Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.207664] ==================================================================
[   19.207720] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   19.208164] Read of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.208245] 
[   19.208287] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.208669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.208722] Hardware name: linux,dummy-virt (DT)
[   19.208760] Call trace:
[   19.208784]  show_stack+0x20/0x38 (C)
[   19.208838]  dump_stack_lvl+0x8c/0xd0
[   19.208944]  print_report+0x118/0x5d0
[   19.209014]  kasan_report+0xdc/0x128
[   19.209064]  __asan_report_load8_noabort+0x20/0x30
[   19.209377]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   19.209552]  kasan_bitops_generic+0x11c/0x1c8
[   19.209985]  kunit_try_run_case+0x170/0x3f0
[   19.210366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.210491]  kthread+0x328/0x630
[   19.210571]  ret_from_fork+0x10/0x20
[   19.210651] 
[   19.210689] Allocated by task 261:
[   19.210732]  kasan_save_stack+0x3c/0x68
[   19.210779]  kasan_save_track+0x20/0x40
[   19.210820]  kasan_save_alloc_info+0x40/0x58
[   19.211054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.211523] page_type: f5(slab)
[   19.211561] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.211922] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.212063]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.214346] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.215007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.215684]  print_report+0x118/0x5d0
[   19.216108]  __kasan_check_write+0x20/0x30
[   19.217348]  kasan_save_alloc_info+0x40/0x58
[   19.218193]  kunit_try_run_case+0x170/0x3f0
[   19.218824] The buggy address belongs to the object at fff00000c1375bc0
[   19.218824]  which belongs to the cache kmalloc-16 of size 16
[   19.219803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.219912] page_type: f5(slab)
[   19.220434] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.222092]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.224104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.224501]  show_stack+0x20/0x38 (C)
[   19.225733]  kthread+0x328/0x630
[   19.226770]  kasan_save_alloc_info+0x40/0x58
[   19.227288]  kasan_bitops_generic+0xa0/0x1c8
[   19.227959] The buggy address is located 8 bytes inside of
[   19.227959]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.228172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.228329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.228609] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.229332] ==================================================================
[   19.198532] ==================================================================
[   19.198586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   19.199146] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.199215] 
[   19.199245] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.199342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.199612] Hardware name: linux,dummy-virt (DT)
[   19.199678] Call trace:
[   19.199703]  show_stack+0x20/0x38 (C)
[   19.199758]  dump_stack_lvl+0x8c/0xd0
[   19.200203]  print_report+0x118/0x5d0
[   19.200368]  kasan_report+0xdc/0x128
[   19.200428]  kasan_check_range+0x100/0x1a8
[   19.200478]  __kasan_check_write+0x20/0x30
[   19.200749]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   19.200886]  kasan_bitops_generic+0x11c/0x1c8
[   19.200956]  kunit_try_run_case+0x170/0x3f0
[   19.201009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.201076]  kthread+0x328/0x630
[   19.201415]  ret_from_fork+0x10/0x20
[   19.201598] 
[   19.201652] Allocated by task 261:
[   19.201969]  kasan_save_stack+0x3c/0x68
[   19.202063]  kasan_save_track+0x20/0x40
[   19.202169]  kasan_save_alloc_info+0x40/0x58
[   19.202239]  __kasan_kmalloc+0xd4/0xd8
[   19.202447]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.202689]  kasan_bitops_generic+0xa0/0x1c8
[   19.203099]  kunit_try_run_case+0x170/0x3f0
[   19.203224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.203356]  kthread+0x328/0x630
[   19.203413]  ret_from_fork+0x10/0x20
[   19.203453] 
[   19.203725] The buggy address belongs to the object at fff00000c1375bc0
[   19.203725]  which belongs to the cache kmalloc-16 of size 16
[   19.203814] The buggy address is located 8 bytes inside of
[   19.203814]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.204166] 
[   19.204258] The buggy address belongs to the physical page:
[   19.204344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.204440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.204639] page_type: f5(slab)
[   19.204805] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.204904] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.205069] page dumped because: kasan: bad access detected
[   19.205154] 
[   19.205212] Memory state around the buggy address:
[   19.205249]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.205527]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.205612] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.205765]                                               ^
[   19.205848]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.205926]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.206361] ==================================================================
[   19.168982] ==================================================================
[   19.169249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   19.169358] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.169412] 
[   19.170260] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.170422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.170538] Hardware name: linux,dummy-virt (DT)
[   19.170614] Call trace:
[   19.170950]  show_stack+0x20/0x38 (C)
[   19.171024]  dump_stack_lvl+0x8c/0xd0
[   19.171154]  print_report+0x118/0x5d0
[   19.171266]  kasan_report+0xdc/0x128
[   19.171565]  kasan_check_range+0x100/0x1a8
[   19.171736]  __kasan_check_write+0x20/0x30
[   19.171830]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   19.172208]  kasan_bitops_generic+0x11c/0x1c8
[   19.172261]  kunit_try_run_case+0x170/0x3f0
[   19.172596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.172695]  kthread+0x328/0x630
[   19.173051]  ret_from_fork+0x10/0x20
[   19.173216] 
[   19.173284] Allocated by task 261:
[   19.173642]  kasan_save_stack+0x3c/0x68
[   19.173730]  kasan_save_track+0x20/0x40
[   19.173853]  kasan_save_alloc_info+0x40/0x58
[   19.173990]  __kasan_kmalloc+0xd4/0xd8
[   19.174099]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.174144]  kasan_bitops_generic+0xa0/0x1c8
[   19.174206]  kunit_try_run_case+0x170/0x3f0
[   19.174247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.174564]  kthread+0x328/0x630
[   19.174745]  ret_from_fork+0x10/0x20
[   19.174823] 
[   19.174882] The buggy address belongs to the object at fff00000c1375bc0
[   19.174882]  which belongs to the cache kmalloc-16 of size 16
[   19.175381] The buggy address is located 8 bytes inside of
[   19.175381]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.175485] 
[   19.175643] The buggy address belongs to the physical page:
[   19.175711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.176088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.176492] page_type: f5(slab)
[   19.176566] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.176684] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.176730] page dumped because: kasan: bad access detected
[   19.176774] 
[   19.176797] Memory state around the buggy address:
[   19.176850]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.176896]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.176942] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.176990]                                               ^
[   19.177050]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.177110]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.177151] ==================================================================
[   19.177409] ==================================================================
[   19.177471] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   19.177525] Read of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.177590] 
[   19.177640] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.177723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.177757] Hardware name: linux,dummy-virt (DT)
[   19.177792] Call trace:
[   19.177816]  show_stack+0x20/0x38 (C)
[   19.177867]  dump_stack_lvl+0x8c/0xd0
[   19.177922]  print_report+0x118/0x5d0
[   19.177972]  kasan_report+0xdc/0x128
[   19.178019]  __asan_report_load8_noabort+0x20/0x30
[   19.178074]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   19.178132]  kasan_bitops_generic+0x11c/0x1c8
[   19.178183]  kunit_try_run_case+0x170/0x3f0
[   19.178242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.178308]  kthread+0x328/0x630
[   19.178352]  ret_from_fork+0x10/0x20
[   19.178409] 
[   19.178430] Allocated by task 261:
[   19.178461]  kasan_save_stack+0x3c/0x68
[   19.178510]  kasan_save_track+0x20/0x40
[   19.178549]  kasan_save_alloc_info+0x40/0x58
[   19.178592]  __kasan_kmalloc+0xd4/0xd8
[   19.178659]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.179104]  kasan_bitops_generic+0xa0/0x1c8
[   19.179176]  kunit_try_run_case+0x170/0x3f0
[   19.179218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.179266]  kthread+0x328/0x630
[   19.179300]  ret_from_fork+0x10/0x20
[   19.179339] 
[   19.179360] The buggy address belongs to the object at fff00000c1375bc0
[   19.179360]  which belongs to the cache kmalloc-16 of size 16
[   19.179422] The buggy address is located 8 bytes inside of
[   19.179422]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.180014] 
[   19.180395] The buggy address belongs to the physical page:
[   19.180750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.180900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.181025] page_type: f5(slab)
[   19.181076] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.181132] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.181178] page dumped because: kasan: bad access detected
[   19.181575] 
[   19.181699] Memory state around the buggy address:
[   19.181785]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.181951]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.182037] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.182094]                                               ^
[   19.182411]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.182670]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.182857] ==================================================================
[   19.190700] ==================================================================
[   19.190776] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   19.190958] Read of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.191031] 
[   19.191063] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.191415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.191469] Hardware name: linux,dummy-virt (DT)
[   19.191769] Call trace:
[   19.191821]  show_stack+0x20/0x38 (C)
[   19.191914]  dump_stack_lvl+0x8c/0xd0
[   19.192000]  print_report+0x118/0x5d0
[   19.192053]  kasan_report+0xdc/0x128
[   19.192158]  __asan_report_load8_noabort+0x20/0x30
[   19.192232]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   19.192323]  kasan_bitops_generic+0x11c/0x1c8
[   19.192377]  kunit_try_run_case+0x170/0x3f0
[   19.192445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.192781]  kthread+0x328/0x630
[   19.192846]  ret_from_fork+0x10/0x20
[   19.192901] 
[   19.192961] Allocated by task 261:
[   19.193041]  kasan_save_stack+0x3c/0x68
[   19.193211]  kasan_save_track+0x20/0x40
[   19.193278]  kasan_save_alloc_info+0x40/0x58
[   19.193452]  __kasan_kmalloc+0xd4/0xd8
[   19.193641]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.193783]  kasan_bitops_generic+0xa0/0x1c8
[   19.193899]  kunit_try_run_case+0x170/0x3f0
[   19.193963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.194296]  kthread+0x328/0x630
[   19.194663]  ret_from_fork+0x10/0x20
[   19.194801] 
[   19.194835] The buggy address belongs to the object at fff00000c1375bc0
[   19.194835]  which belongs to the cache kmalloc-16 of size 16
[   19.195207] The buggy address is located 8 bytes inside of
[   19.195207]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.195366] 
[   19.195394] The buggy address belongs to the physical page:
[   19.195719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.195814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.196256] page_type: f5(slab)
[   19.196583] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.196722] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.196819] page dumped because: kasan: bad access detected
[   19.196976] 
[   19.197009] Memory state around the buggy address:
[   19.197044]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.197099]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.197407] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.197550]                                               ^
[   19.197593]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.197908]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.198023] ==================================================================
[   19.183540] ==================================================================
[   19.183674] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   19.183784] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261
[   19.183868] 
[   19.183903] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.184145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.184296] Hardware name: linux,dummy-virt (DT)
[   19.184339] Call trace:
[   19.184365]  show_stack+0x20/0x38 (C)
[   19.184419]  dump_stack_lvl+0x8c/0xd0
[   19.184467]  print_report+0x118/0x5d0
[   19.184811]  kasan_report+0xdc/0x128
[   19.184953]  kasan_check_range+0x100/0x1a8
[   19.185075]  __kasan_check_write+0x20/0x30
[   19.185173]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   19.185352]  kasan_bitops_generic+0x11c/0x1c8
[   19.185403]  kunit_try_run_case+0x170/0x3f0
[   19.185459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.185514]  kthread+0x328/0x630
[   19.185557]  ret_from_fork+0x10/0x20
[   19.185606] 
[   19.185640] Allocated by task 261:
[   19.185671]  kasan_save_stack+0x3c/0x68
[   19.185715]  kasan_save_track+0x20/0x40
[   19.185756]  kasan_save_alloc_info+0x40/0x58
[   19.185799]  __kasan_kmalloc+0xd4/0xd8
[   19.185838]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.185880]  kasan_bitops_generic+0xa0/0x1c8
[   19.185929]  kunit_try_run_case+0x170/0x3f0
[   19.185970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.186017]  kthread+0x328/0x630
[   19.186414]  ret_from_fork+0x10/0x20
[   19.186508] 
[   19.186631] The buggy address belongs to the object at fff00000c1375bc0
[   19.186631]  which belongs to the cache kmalloc-16 of size 16
[   19.186725] The buggy address is located 8 bytes inside of
[   19.186725]  allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9)
[   19.186968] 
[   19.186992] The buggy address belongs to the physical page:
[   19.187054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375
[   19.187419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.187616] page_type: f5(slab)
[   19.187711] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.187849] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.187896] page dumped because: kasan: bad access detected
[   19.187961] 
[   19.188304] Memory state around the buggy address:
[   19.188721]  fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.189035]  fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.189133] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.189196]                                               ^
[   19.189265]  fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.189348]  fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.189661] ==================================================================

[   15.060037] ==================================================================
[   15.060503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.061171] Read of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   15.061531] 
[   15.061654] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.061698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.061711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.061730] Call Trace:
[   15.061746]  <TASK>
[   15.061761]  dump_stack_lvl+0x73/0xb0
[   15.061788]  print_report+0xd1/0x610
[   15.061809]  ? __virt_addr_valid+0x1db/0x2d0
[   15.061833]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.061860]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.061882]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.061942]  kasan_report+0x141/0x180
[   15.061965]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.062026]  kasan_check_range+0x10c/0x1c0
[   15.062049]  __kasan_check_read+0x15/0x20
[   15.062069]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.062097]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.062125]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.062150]  ? trace_hardirqs_on+0x37/0xe0
[   15.062172]  ? kasan_bitops_generic+0x92/0x1c0
[   15.062261]  kasan_bitops_generic+0x121/0x1c0
[   15.062289]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.062314]  ? __pfx_read_tsc+0x10/0x10
[   15.062348]  ? ktime_get_ts64+0x86/0x230
[   15.062372]  kunit_try_run_case+0x1a5/0x480
[   15.062405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.062429]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.062453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.062479]  ? __kthread_parkme+0x82/0x180
[   15.062501]  ? preempt_count_sub+0x50/0x80
[   15.062557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.062582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.062605]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.062640]  kthread+0x337/0x6f0
[   15.062660]  ? trace_preempt_on+0x20/0xc0
[   15.062682]  ? __pfx_kthread+0x10/0x10
[   15.062703]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.062752]  ? calculate_sigpending+0x7b/0xa0
[   15.062777]  ? __pfx_kthread+0x10/0x10
[   15.062823]  ret_from_fork+0x116/0x1d0
[   15.062843]  ? __pfx_kthread+0x10/0x10
[   15.062865]  ret_from_fork_asm+0x1a/0x30
[   15.062897]  </TASK>
[   15.062906] 
[   15.076428] Allocated by task 279:
[   15.076679]  kasan_save_stack+0x45/0x70
[   15.077105]  kasan_save_track+0x18/0x40
[   15.077323]  kasan_save_alloc_info+0x3b/0x50
[   15.077807]  __kasan_kmalloc+0xb7/0xc0
[   15.078024]  __kmalloc_cache_noprof+0x189/0x420
[   15.078459]  kasan_bitops_generic+0x92/0x1c0
[   15.078889]  kunit_try_run_case+0x1a5/0x480
[   15.079232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.079519]  kthread+0x337/0x6f0
[   15.079948]  ret_from_fork+0x116/0x1d0
[   15.080345]  ret_from_fork_asm+0x1a/0x30
[   15.080774] 
[   15.080897] The buggy address belongs to the object at ffff888101b1cc00
[   15.080897]  which belongs to the cache kmalloc-16 of size 16
[   15.081981] The buggy address is located 8 bytes inside of
[   15.081981]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   15.082683] 
[   15.082776] The buggy address belongs to the physical page:
[   15.083412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   15.083931] flags: 0x200000000000000(node=0|zone=2)
[   15.084413] page_type: f5(slab)
[   15.084594] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.085122] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.085607] page dumped because: kasan: bad access detected
[   15.085940] 
[   15.086020] Memory state around the buggy address:
[   15.086529]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.087016]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.087544] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.088057]                       ^
[   15.088248]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.088878]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.089279] ==================================================================
[   14.988996] ==================================================================
[   14.989257] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.989794] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.990279] 
[   14.990408] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.990452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.990465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.990487] Call Trace:
[   14.990501]  <TASK>
[   14.990517]  dump_stack_lvl+0x73/0xb0
[   14.990546]  print_report+0xd1/0x610
[   14.990567]  ? __virt_addr_valid+0x1db/0x2d0
[   14.990612]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.990639]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.990661]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.990689]  kasan_report+0x141/0x180
[   14.990711]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.990744]  kasan_check_range+0x10c/0x1c0
[   14.990767]  __kasan_check_write+0x18/0x20
[   14.990787]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.990814]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.990843]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.990867]  ? trace_hardirqs_on+0x37/0xe0
[   14.990889]  ? kasan_bitops_generic+0x92/0x1c0
[   14.990916]  kasan_bitops_generic+0x121/0x1c0
[   14.990940]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.990967]  ? __pfx_read_tsc+0x10/0x10
[   14.990987]  ? ktime_get_ts64+0x86/0x230
[   14.991065]  kunit_try_run_case+0x1a5/0x480
[   14.991097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.991120]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.991144]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.991168]  ? __kthread_parkme+0x82/0x180
[   14.991188]  ? preempt_count_sub+0x50/0x80
[   14.991213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.991238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.991260]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.991320]  kthread+0x337/0x6f0
[   14.991341]  ? trace_preempt_on+0x20/0xc0
[   14.991363]  ? __pfx_kthread+0x10/0x10
[   14.991421]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.991457]  ? calculate_sigpending+0x7b/0xa0
