Hay
Date
July 3, 2025, 6:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.191945] ==================================================================
[   19.192259] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.192429] Write of size 8 at addr fff00000c57cf648 by task kunit_try_catch/261
[   19.192679] 
[   19.192755] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.193073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.193257] Hardware name: linux,dummy-virt (DT)
[   19.193370] Call trace:
[   19.193422]  show_stack+0x20/0x38 (C)
[   19.193564]  dump_stack_lvl+0x8c/0xd0
[   19.193733]  print_report+0x118/0x608
[   19.193843]  kasan_report+0xdc/0x128
[   19.193971]  kasan_check_range+0x100/0x1a8
[   19.194073]  __kasan_check_write+0x20/0x30
[   19.194125]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.194190]  kasan_bitops_generic+0x110/0x1c8
[   19.194240]  kunit_try_run_case+0x170/0x3f0
[   19.194289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.194344]  kthread+0x328/0x630
[   19.194408]  ret_from_fork+0x10/0x20
[   19.194458] 
[   19.194487] Allocated by task 261:
[   19.194528]  kasan_save_stack+0x3c/0x68
[   19.194572]  kasan_save_track+0x20/0x40
[   19.194612]  kasan_save_alloc_info+0x40/0x58
[   19.194664]  __kasan_kmalloc+0xd4/0xd8
[   19.194702]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.194755]  kasan_bitops_generic+0xa0/0x1c8
[   19.194795]  kunit_try_run_case+0x170/0x3f0
[   19.194834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.194881]  kthread+0x328/0x630
[   19.194929]  ret_from_fork+0x10/0x20
[   19.194981] 
[   19.195020] The buggy address belongs to the object at fff00000c57cf640
[   19.195020]  which belongs to the cache kmalloc-16 of size 16
[   19.195384] The buggy address is located 8 bytes inside of
[   19.195384]  allocated 9-byte region [fff00000c57cf640, fff00000c57cf649)
[   19.195608] 
[   19.195639] The buggy address belongs to the physical page:
[   19.196006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057cf
[   19.196123] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.196737] page_type: f5(slab)
[   19.196996] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.197211] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.197397] page dumped because: kasan: bad access detected
[   19.197643] 
[   19.197761] Memory state around the buggy address:
[   19.197863]  fff00000c57cf500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.198023]  fff00000c57cf580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.198209] >fff00000c57cf600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.198355]                                               ^
[   19.198402]  fff00000c57cf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.198639]  fff00000c57cf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.198820] ==================================================================
[   19.238281] ==================================================================
[   19.238335] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   19.238388] Write of size 8 at addr fff00000c57cf648 by task kunit_try_catch/261
[   19.238440] 
[   19.238472] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.238554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.238583] Hardware name: linux,dummy-virt (DT)
[   19.238616] Call trace:
[   19.238641]  show_stack+0x20/0x38 (C)
[   19.238703]  dump_stack_lvl+0x8c/0xd0
[   19.238751]  print_report+0x118/0x608
[   19.238799]  kasan_report+0xdc/0x128
[   19.238846]  kasan_check_range+0x100/0x1a8
[   19.238895]  __kasan_check_write+0x20/0x30
[   19.238940]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   19.238991]  kasan_bitops_generic+0x110/0x1c8
[   19.239051]  kunit_try_run_case+0x170/0x3f0
[   19.239100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.239155]  kthread+0x328/0x630
[   19.239921]  ret_from_fork+0x10/0x20
[   19.239994] 
[   19.240048] Allocated by task 261:
[   19.240081]  kasan_save_stack+0x3c/0x68
[   19.240132]  kasan_save_track+0x20/0x40
[   19.240181]  kasan_save_alloc_info+0x40/0x58
[   19.240224]  __kasan_kmalloc+0xd4/0xd8
[   19.240521]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.240638]  kasan_bitops_generic+0xa0/0x1c8
[   19.240856]  kunit_try_run_case+0x170/0x3f0
[   19.240907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.241479]  kthread+0x328/0x630
[   19.242547] 
[   19.253951] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.258053] Write of size 8 at addr fff00000c57cf648 by task kunit_try_catch/261
[   19.258450] Call trace:
[   19.259149]  kasan_check_range+0x100/0x1a8
[   19.259850]  kthread+0x328/0x630
[   19.260368]  kthread+0x328/0x630
[   19.260911] 
[   19.261650] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.263143]                                               ^
[   19.266055] Write of size 8 at addr fff00000c57cf648 by task kunit_try_catch/261
[   19.266968]  kasan_report+0xdc/0x128
[   19.267674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.270647] 
[   19.270930] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.271015] 
[   19.271197] >fff00000c57cf600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.274493] 
[   19.275186] Hardware name: linux,dummy-virt (DT)
[   19.277515] 
[   19.278397]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.280234] The buggy address is located 8 bytes inside of
[   19.280234]  allocated 9-byte region [fff00000c57cf640, fff00000c57cf649)
[   19.281584] 
[   19.281606] Memory state around the buggy address:
[   19.282451] >fff00000c57cf600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.284194] 
[   19.285112]  print_report+0x118/0x608
[   19.288289]  kasan_save_alloc_info+0x40/0x58
[   19.289012] The buggy address belongs to the physical page:
[   19.289871] 
[   19.290019]  fff00000c57cf500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.291942] ==================================================================
[   19.210523] ==================================================================
[   19.210579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.211434] Write of size 8 at addr fff00000c57cf648 by task kunit_try_catch/261
[   19.211528] 
[   19.211563] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.211807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.211957] Hardware name: linux,dummy-virt (DT)
