Hay
Date
July 9, 2025, 12:11 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.938848] ==================================================================
[   21.938932] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.939178] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   21.939308] 
[   21.939365] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.939550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.939586] Hardware name: linux,dummy-virt (DT)
[   21.939636] Call trace:
[   21.939663]  show_stack+0x20/0x38 (C)
[   21.939765]  dump_stack_lvl+0x8c/0xd0
[   21.939852]  print_report+0x118/0x608
[   21.939905]  kasan_report+0xdc/0x128
[   21.939973]  kasan_check_range+0x100/0x1a8
[   21.940327]  __kasan_check_write+0x20/0x30
[   21.940411]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.940564]  kasan_bitops_generic+0x110/0x1c8
[   21.940654]  kunit_try_run_case+0x170/0x3f0
[   21.941029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.941277]  kthread+0x328/0x630
[   21.941420]  ret_from_fork+0x10/0x20
[   21.941631] 
[   21.941712] Allocated by task 262:
[   21.941842]  kasan_save_stack+0x3c/0x68
[   21.941917]  kasan_save_track+0x20/0x40
[   21.942171]  kasan_save_alloc_info+0x40/0x58
[   21.942327]  __kasan_kmalloc+0xd4/0xd8
[   21.942492]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.942569]  kasan_bitops_generic+0xa0/0x1c8
[   21.942657]  kunit_try_run_case+0x170/0x3f0
[   21.942781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.942850]  kthread+0x328/0x630
[   21.942905]  ret_from_fork+0x10/0x20
[   21.943238] 
[   21.943344] The buggy address belongs to the object at fff00000c63901c0
[   21.943344]  which belongs to the cache kmalloc-16 of size 16
[   21.943459] The buggy address is located 8 bytes inside of
[   21.943459]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   21.943612] 
[   21.943646] The buggy address belongs to the physical page:
[   21.943680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   21.943760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.943822] page_type: f5(slab)
[   21.943864] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.943916] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.943969] page dumped because: kasan: bad access detected
[   21.944013] 
[   21.944043] Memory state around the buggy address:
[   21.944255]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   21.944326]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.944508] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.944555]                                               ^
[   21.944595]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.944849]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.944985] ==================================================================
[   21.988350] ==================================================================
[   21.988601] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   21.988678] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   21.988774] 
[   21.988811] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.988897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.989041] Hardware name: linux,dummy-virt (DT)
[   21.989081] Call trace:
[   21.989106]  show_stack+0x20/0x38 (C)
[   21.989161]  dump_stack_lvl+0x8c/0xd0
[   21.989284]  print_report+0x118/0x608
[   21.989356]  kasan_report+0xdc/0x128
[   21.989606]  kasan_check_range+0x100/0x1a8
[   21.989734]  __kasan_check_write+0x20/0x30
[   21.989792]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   21.989855]  kasan_bitops_generic+0x110/0x1c8
[   21.989960]  kunit_try_run_case+0x170/0x3f0
[   21.990034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.990100]  kthread+0x328/0x630
[   21.990292]  ret_from_fork+0x10/0x20
[   21.990426] 
[   21.990509] Allocated by task 262:
[   21.990559]  kasan_save_stack+0x3c/0x68
[   21.990612]  kasan_save_track+0x20/0x40
[   21.990715]  kasan_save_alloc_info+0x40/0x58
[   21.990763]  __kasan_kmalloc+0xd4/0xd8
[   21.990809]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.990851]  kasan_bitops_generic+0xa0/0x1c8
[   21.991152]  kunit_try_run_case+0x170/0x3f0
[   21.991220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.991340]  kthread+0x328/0x630
[   21.991382]  ret_from_fork+0x10/0x20
[   21.991449] 
[   21.991587] The buggy address belongs to the object at fff00000c63901c0
[   21.991587]  which belongs to the cache kmalloc-16 of size 16
[   21.991729] The buggy address is located 8 bytes inside of
[   21.991729]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   21.991855] 
[   21.991881] The buggy address belongs to the physical page:
[   21.991930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   21.991990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.992187] page_type: f5(slab)
[   21.992440] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.992517] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.992595] page dumped because: kasan: bad access detected
[   21.992704] 
[   21.992772] Memory state around the buggy address:
[   21.992815]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   21.993092]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.993179] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.993221]                                               ^
[   21.993259]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.993304]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.993346] ==================================================================
[   21.954595] ==================================================================
[   21.954840] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.955161] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   21.955244] 
[   21.955307] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.955395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.955605] Hardware name: linux,dummy-virt (DT)
[   21.955722] Call trace:
[   21.955798]  show_stack+0x20/0x38 (C)
[   21.955873]  dump_stack_lvl+0x8c/0xd0
[   21.955930]  print_report+0x118/0x608
[   21.955978]  kasan_report+0xdc/0x128
[   21.956163]  kasan_check_range+0x100/0x1a8
[   21.956337]  __kasan_check_write+0x20/0x30
[   21.956425]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.956551]  kasan_bitops_generic+0x110/0x1c8
[   21.956607]  kunit_try_run_case+0x170/0x3f0
[   21.956662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.956911]  kthread+0x328/0x630
[   21.957043]  ret_from_fork+0x10/0x20
[   21.957119] 
[   21.957149] Allocated by task 262:
[   21.957180]  kasan_save_stack+0x3c/0x68
[   21.957224]  kasan_save_track+0x20/0x40
[   21.957265]  kasan_save_alloc_info+0x40/0x58
[   21.957307]  __kasan_kmalloc+0xd4/0xd8
[   21.957351]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.957430]  kasan_bitops_generic+0xa0/0x1c8
[   21.957475]  kunit_try_run_case+0x170/0x3f0
[   21.957517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.957566]  kthread+0x328/0x630
[   21.957620]  ret_from_fork+0x10/0x20
[   21.957659] 
[   21.957682] The buggy address belongs to the object at fff00000c63901c0
[   21.957682]  which belongs to the cache kmalloc-16 of size 16
[   21.957743] The buggy address is located 8 bytes inside of
[   21.957743]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   21.957807] 
[   21.957846] The buggy address belongs to the physical page:
[   21.957880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   21.957947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.958010] page_type: f5(slab)
