Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.871377] ==================================================================
[   18.871429] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   18.871489] Read of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261
[   18.871574] 
[   18.871704] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.871840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.871868] Hardware name: linux,dummy-virt (DT)
[   18.871926] Call trace:
[   18.871949]  show_stack+0x20/0x38 (C)
[   18.872002]  dump_stack_lvl+0x8c/0xd0
[   18.872148]  print_report+0x118/0x5d0
[   18.872323]  kasan_report+0xdc/0x128
[   18.872402]  __asan_report_load8_noabort+0x20/0x30
[   18.872568]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   18.872812]  kasan_bitops_generic+0x110/0x1c8
[   18.873100]  kunit_try_run_case+0x170/0x3f0
[   18.873153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.873210]  kthread+0x328/0x630
[   18.873499]  ret_from_fork+0x10/0x20
[   18.873643] 
[   18.873663] Allocated by task 261:
[   18.873693]  kasan_save_stack+0x3c/0x68
[   18.873735]  kasan_save_track+0x20/0x40
[   18.873828]  kasan_save_alloc_info+0x40/0x58
[   18.873875]  __kasan_kmalloc+0xd4/0xd8
[   18.873934]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.873977]  kasan_bitops_generic+0xa0/0x1c8
[   18.874044]  kunit_try_run_case+0x170/0x3f0
[   18.874085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.874367]  kthread+0x328/0x630
[   18.874559]  ret_from_fork+0x10/0x20
[   18.874656] 
[   18.874794] The buggy address belongs to the object at fff00000c59ab9a0
[   18.874794]  which belongs to the cache kmalloc-16 of size 16
[   18.874883] The buggy address is located 8 bytes inside of
[   18.874883]  allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9)
[   18.875128] 
[   18.875159] The buggy address belongs to the physical page:
[   18.875190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab
[   18.875286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.875374] page_type: f5(slab)
[   18.875537] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.875654] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.875725] page dumped because: kasan: bad access detected
[   18.875799] 
[   18.875860] Memory state around the buggy address:
[   18.875893]  fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   18.876293]  fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.876348] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.876634]                                   ^
[   18.876691]  fff00000c59aba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.876738]  fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.876877] ==================================================================
[   18.861329] ==================================================================
[   18.861381] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.861434] Read of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261
[   18.861484] 
[   18.861526] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.861757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.861856] Hardware name: linux,dummy-virt (DT)
[   18.861889] Call trace:
[   18.861921]  show_stack+0x20/0x38 (C)
[   18.861971]  dump_stack_lvl+0x8c/0xd0
[   18.862020]  print_report+0x118/0x5d0
[   18.862068]  kasan_report+0xdc/0x128
[   18.862555]  __asan_report_load8_noabort+0x20/0x30
[   18.862609]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.862670]  kasan_bitops_generic+0x110/0x1c8
[   18.862723]  kunit_try_run_case+0x170/0x3f0
[   18.862774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.862831]  kthread+0x328/0x630
[   18.862875]  ret_from_fork+0x10/0x20
[   18.863164] 
[   18.863185] Allocated by task 261:
[   18.863215]  kasan_save_stack+0x3c/0x68
[   18.863436]  kasan_save_track+0x20/0x40
[   18.863499]  kasan_save_alloc_info+0x40/0x58
[   18.863612]  __kasan_kmalloc+0xd4/0xd8
[   18.863702]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.863765]  kasan_bitops_generic+0xa0/0x1c8
[   18.863856]  kunit_try_run_case+0x170/0x3f0
[   18.864149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.864205]  kthread+0x328/0x630
[   18.864287]  ret_from_fork+0x10/0x20
[   18.864392] 
[   18.864443] The buggy address belongs to the object at fff00000c59ab9a0
[   18.864443]  which belongs to the cache kmalloc-16 of size 16
[   18.864516] The buggy address is located 8 bytes inside of
[   18.864516]  allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9)
[   18.864676] 
[   18.864704] The buggy address belongs to the physical page:
[   18.864735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab
[   18.864807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.864913] page_type: f5(slab)
[   18.864956] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.865010] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.865054] page dumped because: kasan: bad access detected
[   18.865095] 
[   18.865114] Memory state around the buggy address:
[   18.865148]  fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   18.865507]  fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.865625] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.865694]                                   ^
[   18.865731]  fff00000c59aba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.865806]  fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.865848] ==================================================================
[   18.884442] ==================================================================
[   18.884713] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   18.884769] Write of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261
[   18.884822] 
[   18.884851] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.884955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.885103] Hardware name: linux,dummy-virt (DT)
[   18.885263] Call trace:
[   18.885347]  show_stack+0x20/0x38 (C)
[   18.885440]  dump_stack_lvl+0x8c/0xd0
[   18.885665]  print_report+0x118/0x5d0
[   18.885775]  kasan_report+0xdc/0x128
[   18.885874]  kasan_check_range+0x100/0x1a8
[   18.886195]  __kasan_check_write+0x20/0x30
[   18.886470]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   18.886567]  kasan_bitops_generic+0x110/0x1c8
[   18.886619]  kunit_try_run_case+0x170/0x3f0
[   18.886950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.887085]  kthread+0x328/0x630
[   18.887133]  ret_from_fork+0x10/0x20
[   18.887223] 
[   18.887244] Allocated by task 261:
[   18.887356]  kasan_save_stack+0x3c/0x68
[   18.887399]  kasan_save_track+0x20/0x40
[   18.887439]  kasan_save_alloc_info+0x40/0x58
[   18.887482]  __kasan_kmalloc+0xd4/0xd8
[   18.887774]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.887822]  kasan_bitops_generic+0xa0/0x1c8
[   18.887928]  kunit_try_run_case+0x170/0x3f0
[   18.887990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.888084]  kthread+0x328/0x630
[   18.888186]  ret_from_fork+0x10/0x20
[   18.888223] 
[   18.888254] The buggy address belongs to the object at fff00000c59ab9a0
[   18.888254]  which belongs to the cache kmalloc-16 of size 16
[   18.888332] The buggy address is located 8 bytes inside of
[   18.888332]  allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9)
[   18.888451] 
[   18.888474] The buggy address belongs to the physical page:
[   18.888508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab
[   18.888712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.888982] page_type: f5(slab)
[   18.889085] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.889170] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.889349]  fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.891030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   18.892618]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   18.893069]  kasan_save_track+0x20/0x40
[   18.894125] 
[   18.894343] The buggy address is located 8 bytes inside of
[   18.894343]  allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9)
[   18.895117] page dumped because: kasan: bad access detected
[   18.895916]                                   ^
[   18.896581] Write of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261
[   18.898572]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   18.900105]  kthread+0x328/0x630
[   18.900578] The buggy address belongs to the physical page:
[   18.901333] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.902017]  fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.903205] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   18.903827] Hardware name: linux,dummy-virt (DT)
[   18.904863]  kasan_check_range+0x100/0x1a8
[   18.905960] 
[   18.906151]  kasan_save_stack+0x3c/0x68
[   18.906716]  kthread+0x328/0x630
[   18.907494] The buggy address is located 8 bytes inside of
[   18.907494]  allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9)
[   18.908361] 
[   18.908992] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.909727]  fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.916371] 
[   18.916488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.918613]  dump_stack_lvl+0x8c/0xd0
[   18.922570]  kasan_save_stack+0x3c/0x68
[   18.927348] The buggy address is located 8 bytes inside of
[   18.927348]  allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9)
[   18.932678] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.933854]  fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.934289] ==================================================================
[   18.877597] ==================================================================
[   18.877650] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   18.877702] Write of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261
[   18.877756] 
[   18.877828] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.878060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.878245] Hardware name: linux,dummy-virt (DT)
[   18.878286] Call trace:
[   18.878345]  show_stack+0x20/0x38 (C)
[   18.878398]  dump_stack_lvl+0x8c/0xd0
[   18.878743]  print_report+0x118/0x5d0
[   18.878862]  kasan_report+0xdc/0x128
[   18.878979]  kasan_check_range+0x100/0x1a8
[   18.879029]  __kasan_check_write+0x20/0x30
[   18.879075]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   18.879452]  kasan_bitops_generic+0x110/0x1c8
[   18.879546]  kunit_try_run_case+0x170/0x3f0
[   18.879646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.879704]  kthread+0x328/0x630
[   18.879847]  ret_from_fork+0x10/0x20
[   18.880084] 
[   18.880178] Allocated by task 261:
[   18.880212]  kasan_save_stack+0x3c/0x68
[   18.880556]  kasan_save_track+0x20/0x40
[   18.880638]  kasan_save_alloc_info+0x40/0x58
[   18.880740]  __kasan_kmalloc+0xd4/0xd8
[   18.880823]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.880865]  kasan_bitops_generic+0xa0/0x1c8
[   18.881072]  kunit_try_run_case+0x170/0x3f0
[   18.881118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.881165]  kthread+0x328/0x630
[   18.881387]  ret_from_fork+0x10/0x20
[   18.881429] 
[   18.881492] The buggy address belongs to the object at fff00000c59ab9a0
[   18.881492]  which belongs to the cache kmalloc-16 of size 16
[   18.881852] The buggy address is located 8 bytes inside of
[   18.881852]  allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9)
[   18.881966] 
[   18.881988] The buggy address belongs to the physical page:
[   18.882021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab
[   18.882101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.882151] page_type: f5(slab)
[   18.882482] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.882674] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.882973] page dumped because: kasan: bad access detected
[   18.883022] 
[   18.883042] Memory state around the buggy address:
[   18.883076]  fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   18.883124]  fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.883286] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.883487]                                   ^
[   18.883566]  fff00000c59aba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.883651]  fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.883691] ==================================================================
[   18.855404] ==================================================================
[   18.855466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.855518] Write of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261
[   18.855570] 
[   18.855601] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.855687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.855925] Hardware name: linux,dummy-virt (DT)
[   18.855970] Call trace:
[   18.855995]  show_stack+0x20/0x38 (C)
[   18.856047]  dump_stack_lvl+0x8c/0xd0
[   18.856365]  print_report+0x118/0x5d0
[   18.856477]  kasan_report+0xdc/0x128
[   18.856775]  kasan_check_range+0x100/0x1a8
[   18.856942]  __kasan_check_write+0x20/0x30
[   18.857175]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.857236]  kasan_bitops_generic+0x110/0x1c8
[   18.857345]  kunit_try_run_case+0x170/0x3f0
[   18.857467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.857523]  kthread+0x328/0x630
[   18.857566]  ret_from_fork+0x10/0x20
[   18.857621] 
[   18.857643] Allocated by task 261:
[   18.857683]  kasan_save_stack+0x3c/0x68
[   18.857728]  kasan_save_track+0x20/0x40
[   18.857767]  kasan_save_alloc_info+0x40/0x58
[   18.857882]  __kasan_kmalloc+0xd4/0xd8
[   18.857932]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.858014]  kasan_bitops_generic+0xa0/0x1c8
[   18.858231]  kunit_try_run_case+0x170/0x3f0
[   18.858309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.858356]  kthread+0x328/0x630
