops_generic+0x110/0x1c8
[   18.111325]  kunit_try_run_case+0x170/0x3f0
[   18.111386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.111440]  kthread+0x328/0x630
[   18.111567]  ret_from_fork+0x10/0x20
[   18.111635] 
[   18.111679] Allocated by task 262:
[   18.111757]  kasan_save_stack+0x3c/0x68
[   18.111802]  kasan_save_track+0x20/0x40
[   18.111878]  kasan_save_alloc_info+0x40/0x58
[   18.111940]  __kasan_kmalloc+0xd4/0xd8
[   18.111978]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.112026]  kasan_bitops_generic+0xa0/0x1c8
[   18.112093]  kunit_try_run_case+0x170/0x3f0
[   18.112133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.112237]  kthread+0x328/0x630
[   18.112274]  ret_from_fork+0x10/0x20
[   18.112618] 
[   18.112683] The buggy address belongs to the object at fff00000c5809580
[   18.112683]  which belongs to the cache kmalloc-16 of size 16
[   18.112841] The buggy address is located 8 bytes inside of
[   18.112841]  allocated 9-byte region [fff00000c5809580, fff00000c5809589)
[   18.112959] 
[   18.113007] The buggy address belongs to the physical page:
[   18.113122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809
[   18.113209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.113260] page_type: f5(slab)
[   18.113310] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.113363] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.113429] page dumped because: kasan: bad access detected
[   18.113464] 
[   18.113483] Memory state around the buggy address:
[   18.113517]  fff00000c5809480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.113563]  fff00000c5809500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.113608] >fff00000c5809580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.113649]                       ^
[   18.113679]  fff00000c5809600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.113723]  fff00000c5809680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.113764] ==================================================================

[   19.011345] ==================================================================
[   19.011438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.011512] Write of size 8 at addr fff00000c44abae8 by task kunit_try_catch/262
[   19.011568] 
[   19.011610] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.011699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.011727] Hardware name: linux,dummy-virt (DT)
[   19.011761] Call trace:
[   19.011792]  show_stack+0x20/0x38 (C)
[   19.011844]  dump_stack_lvl+0x8c/0xd0
[   19.011894]  print_report+0x118/0x5d0
[   19.011940]  kasan_report+0xdc/0x128
[   19.022479]  kasan_check_range+0x100/0x1a8
[   19.023056]  __kasan_check_write+0x20/0x30
[   19.024587]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.024663]  kasan_bitops_generic+0x110/0x1c8
[   19.024714]  kunit_try_run_case+0x170/0x3f0
[   19.025478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.026126]  kthread+0x328/0x630
[   19.026330]  ret_from_fork+0x10/0x20
[   19.026888] 
[   19.027231] Allocated by task 262:
[   19.029143]  kasan_save_stack+0x3c/0x68
[   19.029417]  kasan_save_track+0x20/0x40
[   19.029797]  kasan_save_alloc_info+0x40/0x58
[   19.029949]  __kasan_kmalloc+0xd4/0xd8
[   19.032653]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.033096]  kasan_bitops_generic+0xa0/0x1c8
[   19.033514]  kunit_try_run_case+0x170/0x3f0
[   19.033576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.033778]  kthread+0x328/0x630
[   19.033910]  ret_from_fork+0x10/0x20
[   19.034795] 
[   19.034937] The buggy address belongs to the object at fff00000c44abae0
[   19.034937]  which belongs to the cache kmalloc-16 of size 16
[   19.035151] The buggy address is located 8 bytes inside of
[   19.035151]  allocated 9-byte region [fff00000c44abae0, fff00000c44abae9)
[   19.035230] 
[   19.035256] The buggy address belongs to the physical page:
[   19.035295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044ab
[   19.035356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.035762] page_type: f5(slab)
[   19.035810] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.035864] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.037316] page dumped because: kasan: bad access detected
[   19.037924] 
[   19.038168] Memory state around the buggy address:
[   19.038478]  fff00000c44ab980: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.039360]  fff00000c44aba00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.040093] >fff00000c44aba80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.040149]                                                           ^
[   19.040403]  fff00000c44abb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.044386]  fff00000c44abb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.044658] ==================================================================
[   19.046294] ==================================================================
[   19.046407] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.046610] Read of size 8 at addr fff00000c44abae8 by task kunit_try_catch/262
[   19.047026] 
[   19.047463] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.047975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.048008] Hardware name: linux,dummy-virt (DT)
[   19.048225] Call trace:
[   19.048253]  show_stack+0x20/0x38 (C)
[   19.048323]  dump_stack_lvl+0x8c/0xd0
[   19.048372]  print_report+0x118/0x5d0
[   19.048826]  kasan_report+0xdc/0x128
[   19.049431]  __asan_report_load8_noabort+0x20/0x30
[   19.049501]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.051221]  kasan_bitops_generic+0x110/0x1c8
[   19.051307]  kunit_try_run_case+0x170/0x3f0
[   19.051497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.052011]  kthread+0x328/0x630
[   19.052577]  ret_from_fork+0x10/0x20
[   19.053326] 
[   19.053362] Allocated by task 262:
[   19.053463]  kasan_save_stack+0x3c/0x68
[   19.053780]  kasan_save_track+0x20/0x40
[   19.055126]  kasan_save_alloc_info+0x40/0x58
[   19.055193]  __kasan_kmalloc+0xd4/0xd8
[   19.055776]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.055832]  kasan_bitops_generic+0xa0/0x1c8
[   19.056066]  kunit_try_run_case+0x170/0x3f0
[   19.056350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.056649]  kthread+0x328/0x630
[   19.056894]  ret_from_fork+0x10/0x20
[   19.056940] 
[   19.059874] The buggy address belongs to the object at fff00000c44abae0
[   19.059874]  which belongs to the cache kmalloc-16 of size 16
[   19.059962] The buggy address is located 8 bytes inside of
[   19.059962]  allocated 9-byte region [fff00000c44abae0, fff00000c44abae9)
[   19.060030] 
[   19.060052] The buggy address belongs to the physical page:
[   19.060110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044ab
[   19.060203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.060511] page_type: f5(slab)
[   19.060684] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.060799] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.060846] page dumped because: kasan: bad access detected
[   19.060892] 
[   19.060914] Memory state around the buggy address:
[   19.061211]  fff00000c44ab980: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.062193]  fff00000c44aba00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.062252] >fff00000c44aba80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.063232]                                                           ^
[   19.063332]  fff00000c44abb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.063579]  fff00000c44abb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.063623] ==================================================================
[   19.067435] ==================================================================
[   19.067617] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.067691] Write of size 8 at addr fff00000c44abae8 by task kunit_try_catch/262
[   19.067847] 
[   19.067925] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.068335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.068677] Hardware name: linux,dummy-virt (DT)
[   19.068714] Call trace:
[   19.069144]  show_stack+0x20/0x38 (C)
[   19.069651]  dump_stack_lvl+0x8c/0xd0
[   19.069990]  print_report+0x118/0x5d0
[   19.071293]  kasan_report+0xdc/0x128
[   19.071344]  kasan_check_range+0x100/0x1a8
[   19.071406]  __kasan_check_write+0x20/0x30
[   19.071949]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.072011]  kasan_bitops_generic+0x110/0x1c8
[   19.072061]  kunit_try_run_case+0x170/0x3f0
[   19.072110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.072163]  kthread+0x328/0x630
[   19.072279]  ret_from_fork+0x10/0x20
[   19.072513] 
[   19.072554] Allocated by task 262:
[   19.072585]  kasan_save_stack+0x3c/0x68
[   19.074074]  kasan_save_track+0x20/0x40
[   19.074171]  kasan_save_alloc_info+0x40/0x58
[   19.074238]  __kasan_kmalloc+0xd4/0xd8
[   19.074277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.074333]  kasan_bitops_generic+0xa0/0x1c8
[   19.074379]  kunit_try_run_case+0x170/0x3f0
[   19.074420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.074474]  kthread+0x328/0x630
[   19.074667] The buggy address is located 8 bytes inside of
[   19.074667]  allocated 9-byte region [fff00000c44abae0, fff00000c44abae9)