[   21.958051] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.958114] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.958161] page dumped because: kasan: bad access detected
[   21.958198] 
[   21.958221] Memory state around the buggy address:
[   21.958271]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   21.958318]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.958364] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.958417]                                               ^
[   21.958464]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.958520]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.958577] ==================================================================
[   21.975038] ==================================================================
[   21.975159] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   21.975214] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   21.975315] 
[   21.975374] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.975548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.975580] Hardware name: linux,dummy-virt (DT)
[   21.975623] Call trace:
[   21.975813]  show_stack+0x20/0x38 (C)
[   21.975885]  dump_stack_lvl+0x8c/0xd0
[   21.976120]  print_report+0x118/0x608
[   21.976282]  kasan_report+0xdc/0x128
[   21.976391]  kasan_check_range+0x100/0x1a8
[   21.976572]  __kasan_check_write+0x20/0x30
[   21.976622]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   21.976859]  kasan_bitops_generic+0x110/0x1c8
[   21.977052]  kunit_try_run_case+0x170/0x3f0
[   21.977170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.977354]  kthread+0x328/0x630
[   21.977475]  ret_from_fork+0x10/0x20
[   21.977584] 
[   21.977813] Allocated by task 262:
[   21.978016]  kasan_save_stack+0x3c/0x68
[   21.978206]  kasan_save_track+0x20/0x40
[   21.978249]  kasan_save_alloc_info+0x40/0x58
[   21.978436]  __kasan_kmalloc+0xd4/0xd8
[   21.978573]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.978701]  kasan_bitops_generic+0xa0/0x1c8
[   21.978789]  kunit_try_run_case+0x170/0x3f0
[   21.978916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.979014]  kthread+0x328/0x630
[   21.979081]  ret_from_fork+0x10/0x20
[   21.979178] 
[   21.979202] The buggy address belongs to the object at fff00000c63901c0
[   21.979202]  which belongs to the cache kmalloc-16 of size 16
[   21.979456] The buggy address is located 8 bytes inside of
[   21.979456]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   21.979655] 
[   21.979760] The buggy address belongs to the physical page:
[   21.979828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   21.979960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.980065] page_type: f5(slab)
[   21.980145] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.980201] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.980475] page dumped because: kasan: bad access detected
[   21.980617] 
[   21.980648] Memory state around the buggy address:
[   21.980684]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   21.980731]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.980776] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.980831]                                               ^
[   21.980869]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.980916]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.980966] ==================================================================
[   22.000942] ==================================================================
[   22.000994] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   22.001047] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   22.001105] 
[   22.001135] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.001218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.001248] Hardware name: linux,dummy-virt (DT)
[   22.001280] Call trace:
[   22.001303]  show_stack+0x20/0x38 (C)
[   22.001354]  dump_stack_lvl+0x8c/0xd0
[   22.001414]  print_report+0x118/0x608
[   22.001465]  kasan_report+0xdc/0x128
[   22.001514]  __asan_report_load8_noabort+0x20/0x30
[   22.001568]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   22.001622]  kasan_bitops_generic+0x110/0x1c8
[   22.001675]  kunit_try_run_case+0x170/0x3f0
[   22.001725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.001782]  kthread+0x328/0x630
[   22.001827]  ret_from_fork+0x10/0x20
[   22.001878] 
[   22.001898] Allocated by task 262:
[   22.001928]  kasan_save_stack+0x3c/0x68
[   22.001971]  kasan_save_track+0x20/0x40
[   22.002012]  kasan_save_alloc_info+0x40/0x58
[   22.002055]  __kasan_kmalloc+0xd4/0xd8
[   22.002095]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.002136]  kasan_bitops_generic+0xa0/0x1c8
[   22.002177]  kunit_try_run_case+0x170/0x3f0
[   22.002217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.002263]  kthread+0x328/0x630
[   22.002299]  ret_from_fork+0x10/0x20
[   22.002337] 
[   22.002357] The buggy address belongs to the object at fff00000c63901c0
[   22.002357]  which belongs to the cache kmalloc-16 of size 16
[   22.003508] The buggy address is located 8 bytes inside of
[   22.003508]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   22.003594] 
[   22.003615] The buggy address belongs to the physical page:
[   22.003649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   22.003714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.003765] page_type: f5(slab)
[   22.003806] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.003859] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.003902] page dumped because: kasan: bad access detected
[   22.003934] 
[   22.003953] Memory state around the buggy address:
[   22.003987]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   22.004034]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.005087] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.005132]                                               ^
[   22.005172]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.005530]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.005580] ==================================================================
[   21.947748] ==================================================================
[   21.947822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.947897] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   21.947952] 
[   21.948227] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.948442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.948507] Hardware name: linux,dummy-virt (DT)
[   21.948888] Call trace:
[   21.948920]  show_stack+0x20/0x38 (C)
[   21.948978]  dump_stack_lvl+0x8c/0xd0
[   21.949036]  print_report+0x118/0x608
[   21.949092]  kasan_report+0xdc/0x128
[   21.949204]  __asan_report_load8_noabort+0x20/0x30
[   21.949563]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.949670]  kasan_bitops_generic+0x110/0x1c8
[   21.949811]  kunit_try_run_case+0x170/0x3f0
[   21.949871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.949934]  kthread+0x328/0x630
[   21.949981]  ret_from_fork+0x10/0x20
[   21.950030] 
[   21.950051] Allocated by task 262:
[   21.950083]  kasan_save_stack+0x3c/0x68
[   21.950137]  kasan_save_track+0x20/0x40
[   21.950178]  kasan_save_alloc_info+0x40/0x58
[   21.950220]  __kasan_kmalloc+0xd4/0xd8
[   21.950270]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.950312]  kasan_bitops_generic+0xa0/0x1c8
[   21.950361]  kunit_try_run_case+0x170/0x3f0