[   18.858509]  ret_from_fork+0x10/0x20
[   18.858554] 
[   18.858647] The buggy address belongs to the object at fff00000c59ab9a0
[   18.858647]  which belongs to the cache kmalloc-16 of size 16
[   18.858714] The buggy address is located 8 bytes inside of
[   18.858714]  allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9)
[   18.858820] 
[   18.858907] The buggy address belongs to the physical page:
[   18.858958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab
[   18.859045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.859149] page_type: f5(slab)
[   18.859260] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.859331] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.859529] page dumped because: kasan: bad access detected
[   18.859589] 
[   18.859609] Memory state around the buggy address:
[   18.859654]  fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   18.859701]  fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.859748] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.859789]                                   ^
[   18.860100]  fff00000c59aba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.860243]  fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.860352] ==================================================================
[   18.866456] ==================================================================
[   18.866518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   18.866711] Write of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261
[   18.866764] 
[   18.866812] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.867010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.867109] Hardware name: linux,dummy-virt (DT)
[   18.867144] Call trace:
[   18.867169]  show_stack+0x20/0x38 (C)
[   18.867220]  dump_stack_lvl+0x8c/0xd0
[   18.867268]  print_report+0x118/0x5d0
[   18.867314]  kasan_report+0xdc/0x128
[   18.867362]  kasan_check_range+0x100/0x1a8
[   18.867413]  __kasan_check_write+0x20/0x30
[   18.867460]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   18.867512]  kasan_bitops_generic+0x110/0x1c8
[   18.867561]  kunit_try_run_case+0x170/0x3f0
[   18.867612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.867667]  kthread+0x328/0x630
[   18.867712]  ret_from_fork+0x10/0x20
[   18.867762] 
[   18.867789] Allocated by task 261:
[   18.867912]  kasan_save_stack+0x3c/0x68
[   18.867955]  kasan_save_track+0x20/0x40
[   18.867994]  kasan_save_alloc_info+0x40/0x58
[   18.868038]  __kasan_kmalloc+0xd4/0xd8
[   18.868079]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.868123]  kasan_bitops_generic+0xa0/0x1c8
[   18.868163]  kunit_try_run_case+0x170/0x3f0
[   18.868287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.868528]  kthread+0x328/0x630
[   18.868568]  ret_from_fork+0x10/0x20
[   18.868861] 
[   18.868995] The buggy address belongs to the object at fff00000c59ab9a0
[   18.868995]  which belongs to the cache kmalloc-16 of size 16
[   18.869260] The buggy address is located 8 bytes inside of
[   18.869260]  allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9)
[   18.869395] 
[   18.869458] The buggy address belongs to the physical page:
[   18.869509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab
[   18.869611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.869661] page_type: f5(slab)
[   18.869700] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.869755] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.870111] page dumped because: kasan: bad access detected
[   18.870152] 
[   18.870192] Memory state around the buggy address:
[   18.870297]  fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   18.870373]  fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.870418] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.870460]                                   ^
[   18.870494]  fff00000c59aba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.870540]  fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.870615] ==================================================================

[   19.118866] ==================================================================
[   19.118921] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.118977] Read of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.119030] 
[   19.119063] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.119174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.119214] Hardware name: linux,dummy-virt (DT)
[   19.119247] Call trace:
[   19.119270]  show_stack+0x20/0x38 (C)
[   19.119323]  dump_stack_lvl+0x8c/0xd0
[   19.119375]  print_report+0x118/0x5d0
[   19.119425]  kasan_report+0xdc/0x128
[   19.119473]  __asan_report_load8_noabort+0x20/0x30
[   19.119527]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.119582]  kasan_bitops_generic+0x110/0x1c8
[   19.119646]  kunit_try_run_case+0x170/0x3f0
[   19.119696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.119751]  kthread+0x328/0x630
[   19.119796]  ret_from_fork+0x10/0x20
[   19.119847] 
[   19.119867] Allocated by task 261:
[   19.119900]  kasan_save_stack+0x3c/0x68
[   19.119943]  kasan_save_track+0x20/0x40
[   19.119984]  kasan_save_alloc_info+0x40/0x58
[   19.120025]  __kasan_kmalloc+0xd4/0xd8
[   19.120065]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.120108]  kasan_bitops_generic+0xa0/0x1c8
[   19.120176]  kunit_try_run_case+0x170/0x3f0
[   19.120334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.120381]  kthread+0x328/0x630
[   19.120417]  ret_from_fork+0x10/0x20
[   19.120467] 
[   19.120490] The buggy address belongs to the object at fff00000c1375bc0
[   19.120490]  which belongs to the cache kmalloc-16 of size 16
[   19.120575] The buggy address is located 8 bytes inside of
[   19.120575]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.120662] 
[   19.120691] The buggy address belongs to the physical page:
[   19.120725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.120800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.120851] page_type: f5(slab)
[   19.120891] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.120990] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.121036] page dumped because: kasan: bad access detected
[   19.121070] 
[   19.121092] Memory state around the buggy address:
[   19.121126]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.121201]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.121326] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.121397]                                               ^
[   19.121483]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.121590]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.121663] ==================================================================
[   19.129863] ==================================================================
[   19.129912] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   19.129958] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.130010] 
[   19.130039] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.130123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.130152] Hardware name: linux,dummy-virt (DT)
[   19.130186] Call trace:
[   19.130209]  show_stack+0x20/0x38 (C)
[   19.130260]  dump_stack_lvl+0x8c/0xd0
[   19.130311]  print_report+0x118/0x5d0
[   19.130360]  kasan_report+0xdc/0x128
[   19.130408]  kasan_check_range+0x100/0x1a8
[   19.130458]  __kasan_check_write+0x20/0x30
[   19.130506]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   19.130558]  kasan_bitops_generic+0x110/0x1c8
[   19.130606]  kunit_try_run_case+0x170/0x3f0
[   19.130796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.130917]  kthread+0x328/0x630
[   19.131146]  ret_from_fork+0x10/0x20
[   19.131205] 
[   19.131226] Allocated by task 261:
[   19.131257]  kasan_save_stack+0x3c/0x68
[   19.131309]  kasan_save_track+0x20/0x40
[   19.131507]  kasan_save_alloc_info+0x40/0x58
[   19.131558]  __kasan_kmalloc+0xd4/0xd8
[   19.131879]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.131961]  kasan_bitops_generic+0xa0/0x1c8
[   19.132035]  kunit_try_run_case+0x170/0x3f0
[   19.132153]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.132328]  kthread+0x328/0x630
[   19.132402]  ret_from_fork+0x10/0x20
[   19.132444] 
[   19.132513] The buggy address belongs to the object at fff00000c1375bc0
[   19.132513]  which belongs to the cache kmalloc-16 of size 16
[   19.132856] The buggy address is located 8 bytes inside of
[   19.132856]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.132972] 
[   19.133017] The buggy address belongs to the physical page:
[   19.133094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.133211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.133381] page_type: f5(slab)
[   19.133451] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.133538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.133581] page dumped because: kasan: bad access detected
[   19.133910] 
[   19.134030] Memory state around the buggy address:
[   19.134087]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.134264]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.134361] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.134499]                                               ^
[   19.134577]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.134873]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.134950] ==================================================================
[   19.143243] ==================================================================
[   19.143298] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   19.143352] Read of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.143406] 
[   19.143437] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.143522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.143551] Hardware name: linux,dummy-virt (DT)
[   19.143602] Call trace:
[   19.143642]  show_stack+0x20/0x38 (C)
[   19.143703]  dump_stack_lvl+0x8c/0xd0
[   19.143754]  print_report+0x118/0x5d0
[   19.143813]  kasan_report+0xdc/0x128
[   19.143862]  __asan_report_load8_noabort+0x20/0x30
[   19.143916]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   19.143971]  kasan_bitops_generic+0x110/0x1c8
[   19.144022]  kunit_try_run_case+0x170/0x3f0
[   19.144081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.144137]  kthread+0x328/0x630
[   19.144182]  ret_from_fork+0x10/0x20
[   19.144232] 
[   19.144253] Allocated by task 261:
[   19.144285]  kasan_save_stack+0x3c/0x68
[   19.144330]  kasan_save_track+0x20/0x40
[   19.144370]  kasan_save_alloc_info+0x40/0x58
[   19.144414]  __kasan_kmalloc+0xd4/0xd8
[   19.144453]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.144506]  kasan_bitops_generic+0xa0/0x1c8
[   19.144557]  kunit_try_run_case+0x170/0x3f0
[   19.144605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.145057]  kthread+0x328/0x630
[   19.145098]  ret_from_fork+0x10/0x20
[   19.145193] 
[   19.145242] The buggy address belongs to the object at fff00000c1375bc0
[   19.145242]  which belongs to the cache kmalloc-16 of size 16
[   19.145444] The buggy address is located 8 bytes inside of
[   19.145444]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.145550] 
[   19.145591] The buggy address belongs to the physical page:
[   19.145702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.146089] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.146400] page_type: f5(slab)
[   19.146785] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.146891] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.147023] page dumped because: kasan: bad access detected
[   19.147131] 
[   19.147222] Memory state around the buggy address:
[   19.147356]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.147443]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.147666] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.147713]                                               ^
[   19.147795]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.147860]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.147950] ==================================================================
[   19.126742] ==================================================================
[   19.126793] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.126847] Read of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.126898] 
[   19.126929] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.127013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.127042] Hardware name: linux,dummy-virt (DT)
[   19.127090] Call trace:
[   19.127130]  show_stack+0x20/0x38 (C)
[   19.127181]  dump_stack_lvl+0x8c/0xd0
[   19.127234]  print_report+0x118/0x5d0
[   19.127284]  kasan_report+0xdc/0x128
[   19.127333]  __asan_report_load8_noabort+0x20/0x30
[   19.127387]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.127442]  kasan_bitops_generic+0x110/0x1c8
[   19.127493]  kunit_try_run_case+0x170/0x3f0
[   19.127548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.127614]  kthread+0x328/0x630
[   19.128329]  ret_from_fork+0x10/0x20
[   19.128381] 
[   19.128486] Allocated by task 261:
[   19.128519]  kasan_save_stack+0x3c/0x68
[   19.128565]  kasan_save_track+0x20/0x40
[   19.128605]  kasan_save_alloc_info+0x40/0x58
[   19.128658]  __kasan_kmalloc+0xd4/0xd8
[   19.128697]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.128739]  kasan_bitops_generic+0xa0/0x1c8
[   19.128780]  kunit_try_run_case+0x170/0x3f0
[   19.128819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.128865]  kthread+0x328/0x630
[   19.128901]  ret_from_fork+0x10/0x20
[   19.128945] 
[   19.128965] The buggy address belongs to the object at fff00000c1375bc0
[   19.128965]  which belongs to the cache kmalloc-16 of size 16
[   19.129024] The buggy address is located 8 bytes inside of
