Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-x86_64

[   14.933519] ==================================================================
[   14.933865] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.934297] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.934710] 
[   14.934817] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.934859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.934870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.934901] Call Trace:
[   14.934917]  <TASK>
[   14.934932]  dump_stack_lvl+0x73/0xb0
[   14.934961]  print_report+0xd1/0x610
[   14.934997]  ? __virt_addr_valid+0x1db/0x2d0
[   14.935029]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.935059]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.935084]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.935125]  kasan_report+0x141/0x180
[   14.935147]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.935183]  kasan_check_range+0x10c/0x1c0
[   14.935206]  __kasan_check_write+0x18/0x20
[   14.935226]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.935256]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.935287]  ? ret_from_fork_asm+0x1a/0x30
[   14.935310]  ? kthread+0x337/0x6f0
[   14.935334]  kasan_bitops_generic+0x121/0x1c0
[   14.935358]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.935391]  ? __pfx_read_tsc+0x10/0x10
[   14.935412]  ? ktime_get_ts64+0x86/0x230
[   14.935468]  kunit_try_run_case+0x1a5/0x480
[   14.935494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.935518]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.935541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.935764]  ? __kthread_parkme+0x82/0x180
[   14.935786]  ? preempt_count_sub+0x50/0x80
[   14.935809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.935835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.935872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.935899]  kthread+0x337/0x6f0
[   14.935918]  ? trace_preempt_on+0x20/0xc0
[   14.935954]  ? __pfx_kthread+0x10/0x10
[   14.935976]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.935997]  ? calculate_sigpending+0x7b/0xa0
[   14.936023]  ? __pfx_kthread+0x10/0x10
[   14.936044]  ret_from_fork+0x116/0x1d0
[   14.936072]  ? __pfx_kthread+0x10/0x10
[   14.936093]  ret_from_fork_asm+0x1a/0x30
[   14.936134]  </TASK>
[   14.936145] 
[   14.945244] Allocated by task 279:
[   14.945442]  kasan_save_stack+0x45/0x70
[   14.945768]  kasan_save_track+0x18/0x40
[   14.945978]  kasan_save_alloc_info+0x3b/0x50
[   14.946149]  __kasan_kmalloc+0xb7/0xc0
[   14.946282]  __kmalloc_cache_noprof+0x189/0x420
[   14.946480]  kasan_bitops_generic+0x92/0x1c0
[   14.946774]  kunit_try_run_case+0x1a5/0x480
[   14.946986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.947190]  kthread+0x337/0x6f0
[   14.947314]  ret_from_fork+0x116/0x1d0
[   14.947518]  ret_from_fork_asm+0x1a/0x30
[   14.947720] 
[   14.947817] The buggy address belongs to the object at ffff888102676240
[   14.947817]  which belongs to the cache kmalloc-16 of size 16
[   14.948240] The buggy address is located 8 bytes inside of
[   14.948240]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.948776] 
[   14.948878] The buggy address belongs to the physical page:
[   14.949109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.949799] flags: 0x200000000000000(node=0|zone=2)
[   14.950052] page_type: f5(slab)
[   14.950209] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.950648] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.950908] page dumped because: kasan: bad access detected
[   14.951184] 
[   14.951277] Memory state around the buggy address:
[   14.951537]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.951959]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.952300] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.952722]                                               ^
[   14.953048]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.953372]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.953688] ==================================================================
[   14.870649] ==================================================================
[   14.870924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.871267] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.871931] 
[   14.872036] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.872081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.872092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.872124] Call Trace:
[   14.872138]  <TASK>
[   14.872154]  dump_stack_lvl+0x73/0xb0
[   14.872182]  print_report+0xd1/0x610
[   14.872214]  ? __virt_addr_valid+0x1db/0x2d0
[   14.872237]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.872267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.872305]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.872335]  kasan_report+0x141/0x180
[   14.872357]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.872422]  kasan_check_range+0x10c/0x1c0
[   14.872446]  __kasan_check_write+0x18/0x20
[   14.872475]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.872505]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.872544]  ? ret_from_fork_asm+0x1a/0x30
[   14.872648]  ? kthread+0x337/0x6f0
[   14.872673]  kasan_bitops_generic+0x121/0x1c0
[   14.872698]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.872725]  ? __pfx_read_tsc+0x10/0x10
[   14.872757]  ? ktime_get_ts64+0x86/0x230
[   14.872781]  kunit_try_run_case+0x1a5/0x480
[   14.872816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.872839]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.872865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.872889]  ? __kthread_parkme+0x82/0x180
[   14.872909]  ? preempt_count_sub+0x50/0x80
[   14.872934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.872959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.872983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.873018]  kthread+0x337/0x6f0
[   14.873038]  ? trace_preempt_on+0x20/0xc0
[   14.873060]  ? __pfx_kthread+0x10/0x10
[   14.873093]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.873114]  ? calculate_sigpending+0x7b/0xa0
[   14.873140]  ? __pfx_kthread+0x10/0x10
[   14.873161]  ret_from_fork+0x116/0x1d0
[   14.873179]  ? __pfx_kthread+0x10/0x10
[   14.873200]  ret_from_fork_asm+0x1a/0x30
[   14.873231]  </TASK>
[   14.873240] 
[   14.882240] Allocated by task 279:
[   14.882483]  kasan_save_stack+0x45/0x70
[   14.882798]  kasan_save_track+0x18/0x40
[   14.882957]  kasan_save_alloc_info+0x3b/0x50
[   14.883184]  __kasan_kmalloc+0xb7/0xc0
[   14.883416]  __kmalloc_cache_noprof+0x189/0x420
[   14.883859]  kasan_bitops_generic+0x92/0x1c0
[   14.884072]  kunit_try_run_case+0x1a5/0x480
[   14.884220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.884545]  kthread+0x337/0x6f0
[   14.884794]  ret_from_fork+0x116/0x1d0
[   14.884971]  ret_from_fork_asm+0x1a/0x30
[   14.885113] 
[   14.885185] The buggy address belongs to the object at ffff888102676240
[   14.885185]  which belongs to the cache kmalloc-16 of size 16
[   14.885839] The buggy address is located 8 bytes inside of
[   14.885839]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.886349] 
[   14.886442] The buggy address belongs to the physical page:
[   14.886796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.887144] flags: 0x200000000000000(node=0|zone=2)
[   14.887369] page_type: f5(slab)
[   14.887598] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.888150] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.888798] page dumped because: kasan: bad access detected
[   14.889063] 
[   14.889139] Memory state around the buggy address:
[   14.889338]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.889627]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.889919] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.890182]                                               ^
[   14.890430]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.890921]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.891222] ==================================================================
[   15.004995] ==================================================================
[   15.005337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.005843] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   15.006101] 
[   15.006196] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.006239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.006250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.006271] Call Trace:
[   15.006286]  <TASK>
[   15.006301]  dump_stack_lvl+0x73/0xb0
[   15.006329]  print_report+0xd1/0x610
[   15.006351]  ? __virt_addr_valid+0x1db/0x2d0
[   15.006374]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.006403]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.006427]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.006490]  kasan_report+0x141/0x180
[   15.006512]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.006737]  kasan_check_range+0x10c/0x1c0
[   15.006773]  __kasan_check_write+0x18/0x20
