Hay
Date
July 9, 2025, 12:11 a.m.

Environment
qemu-arm64
qemu-x86_64

[   22.011638] ==================================================================
[   22.011691] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   22.011746] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   22.011806] 
[   22.011844] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.011998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.012052] Hardware name: linux,dummy-virt (DT)
[   22.012104] Call trace:
[   22.012207]  show_stack+0x20/0x38 (C)
[   22.012315]  dump_stack_lvl+0x8c/0xd0
[   22.012415]  print_report+0x118/0x608
[   22.012481]  kasan_report+0xdc/0x128
[   22.012551]  __asan_report_load8_noabort+0x20/0x30
[   22.012793]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   22.012966]  kasan_bitops_generic+0x11c/0x1c8
[   22.013093]  kunit_try_run_case+0x170/0x3f0
[   22.013180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.013285]  kthread+0x328/0x630
[   22.013479]  ret_from_fork+0x10/0x20
[   22.013673] 
[   22.013745] Allocated by task 262:
[   22.013872]  kasan_save_stack+0x3c/0x68
[   22.013957]  kasan_save_track+0x20/0x40
[   22.014044]  kasan_save_alloc_info+0x40/0x58
[   22.014130]  __kasan_kmalloc+0xd4/0xd8
[   22.014197]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.014279]  kasan_bitops_generic+0xa0/0x1c8
[   22.014360]  kunit_try_run_case+0x170/0x3f0
[   22.014464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.014582]  kthread+0x328/0x630
[   22.014647]  ret_from_fork+0x10/0x20
[   22.014687] 
[   22.014749] The buggy address belongs to the object at fff00000c63901c0
[   22.014749]  which belongs to the cache kmalloc-16 of size 16
[   22.015073] The buggy address is located 8 bytes inside of
[   22.015073]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   22.015165] 
[   22.015266] The buggy address belongs to the physical page:
[   22.015343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   22.015429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.015543] page_type: f5(slab)
[   22.015615] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.015745] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.015823] page dumped because: kasan: bad access detected
[   22.015888] 
[   22.015909] Memory state around the buggy address:
[   22.015943]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   22.016166]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.016227] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.016311]                                               ^
[   22.016530]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.016580]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.016623] ==================================================================
[   22.020468] ==================================================================
[   22.020518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   22.020572] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   22.020624] 
[   22.020653] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.020736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.020766] Hardware name: linux,dummy-virt (DT)
[   22.020799] Call trace:
[   22.020823]  show_stack+0x20/0x38 (C)
[   22.020873]  dump_stack_lvl+0x8c/0xd0
[   22.020923]  print_report+0x118/0x608
[   22.020971]  kasan_report+0xdc/0x128
[   22.021021]  __asan_report_load8_noabort+0x20/0x30
[   22.021081]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   22.021138]  kasan_bitops_generic+0x11c/0x1c8
[   22.021189]  kunit_try_run_case+0x170/0x3f0
[   22.021238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.021295]  kthread+0x328/0x630
[   22.021340]  ret_from_fork+0x10/0x20
[   22.021390] 
[   22.021442] Allocated by task 262:
[   22.021471]  kasan_save_stack+0x3c/0x68
[   22.021545]  kasan_save_track+0x20/0x40
[   22.021587]  kasan_save_alloc_info+0x40/0x58
[   22.021664]  __kasan_kmalloc+0xd4/0xd8
[   22.021741]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.021846]  kasan_bitops_generic+0xa0/0x1c8
[   22.021922]  kunit_try_run_case+0x170/0x3f0
[   22.021992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.022083]  kthread+0x328/0x630
[   22.022153]  ret_from_fork+0x10/0x20
[   22.022255] 
[   22.022313] The buggy address belongs to the object at fff00000c63901c0
[   22.022313]  which belongs to the cache kmalloc-16 of size 16
[   22.022441] The buggy address is located 8 bytes inside of
[   22.022441]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   22.022556] 
[   22.022704] The buggy address belongs to the physical page:
[   22.022738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   22.022921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.023044] page_type: f5(slab)
[   22.023122] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.023179] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.023342] page dumped because: kasan: bad access detected
[   22.023429] 
[   22.023552] Memory state around the buggy address:
[   22.023670]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   22.023736]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.023802] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.023898]                                               ^
[   22.023966]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.024094]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.024179] ==================================================================
[   22.024826] ==================================================================
[   22.024877] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   22.024928] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   22.025200] 
[   22.025260] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.025372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.025435] Hardware name: linux,dummy-virt (DT)
[   22.025470] Call trace:
[   22.025510]  show_stack+0x20/0x38 (C)
[   22.025563]  dump_stack_lvl+0x8c/0xd0
[   22.025610]  print_report+0x118/0x608
[   22.025690]  kasan_report+0xdc/0x128
[   22.025756]  kasan_check_range+0x100/0x1a8
[   22.025808]  __kasan_check_write+0x20/0x30
[   22.025968]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   22.026029]  kasan_bitops_generic+0x11c/0x1c8
[   22.026104]  kunit_try_run_case+0x170/0x3f0
[   22.026174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.026277]  kthread+0x328/0x630
[   22.026322]  ret_from_fork+0x10/0x20
[   22.026390] 
[   22.026440] Allocated by task 262:
[   22.026472]  kasan_save_stack+0x3c/0x68
[   22.026530]  kasan_save_track+0x20/0x40
[   22.026573]  kasan_save_alloc_info+0x40/0x58
[   22.026632]  __kasan_kmalloc+0xd4/0xd8
[   22.026675]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.026717]  kasan_bitops_generic+0xa0/0x1c8
[   22.026877]  kunit_try_run_case+0x170/0x3f0
[   22.026929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.026977]  kthread+0x328/0x630
[   22.027073]  ret_from_fork+0x10/0x20
[   22.027134] 
[   22.027163] The buggy address belongs to the object at fff00000c63901c0
[   22.027163]  which belongs to the cache kmalloc-16 of size 16
[   22.027225] The buggy address is located 8 bytes inside of
[   22.027225]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   22.027296] 
[   22.027319] The buggy address belongs to the physical page:
[   22.027351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   22.027509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.027580] page_type: f5(slab)
[   22.027726] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.027798] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.027864] page dumped because: kasan: bad access detected
[   22.027899] 
[   22.027935] Memory state around the buggy address:
[   22.027971]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   22.028017]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.028077] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.028126]                                               ^
[   22.028181]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.028236]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.028278] ==================================================================
[   22.017032] ==================================================================
[   22.017091] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   22.017143] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   22.017195] 
[   22.017224] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.017309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.017338] Hardware name: linux,dummy-virt (DT)
[   22.017371] Call trace:
[   22.017395]  show_stack+0x20/0x38 (C)
[   22.017474]  dump_stack_lvl+0x8c/0xd0
[   22.017522]  print_report+0x118/0x608
[   22.017572]  kasan_report+0xdc/0x128
[   22.017619]  kasan_check_range+0x100/0x1a8
[   22.017670]  __kasan_check_write+0x20/0x30
[   22.017718]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   22.017775]  kasan_bitops_generic+0x11c/0x1c8
[   22.017825]  kunit_try_run_case+0x170/0x3f0
[   22.017875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.017932]  kthread+0x328/0x630
[   22.017978]  ret_from_fork+0x10/0x20
[   22.018029] 
[   22.018050] Allocated by task 262:
[   22.018081]  kasan_save_stack+0x3c/0x68
[   22.018124]  kasan_save_track+0x20/0x40
[   22.018183]  kasan_save_alloc_info+0x40/0x58
[   22.018232]  __kasan_kmalloc+0xd4/0xd8
[   22.018273]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.018315]  kasan_bitops_generic+0xa0/0x1c8
[   22.018357]  kunit_try_run_case+0x170/0x3f0
[   22.018409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.018456]  kthread+0x328/0x630
[   22.018492]  ret_from_fork+0x10/0x20
[   22.018531] 
[   22.018551] The buggy address belongs to the object at fff00000c63901c0
[   22.018551]  which belongs to the cache kmalloc-16 of size 16
[   22.018617] The buggy address is located 8 bytes inside of
[   22.018617]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   22.018688] 
[   22.018710] The buggy address belongs to the physical page:
[   22.018744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   22.018800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.018850] page_type: f5(slab)
[   22.018888] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.018942] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.018987] page dumped because: kasan: bad access detected
[   22.019021] 
[   22.019050] Memory state around the buggy address:
[   22.019085]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   22.019130]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.019173] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.019214]                                               ^
[   22.019251]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.019296]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.019346] ==================================================================
[   22.028851] ==================================================================
[   22.028931] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   22.028985] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   22.029039] 
[   22.029099] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.029183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.029211] Hardware name: linux,dummy-virt (DT)
[   22.029245] Call trace:
[   22.029365]  show_stack+0x20/0x38 (C)
[   22.029451]  dump_stack_lvl+0x8c/0xd0
[   22.029573]  print_report+0x118/0x608
[   22.029633]  kasan_report+0xdc/0x128
[   22.029691]  __asan_report_load8_noabort+0x20/0x30
[   22.029765]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   22.029858]  kasan_bitops_generic+0x11c/0x1c8
[   22.029914]  kunit_try_run_case+0x170/0x3f0