[   19.129024]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.129088] 
[   19.129109] The buggy address belongs to the physical page:
[   19.129142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.129199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.129262] page_type: f5(slab)
[   19.129300] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.129354] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.129398] page dumped because: kasan: bad access detected
[   19.129433] 
[   19.129452] Memory state around the buggy address:
[   19.129486]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.129532]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.129578] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.129627]                                               ^
[   19.129665]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.129712]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.129754] ==================================================================
[   19.122313] ==================================================================
[   19.122367] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.122420] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.122471] 
[   19.122538] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.122658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.122687] Hardware name: linux,dummy-virt (DT)
[   19.122719] Call trace:
[   19.122874]  show_stack+0x20/0x38 (C)
[   19.123027]  dump_stack_lvl+0x8c/0xd0
[   19.123079]  print_report+0x118/0x5d0
[   19.123146]  kasan_report+0xdc/0x128
[   19.123206]  kasan_check_range+0x100/0x1a8
[   19.123257]  __kasan_check_write+0x20/0x30
[   19.123303]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.123374]  kasan_bitops_generic+0x110/0x1c8
[   19.123441]  kunit_try_run_case+0x170/0x3f0
[   19.123508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.123564]  kthread+0x328/0x630
[   19.123607]  ret_from_fork+0x10/0x20
[   19.123766] 
[   19.123787] Allocated by task 261:
[   19.123835]  kasan_save_stack+0x3c/0x68
[   19.123930]  kasan_save_track+0x20/0x40
[   19.124066]  kasan_save_alloc_info+0x40/0x58
[   19.124115]  __kasan_kmalloc+0xd4/0xd8
[   19.124167]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.124235]  kasan_bitops_generic+0xa0/0x1c8
[   19.124278]  kunit_try_run_case+0x170/0x3f0
[   19.124335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.124413]  kthread+0x328/0x630
[   19.124448]  ret_from_fork+0x10/0x20
[   19.124505] 
[   19.124543] The buggy address belongs to the object at fff00000c1375bc0
[   19.124543]  which belongs to the cache kmalloc-16 of size 16
[   19.124603] The buggy address is located 8 bytes inside of
[   19.124603]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.124788] 
[   19.124811] The buggy address belongs to the physical page:
[   19.124950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.125006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.125093] page_type: f5(slab)
[   19.125181] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.125237] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.125341] page dumped because: kasan: bad access detected
[   19.125409] 
[   19.125430] Memory state around the buggy address:
[   19.125486]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.125535]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.125763] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.125910]                                               ^
[   19.125977]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.126098]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.126150] ==================================================================
[   19.114307] ==================================================================
[   19.114374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.114558] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.114722] 
[   19.114766] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.114869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.114926] Hardware name: linux,dummy-virt (DT)
[   19.114963] Call trace:
[   19.114989]  show_stack+0x20/0x38 (C)
[   19.115072]  dump_stack_lvl+0x8c/0xd0
[   19.115124]  print_report+0x118/0x5d0
[   19.115191]  kasan_report+0xdc/0x128
[   19.115244]  kasan_check_range+0x100/0x1a8
[   19.115295]  __kasan_check_write+0x20/0x30
[   19.115341]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.115396]  kasan_bitops_generic+0x110/0x1c8
[   19.115452]  kunit_try_run_case+0x170/0x3f0
[   19.115715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.115790]  kthread+0x328/0x630
[   19.115883]  ret_from_fork+0x10/0x20
[   19.115935] 
[   19.115974] Allocated by task 261:
[   19.116024]  kasan_save_stack+0x3c/0x68
[   19.116069]  kasan_save_track+0x20/0x40
[   19.116110]  kasan_save_alloc_info+0x40/0x58
[   19.116344]  __kasan_kmalloc+0xd4/0xd8
[   19.116391]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.116442]  kasan_bitops_generic+0xa0/0x1c8
[   19.116512]  kunit_try_run_case+0x170/0x3f0
[   19.116570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.116662]  kthread+0x328/0x630
[   19.116698]  ret_from_fork+0x10/0x20
[   19.116754] 
[   19.116782] The buggy address belongs to the object at fff00000c1375bc0
[   19.116782]  which belongs to the cache kmalloc-16 of size 16
[   19.116843] The buggy address is located 8 bytes inside of
[   19.116843]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.117119] 
[   19.117170] The buggy address belongs to the physical page:
[   19.117247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.117350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.117405] page_type: f5(slab)
[   19.117466] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.117522] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.117566] page dumped because: kasan: bad access detected
[   19.117601] 
[   19.117631] Memory state around the buggy address:
[   19.117668]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.117714]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.117760] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.117847]                                               ^
[   19.117935]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.118044]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.118122] ==================================================================
[   19.148644] ==================================================================
[   19.148778] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   19.148863] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.148930] 
[   19.149042] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.149231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.149300] Hardware name: linux,dummy-virt (DT)
[   19.149463] Call trace:
[   19.149687]  show_stack+0x20/0x38 (C)
[   19.149799]  dump_stack_lvl+0x8c/0xd0
[   19.149877]  print_report+0x118/0x5d0
[   19.150024]  kasan_report+0xdc/0x128
[   19.150111]  kasan_check_range+0x100/0x1a8
[   19.150343]  __kasan_check_write+0x20/0x30
[   19.150513]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   19.150610]  kasan_bitops_generic+0x110/0x1c8
[   19.150790]  kunit_try_run_case+0x170/0x3f0
[   19.150869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.151144]  kthread+0x328/0x630
[   19.151263]  ret_from_fork+0x10/0x20
[   19.151339] 
[   19.151366] Allocated by task 261:
[   19.151615]  kasan_save_stack+0x3c/0x68
[   19.151748]  kasan_save_track+0x20/0x40
[   19.151910]  kasan_save_alloc_info+0x40/0x58
[   19.151976]  __kasan_kmalloc+0xd4/0xd8
[   19.152225]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.152350]  kasan_bitops_generic+0xa0/0x1c8
[   19.152460]  kunit_try_run_case+0x170/0x3f0
[   19.152765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.152847]  kthread+0x328/0x630
[   19.152964]  ret_from_fork+0x10/0x20
[   19.153048] 
[   19.153164] The buggy address belongs to the object at fff00000c1375bc0
[   19.153164]  which belongs to the cache kmalloc-16 of size 16
[   19.153250] The buggy address is located 8 bytes inside of
[   19.153250]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.153552] 
[   19.153608] The buggy address belongs to the physical page:
[   19.153660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.153813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.153950] page_type: f5(slab)
[   19.154004] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.154241] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.154378] page dumped because: kasan: bad access detected
[   19.154432] 
[   19.154533] Memory state around the buggy address:
[   19.154610]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.154741]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.154789] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.155077]                                               ^
[   19.155172]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.155271]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.155354] ==================================================================
[   19.163221] ==================================================================
[   19.163431] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   19.163523] Read of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.163585] 
[   19.163694] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.163785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.163913] Hardware name: linux,dummy-virt (DT)
[   19.163968] Call trace:
[   19.163996]  show_stack+0x20/0x38 (C)
[   19.164199]  dump_stack_lvl+0x8c/0xd0
[   19.164279]  print_report+0x118/0x5d0
[   19.164348]  kasan_report+0xdc/0x128
[   19.164406]  __asan_report_load8_noabort+0x20/0x30
[   19.164539]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   19.164615]  kasan_bitops_generic+0x110/0x1c8
[   19.164716]  kunit_try_run_case+0x170/0x3f0
[   19.164769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.164824]  kthread+0x328/0x630
[   19.165159]  ret_from_fork+0x10/0x20
[   19.165285] 
[   19.165355] Allocated by task 261:
[   19.165388]  kasan_save_stack+0x3c/0x68
[   19.165449]  kasan_save_track+0x20/0x40
[   19.165495]  kasan_save_alloc_info+0x40/0x58
[   19.165734]  __kasan_kmalloc+0xd4/0xd8
[   19.165806]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.165961]  kasan_bitops_generic+0xa0/0x1c8
[   19.166079]  kunit_try_run_case+0x170/0x3f0
[   19.166355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.166424]  kthread+0x328/0x630
[   19.166703]  ret_from_fork+0x10/0x20
[   19.166783] 
[   19.166845] The buggy address belongs to the object at fff00000c1375bc0
[   19.166845]  which belongs to the cache kmalloc-16 of size 16
[   19.166927] The buggy address is located 8 bytes inside of
[   19.166927]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.167042] 
[   19.167071] The buggy address belongs to the physical page:
[   19.167123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.167183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.167234] page_type: f5(slab)
[   19.167275] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.167330] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.167383] page dumped because: kasan: bad access detected
[   19.167426] 
[   19.167461] Memory state around the buggy address:
[   19.167496]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.167544]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.167591] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.167649]                                               ^
[   19.167685]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.167731]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.167782] ==================================================================
[   19.156073] ==================================================================
[   19.156130] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   19.156350] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.156461] 
[   19.156513] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.156608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.156704] Hardware name: linux,dummy-virt (DT)
[   19.156742] Call trace:
[   19.156768]  show_stack+0x20/0x38 (C)
[   19.156898]  dump_stack_lvl+0x8c/0xd0
[   19.156954]  print_report+0x118/0x5d0
[   19.157232]  kasan_report+0xdc/0x128
[   19.157366]  kasan_check_range+0x100/0x1a8
[   19.157497]  __kasan_check_write+0x20/0x30
[   19.157676]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   19.157871]  kasan_bitops_generic+0x110/0x1c8
[   19.158040]  kunit_try_run_case+0x170/0x3f0
[   19.158146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.158459]  kthread+0x328/0x630
[   19.158542]  ret_from_fork+0x10/0x20
[   19.158648] 
[   19.158672] Allocated by task 261:
[   19.158924]  kasan_save_stack+0x3c/0x68
[   19.159048]  kasan_save_track+0x20/0x40
[   19.159137]  kasan_save_alloc_info+0x40/0x58
[   19.159317]  __kasan_kmalloc+0xd4/0xd8
[   19.159496]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.159611]  kasan_bitops_generic+0xa0/0x1c8
[   19.159749]  kunit_try_run_case+0x170/0x3f0
[   19.159838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.160135]  kthread+0x328/0x630
[   19.160188]  ret_from_fork+0x10/0x20
[   19.160289] 
[   19.160347] The buggy address belongs to the object at fff00000c1375bc0
[   19.160347]  which belongs to the cache kmalloc-16 of size 16
[   19.160490] The buggy address is located 8 bytes inside of
[   19.160490]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.160747] 
[   19.160788] The buggy address belongs to the physical page:
[   19.160873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.160971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.161097] page_type: f5(slab)