[   15.006794]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.006825]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.006857]  ? ret_from_fork_asm+0x1a/0x30
[   15.006881]  ? kthread+0x337/0x6f0
[   15.006904]  kasan_bitops_generic+0x121/0x1c0
[   15.006929]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.006955]  ? __pfx_read_tsc+0x10/0x10
[   15.006975]  ? ktime_get_ts64+0x86/0x230
[   15.007000]  kunit_try_run_case+0x1a5/0x480
[   15.007024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.007047]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.007071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.007095]  ? __kthread_parkme+0x82/0x180
[   15.007116]  ? preempt_count_sub+0x50/0x80
[   15.007140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.007165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.007189]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.007215]  kthread+0x337/0x6f0
[   15.007233]  ? trace_preempt_on+0x20/0xc0
[   15.007256]  ? __pfx_kthread+0x10/0x10
[   15.007276]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.007298]  ? calculate_sigpending+0x7b/0xa0
[   15.007323]  ? __pfx_kthread+0x10/0x10
[   15.007344]  ret_from_fork+0x116/0x1d0
[   15.007362]  ? __pfx_kthread+0x10/0x10
[   15.007382]  ret_from_fork_asm+0x1a/0x30
[   15.007413]  </TASK>
[   15.007422] 
[   15.015883] Allocated by task 279:
[   15.016069]  kasan_save_stack+0x45/0x70
[   15.016277]  kasan_save_track+0x18/0x40
[   15.016513]  kasan_save_alloc_info+0x3b/0x50
[   15.016783]  __kasan_kmalloc+0xb7/0xc0
[   15.016922]  __kmalloc_cache_noprof+0x189/0x420
[   15.017108]  kasan_bitops_generic+0x92/0x1c0
[   15.017320]  kunit_try_run_case+0x1a5/0x480
[   15.017632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.017895]  kthread+0x337/0x6f0
[   15.018063]  ret_from_fork+0x116/0x1d0
[   15.018256]  ret_from_fork_asm+0x1a/0x30
[   15.018447] 
[   15.018529] The buggy address belongs to the object at ffff888102676240
[   15.018529]  which belongs to the cache kmalloc-16 of size 16
[   15.019221] The buggy address is located 8 bytes inside of
[   15.019221]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   15.019788] 
[   15.019891] The buggy address belongs to the physical page:
[   15.020149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   15.020541] flags: 0x200000000000000(node=0|zone=2)
[   15.020854] page_type: f5(slab)
[   15.020993] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.021262] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.021625] page dumped because: kasan: bad access detected
[   15.021887] 
[   15.021980] Memory state around the buggy address:
[   15.022215]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   15.022751]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.023005] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.023290]                                               ^
[   15.023650]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.023887]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.024170] ==================================================================
[   14.984342] ==================================================================
[   14.985033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.985426] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.986198] 
[   14.986413] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.986535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.986629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.986655] Call Trace:
[   14.986672]  <TASK>
[   14.986688]  dump_stack_lvl+0x73/0xb0
[   14.986718]  print_report+0xd1/0x610
[   14.986740]  ? __virt_addr_valid+0x1db/0x2d0
[   14.986763]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.986793]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.986818]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.986849]  kasan_report+0x141/0x180
[   14.986870]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.986904]  kasan_check_range+0x10c/0x1c0
[   14.986929]  __kasan_check_write+0x18/0x20
[   14.986950]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.986979]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.987012]  ? ret_from_fork_asm+0x1a/0x30
[   14.987035]  ? kthread+0x337/0x6f0
[   14.987059]  kasan_bitops_generic+0x121/0x1c0
[   14.987082]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.987109]  ? __pfx_read_tsc+0x10/0x10
[   14.987130]  ? ktime_get_ts64+0x86/0x230
[   14.987154]  kunit_try_run_case+0x1a5/0x480
[   14.987179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.987203]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.987227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.987251]  ? __kthread_parkme+0x82/0x180
[   14.987272]  ? preempt_count_sub+0x50/0x80
[   14.987298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.987323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.987347]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.987372]  kthread+0x337/0x6f0
[   14.987392]  ? trace_preempt_on+0x20/0xc0
[   14.987414]  ? __pfx_kthread+0x10/0x10
[   14.987435]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.987483]  ? calculate_sigpending+0x7b/0xa0
[   14.987507]  ? __pfx_kthread+0x10/0x10
[   14.987529]  ret_from_fork+0x116/0x1d0
[   14.987630]  ? __pfx_kthread+0x10/0x10
[   14.987659]  ret_from_fork_asm+0x1a/0x30
[   14.987690]  </TASK>
[   14.987699] 
[   14.996283] Allocated by task 279:
[   14.996486]  kasan_save_stack+0x45/0x70
[   14.996764]  kasan_save_track+0x18/0x40
[   14.996966]  kasan_save_alloc_info+0x3b/0x50
[   14.997178]  __kasan_kmalloc+0xb7/0xc0
[   14.997369]  __kmalloc_cache_noprof+0x189/0x420
[   14.997813]  kasan_bitops_generic+0x92/0x1c0
[   14.998044]  kunit_try_run_case+0x1a5/0x480
[   14.998200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.998466]  kthread+0x337/0x6f0
[   14.998722]  ret_from_fork+0x116/0x1d0
[   14.998866]  ret_from_fork_asm+0x1a/0x30
[   14.999065] 
[   14.999162] The buggy address belongs to the object at ffff888102676240
[   14.999162]  which belongs to the cache kmalloc-16 of size 16
[   14.999778] The buggy address is located 8 bytes inside of
[   14.999778]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   15.000168] 
[   15.000239] The buggy address belongs to the physical page:
[   15.000424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   15.000884] flags: 0x200000000000000(node=0|zone=2)
[   15.001121] page_type: f5(slab)
[   15.001286] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.001563] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.001805] page dumped because: kasan: bad access detected
[   15.002056] 
[   15.002145] Memory state around the buggy address:
[   15.002368]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   15.002702]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.003263] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.003618]                                               ^
[   15.003880]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.004160]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.004493] ==================================================================
[   15.044026] ==================================================================
[   15.044313] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.044663] Read of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   15.044978] 
[   15.045059] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.045100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.045111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.045131] Call Trace:
[   15.045144]  <TASK>
[   15.045159]  dump_stack_lvl+0x73/0xb0
[   15.045183]  print_report+0xd1/0x610
[   15.045204]  ? __virt_addr_valid+0x1db/0x2d0
[   15.045225]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.045252]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.045274]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.045302]  kasan_report+0x141/0x180
[   15.045322]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.045354]  __asan_report_load8_noabort+0x18/0x20
[   15.045378]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.045406]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.045435]  ? ret_from_fork_asm+0x1a/0x30
[   15.045761]  ? kthread+0x337/0x6f0
[   15.045790]  kasan_bitops_generic+0x121/0x1c0
[   15.045817]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.045843]  ? __pfx_read_tsc+0x10/0x10
[   15.045864]  ? ktime_get_ts64+0x86/0x230
[   15.045888]  kunit_try_run_case+0x1a5/0x480
[   15.045912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.045936]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.045961]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.045984]  ? __kthread_parkme+0x82/0x180
[   15.046005]  ? preempt_count_sub+0x50/0x80
[   15.046029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.046054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.046079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.046105]  kthread+0x337/0x6f0
[   15.046124]  ? trace_preempt_on+0x20/0xc0
[   15.046147]  ? __pfx_kthread+0x10/0x10
[   15.046168]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.046189]  ? calculate_sigpending+0x7b/0xa0
[   15.046214]  ? __pfx_kthread+0x10/0x10