[   14.991495]  ? __pfx_kthread+0x10/0x10
[   14.991516]  ret_from_fork+0x116/0x1d0
[   14.991549]  ? __pfx_kthread+0x10/0x10
[   14.991601]  ret_from_fork_asm+0x1a/0x30
[   14.991657]  </TASK>
[   14.991667] 
[   15.001871] Allocated by task 279:
[   15.002121]  kasan_save_stack+0x45/0x70
[   15.002327]  kasan_save_track+0x18/0x40
[   15.002532]  kasan_save_alloc_info+0x3b/0x50
[   15.002769]  __kasan_kmalloc+0xb7/0xc0
[   15.002956]  __kmalloc_cache_noprof+0x189/0x420
[   15.003287]  kasan_bitops_generic+0x92/0x1c0
[   15.003531]  kunit_try_run_case+0x1a5/0x480
[   15.003806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.004349]  kthread+0x337/0x6f0
[   15.004535]  ret_from_fork+0x116/0x1d0
[   15.004736]  ret_from_fork_asm+0x1a/0x30
[   15.004887] 
[   15.004962] The buggy address belongs to the object at ffff888101b1cc00
[   15.004962]  which belongs to the cache kmalloc-16 of size 16
[   15.005324] The buggy address is located 8 bytes inside of
[   15.005324]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   15.005862] 
[   15.005968] The buggy address belongs to the physical page:
[   15.006229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   15.006704] flags: 0x200000000000000(node=0|zone=2)
[   15.006915] page_type: f5(slab)
[   15.007134] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.007424] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.007841] page dumped because: kasan: bad access detected
[   15.008243] 
[   15.008372] Memory state around the buggy address:
[   15.008695]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.009113]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.009612] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.009994]                       ^
[   15.010534]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.010937]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.011367] ==================================================================
[   15.036582] ==================================================================
[   15.036971] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.037457] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   15.037831] 
[   15.037943] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.037989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.038001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.038024] Call Trace:
[   15.038037]  <TASK>
[   15.038054]  dump_stack_lvl+0x73/0xb0
[   15.038157]  print_report+0xd1/0x610
[   15.038198]  ? __virt_addr_valid+0x1db/0x2d0
[   15.038222]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.038250]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.038301]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.038329]  kasan_report+0x141/0x180
[   15.038379]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.038428]  kasan_check_range+0x10c/0x1c0
[   15.038452]  __kasan_check_write+0x18/0x20
[   15.038471]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.038499]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.038527]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.038579]  ? trace_hardirqs_on+0x37/0xe0
[   15.038612]  ? kasan_bitops_generic+0x92/0x1c0
[   15.038652]  kasan_bitops_generic+0x121/0x1c0
[   15.038677]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.038730]  ? __pfx_read_tsc+0x10/0x10
[   15.038751]  ? ktime_get_ts64+0x86/0x230
[   15.038777]  kunit_try_run_case+0x1a5/0x480
[   15.038813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.038836]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.038860]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.038884]  ? __kthread_parkme+0x82/0x180
[   15.038930]  ? preempt_count_sub+0x50/0x80
[   15.038955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.038979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.039030]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.039064]  kthread+0x337/0x6f0
[   15.039084]  ? trace_preempt_on+0x20/0xc0
[   15.039106]  ? __pfx_kthread+0x10/0x10
[   15.039174]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.039195]  ? calculate_sigpending+0x7b/0xa0
[   15.039221]  ? __pfx_kthread+0x10/0x10
[   15.039266]  ret_from_fork+0x116/0x1d0
[   15.039295]  ? __pfx_kthread+0x10/0x10
[   15.039316]  ret_from_fork_asm+0x1a/0x30
[   15.039359]  </TASK>
[   15.039370] 
[   15.049622] Allocated by task 279:
[   15.049844]  kasan_save_stack+0x45/0x70
[   15.050063]  kasan_save_track+0x18/0x40
[   15.050331]  kasan_save_alloc_info+0x3b/0x50
[   15.050652]  __kasan_kmalloc+0xb7/0xc0
[   15.050828]  __kmalloc_cache_noprof+0x189/0x420
[   15.051082]  kasan_bitops_generic+0x92/0x1c0
[   15.051295]  kunit_try_run_case+0x1a5/0x480
[   15.051583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.051828]  kthread+0x337/0x6f0
[   15.052025]  ret_from_fork+0x116/0x1d0
[   15.052200]  ret_from_fork_asm+0x1a/0x30
[   15.052360] 
[   15.052467] The buggy address belongs to the object at ffff888101b1cc00
[   15.052467]  which belongs to the cache kmalloc-16 of size 16
[   15.053089] The buggy address is located 8 bytes inside of
[   15.053089]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   15.053513] 
[   15.053590] The buggy address belongs to the physical page:
[   15.054227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   15.054956] flags: 0x200000000000000(node=0|zone=2)
[   15.055301] page_type: f5(slab)
[   15.055493] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.055877] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.056307] page dumped because: kasan: bad access detected
[   15.056662] 
[   15.056807] Memory state around the buggy address:
[   15.057056]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.057522]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.058021] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.058485]                       ^
[   15.058686]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059282]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059564] ==================================================================
[   14.968640] ==================================================================
[   14.968983] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.969519] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.969781] 
[   14.969871] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.969913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.969925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.969947] Call Trace:
[   14.969960]  <TASK>
[   14.969976]  dump_stack_lvl+0x73/0xb0
[   14.970003]  print_report+0xd1/0x610
[   14.970025]  ? __virt_addr_valid+0x1db/0x2d0
[   14.970048]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.970075]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.970121]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.970148]  kasan_report+0x141/0x180
[   14.970172]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.970215]  kasan_check_range+0x10c/0x1c0
[   14.970238]  __kasan_check_write+0x18/0x20
[   14.970269]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.970296]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.970325]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.970349]  ? trace_hardirqs_on+0x37/0xe0
[   14.970370]  ? kasan_bitops_generic+0x92/0x1c0
[   14.970407]  kasan_bitops_generic+0x121/0x1c0
[   14.970431]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.970456]  ? __pfx_read_tsc+0x10/0x10
[   14.970477]  ? ktime_get_ts64+0x86/0x230
[   14.970501]  kunit_try_run_case+0x1a5/0x480
[   14.970525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.970548]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.970588]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.970612]  ? __kthread_parkme+0x82/0x180
[   14.970632]  ? preempt_count_sub+0x50/0x80
[   14.970657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.970682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.970705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.970728]  kthread+0x337/0x6f0
[   14.970748]  ? trace_preempt_on+0x20/0xc0
[   14.970770]  ? __pfx_kthread+0x10/0x10
[   14.970792]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.970813]  ? calculate_sigpending+0x7b/0xa0
[   14.970837]  ? __pfx_kthread+0x10/0x10
[   14.970858]  ret_from_fork+0x116/0x1d0
[   14.970877]  ? __pfx_kthread+0x10/0x10
[   14.970897]  ret_from_fork_asm+0x1a/0x30
[   14.970929]  </TASK>
[   14.970940] 
[   14.980308] Allocated by task 279:
[   14.980524]  kasan_save_stack+0x45/0x70
[   14.980756]  kasan_save_track+0x18/0x40
[   14.980947]  kasan_save_alloc_info+0x3b/0x50
[   14.981165]  __kasan_kmalloc+0xb7/0xc0
[   14.981350]  __kmalloc_cache_noprof+0x189/0x420
[   14.981566]  kasan_bitops_generic+0x92/0x1c0
[   14.981719]  kunit_try_run_case+0x1a5/0x480
[   14.981866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.982043]  kthread+0x337/0x6f0
[   14.982213]  ret_from_fork+0x116/0x1d0
[   14.982430]  ret_from_fork_asm+0x1a/0x30
[   14.982651] 
[   14.982750] The buggy address belongs to the object at ffff888101b1cc00
[   14.982750]  which belongs to the cache kmalloc-16 of size 16
[   14.983608] The buggy address is located 8 bytes inside of
[   14.983608]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   14.984181] 
[   14.984291] The buggy address belongs to the physical page:
[   14.984557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   14.984912] flags: 0x200000000000000(node=0|zone=2)
[   14.985248] page_type: f5(slab)
[   14.985425] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.985780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.986130] page dumped because: kasan: bad access detected
[   14.986405] 
[   14.986500] Memory state around the buggy address:
[   14.986734]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.987040]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.987340] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.987679]                       ^
[   14.987883]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.988246]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.988610] ==================================================================
[   14.929254] ==================================================================
[   14.929608] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.930065] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.930421] 
[   14.930545] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.930612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.930625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.930647] Call Trace:
[   14.930663]  <TASK>
[   14.930680]  dump_stack_lvl+0x73/0xb0
[   14.930708]  print_report+0xd1/0x610
[   14.930740]  ? __virt_addr_valid+0x1db/0x2d0
[   14.930763]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.930791]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.930823]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.930851]  kasan_report+0x141/0x180
[   14.930874]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.930915]  kasan_check_range+0x10c/0x1c0
[   14.930938]  __kasan_check_write+0x18/0x20