[   19.075466] ==================================================================

[   14.826844] ==================================================================
[   14.827135] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.827592] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.828035] 
[   14.828176] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.828247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.828261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.828288] Call Trace:
[   14.828315]  <TASK>
[   14.828329]  dump_stack_lvl+0x73/0xb0
[   14.828359]  print_report+0xd1/0x610
[   14.828382]  ? __virt_addr_valid+0x1db/0x2d0
[   14.828423]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.828458]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.828482]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.828536]  kasan_report+0x141/0x180
[   14.828572]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.828603]  kasan_check_range+0x10c/0x1c0
[   14.828627]  __kasan_check_write+0x18/0x20
[   14.828647]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.828675]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.828706]  ? ret_from_fork_asm+0x1a/0x30
[   14.828729]  ? kthread+0x337/0x6f0
[   14.828753]  kasan_bitops_generic+0x116/0x1c0
[   14.828777]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.828805]  ? __pfx_read_tsc+0x10/0x10
[   14.828826]  ? ktime_get_ts64+0x86/0x230
[   14.828850]  kunit_try_run_case+0x1a5/0x480
[   14.828874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.828897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.828922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.828947]  ? __kthread_parkme+0x82/0x180
[   14.828968]  ? preempt_count_sub+0x50/0x80
[   14.828992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.829041]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.829067]  kthread+0x337/0x6f0
[   14.829086]  ? trace_preempt_on+0x20/0xc0
[   14.829109]  ? __pfx_kthread+0x10/0x10
[   14.829130]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.829151]  ? calculate_sigpending+0x7b/0xa0
[   14.829176]  ? __pfx_kthread+0x10/0x10
[   14.829197]  ret_from_fork+0x116/0x1d0
[   14.829216]  ? __pfx_kthread+0x10/0x10
[   14.829236]  ret_from_fork_asm+0x1a/0x30
[   14.829267]  </TASK>
[   14.829277] 
[   14.839291] Allocated by task 279:
[   14.839642]  kasan_save_stack+0x45/0x70
[   14.839883]  kasan_save_track+0x18/0x40
[   14.840066]  kasan_save_alloc_info+0x3b/0x50
[   14.840324]  __kasan_kmalloc+0xb7/0xc0
[   14.840698]  __kmalloc_cache_noprof+0x189/0x420
[   14.840924]  kasan_bitops_generic+0x92/0x1c0
[   14.841148]  kunit_try_run_case+0x1a5/0x480
[   14.841348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.841752]  kthread+0x337/0x6f0
[   14.841925]  ret_from_fork+0x116/0x1d0
[   14.842110]  ret_from_fork_asm+0x1a/0x30
[   14.842307] 
[   14.842419] The buggy address belongs to the object at ffff888102676240
[   14.842419]  which belongs to the cache kmalloc-16 of size 16
[   14.843252] The buggy address is located 8 bytes inside of
[   14.843252]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.843952] 
[   14.844068] The buggy address belongs to the physical page:
[   14.844322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.844836] flags: 0x200000000000000(node=0|zone=2)
[   14.845076] page_type: f5(slab)
[   14.845254] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.845765] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.846108] page dumped because: kasan: bad access detected
[   14.846373] 
[   14.846494] Memory state around the buggy address:
[   14.846758]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.847088]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.847746] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.848109]                                               ^
[   14.848350]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.848885]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.849169] ==================================================================
[   14.728381] ==================================================================
[   14.729209] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.730213] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.731106] 
[   14.731341] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.731389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.731401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.731441] Call Trace:
[   14.731470]  <TASK>
[   14.731488]  dump_stack_lvl+0x73/0xb0
[   14.731519]  print_report+0xd1/0x610
[   14.731542]  ? __virt_addr_valid+0x1db/0x2d0
[   14.731566]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.731697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.731725]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.731753]  kasan_report+0x141/0x180
[   14.731776]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.731807]  kasan_check_range+0x10c/0x1c0
[   14.731832]  __kasan_check_write+0x18/0x20
[   14.731853]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.731881]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.731910]  ? ret_from_fork_asm+0x1a/0x30
[   14.731933]  ? kthread+0x337/0x6f0
[   14.731958]  kasan_bitops_generic+0x116/0x1c0
[   14.731982]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.732008]  ? __pfx_read_tsc+0x10/0x10
[   14.732030]  ? ktime_get_ts64+0x86/0x230
[   14.732054]  kunit_try_run_case+0x1a5/0x480
[   14.732079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.732103]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.732128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.732152]  ? __kthread_parkme+0x82/0x180
[   14.732173]  ? preempt_count_sub+0x50/0x80
[   14.732197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.732222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.732247]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.732274]  kthread+0x337/0x6f0
[   14.732296]  ? trace_preempt_on+0x20/0xc0
[   14.732321]  ? __pfx_kthread+0x10/0x10
[   14.732341]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.732363]  ? calculate_sigpending+0x7b/0xa0
[   14.732421]  ? __pfx_kthread+0x10/0x10
[   14.732444]  ret_from_fork+0x116/0x1d0
[   14.732606]  ? __pfx_kthread+0x10/0x10
[   14.732630]  ret_from_fork_asm+0x1a/0x30
[   14.732676]  </TASK>
[   14.732686] 
[   14.747801] Allocated by task 279:
[   14.747935]  kasan_save_stack+0x45/0x70
[   14.748082]  kasan_save_track+0x18/0x40
[   14.748214]  kasan_save_alloc_info+0x3b/0x50
[   14.748367]  __kasan_kmalloc+0xb7/0xc0
[   14.748729]  __kmalloc_cache_noprof+0x189/0x420
[   14.749367]  kasan_bitops_generic+0x92/0x1c0
[   14.749959]  kunit_try_run_case+0x1a5/0x480
[   14.750389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.751101]  kthread+0x337/0x6f0
[   14.751620]  ret_from_fork+0x116/0x1d0
[   14.752011]  ret_from_fork_asm+0x1a/0x30
[   14.752405] 
[   14.752675] The buggy address belongs to the object at ffff888102676240
[   14.752675]  which belongs to the cache kmalloc-16 of size 16
[   14.753591] The buggy address is located 8 bytes inside of
[   14.753591]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.754253] 
[   14.754333] The buggy address belongs to the physical page:
[   14.754554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.754948] flags: 0x200000000000000(node=0|zone=2)
[   14.755435] page_type: f5(slab)
[   14.755756] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.755983] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.756201] page dumped because: kasan: bad access detected
[   14.756370] 
[   14.756493] Memory state around the buggy address:
[   14.756991]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.757992]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.758723] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.759355]                                               ^
[   14.759992]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.760678]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.761083] ==================================================================
[   14.761487] ==================================================================
[   14.762135] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.763206] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.764008] 
[   14.764199] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.764244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.764256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.764277] Call Trace:
[   14.764296]  <TASK>
[   14.764312]  dump_stack_lvl+0x73/0xb0
[   14.764341]  print_report+0xd1/0x610
[   14.764363]  ? __virt_addr_valid+0x1db/0x2d0
[   14.764386]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.764441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.764476]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.764504]  kasan_report+0x141/0x180
[   14.764538]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.764570]  kasan_check_range+0x10c/0x1c0
[   14.764594]  __kasan_check_write+0x18/0x20
[   14.764613]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.764651]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.764682]  ? ret_from_fork_asm+0x1a/0x30
[   14.764704]  ? kthread+0x337/0x6f0
[   14.764728]  kasan_bitops_generic+0x116/0x1c0