[   19.212049] Call trace:
[   19.212078]  show_stack+0x20/0x38 (C)
[   19.212132]  dump_stack_lvl+0x8c/0xd0
[   19.212184]  print_report+0x118/0x608
[   19.212504]  kasan_report+0xdc/0x128
[   19.212837]  kasan_check_range+0x100/0x1a8
[   19.213248]  __kasan_check_write+0x20/0x30
[   19.213485]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.213675]  kasan_bitops_generic+0x110/0x1c8
[   19.213854]  kunit_try_run_case+0x170/0x3f0
[   19.213922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.214004]  kthread+0x328/0x630
[   19.214224]  ret_from_fork+0x10/0x20
[   19.214549] 
[   19.214690] Allocated by task 261:
[   19.214800]  kasan_save_stack+0x3c/0x68
[   19.215063]  kasan_save_track+0x20/0x40
[   19.215479]  kasan_save_alloc_info+0x40/0x58
[   19.215660]  __kasan_kmalloc+0xd4/0xd8
[   19.215716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.215948]  kasan_bitops_generic+0xa0/0x1c8
[   19.216142]  kunit_try_run_case+0x170/0x3f0
[   19.216201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.216401]  kthread+0x328/0x630
[   19.216484]  ret_from_fork+0x10/0x20
[   19.216611] 
[   19.216640] The buggy address belongs to the object at fff00000c57cf640
[   19.216640]  which belongs to the cache kmalloc-16 of size 16
[   19.216934] The buggy address is located 8 bytes inside of
[   19.216934]  allocated 9-byte region [fff00000c57cf640, fff00000c57cf649)
[   19.217220] 
[   19.217266] The buggy address belongs to the physical page:
[   19.217424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057cf
[   19.217573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.217753] page_type: f5(slab)
[   19.217833] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.218277] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.218369] page dumped because: kasan: bad access detected
[   19.218501] 
[   19.218555] Memory state around the buggy address:
[   19.218758]  fff00000c57cf500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.218956]  fff00000c57cf580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.219103] >fff00000c57cf600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.219241]                                               ^
[   19.219429]  fff00000c57cf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.219516]  fff00000c57cf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.219611] ==================================================================
[   19.222497] ==================================================================
[   19.222656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.222779] Read of size 8 at addr fff00000c57cf648 by task kunit_try_catch/261
[   19.222837] 
[   19.222881] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.222966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.222994] Hardware name: linux,dummy-virt (DT)
[   19.223224] Call trace:
[   19.223261]  show_stack+0x20/0x38 (C)
[   19.223314]  dump_stack_lvl+0x8c/0xd0
[   19.223377]  print_report+0x118/0x608
[   19.223868]  kasan_report+0xdc/0x128
[   19.223955]  __asan_report_load8_noabort+0x20/0x30
[   19.224009]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.224397]  kasan_bitops_generic+0x110/0x1c8
[   19.224910]  kunit_try_run_case+0x170/0x3f0
[   19.224991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.225096]  kthread+0x328/0x630
[   19.225223]  ret_from_fork+0x10/0x20
[   19.225385] 
[   19.225406] Allocated by task 261:
[   19.225436]  kasan_save_stack+0x3c/0x68
[   19.225486]  kasan_save_track+0x20/0x40
[   19.225801]  kasan_save_alloc_info+0x40/0x58
[   19.225960]  __kasan_kmalloc+0xd4/0xd8
[   19.226097]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.226166]  kasan_bitops_generic+0xa0/0x1c8
[   19.226315]  kunit_try_run_case+0x170/0x3f0
[   19.226467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.226642]  kthread+0x328/0x630
[   19.226856]  ret_from_fork+0x10/0x20
[   19.227022] 
[   19.227128] The buggy address belongs to the object at fff00000c57cf640
[   19.227128]  which belongs to the cache kmalloc-16 of size 16
[   19.227260] The buggy address is located 8 bytes inside of
[   19.227260]  allocated 9-byte region [fff00000c57cf640, fff00000c57cf649)
[   19.227466] 
[   19.227536] The buggy address belongs to the physical page:
[   19.227595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057cf
[   19.227942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.228164] page_type: f5(slab)
[   19.228264] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.228427] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.228593] page dumped because: kasan: bad access detected
[   19.228833] 
[   19.229018] Memory state around the buggy address:
[   19.229098]  fff00000c57cf500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.229157]  fff00000c57cf580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.229201] >fff00000c57cf600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.229243]                                               ^
[   19.229281]  fff00000c57cf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.229326]  fff00000c57cf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.229368] ==================================================================
[   19.230189] ==================================================================
[   19.230373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   19.230429] Write of size 8 at addr fff00000c57cf648 by task kunit_try_catch/261
[   19.230510] 
[   19.230672] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.230867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.231020] Hardware name: linux,dummy-virt (DT)
[   19.231071] Call trace:
[   19.231296]  show_stack+0x20/0x38 (C)
[   19.231382]  dump_stack_lvl+0x8c/0xd0
[   19.231757]  print_report+0x118/0x608
[   19.232073]  kasan_report+0xdc/0x128
[   19.232270]  kasan_check_range+0x100/0x1a8
[   19.232550]  __kasan_check_write+0x20/0x30
[   19.232930]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   19.233072]  kasan_bitops_generic+0x110/0x1c8
[   19.233236]  kunit_try_run_case+0x170/0x3f0
[   19.233403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.233499]  kthread+0x328/0x630
[   19.233700]  ret_from_fork+0x10/0x20
[   19.233933] 