[   21.950541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.950825]  kthread+0x328/0x630
[   21.951024]  ret_from_fork+0x10/0x20
[   21.951236] 
[   21.951458] The buggy address belongs to the object at fff00000c63901c0
[   21.951458]  which belongs to the cache kmalloc-16 of size 16
[   21.951601] The buggy address is located 8 bytes inside of
[   21.951601]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   21.951670] 
[   21.951694] The buggy address belongs to the physical page:
[   21.951903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   21.952220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.952346] page_type: f5(slab)
[   21.952436] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.952569] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.952658] page dumped because: kasan: bad access detected
[   21.952757] 
[   21.952817] Memory state around the buggy address:
[   21.952972]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   21.953058]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.953186] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.953263]                                               ^
[   21.953303]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.953349]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.953544] ==================================================================
[   21.960349] ==================================================================
[   21.960411] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   21.960467] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   21.960886] 
[   21.960934] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.961108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.961168] Hardware name: linux,dummy-virt (DT)
[   21.961365] Call trace:
[   21.961462]  show_stack+0x20/0x38 (C)
[   21.961583]  dump_stack_lvl+0x8c/0xd0
[   21.961848]  print_report+0x118/0x608
[   21.961978]  kasan_report+0xdc/0x128
[   21.962065]  __asan_report_load8_noabort+0x20/0x30
[   21.962215]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   21.962311]  kasan_bitops_generic+0x110/0x1c8
[   21.962716]  kunit_try_run_case+0x170/0x3f0
[   21.962804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.962919]  kthread+0x328/0x630
[   21.963016]  ret_from_fork+0x10/0x20
[   21.963170] 
[   21.963278] Allocated by task 262:
[   21.963336]  kasan_save_stack+0x3c/0x68
[   21.963459]  kasan_save_track+0x20/0x40
[   21.963541]  kasan_save_alloc_info+0x40/0x58
[   21.963618]  __kasan_kmalloc+0xd4/0xd8
[   21.963786]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.963947]  kasan_bitops_generic+0xa0/0x1c8
[   21.964068]  kunit_try_run_case+0x170/0x3f0
[   21.964236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.964361]  kthread+0x328/0x630
[   21.964457]  ret_from_fork+0x10/0x20
[   21.964589] 
[   21.964612] The buggy address belongs to the object at fff00000c63901c0
[   21.964612]  which belongs to the cache kmalloc-16 of size 16
[   21.964683] The buggy address is located 8 bytes inside of
[   21.964683]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   21.964921] 
[   21.965089] The buggy address belongs to the physical page:
[   21.965212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   21.965327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.965472] page_type: f5(slab)
[   21.965556] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.965654] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.965699] page dumped because: kasan: bad access detected
[   21.965773] 
[   21.965926] Memory state around the buggy address:
[   21.966055]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   21.966129]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.966376] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.966527]                                               ^
[   21.966601]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.966738]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.966815] ==================================================================
[   21.982320] ==================================================================
[   21.982490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   21.982578] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   21.982633] 
[   21.982697] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.983030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.983075] Hardware name: linux,dummy-virt (DT)
[   21.983110] Call trace:
[   21.983173]  show_stack+0x20/0x38 (C)
[   21.983259]  dump_stack_lvl+0x8c/0xd0
[   21.983508]  print_report+0x118/0x608
[   21.983725]  kasan_report+0xdc/0x128
[   21.984009]  __asan_report_load8_noabort+0x20/0x30
[   21.984148]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   21.984224]  kasan_bitops_generic+0x110/0x1c8
[   21.984367]  kunit_try_run_case+0x170/0x3f0
[   21.984514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.984632]  kthread+0x328/0x630
[   21.984762]  ret_from_fork+0x10/0x20
[   21.984819] 
[   21.984839] Allocated by task 262:
[   21.984890]  kasan_save_stack+0x3c/0x68
[   21.984934]  kasan_save_track+0x20/0x40
[   21.984975]  kasan_save_alloc_info+0x40/0x58
[   21.985219]  __kasan_kmalloc+0xd4/0xd8
[   21.985446]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.985582]  kasan_bitops_generic+0xa0/0x1c8
[   21.985678]  kunit_try_run_case+0x170/0x3f0
[   21.985774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.985831]  kthread+0x328/0x630
[   21.985878]  ret_from_fork+0x10/0x20
[   21.985916] 
[   21.985938] The buggy address belongs to the object at fff00000c63901c0
[   21.985938]  which belongs to the cache kmalloc-16 of size 16
[   21.986011] The buggy address is located 8 bytes inside of
[   21.986011]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   21.986075] 
[   21.986101] The buggy address belongs to the physical page:
[   21.986144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   21.986202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.986261] page_type: f5(slab)
[   21.986302] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.986355] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.986410] page dumped because: kasan: bad access detected
[   21.986443] 
[   21.986462] Memory state around the buggy address:
[   21.986853]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   21.986989]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.987085] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.987167]                                               ^
[   21.987208]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.987273]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.987520] ==================================================================
[   21.993827] ==================================================================
[   21.993878] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   21.993929] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   21.993981] 
[   21.994013] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.994097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.994125] Hardware name: linux,dummy-virt (DT)
[   21.994157] Call trace:
[   21.994180]  show_stack+0x20/0x38 (C)
[   21.994231]  dump_stack_lvl+0x8c/0xd0
[   21.994281]  print_report+0x118/0x608
[   21.994339]  kasan_report+0xdc/0x128
[   21.994389]  kasan_check_range+0x100/0x1a8
[   21.994798]  __kasan_check_write+0x20/0x30
[   21.995128]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   21.995195]  kasan_bitops_generic+0x110/0x1c8