[   14.764752]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.764778]  ? __pfx_read_tsc+0x10/0x10
[   14.764800]  ? ktime_get_ts64+0x86/0x230
[   14.764825]  kunit_try_run_case+0x1a5/0x480
[   14.764850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.764873]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.764898]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.764923]  ? __kthread_parkme+0x82/0x180
[   14.764943]  ? preempt_count_sub+0x50/0x80
[   14.764967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.764992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.765016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.765043]  kthread+0x337/0x6f0
[   14.765062]  ? trace_preempt_on+0x20/0xc0
[   14.765086]  ? __pfx_kthread+0x10/0x10
[   14.765107]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.765129]  ? calculate_sigpending+0x7b/0xa0
[   14.765153]  ? __pfx_kthread+0x10/0x10
[   14.765175]  ret_from_fork+0x116/0x1d0
[   14.765194]  ? __pfx_kthread+0x10/0x10
[   14.765215]  ret_from_fork_asm+0x1a/0x30
[   14.765247]  </TASK>
[   14.765256] 
[   14.780921] Allocated by task 279:
[   14.781287]  kasan_save_stack+0x45/0x70
[   14.781763]  kasan_save_track+0x18/0x40
[   14.782222]  kasan_save_alloc_info+0x3b/0x50
[   14.782712]  __kasan_kmalloc+0xb7/0xc0
[   14.783018]  __kmalloc_cache_noprof+0x189/0x420
[   14.783545]  kasan_bitops_generic+0x92/0x1c0
[   14.783799]  kunit_try_run_case+0x1a5/0x480
[   14.784217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.784779]  kthread+0x337/0x6f0
[   14.784941]  ret_from_fork+0x116/0x1d0
[   14.785128]  ret_from_fork_asm+0x1a/0x30
[   14.785601] 
[   14.785765] The buggy address belongs to the object at ffff888102676240
[   14.785765]  which belongs to the cache kmalloc-16 of size 16
[   14.786723] The buggy address is located 8 bytes inside of
[   14.786723]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.787635] 
[   14.787862] The buggy address belongs to the physical page:
[   14.788383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.789059] flags: 0x200000000000000(node=0|zone=2)
[   14.789273] page_type: f5(slab)
[   14.789393] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.790233] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.791061] page dumped because: kasan: bad access detected
[   14.791408] 
[   14.791498] Memory state around the buggy address:
[   14.791730]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.792387]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.793035] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.793536]                                               ^
[   14.794095]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.794464]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.795178] ==================================================================
[   14.671650] ==================================================================
[   14.671968] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.672252] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.672910] 
[   14.673027] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.673071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.673083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.673104] Call Trace:
[   14.673119]  <TASK>
[   14.673135]  dump_stack_lvl+0x73/0xb0
[   14.673165]  print_report+0xd1/0x610
[   14.673188]  ? __virt_addr_valid+0x1db/0x2d0
[   14.673212]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.673240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.673266]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.673293]  kasan_report+0x141/0x180
[   14.673316]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.673349]  kasan_check_range+0x10c/0x1c0
[   14.673373]  __kasan_check_write+0x18/0x20
[   14.673393]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.673432]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.673477]  ? ret_from_fork_asm+0x1a/0x30
[   14.673500]  ? kthread+0x337/0x6f0
[   14.673524]  kasan_bitops_generic+0x116/0x1c0
[   14.673549]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.673811]  ? __pfx_read_tsc+0x10/0x10
[   14.673834]  ? ktime_get_ts64+0x86/0x230
[   14.673861]  kunit_try_run_case+0x1a5/0x480
[   14.673887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.673912]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.673938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.673964]  ? __kthread_parkme+0x82/0x180
[   14.673985]  ? preempt_count_sub+0x50/0x80
[   14.674010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.674035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.674061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.674088]  kthread+0x337/0x6f0
[   14.674107]  ? trace_preempt_on+0x20/0xc0
[   14.674131]  ? __pfx_kthread+0x10/0x10
[   14.674152]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.674174]  ? calculate_sigpending+0x7b/0xa0
[   14.674200]  ? __pfx_kthread+0x10/0x10
[   14.674222]  ret_from_fork+0x116/0x1d0
[   14.674241]  ? __pfx_kthread+0x10/0x10
[   14.674262]  ret_from_fork_asm+0x1a/0x30
[   14.674293]  </TASK>
[   14.674303] 
[   14.683016] Allocated by task 279:
[   14.683198]  kasan_save_stack+0x45/0x70
[   14.683400]  kasan_save_track+0x18/0x40
[   14.683667]  kasan_save_alloc_info+0x3b/0x50
[   14.683835]  __kasan_kmalloc+0xb7/0xc0
[   14.684017]  __kmalloc_cache_noprof+0x189/0x420
[   14.684173]  kasan_bitops_generic+0x92/0x1c0
[   14.684346]  kunit_try_run_case+0x1a5/0x480
[   14.684869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.685141]  kthread+0x337/0x6f0
[   14.685304]  ret_from_fork+0x116/0x1d0
[   14.685527]  ret_from_fork_asm+0x1a/0x30
[   14.685775] 
[   14.685867] The buggy address belongs to the object at ffff888102676240
[   14.685867]  which belongs to the cache kmalloc-16 of size 16
[   14.686338] The buggy address is located 8 bytes inside of
[   14.686338]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.686922] 
[   14.687020] The buggy address belongs to the physical page:
[   14.687240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.687634] flags: 0x200000000000000(node=0|zone=2)
[   14.687935] page_type: f5(slab)
[   14.688089] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.688405] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.688757] page dumped because: kasan: bad access detected
[   14.688928] 
[   14.688998] Memory state around the buggy address:
[   14.689150]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.689505]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.690264] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.690698]                                               ^
[   14.690960]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.691174]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.691383] ==================================================================
[   14.651695] ==================================================================
[   14.652129] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.652496] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.652769] 
[   14.652911] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.652958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.652970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.652993] Call Trace:
[   14.653005]  <TASK>
[   14.653023]  dump_stack_lvl+0x73/0xb0
[   14.653055]  print_report+0xd1/0x610
[   14.653078]  ? __virt_addr_valid+0x1db/0x2d0
[   14.653103]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.653131]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.653156]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.653183]  kasan_report+0x141/0x180
[   14.653205]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.653237]  kasan_check_range+0x10c/0x1c0
[   14.653262]  __kasan_check_write+0x18/0x20
[   14.653282]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.653310]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.653339]  ? ret_from_fork_asm+0x1a/0x30
[   14.653363]  ? kthread+0x337/0x6f0
[   14.653389]  kasan_bitops_generic+0x116/0x1c0
[   14.653413]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.653439]  ? __pfx_read_tsc+0x10/0x10
[   14.653474]  ? ktime_get_ts64+0x86/0x230
[   14.653500]  kunit_try_run_case+0x1a5/0x480
[   14.653527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.653552]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.653578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.653604]  ? __kthread_parkme+0x82/0x180
[   14.653627]  ? preempt_count_sub+0x50/0x80
[   14.653653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.653694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.653719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.653748]  kthread+0x337/0x6f0
[   14.653767]  ? trace_preempt_on+0x20/0xc0
[   14.653793]  ? __pfx_kthread+0x10/0x10
[   14.653815]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.653837]  ? calculate_sigpending+0x7b/0xa0
[   14.653863]  ? __pfx_kthread+0x10/0x10
[   14.653884]  ret_from_fork+0x116/0x1d0
[   14.653903]  ? __pfx_kthread+0x10/0x10
[   14.653924]  ret_from_fork_asm+0x1a/0x30
[   14.653955]  </TASK>
[   14.653966] 
[   14.662270] Allocated by task 279:
[   14.662417]  kasan_save_stack+0x45/0x70
[   14.662651]  kasan_save_track+0x18/0x40
[   14.662786]  kasan_save_alloc_info+0x3b/0x50