[   22.029967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.030023]  kthread+0x328/0x630
[   22.030190]  ret_from_fork+0x10/0x20
[   22.030242] 
[   22.030262] Allocated by task 262:
[   22.030291]  kasan_save_stack+0x3c/0x68
[   22.030334]  kasan_save_track+0x20/0x40
[   22.030391]  kasan_save_alloc_info+0x40/0x58
[   22.030447]  __kasan_kmalloc+0xd4/0xd8
[   22.030514]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.030557]  kasan_bitops_generic+0xa0/0x1c8
[   22.030616]  kunit_try_run_case+0x170/0x3f0
[   22.030689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.030735]  kthread+0x328/0x630
[   22.030771]  ret_from_fork+0x10/0x20
[   22.030808] 
[   22.030837] The buggy address belongs to the object at fff00000c63901c0
[   22.030837]  which belongs to the cache kmalloc-16 of size 16
[   22.031024] The buggy address is located 8 bytes inside of
[   22.031024]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   22.031121] 
[   22.031245] The buggy address belongs to the physical page:
[   22.031312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   22.031387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.031457] page_type: f5(slab)
[   22.031498] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.031552] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.031622] page dumped because: kasan: bad access detected
[   22.031657] 
[   22.031682] Memory state around the buggy address:
[   22.031716]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   22.031861]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.031928] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.032075]                                               ^
[   22.032127]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.032190]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.032274] ==================================================================
[   22.039989] ==================================================================
[   22.040030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   22.040077] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   22.040129] 
[   22.040160] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.040299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.040554] Hardware name: linux,dummy-virt (DT)
[   22.040592] Call trace:
[   22.040617]  show_stack+0x20/0x38 (C)
[   22.040671]  dump_stack_lvl+0x8c/0xd0
[   22.040720]  print_report+0x118/0x608
[   22.040768]  kasan_report+0xdc/0x128
[   22.040817]  __asan_report_load8_noabort+0x20/0x30
[   22.040870]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   22.040928]  kasan_bitops_generic+0x11c/0x1c8
[   22.040980]  kunit_try_run_case+0x170/0x3f0
[   22.041030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.041097]  kthread+0x328/0x630
[   22.041142]  ret_from_fork+0x10/0x20
[   22.041191] 
[   22.041213] Allocated by task 262:
[   22.041243]  kasan_save_stack+0x3c/0x68
[   22.041287]  kasan_save_track+0x20/0x40
[   22.041328]  kasan_save_alloc_info+0x40/0x58
[   22.041370]  __kasan_kmalloc+0xd4/0xd8
[   22.041424]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.041466]  kasan_bitops_generic+0xa0/0x1c8
[   22.041507]  kunit_try_run_case+0x170/0x3f0
[   22.041548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.041594]  kthread+0x328/0x630
[   22.041630]  ret_from_fork+0x10/0x20
[   22.041671] 
[   22.041691] The buggy address belongs to the object at fff00000c63901c0
[   22.041691]  which belongs to the cache kmalloc-16 of size 16
[   22.041751] The buggy address is located 8 bytes inside of
[   22.041751]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   22.041817] 
[   22.041838] The buggy address belongs to the physical page:
[   22.041871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   22.041927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.041979] page_type: f5(slab)
[   22.042017] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.042073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.042117] page dumped because: kasan: bad access detected
[   22.042151] 
[   22.042171] Memory state around the buggy address:
[   22.042204]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   22.042249]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.042295] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.042334]                                               ^
[   22.042371]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.044319]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.044368] ==================================================================
[   22.008163] ==================================================================
[   22.008225] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   22.008281] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   22.008333] 
[   22.008367] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.008468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.008497] Hardware name: linux,dummy-virt (DT)
[   22.008529] Call trace:
[   22.008555]  show_stack+0x20/0x38 (C)
[   22.008606]  dump_stack_lvl+0x8c/0xd0
[   22.008655]  print_report+0x118/0x608
[   22.008702]  kasan_report+0xdc/0x128
[   22.008751]  kasan_check_range+0x100/0x1a8
[   22.008800]  __kasan_check_write+0x20/0x30
[   22.008847]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   22.008905]  kasan_bitops_generic+0x11c/0x1c8
[   22.008955]  kunit_try_run_case+0x170/0x3f0
[   22.009004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.009059]  kthread+0x328/0x630
[   22.009114]  ret_from_fork+0x10/0x20
[   22.009164] 
[   22.009187] Allocated by task 262:
[   22.009217]  kasan_save_stack+0x3c/0x68
[   22.009261]  kasan_save_track+0x20/0x40
[   22.009302]  kasan_save_alloc_info+0x40/0x58
[   22.009345]  __kasan_kmalloc+0xd4/0xd8
[   22.009384]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.009467]  kasan_bitops_generic+0xa0/0x1c8