[   21.995261]  kunit_try_run_case+0x170/0x3f0
[   21.995316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.995391]  kthread+0x328/0x630
[   21.995659]  ret_from_fork+0x10/0x20
[   21.995734] 
[   21.995843] Allocated by task 262:
[   21.995878]  kasan_save_stack+0x3c/0x68
[   21.995924]  kasan_save_track+0x20/0x40
[   21.996016]  kasan_save_alloc_info+0x40/0x58
[   21.996104]  __kasan_kmalloc+0xd4/0xd8
[   21.996182]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.996438]  kasan_bitops_generic+0xa0/0x1c8
[   21.996535]  kunit_try_run_case+0x170/0x3f0
[   21.996663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.996737]  kthread+0x328/0x630
[   21.997022]  ret_from_fork+0x10/0x20
[   21.997383] 
[   21.997482] The buggy address belongs to the object at fff00000c63901c0
[   21.997482]  which belongs to the cache kmalloc-16 of size 16
[   21.997588] The buggy address is located 8 bytes inside of
[   21.997588]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   21.997751] 
[   21.997830] The buggy address belongs to the physical page:
[   21.997919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   21.997989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.998180] page_type: f5(slab)
[   21.998389] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.998536] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.998617] page dumped because: kasan: bad access detected
[   21.998730] 
[   21.998779] Memory state around the buggy address:
[   21.998947]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   21.999034]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.999383] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.999453]                                               ^
[   21.999554]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.999636]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.999702] ==================================================================
[   21.967757] ==================================================================
[   21.967813] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   21.968057] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   21.968203] 
[   21.968284] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.968372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.968706] Hardware name: linux,dummy-virt (DT)
[   21.968809] Call trace:
[   21.968870]  show_stack+0x20/0x38 (C)
[   21.968973]  dump_stack_lvl+0x8c/0xd0
[   21.969133]  print_report+0x118/0x608
[   21.969218]  kasan_report+0xdc/0x128
[   21.969351]  kasan_check_range+0x100/0x1a8
[   21.969445]  __kasan_check_write+0x20/0x30
[   21.969561]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   21.969628]  kasan_bitops_generic+0x110/0x1c8
[   21.969908]  kunit_try_run_case+0x170/0x3f0
[   21.970045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.970149]  kthread+0x328/0x630
[   21.970250]  ret_from_fork+0x10/0x20
[   21.970358] 
[   21.970482] Allocated by task 262:
[   21.970571]  kasan_save_stack+0x3c/0x68
[   21.970901]  kasan_save_track+0x20/0x40
[   21.971021]  kasan_save_alloc_info+0x40/0x58
[   21.971107]  __kasan_kmalloc+0xd4/0xd8
[   21.971198]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.971357]  kasan_bitops_generic+0xa0/0x1c8
[   21.971481]  kunit_try_run_case+0x170/0x3f0
[   21.971550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.971736]  kthread+0x328/0x630
[   21.971860]  ret_from_fork+0x10/0x20
[   21.972003] 
[   21.972055] The buggy address belongs to the object at fff00000c63901c0
[   21.972055]  which belongs to the cache kmalloc-16 of size 16
[   21.972223] The buggy address is located 8 bytes inside of
[   21.972223]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   21.972338] 
[   21.972484] The buggy address belongs to the physical page:
[   21.972550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   21.972672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.972725] page_type: f5(slab)
[   21.972776] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.972848] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.973044] page dumped because: kasan: bad access detected
[   21.973223] 
[   21.973338] Memory state around the buggy address:
[   21.973426]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   21.973501]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.973617] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.973660]                                               ^
[   21.973699]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.973891]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.974019] ==================================================================

[   14.731885] ==================================================================
[   14.732596] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.732977] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   14.733296] 
[   14.733397] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.733443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.733455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.733477] Call Trace:
[   14.733489]  <TASK>
[   14.733506]  dump_stack_lvl+0x73/0xb0
[   14.733537]  print_report+0xd1/0x650
[   14.733560]  ? __virt_addr_valid+0x1db/0x2d0
[   14.733585]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.733612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.733635]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.733662]  kasan_report+0x141/0x180
[   14.733683]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.733715]  kasan_check_range+0x10c/0x1c0
[   14.733738]  __kasan_check_write+0x18/0x20
[   14.733757]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.733784]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.733812]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.733837]  ? trace_hardirqs_on+0x37/0xe0
[   14.733860]  ? kasan_bitops_generic+0x92/0x1c0
[   14.733888]  kasan_bitops_generic+0x116/0x1c0
[   14.733912]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.734336]  ? __pfx_read_tsc+0x10/0x10
[   14.734374]  ? ktime_get_ts64+0x86/0x230
[   14.734402]  kunit_try_run_case+0x1a5/0x480
[   14.734429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.734453]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.734479]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.734504]  ? __kthread_parkme+0x82/0x180
[   14.734527]  ? preempt_count_sub+0x50/0x80
[   14.734551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.734576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.734601]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.734626]  kthread+0x337/0x6f0
[   14.734645]  ? trace_preempt_on+0x20/0xc0
[   14.734669]  ? __pfx_kthread+0x10/0x10
[   14.734689]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.734717]  ? calculate_sigpending+0x7b/0xa0
[   14.734742]  ? __pfx_kthread+0x10/0x10
[   14.734762]  ret_from_fork+0x116/0x1d0
[   14.734780]  ? __pfx_kthread+0x10/0x10
[   14.734801]  ret_from_fork_asm+0x1a/0x30
[   14.734831]  </TASK>
[   14.734841] 
[   14.743276] Allocated by task 278:
[   14.743424]  kasan_save_stack+0x45/0x70
[   14.743849]  kasan_save_track+0x18/0x40
[   14.744080]  kasan_save_alloc_info+0x3b/0x50
[   14.744307]  __kasan_kmalloc+0xb7/0xc0
[   14.744501]  __kmalloc_cache_noprof+0x189/0x420
[   14.744656]  kasan_bitops_generic+0x92/0x1c0
[   14.744882]  kunit_try_run_case+0x1a5/0x480
[   14.745185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.745377]  kthread+0x337/0x6f0