[   19.234025] Allocated by task 261:
[   19.234107]  kasan_save_stack+0x3c/0x68
[   19.234254]  kasan_save_track+0x20/0x40
[   19.234315]  kasan_save_alloc_info+0x40/0x58
[   19.234654]  __kasan_kmalloc+0xd4/0xd8
[   19.234732]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.234878]  kasan_bitops_generic+0xa0/0x1c8
[   19.234951]  kunit_try_run_case+0x170/0x3f0
[   19.235162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.235342]  kthread+0x328/0x630
[   19.235558]  ret_from_fork+0x10/0x20
[   19.235901] 
[   19.235948] The buggy address belongs to the object at fff00000c57cf640
[   19.235948]  which belongs to the cache kmalloc-16 of size 16
[   19.236134] The buggy address is located 8 bytes inside of
[   19.236134]  allocated 9-byte region [fff00000c57cf640, fff00000c57cf649)
[   19.236274] 
[   19.236300] The buggy address belongs to the physical page:
[   19.236369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057cf
[   19.236670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.236732] page_type: f5(slab)
[   19.236771] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.237188] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.237304] page dumped because: kasan: bad access detected
[   19.237341] 
[   19.237465] Memory state around the buggy address:
[   19.237516]  fff00000c57cf500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.237564]  fff00000c57cf580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.237608] >fff00000c57cf600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.237678]                                               ^
[   19.237717]  fff00000c57cf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.237762]  fff00000c57cf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.237811] ==================================================================
[   19.200300] ==================================================================
[   19.200622] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.200977] Read of size 8 at addr fff00000c57cf648 by task kunit_try_catch/261
[   19.201252] 
[   19.201341] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.201723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.201794] Hardware name: linux,dummy-virt (DT)
[   19.201977] Call trace:
[   19.202545]  show_stack+0x20/0x38 (C)
[   19.202870]  dump_stack_lvl+0x8c/0xd0
[   19.203103]  print_report+0x118/0x608
[   19.203471]  kasan_report+0xdc/0x128
[   19.203738]  __asan_report_load8_noabort+0x20/0x30
[   19.203979]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.204167]  kasan_bitops_generic+0x110/0x1c8
[   19.204410]  kunit_try_run_case+0x170/0x3f0
[   19.204537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.205040]  kthread+0x328/0x630
[   19.205243]  ret_from_fork+0x10/0x20
[   19.205482] 
[   19.205723] Allocated by task 261:
[   19.205808]  kasan_save_stack+0x3c/0x68
[   19.206084]  kasan_save_track+0x20/0x40
[   19.206181]  kasan_save_alloc_info+0x40/0x58
[   19.206245]  __kasan_kmalloc+0xd4/0xd8
[   19.206483]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.206948]  kasan_bitops_generic+0xa0/0x1c8
[   19.207139]  kunit_try_run_case+0x170/0x3f0
[   19.207258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.207439]  kthread+0x328/0x630
[   19.207621]  ret_from_fork+0x10/0x20
[   19.207946] 
[   19.208105] The buggy address belongs to the object at fff00000c57cf640
[   19.208105]  which belongs to the cache kmalloc-16 of size 16
[   19.208304] The buggy address is located 8 bytes inside of
[   19.208304]  allocated 9-byte region [fff00000c57cf640, fff00000c57cf649)
[   19.208516] 
[   19.208654] The buggy address belongs to the physical page:
[   19.208737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057cf
[   19.208821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.208874] page_type: f5(slab)
[   19.209292] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.209421] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.209550] page dumped because: kasan: bad access detected
[   19.209590] 
[   19.209638] Memory state around the buggy address:
[   19.209674]  fff00000c57cf500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.209759]  fff00000c57cf580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.209807] >fff00000c57cf600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.209858]                                               ^
[   19.209918]  fff00000c57cf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.209976]  fff00000c57cf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.210050] ==================================================================

[   13.548827] ==================================================================
[   13.549146] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.549586] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.549881] 
[   13.549968] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.550011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.550022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.550043] Call Trace:
[   13.550055]  <TASK>
[   13.550069]  dump_stack_lvl+0x73/0xb0
[   13.550093]  print_report+0xd1/0x650
[   13.550131]  ? __virt_addr_valid+0x1db/0x2d0
[   13.550153]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.550178]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.550199]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.550224]  kasan_report+0x141/0x180
[   13.550246]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.550275]  kasan_check_range+0x10c/0x1c0
[   13.550298]  __kasan_check_write+0x18/0x20
[   13.550317]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.550342]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.550368]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.550392]  ? trace_hardirqs_on+0x37/0xe0
[   13.550418]  ? kasan_bitops_generic+0x92/0x1c0
[   13.550446]  kasan_bitops_generic+0x116/0x1c0
[   13.550470]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.550494]  ? __pfx_read_tsc+0x10/0x10
[   13.550514]  ? ktime_get_ts64+0x86/0x230
[   13.550537]  kunit_try_run_case+0x1a5/0x480
[   13.550561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.550582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.550605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.550627]  ? __kthread_parkme+0x82/0x180