[   19.161203] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.161376] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.161541] page dumped because: kasan: bad access detected
[   19.161656] 
[   19.161717] Memory state around the buggy address:
[   19.161862]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.161970]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.162263] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.162335]                                               ^
[   19.162425]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.162541]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.162654] ==================================================================
[   19.136022] ==================================================================
[   19.136107] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   19.136248] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.136307] 
[   19.136340] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.136679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.136741] Hardware name: linux,dummy-virt (DT)
[   19.136790] Call trace:
[   19.136816]  show_stack+0x20/0x38 (C)
[   19.136870]  dump_stack_lvl+0x8c/0xd0
[   19.136922]  print_report+0x118/0x5d0
[   19.137078]  kasan_report+0xdc/0x128
[   19.137223]  kasan_check_range+0x100/0x1a8
[   19.137331]  __kasan_check_write+0x20/0x30
[   19.137389]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   19.137723]  kasan_bitops_generic+0x110/0x1c8
[   19.137814]  kunit_try_run_case+0x170/0x3f0
[   19.137983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.138151]  kthread+0x328/0x630
[   19.138249]  ret_from_fork+0x10/0x20
[   19.138354] 
[   19.138376] Allocated by task 261:
[   19.138670]  kasan_save_stack+0x3c/0x68
[   19.138743]  kasan_save_track+0x20/0x40
[   19.139009]  kasan_save_alloc_info+0x40/0x58
[   19.139156]  __kasan_kmalloc+0xd4/0xd8
[   19.139328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.139464]  kasan_bitops_generic+0xa0/0x1c8
[   19.139504]  kunit_try_run_case+0x170/0x3f0
[   19.139911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.140009]  kthread+0x328/0x630
[   19.140092]  ret_from_fork+0x10/0x20
[   19.140239] 
[   19.140298] The buggy address belongs to the object at fff00000c1375bc0
[   19.140298]  which belongs to the cache kmalloc-16 of size 16
[   19.140466] The buggy address is located 8 bytes inside of
[   19.140466]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.140557] 
[   19.140813] The buggy address belongs to the physical page:
[   19.140855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.141029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.141139] page_type: f5(slab)
[   19.141243] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.141332] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.141411] page dumped because: kasan: bad access detected
[   19.141507] 
[   19.141531] Memory state around the buggy address:
[   19.141565]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.141646]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.141693] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.141927]                                               ^
[   19.142156]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.142365]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.142459] ==================================================================

[   14.881997] ==================================================================
[   14.882233] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.882548] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.882906] 
[   14.883044] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.883087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.883099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.883120] Call Trace:
[   14.883135]  <TASK>
[   14.883150]  dump_stack_lvl+0x73/0xb0
[   14.883178]  print_report+0xd1/0x610
[   14.883244]  ? __virt_addr_valid+0x1db/0x2d0
[   14.883281]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.883308]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.883330]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.883357]  kasan_report+0x141/0x180
[   14.883379]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.883421]  kasan_check_range+0x10c/0x1c0
[   14.883445]  __kasan_check_write+0x18/0x20
[   14.883464]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.883489]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.883515]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.883540]  ? trace_hardirqs_on+0x37/0xe0
[   14.883561]  ? kasan_bitops_generic+0x92/0x1c0
[   14.883590]  kasan_bitops_generic+0x116/0x1c0
[   14.883613]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.883638]  ? __pfx_read_tsc+0x10/0x10
[   14.883660]  ? ktime_get_ts64+0x86/0x230
[   14.883683]  kunit_try_run_case+0x1a5/0x480
[   14.883709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.883731]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.883766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.883790]  ? __kthread_parkme+0x82/0x180
[   14.883810]  ? preempt_count_sub+0x50/0x80
[   14.883846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.883870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.883894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.883918]  kthread+0x337/0x6f0
[   14.883937]  ? trace_preempt_on+0x20/0xc0
[   14.883959]  ? __pfx_kthread+0x10/0x10
[   14.883989]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.884010]  ? calculate_sigpending+0x7b/0xa0
[   14.884034]  ? __pfx_kthread+0x10/0x10
[   14.884067]  ret_from_fork+0x116/0x1d0
[   14.884118]  ? __pfx_kthread+0x10/0x10
[   14.884140]  ret_from_fork_asm+0x1a/0x30
[   14.884172]  </TASK>
[   14.884192] 
[   14.893939] Allocated by task 279:
[   14.894076]  kasan_save_stack+0x45/0x70
[   14.894228]  kasan_save_track+0x18/0x40
[   14.894431]  kasan_save_alloc_info+0x3b/0x50
[   14.894639]  __kasan_kmalloc+0xb7/0xc0
[   14.894828]  __kmalloc_cache_noprof+0x189/0x420
[   14.895335]  kasan_bitops_generic+0x92/0x1c0
[   14.895564]  kunit_try_run_case+0x1a5/0x480
[   14.895865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.896318]  kthread+0x337/0x6f0
[   14.896505]  ret_from_fork+0x116/0x1d0
[   14.897432]  ret_from_fork_asm+0x1a/0x30
[   14.898050] 
[   14.898169] The buggy address belongs to the object at ffff888101b1cc00
[   14.898169]  which belongs to the cache kmalloc-16 of size 16
[   14.899388] The buggy address is located 8 bytes inside of
[   14.899388]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   14.899988] 
[   14.900134] The buggy address belongs to the physical page:
[   14.900370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   14.901210] flags: 0x200000000000000(node=0|zone=2)
[   14.901453] page_type: f5(slab)
[   14.901858] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.902730] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.903619] page dumped because: kasan: bad access detected
[   14.903944] 
[   14.904049] Memory state around the buggy address:
[   14.904540]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.905187]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.905854] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.906389]                       ^
[   14.906815]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.907436]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.907950] ==================================================================
[   14.818894] ==================================================================
[   14.819250] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.819625] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.819994] 
[   14.820184] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.820229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.820241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.820263] Call Trace:
[   14.820275]  <TASK>
[   14.820292]  dump_stack_lvl+0x73/0xb0
[   14.820321]  print_report+0xd1/0x610
[   14.820344]  ? __virt_addr_valid+0x1db/0x2d0
[   14.820375]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.820419]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.820443]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.820469]  kasan_report+0x141/0x180
[   14.820492]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.820523]  kasan_check_range+0x10c/0x1c0
[   14.820547]  __kasan_check_write+0x18/0x20
[   14.820576]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.820602]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.820629]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.820664]  ? trace_hardirqs_on+0x37/0xe0
[   14.820692]  ? kasan_bitops_generic+0x92/0x1c0
[   14.820722]  kasan_bitops_generic+0x116/0x1c0
[   14.820745]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.820771]  ? __pfx_read_tsc+0x10/0x10
[   14.820791]  ? ktime_get_ts64+0x86/0x230
[   14.820816]  kunit_try_run_case+0x1a5/0x480
[   14.820841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.820863]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.820888]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.820911]  ? __kthread_parkme+0x82/0x180
[   14.820933]  ? preempt_count_sub+0x50/0x80
[   14.820957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.820982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.821014]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.821099]  kthread+0x337/0x6f0
[   14.821120]  ? trace_preempt_on+0x20/0xc0
[   14.821143]  ? __pfx_kthread+0x10/0x10
[   14.821165]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.821187]  ? calculate_sigpending+0x7b/0xa0
[   14.821212]  ? __pfx_kthread+0x10/0x10
[   14.821234]  ret_from_fork+0x116/0x1d0
[   14.821253]  ? __pfx_kthread+0x10/0x10
[   14.821274]  ret_from_fork_asm+0x1a/0x30
[   14.821306]  </TASK>
[   14.821316] 
[   14.831010] Allocated by task 279:
[   14.831143]  kasan_save_stack+0x45/0x70
[   14.831290]  kasan_save_track+0x18/0x40
[   14.831514]  kasan_save_alloc_info+0x3b/0x50
[   14.831729]  __kasan_kmalloc+0xb7/0xc0
[   14.831954]  __kmalloc_cache_noprof+0x189/0x420
[   14.832487]  kasan_bitops_generic+0x92/0x1c0
[   14.832700]  kunit_try_run_case+0x1a5/0x480
[   14.832853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.833031]  kthread+0x337/0x6f0
[   14.833154]  ret_from_fork+0x116/0x1d0
[   14.833288]  ret_from_fork_asm+0x1a/0x30
[   14.833494] 
[   14.833591] The buggy address belongs to the object at ffff888101b1cc00
[   14.833591]  which belongs to the cache kmalloc-16 of size 16
[   14.834341] The buggy address is located 8 bytes inside of
[   14.834341]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   14.835979] 
[   14.836312] The buggy address belongs to the physical page:
[   14.836574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   14.836945] flags: 0x200000000000000(node=0|zone=2)
[   14.837328] page_type: f5(slab)
[   14.837518] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.837870] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.838143] page dumped because: kasan: bad access detected
[   14.838481] 
[   14.838578] Memory state around the buggy address:
[   14.838756]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.839148]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.839419] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.839767]                       ^
[   14.839962]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.840390]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.840701] ==================================================================
[   14.861959] ==================================================================
[   14.862472] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.862949] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.863365] 
[   14.863488] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.863535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.863547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.863568] Call Trace:
[   14.863582]  <TASK>
[   14.863598]  dump_stack_lvl+0x73/0xb0
[   14.863626]  print_report+0xd1/0x610
[   14.863648]  ? __virt_addr_valid+0x1db/0x2d0
[   14.863671]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.863696]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.863718]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.863744]  kasan_report+0x141/0x180
[   14.863767]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.863798]  kasan_check_range+0x10c/0x1c0
[   14.863822]  __kasan_check_write+0x18/0x20
[   14.863841]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.863869]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.863896]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.863921]  ? trace_hardirqs_on+0x37/0xe0
[   14.863943]  ? kasan_bitops_generic+0x92/0x1c0
[   14.863971]  kasan_bitops_generic+0x116/0x1c0
[   14.863994]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.864020]  ? __pfx_read_tsc+0x10/0x10
[   14.864041]  ? ktime_get_ts64+0x86/0x230
[   14.864094]  kunit_try_run_case+0x1a5/0x480
[   14.864120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.864144]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.864174]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.864198]  ? __kthread_parkme+0x82/0x180
[   14.864219]  ? preempt_count_sub+0x50/0x80
[   14.864243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.864267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.864291]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.864314]  kthread+0x337/0x6f0
[   14.864333]  ? trace_preempt_on+0x20/0xc0
[   14.864355]  ? __pfx_kthread+0x10/0x10
[   14.864377]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.864407]  ? calculate_sigpending+0x7b/0xa0