[   15.046235]  ret_from_fork+0x116/0x1d0
[   15.046255]  ? __pfx_kthread+0x10/0x10
[   15.046275]  ret_from_fork_asm+0x1a/0x30
[   15.046306]  </TASK>
[   15.046316] 
[   15.054490] Allocated by task 279:
[   15.054845]  kasan_save_stack+0x45/0x70
[   15.055036]  kasan_save_track+0x18/0x40
[   15.055171]  kasan_save_alloc_info+0x3b/0x50
[   15.055362]  __kasan_kmalloc+0xb7/0xc0
[   15.055662]  __kmalloc_cache_noprof+0x189/0x420
[   15.055901]  kasan_bitops_generic+0x92/0x1c0
[   15.056107]  kunit_try_run_case+0x1a5/0x480
[   15.056315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.056666]  kthread+0x337/0x6f0
[   15.056828]  ret_from_fork+0x116/0x1d0
[   15.056962]  ret_from_fork_asm+0x1a/0x30
[   15.057103] 
[   15.057174] The buggy address belongs to the object at ffff888102676240
[   15.057174]  which belongs to the cache kmalloc-16 of size 16
[   15.057726] The buggy address is located 8 bytes inside of
[   15.057726]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   15.058268] 
[   15.058364] The buggy address belongs to the physical page:
[   15.058796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   15.059134] flags: 0x200000000000000(node=0|zone=2)
[   15.059300] page_type: f5(slab)
[   15.059422] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.059793] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.060124] page dumped because: kasan: bad access detected
[   15.060301] 
[   15.060394] Memory state around the buggy address:
[   15.060627]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   15.060921]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.061159] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.061369]                                               ^
[   15.061781]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.062111]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.062469] ==================================================================
[   14.891889] ==================================================================
[   14.892210] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.892681] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.893036] 
[   14.893126] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.893169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.893181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.893201] Call Trace:
[   14.893215]  <TASK>
[   14.893231]  dump_stack_lvl+0x73/0xb0
[   14.893268]  print_report+0xd1/0x610
[   14.893291]  ? __virt_addr_valid+0x1db/0x2d0
[   14.893313]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.893354]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.893378]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.893408]  kasan_report+0x141/0x180
[   14.893471]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.893506]  kasan_check_range+0x10c/0x1c0
[   14.893530]  __kasan_check_write+0x18/0x20
[   14.893650]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.893687]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.893732]  ? ret_from_fork_asm+0x1a/0x30
[   14.893754]  ? kthread+0x337/0x6f0
[   14.893778]  kasan_bitops_generic+0x121/0x1c0
[   14.893802]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.893828]  ? __pfx_read_tsc+0x10/0x10
[   14.893850]  ? ktime_get_ts64+0x86/0x230
[   14.893875]  kunit_try_run_case+0x1a5/0x480
[   14.893900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.893924]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.893957]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.893983]  ? __kthread_parkme+0x82/0x180
[   14.894003]  ? preempt_count_sub+0x50/0x80
[   14.894037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.894062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.894087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.894113]  kthread+0x337/0x6f0
[   14.894141]  ? trace_preempt_on+0x20/0xc0
[   14.894164]  ? __pfx_kthread+0x10/0x10
[   14.894185]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.894218]  ? calculate_sigpending+0x7b/0xa0
[   14.894243]  ? __pfx_kthread+0x10/0x10
[   14.894266]  ret_from_fork+0x116/0x1d0
[   14.894285]  ? __pfx_kthread+0x10/0x10
[   14.894306]  ret_from_fork_asm+0x1a/0x30
[   14.894338]  </TASK>
[   14.894348] 
[   14.903345] Allocated by task 279:
[   14.903523]  kasan_save_stack+0x45/0x70
[   14.903949]  kasan_save_track+0x18/0x40
[   14.904164]  kasan_save_alloc_info+0x3b/0x50
[   14.904377]  __kasan_kmalloc+0xb7/0xc0
[   14.904663]  __kmalloc_cache_noprof+0x189/0x420
[   14.904889]  kasan_bitops_generic+0x92/0x1c0
[   14.905065]  kunit_try_run_case+0x1a5/0x480
[   14.905215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.905466]  kthread+0x337/0x6f0
[   14.905748]  ret_from_fork+0x116/0x1d0
[   14.905944]  ret_from_fork_asm+0x1a/0x30
[   14.906122] 
[   14.906195] The buggy address belongs to the object at ffff888102676240
[   14.906195]  which belongs to the cache kmalloc-16 of size 16
[   14.906832] The buggy address is located 8 bytes inside of
[   14.906832]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.907333] 
[   14.907476] The buggy address belongs to the physical page:
[   14.907922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.908260] flags: 0x200000000000000(node=0|zone=2)
[   14.908433] page_type: f5(slab)
[   14.908604] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.909034] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.909373] page dumped because: kasan: bad access detected
[   14.909744] 
[   14.909820] Memory state around the buggy address:
[   14.910034]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.910373]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.910786] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.911068]                                               ^
[   14.911349]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.911917]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912274] ==================================================================
[   14.954204] ==================================================================
[   14.954491] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.955015] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.955315] 
[   14.955426] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.955501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.955513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.955544] Call Trace:
[   14.955566]  <TASK>
[   14.955581]  dump_stack_lvl+0x73/0xb0
[   14.955609]  print_report+0xd1/0x610
[   14.955632]  ? __virt_addr_valid+0x1db/0x2d0
[   14.955736]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.955770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.955793]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.955833]  kasan_report+0x141/0x180
[   14.955856]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.955891]  kasan_check_range+0x10c/0x1c0
[   14.955925]  __kasan_check_write+0x18/0x20
[   14.955946]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.955976]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.956007]  ? ret_from_fork_asm+0x1a/0x30
[   14.956029]  ? kthread+0x337/0x6f0
[   14.956052]  kasan_bitops_generic+0x121/0x1c0
[   14.956078]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.956104]  ? __pfx_read_tsc+0x10/0x10
[   14.956125]  ? ktime_get_ts64+0x86/0x230
[   14.956149]  kunit_try_run_case+0x1a5/0x480
[   14.956173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.956198]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.956221]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.956246]  ? __kthread_parkme+0x82/0x180
[   14.956266]  ? preempt_count_sub+0x50/0x80
[   14.956295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.956321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.956346]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.956379]  kthread+0x337/0x6f0
[   14.956398]  ? trace_preempt_on+0x20/0xc0
[   14.956421]  ? __pfx_kthread+0x10/0x10
[   14.956473]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.956495]  ? calculate_sigpending+0x7b/0xa0
[   14.956520]  ? __pfx_kthread+0x10/0x10
[   14.956541]  ret_from_fork+0x116/0x1d0
[   14.956754]  ? __pfx_kthread+0x10/0x10
[   14.956777]  ret_from_fork_asm+0x1a/0x30
[   14.956808]  </TASK>
[   14.956817] 
[   14.972289] Allocated by task 279:
[   14.972523]  kasan_save_stack+0x45/0x70
[   14.972721]  kasan_save_track+0x18/0x40
[   14.972900]  kasan_save_alloc_info+0x3b/0x50
[   14.973113]  __kasan_kmalloc+0xb7/0xc0
[   14.973304]  __kmalloc_cache_noprof+0x189/0x420
[   14.974224]  kasan_bitops_generic+0x92/0x1c0
[   14.974491]  kunit_try_run_case+0x1a5/0x480
[   14.974790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.975102]  kthread+0x337/0x6f0
[   14.975265]  ret_from_fork+0x116/0x1d0
[   14.975823]  ret_from_fork_asm+0x1a/0x30
[   14.976020] 
[   14.976112] The buggy address belongs to the object at ffff888102676240
[   14.976112]  which belongs to the cache kmalloc-16 of size 16
[   14.976976] The buggy address is located 8 bytes inside of
[   14.976976]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.977910] 
[   14.978008] The buggy address belongs to the physical page:
[   14.978442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.978973] flags: 0x200000000000000(node=0|zone=2)
[   14.979194] page_type: f5(slab)
[   14.979363] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.979717] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.980009] page dumped because: kasan: bad access detected
[   14.980264] 
[   14.980356] Memory state around the buggy address:
[   14.980590]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.980860]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.981188] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.982222]                                               ^
[   14.982726]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.983118]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.983537] ==================================================================
[   15.024747] ==================================================================
[   15.025064] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.025373] Read of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   15.025712] 
[   15.025820] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.025861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.025873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.025894] Call Trace:
[   15.025907]  <TASK>
[   15.025922]  dump_stack_lvl+0x73/0xb0
[   15.025947]  print_report+0xd1/0x610
[   15.025968]  ? __virt_addr_valid+0x1db/0x2d0
[   15.025991]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.026019]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.026042]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.026069]  kasan_report+0x141/0x180
[   15.026090]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.026122]  kasan_check_range+0x10c/0x1c0
[   15.026145]  __kasan_check_read+0x15/0x20
[   15.026163]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.026190]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.026220]  ? ret_from_fork_asm+0x1a/0x30
[   15.026242]  ? kthread+0x337/0x6f0
[   15.026265]  kasan_bitops_generic+0x121/0x1c0
[   15.026288]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.026311]  ? __pfx_read_tsc+0x10/0x10
[   15.026332]  ? ktime_get_ts64+0x86/0x230
[   15.026355]  kunit_try_run_case+0x1a5/0x480
[   15.026379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.026401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.026424]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.026447]  ? __kthread_parkme+0x82/0x180
[   15.026476]  ? preempt_count_sub+0x50/0x80
[   15.026499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.026522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.026545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.026569]  kthread+0x337/0x6f0
[   15.026587]  ? trace_preempt_on+0x20/0xc0
[   15.026609]  ? __pfx_kthread+0x10/0x10
[   15.026630]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.026651]  ? calculate_sigpending+0x7b/0xa0
[   15.026674]  ? __pfx_kthread+0x10/0x10
[   15.026694]  ret_from_fork+0x116/0x1d0
[   15.026712]  ? __pfx_kthread+0x10/0x10
[   15.026731]  ret_from_fork_asm+0x1a/0x30
[   15.026760]  </TASK>
[   15.026769] 
[   15.035266] Allocated by task 279:
[   15.035447]  kasan_save_stack+0x45/0x70
[   15.035736]  kasan_save_track+0x18/0x40
[   15.035896]  kasan_save_alloc_info+0x3b/0x50
[   15.036106]  __kasan_kmalloc+0xb7/0xc0
[   15.036294]  __kmalloc_cache_noprof+0x189/0x420
[   15.036734]  kasan_bitops_generic+0x92/0x1c0
[   15.036933]  kunit_try_run_case+0x1a5/0x480
[   15.037141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.037368]  kthread+0x337/0x6f0
[   15.037653]  ret_from_fork+0x116/0x1d0
[   15.037820]  ret_from_fork_asm+0x1a/0x30
[   15.037997] 
[   15.038074] The buggy address belongs to the object at ffff888102676240
[   15.038074]  which belongs to the cache kmalloc-16 of size 16
[   15.038776] The buggy address is located 8 bytes inside of
[   15.038776]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   15.039216] 
[   15.039313] The buggy address belongs to the physical page:
[   15.039657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   15.039941] flags: 0x200000000000000(node=0|zone=2)
[   15.040105] page_type: f5(slab)
[   15.040246] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.040734] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.041077] page dumped because: kasan: bad access detected
[   15.041327] 
[   15.041411] Memory state around the buggy address:
[   15.041713]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   15.042003]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.042296] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.042792]                                               ^
[   15.043009]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.043310]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.043611] ==================================================================
[   14.912846] ==================================================================
[   14.913174] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.913640] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279
[   14.913986] 
[   14.914087] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.914131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.914155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.914175] Call Trace:
[   14.914189]  <TASK>
[   14.914203]  dump_stack_lvl+0x73/0xb0
[   14.914231]  print_report+0xd1/0x610
[   14.914262]  ? __virt_addr_valid+0x1db/0x2d0
[   14.914285]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.914315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.914351]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.914381]  kasan_report+0x141/0x180
[   14.914402]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.914437]  kasan_check_range+0x10c/0x1c0
[   14.914474]  __kasan_check_write+0x18/0x20
[   14.914494]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.914524]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.914556]  ? ret_from_fork_asm+0x1a/0x30
[   14.914578]  ? kthread+0x337/0x6f0
[   14.914601]  kasan_bitops_generic+0x121/0x1c0
[   14.914690]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.914733]  ? __pfx_read_tsc+0x10/0x10
[   14.914754]  ? ktime_get_ts64+0x86/0x230
[   14.914779]  kunit_try_run_case+0x1a5/0x480
[   14.914804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.914828]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.914853]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.914877]  ? __kthread_parkme+0x82/0x180
[   14.914897]  ? preempt_count_sub+0x50/0x80
[   14.914921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.914946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.914972]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.914998]  kthread+0x337/0x6f0
[   14.915025]  ? trace_preempt_on+0x20/0xc0
[   14.915048]  ? __pfx_kthread+0x10/0x10
[   14.915069]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.915101]  ? calculate_sigpending+0x7b/0xa0
[   14.915126]  ? __pfx_kthread+0x10/0x10
[   14.915147]  ret_from_fork+0x116/0x1d0
[   14.915166]  ? __pfx_kthread+0x10/0x10
[   14.915187]  ret_from_fork_asm+0x1a/0x30
[   14.915217]  </TASK>
[   14.915227] 
[   14.924103] Allocated by task 279:
[   14.924272]  kasan_save_stack+0x45/0x70
[   14.924492]  kasan_save_track+0x18/0x40
[   14.924780]  kasan_save_alloc_info+0x3b/0x50
[   14.925002]  __kasan_kmalloc+0xb7/0xc0
[   14.925174]  __kmalloc_cache_noprof+0x189/0x420
[   14.925414]  kasan_bitops_generic+0x92/0x1c0
[   14.925740]  kunit_try_run_case+0x1a5/0x480
[   14.925958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.926195]  kthread+0x337/0x6f0
[   14.926317]  ret_from_fork+0x116/0x1d0
[   14.926483]  ret_from_fork_asm+0x1a/0x30
[   14.926771] 
[   14.926871] The buggy address belongs to the object at ffff888102676240
[   14.926871]  which belongs to the cache kmalloc-16 of size 16
[   14.927409] The buggy address is located 8 bytes inside of
[   14.927409]  allocated 9-byte region [ffff888102676240, ffff888102676249)
[   14.928137] 
[   14.928254] The buggy address belongs to the physical page:
[   14.928478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676
[   14.928918] flags: 0x200000000000000(node=0|zone=2)
[   14.929182] page_type: f5(slab)
[   14.929350] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.929820] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.930121] page dumped because: kasan: bad access detected
[   14.930388] 
[   14.930518] Memory state around the buggy address:
[   14.930820]  ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.931143]  ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.931472] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   14.931984]                                               ^
[   14.932274]  ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.932685]  ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.933013] ==================================================================

[   15.148537] ==================================================================
[   15.149085] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.149507] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   15.149896] 