[   13.550646]  ? preempt_count_sub+0x50/0x80
[   13.550669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.550692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.550714]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.550737]  kthread+0x337/0x6f0
[   13.550756]  ? trace_preempt_on+0x20/0xc0
[   13.550782]  ? __pfx_kthread+0x10/0x10
[   13.550802]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.550823]  ? calculate_sigpending+0x7b/0xa0
[   13.550845]  ? __pfx_kthread+0x10/0x10
[   13.550866]  ret_from_fork+0x116/0x1d0
[   13.550884]  ? __pfx_kthread+0x10/0x10
[   13.550904]  ret_from_fork_asm+0x1a/0x30
[   13.550934]  </TASK>
[   13.550945] 
[   13.559718] Allocated by task 279:
[   13.559949]  kasan_save_stack+0x45/0x70
[   13.560435]  kasan_save_track+0x18/0x40
[   13.560590]  kasan_save_alloc_info+0x3b/0x50
[   13.560805]  __kasan_kmalloc+0xb7/0xc0
[   13.560951]  __kmalloc_cache_noprof+0x189/0x420
[   13.561187]  kasan_bitops_generic+0x92/0x1c0
[   13.561495]  kunit_try_run_case+0x1a5/0x480
[   13.561670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.561850]  kthread+0x337/0x6f0
[   13.561974]  ret_from_fork+0x116/0x1d0
[   13.562175]  ret_from_fork_asm+0x1a/0x30
[   13.562373] 
[   13.562738] The buggy address belongs to the object at ffff888101745ee0
[   13.562738]  which belongs to the cache kmalloc-16 of size 16
[   13.563494] The buggy address is located 8 bytes inside of
[   13.563494]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.563925] 
[   13.564001] The buggy address belongs to the physical page:
[   13.564203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.564713] flags: 0x200000000000000(node=0|zone=2)
[   13.564902] page_type: f5(slab)
[   13.565023] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.565546] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.565845] page dumped because: kasan: bad access detected
[   13.566020] 
[   13.566116] Memory state around the buggy address:
[   13.566609]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.566943]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.567366] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.567645]                                                           ^
[   13.567877]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.568144]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.568775] ==================================================================
[   13.522317] ==================================================================
[   13.522886] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.523441] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.524066] 
[   13.524276] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.524321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.524333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.524353] Call Trace:
[   13.524364]  <TASK>
[   13.524379]  dump_stack_lvl+0x73/0xb0
[   13.524406]  print_report+0xd1/0x650
[   13.524428]  ? __virt_addr_valid+0x1db/0x2d0
[   13.524451]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.524475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.524496]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.524522]  kasan_report+0x141/0x180
[   13.524543]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.524573]  kasan_check_range+0x10c/0x1c0
[   13.524596]  __kasan_check_write+0x18/0x20
[   13.524614]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.524639]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.524684]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.524707]  ? trace_hardirqs_on+0x37/0xe0
[   13.524733]  ? kasan_bitops_generic+0x92/0x1c0
[   13.524760]  kasan_bitops_generic+0x116/0x1c0
[   13.524783]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.524807]  ? __pfx_read_tsc+0x10/0x10
[   13.524828]  ? ktime_get_ts64+0x86/0x230
[   13.524852]  kunit_try_run_case+0x1a5/0x480
[   13.524874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.524896]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.524918]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.524940]  ? __kthread_parkme+0x82/0x180
[   13.524959]  ? preempt_count_sub+0x50/0x80
[   13.524982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.525005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.525028]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.525051]  kthread+0x337/0x6f0
[   13.525069]  ? trace_preempt_on+0x20/0xc0
[   13.525110]  ? __pfx_kthread+0x10/0x10
[   13.525131]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.525151]  ? calculate_sigpending+0x7b/0xa0
[   13.525174]  ? __pfx_kthread+0x10/0x10
[   13.525195]  ret_from_fork+0x116/0x1d0
[   13.525213]  ? __pfx_kthread+0x10/0x10
[   13.525234]  ret_from_fork_asm+0x1a/0x30
[   13.525263]  </TASK>
[   13.525274] 
[   13.537304] Allocated by task 279:
[   13.537480]  kasan_save_stack+0x45/0x70
[   13.537664]  kasan_save_track+0x18/0x40
[   13.537802]  kasan_save_alloc_info+0x3b/0x50
[   13.537955]  __kasan_kmalloc+0xb7/0xc0
[   13.538213]  __kmalloc_cache_noprof+0x189/0x420
[   13.538922]  kasan_bitops_generic+0x92/0x1c0
[   13.539407]  kunit_try_run_case+0x1a5/0x480
[   13.539986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.540519]  kthread+0x337/0x6f0
[   13.540705]  ret_from_fork+0x116/0x1d0
[   13.540891]  ret_from_fork_asm+0x1a/0x30
[   13.541121] 
[   13.541586] The buggy address belongs to the object at ffff888101745ee0
[   13.541586]  which belongs to the cache kmalloc-16 of size 16
[   13.542007] The buggy address is located 8 bytes inside of
[   13.542007]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.542744] 
[   13.542863] The buggy address belongs to the physical page:
[   13.543175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.543573] flags: 0x200000000000000(node=0|zone=2)
[   13.544000] page_type: f5(slab)
[   13.544189] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.544656] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.545012] page dumped because: kasan: bad access detected
[   13.545277] 
[   13.545490] Memory state around the buggy address:
[   13.545712]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.546029]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.546501] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.547047]                                                           ^