[   14.662935]  __kasan_kmalloc+0xb7/0xc0
[   14.663111]  __kmalloc_cache_noprof+0x189/0x420
[   14.663331]  kasan_bitops_generic+0x92/0x1c0
[   14.663613]  kunit_try_run_case+0x1a5/0x480
[   14.663761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.664323]  kthread+0x337/0x6f0
[   14.664588]  ret_from_fork+0x116/0x1d0
[   14.665145]  ret_from_fork_asm+0x1a/0x30
[   14.665289] 
[   14.665363] The buggy address belongs to the object at ffff888102676240
[   14.665363]  which belongs to the cache kmalloc-16 of size 16
[   14.665729] The buggy address is located 8 bytes inside of
[   14.665729]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.666575] 
[   14.666672] The buggy address belongs to the physical page:
[   14.666926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.667279] flags: 0x200000000000000(node=0|zone=2)
[   14.667497] page_type: f5(slab)
[   14.667633] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.668180] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.668686] page dumped because: kasan: bad access detected
[   14.668868] 
[   14.668937] Memory state around the buggy address:
[   14.669094]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.669332]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.669943] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.670273]                                               ^
[   14.670548]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.670831]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.671111] ==================================================================
[   14.795907] ==================================================================
[   14.796145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.796407] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.796842] 
[   14.797164] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.797212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.797224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.797245] Call Trace:
[   14.797260]  <TASK>
[   14.797275]  dump_stack_lvl+0x73/0xb0
[   14.797305]  print_report+0xd1/0x610
[   14.797328]  ? __virt_addr_valid+0x1db/0x2d0
[   14.797350]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.797378]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.797401]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.797467]  kasan_report+0x141/0x180
[   14.797490]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.797533]  kasan_check_range+0x10c/0x1c0
[   14.797557]  __kasan_check_write+0x18/0x20
[   14.797577]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.797605]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.797634]  ? ret_from_fork_asm+0x1a/0x30
[   14.797657]  ? kthread+0x337/0x6f0
[   14.797681]  kasan_bitops_generic+0x116/0x1c0
[   14.797705]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.797852]  ? __pfx_read_tsc+0x10/0x10
[   14.797881]  ? ktime_get_ts64+0x86/0x230
[   14.797907]  kunit_try_run_case+0x1a5/0x480
[   14.797957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.797981]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.798007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.798032]  ? __kthread_parkme+0x82/0x180
[   14.798053]  ? preempt_count_sub+0x50/0x80
[   14.798077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.798102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.798128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.798154]  kthread+0x337/0x6f0
[   14.798173]  ? trace_preempt_on+0x20/0xc0
[   14.798196]  ? __pfx_kthread+0x10/0x10
[   14.798216]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.798238]  ? calculate_sigpending+0x7b/0xa0
[   14.798263]  ? __pfx_kthread+0x10/0x10
[   14.798285]  ret_from_fork+0x116/0x1d0
[   14.798303]  ? __pfx_kthread+0x10/0x10
[   14.798323]  ret_from_fork_asm+0x1a/0x30
[   14.798354]  </TASK>
[   14.798364] 
[   14.813777] Allocated by task 279:
[   14.813912]  kasan_save_stack+0x45/0x70
[   14.814054]  kasan_save_track+0x18/0x40
[   14.814186]  kasan_save_alloc_info+0x3b/0x50
[   14.814330]  __kasan_kmalloc+0xb7/0xc0
[   14.814516]  __kmalloc_cache_noprof+0x189/0x420
[   14.815026]  kasan_bitops_generic+0x92/0x1c0
[   14.815550]  kunit_try_run_case+0x1a5/0x480
[   14.816039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.816758]  kthread+0x337/0x6f0
[   14.817172]  ret_from_fork+0x116/0x1d0
[   14.817575]  ret_from_fork_asm+0x1a/0x30
[   14.818091] 
[   14.818286] The buggy address belongs to the object at ffff888102676240
[   14.818286]  which belongs to the cache kmalloc-16 of size 16
[   14.819296] The buggy address is located 8 bytes inside of
[   14.819296]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.820383] 
[   14.820581] The buggy address belongs to the physical page:
[   14.821133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.821692] flags: 0x200000000000000(node=0|zone=2)
[   14.822138] page_type: f5(slab)
[   14.822373] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.823002] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.823233] page dumped because: kasan: bad access detected
[   14.823402] 
[   14.823489] Memory state around the buggy address:
[   14.823738]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.824164]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.824406] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.825003]                                               ^
[   14.825320]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.825726]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.826205] ==================================================================
[   14.849840] ==================================================================
[   14.850133] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.850576] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.851110] 
[   14.851229] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.851306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.851318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.851339] Call Trace:
[   14.851354]  <TASK>
[   14.851379]  dump_stack_lvl+0x73/0xb0
[   14.851427]  print_report+0xd1/0x610
[   14.851458]  ? __virt_addr_valid+0x1db/0x2d0
[   14.851482]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.851509]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.851534]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.851567]  kasan_report+0x141/0x180
[   14.851590]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.851622]  kasan_check_range+0x10c/0x1c0
[   14.851645]  __kasan_check_write+0x18/0x20
[   14.851665]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.851693]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.851722]  ? ret_from_fork_asm+0x1a/0x30
[   14.851745]  ? kthread+0x337/0x6f0
[   14.851768]  kasan_bitops_generic+0x116/0x1c0
[   14.851792]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.851818]  ? __pfx_read_tsc+0x10/0x10
[   14.851839]  ? ktime_get_ts64+0x86/0x230
[   14.851862]  kunit_try_run_case+0x1a5/0x480
[   14.851887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.851910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.851935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.851959]  ? __kthread_parkme+0x82/0x180
[   14.851979]  ? preempt_count_sub+0x50/0x80
[   14.852003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.852028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.852054]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.852079]  kthread+0x337/0x6f0
[   14.852099]  ? trace_preempt_on+0x20/0xc0
[   14.852122]  ? __pfx_kthread+0x10/0x10
[   14.852143]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.852165]  ? calculate_sigpending+0x7b/0xa0
[   14.852189]  ? __pfx_kthread+0x10/0x10
[   14.852211]  ret_from_fork+0x116/0x1d0
[   14.852230]  ? __pfx_kthread+0x10/0x10
[   14.852251]  ret_from_fork_asm+0x1a/0x30
[   14.852286]  </TASK>
[   14.852296] 
[   14.861241] Allocated by task 279:
[   14.861465]  kasan_save_stack+0x45/0x70
[   14.861773]  kasan_save_track+0x18/0x40
[   14.861963]  kasan_save_alloc_info+0x3b/0x50
[   14.862141]  __kasan_kmalloc+0xb7/0xc0
[   14.862274]  __kmalloc_cache_noprof+0x189/0x420
[   14.862463]  kasan_bitops_generic+0x92/0x1c0
[   14.862769]  kunit_try_run_case+0x1a5/0x480
[   14.862985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.863239]  kthread+0x337/0x6f0
[   14.863672]  ret_from_fork+0x116/0x1d0
[   14.863909]  ret_from_fork_asm+0x1a/0x30
[   14.864071] 
[   14.864142] The buggy address belongs to the object at ffff888102676240
[   14.864142]  which belongs to the cache kmalloc-16 of size 16
[   14.864776] The buggy address is located 8 bytes inside of
[   14.864776]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.865365] 
[   14.865489] The buggy address belongs to the physical page:
[   14.865781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.866086] flags: 0x200000000000000(node=0|zone=2)
[   14.866336] page_type: f5(slab)
[   14.866732] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.867077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.867387] page dumped because: kasan: bad access detected
[   14.867740] 
[   14.867815] Memory state around the buggy address:
[   14.867987]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.868346]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.868792] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.869106]                                               ^
[   14.869362]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.869792]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.870045] ==================================================================
[   14.691934] ==================================================================
[   14.692393] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.692771] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.693198] 
[   14.693289] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.693332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.693343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.693364] Call Trace:
[   14.693380]  <TASK>
[   14.693395]  dump_stack_lvl+0x73/0xb0
[   14.693427]  print_report+0xd1/0x610
[   14.693464]  ? __virt_addr_valid+0x1db/0x2d0
[   14.693488]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.693515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.693540]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.693567]  kasan_report+0x141/0x180
[   14.693590]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.693622]  kasan_check_range+0x10c/0x1c0
[   14.693646]  __kasan_check_write+0x18/0x20
[   14.693666]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.693694]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.693724]  ? ret_from_fork_asm+0x1a/0x30
[   14.693748]  ? kthread+0x337/0x6f0
[   14.693772]  kasan_bitops_generic+0x116/0x1c0
[   14.693797]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.693824]  ? __pfx_read_tsc+0x10/0x10
[   14.693846]  ? ktime_get_ts64+0x86/0x230
[   14.693871]  kunit_try_run_case+0x1a5/0x480
[   14.693896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.693921]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.693945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.693970]  ? __kthread_parkme+0x82/0x180
[   14.693992]  ? preempt_count_sub+0x50/0x80
[   14.694016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.694041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.694066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.694092]  kthread+0x337/0x6f0
[   14.694112]  ? trace_preempt_on+0x20/0xc0
[   14.694136]  ? __pfx_kthread+0x10/0x10
[   14.694157]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.694179]  ? calculate_sigpending+0x7b/0xa0
[   14.694204]  ? __pfx_kthread+0x10/0x10
[   14.694226]  ret_from_fork+0x116/0x1d0
[   14.694341]  ? __pfx_kthread+0x10/0x10
[   14.694366]  ret_from_fork_asm+0x1a/0x30
[   14.694398]  </TASK>
[   14.694408] 
[   14.711993] Allocated by task 279:
[   14.712431]  kasan_save_stack+0x45/0x70
[   14.712949]  kasan_save_track+0x18/0x40
[   14.713099]  kasan_save_alloc_info+0x3b/0x50
[   14.713250]  __kasan_kmalloc+0xb7/0xc0
[   14.713382]  __kmalloc_cache_noprof+0x189/0x420
[   14.714241]  kasan_bitops_generic+0x92/0x1c0
[   14.714742]  kunit_try_run_case+0x1a5/0x480
[   14.715277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.715915]  kthread+0x337/0x6f0
[   14.716352]  ret_from_fork+0x116/0x1d0
[   14.716763]  ret_from_fork_asm+0x1a/0x30
[   14.717233] 
[   14.717395] The buggy address belongs to the object at ffff888102676240
[   14.717395]  which belongs to the cache kmalloc-16 of size 16
[   14.718102] The buggy address is located 8 bytes inside of
[   14.718102]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.719380] 
[   14.719679] The buggy address belongs to the physical page:
[   14.720043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.720293] flags: 0x200000000000000(node=0|zone=2)
[   14.720494] page_type: f5(slab)
[   14.721037] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.721894] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.722725] page dumped because: kasan: bad access detected
[   14.723380] 
[   14.723674] Memory state around the buggy address:
[   14.724021]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.724241]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.724629] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.725519]                                               ^
[   14.726116]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.726894]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.727397] ==================================================================

[   14.889596] ==================================================================
[   14.890114] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.890662] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   14.891192] 
[   14.891436] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.891540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.891554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.891577] Call Trace:
[   14.891589]  <TASK>
[   14.891604]  dump_stack_lvl+0x73/0xb0
[   14.891636]  print_report+0xd1/0x610
[   14.891661]  ? __virt_addr_valid+0x1db/0x2d0
[   14.891693]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.891721]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.891745]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.891775]  kasan_report+0x141/0x180
[   14.891798]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.891831]  kasan_check_range+0x10c/0x1c0
[   14.891855]  __kasan_check_write+0x18/0x20
[   14.891875]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.891903]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.891933]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.891959]  ? trace_hardirqs_on+0x37/0xe0
[   14.891982]  ? kasan_bitops_generic+0x92/0x1c0
[   14.892012]  kasan_bitops_generic+0x116/0x1c0
[   14.892037]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.892076]  ? __pfx_read_tsc+0x10/0x10
[   14.892098]  ? ktime_get_ts64+0x86/0x230
[   14.892137]  kunit_try_run_case+0x1a5/0x480
[   14.892164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.892188]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.892213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.892238]  ? __kthread_parkme+0x82/0x180
[   14.892259]  ? preempt_count_sub+0x50/0x80
[   14.892283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.892309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.892334]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.892361]  kthread+0x337/0x6f0
[   14.892381]  ? trace_preempt_on+0x20/0xc0
[   14.892405]  ? __pfx_kthread+0x10/0x10
[   14.892425]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.892447]  ? calculate_sigpending+0x7b/0xa0
[   14.892472]  ? __pfx_kthread+0x10/0x10
[   14.892494]  ret_from_fork+0x116/0x1d0
[   14.892512]  ? __pfx_kthread+0x10/0x10
[   14.892534]  ret_from_fork_asm+0x1a/0x30
[   14.892566]  </TASK>
[   14.892575] 
[   14.904626] Allocated by task 280:
[   14.904919]  kasan_save_stack+0x45/0x70
[   14.905324]  kasan_save_track+0x18/0x40
[   14.905529]  kasan_save_alloc_info+0x3b/0x50
[   14.905726]  __kasan_kmalloc+0xb7/0xc0
[   14.905895]  __kmalloc_cache_noprof+0x189/0x420
[   14.906442]  kasan_bitops_generic+0x92/0x1c0
[   14.906654]  kunit_try_run_case+0x1a5/0x480
[   14.907012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.907295]  kthread+0x337/0x6f0
[   14.907602]  ret_from_fork+0x116/0x1d0
[   14.907745]  ret_from_fork_asm+0x1a/0x30
[   14.907888] 
[   14.907975] The buggy address belongs to the object at ffff8881016acd80
[   14.907975]  which belongs to the cache kmalloc-16 of size 16
[   14.910265] The buggy address is located 8 bytes inside of
[   14.910265]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   14.910639] 
[   14.910721] The buggy address belongs to the physical page:
[   14.910900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   14.911167] flags: 0x200000000000000(node=0|zone=2)
[   14.911336] page_type: f5(slab)
[   14.911458] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.911691] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.911918] page dumped because: kasan: bad access detected
[   14.913213] 
[   14.913473] Memory state around the buggy address:
[   14.914477]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   14.915419]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.916712] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.917714]                       ^
[   14.918300]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.919352]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.920452] ==================================================================
[   15.034485] ==================================================================
[   15.034785] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.035205] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   15.035457] 
[   15.035541] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.035583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.035595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.035615] Call Trace:
[   15.035628]  <TASK>
[   15.035641]  dump_stack_lvl+0x73/0xb0
[   15.035669]  print_report+0xd1/0x610
[   15.035691]  ? __virt_addr_valid+0x1db/0x2d0
[   15.035714]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.035742]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.035767]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.035795]  kasan_report+0x141/0x180