[   15.150093] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.150154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.150167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.150218] Call Trace:
[   15.150233]  <TASK>
[   15.150265]  dump_stack_lvl+0x73/0xb0
[   15.150305]  print_report+0xd1/0x610
[   15.150328]  ? __virt_addr_valid+0x1db/0x2d0
[   15.150351]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.150382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.150406]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.150436]  kasan_report+0x141/0x180
[   15.150458]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.150520]  kasan_check_range+0x10c/0x1c0
[   15.150545]  __kasan_check_write+0x18/0x20
[   15.150565]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.150653]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.150685]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.150714]  ? trace_hardirqs_on+0x37/0xe0
[   15.150737]  ? kasan_bitops_generic+0x92/0x1c0
[   15.150765]  kasan_bitops_generic+0x121/0x1c0
[   15.150817]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.150842]  ? __pfx_read_tsc+0x10/0x10
[   15.150891]  ? ktime_get_ts64+0x86/0x230
[   15.150922]  kunit_try_run_case+0x1a5/0x480
[   15.150947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.150972]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.150997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.151023]  ? __kthread_parkme+0x82/0x180
[   15.151044]  ? preempt_count_sub+0x50/0x80
[   15.151076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.151101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.151146]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.151172]  kthread+0x337/0x6f0
[   15.151192]  ? trace_preempt_on+0x20/0xc0
[   15.151214]  ? __pfx_kthread+0x10/0x10
[   15.151263]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.151285]  ? calculate_sigpending+0x7b/0xa0
[   15.151337]  ? __pfx_kthread+0x10/0x10
[   15.151359]  ret_from_fork+0x116/0x1d0
[   15.151379]  ? __pfx_kthread+0x10/0x10
[   15.151399]  ret_from_fork_asm+0x1a/0x30
[   15.151431]  </TASK>
[   15.151441] 
[   15.166507] Allocated by task 280:
[   15.166646]  kasan_save_stack+0x45/0x70
[   15.167181]  kasan_save_track+0x18/0x40
[   15.167545]  kasan_save_alloc_info+0x3b/0x50
[   15.168032]  __kasan_kmalloc+0xb7/0xc0
[   15.169298]  __kmalloc_cache_noprof+0x189/0x420
[   15.169471]  kasan_bitops_generic+0x92/0x1c0
[   15.169625]  kunit_try_run_case+0x1a5/0x480
[   15.170664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.171942]  kthread+0x337/0x6f0
[   15.173544]  ret_from_fork+0x116/0x1d0
[   15.173952]  ret_from_fork_asm+0x1a/0x30
[   15.174143] 
[   15.174220] The buggy address belongs to the object at ffff8881016acd80
[   15.174220]  which belongs to the cache kmalloc-16 of size 16
[   15.174580] The buggy address is located 8 bytes inside of
[   15.174580]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.174937] 
[   15.175011] The buggy address belongs to the physical page:
[   15.176375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.177232] flags: 0x200000000000000(node=0|zone=2)
[   15.177422] page_type: f5(slab)
[   15.177846] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.178297] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.178788] page dumped because: kasan: bad access detected
[   15.179141] 
[   15.179245] Memory state around the buggy address:
[   15.179455]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.180099]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.181041] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.181922]                       ^
[   15.182399]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.183278]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.183923] ==================================================================
[   15.276511] ==================================================================
[   15.276758] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.277524] Read of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   15.278039] 
[   15.278210] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.278402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.278436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.278457] Call Trace:
[   15.278473]  <TASK>
[   15.278488]  dump_stack_lvl+0x73/0xb0
[   15.278518]  print_report+0xd1/0x610
[   15.278541]  ? __virt_addr_valid+0x1db/0x2d0
[   15.278565]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.278596]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.278621]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.278651]  kasan_report+0x141/0x180
[   15.278673]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.278713]  kasan_check_range+0x10c/0x1c0
[   15.278738]  __kasan_check_read+0x15/0x20
[   15.279013]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.279045]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.279090]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.279116]  ? trace_hardirqs_on+0x37/0xe0
[   15.279139]  ? kasan_bitops_generic+0x92/0x1c0
[   15.279167]  kasan_bitops_generic+0x121/0x1c0
[   15.279193]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.279220]  ? __pfx_read_tsc+0x10/0x10
[   15.279242]  ? ktime_get_ts64+0x86/0x230
[   15.279267]  kunit_try_run_case+0x1a5/0x480
[   15.279292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.279315]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.279340]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.279365]  ? __kthread_parkme+0x82/0x180
[   15.279386]  ? preempt_count_sub+0x50/0x80
[   15.279411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.279436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.279461]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.279488]  kthread+0x337/0x6f0
[   15.279507]  ? trace_preempt_on+0x20/0xc0
[   15.279530]  ? __pfx_kthread+0x10/0x10
[   15.279552]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.279574]  ? calculate_sigpending+0x7b/0xa0
[   15.279599]  ? __pfx_kthread+0x10/0x10
[   15.279621]  ret_from_fork+0x116/0x1d0
[   15.279655]  ? __pfx_kthread+0x10/0x10
[   15.279676]  ret_from_fork_asm+0x1a/0x30
[   15.279708]  </TASK>
[   15.279718] 
[   15.291711] Allocated by task 280:
[   15.291889]  kasan_save_stack+0x45/0x70
[   15.292205]  kasan_save_track+0x18/0x40
[   15.292586]  kasan_save_alloc_info+0x3b/0x50
[   15.292978]  __kasan_kmalloc+0xb7/0xc0
[   15.293194]  __kmalloc_cache_noprof+0x189/0x420
[   15.293398]  kasan_bitops_generic+0x92/0x1c0
[   15.293805]  kunit_try_run_case+0x1a5/0x480
[   15.294222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.294536]  kthread+0x337/0x6f0
[   15.294739]  ret_from_fork+0x116/0x1d0
[   15.295137]  ret_from_fork_asm+0x1a/0x30
[   15.295445] 
[   15.295534] The buggy address belongs to the object at ffff8881016acd80
[   15.295534]  which belongs to the cache kmalloc-16 of size 16
[   15.296413] The buggy address is located 8 bytes inside of
[   15.296413]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.297278] 
[   15.297370] The buggy address belongs to the physical page:
[   15.297882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.298225] flags: 0x200000000000000(node=0|zone=2)
[   15.298624] page_type: f5(slab)
[   15.298859] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.299356] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.299754] page dumped because: kasan: bad access detected
[   15.300142] 
[   15.300265] Memory state around the buggy address:
[   15.300448]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.301076]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.301388] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.301944]                       ^
[   15.302151]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.302474]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.302960] ==================================================================
[   15.184966] ==================================================================
[   15.185682] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.186226] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   15.187208] 
[   15.187501] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.187550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.187563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.187583] Call Trace:
[   15.187600]  <TASK>
[   15.187706]  dump_stack_lvl+0x73/0xb0
[   15.187738]  print_report+0xd1/0x610
[   15.187761]  ? __virt_addr_valid+0x1db/0x2d0
[   15.187786]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.187816]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.187841]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.187871]  kasan_report+0x141/0x180
[   15.187893]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.187928]  kasan_check_range+0x10c/0x1c0
[   15.187953]  __kasan_check_write+0x18/0x20
[   15.187973]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.188003]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.188034]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.188084]  ? trace_hardirqs_on+0x37/0xe0