[   14.864430]  ? __pfx_kthread+0x10/0x10
[   14.864453]  ret_from_fork+0x116/0x1d0
[   14.864471]  ? __pfx_kthread+0x10/0x10
[   14.864493]  ret_from_fork_asm+0x1a/0x30
[   14.864524]  </TASK>
[   14.864535] 
[   14.873495] Allocated by task 279:
[   14.873692]  kasan_save_stack+0x45/0x70
[   14.873908]  kasan_save_track+0x18/0x40
[   14.874161]  kasan_save_alloc_info+0x3b/0x50
[   14.874386]  __kasan_kmalloc+0xb7/0xc0
[   14.874586]  __kmalloc_cache_noprof+0x189/0x420
[   14.874794]  kasan_bitops_generic+0x92/0x1c0
[   14.875005]  kunit_try_run_case+0x1a5/0x480
[   14.875279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.875522]  kthread+0x337/0x6f0
[   14.875711]  ret_from_fork+0x116/0x1d0
[   14.875846]  ret_from_fork_asm+0x1a/0x30
[   14.876013] 
[   14.876178] The buggy address belongs to the object at ffff888101b1cc00
[   14.876178]  which belongs to the cache kmalloc-16 of size 16
[   14.876767] The buggy address is located 8 bytes inside of
[   14.876767]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   14.877341] 
[   14.877456] The buggy address belongs to the physical page:
[   14.877722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   14.878177] flags: 0x200000000000000(node=0|zone=2)
[   14.878408] page_type: f5(slab)
[   14.878537] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.879001] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.879345] page dumped because: kasan: bad access detected
[   14.879538] 
[   14.879611] Memory state around the buggy address:
[   14.879769]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.879988]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.880217] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.880537]                       ^
[   14.880993]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.881328]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.881652] ==================================================================
[   14.723825] ==================================================================
[   14.724469] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.725234] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.725545] 
[   14.725636] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.725682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.725694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.725715] Call Trace:
[   14.725730]  <TASK>
[   14.725747]  dump_stack_lvl+0x73/0xb0
[   14.725778]  print_report+0xd1/0x610
[   14.725801]  ? __virt_addr_valid+0x1db/0x2d0
[   14.725825]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.725850]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.725873]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.725899]  kasan_report+0x141/0x180
[   14.725922]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.725953]  kasan_check_range+0x10c/0x1c0
[   14.725977]  __kasan_check_write+0x18/0x20
[   14.725996]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.726022]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.726101]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.726128]  ? trace_hardirqs_on+0x37/0xe0
[   14.726151]  ? kasan_bitops_generic+0x92/0x1c0
[   14.726181]  kasan_bitops_generic+0x116/0x1c0
[   14.726205]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.726231]  ? __pfx_read_tsc+0x10/0x10
[   14.726252]  ? ktime_get_ts64+0x86/0x230
[   14.726278]  kunit_try_run_case+0x1a5/0x480
[   14.726304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.726327]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.726351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.726375]  ? __kthread_parkme+0x82/0x180
[   14.726410]  ? preempt_count_sub+0x50/0x80
[   14.726438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.726463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.726487]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.726511]  kthread+0x337/0x6f0
[   14.726532]  ? trace_preempt_on+0x20/0xc0
[   14.726554]  ? __pfx_kthread+0x10/0x10
[   14.726576]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.726598]  ? calculate_sigpending+0x7b/0xa0
[   14.726622]  ? __pfx_kthread+0x10/0x10
[   14.726645]  ret_from_fork+0x116/0x1d0
[   14.726664]  ? __pfx_kthread+0x10/0x10
[   14.726686]  ret_from_fork_asm+0x1a/0x30
[   14.726718]  </TASK>
[   14.726728] 
[   14.735995] Allocated by task 279:
[   14.736188]  kasan_save_stack+0x45/0x70
[   14.736382]  kasan_save_track+0x18/0x40
[   14.736547]  kasan_save_alloc_info+0x3b/0x50
[   14.736914]  __kasan_kmalloc+0xb7/0xc0
[   14.737154]  __kmalloc_cache_noprof+0x189/0x420
[   14.737318]  kasan_bitops_generic+0x92/0x1c0
[   14.737485]  kunit_try_run_case+0x1a5/0x480
[   14.737644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.737896]  kthread+0x337/0x6f0
[   14.738114]  ret_from_fork+0x116/0x1d0
[   14.738300]  ret_from_fork_asm+0x1a/0x30
[   14.738458] 
[   14.738534] The buggy address belongs to the object at ffff888101b1cc00
[   14.738534]  which belongs to the cache kmalloc-16 of size 16
[   14.739506] The buggy address is located 8 bytes inside of
[   14.739506]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   14.740000] 
[   14.740211] The buggy address belongs to the physical page:
[   14.740441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   14.740898] flags: 0x200000000000000(node=0|zone=2)
[   14.741140] page_type: f5(slab)
[   14.741308] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.741772] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.742183] page dumped because: kasan: bad access detected
[   14.742415] 
[   14.742514] Memory state around the buggy address:
[   14.742797]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.743167]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.743442] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.743751]                       ^
[   14.743922]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.744362]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.744677] ==================================================================
[   14.769764] ==================================================================
[   14.770021] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.770763] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.771185] 
[   14.771380] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.771439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.771451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.771473] Call Trace:
[   14.771490]  <TASK>
[   14.771505]  dump_stack_lvl+0x73/0xb0
[   14.771697]  print_report+0xd1/0x610
[   14.771722]  ? __virt_addr_valid+0x1db/0x2d0
[   14.771746]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.771772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.771794]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.771820]  kasan_report+0x141/0x180
[   14.771843]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.771874]  kasan_check_range+0x10c/0x1c0
[   14.771898]  __kasan_check_write+0x18/0x20
[   14.771917]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.771943]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.771969]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.771993]  ? trace_hardirqs_on+0x37/0xe0
[   14.772016]  ? kasan_bitops_generic+0x92/0x1c0
[   14.772097]  kasan_bitops_generic+0x116/0x1c0
[   14.772122]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.772147]  ? __pfx_read_tsc+0x10/0x10
[   14.772169]  ? ktime_get_ts64+0x86/0x230
[   14.772195]  kunit_try_run_case+0x1a5/0x480
[   14.772219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.772242]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.772266]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.772289]  ? __kthread_parkme+0x82/0x180
[   14.772309]  ? preempt_count_sub+0x50/0x80
[   14.772334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.772359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.772383]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.772418]  kthread+0x337/0x6f0
[   14.772438]  ? trace_preempt_on+0x20/0xc0
[   14.772461]  ? __pfx_kthread+0x10/0x10
[   14.772482]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.772504]  ? calculate_sigpending+0x7b/0xa0
[   14.772528]  ? __pfx_kthread+0x10/0x10
[   14.772551]  ret_from_fork+0x116/0x1d0
[   14.772570]  ? __pfx_kthread+0x10/0x10
[   14.772591]  ret_from_fork_asm+0x1a/0x30
[   14.772623]  </TASK>
[   14.772634] 
[   14.781514] Allocated by task 279:
[   14.781970]  kasan_save_stack+0x45/0x70
[   14.782302]  kasan_save_track+0x18/0x40
[   14.782520]  kasan_save_alloc_info+0x3b/0x50
[   14.782708]  __kasan_kmalloc+0xb7/0xc0
[   14.782843]  __kmalloc_cache_noprof+0x189/0x420
[   14.783129]  kasan_bitops_generic+0x92/0x1c0
[   14.783357]  kunit_try_run_case+0x1a5/0x480
[   14.783581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.783806]  kthread+0x337/0x6f0
[   14.783983]  ret_from_fork+0x116/0x1d0
[   14.784204]  ret_from_fork_asm+0x1a/0x30
[   14.784419] 
[   14.784512] The buggy address belongs to the object at ffff888101b1cc00
[   14.784512]  which belongs to the cache kmalloc-16 of size 16
[   14.784987] The buggy address is located 8 bytes inside of
[   14.784987]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   14.785546] 
[   14.785667] The buggy address belongs to the physical page:
[   14.785880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   14.786380] flags: 0x200000000000000(node=0|zone=2)
[   14.786614] page_type: f5(slab)
[   14.786773] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.787179] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.787485] page dumped because: kasan: bad access detected
[   14.787746] 
[   14.787821] Memory state around the buggy address:
[   14.787978]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.788197]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.788424] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.788726]                       ^
[   14.789042]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.789363]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.789714] ==================================================================
[   14.790166] ==================================================================
[   14.790524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.791821] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.792992] 
[   14.793413] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.793465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.793478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.793501] Call Trace:
[   14.793514]  <TASK>
[   14.793530]  dump_stack_lvl+0x73/0xb0
[   14.793561]  print_report+0xd1/0x610
[   14.793584]  ? __virt_addr_valid+0x1db/0x2d0
[   14.793607]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.793631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.793654]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.793955]  kasan_report+0x141/0x180
[   14.793988]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.794023]  kasan_check_range+0x10c/0x1c0
[   14.794100]  __kasan_check_write+0x18/0x20
[   14.794124]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.794150]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.794178]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.794203]  ? trace_hardirqs_on+0x37/0xe0
[   14.794227]  ? kasan_bitops_generic+0x92/0x1c0
[   14.794256]  kasan_bitops_generic+0x116/0x1c0
[   14.794280]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.794306]  ? __pfx_read_tsc+0x10/0x10
[   14.794327]  ? ktime_get_ts64+0x86/0x230
[   14.794352]  kunit_try_run_case+0x1a5/0x480
[   14.794378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.794413]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.794437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.794461]  ? __kthread_parkme+0x82/0x180
[   14.794482]  ? preempt_count_sub+0x50/0x80
[   14.794508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.794533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.794557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.794581]  kthread+0x337/0x6f0
[   14.794601]  ? trace_preempt_on+0x20/0xc0
[   14.794624]  ? __pfx_kthread+0x10/0x10
[   14.794645]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.794666]  ? calculate_sigpending+0x7b/0xa0
[   14.794690]  ? __pfx_kthread+0x10/0x10
[   14.794712]  ret_from_fork+0x116/0x1d0
[   14.794731]  ? __pfx_kthread+0x10/0x10
[   14.794752]  ret_from_fork_asm+0x1a/0x30
[   14.794785]  </TASK>
[   14.794796] 
[   14.809818] Allocated by task 279:
[   14.810006]  kasan_save_stack+0x45/0x70
[   14.810199]  kasan_save_track+0x18/0x40
[   14.810382]  kasan_save_alloc_info+0x3b/0x50
[   14.810546]  __kasan_kmalloc+0xb7/0xc0
[   14.810830]  __kmalloc_cache_noprof+0x189/0x420
[   14.811070]  kasan_bitops_generic+0x92/0x1c0
[   14.811225]  kunit_try_run_case+0x1a5/0x480
[   14.811524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.811869]  kthread+0x337/0x6f0
[   14.812227]  ret_from_fork+0x116/0x1d0
[   14.812385]  ret_from_fork_asm+0x1a/0x30
[   14.812562] 
[   14.812722] The buggy address belongs to the object at ffff888101b1cc00
[   14.812722]  which belongs to the cache kmalloc-16 of size 16
[   14.813347] The buggy address is located 8 bytes inside of
[   14.813347]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   14.813828] 
[   14.813931] The buggy address belongs to the physical page:
[   14.814193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   14.814585] flags: 0x200000000000000(node=0|zone=2)
[   14.814832] page_type: f5(slab)
[   14.815003] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.815446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.815728] page dumped because: kasan: bad access detected
[   14.815921] 