[   14.745559]  ret_from_fork+0x116/0x1d0
[   14.745749]  ret_from_fork_asm+0x1a/0x30
[   14.745910] 
[   14.746014] The buggy address belongs to the object at ffff888102574300
[   14.746014]  which belongs to the cache kmalloc-16 of size 16
[   14.746354] The buggy address is located 8 bytes inside of
[   14.746354]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   14.746685] 
[   14.746765] The buggy address belongs to the physical page:
[   14.746951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   14.747191] flags: 0x200000000000000(node=0|zone=2)
[   14.748373] page_type: f5(slab)
[   14.749293] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.750544] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.752367] page dumped because: kasan: bad access detected
[   14.752943] 
[   14.753704] Memory state around the buggy address:
[   14.754331]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.754555]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.754776] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.754997]                       ^
[   14.755120]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.755341]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.755590] ==================================================================
[   14.758647] ==================================================================
[   14.759591] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.760483] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   14.760955] 
[   14.761055] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.761101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.761113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.761135] Call Trace:
[   14.761147]  <TASK>
[   14.761165]  dump_stack_lvl+0x73/0xb0
[   14.761198]  print_report+0xd1/0x650
[   14.761221]  ? __virt_addr_valid+0x1db/0x2d0
[   14.761244]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.761470]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.761499]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.761526]  kasan_report+0x141/0x180
[   14.761549]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.761581]  kasan_check_range+0x10c/0x1c0
[   14.761605]  __kasan_check_write+0x18/0x20
[   14.761624]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.761651]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.761679]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.761705]  ? trace_hardirqs_on+0x37/0xe0
[   14.761729]  ? kasan_bitops_generic+0x92/0x1c0
[   14.761758]  kasan_bitops_generic+0x116/0x1c0
[   14.761781]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.761807]  ? __pfx_read_tsc+0x10/0x10
[   14.761829]  ? ktime_get_ts64+0x86/0x230
[   14.761853]  kunit_try_run_case+0x1a5/0x480
[   14.761879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.761902]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.761928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.762021]  ? __kthread_parkme+0x82/0x180
[   14.762044]  ? preempt_count_sub+0x50/0x80
[   14.762069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.762094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.762120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.762145]  kthread+0x337/0x6f0
[   14.762164]  ? trace_preempt_on+0x20/0xc0
[   14.762187]  ? __pfx_kthread+0x10/0x10
[   14.762207]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.762229]  ? calculate_sigpending+0x7b/0xa0
[   14.762254]  ? __pfx_kthread+0x10/0x10
[   14.762275]  ret_from_fork+0x116/0x1d0
[   14.762294]  ? __pfx_kthread+0x10/0x10
[   14.762314]  ret_from_fork_asm+0x1a/0x30
[   14.762346]  </TASK>
[   14.762357] 
[   14.777293] Allocated by task 278:
[   14.777514]  kasan_save_stack+0x45/0x70
[   14.777718]  kasan_save_track+0x18/0x40
[   14.777886]  kasan_save_alloc_info+0x3b/0x50
[   14.778631]  __kasan_kmalloc+0xb7/0xc0
[   14.778840]  __kmalloc_cache_noprof+0x189/0x420
[   14.779335]  kasan_bitops_generic+0x92/0x1c0
[   14.779556]  kunit_try_run_case+0x1a5/0x480
[   14.779890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.780571]  kthread+0x337/0x6f0
[   14.780767]  ret_from_fork+0x116/0x1d0
[   14.781249]  ret_from_fork_asm+0x1a/0x30
[   14.781577] 
[   14.781680] The buggy address belongs to the object at ffff888102574300
[   14.781680]  which belongs to the cache kmalloc-16 of size 16
[   14.782148] The buggy address is located 8 bytes inside of
[   14.782148]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   14.782596] 
[   14.782696] The buggy address belongs to the physical page:
[   14.783523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   14.783833] flags: 0x200000000000000(node=0|zone=2)
[   14.784303] page_type: f5(slab)
[   14.784666] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.785332] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.785772] page dumped because: kasan: bad access detected
[   14.786442] 
[   14.786553] Memory state around the buggy address:
[   14.786875]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.787416]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.787836] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.788359]                       ^
[   14.788532]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.788833]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.789510] ==================================================================
[   14.848347] ==================================================================
[   14.848881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.849458] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   14.849989] 
[   14.850437] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.850486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.850499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.850521] Call Trace:
[   14.850540]  <TASK>
[   14.850558]  dump_stack_lvl+0x73/0xb0
[   14.850591]  print_report+0xd1/0x650
[   14.850615]  ? __virt_addr_valid+0x1db/0x2d0
[   14.850639]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.850665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.850688]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.850723]  kasan_report+0x141/0x180
[   14.850745]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.850776]  kasan_check_range+0x10c/0x1c0
[   14.850800]  __kasan_check_write+0x18/0x20
[   14.850819]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.850846]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.850875]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.850900]  ? trace_hardirqs_on+0x37/0xe0
[   14.850923]  ? kasan_bitops_generic+0x92/0x1c0
[   14.851056]  kasan_bitops_generic+0x116/0x1c0
[   14.851081]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.851107]  ? __pfx_read_tsc+0x10/0x10
[   14.851129]  ? ktime_get_ts64+0x86/0x230
[   14.851154]  kunit_try_run_case+0x1a5/0x480
[   14.851180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.851203]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.851228]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.851253]  ? __kthread_parkme+0x82/0x180
[   14.851282]  ? preempt_count_sub+0x50/0x80
[   14.851306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.851332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.851357]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.851383]  kthread+0x337/0x6f0
[   14.851402]  ? trace_preempt_on+0x20/0xc0
[   14.851424]  ? __pfx_kthread+0x10/0x10
[   14.851445]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.851467]  ? calculate_sigpending+0x7b/0xa0