[   15.188107]  ? kasan_bitops_generic+0x92/0x1c0
[   15.188136]  kasan_bitops_generic+0x121/0x1c0
[   15.188161]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.188187]  ? __pfx_read_tsc+0x10/0x10
[   15.188208]  ? ktime_get_ts64+0x86/0x230
[   15.188233]  kunit_try_run_case+0x1a5/0x480
[   15.188273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.188298]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.188323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.188348]  ? __kthread_parkme+0x82/0x180
[   15.188368]  ? preempt_count_sub+0x50/0x80
[   15.188393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.188418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.188443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.188469]  kthread+0x337/0x6f0
[   15.188488]  ? trace_preempt_on+0x20/0xc0
[   15.188511]  ? __pfx_kthread+0x10/0x10
[   15.188533]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.188554]  ? calculate_sigpending+0x7b/0xa0
[   15.188579]  ? __pfx_kthread+0x10/0x10
[   15.188600]  ret_from_fork+0x116/0x1d0
[   15.188620]  ? __pfx_kthread+0x10/0x10
[   15.188706]  ret_from_fork_asm+0x1a/0x30
[   15.188744]  </TASK>
[   15.188754] 
[   15.203412] Allocated by task 280:
[   15.203600]  kasan_save_stack+0x45/0x70
[   15.204146]  kasan_save_track+0x18/0x40
[   15.204360]  kasan_save_alloc_info+0x3b/0x50
[   15.204580]  __kasan_kmalloc+0xb7/0xc0
[   15.205033]  __kmalloc_cache_noprof+0x189/0x420
[   15.205229]  kasan_bitops_generic+0x92/0x1c0
[   15.205703]  kunit_try_run_case+0x1a5/0x480
[   15.206031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.206471]  kthread+0x337/0x6f0
[   15.206760]  ret_from_fork+0x116/0x1d0
[   15.206948]  ret_from_fork_asm+0x1a/0x30
[   15.207149] 
[   15.207476] The buggy address belongs to the object at ffff8881016acd80
[   15.207476]  which belongs to the cache kmalloc-16 of size 16
[   15.208454] The buggy address is located 8 bytes inside of
[   15.208454]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.209352] 
[   15.209464] The buggy address belongs to the physical page:
[   15.209903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.210475] flags: 0x200000000000000(node=0|zone=2)
[   15.210908] page_type: f5(slab)
[   15.211220] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.211590] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.212396] page dumped because: kasan: bad access detected
[   15.212866] 
[   15.212969] Memory state around the buggy address:
[   15.213290]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.213660]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.213977] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214505]                       ^
[   15.214886]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.215390]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.215960] ==================================================================
[   15.216685] ==================================================================
[   15.217458] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.218012] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   15.218471] 
[   15.218778] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.218965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.218984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.219005] Call Trace:
[   15.219021]  <TASK>
[   15.219037]  dump_stack_lvl+0x73/0xb0
[   15.219085]  print_report+0xd1/0x610
[   15.219108]  ? __virt_addr_valid+0x1db/0x2d0
[   15.219147]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.219177]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.219203]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.219233]  kasan_report+0x141/0x180
[   15.219256]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.219291]  kasan_check_range+0x10c/0x1c0
[   15.219315]  __kasan_check_write+0x18/0x20
[   15.219335]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.219366]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.219396]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.219421]  ? trace_hardirqs_on+0x37/0xe0
[   15.219445]  ? kasan_bitops_generic+0x92/0x1c0
[   15.219474]  kasan_bitops_generic+0x121/0x1c0
[   15.219499]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.219526]  ? __pfx_read_tsc+0x10/0x10
[   15.219547]  ? ktime_get_ts64+0x86/0x230
[   15.219572]  kunit_try_run_case+0x1a5/0x480
[   15.219596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.219619]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.219829]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.219857]  ? __kthread_parkme+0x82/0x180
[   15.219879]  ? preempt_count_sub+0x50/0x80
[   15.219904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.219929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.219955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.219982]  kthread+0x337/0x6f0
[   15.220001]  ? trace_preempt_on+0x20/0xc0
[   15.220024]  ? __pfx_kthread+0x10/0x10
[   15.220045]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.220083]  ? calculate_sigpending+0x7b/0xa0
[   15.220107]  ? __pfx_kthread+0x10/0x10
[   15.220137]  ret_from_fork+0x116/0x1d0
[   15.220158]  ? __pfx_kthread+0x10/0x10
[   15.220178]  ret_from_fork_asm+0x1a/0x30
[   15.220209]  </TASK>
[   15.220220] 
[   15.233349] Allocated by task 280:
[   15.233804]  kasan_save_stack+0x45/0x70
[   15.234149]  kasan_save_track+0x18/0x40
[   15.234434]  kasan_save_alloc_info+0x3b/0x50
[   15.234822]  __kasan_kmalloc+0xb7/0xc0
[   15.235014]  __kmalloc_cache_noprof+0x189/0x420
[   15.235412]  kasan_bitops_generic+0x92/0x1c0
[   15.235808]  kunit_try_run_case+0x1a5/0x480
[   15.236161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.236500]  kthread+0x337/0x6f0
[   15.236907]  ret_from_fork+0x116/0x1d0
[   15.237117]  ret_from_fork_asm+0x1a/0x30
[   15.237475] 
[   15.237741] The buggy address belongs to the object at ffff8881016acd80
[   15.237741]  which belongs to the cache kmalloc-16 of size 16
[   15.238375] The buggy address is located 8 bytes inside of
[   15.238375]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.239307] 
[   15.239413] The buggy address belongs to the physical page:
[   15.239901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.240360] flags: 0x200000000000000(node=0|zone=2)
[   15.240611] page_type: f5(slab)
[   15.241148] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.241468] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.242037] page dumped because: kasan: bad access detected
[   15.242383] 
[   15.242482] Memory state around the buggy address:
[   15.242967]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.243521]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.243986] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.244387]                       ^
[   15.244549]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.245280]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.245639] ==================================================================
[   15.097802] ==================================================================
[   15.098258] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.098580] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   15.099251] 
[   15.099346] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.099390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.099402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.099421] Call Trace:
[   15.099435]  <TASK>
[   15.099450]  dump_stack_lvl+0x73/0xb0
[   15.099478]  print_report+0xd1/0x610
[   15.099500]  ? __virt_addr_valid+0x1db/0x2d0
[   15.099523]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.099554]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.099579]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.099610]  kasan_report+0x141/0x180
[   15.099632]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.099667]  kasan_check_range+0x10c/0x1c0
[   15.099691]  __kasan_check_write+0x18/0x20
[   15.099711]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.099742]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.099774]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.099799]  ? trace_hardirqs_on+0x37/0xe0
[   15.099901]  ? kasan_bitops_generic+0x92/0x1c0
[   15.099936]  kasan_bitops_generic+0x121/0x1c0
[   15.099962]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.099988]  ? __pfx_read_tsc+0x10/0x10
[   15.100010]  ? ktime_get_ts64+0x86/0x230
[   15.100035]  kunit_try_run_case+0x1a5/0x480
[   15.100072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.100096]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.100121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.100146]  ? __kthread_parkme+0x82/0x180
[   15.100167]  ? preempt_count_sub+0x50/0x80
[   15.100192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.100217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.100255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.100282]  kthread+0x337/0x6f0
[   15.100302]  ? trace_preempt_on+0x20/0xc0
[   15.100325]  ? __pfx_kthread+0x10/0x10
[   15.100346]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.100369]  ? calculate_sigpending+0x7b/0xa0