[   13.547395]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.547789]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.548049] ==================================================================
[   13.446039] ==================================================================
[   13.447436] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.447980] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.448528] 
[   13.448786] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.448839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.448852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.448875] Call Trace:
[   13.448891]  <TASK>
[   13.448909]  dump_stack_lvl+0x73/0xb0
[   13.448940]  print_report+0xd1/0x650
[   13.448962]  ? __virt_addr_valid+0x1db/0x2d0
[   13.448985]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.449009]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.449030]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.449055]  kasan_report+0x141/0x180
[   13.449076]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.449119]  kasan_check_range+0x10c/0x1c0
[   13.449149]  __kasan_check_write+0x18/0x20
[   13.449167]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.449192]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.449219]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.449242]  ? trace_hardirqs_on+0x37/0xe0
[   13.449268]  ? kasan_bitops_generic+0x92/0x1c0
[   13.449295]  kasan_bitops_generic+0x116/0x1c0
[   13.449317]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.449341]  ? __pfx_read_tsc+0x10/0x10
[   13.449362]  ? ktime_get_ts64+0x86/0x230
[   13.449385]  kunit_try_run_case+0x1a5/0x480
[   13.449409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.449431]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.449454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.449476]  ? __kthread_parkme+0x82/0x180
[   13.449496]  ? preempt_count_sub+0x50/0x80
[   13.449518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.449542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.449564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.449587]  kthread+0x337/0x6f0
[   13.449606]  ? trace_preempt_on+0x20/0xc0
[   13.449632]  ? __pfx_kthread+0x10/0x10
[   13.449652]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.449672]  ? calculate_sigpending+0x7b/0xa0
[   13.449695]  ? __pfx_kthread+0x10/0x10
[   13.449715]  ret_from_fork+0x116/0x1d0
[   13.449733]  ? __pfx_kthread+0x10/0x10
[   13.449753]  ret_from_fork_asm+0x1a/0x30
[   13.449782]  </TASK>
[   13.449795] 
[   13.461711] Allocated by task 279:
[   13.461926]  kasan_save_stack+0x45/0x70
[   13.462239]  kasan_save_track+0x18/0x40
[   13.462505]  kasan_save_alloc_info+0x3b/0x50
[   13.462738]  __kasan_kmalloc+0xb7/0xc0
[   13.462939]  __kmalloc_cache_noprof+0x189/0x420
[   13.463270]  kasan_bitops_generic+0x92/0x1c0
[   13.463531]  kunit_try_run_case+0x1a5/0x480
[   13.463754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.464035]  kthread+0x337/0x6f0
[   13.464474]  ret_from_fork+0x116/0x1d0
[   13.464697]  ret_from_fork_asm+0x1a/0x30
[   13.464876] 
[   13.464967] The buggy address belongs to the object at ffff888101745ee0
[   13.464967]  which belongs to the cache kmalloc-16 of size 16
[   13.465691] The buggy address is located 8 bytes inside of
[   13.465691]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.466259] 
[   13.466358] The buggy address belongs to the physical page:
[   13.466563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.466935] flags: 0x200000000000000(node=0|zone=2)
[   13.467176] page_type: f5(slab)
[   13.467341] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.467699] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.467965] page dumped because: kasan: bad access detected
[   13.468464] 
[   13.468580] Memory state around the buggy address:
[   13.468810]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.469083]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.469453] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.469827]                                                           ^
[   13.470307]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.470795]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.471022] ==================================================================
[   13.569230] ==================================================================
[   13.569694] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.570019] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.570490] 
[   13.570576] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.570615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.570627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.570646] Call Trace:
[   13.570661]  <TASK>
[   13.570674]  dump_stack_lvl+0x73/0xb0
[   13.570701]  print_report+0xd1/0x650
[   13.570723]  ? __virt_addr_valid+0x1db/0x2d0
[   13.570744]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.570769]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.570791]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.570816]  kasan_report+0x141/0x180
[   13.570837]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.570867]  kasan_check_range+0x10c/0x1c0
[   13.570890]  __kasan_check_write+0x18/0x20
[   13.570909]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.570934]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.570961]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.570985]  ? trace_hardirqs_on+0x37/0xe0
[   13.571012]  ? kasan_bitops_generic+0x92/0x1c0
[   13.571039]  kasan_bitops_generic+0x116/0x1c0
[   13.571063]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.571086]  ? __pfx_read_tsc+0x10/0x10
[   13.571118]  ? ktime_get_ts64+0x86/0x230
[   13.571141]  kunit_try_run_case+0x1a5/0x480
[   13.571164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.571186]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.571218]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.571240]  ? __kthread_parkme+0x82/0x180
[   13.571260]  ? preempt_count_sub+0x50/0x80
[   13.571283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.571307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.571347]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.571370]  kthread+0x337/0x6f0