[   15.035818]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.035853]  kasan_check_range+0x10c/0x1c0
[   15.035879]  __kasan_check_write+0x18/0x20
[   15.035951]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   15.035982]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.036010]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.036037]  ? trace_hardirqs_on+0x37/0xe0
[   15.036072]  ? kasan_bitops_generic+0x92/0x1c0
[   15.036101]  kasan_bitops_generic+0x116/0x1c0
[   15.036127]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.036153]  ? __pfx_read_tsc+0x10/0x10
[   15.036175]  ? ktime_get_ts64+0x86/0x230
[   15.036198]  kunit_try_run_case+0x1a5/0x480
[   15.036223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.036246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.036272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.036296]  ? __kthread_parkme+0x82/0x180
[   15.036317]  ? preempt_count_sub+0x50/0x80
[   15.036460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.036488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.036514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.036564]  kthread+0x337/0x6f0
[   15.036586]  ? trace_preempt_on+0x20/0xc0
[   15.036609]  ? __pfx_kthread+0x10/0x10
[   15.036630]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.036718]  ? calculate_sigpending+0x7b/0xa0
[   15.036743]  ? __pfx_kthread+0x10/0x10
[   15.036764]  ret_from_fork+0x116/0x1d0
[   15.036785]  ? __pfx_kthread+0x10/0x10
[   15.036806]  ret_from_fork_asm+0x1a/0x30
[   15.036838]  </TASK>
[   15.036848] 
[   15.045905] Allocated by task 280:
[   15.046135]  kasan_save_stack+0x45/0x70
[   15.046301]  kasan_save_track+0x18/0x40
[   15.046440]  kasan_save_alloc_info+0x3b/0x50
[   15.046593]  __kasan_kmalloc+0xb7/0xc0
[   15.046786]  __kmalloc_cache_noprof+0x189/0x420
[   15.047294]  kasan_bitops_generic+0x92/0x1c0
[   15.047521]  kunit_try_run_case+0x1a5/0x480
[   15.047761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.047940]  kthread+0x337/0x6f0
[   15.048350]  ret_from_fork+0x116/0x1d0
[   15.048576]  ret_from_fork_asm+0x1a/0x30
[   15.048967] 
[   15.049084] The buggy address belongs to the object at ffff8881016acd80
[   15.049084]  which belongs to the cache kmalloc-16 of size 16
[   15.049494] The buggy address is located 8 bytes inside of
[   15.049494]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.050166] 
[   15.050243] The buggy address belongs to the physical page:
[   15.050560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.050978] flags: 0x200000000000000(node=0|zone=2)
[   15.051188] page_type: f5(slab)
[   15.051372] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.051913] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.052314] page dumped because: kasan: bad access detected
[   15.052542] 
[   15.052630] Memory state around the buggy address:
[   15.052881]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.053287]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.053623] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.053929]                       ^
[   15.054150]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.054449]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.054855] ==================================================================
[   14.951399] ==================================================================
[   14.951772] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.952386] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   14.952644] 
[   14.952940] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.952988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.953000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.953022] Call Trace:
[   14.953035]  <TASK>
[   14.953063]  dump_stack_lvl+0x73/0xb0
[   14.953096]  print_report+0xd1/0x610
[   14.953118]  ? __virt_addr_valid+0x1db/0x2d0
[   14.953143]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.953171]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.953196]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.953224]  kasan_report+0x141/0x180
[   14.953246]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.953279]  kasan_check_range+0x10c/0x1c0
[   14.953302]  __kasan_check_write+0x18/0x20
[   14.953322]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.953351]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.953380]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.953405]  ? trace_hardirqs_on+0x37/0xe0
[   14.953430]  ? kasan_bitops_generic+0x92/0x1c0
[   14.953459]  kasan_bitops_generic+0x116/0x1c0
[   14.953483]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.953510]  ? __pfx_read_tsc+0x10/0x10
[   14.953533]  ? ktime_get_ts64+0x86/0x230
[   14.953558]  kunit_try_run_case+0x1a5/0x480
[   14.953585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.953609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.953634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.953733]  ? __kthread_parkme+0x82/0x180
[   14.953757]  ? preempt_count_sub+0x50/0x80
[   14.953783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.953808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.953834]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.953861]  kthread+0x337/0x6f0
[   14.953880]  ? trace_preempt_on+0x20/0xc0
[   14.953904]  ? __pfx_kthread+0x10/0x10
[   14.953925]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.953948]  ? calculate_sigpending+0x7b/0xa0
[   14.953974]  ? __pfx_kthread+0x10/0x10
[   14.953996]  ret_from_fork+0x116/0x1d0
[   14.954015]  ? __pfx_kthread+0x10/0x10
[   14.954036]  ret_from_fork_asm+0x1a/0x30
[   14.954081]  </TASK>
[   14.954091] 
[   14.962682] Allocated by task 280:
[   14.962978]  kasan_save_stack+0x45/0x70
[   14.963294]  kasan_save_track+0x18/0x40
[   14.963435]  kasan_save_alloc_info+0x3b/0x50
[   14.963584]  __kasan_kmalloc+0xb7/0xc0
[   14.963715]  __kmalloc_cache_noprof+0x189/0x420
[   14.963869]  kasan_bitops_generic+0x92/0x1c0
[   14.964095]  kunit_try_run_case+0x1a5/0x480
[   14.964719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.964981]  kthread+0x337/0x6f0
[   14.965288]  ret_from_fork+0x116/0x1d0
[   14.965485]  ret_from_fork_asm+0x1a/0x30
[   14.965749] 
[   14.965872] The buggy address belongs to the object at ffff8881016acd80
[   14.965872]  which belongs to the cache kmalloc-16 of size 16
[   14.966260] The buggy address is located 8 bytes inside of
[   14.966260]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   14.966956] 
[   14.967128] The buggy address belongs to the physical page:
[   14.967405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   14.967777] flags: 0x200000000000000(node=0|zone=2)
[   14.968133] page_type: f5(slab)
[   14.968298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.968605] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.968884] page dumped because: kasan: bad access detected
[   14.969365] 
[   14.969464] Memory state around the buggy address:
[   14.969711]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   14.969966]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.970352] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.970693]                       ^
[   14.970924]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.971166]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.971456] ==================================================================
[   14.921911] ==================================================================
[   14.922280] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.922723] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   14.923225] 
[   14.923342] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.923387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.923400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.923737] Call Trace:
[   14.923759]  <TASK>
[   14.923777]  dump_stack_lvl+0x73/0xb0
[   14.923808]  print_report+0xd1/0x610
[   14.923832]  ? __virt_addr_valid+0x1db/0x2d0
[   14.923856]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.924042]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.924084]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.924112]  kasan_report+0x141/0x180
[   14.924146]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.924179]  kasan_check_range+0x10c/0x1c0
[   14.924203]  __kasan_check_write+0x18/0x20
[   14.924223]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.924252]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.924282]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.924307]  ? trace_hardirqs_on+0x37/0xe0
[   14.924332]  ? kasan_bitops_generic+0x92/0x1c0
[   14.924360]  kasan_bitops_generic+0x116/0x1c0
[   14.924385]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.924412]  ? __pfx_read_tsc+0x10/0x10
[   14.924434]  ? ktime_get_ts64+0x86/0x230
[   14.924458]  kunit_try_run_case+0x1a5/0x480
[   14.924483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.924507]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.924532]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.924557]  ? __kthread_parkme+0x82/0x180
[   14.924577]  ? preempt_count_sub+0x50/0x80
[   14.924603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.924628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.924664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.924691]  kthread+0x337/0x6f0