[   14.930957]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.930995]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.931051]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.931075]  ? trace_hardirqs_on+0x37/0xe0
[   14.931098]  ? kasan_bitops_generic+0x92/0x1c0
[   14.931125]  kasan_bitops_generic+0x121/0x1c0
[   14.931159]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.931184]  ? __pfx_read_tsc+0x10/0x10
[   14.931204]  ? ktime_get_ts64+0x86/0x230
[   14.931241]  kunit_try_run_case+0x1a5/0x480
[   14.931266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.931288]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.931312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.931344]  ? __kthread_parkme+0x82/0x180
[   14.931365]  ? preempt_count_sub+0x50/0x80
[   14.931389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.931432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.931455]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.931490]  kthread+0x337/0x6f0
[   14.931509]  ? trace_preempt_on+0x20/0xc0
[   14.931540]  ? __pfx_kthread+0x10/0x10
[   14.931560]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.931605]  ? calculate_sigpending+0x7b/0xa0
[   14.931630]  ? __pfx_kthread+0x10/0x10
[   14.931652]  ret_from_fork+0x116/0x1d0
[   14.931690]  ? __pfx_kthread+0x10/0x10
[   14.931711]  ret_from_fork_asm+0x1a/0x30
[   14.931744]  </TASK>
[   14.931764] 
[   14.940384] Allocated by task 279:
[   14.940536]  kasan_save_stack+0x45/0x70
[   14.940737]  kasan_save_track+0x18/0x40
[   14.940922]  kasan_save_alloc_info+0x3b/0x50
[   14.941149]  __kasan_kmalloc+0xb7/0xc0
[   14.941353]  __kmalloc_cache_noprof+0x189/0x420
[   14.941561]  kasan_bitops_generic+0x92/0x1c0
[   14.941802]  kunit_try_run_case+0x1a5/0x480
[   14.942029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.942328]  kthread+0x337/0x6f0
[   14.942512]  ret_from_fork+0x116/0x1d0
[   14.942739]  ret_from_fork_asm+0x1a/0x30
[   14.942934] 
[   14.943008] The buggy address belongs to the object at ffff888101b1cc00
[   14.943008]  which belongs to the cache kmalloc-16 of size 16
[   14.943629] The buggy address is located 8 bytes inside of
[   14.943629]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   14.943987] 
[   14.944060] The buggy address belongs to the physical page:
[   14.944237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   14.944538] flags: 0x200000000000000(node=0|zone=2)
[   14.944834] page_type: f5(slab)
[   14.945030] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.945439] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.945878] page dumped because: kasan: bad access detected
[   14.946131] 
[   14.946223] Memory state around the buggy address:
[   14.946384]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.946675]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.947043] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.947364]                       ^
[   14.947537]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.947871]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.948325] ==================================================================
[   14.908968] ==================================================================
[   14.909576] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.909964] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.910842] 
[   14.911091] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.911147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.911160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.911182] Call Trace:
[   14.911199]  <TASK>
[   14.911215]  dump_stack_lvl+0x73/0xb0
[   14.911245]  print_report+0xd1/0x610
[   14.911268]  ? __virt_addr_valid+0x1db/0x2d0
[   14.911291]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.911319]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.911341]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.911369]  kasan_report+0x141/0x180
[   14.911391]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.911433]  kasan_check_range+0x10c/0x1c0
[   14.911457]  __kasan_check_write+0x18/0x20
[   14.911476]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.911504]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.911532]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.911556]  ? trace_hardirqs_on+0x37/0xe0
[   14.911579]  ? kasan_bitops_generic+0x92/0x1c0
[   14.911607]  kasan_bitops_generic+0x121/0x1c0
[   14.911630]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.911655]  ? __pfx_read_tsc+0x10/0x10
[   14.911677]  ? ktime_get_ts64+0x86/0x230
[   14.911704]  kunit_try_run_case+0x1a5/0x480
[   14.911729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.911762]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.911787]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.911810]  ? __kthread_parkme+0x82/0x180
[   14.911842]  ? preempt_count_sub+0x50/0x80
[   14.911866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.911891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.911914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.911937]  kthread+0x337/0x6f0
[   14.911957]  ? trace_preempt_on+0x20/0xc0
[   14.911980]  ? __pfx_kthread+0x10/0x10
[   14.912001]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.912022]  ? calculate_sigpending+0x7b/0xa0
[   14.912047]  ? __pfx_kthread+0x10/0x10
[   14.912069]  ret_from_fork+0x116/0x1d0
[   14.912087]  ? __pfx_kthread+0x10/0x10
[   14.912109]  ret_from_fork_asm+0x1a/0x30
[   14.912142]  </TASK>
[   14.912152] 
[   14.920970] Allocated by task 279:
[   14.921257]  kasan_save_stack+0x45/0x70
[   14.921413]  kasan_save_track+0x18/0x40
[   14.921554]  kasan_save_alloc_info+0x3b/0x50
[   14.921716]  __kasan_kmalloc+0xb7/0xc0
[   14.921860]  __kmalloc_cache_noprof+0x189/0x420
[   14.922346]  kasan_bitops_generic+0x92/0x1c0
[   14.922779]  kunit_try_run_case+0x1a5/0x480
[   14.922990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.923354]  kthread+0x337/0x6f0
[   14.923513]  ret_from_fork+0x116/0x1d0
[   14.923711]  ret_from_fork_asm+0x1a/0x30
[   14.923927] 
[   14.924007] The buggy address belongs to the object at ffff888101b1cc00
[   14.924007]  which belongs to the cache kmalloc-16 of size 16
[   14.924487] The buggy address is located 8 bytes inside of
[   14.924487]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   14.925032] 
[   14.925106] The buggy address belongs to the physical page:
[   14.925280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   14.925552] flags: 0x200000000000000(node=0|zone=2)
[   14.925725] page_type: f5(slab)
[   14.925849] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.926329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.926671] page dumped because: kasan: bad access detected
[   14.926921] 
[   14.927014] Memory state around the buggy address:
[   14.927234]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.927576]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.927888] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.928101]                       ^
[   14.928224]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.928475]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.928756] ==================================================================
[   14.948874] ==================================================================
[   14.949278] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.949737] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   14.950126] 
[   14.950235] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.950291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.950302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.950324] Call Trace:
[   14.950349]  <TASK>
[   14.950365]  dump_stack_lvl+0x73/0xb0
[   14.950402]  print_report+0xd1/0x610
[   14.950424]  ? __virt_addr_valid+0x1db/0x2d0
[   14.950449]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.950476]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.950498]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.950526]  kasan_report+0x141/0x180
[   14.950548]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.950599]  kasan_check_range+0x10c/0x1c0
[   14.950624]  __kasan_check_write+0x18/0x20
[   14.950642]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.950670]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.950698]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.950723]  ? trace_hardirqs_on+0x37/0xe0
[   14.950747]  ? kasan_bitops_generic+0x92/0x1c0
[   14.950774]  kasan_bitops_generic+0x121/0x1c0
[   14.950799]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.950824]  ? __pfx_read_tsc+0x10/0x10
[   14.950854]  ? ktime_get_ts64+0x86/0x230
[   14.950881]  kunit_try_run_case+0x1a5/0x480
[   14.950906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.950939]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.950964]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.950987]  ? __kthread_parkme+0x82/0x180
[   14.951024]  ? preempt_count_sub+0x50/0x80
[   14.951049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.951073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.951097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.951119]  kthread+0x337/0x6f0
[   14.951140]  ? trace_preempt_on+0x20/0xc0
[   14.951162]  ? __pfx_kthread+0x10/0x10
[   14.951183]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.951204]  ? calculate_sigpending+0x7b/0xa0
[   14.951228]  ? __pfx_kthread+0x10/0x10
[   14.951250]  ret_from_fork+0x116/0x1d0
[   14.951269]  ? __pfx_kthread+0x10/0x10
[   14.951290]  ret_from_fork_asm+0x1a/0x30
[   14.951323]  </TASK>
[   14.951335] 
[   14.959733] Allocated by task 279:
[   14.959861]  kasan_save_stack+0x45/0x70
[   14.960003]  kasan_save_track+0x18/0x40
[   14.960140]  kasan_save_alloc_info+0x3b/0x50
[   14.960303]  __kasan_kmalloc+0xb7/0xc0
[   14.960706]  __kmalloc_cache_noprof+0x189/0x420
[   14.960937]  kasan_bitops_generic+0x92/0x1c0
[   14.961155]  kunit_try_run_case+0x1a5/0x480
[   14.961361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.961620]  kthread+0x337/0x6f0
[   14.961792]  ret_from_fork+0x116/0x1d0
[   14.961977]  ret_from_fork_asm+0x1a/0x30
[   14.962170] 
[   14.962265] The buggy address belongs to the object at ffff888101b1cc00
[   14.962265]  which belongs to the cache kmalloc-16 of size 16
[   14.962858] The buggy address is located 8 bytes inside of
[   14.962858]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   14.963215] 
[   14.963289] The buggy address belongs to the physical page:
[   14.963649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   14.964017] flags: 0x200000000000000(node=0|zone=2)
[   14.964491] page_type: f5(slab)
[   14.964691] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.965055] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.965371] page dumped because: kasan: bad access detected
[   14.965781] 
[   14.965921] Memory state around the buggy address:
[   14.966220]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   14.966509]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.966820] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.967230]                       ^
[   14.967458]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.967787]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.968171] ==================================================================