[   14.816018] Memory state around the buggy address:
[   14.816323]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.816583]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.816908] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.817413]                       ^
[   14.817563]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.817920]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.818243] ==================================================================
[   14.841238] ==================================================================
[   14.841882] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.842332] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.842717] 
[   14.842855] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.842902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.842914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.842936] Call Trace:
[   14.842952]  <TASK>
[   14.842968]  dump_stack_lvl+0x73/0xb0
[   14.842997]  print_report+0xd1/0x610
[   14.843019]  ? __virt_addr_valid+0x1db/0x2d0
[   14.843042]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.843068]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.843117]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.843144]  kasan_report+0x141/0x180
[   14.843215]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.843247]  kasan_check_range+0x10c/0x1c0
[   14.843271]  __kasan_check_write+0x18/0x20
[   14.843290]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.843316]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.843342]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.843367]  ? trace_hardirqs_on+0x37/0xe0
[   14.843389]  ? kasan_bitops_generic+0x92/0x1c0
[   14.843427]  kasan_bitops_generic+0x116/0x1c0
[   14.843451]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.843476]  ? __pfx_read_tsc+0x10/0x10
[   14.843498]  ? ktime_get_ts64+0x86/0x230
[   14.843522]  kunit_try_run_case+0x1a5/0x480
[   14.843547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.843570]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.843594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.843617]  ? __kthread_parkme+0x82/0x180
[   14.843639]  ? preempt_count_sub+0x50/0x80
[   14.843663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.843687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.843720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.843744]  kthread+0x337/0x6f0
[   14.843763]  ? trace_preempt_on+0x20/0xc0
[   14.843796]  ? __pfx_kthread+0x10/0x10
[   14.843818]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.843838]  ? calculate_sigpending+0x7b/0xa0
[   14.843862]  ? __pfx_kthread+0x10/0x10
[   14.843884]  ret_from_fork+0x116/0x1d0
[   14.843903]  ? __pfx_kthread+0x10/0x10
[   14.843923]  ret_from_fork_asm+0x1a/0x30
[   14.843955]  </TASK>
[   14.843966] 
[   14.852907] Allocated by task 279:
[   14.853150]  kasan_save_stack+0x45/0x70
[   14.853357]  kasan_save_track+0x18/0x40
[   14.853558]  kasan_save_alloc_info+0x3b/0x50
[   14.853771]  __kasan_kmalloc+0xb7/0xc0
[   14.853939]  __kmalloc_cache_noprof+0x189/0x420
[   14.854169]  kasan_bitops_generic+0x92/0x1c0
[   14.854392]  kunit_try_run_case+0x1a5/0x480
[   14.854637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.854862]  kthread+0x337/0x6f0
[   14.855105]  ret_from_fork+0x116/0x1d0
[   14.855286]  ret_from_fork_asm+0x1a/0x30
[   14.855453] 
[   14.855528] The buggy address belongs to the object at ffff888101b1cc00
[   14.855528]  which belongs to the cache kmalloc-16 of size 16
[   14.856090] The buggy address is located 8 bytes inside of
[   14.856090]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   14.856785] 
[   14.856866] The buggy address belongs to the physical page:
[   14.857042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   14.857284] flags: 0x200000000000000(node=0|zone=2)
[   14.857527] page_type: f5(slab)
[   14.857694] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.858036] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.858466] page dumped because: kasan: bad access detected
[   14.858727] 
[   14.858800] Memory state around the buggy address:
[   14.858958]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.859742]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.860076] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.860389]                       ^
[   14.860525]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.861014]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.861348] ==================================================================
[   14.745226] ==================================================================
[   14.745594] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.745922] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.746265] 
[   14.746387] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.746442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.746455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.746477] Call Trace:
[   14.746489]  <TASK>
[   14.746504]  dump_stack_lvl+0x73/0xb0
[   14.746534]  print_report+0xd1/0x610
[   14.746556]  ? __virt_addr_valid+0x1db/0x2d0
[   14.746579]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.746604]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.746626]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.746653]  kasan_report+0x141/0x180
[   14.746675]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.746708]  kasan_check_range+0x10c/0x1c0
[   14.746732]  __kasan_check_write+0x18/0x20
[   14.746751]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.746777]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.746804]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.746828]  ? trace_hardirqs_on+0x37/0xe0
[   14.746850]  ? kasan_bitops_generic+0x92/0x1c0
[   14.746878]  kasan_bitops_generic+0x116/0x1c0
[   14.746901]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.746927]  ? __pfx_read_tsc+0x10/0x10
[   14.746949]  ? ktime_get_ts64+0x86/0x230
[   14.746973]  kunit_try_run_case+0x1a5/0x480
[   14.747000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.747023]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.747047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.747071]  ? __kthread_parkme+0x82/0x180
[   14.747092]  ? preempt_count_sub+0x50/0x80
[   14.747157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.747186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.747209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.747234]  kthread+0x337/0x6f0
[   14.747254]  ? trace_preempt_on+0x20/0xc0
[   14.747277]  ? __pfx_kthread+0x10/0x10
[   14.747298]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.747320]  ? calculate_sigpending+0x7b/0xa0
[   14.747344]  ? __pfx_kthread+0x10/0x10
[   14.747367]  ret_from_fork+0x116/0x1d0
[   14.747386]  ? __pfx_kthread+0x10/0x10
[   14.747418]  ret_from_fork_asm+0x1a/0x30
[   14.747451]  </TASK>
[   14.747462] 
[   14.756456] Allocated by task 279:
[   14.756618]  kasan_save_stack+0x45/0x70
[   14.756827]  kasan_save_track+0x18/0x40
[   14.756990]  kasan_save_alloc_info+0x3b/0x50
[   14.757234]  __kasan_kmalloc+0xb7/0xc0
[   14.757463]  __kmalloc_cache_noprof+0x189/0x420
[   14.757627]  kasan_bitops_generic+0x92/0x1c0
[   14.757786]  kunit_try_run_case+0x1a5/0x480
[   14.757939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.758118]  kthread+0x337/0x6f0
[   14.758241]  ret_from_fork+0x116/0x1d0
[   14.758375]  ret_from_fork_asm+0x1a/0x30
[   14.759537] 
[   14.760161] The buggy address belongs to the object at ffff888101b1cc00
[   14.760161]  which belongs to the cache kmalloc-16 of size 16
[   14.762014] The buggy address is located 8 bytes inside of
[   14.762014]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   14.762964] 
[   14.763074] The buggy address belongs to the physical page:
[   14.763339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   14.763725] flags: 0x200000000000000(node=0|zone=2)
[   14.763973] page_type: f5(slab)
[   14.764141] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.764595] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.764840] page dumped because: kasan: bad access detected
[   14.765457] 
[   14.765601] Memory state around the buggy address:
[   14.765948]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.766479]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.766948] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.767469]                       ^
[   14.767810]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.768535]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.769094] ==================================================================

[   14.992176] ==================================================================
[   14.993011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.993917] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   14.994817] 
[   14.995055] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.995102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.995115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.995137] Call Trace:
[   14.995166]  <TASK>
[   14.995184]  dump_stack_lvl+0x73/0xb0
[   14.995214]  print_report+0xd1/0x610
[   14.995236]  ? __virt_addr_valid+0x1db/0x2d0
[   14.995259]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.995284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.995305]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.995370]  kasan_report+0x141/0x180
[   14.995392]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.995433]  kasan_check_range+0x10c/0x1c0
[   14.995456]  __kasan_check_write+0x18/0x20
[   14.995475]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.995499]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.995525]  ? ret_from_fork_asm+0x1a/0x30
[   14.995547]  ? kthread+0x337/0x6f0
[   14.995573]  kasan_bitops_generic+0x116/0x1c0
[   14.995596]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.995618]  ? trace_hardirqs_on+0x37/0xe0
[   14.995642]  ? __pfx_read_tsc+0x10/0x10
[   14.995662]  ? ktime_get_ts64+0x86/0x230
[   14.995684]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.995709]  kunit_try_run_case+0x1a5/0x480
[   14.995735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.995758]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.995782]  ? __kthread_parkme+0x82/0x180
[   14.995802]  ? preempt_count_sub+0x50/0x80
[   14.995825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.995848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.995872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.995895]  kthread+0x337/0x6f0
[   14.995914]  ? trace_preempt_on+0x20/0xc0
[   14.995935]  ? __pfx_kthread+0x10/0x10
[   14.995955]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.995976]  ? calculate_sigpending+0x7b/0xa0
[   14.996000]  ? __pfx_kthread+0x10/0x10
[   14.996021]  ret_from_fork+0x116/0x1d0
[   14.996039]  ? __pfx_kthread+0x10/0x10
[   14.996059]  ret_from_fork_asm+0x1a/0x30
[   14.996089]  </TASK>
[   14.996100] 
[   15.008984] Allocated by task 279:
[   15.009121]  kasan_save_stack+0x45/0x70
[   15.009278]  kasan_save_track+0x18/0x40
[   15.009437]  kasan_save_alloc_info+0x3b/0x50
[   15.009665]  __kasan_kmalloc+0xb7/0xc0
[   15.009863]  __kmalloc_cache_noprof+0x189/0x420
[   15.010085]  kasan_bitops_generic+0x92/0x1c0
[   15.010268]  kunit_try_run_case+0x1a5/0x480
[   15.010493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.010861]  kthread+0x337/0x6f0
[   15.011030]  ret_from_fork+0x116/0x1d0
[   15.011215]  ret_from_fork_asm+0x1a/0x30
[   15.011507] 
[   15.011602] The buggy address belongs to the object at ffff88810210ec80
[   15.011602]  which belongs to the cache kmalloc-16 of size 16
[   15.012131] The buggy address is located 8 bytes inside of
[   15.012131]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   15.012705] 
[   15.012806] The buggy address belongs to the physical page:
[   15.013130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   15.013500] flags: 0x200000000000000(node=0|zone=2)
[   15.013730] page_type: f5(slab)
[   15.013849] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.014180] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.014525] page dumped because: kasan: bad access detected
[   15.014780] 
[   15.014890] Memory state around the buggy address:
[   15.015087]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.015422]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   15.015753] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.016020]                       ^
[   15.016140]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.016577]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.016896] ==================================================================
[   14.866393] ==================================================================
[   14.866731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.867662] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   14.867915] 
[   14.868011] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.868056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.868069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.868091] Call Trace:
[   14.868110]  <TASK>
[   14.868125]  dump_stack_lvl+0x73/0xb0
[   14.868168]  print_report+0xd1/0x610
[   14.868190]  ? __virt_addr_valid+0x1db/0x2d0
[   14.868212]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.868237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.868259]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.868284]  kasan_report+0x141/0x180
[   14.868305]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.868339]  kasan_check_range+0x10c/0x1c0
[   14.868363]  __kasan_check_write+0x18/0x20