[   13.571389]  ? trace_preempt_on+0x20/0xc0
[   13.571414]  ? __pfx_kthread+0x10/0x10
[   13.571434]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.571454]  ? calculate_sigpending+0x7b/0xa0
[   13.571477]  ? __pfx_kthread+0x10/0x10
[   13.571497]  ret_from_fork+0x116/0x1d0
[   13.571515]  ? __pfx_kthread+0x10/0x10
[   13.571534]  ret_from_fork_asm+0x1a/0x30
[   13.571564]  </TASK>
[   13.571575] 
[   13.579635] Allocated by task 279:
[   13.579768]  kasan_save_stack+0x45/0x70
[   13.579962]  kasan_save_track+0x18/0x40
[   13.580216]  kasan_save_alloc_info+0x3b/0x50
[   13.580576]  __kasan_kmalloc+0xb7/0xc0
[   13.580766]  __kmalloc_cache_noprof+0x189/0x420
[   13.580996]  kasan_bitops_generic+0x92/0x1c0
[   13.581410]  kunit_try_run_case+0x1a5/0x480
[   13.581596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.581847]  kthread+0x337/0x6f0
[   13.581970]  ret_from_fork+0x116/0x1d0
[   13.582135]  ret_from_fork_asm+0x1a/0x30
[   13.582397] 
[   13.582500] The buggy address belongs to the object at ffff888101745ee0
[   13.582500]  which belongs to the cache kmalloc-16 of size 16
[   13.582956] The buggy address is located 8 bytes inside of
[   13.582956]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.583595] 
[   13.583685] The buggy address belongs to the physical page:
[   13.583919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.584342] flags: 0x200000000000000(node=0|zone=2)
[   13.584549] page_type: f5(slab)
[   13.584715] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.584998] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.585355] page dumped because: kasan: bad access detected
[   13.585549] 
[   13.585644] Memory state around the buggy address:
[   13.585855]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.586158]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.586413] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.586629]                                                           ^
[   13.586830]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.587049]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.587530] ==================================================================
[   13.587987] ==================================================================
[   13.588336] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.588701] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.588987] 
[   13.589070] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.589119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.589131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.589150] Call Trace:
[   13.589162]  <TASK>
[   13.589175]  dump_stack_lvl+0x73/0xb0
[   13.589200]  print_report+0xd1/0x650
[   13.589221]  ? __virt_addr_valid+0x1db/0x2d0
[   13.589243]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.589267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.589288]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.589313]  kasan_report+0x141/0x180
[   13.589335]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.589428]  kasan_check_range+0x10c/0x1c0
[   13.589452]  __kasan_check_write+0x18/0x20
[   13.589471]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.589496]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.589523]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.589548]  ? trace_hardirqs_on+0x37/0xe0
[   13.589575]  ? kasan_bitops_generic+0x92/0x1c0
[   13.589602]  kasan_bitops_generic+0x116/0x1c0
[   13.589625]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.589648]  ? __pfx_read_tsc+0x10/0x10
[   13.589668]  ? ktime_get_ts64+0x86/0x230
[   13.589691]  kunit_try_run_case+0x1a5/0x480
[   13.589714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.589736]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.589759]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.589781]  ? __kthread_parkme+0x82/0x180
[   13.589800]  ? preempt_count_sub+0x50/0x80
[   13.589823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.589846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.589868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.589890]  kthread+0x337/0x6f0
[   13.589909]  ? trace_preempt_on+0x20/0xc0
[   13.589934]  ? __pfx_kthread+0x10/0x10
[   13.589954]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.589974]  ? calculate_sigpending+0x7b/0xa0
[   13.589996]  ? __pfx_kthread+0x10/0x10
[   13.590017]  ret_from_fork+0x116/0x1d0
[   13.590035]  ? __pfx_kthread+0x10/0x10
[   13.590055]  ret_from_fork_asm+0x1a/0x30
[   13.590084]  </TASK>
[   13.590105] 
[   13.599573] Allocated by task 279:
[   13.599713]  kasan_save_stack+0x45/0x70
[   13.599862]  kasan_save_track+0x18/0x40
[   13.600048]  kasan_save_alloc_info+0x3b/0x50
[   13.600339]  __kasan_kmalloc+0xb7/0xc0
[   13.600537]  __kmalloc_cache_noprof+0x189/0x420
[   13.600764]  kasan_bitops_generic+0x92/0x1c0
[   13.600917]  kunit_try_run_case+0x1a5/0x480
[   13.601064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.601331]  kthread+0x337/0x6f0
[   13.601504]  ret_from_fork+0x116/0x1d0
[   13.601796]  ret_from_fork_asm+0x1a/0x30
[   13.601937] 
[   13.602010] The buggy address belongs to the object at ffff888101745ee0
[   13.602010]  which belongs to the cache kmalloc-16 of size 16
[   13.602404] The buggy address is located 8 bytes inside of
[   13.602404]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.603295] 
[   13.603422] The buggy address belongs to the physical page:
[   13.603667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.603910] flags: 0x200000000000000(node=0|zone=2)
[   13.604077] page_type: f5(slab)
[   13.604439] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.604996] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.605455] page dumped because: kasan: bad access detected
[   13.605626] 
[   13.605697] Memory state around the buggy address:
[   13.606082]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.606529]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.606752] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.606968]                                                           ^
[   13.607481]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.607817]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.608178] ==================================================================