[   14.851492]  ? __pfx_kthread+0x10/0x10
[   14.851512]  ret_from_fork+0x116/0x1d0
[   14.851530]  ? __pfx_kthread+0x10/0x10
[   14.851551]  ret_from_fork_asm+0x1a/0x30
[   14.851581]  </TASK>
[   14.851592] 
[   14.865744] Allocated by task 278:
[   14.866313]  kasan_save_stack+0x45/0x70
[   14.866532]  kasan_save_track+0x18/0x40
[   14.866685]  kasan_save_alloc_info+0x3b/0x50
[   14.866917]  __kasan_kmalloc+0xb7/0xc0
[   14.867562]  __kmalloc_cache_noprof+0x189/0x420
[   14.867854]  kasan_bitops_generic+0x92/0x1c0
[   14.868278]  kunit_try_run_case+0x1a5/0x480
[   14.868631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.868996]  kthread+0x337/0x6f0
[   14.869365]  ret_from_fork+0x116/0x1d0
[   14.869650]  ret_from_fork_asm+0x1a/0x30
[   14.869838] 
[   14.869911] The buggy address belongs to the object at ffff888102574300
[   14.869911]  which belongs to the cache kmalloc-16 of size 16
[   14.870775] The buggy address is located 8 bytes inside of
[   14.870775]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   14.871787] 
[   14.871897] The buggy address belongs to the physical page:
[   14.872492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   14.872946] flags: 0x200000000000000(node=0|zone=2)
[   14.873365] page_type: f5(slab)
[   14.873634] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.874223] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.874661] page dumped because: kasan: bad access detected
[   14.875253] 
[   14.875359] Memory state around the buggy address:
[   14.875558]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.876193]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.876672] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.877231]                       ^
[   14.877582]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.878011]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.878524] ==================================================================
[   14.939458] ==================================================================
[   14.939782] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.940923] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   14.941375] 
[   14.941614] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.941663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.941782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.941805] Call Trace:
[   14.941827]  <TASK>
[   14.941847]  dump_stack_lvl+0x73/0xb0
[   14.941882]  print_report+0xd1/0x650
[   14.941906]  ? __virt_addr_valid+0x1db/0x2d0
[   14.941928]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.941982]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.942005]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.942032]  kasan_report+0x141/0x180
[   14.942053]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.942085]  kasan_check_range+0x10c/0x1c0
[   14.942108]  __kasan_check_write+0x18/0x20
[   14.942129]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.942158]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.942187]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.942212]  ? trace_hardirqs_on+0x37/0xe0
[   14.942234]  ? kasan_bitops_generic+0x92/0x1c0
[   14.942263]  kasan_bitops_generic+0x116/0x1c0
[   14.942287]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.942312]  ? __pfx_read_tsc+0x10/0x10
[   14.942333]  ? ktime_get_ts64+0x86/0x230
[   14.942358]  kunit_try_run_case+0x1a5/0x480
[   14.942385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.942408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.942433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.942457]  ? __kthread_parkme+0x82/0x180
[   14.942478]  ? preempt_count_sub+0x50/0x80
[   14.942502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.942526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.942551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.942576]  kthread+0x337/0x6f0
[   14.942594]  ? trace_preempt_on+0x20/0xc0
[   14.942616]  ? __pfx_kthread+0x10/0x10
[   14.942636]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.942657]  ? calculate_sigpending+0x7b/0xa0
[   14.942681]  ? __pfx_kthread+0x10/0x10
[   14.942702]  ret_from_fork+0x116/0x1d0
[   14.942727]  ? __pfx_kthread+0x10/0x10
[   14.942747]  ret_from_fork_asm+0x1a/0x30
[   14.942778]  </TASK>
[   14.942788] 
[   14.956819] Allocated by task 278:
[   14.957277]  kasan_save_stack+0x45/0x70
[   14.957487]  kasan_save_track+0x18/0x40
[   14.957653]  kasan_save_alloc_info+0x3b/0x50
[   14.957869]  __kasan_kmalloc+0xb7/0xc0
[   14.958456]  __kmalloc_cache_noprof+0x189/0x420
[   14.958650]  kasan_bitops_generic+0x92/0x1c0
[   14.959144]  kunit_try_run_case+0x1a5/0x480
[   14.959542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.959918]  kthread+0x337/0x6f0
[   14.960460]  ret_from_fork+0x116/0x1d0
[   14.960626]  ret_from_fork_asm+0x1a/0x30
[   14.961108] 
[   14.961208] The buggy address belongs to the object at ffff888102574300
[   14.961208]  which belongs to the cache kmalloc-16 of size 16
[   14.962114] The buggy address is located 8 bytes inside of
[   14.962114]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   14.962818] 
[   14.962918] The buggy address belongs to the physical page:
[   14.963130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   14.964229] flags: 0x200000000000000(node=0|zone=2)
[   14.964751] page_type: f5(slab)
[   14.964883] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.965595] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.965849] page dumped because: kasan: bad access detected
[   14.966224] 
[   14.966402] Memory state around the buggy address:
[   14.966818]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.967645]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.968175] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.969051]                       ^
[   14.969372]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.969586]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.969799] ==================================================================
[   14.790572] ==================================================================
[   14.790907] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.791519] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   14.792197] 
[   14.792686] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.792737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.792749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.792771] Call Trace:
[   14.792791]  <TASK>
[   14.792810]  dump_stack_lvl+0x73/0xb0
[   14.792845]  print_report+0xd1/0x650
[   14.792869]  ? __virt_addr_valid+0x1db/0x2d0
[   14.792892]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.792918]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.793122]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.793155]  kasan_report+0x141/0x180
[   14.793178]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.793210]  kasan_check_range+0x10c/0x1c0
[   14.793233]  __kasan_check_write+0x18/0x20
[   14.793253]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.793293]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.793321]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.793346]  ? trace_hardirqs_on+0x37/0xe0
[   14.793370]  ? kasan_bitops_generic+0x92/0x1c0
[   14.793398]  kasan_bitops_generic+0x116/0x1c0
[   14.793422]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.793448]  ? __pfx_read_tsc+0x10/0x10
[   14.793470]  ? ktime_get_ts64+0x86/0x230