[   14.924711]  ? trace_preempt_on+0x20/0xc0
[   14.924734]  ? __pfx_kthread+0x10/0x10
[   14.924755]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.924777]  ? calculate_sigpending+0x7b/0xa0
[   14.924802]  ? __pfx_kthread+0x10/0x10
[   14.924824]  ret_from_fork+0x116/0x1d0
[   14.924844]  ? __pfx_kthread+0x10/0x10
[   14.924865]  ret_from_fork_asm+0x1a/0x30
[   14.924897]  </TASK>
[   14.924907] 
[   14.937913] Allocated by task 280:
[   14.938050]  kasan_save_stack+0x45/0x70
[   14.938394]  kasan_save_track+0x18/0x40
[   14.938965]  kasan_save_alloc_info+0x3b/0x50
[   14.939298]  __kasan_kmalloc+0xb7/0xc0
[   14.939498]  __kmalloc_cache_noprof+0x189/0x420
[   14.939870]  kasan_bitops_generic+0x92/0x1c0
[   14.940096]  kunit_try_run_case+0x1a5/0x480
[   14.940558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.941026]  kthread+0x337/0x6f0
[   14.941296]  ret_from_fork+0x116/0x1d0
[   14.941584]  ret_from_fork_asm+0x1a/0x30
[   14.941979] 
[   14.942092] The buggy address belongs to the object at ffff8881016acd80
[   14.942092]  which belongs to the cache kmalloc-16 of size 16
[   14.943003] The buggy address is located 8 bytes inside of
[   14.943003]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   14.943791] 
[   14.943897] The buggy address belongs to the physical page:
[   14.944423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   14.944985] flags: 0x200000000000000(node=0|zone=2)
[   14.945362] page_type: f5(slab)
[   14.945622] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.945949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.946487] page dumped because: kasan: bad access detected
[   14.947021] 
[   14.947117] Memory state around the buggy address:
[   14.947618]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   14.948190]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.948585] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.948998]                       ^
[   14.949196]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.949709]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.950247] ==================================================================
[   15.013438] ==================================================================
[   15.013679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.014801] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   15.015093] 
[   15.015329] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.015373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.015408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.015429] Call Trace:
[   15.015443]  <TASK>
[   15.015457]  dump_stack_lvl+0x73/0xb0
[   15.015489]  print_report+0xd1/0x610
[   15.015511]  ? __virt_addr_valid+0x1db/0x2d0
[   15.015535]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.015562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.015606]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.015634]  kasan_report+0x141/0x180
[   15.015657]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.015734]  kasan_check_range+0x10c/0x1c0
[   15.015781]  __kasan_check_write+0x18/0x20
[   15.015802]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   15.015830]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.015859]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.015884]  ? trace_hardirqs_on+0x37/0xe0
[   15.015908]  ? kasan_bitops_generic+0x92/0x1c0
[   15.015955]  kasan_bitops_generic+0x116/0x1c0
[   15.015980]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.016007]  ? __pfx_read_tsc+0x10/0x10
[   15.016028]  ? ktime_get_ts64+0x86/0x230
[   15.016064]  kunit_try_run_case+0x1a5/0x480
[   15.016089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.016113]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.016148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.016173]  ? __kthread_parkme+0x82/0x180
[   15.016193]  ? preempt_count_sub+0x50/0x80
[   15.016218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.016243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.016268]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.016294]  kthread+0x337/0x6f0
[   15.016333]  ? trace_preempt_on+0x20/0xc0
[   15.016357]  ? __pfx_kthread+0x10/0x10
[   15.016378]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.016400]  ? calculate_sigpending+0x7b/0xa0
[   15.016423]  ? __pfx_kthread+0x10/0x10
[   15.016446]  ret_from_fork+0x116/0x1d0
[   15.016464]  ? __pfx_kthread+0x10/0x10
[   15.016485]  ret_from_fork_asm+0x1a/0x30
[   15.016517]  </TASK>
[   15.016527] 
[   15.025570] Allocated by task 280:
[   15.025782]  kasan_save_stack+0x45/0x70
[   15.026110]  kasan_save_track+0x18/0x40
[   15.026250]  kasan_save_alloc_info+0x3b/0x50
[   15.026397]  __kasan_kmalloc+0xb7/0xc0
[   15.026565]  __kmalloc_cache_noprof+0x189/0x420
[   15.026789]  kasan_bitops_generic+0x92/0x1c0
[   15.027033]  kunit_try_run_case+0x1a5/0x480
[   15.027186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.027357]  kthread+0x337/0x6f0
[   15.027472]  ret_from_fork+0x116/0x1d0
[   15.027833]  ret_from_fork_asm+0x1a/0x30
[   15.028063] 
[   15.028159] The buggy address belongs to the object at ffff8881016acd80
[   15.028159]  which belongs to the cache kmalloc-16 of size 16
[   15.028979] The buggy address is located 8 bytes inside of
[   15.028979]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.029568] 
[   15.029715] The buggy address belongs to the physical page:
[   15.029947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.030354] flags: 0x200000000000000(node=0|zone=2)
[   15.030526] page_type: f5(slab)
[   15.030646] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.030994] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.031417] page dumped because: kasan: bad access detected
[   15.031792] 
[   15.031885] Memory state around the buggy address:
[   15.032041]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.032266]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.032527] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.032948]                       ^
[   15.033284]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.033632]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.034020] ==================================================================
[   14.972010] ==================================================================
[   14.972480] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.973030] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   14.973342] 
[   14.973440] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.973483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.973494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.973515] Call Trace:
[   14.973529]  <TASK>
[   14.973543]  dump_stack_lvl+0x73/0xb0
[   14.973573]  print_report+0xd1/0x610
[   14.973597]  ? __virt_addr_valid+0x1db/0x2d0
[   14.973621]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.973694]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.973720]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.973749]  kasan_report+0x141/0x180
[   14.973772]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.973805]  kasan_check_range+0x10c/0x1c0
[   14.973830]  __kasan_check_write+0x18/0x20
[   14.973850]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.973878]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.973907]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.973933]  ? trace_hardirqs_on+0x37/0xe0
[   14.974002]  ? kasan_bitops_generic+0x92/0x1c0
[   14.974031]  kasan_bitops_generic+0x116/0x1c0
[   14.974069]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.974096]  ? __pfx_read_tsc+0x10/0x10
[   14.974118]  ? ktime_get_ts64+0x86/0x230
[   14.974143]  kunit_try_run_case+0x1a5/0x480
[   14.974167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.974191]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.974216]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.974241]  ? __kthread_parkme+0x82/0x180
[   14.974263]  ? preempt_count_sub+0x50/0x80
[   14.974288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.974313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.974348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.974374]  kthread+0x337/0x6f0
[   14.974395]  ? trace_preempt_on+0x20/0xc0
[   14.974418]  ? __pfx_kthread+0x10/0x10
[   14.974440]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.974462]  ? calculate_sigpending+0x7b/0xa0
[   14.974487]  ? __pfx_kthread+0x10/0x10
[   14.974510]  ret_from_fork+0x116/0x1d0
[   14.974530]  ? __pfx_kthread+0x10/0x10
[   14.974551]  ret_from_fork_asm+0x1a/0x30
[   14.974584]  </TASK>
[   14.974593] 
[   14.983645] Allocated by task 280:
[   14.983935]  kasan_save_stack+0x45/0x70
[   14.984182]  kasan_save_track+0x18/0x40
[   14.984337]  kasan_save_alloc_info+0x3b/0x50
[   14.984552]  __kasan_kmalloc+0xb7/0xc0
[   14.984767]  __kmalloc_cache_noprof+0x189/0x420
[   14.984925]  kasan_bitops_generic+0x92/0x1c0
[   14.985086]  kunit_try_run_case+0x1a5/0x480
[   14.985271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.985763]  kthread+0x337/0x6f0
[   14.986153]  ret_from_fork+0x116/0x1d0
[   14.986366]  ret_from_fork_asm+0x1a/0x30
[   14.986545] 
[   14.986734] The buggy address belongs to the object at ffff8881016acd80