[   15.011806] ==================================================================
[   15.012377] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.012859] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   15.013300] 
[   15.013429] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.013505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.013518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.013551] Call Trace:
[   15.013566]  <TASK>
[   15.013599]  dump_stack_lvl+0x73/0xb0
[   15.013629]  print_report+0xd1/0x610
[   15.013651]  ? __virt_addr_valid+0x1db/0x2d0
[   15.013673]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.013700]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.013751]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.013780]  kasan_report+0x141/0x180
[   15.013802]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.013845]  kasan_check_range+0x10c/0x1c0
[   15.013870]  __kasan_check_write+0x18/0x20
[   15.013888]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.013917]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.013945]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.013968]  ? trace_hardirqs_on+0x37/0xe0
[   15.013990]  ? kasan_bitops_generic+0x92/0x1c0
[   15.014096]  kasan_bitops_generic+0x121/0x1c0
[   15.014137]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.014163]  ? __pfx_read_tsc+0x10/0x10
[   15.014205]  ? ktime_get_ts64+0x86/0x230
[   15.014241]  kunit_try_run_case+0x1a5/0x480
[   15.014266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.014300]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.014325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.014373]  ? __kthread_parkme+0x82/0x180
[   15.014409]  ? preempt_count_sub+0x50/0x80
[   15.014436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.014460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.014484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.014507]  kthread+0x337/0x6f0
[   15.014552]  ? trace_preempt_on+0x20/0xc0
[   15.014622]  ? __pfx_kthread+0x10/0x10
[   15.014645]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.014667]  ? calculate_sigpending+0x7b/0xa0
[   15.014703]  ? __pfx_kthread+0x10/0x10
[   15.014725]  ret_from_fork+0x116/0x1d0
[   15.014744]  ? __pfx_kthread+0x10/0x10
[   15.014764]  ret_from_fork_asm+0x1a/0x30
[   15.014815]  </TASK>
[   15.014834] 
[   15.025315] Allocated by task 279:
[   15.025562]  kasan_save_stack+0x45/0x70
[   15.025777]  kasan_save_track+0x18/0x40
[   15.026003]  kasan_save_alloc_info+0x3b/0x50
[   15.026293]  __kasan_kmalloc+0xb7/0xc0
[   15.026569]  __kmalloc_cache_noprof+0x189/0x420
[   15.026751]  kasan_bitops_generic+0x92/0x1c0
[   15.027084]  kunit_try_run_case+0x1a5/0x480
[   15.027309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.027834]  kthread+0x337/0x6f0
[   15.028015]  ret_from_fork+0x116/0x1d0
[   15.028714]  ret_from_fork_asm+0x1a/0x30
[   15.029036] 
[   15.029140] The buggy address belongs to the object at ffff888101b1cc00
[   15.029140]  which belongs to the cache kmalloc-16 of size 16
[   15.030157] The buggy address is located 8 bytes inside of
[   15.030157]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   15.030822] 
[   15.030956] The buggy address belongs to the physical page:
[   15.031352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   15.031777] flags: 0x200000000000000(node=0|zone=2)
[   15.032019] page_type: f5(slab)
[   15.032272] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.032749] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.033090] page dumped because: kasan: bad access detected
[   15.033539] 
[   15.033661] Memory state around the buggy address:
[   15.033927]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.034367]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.034734] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.035018]                       ^
[   15.035242]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.035607]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.035972] ==================================================================
[   15.090260] ==================================================================
[   15.091210] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.091574] Read of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279
[   15.091946] 
[   15.092046] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.092092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.092106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.092159] Call Trace:
[   15.092198]  <TASK>
[   15.092216]  dump_stack_lvl+0x73/0xb0
[   15.092271]  print_report+0xd1/0x610
[   15.092295]  ? __virt_addr_valid+0x1db/0x2d0
[   15.092318]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.092345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.092367]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.092406]  kasan_report+0x141/0x180
[   15.092429]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.092462]  __asan_report_load8_noabort+0x18/0x20
[   15.092487]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.092514]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.092544]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.092567]  ? trace_hardirqs_on+0x37/0xe0
[   15.092589]  ? kasan_bitops_generic+0x92/0x1c0
[   15.092618]  kasan_bitops_generic+0x121/0x1c0
[   15.092641]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.092670]  ? __pfx_read_tsc+0x10/0x10
[   15.092691]  ? ktime_get_ts64+0x86/0x230
[   15.092717]  kunit_try_run_case+0x1a5/0x480
[   15.092743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.092765]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.092789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.092813]  ? __kthread_parkme+0x82/0x180
[   15.092833]  ? preempt_count_sub+0x50/0x80
[   15.092858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.092882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.092905]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.092928]  kthread+0x337/0x6f0
[   15.092948]  ? trace_preempt_on+0x20/0xc0
[   15.092971]  ? __pfx_kthread+0x10/0x10
[   15.092992]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.093013]  ? calculate_sigpending+0x7b/0xa0
[   15.093061]  ? __pfx_kthread+0x10/0x10
[   15.093083]  ret_from_fork+0x116/0x1d0
[   15.093102]  ? __pfx_kthread+0x10/0x10
[   15.093123]  ret_from_fork_asm+0x1a/0x30
[   15.093155]  </TASK>
[   15.093166] 
[   15.102270] Allocated by task 279:
[   15.102421]  kasan_save_stack+0x45/0x70
[   15.102567]  kasan_save_track+0x18/0x40
[   15.102757]  kasan_save_alloc_info+0x3b/0x50
[   15.103018]  __kasan_kmalloc+0xb7/0xc0
[   15.103208]  __kmalloc_cache_noprof+0x189/0x420
[   15.103439]  kasan_bitops_generic+0x92/0x1c0
[   15.103893]  kunit_try_run_case+0x1a5/0x480
[   15.104160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.104456]  kthread+0x337/0x6f0
[   15.104642]  ret_from_fork+0x116/0x1d0
[   15.104784]  ret_from_fork_asm+0x1a/0x30
[   15.104926] 
[   15.104998] The buggy address belongs to the object at ffff888101b1cc00
[   15.104998]  which belongs to the cache kmalloc-16 of size 16
[   15.105547] The buggy address is located 8 bytes inside of
[   15.105547]  allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09)
[   15.106246] 
[   15.106351] The buggy address belongs to the physical page:
[   15.106618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c
[   15.107012] flags: 0x200000000000000(node=0|zone=2)
[   15.107261] page_type: f5(slab)
[   15.107436] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.107773] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.108147] page dumped because: kasan: bad access detected
[   15.108470] 
[   15.108564] Memory state around the buggy address:
[   15.108780]  ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   15.109000]  ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.109216] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.109442]                       ^
[   15.109565]  ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.109893]  ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.110232] ==================================================================

[   15.105367] ==================================================================
[   15.106279] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.106695] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   15.106974] 
[   15.107075] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.107119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.107131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.107174] Call Trace:
[   15.107193]  <TASK>
[   15.107208]  dump_stack_lvl+0x73/0xb0
[   15.107247]  print_report+0xd1/0x610
[   15.107268]  ? __virt_addr_valid+0x1db/0x2d0
[   15.107291]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.107317]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.107357]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.107384]  kasan_report+0x141/0x180
[   15.107405]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.107436]  kasan_check_range+0x10c/0x1c0
[   15.107460]  __kasan_check_write+0x18/0x20
[   15.107479]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.107505]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.107533]  ? ret_from_fork_asm+0x1a/0x30
[   15.107554]  ? kthread+0x337/0x6f0
[   15.107579]  kasan_bitops_generic+0x121/0x1c0
[   15.107601]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.107623]  ? trace_hardirqs_on+0x37/0xe0
[   15.107646]  ? __pfx_read_tsc+0x10/0x10
[   15.107668]  ? ktime_get_ts64+0x86/0x230
[   15.107689]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.107716]  kunit_try_run_case+0x1a5/0x480
[   15.107740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.107766]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.107790]  ? __kthread_parkme+0x82/0x180
[   15.107809]  ? preempt_count_sub+0x50/0x80
[   15.107832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.107857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.107880]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.107904]  kthread+0x337/0x6f0
[   15.107923]  ? trace_preempt_on+0x20/0xc0
[   15.107944]  ? __pfx_kthread+0x10/0x10
[   15.107964]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.107985]  ? calculate_sigpending+0x7b/0xa0
[   15.108009]  ? __pfx_kthread+0x10/0x10
[   15.108030]  ret_from_fork+0x116/0x1d0
[   15.108049]  ? __pfx_kthread+0x10/0x10
[   15.108069]  ret_from_fork_asm+0x1a/0x30
[   15.108099]  </TASK>
[   15.108109] 
[   15.118842] Allocated by task 279:
[   15.118979]  kasan_save_stack+0x45/0x70
[   15.119233]  kasan_save_track+0x18/0x40
[   15.119509]  kasan_save_alloc_info+0x3b/0x50
[   15.119724]  __kasan_kmalloc+0xb7/0xc0
[   15.119892]  __kmalloc_cache_noprof+0x189/0x420
[   15.120096]  kasan_bitops_generic+0x92/0x1c0
[   15.120278]  kunit_try_run_case+0x1a5/0x480
[   15.120463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.120716]  kthread+0x337/0x6f0
[   15.120937]  ret_from_fork+0x116/0x1d0
[   15.121103]  ret_from_fork_asm+0x1a/0x30
[   15.121277] 
[   15.121421] The buggy address belongs to the object at ffff88810210ec80
[   15.121421]  which belongs to the cache kmalloc-16 of size 16