[   15.100393]  ? __pfx_kthread+0x10/0x10
[   15.100415]  ret_from_fork+0x116/0x1d0
[   15.100435]  ? __pfx_kthread+0x10/0x10
[   15.100457]  ret_from_fork_asm+0x1a/0x30
[   15.100488]  </TASK>
[   15.100499] 
[   15.110718] Allocated by task 280:
[   15.110869]  kasan_save_stack+0x45/0x70
[   15.111291]  kasan_save_track+0x18/0x40
[   15.111479]  kasan_save_alloc_info+0x3b/0x50
[   15.111921]  __kasan_kmalloc+0xb7/0xc0
[   15.112225]  __kmalloc_cache_noprof+0x189/0x420
[   15.112542]  kasan_bitops_generic+0x92/0x1c0
[   15.113092]  kunit_try_run_case+0x1a5/0x480
[   15.113312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.113554]  kthread+0x337/0x6f0
[   15.113697]  ret_from_fork+0x116/0x1d0
[   15.114216]  ret_from_fork_asm+0x1a/0x30
[   15.114513] 
[   15.114609] The buggy address belongs to the object at ffff8881016acd80
[   15.114609]  which belongs to the cache kmalloc-16 of size 16
[   15.115486] The buggy address is located 8 bytes inside of
[   15.115486]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.116199] 
[   15.116312] The buggy address belongs to the physical page:
[   15.116631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.117250] flags: 0x200000000000000(node=0|zone=2)
[   15.117587] page_type: f5(slab)
[   15.117971] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.118387] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.118841] page dumped because: kasan: bad access detected
[   15.119037] 
[   15.119178] Memory state around the buggy address:
[   15.119463]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.120102]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.120463] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.120897]                       ^
[   15.121347]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.121816]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.122248] ==================================================================
[   15.303673] ==================================================================
[   15.304098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.304572] Read of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   15.305073] 
[   15.305196] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.305239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.305252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.305273] Call Trace:
[   15.305287]  <TASK>
[   15.305301]  dump_stack_lvl+0x73/0xb0
[   15.305331]  print_report+0xd1/0x610
[   15.305355]  ? __virt_addr_valid+0x1db/0x2d0
[   15.305394]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.305570]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.305596]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.305627]  kasan_report+0x141/0x180
[   15.305664]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.305700]  __asan_report_load8_noabort+0x18/0x20
[   15.305726]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.305757]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.305788]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.305814]  ? trace_hardirqs_on+0x37/0xe0
[   15.305836]  ? kasan_bitops_generic+0x92/0x1c0
[   15.305865]  kasan_bitops_generic+0x121/0x1c0
[   15.305889]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.305916]  ? __pfx_read_tsc+0x10/0x10
[   15.305937]  ? ktime_get_ts64+0x86/0x230
[   15.305961]  kunit_try_run_case+0x1a5/0x480
[   15.305985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.306010]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.306036]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.306072]  ? __kthread_parkme+0x82/0x180
[   15.306094]  ? preempt_count_sub+0x50/0x80
[   15.306117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.306143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.306169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.306196]  kthread+0x337/0x6f0
[   15.306216]  ? trace_preempt_on+0x20/0xc0
[   15.306239]  ? __pfx_kthread+0x10/0x10
[   15.306260]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.306282]  ? calculate_sigpending+0x7b/0xa0
[   15.306307]  ? __pfx_kthread+0x10/0x10
[   15.306329]  ret_from_fork+0x116/0x1d0
[   15.306349]  ? __pfx_kthread+0x10/0x10
[   15.306370]  ret_from_fork_asm+0x1a/0x30
[   15.306402]  </TASK>
[   15.306411] 
[   15.318534] Allocated by task 280:
[   15.319164]  kasan_save_stack+0x45/0x70
[   15.319461]  kasan_save_track+0x18/0x40
[   15.319797]  kasan_save_alloc_info+0x3b/0x50
[   15.320149]  __kasan_kmalloc+0xb7/0xc0
[   15.320333]  __kmalloc_cache_noprof+0x189/0x420
[   15.320719]  kasan_bitops_generic+0x92/0x1c0
[   15.320934]  kunit_try_run_case+0x1a5/0x480
[   15.321164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.321607]  kthread+0x337/0x6f0
[   15.321902]  ret_from_fork+0x116/0x1d0
[   15.322297]  ret_from_fork_asm+0x1a/0x30
[   15.322506] 
[   15.322603] The buggy address belongs to the object at ffff8881016acd80
[   15.322603]  which belongs to the cache kmalloc-16 of size 16
[   15.323329] The buggy address is located 8 bytes inside of
[   15.323329]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.323827] 
[   15.324181] The buggy address belongs to the physical page:
[   15.324490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.325032] flags: 0x200000000000000(node=0|zone=2)
[   15.325250] page_type: f5(slab)
[   15.325557] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.326077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.326561] page dumped because: kasan: bad access detected
[   15.326971] 
[   15.327088] Memory state around the buggy address:
[   15.327319]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.327662]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.328237] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.328619]                       ^
[   15.328830]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.329372]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.329737] ==================================================================
[   15.246522] ==================================================================
[   15.247087] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.247482] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   15.248217] 
[   15.248421] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.248469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.248481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.248502] Call Trace:
[   15.248517]  <TASK>
[   15.248620]  dump_stack_lvl+0x73/0xb0
[   15.248841]  print_report+0xd1/0x610
[   15.248865]  ? __virt_addr_valid+0x1db/0x2d0
[   15.248888]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.248919]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.248944]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.248974]  kasan_report+0x141/0x180
[   15.248997]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.249032]  kasan_check_range+0x10c/0x1c0
[   15.249073]  __kasan_check_write+0x18/0x20
[   15.249093]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.249123]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.249156]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.249181]  ? trace_hardirqs_on+0x37/0xe0
[   15.249204]  ? kasan_bitops_generic+0x92/0x1c0
[   15.249233]  kasan_bitops_generic+0x121/0x1c0
[   15.249258]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.249284]  ? __pfx_read_tsc+0x10/0x10
[   15.249306]  ? ktime_get_ts64+0x86/0x230
[   15.249330]  kunit_try_run_case+0x1a5/0x480
[   15.249355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.249379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.249402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.249427]  ? __kthread_parkme+0x82/0x180
[   15.249447]  ? preempt_count_sub+0x50/0x80
[   15.249472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.249497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.249522]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.249549]  kthread+0x337/0x6f0
[   15.249568]  ? trace_preempt_on+0x20/0xc0
[   15.249591]  ? __pfx_kthread+0x10/0x10
[   15.249611]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.249633]  ? calculate_sigpending+0x7b/0xa0
[   15.249677]  ? __pfx_kthread+0x10/0x10
[   15.249705]  ret_from_fork+0x116/0x1d0
[   15.249724]  ? __pfx_kthread+0x10/0x10
[   15.249747]  ret_from_fork_asm+0x1a/0x30
[   15.249779]  </TASK>
[   15.249790] 
[   15.263115] Allocated by task 280:
[   15.263521]  kasan_save_stack+0x45/0x70
[   15.263942]  kasan_save_track+0x18/0x40
[   15.264195]  kasan_save_alloc_info+0x3b/0x50
[   15.264473]  __kasan_kmalloc+0xb7/0xc0
[   15.265150]  __kmalloc_cache_noprof+0x189/0x420
[   15.265381]  kasan_bitops_generic+0x92/0x1c0
[   15.265785]  kunit_try_run_case+0x1a5/0x480
[   15.266148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.266473]  kthread+0x337/0x6f0
[   15.266661]  ret_from_fork+0x116/0x1d0
[   15.267075]  ret_from_fork_asm+0x1a/0x30
[   15.267414] 
[   15.267522] The buggy address belongs to the object at ffff8881016acd80
[   15.267522]  which belongs to the cache kmalloc-16 of size 16
[   15.268526] The buggy address is located 8 bytes inside of