[   14.868383]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.868801]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.868829]  ? ret_from_fork_asm+0x1a/0x30
[   14.868873]  ? kthread+0x337/0x6f0
[   14.868899]  kasan_bitops_generic+0x116/0x1c0
[   14.868922]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.868946]  ? trace_hardirqs_on+0x37/0xe0
[   14.868969]  ? __pfx_read_tsc+0x10/0x10
[   14.868991]  ? ktime_get_ts64+0x86/0x230
[   14.869011]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.869038]  kunit_try_run_case+0x1a5/0x480
[   14.869062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.869085]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.869109]  ? __kthread_parkme+0x82/0x180
[   14.869128]  ? preempt_count_sub+0x50/0x80
[   14.869161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.869184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.869208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.869231]  kthread+0x337/0x6f0
[   14.869250]  ? trace_preempt_on+0x20/0xc0
[   14.869271]  ? __pfx_kthread+0x10/0x10
[   14.869291]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.869319]  ? calculate_sigpending+0x7b/0xa0
[   14.869342]  ? __pfx_kthread+0x10/0x10
[   14.869363]  ret_from_fork+0x116/0x1d0
[   14.869381]  ? __pfx_kthread+0x10/0x10
[   14.869402]  ret_from_fork_asm+0x1a/0x30
[   14.869431]  </TASK>
[   14.869441] 
[   14.887216] Allocated by task 279:
[   14.887473]  kasan_save_stack+0x45/0x70
[   14.887894]  kasan_save_track+0x18/0x40
[   14.888394]  kasan_save_alloc_info+0x3b/0x50
[   14.888555]  __kasan_kmalloc+0xb7/0xc0
[   14.888691]  __kmalloc_cache_noprof+0x189/0x420
[   14.888860]  kasan_bitops_generic+0x92/0x1c0
[   14.889319]  kunit_try_run_case+0x1a5/0x480
[   14.889764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.890492]  kthread+0x337/0x6f0
[   14.890829]  ret_from_fork+0x116/0x1d0
[   14.891387]  ret_from_fork_asm+0x1a/0x30
[   14.891761] 
[   14.892010] The buggy address belongs to the object at ffff88810210ec80
[   14.892010]  which belongs to the cache kmalloc-16 of size 16
[   14.892655] The buggy address is located 8 bytes inside of
[   14.892655]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   14.893357] 
[   14.893520] The buggy address belongs to the physical page:
[   14.894024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   14.894701] flags: 0x200000000000000(node=0|zone=2)
[   14.895335] page_type: f5(slab)
[   14.895643] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.896482] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.896715] page dumped because: kasan: bad access detected
[   14.896892] 
[   14.896963] Memory state around the buggy address:
[   14.897243]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.897654]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   14.897900] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.898196]                       ^
[   14.898443]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.898849]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.899231] ==================================================================
[   14.842296] ==================================================================
[   14.842648] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.843330] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   14.843574] 
[   14.843689] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.843732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.843744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.843767] Call Trace:
[   14.843782]  <TASK>
[   14.843797]  dump_stack_lvl+0x73/0xb0
[   14.843825]  print_report+0xd1/0x610
[   14.843846]  ? __virt_addr_valid+0x1db/0x2d0
[   14.843921]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.843946]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.843969]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.843993]  kasan_report+0x141/0x180
[   14.844015]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.844044]  kasan_check_range+0x10c/0x1c0
[   14.844067]  __kasan_check_write+0x18/0x20
[   14.844086]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.844112]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.844137]  ? ret_from_fork_asm+0x1a/0x30
[   14.844175]  ? kthread+0x337/0x6f0
[   14.844199]  kasan_bitops_generic+0x116/0x1c0
[   14.844222]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.844246]  ? trace_hardirqs_on+0x37/0xe0
[   14.844269]  ? __pfx_read_tsc+0x10/0x10
[   14.844290]  ? ktime_get_ts64+0x86/0x230
[   14.844309]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.844350]  kunit_try_run_case+0x1a5/0x480
[   14.844374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.844398]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.844421]  ? __kthread_parkme+0x82/0x180
[   14.844441]  ? preempt_count_sub+0x50/0x80
[   14.844464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.844487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.844510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.844535]  kthread+0x337/0x6f0
[   14.844554]  ? trace_preempt_on+0x20/0xc0
[   14.844575]  ? __pfx_kthread+0x10/0x10
[   14.844596]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.844616]  ? calculate_sigpending+0x7b/0xa0
[   14.844640]  ? __pfx_kthread+0x10/0x10
[   14.844661]  ret_from_fork+0x116/0x1d0
[   14.844679]  ? __pfx_kthread+0x10/0x10
[   14.844699]  ret_from_fork_asm+0x1a/0x30
[   14.844729]  </TASK>
[   14.844738] 
[   14.853367] Allocated by task 279:
[   14.853556]  kasan_save_stack+0x45/0x70
[   14.853760]  kasan_save_track+0x18/0x40
[   14.854076]  kasan_save_alloc_info+0x3b/0x50
[   14.854307]  __kasan_kmalloc+0xb7/0xc0
[   14.854501]  __kmalloc_cache_noprof+0x189/0x420
[   14.854662]  kasan_bitops_generic+0x92/0x1c0
[   14.854812]  kunit_try_run_case+0x1a5/0x480
[   14.855393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.855939]  kthread+0x337/0x6f0
[   14.856086]  ret_from_fork+0x116/0x1d0
[   14.856238]  ret_from_fork_asm+0x1a/0x30
[   14.856387] 
[   14.856538] The buggy address belongs to the object at ffff88810210ec80
[   14.856538]  which belongs to the cache kmalloc-16 of size 16
[   14.857457] The buggy address is located 8 bytes inside of
[   14.857457]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   14.857982] 
[   14.858071] The buggy address belongs to the physical page:
[   14.858308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   14.859609] flags: 0x200000000000000(node=0|zone=2)
[   14.860087] page_type: f5(slab)
[   14.860291] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.860614] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.861227] page dumped because: kasan: bad access detected
[   14.861519] 
[   14.861614] Memory state around the buggy address:
[   14.861821]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.862181]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   14.862810] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.863784]                       ^
[   14.864295]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.864623]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.865191] ==================================================================
[   14.821959] ==================================================================
[   14.822683] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.823273] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   14.823585] 
[   14.823700] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.823749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.823762] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.823786] Call Trace:
[   14.823799]  <TASK>
[   14.823817]  dump_stack_lvl+0x73/0xb0
[   14.823849]  print_report+0xd1/0x610
[   14.823872]  ? __virt_addr_valid+0x1db/0x2d0
[   14.823896]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.823921]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.823943]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.823967]  kasan_report+0x141/0x180
[   14.823989]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.824019]  kasan_check_range+0x10c/0x1c0
[   14.824042]  __kasan_check_write+0x18/0x20
[   14.824061]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.824086]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.824112]  ? ret_from_fork_asm+0x1a/0x30
[   14.824134]  ? kthread+0x337/0x6f0
[   14.824173]  kasan_bitops_generic+0x116/0x1c0
[   14.824196]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.824218]  ? trace_hardirqs_on+0x37/0xe0
[   14.824243]  ? __pfx_read_tsc+0x10/0x10
[   14.824265]  ? ktime_get_ts64+0x86/0x230
[   14.824288]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.824313]  kunit_try_run_case+0x1a5/0x480
[   14.824344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.824369]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.824394]  ? __kthread_parkme+0x82/0x180
[   14.824413]  ? preempt_count_sub+0x50/0x80
[   14.824437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.824460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.824484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.824507]  kthread+0x337/0x6f0
[   14.824526]  ? trace_preempt_on+0x20/0xc0
[   14.824547]  ? __pfx_kthread+0x10/0x10
[   14.824567]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.824589]  ? calculate_sigpending+0x7b/0xa0
[   14.824614]  ? __pfx_kthread+0x10/0x10
[   14.824635]  ret_from_fork+0x116/0x1d0
[   14.824653]  ? __pfx_kthread+0x10/0x10
[   14.824674]  ret_from_fork_asm+0x1a/0x30
[   14.824703]  </TASK>
[   14.824713] 
[   14.832807] Allocated by task 279:
[   14.832946]  kasan_save_stack+0x45/0x70
[   14.833132]  kasan_save_track+0x18/0x40
[   14.833328]  kasan_save_alloc_info+0x3b/0x50
[   14.833540]  __kasan_kmalloc+0xb7/0xc0
[   14.833724]  __kmalloc_cache_noprof+0x189/0x420
[   14.833952]  kasan_bitops_generic+0x92/0x1c0
[   14.834200]  kunit_try_run_case+0x1a5/0x480
[   14.834660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.835035]  kthread+0x337/0x6f0
[   14.835216]  ret_from_fork+0x116/0x1d0
[   14.835414]  ret_from_fork_asm+0x1a/0x30
[   14.835558] 
[   14.835632] The buggy address belongs to the object at ffff88810210ec80
[   14.835632]  which belongs to the cache kmalloc-16 of size 16
[   14.836473] The buggy address is located 8 bytes inside of
[   14.836473]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   14.836944] 
[   14.837046] The buggy address belongs to the physical page:
[   14.837239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   14.837814] flags: 0x200000000000000(node=0|zone=2)
[   14.838182] page_type: f5(slab)
[   14.838309] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.838548] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.838780] page dumped because: kasan: bad access detected
[   14.839003] 
[   14.839097] Memory state around the buggy address:
[   14.839582]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.840247]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   14.840473] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.840690]                       ^
[   14.840816]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.841327]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.841658] ==================================================================
[   14.919003] ==================================================================
[   14.919314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.919663] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   14.920165] 
[   14.920271] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.920316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.920332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.920356] Call Trace:
[   14.920372]  <TASK>
[   14.920386]  dump_stack_lvl+0x73/0xb0
[   14.920414]  print_report+0xd1/0x610
[   14.920436]  ? __virt_addr_valid+0x1db/0x2d0
[   14.920458]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.920482]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.920504]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.920529]  kasan_report+0x141/0x180
[   14.920551]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.920581]  kasan_check_range+0x10c/0x1c0
[   14.920604]  __kasan_check_write+0x18/0x20
[   14.920624]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.920649]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.920675]  ? ret_from_fork_asm+0x1a/0x30
[   14.920697]  ? kthread+0x337/0x6f0
[   14.920721]  kasan_bitops_generic+0x116/0x1c0
[   14.920744]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.920766]  ? trace_hardirqs_on+0x37/0xe0
[   14.920791]  ? __pfx_read_tsc+0x10/0x10
[   14.920811]  ? ktime_get_ts64+0x86/0x230
[   14.920832]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.921049]  kunit_try_run_case+0x1a5/0x480
[   14.921077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.921101]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.921125]  ? __kthread_parkme+0x82/0x180
[   14.921159]  ? preempt_count_sub+0x50/0x80
[   14.921182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.921206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.921228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.921252]  kthread+0x337/0x6f0
[   14.921271]  ? trace_preempt_on+0x20/0xc0
[   14.921292]  ? __pfx_kthread+0x10/0x10
[   14.921312]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.921333]  ? calculate_sigpending+0x7b/0xa0
[   14.921357]  ? __pfx_kthread+0x10/0x10
[   14.921378]  ret_from_fork+0x116/0x1d0
[   14.921396]  ? __pfx_kthread+0x10/0x10
[   14.921416]  ret_from_fork_asm+0x1a/0x30
[   14.921445]  </TASK>
[   14.921455] 
[   14.929460] Allocated by task 279:
[   14.929637]  kasan_save_stack+0x45/0x70
[   14.930031]  kasan_save_track+0x18/0x40
[   14.930232]  kasan_save_alloc_info+0x3b/0x50
[   14.930442]  __kasan_kmalloc+0xb7/0xc0