[   13.471673] ==================================================================
[   13.472012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.472720] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.473039] 
[   13.473199] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.473240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.473253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.473274] Call Trace:
[   13.473289]  <TASK>
[   13.473304]  dump_stack_lvl+0x73/0xb0
[   13.473331]  print_report+0xd1/0x650
[   13.473357]  ? __virt_addr_valid+0x1db/0x2d0
[   13.473381]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.473446]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.473494]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.473521]  kasan_report+0x141/0x180
[   13.473544]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.473574]  kasan_check_range+0x10c/0x1c0
[   13.473597]  __kasan_check_write+0x18/0x20
[   13.473617]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.473641]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.473667]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.473691]  ? trace_hardirqs_on+0x37/0xe0
[   13.473750]  ? kasan_bitops_generic+0x92/0x1c0
[   13.473787]  kasan_bitops_generic+0x116/0x1c0
[   13.473811]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.473835]  ? __pfx_read_tsc+0x10/0x10
[   13.473855]  ? ktime_get_ts64+0x86/0x230
[   13.473879]  kunit_try_run_case+0x1a5/0x480
[   13.473908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.473929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.473952]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.474006]  ? __kthread_parkme+0x82/0x180
[   13.474027]  ? preempt_count_sub+0x50/0x80
[   13.474049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.474072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.474094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.474130]  kthread+0x337/0x6f0
[   13.474149]  ? trace_preempt_on+0x20/0xc0
[   13.474177]  ? __pfx_kthread+0x10/0x10
[   13.474197]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.474218]  ? calculate_sigpending+0x7b/0xa0
[   13.474241]  ? __pfx_kthread+0x10/0x10
[   13.474262]  ret_from_fork+0x116/0x1d0
[   13.474280]  ? __pfx_kthread+0x10/0x10
[   13.474300]  ret_from_fork_asm+0x1a/0x30
[   13.474329]  </TASK>
[   13.474341] 
[   13.484726] Allocated by task 279:
[   13.484953]  kasan_save_stack+0x45/0x70
[   13.485271]  kasan_save_track+0x18/0x40
[   13.485441]  kasan_save_alloc_info+0x3b/0x50
[   13.485690]  __kasan_kmalloc+0xb7/0xc0
[   13.485887]  __kmalloc_cache_noprof+0x189/0x420
[   13.486068]  kasan_bitops_generic+0x92/0x1c0
[   13.486360]  kunit_try_run_case+0x1a5/0x480
[   13.486626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.486975]  kthread+0x337/0x6f0
[   13.487305]  ret_from_fork+0x116/0x1d0
[   13.487626]  ret_from_fork_asm+0x1a/0x30
[   13.487846] 
[   13.487937] The buggy address belongs to the object at ffff888101745ee0
[   13.487937]  which belongs to the cache kmalloc-16 of size 16
[   13.488782] The buggy address is located 8 bytes inside of
[   13.488782]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.489436] 
[   13.489573] The buggy address belongs to the physical page:
[   13.489843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.490249] flags: 0x200000000000000(node=0|zone=2)
[   13.490599] page_type: f5(slab)
[   13.490784] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.491138] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.491639] page dumped because: kasan: bad access detected
[   13.491875] 
[   13.491948] Memory state around the buggy address:
[   13.492120]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.492599]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.493035] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.493653]                                                           ^
[   13.493906]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.494143]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.494359] ==================================================================
[   13.609434] ==================================================================
[   13.609761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.610077] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.610584] 
[   13.610684] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.610727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.610739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.610760] Call Trace:
[   13.610774]  <TASK>
[   13.610789]  dump_stack_lvl+0x73/0xb0
[   13.610816]  print_report+0xd1/0x650
[   13.610838]  ? __virt_addr_valid+0x1db/0x2d0
[   13.610859]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.610884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.610906]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.610930]  kasan_report+0x141/0x180
[   13.610952]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.610980]  kasan_check_range+0x10c/0x1c0
[   13.611003]  __kasan_check_write+0x18/0x20
[   13.611022]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.611047]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.611073]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.611110]  ? trace_hardirqs_on+0x37/0xe0
[   13.611136]  ? kasan_bitops_generic+0x92/0x1c0
[   13.611308]  kasan_bitops_generic+0x116/0x1c0
[   13.611337]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.611363]  ? __pfx_read_tsc+0x10/0x10
[   13.611384]  ? ktime_get_ts64+0x86/0x230
[   13.611407]  kunit_try_run_case+0x1a5/0x480
[   13.611430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.611451]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.611474]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.611496]  ? __kthread_parkme+0x82/0x180
[   13.611516]  ? preempt_count_sub+0x50/0x80
[   13.611539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.611561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.611583]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.611606]  kthread+0x337/0x6f0
[   13.611625]  ? trace_preempt_on+0x20/0xc0
[   13.611651]  ? __pfx_kthread+0x10/0x10