[   15.121886] The buggy address is located 8 bytes inside of
[   15.121886]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   15.122263] 
[   15.122337] The buggy address belongs to the physical page:
[   15.122512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   15.122877] flags: 0x200000000000000(node=0|zone=2)
[   15.123111] page_type: f5(slab)
[   15.123315] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.123667] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.123991] page dumped because: kasan: bad access detected
[   15.124178] 
[   15.124249] Memory state around the buggy address:
[   15.124472]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.124785]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   15.125000] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.125247]                       ^
[   15.125397]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.125722]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.126038] ==================================================================
[   15.144489] ==================================================================
[   15.144863] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.145285] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   15.145637] 
[   15.145749] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.145793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.145805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.145827] Call Trace:
[   15.145843]  <TASK>
[   15.145859]  dump_stack_lvl+0x73/0xb0
[   15.145885]  print_report+0xd1/0x610
[   15.145907]  ? __virt_addr_valid+0x1db/0x2d0
[   15.145929]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.145955]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.145977]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.146004]  kasan_report+0x141/0x180
[   15.146026]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.146056]  kasan_check_range+0x10c/0x1c0
[   15.146080]  __kasan_check_write+0x18/0x20
[   15.146098]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.146125]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.146164]  ? ret_from_fork_asm+0x1a/0x30
[   15.146185]  ? kthread+0x337/0x6f0
[   15.146210]  kasan_bitops_generic+0x121/0x1c0
[   15.146233]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.146255]  ? trace_hardirqs_on+0x37/0xe0
[   15.146279]  ? __pfx_read_tsc+0x10/0x10
[   15.146319]  ? ktime_get_ts64+0x86/0x230
[   15.146340]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.146365]  kunit_try_run_case+0x1a5/0x480
[   15.146389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.146413]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.146439]  ? __kthread_parkme+0x82/0x180
[   15.146458]  ? preempt_count_sub+0x50/0x80
[   15.146482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.146506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.146529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.146552]  kthread+0x337/0x6f0
[   15.146572]  ? trace_preempt_on+0x20/0xc0
[   15.146593]  ? __pfx_kthread+0x10/0x10
[   15.146614]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.146635]  ? calculate_sigpending+0x7b/0xa0
[   15.146659]  ? __pfx_kthread+0x10/0x10
[   15.146680]  ret_from_fork+0x116/0x1d0
[   15.146697]  ? __pfx_kthread+0x10/0x10
[   15.146718]  ret_from_fork_asm+0x1a/0x30
[   15.146747]  </TASK>
[   15.146758] 
[   15.154946] Allocated by task 279:
[   15.155134]  kasan_save_stack+0x45/0x70
[   15.155933]  kasan_save_track+0x18/0x40
[   15.156131]  kasan_save_alloc_info+0x3b/0x50
[   15.156563]  __kasan_kmalloc+0xb7/0xc0
[   15.156928]  __kmalloc_cache_noprof+0x189/0x420
[   15.157157]  kasan_bitops_generic+0x92/0x1c0
[   15.157567]  kunit_try_run_case+0x1a5/0x480
[   15.158006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.158280]  kthread+0x337/0x6f0
[   15.158656]  ret_from_fork+0x116/0x1d0
[   15.158848]  ret_from_fork_asm+0x1a/0x30
[   15.159026] 
[   15.159116] The buggy address belongs to the object at ffff88810210ec80
[   15.159116]  which belongs to the cache kmalloc-16 of size 16
[   15.159547] The buggy address is located 8 bytes inside of
[   15.159547]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   15.160077] 
[   15.160186] The buggy address belongs to the physical page:
[   15.160439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   15.160720] flags: 0x200000000000000(node=0|zone=2)
[   15.160961] page_type: f5(slab)
[   15.161126] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.161410] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.161747] page dumped because: kasan: bad access detected
[   15.161946] 
[   15.162019] Memory state around the buggy address:
[   15.162256]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.162610]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   15.162836] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.163112]                       ^
[   15.163314]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.163616]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.163886] ==================================================================
[   15.183351] ==================================================================
[   15.183666] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.184060] Read of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   15.184397] 
[   15.184504] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.184547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.184559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.184580] Call Trace:
[   15.184594]  <TASK>
[   15.184608]  dump_stack_lvl+0x73/0xb0
[   15.184634]  print_report+0xd1/0x610
[   15.184656]  ? __virt_addr_valid+0x1db/0x2d0
[   15.184677]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.184703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.184725]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.184752]  kasan_report+0x141/0x180
[   15.184773]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.184805]  __asan_report_load8_noabort+0x18/0x20
[   15.184829]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.184856]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.184886]  ? ret_from_fork_asm+0x1a/0x30
[   15.184908]  ? kthread+0x337/0x6f0
[   15.184932]  kasan_bitops_generic+0x121/0x1c0
[   15.184955]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.184978]  ? trace_hardirqs_on+0x37/0xe0
[   15.185000]  ? __pfx_read_tsc+0x10/0x10
[   15.185021]  ? ktime_get_ts64+0x86/0x230
[   15.185040]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.185066]  kunit_try_run_case+0x1a5/0x480
[   15.185090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.185114]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.185138]  ? __kthread_parkme+0x82/0x180
[   15.185172]  ? preempt_count_sub+0x50/0x80
[   15.185195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.185219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.185242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.185265]  kthread+0x337/0x6f0
[   15.185284]  ? trace_preempt_on+0x20/0xc0
[   15.185325]  ? __pfx_kthread+0x10/0x10
[   15.185346]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.185367]  ? calculate_sigpending+0x7b/0xa0
[   15.185391]  ? __pfx_kthread+0x10/0x10
[   15.185412]  ret_from_fork+0x116/0x1d0
[   15.185430]  ? __pfx_kthread+0x10/0x10
[   15.185451]  ret_from_fork_asm+0x1a/0x30
[   15.185483]  </TASK>
[   15.185493] 
[   15.193052] Allocated by task 279:
[   15.193232]  kasan_save_stack+0x45/0x70
[   15.193438]  kasan_save_track+0x18/0x40
[   15.193597]  kasan_save_alloc_info+0x3b/0x50
[   15.193806]  __kasan_kmalloc+0xb7/0xc0
[   15.193969]  __kmalloc_cache_noprof+0x189/0x420
[   15.194177]  kasan_bitops_generic+0x92/0x1c0
[   15.194396]  kunit_try_run_case+0x1a5/0x480
[   15.194580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.194796]  kthread+0x337/0x6f0
[   15.194949]  ret_from_fork+0x116/0x1d0
[   15.195137]  ret_from_fork_asm+0x1a/0x30
[   15.195338] 
[   15.195438] The buggy address belongs to the object at ffff88810210ec80
[   15.195438]  which belongs to the cache kmalloc-16 of size 16
[   15.195901] The buggy address is located 8 bytes inside of
[   15.195901]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   15.196395] 
[   15.196470] The buggy address belongs to the physical page:
[   15.196681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   15.196927] flags: 0x200000000000000(node=0|zone=2)
[   15.197092] page_type: f5(slab)
[   15.197252] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.197624] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.197960] page dumped because: kasan: bad access detected
[   15.198217] 
[   15.198311] Memory state around the buggy address:
[   15.198474]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.198765]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   15.199082] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.199439]                       ^
[   15.199611]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.199901]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.200179] ==================================================================
[   15.061254] ==================================================================
[   15.061764] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.062209] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   15.062702] 
[   15.062987] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.063036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.063048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.063090] Call Trace:
[   15.063109]  <TASK>
[   15.063126]  dump_stack_lvl+0x73/0xb0
[   15.063167]  print_report+0xd1/0x610
[   15.063190]  ? __virt_addr_valid+0x1db/0x2d0
[   15.063215]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.063245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.063268]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.063298]  kasan_report+0x141/0x180
[   15.063332]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.063365]  kasan_check_range+0x10c/0x1c0
[   15.063390]  __kasan_check_write+0x18/0x20
[   15.063409]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.063436]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.063466]  ? ret_from_fork_asm+0x1a/0x30
[   15.063488]  ? kthread+0x337/0x6f0
[   15.063513]  kasan_bitops_generic+0x121/0x1c0
[   15.063536]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.063559]  ? trace_hardirqs_on+0x37/0xe0
[   15.063583]  ? __pfx_read_tsc+0x10/0x10
[   15.063604]  ? ktime_get_ts64+0x86/0x230
[   15.063624]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.063651]  kunit_try_run_case+0x1a5/0x480
[   15.063675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.063699]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.063723]  ? __kthread_parkme+0x82/0x180
[   15.063744]  ? preempt_count_sub+0x50/0x80
[   15.063767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.063791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.063814]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.063837]  kthread+0x337/0x6f0
[   15.063856]  ? trace_preempt_on+0x20/0xc0
[   15.063877]  ? __pfx_kthread+0x10/0x10