[   14.793494]  kunit_try_run_case+0x1a5/0x480
[   14.793519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.793542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.793568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.793591]  ? __kthread_parkme+0x82/0x180
[   14.793612]  ? preempt_count_sub+0x50/0x80
[   14.793636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.793661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.793686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.793711]  kthread+0x337/0x6f0
[   14.793730]  ? trace_preempt_on+0x20/0xc0
[   14.793752]  ? __pfx_kthread+0x10/0x10
[   14.793773]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.793795]  ? calculate_sigpending+0x7b/0xa0
[   14.793821]  ? __pfx_kthread+0x10/0x10
[   14.793842]  ret_from_fork+0x116/0x1d0
[   14.793861]  ? __pfx_kthread+0x10/0x10
[   14.793882]  ret_from_fork_asm+0x1a/0x30
[   14.793913]  </TASK>
[   14.793923] 
[   14.806105] Allocated by task 278:
[   14.806287]  kasan_save_stack+0x45/0x70
[   14.806572]  kasan_save_track+0x18/0x40
[   14.806778]  kasan_save_alloc_info+0x3b/0x50
[   14.806990]  __kasan_kmalloc+0xb7/0xc0
[   14.807506]  __kmalloc_cache_noprof+0x189/0x420
[   14.807831]  kasan_bitops_generic+0x92/0x1c0
[   14.808240]  kunit_try_run_case+0x1a5/0x480
[   14.808538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.808776]  kthread+0x337/0x6f0
[   14.808901]  ret_from_fork+0x116/0x1d0
[   14.809509]  ret_from_fork_asm+0x1a/0x30
[   14.809723] 
[   14.809822] The buggy address belongs to the object at ffff888102574300
[   14.809822]  which belongs to the cache kmalloc-16 of size 16
[   14.810852] The buggy address is located 8 bytes inside of
[   14.810852]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   14.811704] 
[   14.811812] The buggy address belongs to the physical page:
[   14.812356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   14.812821] flags: 0x200000000000000(node=0|zone=2)
[   14.813057] page_type: f5(slab)
[   14.813214] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.813602] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.814418] page dumped because: kasan: bad access detected
[   14.814696] 
[   14.814786] Memory state around the buggy address:
[   14.815286]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.815714]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.816208] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.816663]                       ^
[   14.816813]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.817404]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.817816] ==================================================================
[   14.909849] ==================================================================
[   14.910629] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.911497] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   14.911817] 
[   14.911922] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.912345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.912360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.912382] Call Trace:
[   14.912404]  <TASK>
[   14.912423]  dump_stack_lvl+0x73/0xb0
[   14.912458]  print_report+0xd1/0x650
[   14.912481]  ? __virt_addr_valid+0x1db/0x2d0
[   14.912505]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.912531]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.912554]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.912582]  kasan_report+0x141/0x180
[   14.912603]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.912634]  kasan_check_range+0x10c/0x1c0
[   14.912657]  __kasan_check_write+0x18/0x20
[   14.912677]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.912704]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.912734]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.912759]  ? trace_hardirqs_on+0x37/0xe0
[   14.912781]  ? kasan_bitops_generic+0x92/0x1c0
[   14.912809]  kasan_bitops_generic+0x116/0x1c0
[   14.912832]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.912858]  ? __pfx_read_tsc+0x10/0x10
[   14.912879]  ? ktime_get_ts64+0x86/0x230
[   14.912905]  kunit_try_run_case+0x1a5/0x480
[   14.912929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.913019]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.913045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.913069]  ? __kthread_parkme+0x82/0x180
[   14.913091]  ? preempt_count_sub+0x50/0x80
[   14.913114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.913139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.913164]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.913189]  kthread+0x337/0x6f0
[   14.913208]  ? trace_preempt_on+0x20/0xc0
[   14.913230]  ? __pfx_kthread+0x10/0x10
[   14.913251]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.913273]  ? calculate_sigpending+0x7b/0xa0
[   14.913297]  ? __pfx_kthread+0x10/0x10
[   14.913320]  ret_from_fork+0x116/0x1d0
[   14.913338]  ? __pfx_kthread+0x10/0x10
[   14.913359]  ret_from_fork_asm+0x1a/0x30
[   14.913389]  </TASK>
[   14.913400] 
[   14.926134] Allocated by task 278:
[   14.926490]  kasan_save_stack+0x45/0x70
[   14.926805]  kasan_save_track+0x18/0x40
[   14.927102]  kasan_save_alloc_info+0x3b/0x50
[   14.927302]  __kasan_kmalloc+0xb7/0xc0
[   14.927812]  __kmalloc_cache_noprof+0x189/0x420
[   14.928402]  kasan_bitops_generic+0x92/0x1c0
[   14.928635]  kunit_try_run_case+0x1a5/0x480
[   14.928918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.929171]  kthread+0x337/0x6f0
[   14.929624]  ret_from_fork+0x116/0x1d0
[   14.929817]  ret_from_fork_asm+0x1a/0x30
[   14.930144] 
[   14.930224] The buggy address belongs to the object at ffff888102574300
[   14.930224]  which belongs to the cache kmalloc-16 of size 16
[   14.931328] The buggy address is located 8 bytes inside of
[   14.931328]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   14.931847] 
[   14.931953] The buggy address belongs to the physical page:
[   14.932547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   14.933011] flags: 0x200000000000000(node=0|zone=2)
[   14.933501] page_type: f5(slab)
[   14.933775] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.934322] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.934759] page dumped because: kasan: bad access detected
[   14.935006] 
[   14.935362] Memory state around the buggy address:
[   14.935704]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.936397]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.936811] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.937315]                       ^
[   14.937613]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.938222]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.938692] ==================================================================
[   14.818773] ==================================================================
[   14.819429] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.819883] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   14.820600] 
[   14.820715] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.820762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.820773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.820794] Call Trace:
[   14.820814]  <TASK>
[   14.820832]  dump_stack_lvl+0x73/0xb0
[   14.820863]  print_report+0xd1/0x650
[   14.820910]  ? __virt_addr_valid+0x1db/0x2d0
[   14.820945]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.821059]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.821084]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.821111]  kasan_report+0x141/0x180