[   15.268526]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.269448] 
[   15.269544] The buggy address belongs to the physical page:
[   15.270115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.270574] flags: 0x200000000000000(node=0|zone=2)
[   15.271066] page_type: f5(slab)
[   15.271323] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.271874] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.272197] page dumped because: kasan: bad access detected
[   15.272530] 
[   15.272627] Memory state around the buggy address:
[   15.273208]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.273495]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.274036] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.274528]                       ^
[   15.274730]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.275389]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.275933] ==================================================================
[   15.122873] ==================================================================
[   15.123497] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.124220] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   15.124599] 
[   15.124952] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.125000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.125012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.125033] Call Trace:
[   15.125048]  <TASK>
[   15.125077]  dump_stack_lvl+0x73/0xb0
[   15.125109]  print_report+0xd1/0x610
[   15.125302]  ? __virt_addr_valid+0x1db/0x2d0
[   15.125328]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.125359]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.125382]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.125413]  kasan_report+0x141/0x180
[   15.125436]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.125470]  kasan_check_range+0x10c/0x1c0
[   15.125495]  __kasan_check_write+0x18/0x20
[   15.125516]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.125546]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.125578]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.125602]  ? trace_hardirqs_on+0x37/0xe0
[   15.125625]  ? kasan_bitops_generic+0x92/0x1c0
[   15.125702]  kasan_bitops_generic+0x121/0x1c0
[   15.125736]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.125764]  ? __pfx_read_tsc+0x10/0x10
[   15.125788]  ? ktime_get_ts64+0x86/0x230
[   15.125815]  kunit_try_run_case+0x1a5/0x480
[   15.125839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.125863]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.125888]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.125915]  ? __kthread_parkme+0x82/0x180
[   15.125936]  ? preempt_count_sub+0x50/0x80
[   15.125960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.125986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.126011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.126037]  kthread+0x337/0x6f0
[   15.126066]  ? trace_preempt_on+0x20/0xc0
[   15.126089]  ? __pfx_kthread+0x10/0x10
[   15.126117]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.126140]  ? calculate_sigpending+0x7b/0xa0
[   15.126166]  ? __pfx_kthread+0x10/0x10
[   15.126188]  ret_from_fork+0x116/0x1d0
[   15.126209]  ? __pfx_kthread+0x10/0x10
[   15.126231]  ret_from_fork_asm+0x1a/0x30
[   15.126263]  </TASK>
[   15.126274] 
[   15.138490] Allocated by task 280:
[   15.138748]  kasan_save_stack+0x45/0x70
[   15.139067]  kasan_save_track+0x18/0x40
[   15.139275]  kasan_save_alloc_info+0x3b/0x50
[   15.139429]  __kasan_kmalloc+0xb7/0xc0
[   15.139564]  __kmalloc_cache_noprof+0x189/0x420
[   15.139923]  kasan_bitops_generic+0x92/0x1c0
[   15.140376]  kunit_try_run_case+0x1a5/0x480
[   15.140652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.140933]  kthread+0x337/0x6f0
[   15.141066]  ret_from_fork+0x116/0x1d0
[   15.141303]  ret_from_fork_asm+0x1a/0x30
[   15.141591] 
[   15.141754] The buggy address belongs to the object at ffff8881016acd80
[   15.141754]  which belongs to the cache kmalloc-16 of size 16
[   15.142260] The buggy address is located 8 bytes inside of
[   15.142260]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.142961] 
[   15.143043] The buggy address belongs to the physical page:
[   15.143352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.143854] flags: 0x200000000000000(node=0|zone=2)
[   15.144156] page_type: f5(slab)
[   15.144306] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.144718] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.145081] page dumped because: kasan: bad access detected
[   15.145365] 
[   15.145491] Memory state around the buggy address:
[   15.145707]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.146285]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.146646] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.146948]                       ^
[   15.147172]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147495]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147926] ==================================================================
[   15.076480] ==================================================================
[   15.076880] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.077312] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280
[   15.077631] 
[   15.077779] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.077845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.077858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.077878] Call Trace:
[   15.077893]  <TASK>
[   15.077907]  dump_stack_lvl+0x73/0xb0
[   15.077937]  print_report+0xd1/0x610
[   15.077959]  ? __virt_addr_valid+0x1db/0x2d0
[   15.078003]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.078033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.078073]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.078103]  kasan_report+0x141/0x180
[   15.078126]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.078162]  kasan_check_range+0x10c/0x1c0
[   15.078186]  __kasan_check_write+0x18/0x20
[   15.078207]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.078238]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.078269]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.078294]  ? trace_hardirqs_on+0x37/0xe0
[   15.078316]  ? kasan_bitops_generic+0x92/0x1c0
[   15.078365]  kasan_bitops_generic+0x121/0x1c0
[   15.078389]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.078416]  ? __pfx_read_tsc+0x10/0x10
[   15.078438]  ? ktime_get_ts64+0x86/0x230
[   15.078462]  kunit_try_run_case+0x1a5/0x480
[   15.078487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.078510]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.078535]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.078560]  ? __kthread_parkme+0x82/0x180
[   15.078581]  ? preempt_count_sub+0x50/0x80
[   15.078604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.078630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.078814]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.078843]  kthread+0x337/0x6f0
[   15.078864]  ? trace_preempt_on+0x20/0xc0
[   15.078888]  ? __pfx_kthread+0x10/0x10
[   15.078909]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.078932]  ? calculate_sigpending+0x7b/0xa0
[   15.078956]  ? __pfx_kthread+0x10/0x10
[   15.078978]  ret_from_fork+0x116/0x1d0
[   15.079027]  ? __pfx_kthread+0x10/0x10
[   15.079049]  ret_from_fork_asm+0x1a/0x30
[   15.079093]  </TASK>
[   15.079103] 
[   15.088425] Allocated by task 280:
[   15.088567]  kasan_save_stack+0x45/0x70
[   15.088771]  kasan_save_track+0x18/0x40
[   15.088982]  kasan_save_alloc_info+0x3b/0x50
[   15.089285]  __kasan_kmalloc+0xb7/0xc0
[   15.089534]  __kmalloc_cache_noprof+0x189/0x420
[   15.089797]  kasan_bitops_generic+0x92/0x1c0
[   15.090127]  kunit_try_run_case+0x1a5/0x480
[   15.090292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.090557]  kthread+0x337/0x6f0
[   15.090945]  ret_from_fork+0x116/0x1d0
[   15.091184]  ret_from_fork_asm+0x1a/0x30
[   15.091330] 
[   15.091402] The buggy address belongs to the object at ffff8881016acd80
[   15.091402]  which belongs to the cache kmalloc-16 of size 16
[   15.091948] The buggy address is located 8 bytes inside of
[   15.091948]  allocated 9-byte region [ffff8881016acd80, ffff8881016acd89)
[   15.092392] 
[   15.092465] The buggy address belongs to the physical page:
[   15.093068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac
[   15.093432] flags: 0x200000000000000(node=0|zone=2)
[   15.093644] page_type: f5(slab)
[   15.093766] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.094108] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.094540] page dumped because: kasan: bad access detected
[   15.095065] 
[   15.095249] Memory state around the buggy address:
[   15.095475]  ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   15.095833]  ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.096168] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.096479]                       ^
[   15.096637]  ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.096966]  ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.097374] ==================================================================