[   15.063898]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.063919]  ? calculate_sigpending+0x7b/0xa0
[   15.063943]  ? __pfx_kthread+0x10/0x10
[   15.063964]  ret_from_fork+0x116/0x1d0
[   15.063982]  ? __pfx_kthread+0x10/0x10
[   15.064002]  ret_from_fork_asm+0x1a/0x30
[   15.064032]  </TASK>
[   15.064042] 
[   15.072999] Allocated by task 279:
[   15.073125]  kasan_save_stack+0x45/0x70
[   15.073328]  kasan_save_track+0x18/0x40
[   15.073542]  kasan_save_alloc_info+0x3b/0x50
[   15.073790]  __kasan_kmalloc+0xb7/0xc0
[   15.073960]  __kmalloc_cache_noprof+0x189/0x420
[   15.074192]  kasan_bitops_generic+0x92/0x1c0
[   15.074419]  kunit_try_run_case+0x1a5/0x480
[   15.074613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.074856]  kthread+0x337/0x6f0
[   15.074986]  ret_from_fork+0x116/0x1d0
[   15.075201]  ret_from_fork_asm+0x1a/0x30
[   15.075410] 
[   15.075521] The buggy address belongs to the object at ffff88810210ec80
[   15.075521]  which belongs to the cache kmalloc-16 of size 16
[   15.075973] The buggy address is located 8 bytes inside of
[   15.075973]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   15.076529] 
[   15.076644] The buggy address belongs to the physical page:
[   15.076882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   15.077217] flags: 0x200000000000000(node=0|zone=2)
[   15.077500] page_type: f5(slab)
[   15.077657] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.077958] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.078287] page dumped because: kasan: bad access detected
[   15.078592] 
[   15.078698] Memory state around the buggy address:
[   15.078916]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.079223]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   15.079549] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.079895]                       ^
[   15.080090]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.080411]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.080816] ==================================================================
[   15.039746] ==================================================================
[   15.040119] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.040588] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   15.040878] 
[   15.040989] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.041051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.041063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.041085] Call Trace:
[   15.041119]  <TASK>
[   15.041134]  dump_stack_lvl+0x73/0xb0
[   15.041172]  print_report+0xd1/0x610
[   15.041194]  ? __virt_addr_valid+0x1db/0x2d0
[   15.041216]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.041241]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.041264]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.041291]  kasan_report+0x141/0x180
[   15.041331]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.041363]  kasan_check_range+0x10c/0x1c0
[   15.041386]  __kasan_check_write+0x18/0x20
[   15.041405]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.041444]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.041472]  ? ret_from_fork_asm+0x1a/0x30
[   15.041494]  ? kthread+0x337/0x6f0
[   15.041518]  kasan_bitops_generic+0x121/0x1c0
[   15.041541]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.041564]  ? trace_hardirqs_on+0x37/0xe0
[   15.041587]  ? __pfx_read_tsc+0x10/0x10
[   15.041608]  ? ktime_get_ts64+0x86/0x230
[   15.041629]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.041673]  kunit_try_run_case+0x1a5/0x480
[   15.041697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.041721]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.041746]  ? __kthread_parkme+0x82/0x180
[   15.041766]  ? preempt_count_sub+0x50/0x80
[   15.041789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.041813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.041850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.041875]  kthread+0x337/0x6f0
[   15.041894]  ? trace_preempt_on+0x20/0xc0
[   15.041929]  ? __pfx_kthread+0x10/0x10
[   15.041950]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.041984]  ? calculate_sigpending+0x7b/0xa0
[   15.042007]  ? __pfx_kthread+0x10/0x10
[   15.042028]  ret_from_fork+0x116/0x1d0
[   15.042060]  ? __pfx_kthread+0x10/0x10
[   15.042093]  ret_from_fork_asm+0x1a/0x30
[   15.042123]  </TASK>
[   15.042133] 
[   15.050952] Allocated by task 279:
[   15.051176]  kasan_save_stack+0x45/0x70
[   15.051420]  kasan_save_track+0x18/0x40
[   15.051559]  kasan_save_alloc_info+0x3b/0x50
[   15.051791]  __kasan_kmalloc+0xb7/0xc0
[   15.051982]  __kmalloc_cache_noprof+0x189/0x420
[   15.052189]  kasan_bitops_generic+0x92/0x1c0
[   15.052482]  kunit_try_run_case+0x1a5/0x480
[   15.052685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.052923]  kthread+0x337/0x6f0
[   15.053110]  ret_from_fork+0x116/0x1d0
[   15.053300]  ret_from_fork_asm+0x1a/0x30
[   15.053509] 
[   15.053649] The buggy address belongs to the object at ffff88810210ec80
[   15.053649]  which belongs to the cache kmalloc-16 of size 16
[   15.054117] The buggy address is located 8 bytes inside of
[   15.054117]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   15.054682] 
[   15.054799] The buggy address belongs to the physical page:
[   15.055095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   15.055477] flags: 0x200000000000000(node=0|zone=2)
[   15.055721] page_type: f5(slab)
[   15.055889] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.056241] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.056759] page dumped because: kasan: bad access detected
[   15.056930] 
[   15.056999] Memory state around the buggy address:
[   15.057164]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.057381]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   15.057709] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.058044]                       ^
[   15.058259]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059125]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.060079] ==================================================================
[   15.126798] ==================================================================
[   15.127135] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.127488] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   15.127806] 
[   15.127920] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.127966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.127979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.128001] Call Trace:
[   15.128020]  <TASK>
[   15.128037]  dump_stack_lvl+0x73/0xb0
[   15.128066]  print_report+0xd1/0x610
[   15.128088]  ? __virt_addr_valid+0x1db/0x2d0
[   15.128110]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.128137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.128169]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.128195]  kasan_report+0x141/0x180
[   15.128217]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.128249]  kasan_check_range+0x10c/0x1c0
[   15.128272]  __kasan_check_write+0x18/0x20
[   15.128290]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.128343]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.128370]  ? ret_from_fork_asm+0x1a/0x30
[   15.128393]  ? kthread+0x337/0x6f0
[   15.128417]  kasan_bitops_generic+0x121/0x1c0
[   15.128441]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.128463]  ? trace_hardirqs_on+0x37/0xe0
[   15.128487]  ? __pfx_read_tsc+0x10/0x10
[   15.128508]  ? ktime_get_ts64+0x86/0x230
[   15.128530]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.128556]  kunit_try_run_case+0x1a5/0x480
[   15.128580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.128604]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.128629]  ? __kthread_parkme+0x82/0x180
[   15.128649]  ? preempt_count_sub+0x50/0x80
[   15.128673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.128696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.128720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.128745]  kthread+0x337/0x6f0
[   15.128764]  ? trace_preempt_on+0x20/0xc0
[   15.128785]  ? __pfx_kthread+0x10/0x10
[   15.128806]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.128827]  ? calculate_sigpending+0x7b/0xa0
[   15.128850]  ? __pfx_kthread+0x10/0x10
[   15.128871]  ret_from_fork+0x116/0x1d0
[   15.128889]  ? __pfx_kthread+0x10/0x10
[   15.128909]  ret_from_fork_asm+0x1a/0x30
[   15.128938]  </TASK>
[   15.128949] 
[   15.136762] Allocated by task 279:
[   15.136897]  kasan_save_stack+0x45/0x70
[   15.137046]  kasan_save_track+0x18/0x40
[   15.137246]  kasan_save_alloc_info+0x3b/0x50
[   15.137486]  __kasan_kmalloc+0xb7/0xc0
[   15.137678]  __kmalloc_cache_noprof+0x189/0x420
[   15.137890]  kasan_bitops_generic+0x92/0x1c0
[   15.138094]  kunit_try_run_case+0x1a5/0x480
[   15.138333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.138548]  kthread+0x337/0x6f0
[   15.138705]  ret_from_fork+0x116/0x1d0
[   15.138891]  ret_from_fork_asm+0x1a/0x30
[   15.139083] 
[   15.139176] The buggy address belongs to the object at ffff88810210ec80
[   15.139176]  which belongs to the cache kmalloc-16 of size 16
[   15.139687] The buggy address is located 8 bytes inside of
[   15.139687]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   15.140116] 
[   15.140199] The buggy address belongs to the physical page:
[   15.140404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   15.140649] flags: 0x200000000000000(node=0|zone=2)
[   15.140816] page_type: f5(slab)
[   15.140939] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.141270] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.141628] page dumped because: kasan: bad access detected
[   15.141880] 
[   15.141974] Memory state around the buggy address:
[   15.142210]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.142554]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   15.142876] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.143209]                       ^
[   15.143412]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.143707]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.143947] ==================================================================
[   15.165648] ==================================================================
[   15.166049] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.166449] Read of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   15.166736] 
[   15.166850] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.166895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.166906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.166928] Call Trace:
[   15.166941]  <TASK>
[   15.166955]  dump_stack_lvl+0x73/0xb0
[   15.166983]  print_report+0xd1/0x610
[   15.167004]  ? __virt_addr_valid+0x1db/0x2d0
[   15.167026]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.167052]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.167074]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.167101]  kasan_report+0x141/0x180
[   15.167123]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.167163]  kasan_check_range+0x10c/0x1c0
[   15.167187]  __kasan_check_read+0x15/0x20