[   14.930600]  __kmalloc_cache_noprof+0x189/0x420
[   14.930765]  kasan_bitops_generic+0x92/0x1c0
[   14.930974]  kunit_try_run_case+0x1a5/0x480
[   14.931188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.931470]  kthread+0x337/0x6f0
[   14.931609]  ret_from_fork+0x116/0x1d0
[   14.931777]  ret_from_fork_asm+0x1a/0x30
[   14.931949] 
[   14.932027] The buggy address belongs to the object at ffff88810210ec80
[   14.932027]  which belongs to the cache kmalloc-16 of size 16
[   14.932546] The buggy address is located 8 bytes inside of
[   14.932546]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   14.933001] 
[   14.933096] The buggy address belongs to the physical page:
[   14.933336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   14.933669] flags: 0x200000000000000(node=0|zone=2)
[   14.934004] page_type: f5(slab)
[   14.934170] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.934482] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.934711] page dumped because: kasan: bad access detected
[   14.934883] 
[   14.934953] Memory state around the buggy address:
[   14.935110]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.935338]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   14.935586] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.935909]                       ^
[   14.936089]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.936543]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.936856] ==================================================================
[   14.955716] ==================================================================
[   14.956026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.956412] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   14.956698] 
[   14.956806] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.956850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.956862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.956883] Call Trace:
[   14.956899]  <TASK>
[   14.956913]  dump_stack_lvl+0x73/0xb0
[   14.956940]  print_report+0xd1/0x610
[   14.956962]  ? __virt_addr_valid+0x1db/0x2d0
[   14.956983]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.957007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.957029]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.957053]  kasan_report+0x141/0x180
[   14.957075]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.957104]  kasan_check_range+0x10c/0x1c0
[   14.957127]  __kasan_check_write+0x18/0x20
[   14.957156]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.957181]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.957207]  ? ret_from_fork_asm+0x1a/0x30
[   14.957228]  ? kthread+0x337/0x6f0
[   14.957253]  kasan_bitops_generic+0x116/0x1c0
[   14.957276]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.957297]  ? trace_hardirqs_on+0x37/0xe0
[   14.957331]  ? __pfx_read_tsc+0x10/0x10
[   14.957351]  ? ktime_get_ts64+0x86/0x230
[   14.957372]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.957399]  kunit_try_run_case+0x1a5/0x480
[   14.957423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.957448]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.957471]  ? __kthread_parkme+0x82/0x180
[   14.957490]  ? preempt_count_sub+0x50/0x80
[   14.957513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.957537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.957560]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.957582]  kthread+0x337/0x6f0
[   14.957601]  ? trace_preempt_on+0x20/0xc0
[   14.957622]  ? __pfx_kthread+0x10/0x10
[   14.957642]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.957663]  ? calculate_sigpending+0x7b/0xa0
[   14.957685]  ? __pfx_kthread+0x10/0x10
[   14.957706]  ret_from_fork+0x116/0x1d0
[   14.957725]  ? __pfx_kthread+0x10/0x10
[   14.957744]  ret_from_fork_asm+0x1a/0x30
[   14.957773]  </TASK>
[   14.957784] 
[   14.973861] Allocated by task 279:
[   14.974483]  kasan_save_stack+0x45/0x70
[   14.975371]  kasan_save_track+0x18/0x40
[   14.976021]  kasan_save_alloc_info+0x3b/0x50
[   14.976587]  __kasan_kmalloc+0xb7/0xc0
[   14.977185]  __kmalloc_cache_noprof+0x189/0x420
[   14.977765]  kasan_bitops_generic+0x92/0x1c0
[   14.977932]  kunit_try_run_case+0x1a5/0x480
[   14.978092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.978985]  kthread+0x337/0x6f0
[   14.979557]  ret_from_fork+0x116/0x1d0
[   14.980207]  ret_from_fork_asm+0x1a/0x30
[   14.980813] 
[   14.981234] The buggy address belongs to the object at ffff88810210ec80
[   14.981234]  which belongs to the cache kmalloc-16 of size 16
[   14.982588] The buggy address is located 8 bytes inside of
[   14.982588]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   14.983087] 
[   14.983180] The buggy address belongs to the physical page:
[   14.983839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   14.985109] flags: 0x200000000000000(node=0|zone=2)
[   14.985706] page_type: f5(slab)
[   14.986228] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.986557] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.986794] page dumped because: kasan: bad access detected
[   14.986969] 
[   14.987044] Memory state around the buggy address:
[   14.987220]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.987951]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   14.988803] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.989577]                       ^
[   14.989943]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.990766]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.991467] ==================================================================
[   14.899819] ==================================================================
[   14.900169] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.900549] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   14.900871] 
[   14.900971] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.901014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.901026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.901049] Call Trace:
[   14.901063]  <TASK>
[   14.901079]  dump_stack_lvl+0x73/0xb0
[   14.901107]  print_report+0xd1/0x610
[   14.901128]  ? __virt_addr_valid+0x1db/0x2d0
[   14.901162]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.901189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.901210]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.901236]  kasan_report+0x141/0x180
[   14.901258]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.901287]  kasan_check_range+0x10c/0x1c0
[   14.901310]  __kasan_check_write+0x18/0x20
[   14.901330]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.901355]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.901462]  ? ret_from_fork_asm+0x1a/0x30
[   14.901487]  ? kthread+0x337/0x6f0
[   14.901512]  kasan_bitops_generic+0x116/0x1c0
[   14.901535]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.901559]  ? trace_hardirqs_on+0x37/0xe0
[   14.901582]  ? __pfx_read_tsc+0x10/0x10
[   14.901603]  ? ktime_get_ts64+0x86/0x230
[   14.901623]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.901651]  kunit_try_run_case+0x1a5/0x480
[   14.901675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.901699]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.901724]  ? __kthread_parkme+0x82/0x180
[   14.901744]  ? preempt_count_sub+0x50/0x80
[   14.901767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.901790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.901813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.901836]  kthread+0x337/0x6f0
[   14.901855]  ? trace_preempt_on+0x20/0xc0
[   14.901876]  ? __pfx_kthread+0x10/0x10
[   14.901897]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.901917]  ? calculate_sigpending+0x7b/0xa0
[   14.901941]  ? __pfx_kthread+0x10/0x10
[   14.901961]  ret_from_fork+0x116/0x1d0
[   14.901980]  ? __pfx_kthread+0x10/0x10
[   14.901999]  ret_from_fork_asm+0x1a/0x30
[   14.902029]  </TASK>
[   14.902039] 
[   14.910430] Allocated by task 279:
[   14.910557]  kasan_save_stack+0x45/0x70
[   14.910752]  kasan_save_track+0x18/0x40
[   14.910939]  kasan_save_alloc_info+0x3b/0x50
[   14.911165]  __kasan_kmalloc+0xb7/0xc0
[   14.911348]  __kmalloc_cache_noprof+0x189/0x420
[   14.911567]  kasan_bitops_generic+0x92/0x1c0
[   14.911965]  kunit_try_run_case+0x1a5/0x480
[   14.912157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.912350]  kthread+0x337/0x6f0
[   14.912524]  ret_from_fork+0x116/0x1d0
[   14.912713]  ret_from_fork_asm+0x1a/0x30
[   14.913061] 
[   14.913161] The buggy address belongs to the object at ffff88810210ec80
[   14.913161]  which belongs to the cache kmalloc-16 of size 16
[   14.913640] The buggy address is located 8 bytes inside of
[   14.913640]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   14.914235] 
[   14.914315] The buggy address belongs to the physical page:
[   14.914543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   14.914816] flags: 0x200000000000000(node=0|zone=2)
[   14.915104] page_type: f5(slab)
[   14.915298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.915541] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.915762] page dumped because: kasan: bad access detected
[   14.915928] 
[   14.915996] Memory state around the buggy address:
[   14.916156]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.916479]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   14.917112] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.917534]                       ^
[   14.917661]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.917952]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.918286] ==================================================================
[   14.937304] ==================================================================
[   14.937544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.937799] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   14.938322] 
[   14.938439] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.938481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.938493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.938515] Call Trace:
[   14.938528]  <TASK>
[   14.938542]  dump_stack_lvl+0x73/0xb0
[   14.938568]  print_report+0xd1/0x610
[   14.938590]  ? __virt_addr_valid+0x1db/0x2d0
[   14.938613]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.938637]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.938660]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.938685]  kasan_report+0x141/0x180
[   14.938706]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.938735]  kasan_check_range+0x10c/0x1c0
[   14.938758]  __kasan_check_write+0x18/0x20
[   14.938776]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.938802]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.938827]  ? ret_from_fork_asm+0x1a/0x30
[   14.938849]  ? kthread+0x337/0x6f0
[   14.938872]  kasan_bitops_generic+0x116/0x1c0
[   14.938895]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.938917]  ? trace_hardirqs_on+0x37/0xe0
[   14.938939]  ? __pfx_read_tsc+0x10/0x10
[   14.938959]  ? ktime_get_ts64+0x86/0x230
[   14.938979]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.939005]  kunit_try_run_case+0x1a5/0x480
[   14.939028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.939052]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.939076]  ? __kthread_parkme+0x82/0x180
[   14.939095]  ? preempt_count_sub+0x50/0x80
[   14.939118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.939141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.939176]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.939198]  kthread+0x337/0x6f0
[   14.939217]  ? trace_preempt_on+0x20/0xc0
[   14.939238]  ? __pfx_kthread+0x10/0x10
[   14.939259]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.939280]  ? calculate_sigpending+0x7b/0xa0
[   14.939302]  ? __pfx_kthread+0x10/0x10
[   14.939324]  ret_from_fork+0x116/0x1d0
[   14.939342]  ? __pfx_kthread+0x10/0x10
[   14.939362]  ret_from_fork_asm+0x1a/0x30
[   14.939392]  </TASK>
[   14.939401] 
[   14.947538] Allocated by task 279:
[   14.947673]  kasan_save_stack+0x45/0x70
[   14.947823]  kasan_save_track+0x18/0x40
[   14.947963]  kasan_save_alloc_info+0x3b/0x50
[   14.948115]  __kasan_kmalloc+0xb7/0xc0
[   14.948312]  __kmalloc_cache_noprof+0x189/0x420
[   14.948545]  kasan_bitops_generic+0x92/0x1c0
[   14.948758]  kunit_try_run_case+0x1a5/0x480
[   14.948972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.949246]  kthread+0x337/0x6f0
[   14.949521]  ret_from_fork+0x116/0x1d0
[   14.949707]  ret_from_fork_asm+0x1a/0x30
[   14.949875] 
[   14.949971] The buggy address belongs to the object at ffff88810210ec80
[   14.949971]  which belongs to the cache kmalloc-16 of size 16
[   14.950399] The buggy address is located 8 bytes inside of
[   14.950399]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   14.951236] 
[   14.951315] The buggy address belongs to the physical page:
[   14.951529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   14.951834] flags: 0x200000000000000(node=0|zone=2)
[   14.952080] page_type: f5(slab)
[   14.952255] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.952563] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.952845] page dumped because: kasan: bad access detected
[   14.953096] 
[   14.953202] Memory state around the buggy address:
[   14.953536]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.953829]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   14.954093] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.954438]                       ^
[   14.954615]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.954880]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.955180] ==================================================================