[   14.821134]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.821166]  kasan_check_range+0x10c/0x1c0
[   14.821190]  __kasan_check_write+0x18/0x20
[   14.821210]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.821236]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.821353]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.821381]  ? trace_hardirqs_on+0x37/0xe0
[   14.821406]  ? kasan_bitops_generic+0x92/0x1c0
[   14.821434]  kasan_bitops_generic+0x116/0x1c0
[   14.821458]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.821484]  ? __pfx_read_tsc+0x10/0x10
[   14.821506]  ? ktime_get_ts64+0x86/0x230
[   14.821530]  kunit_try_run_case+0x1a5/0x480
[   14.821555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.821579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.821604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.821629]  ? __kthread_parkme+0x82/0x180
[   14.821650]  ? preempt_count_sub+0x50/0x80
[   14.821675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.821701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.821730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.821757]  kthread+0x337/0x6f0
[   14.821776]  ? trace_preempt_on+0x20/0xc0
[   14.821797]  ? __pfx_kthread+0x10/0x10
[   14.821818]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.821840]  ? calculate_sigpending+0x7b/0xa0
[   14.821865]  ? __pfx_kthread+0x10/0x10
[   14.821887]  ret_from_fork+0x116/0x1d0
[   14.821904]  ? __pfx_kthread+0x10/0x10
[   14.821925]  ret_from_fork_asm+0x1a/0x30
[   14.821985]  </TASK>
[   14.821996] 
[   14.835688] Allocated by task 278:
[   14.835870]  kasan_save_stack+0x45/0x70
[   14.836388]  kasan_save_track+0x18/0x40
[   14.836611]  kasan_save_alloc_info+0x3b/0x50
[   14.836929]  __kasan_kmalloc+0xb7/0xc0
[   14.837342]  __kmalloc_cache_noprof+0x189/0x420
[   14.837665]  kasan_bitops_generic+0x92/0x1c0
[   14.837870]  kunit_try_run_case+0x1a5/0x480
[   14.838385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.838746]  kthread+0x337/0x6f0
[   14.838928]  ret_from_fork+0x116/0x1d0
[   14.839243]  ret_from_fork_asm+0x1a/0x30
[   14.839645] 
[   14.839764] The buggy address belongs to the object at ffff888102574300
[   14.839764]  which belongs to the cache kmalloc-16 of size 16
[   14.840517] The buggy address is located 8 bytes inside of
[   14.840517]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   14.841381] 
[   14.841490] The buggy address belongs to the physical page:
[   14.841703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   14.842369] flags: 0x200000000000000(node=0|zone=2)
[   14.842736] page_type: f5(slab)
[   14.842922] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.843501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.843998] page dumped because: kasan: bad access detected
[   14.844300] 
[   14.844588] Memory state around the buggy address:
[   14.844830]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.845403]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.845712] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.846357]                       ^
[   14.846525]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.847051]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.847578] ==================================================================
[   14.879482] ==================================================================
[   14.879795] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.880658] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   14.881157] 
[   14.881446] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.881500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.881513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.881534] Call Trace:
[   14.881555]  <TASK>
[   14.881574]  dump_stack_lvl+0x73/0xb0
[   14.881607]  print_report+0xd1/0x650
[   14.881632]  ? __virt_addr_valid+0x1db/0x2d0
[   14.881656]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.881683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.881706]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.881733]  kasan_report+0x141/0x180
[   14.881755]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.881786]  kasan_check_range+0x10c/0x1c0
[   14.881810]  __kasan_check_write+0x18/0x20
[   14.881830]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.881857]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.881885]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.881909]  ? trace_hardirqs_on+0x37/0xe0
[   14.881952]  ? kasan_bitops_generic+0x92/0x1c0
[   14.881981]  kasan_bitops_generic+0x116/0x1c0
[   14.882006]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.882032]  ? __pfx_read_tsc+0x10/0x10
[   14.882055]  ? ktime_get_ts64+0x86/0x230
[   14.882080]  kunit_try_run_case+0x1a5/0x480
[   14.882105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.882129]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.882154]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.882179]  ? __kthread_parkme+0x82/0x180
[   14.882200]  ? preempt_count_sub+0x50/0x80
[   14.882224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.882248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.882274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.882299]  kthread+0x337/0x6f0
[   14.882318]  ? trace_preempt_on+0x20/0xc0
[   14.882339]  ? __pfx_kthread+0x10/0x10
[   14.882360]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.882380]  ? calculate_sigpending+0x7b/0xa0
[   14.882405]  ? __pfx_kthread+0x10/0x10
[   14.882426]  ret_from_fork+0x116/0x1d0
[   14.882444]  ? __pfx_kthread+0x10/0x10
[   14.882463]  ret_from_fork_asm+0x1a/0x30
[   14.882495]  </TASK>
[   14.882505] 
[   14.896198] Allocated by task 278:
[   14.896496]  kasan_save_stack+0x45/0x70
[   14.896696]  kasan_save_track+0x18/0x40
[   14.896874]  kasan_save_alloc_info+0x3b/0x50
[   14.897144]  __kasan_kmalloc+0xb7/0xc0
[   14.897787]  __kmalloc_cache_noprof+0x189/0x420
[   14.898028]  kasan_bitops_generic+0x92/0x1c0
[   14.898521]  kunit_try_run_case+0x1a5/0x480
[   14.898833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.899458]  kthread+0x337/0x6f0
[   14.899725]  ret_from_fork+0x116/0x1d0
[   14.899891]  ret_from_fork_asm+0x1a/0x30
[   14.900472] 
[   14.900579] The buggy address belongs to the object at ffff888102574300
[   14.900579]  which belongs to the cache kmalloc-16 of size 16
[   14.901257] The buggy address is located 8 bytes inside of
[   14.901257]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   14.902222] 
[   14.902515] The buggy address belongs to the physical page:
[   14.902772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   14.903440] flags: 0x200000000000000(node=0|zone=2)
[   14.903755] page_type: f5(slab)
[   14.904217] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.904549] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.905133] page dumped because: kasan: bad access detected
[   14.905495] 
[   14.905606] Memory state around the buggy address:
[   14.905885]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.906666]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.907367] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.907813]                       ^
[   14.908222]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.908644]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.909193] ==================================================================