[   13.611671]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.611690]  ? calculate_sigpending+0x7b/0xa0
[   13.611713]  ? __pfx_kthread+0x10/0x10
[   13.611734]  ret_from_fork+0x116/0x1d0
[   13.611751]  ? __pfx_kthread+0x10/0x10
[   13.611771]  ret_from_fork_asm+0x1a/0x30
[   13.611800]  </TASK>
[   13.611811] 
[   13.620202] Allocated by task 279:
[   13.620425]  kasan_save_stack+0x45/0x70
[   13.620688]  kasan_save_track+0x18/0x40
[   13.621115]  kasan_save_alloc_info+0x3b/0x50
[   13.621267]  __kasan_kmalloc+0xb7/0xc0
[   13.621615]  __kmalloc_cache_noprof+0x189/0x420
[   13.621823]  kasan_bitops_generic+0x92/0x1c0
[   13.621975]  kunit_try_run_case+0x1a5/0x480
[   13.622262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.622698]  kthread+0x337/0x6f0
[   13.622865]  ret_from_fork+0x116/0x1d0
[   13.623057]  ret_from_fork_asm+0x1a/0x30
[   13.623525] 
[   13.623615] The buggy address belongs to the object at ffff888101745ee0
[   13.623615]  which belongs to the cache kmalloc-16 of size 16
[   13.623995] The buggy address is located 8 bytes inside of
[   13.623995]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.624363] 
[   13.624463] The buggy address belongs to the physical page:
[   13.624717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.625390] flags: 0x200000000000000(node=0|zone=2)
[   13.625592] page_type: f5(slab)
[   13.625715] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.625949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.626257] page dumped because: kasan: bad access detected
[   13.626767] 
[   13.626867] Memory state around the buggy address:
[   13.627108]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.627639]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.628176] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.628547]                                                           ^
[   13.628755]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.629074]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.629400] ==================================================================
[   13.495005] ==================================================================
[   13.495669] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.496010] Write of size 8 at addr ffff888101745ee8 by task kunit_try_catch/279
[   13.496502] 
[   13.496643] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.496684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.496696] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.496748] Call Trace:
[   13.496765]  <TASK>
[   13.496778]  dump_stack_lvl+0x73/0xb0
[   13.496805]  print_report+0xd1/0x650
[   13.496827]  ? __virt_addr_valid+0x1db/0x2d0
[   13.496848]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.496899]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.496922]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.496948]  kasan_report+0x141/0x180
[   13.496969]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.496999]  kasan_check_range+0x10c/0x1c0
[   13.497022]  __kasan_check_write+0x18/0x20
[   13.497041]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.497065]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.497091]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.497127]  ? trace_hardirqs_on+0x37/0xe0
[   13.497346]  ? kasan_bitops_generic+0x92/0x1c0
[   13.497384]  kasan_bitops_generic+0x116/0x1c0
[   13.497437]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.497487]  ? __pfx_read_tsc+0x10/0x10
[   13.497507]  ? ktime_get_ts64+0x86/0x230
[   13.497530]  kunit_try_run_case+0x1a5/0x480
[   13.497554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.497576]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.497600]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.497622]  ? __kthread_parkme+0x82/0x180
[   13.497642]  ? preempt_count_sub+0x50/0x80
[   13.497664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.497688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.497710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.497733]  kthread+0x337/0x6f0
[   13.497752]  ? trace_preempt_on+0x20/0xc0
[   13.497778]  ? __pfx_kthread+0x10/0x10
[   13.497798]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.497818]  ? calculate_sigpending+0x7b/0xa0
[   13.497842]  ? __pfx_kthread+0x10/0x10
[   13.497862]  ret_from_fork+0x116/0x1d0
[   13.497880]  ? __pfx_kthread+0x10/0x10
[   13.497900]  ret_from_fork_asm+0x1a/0x30
[   13.497930]  </TASK>
[   13.497941] 
[   13.507979] Allocated by task 279:
[   13.508151]  kasan_save_stack+0x45/0x70
[   13.508297]  kasan_save_track+0x18/0x40
[   13.508603]  kasan_save_alloc_info+0x3b/0x50
[   13.508820]  __kasan_kmalloc+0xb7/0xc0
[   13.508955]  __kmalloc_cache_noprof+0x189/0x420
[   13.509174]  kasan_bitops_generic+0x92/0x1c0
[   13.509637]  kunit_try_run_case+0x1a5/0x480
[   13.509849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.510088]  kthread+0x337/0x6f0
[   13.510410]  ret_from_fork+0x116/0x1d0
[   13.510553]  ret_from_fork_asm+0x1a/0x30
[   13.510767] 
[   13.510843] The buggy address belongs to the object at ffff888101745ee0
[   13.510843]  which belongs to the cache kmalloc-16 of size 16
[   13.511622] The buggy address is located 8 bytes inside of
[   13.511622]  allocated 9-byte region [ffff888101745ee0, ffff888101745ee9)
[   13.512880] 
[   13.513110] The buggy address belongs to the physical page:
[   13.513776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101745
[   13.514514] flags: 0x200000000000000(node=0|zone=2)
[   13.514857] page_type: f5(slab)
[   13.514983] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.515323] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.516044] page dumped because: kasan: bad access detected
[   13.516724] 
[   13.516887] Memory state around the buggy address:
[   13.517461]  ffff888101745d80: 00 01 fc fc 00 04 fc fc 00 04 fc fc 00 05 fc fc
[   13.518055]  ffff888101745e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.518709] >ffff888101745e80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.519270]                                                           ^
[   13.519960]  ffff888101745f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.520210]  ffff888101745f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.521131] ==================================================================