[   14.986734]  which belongs to the cache kmalloc-16 of size 16
[   14.987157] The buggy address is located 8 bytes inside of
[   14.987157]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   14.987806] 
[   14.987928] The buggy address belongs to the physical page:
[   14.988233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   14.988584] flags: 0x200000000000000(node=0|zone=2)
[   14.988889] page_type: f5(slab)
[   14.989015] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.989308] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.989666] page dumped because: kasan: bad access detected
[   14.989851] 
[   14.989920] Memory state around the buggy address:
[   14.990083]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   14.990579]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.991263] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.991567]                       ^
[   14.991839]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.992076]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.992729] ==================================================================
[   14.993200] ==================================================================
[   14.993533] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.993809] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   14.994364] 
[   14.994483] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.994525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.994537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.994557] Call Trace:
[   14.994572]  <TASK>
[   14.994586]  dump_stack_lvl+0x73/0xb0
[   14.994617]  print_report+0xd1/0x610
[   14.994692]  ? __virt_addr_valid+0x1db/0x2d0
[   14.994724]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.994752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.994776]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.994805]  kasan_report+0x141/0x180
[   14.994827]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.994859]  kasan_check_range+0x10c/0x1c0
[   14.994884]  __kasan_check_write+0x18/0x20
[   14.994904]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.994932]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.994961]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.994986]  ? trace_hardirqs_on+0x37/0xe0
[   14.995008]  ? kasan_bitops_generic+0x92/0x1c0
[   14.995037]  kasan_bitops_generic+0x116/0x1c0
[   14.995074]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.995101]  ? __pfx_read_tsc+0x10/0x10
[   14.995144]  ? ktime_get_ts64+0x86/0x230
[   14.995169]  kunit_try_run_case+0x1a5/0x480
[   14.995194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.995217]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.995243]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.995267]  ? __kthread_parkme+0x82/0x180
[   14.995288]  ? preempt_count_sub+0x50/0x80
[   14.995313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.995338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.995364]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.995391]  kthread+0x337/0x6f0
[   14.995412]  ? trace_preempt_on+0x20/0xc0
[   14.995436]  ? __pfx_kthread+0x10/0x10
[   14.995457]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.995479]  ? calculate_sigpending+0x7b/0xa0
[   14.995504]  ? __pfx_kthread+0x10/0x10
[   14.995525]  ret_from_fork+0x116/0x1d0
[   14.995545]  ? __pfx_kthread+0x10/0x10
[   14.995567]  ret_from_fork_asm+0x1a/0x30
[   14.995599]  </TASK>
[   14.995608] 
[   15.004445] Allocated by task 280:
[   15.004577]  kasan_save_stack+0x45/0x70
[   15.005046]  kasan_save_track+0x18/0x40
[   15.005295]  kasan_save_alloc_info+0x3b/0x50
[   15.005511]  __kasan_kmalloc+0xb7/0xc0
[   15.005694]  __kmalloc_cache_noprof+0x189/0x420
[   15.005947]  kasan_bitops_generic+0x92/0x1c0
[   15.006331]  kunit_try_run_case+0x1a5/0x480
[   15.006499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.006815]  kthread+0x337/0x6f0
[   15.006959]  ret_from_fork+0x116/0x1d0
[   15.007105]  ret_from_fork_asm+0x1a/0x30
[   15.007340] 
[   15.007433] The buggy address belongs to the object at ffff8881016acd80
[   15.007433]  which belongs to the cache kmalloc-16 of size 16
[   15.007900] The buggy address is located 8 bytes inside of
[   15.007900]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.008482] 
[   15.008555] The buggy address belongs to the physical page:
[   15.008839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.009334] flags: 0x200000000000000(node=0|zone=2)
[   15.009567] page_type: f5(slab)
[   15.009920] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.010172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.010587] page dumped because: kasan: bad access detected
[   15.010830] 
[   15.010900] Memory state around the buggy address:
[   15.011107]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.011420]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.011712] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.011992]                       ^
[   15.012199]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.012525]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.012892] ==================================================================
[   15.055330] ==================================================================
[   15.055711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.056069] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   15.056463] 
[   15.056600] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.056644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.056945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.056969] Call Trace:
[   15.056985]  <TASK>
[   15.056999]  dump_stack_lvl+0x73/0xb0
[   15.057031]  print_report+0xd1/0x610
[   15.057069]  ? __virt_addr_valid+0x1db/0x2d0
[   15.057113]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.057140]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.057164]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.057192]  kasan_report+0x141/0x180
[   15.057214]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.057247]  kasan_check_range+0x10c/0x1c0
[   15.057271]  __kasan_check_write+0x18/0x20
[   15.057291]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   15.057319]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.057347]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.057372]  ? trace_hardirqs_on+0x37/0xe0
[   15.057395]  ? kasan_bitops_generic+0x92/0x1c0
[   15.057423]  kasan_bitops_generic+0x116/0x1c0
[   15.057447]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.057474]  ? __pfx_read_tsc+0x10/0x10
[   15.057495]  ? ktime_get_ts64+0x86/0x230
[   15.057520]  kunit_try_run_case+0x1a5/0x480
[   15.057544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.057569]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.057595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.057619]  ? __kthread_parkme+0x82/0x180
[   15.057640]  ? preempt_count_sub+0x50/0x80
[   15.057665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.057710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.057736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.057762]  kthread+0x337/0x6f0
[   15.057781]  ? trace_preempt_on+0x20/0xc0
[   15.057870]  ? __pfx_kthread+0x10/0x10
[   15.057892]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.057914]  ? calculate_sigpending+0x7b/0xa0
[   15.057939]  ? __pfx_kthread+0x10/0x10
[   15.057960]  ret_from_fork+0x116/0x1d0
[   15.057981]  ? __pfx_kthread+0x10/0x10
[   15.058002]  ret_from_fork_asm+0x1a/0x30
[   15.058034]  </TASK>
[   15.058043] 
[   15.067513] Allocated by task 280:
[   15.067739]  kasan_save_stack+0x45/0x70
[   15.067925]  kasan_save_track+0x18/0x40
[   15.068105]  kasan_save_alloc_info+0x3b/0x50
[   15.068355]  __kasan_kmalloc+0xb7/0xc0
[   15.068530]  __kmalloc_cache_noprof+0x189/0x420
[   15.068740]  kasan_bitops_generic+0x92/0x1c0
[   15.068894]  kunit_try_run_case+0x1a5/0x480
[   15.069041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.069334]  kthread+0x337/0x6f0
[   15.069507]  ret_from_fork+0x116/0x1d0
[   15.069695]  ret_from_fork_asm+0x1a/0x30
[   15.069853] 
[   15.069924] The buggy address belongs to the object at ffff8881016acd80
[   15.069924]  which belongs to the cache kmalloc-16 of size 16
[   15.070850] The buggy address is located 8 bytes inside of
[   15.070850]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.071396] 
[   15.071538] The buggy address belongs to the physical page:
[   15.071773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.072156] flags: 0x200000000000000(node=0|zone=2)
[   15.072417] page_type: f5(slab)
[   15.072573] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.073005] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.073315] page dumped because: kasan: bad access detected
[   15.073485] 
[   15.073554] Memory state around the buggy address:
[   15.073794]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.074121]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.074497] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.074845]                       ^
[   15.074996]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.075537]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.075884] ==================================================================