[   15.167206]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.167233]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.167261]  ? ret_from_fork_asm+0x1a/0x30
[   15.167283]  ? kthread+0x337/0x6f0
[   15.167327]  kasan_bitops_generic+0x121/0x1c0
[   15.167350]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.167373]  ? trace_hardirqs_on+0x37/0xe0
[   15.167399]  ? __pfx_read_tsc+0x10/0x10
[   15.167420]  ? ktime_get_ts64+0x86/0x230
[   15.167442]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.167467]  kunit_try_run_case+0x1a5/0x480
[   15.167492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.167516]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.167540]  ? __kthread_parkme+0x82/0x180
[   15.167561]  ? preempt_count_sub+0x50/0x80
[   15.167585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.167609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.167632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.167656]  kthread+0x337/0x6f0
[   15.167674]  ? trace_preempt_on+0x20/0xc0
[   15.167696]  ? __pfx_kthread+0x10/0x10
[   15.167716]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.167737]  ? calculate_sigpending+0x7b/0xa0
[   15.167761]  ? __pfx_kthread+0x10/0x10
[   15.167782]  ret_from_fork+0x116/0x1d0
[   15.167800]  ? __pfx_kthread+0x10/0x10
[   15.167821]  ret_from_fork_asm+0x1a/0x30
[   15.167850]  </TASK>
[   15.167860] 
[   15.175772] Allocated by task 279:
[   15.175921]  kasan_save_stack+0x45/0x70
[   15.176119]  kasan_save_track+0x18/0x40
[   15.176311]  kasan_save_alloc_info+0x3b/0x50
[   15.176517]  __kasan_kmalloc+0xb7/0xc0
[   15.176680]  __kmalloc_cache_noprof+0x189/0x420
[   15.176896]  kasan_bitops_generic+0x92/0x1c0
[   15.177076]  kunit_try_run_case+0x1a5/0x480
[   15.177282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.177498]  kthread+0x337/0x6f0
[   15.177672]  ret_from_fork+0x116/0x1d0
[   15.177841]  ret_from_fork_asm+0x1a/0x30
[   15.177982] 
[   15.178054] The buggy address belongs to the object at ffff88810210ec80
[   15.178054]  which belongs to the cache kmalloc-16 of size 16
[   15.178446] The buggy address is located 8 bytes inside of
[   15.178446]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   15.178942] 
[   15.179036] The buggy address belongs to the physical page:
[   15.179315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   15.179664] flags: 0x200000000000000(node=0|zone=2)
[   15.179830] page_type: f5(slab)
[   15.179952] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.180213] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.180587] page dumped because: kasan: bad access detected
[   15.180841] 
[   15.180938] Memory state around the buggy address:
[   15.181171]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.181515]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   15.181826] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.182089]                       ^
[   15.182263]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.182519]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.182835] ==================================================================
[   15.017513] ==================================================================
[   15.017843] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.018237] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   15.018638] 
[   15.018770] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.018826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.018838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.018859] Call Trace:
[   15.018874]  <TASK>
[   15.018888]  dump_stack_lvl+0x73/0xb0
[   15.018915]  print_report+0xd1/0x610
[   15.018936]  ? __virt_addr_valid+0x1db/0x2d0
[   15.018959]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.018986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.019007]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.019052]  kasan_report+0x141/0x180
[   15.019086]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.019118]  kasan_check_range+0x10c/0x1c0
[   15.019140]  __kasan_check_write+0x18/0x20
[   15.019171]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   15.019198]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.019226]  ? ret_from_fork_asm+0x1a/0x30
[   15.019247]  ? kthread+0x337/0x6f0
[   15.019270]  kasan_bitops_generic+0x121/0x1c0
[   15.019294]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.019317]  ? trace_hardirqs_on+0x37/0xe0
[   15.019340]  ? __pfx_read_tsc+0x10/0x10
[   15.019361]  ? ktime_get_ts64+0x86/0x230
[   15.019381]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.019407]  kunit_try_run_case+0x1a5/0x480
[   15.019431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.019456]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.019479]  ? __kthread_parkme+0x82/0x180
[   15.019498]  ? preempt_count_sub+0x50/0x80
[   15.019521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.019545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.019588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.019612]  kthread+0x337/0x6f0
[   15.019631]  ? trace_preempt_on+0x20/0xc0
[   15.019652]  ? __pfx_kthread+0x10/0x10
[   15.019673]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.019694]  ? calculate_sigpending+0x7b/0xa0
[   15.019717]  ? __pfx_kthread+0x10/0x10
[   15.019739]  ret_from_fork+0x116/0x1d0
[   15.019756]  ? __pfx_kthread+0x10/0x10
[   15.019777]  ret_from_fork_asm+0x1a/0x30
[   15.019806]  </TASK>
[   15.019816] 
[   15.028904] Allocated by task 279:
[   15.029606]  kasan_save_stack+0x45/0x70
[   15.029833]  kasan_save_track+0x18/0x40
[   15.029996]  kasan_save_alloc_info+0x3b/0x50
[   15.030216]  __kasan_kmalloc+0xb7/0xc0
[   15.030401]  __kmalloc_cache_noprof+0x189/0x420
[   15.030882]  kasan_bitops_generic+0x92/0x1c0
[   15.031226]  kunit_try_run_case+0x1a5/0x480
[   15.031582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.031879]  kthread+0x337/0x6f0
[   15.032064]  ret_from_fork+0x116/0x1d0
[   15.032380]  ret_from_fork_asm+0x1a/0x30
[   15.032733] 
[   15.032845] The buggy address belongs to the object at ffff88810210ec80
[   15.032845]  which belongs to the cache kmalloc-16 of size 16
[   15.033616] The buggy address is located 8 bytes inside of
[   15.033616]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   15.034257] 
[   15.034346] The buggy address belongs to the physical page:
[   15.034797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   15.035133] flags: 0x200000000000000(node=0|zone=2)
[   15.035523] page_type: f5(slab)
[   15.035723] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.036184] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.036762] page dumped because: kasan: bad access detected
[   15.037029] 
[   15.037279] Memory state around the buggy address:
[   15.037493]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.037788]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   15.038089] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.038394]                       ^
[   15.038585]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.038860]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.039172] ==================================================================
[   15.081495] ==================================================================
[   15.082047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.082363] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279
[   15.082694] 
[   15.082799] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   15.082841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.082853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.082874] Call Trace:
[   15.082914]  <TASK>
[   15.082928]  dump_stack_lvl+0x73/0xb0
[   15.082954]  print_report+0xd1/0x610
[   15.082975]  ? __virt_addr_valid+0x1db/0x2d0
[   15.082997]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.083023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.083045]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.083089]  kasan_report+0x141/0x180
[   15.083111]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.083152]  kasan_check_range+0x10c/0x1c0
[   15.083176]  __kasan_check_write+0x18/0x20
[   15.083195]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.083221]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.083249]  ? ret_from_fork_asm+0x1a/0x30
[   15.083272]  ? kthread+0x337/0x6f0
[   15.083313]  kasan_bitops_generic+0x121/0x1c0
[   15.083337]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.083359]  ? trace_hardirqs_on+0x37/0xe0
[   15.083382]  ? __pfx_read_tsc+0x10/0x10
[   15.083402]  ? ktime_get_ts64+0x86/0x230
[   15.083425]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   15.083451]  kunit_try_run_case+0x1a5/0x480
[   15.083475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.083499]  ? queued_spin_lock_slowpath+0x116/0xb40
[   15.083523]  ? __kthread_parkme+0x82/0x180
[   15.083559]  ? preempt_count_sub+0x50/0x80
[   15.083582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.083619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.083642]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.083679]  kthread+0x337/0x6f0
[   15.083711]  ? trace_preempt_on+0x20/0xc0
[   15.083732]  ? __pfx_kthread+0x10/0x10
[   15.083766]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.083799]  ? calculate_sigpending+0x7b/0xa0
[   15.083836]  ? __pfx_kthread+0x10/0x10
[   15.083857]  ret_from_fork+0x116/0x1d0
[   15.083889]  ? __pfx_kthread+0x10/0x10
[   15.083922]  ret_from_fork_asm+0x1a/0x30
[   15.083951]  </TASK>
[   15.083961] 
[   15.094015] Allocated by task 279:
[   15.094403]  kasan_save_stack+0x45/0x70
[   15.094784]  kasan_save_track+0x18/0x40
[   15.095151]  kasan_save_alloc_info+0x3b/0x50
[   15.095564]  __kasan_kmalloc+0xb7/0xc0
[   15.095923]  __kmalloc_cache_noprof+0x189/0x420
[   15.096379]  kasan_bitops_generic+0x92/0x1c0
[   15.096720]  kunit_try_run_case+0x1a5/0x480
[   15.096992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.097182]  kthread+0x337/0x6f0
[   15.097306]  ret_from_fork+0x116/0x1d0
[   15.097660]  ret_from_fork_asm+0x1a/0x30
[   15.098041] 
[   15.098209] The buggy address belongs to the object at ffff88810210ec80
[   15.098209]  which belongs to the cache kmalloc-16 of size 16
[   15.099443] The buggy address is located 8 bytes inside of
[   15.099443]  allocated 9-byte region [ffff88810210ec80, ffff88810210ec89)
[   15.100441] 
[   15.100517] The buggy address belongs to the physical page:
[   15.100694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e
[   15.100939] flags: 0x200000000000000(node=0|zone=2)
[   15.101104] page_type: f5(slab)
[   15.101356] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.102049] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.102557] page dumped because: kasan: bad access detected
[   15.102734] 
[   15.102805] Memory state around the buggy address:
[   15.102963]  ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.103198]  ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   15.103544] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.103860]                       ^
[   15.104034]  ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.104404]  ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.104693] ==================================================================