[   22.009509]  kunit_try_run_case+0x170/0x3f0
[   22.009729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.009791]  kthread+0x328/0x630
[   22.009827]  ret_from_fork+0x10/0x20
[   22.009870] 
[   22.009892] The buggy address belongs to the object at fff00000c63901c0
[   22.009892]  which belongs to the cache kmalloc-16 of size 16
[   22.009956] The buggy address is located 8 bytes inside of
[   22.009956]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   22.010100] 
[   22.010137] The buggy address belongs to the physical page:
[   22.010172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   22.010232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.010322] page_type: f5(slab)
[   22.010373] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.010591] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.010635] page dumped because: kasan: bad access detected
[   22.010701] 
[   22.010802] Memory state around the buggy address:
[   22.010844]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   22.010930]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.011006] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.011047]                                               ^
[   22.011099]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.011144]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.011186] ==================================================================
[   22.032647] ==================================================================
[   22.032696] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   22.032748] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   22.032944] 
[   22.033000] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.033143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.033175] Hardware name: linux,dummy-virt (DT)
[   22.033215] Call trace:
[   22.033268]  show_stack+0x20/0x38 (C)
[   22.033321]  dump_stack_lvl+0x8c/0xd0
[   22.033388]  print_report+0x118/0x608
[   22.033480]  kasan_report+0xdc/0x128
[   22.033535]  kasan_check_range+0x100/0x1a8
[   22.033587]  __kasan_check_write+0x20/0x30
[   22.033749]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   22.033811]  kasan_bitops_generic+0x11c/0x1c8
[   22.033861]  kunit_try_run_case+0x170/0x3f0
[   22.033929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.034068]  kthread+0x328/0x630
[   22.034150]  ret_from_fork+0x10/0x20
[   22.034217] 
[   22.034245] Allocated by task 262:
[   22.034293]  kasan_save_stack+0x3c/0x68
[   22.034377]  kasan_save_track+0x20/0x40
[   22.034454]  kasan_save_alloc_info+0x40/0x58
[   22.034498]  __kasan_kmalloc+0xd4/0xd8
[   22.034540]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.034581]  kasan_bitops_generic+0xa0/0x1c8
[   22.034638]  kunit_try_run_case+0x170/0x3f0
[   22.034680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.034725]  kthread+0x328/0x630
[   22.034884]  ret_from_fork+0x10/0x20
[   22.034952] 
[   22.035048] The buggy address belongs to the object at fff00000c63901c0
[   22.035048]  which belongs to the cache kmalloc-16 of size 16
[   22.035114] The buggy address is located 8 bytes inside of
[   22.035114]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   22.035198] 
[   22.035249] The buggy address belongs to the physical page:
[   22.035283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   22.035338] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.035388] page_type: f5(slab)
[   22.035436] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.035576] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.035639] page dumped because: kasan: bad access detected
[   22.035698] 
[   22.035724] Memory state around the buggy address:
[   22.035801]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   22.035864]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.035910] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.035956]                                               ^
[   22.036011]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.036085]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.036162] ==================================================================
[   22.036542] ==================================================================
[   22.036598] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   22.036700] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262
[   22.036775] 
[   22.036824] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.036909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.036938] Hardware name: linux,dummy-virt (DT)
[   22.037083] Call trace:
[   22.037131]  show_stack+0x20/0x38 (C)
[   22.037191]  dump_stack_lvl+0x8c/0xd0
[   22.037316]  print_report+0x118/0x608
[   22.037387]  kasan_report+0xdc/0x128
[   22.037455]  __asan_report_load8_noabort+0x20/0x30
[   22.037536]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   22.037596]  kasan_bitops_generic+0x11c/0x1c8
[   22.037663]  kunit_try_run_case+0x170/0x3f0
[   22.037716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.037784]  kthread+0x328/0x630
[   22.037829]  ret_from_fork+0x10/0x20
[   22.037881] 
[   22.037901] Allocated by task 262:
[   22.037933]  kasan_save_stack+0x3c/0x68
[   22.038003]  kasan_save_track+0x20/0x40
[   22.038050]  kasan_save_alloc_info+0x40/0x58
[   22.038094]  __kasan_kmalloc+0xd4/0xd8
[   22.038134]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.038276]  kasan_bitops_generic+0xa0/0x1c8
[   22.038326]  kunit_try_run_case+0x170/0x3f0
[   22.038482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.038560]  kthread+0x328/0x630
[   22.038624]  ret_from_fork+0x10/0x20
[   22.038671] 
[   22.038695] The buggy address belongs to the object at fff00000c63901c0
[   22.038695]  which belongs to the cache kmalloc-16 of size 16
[   22.038760] The buggy address is located 8 bytes inside of
[   22.038760]  allocated 9-byte region [fff00000c63901c0, fff00000c63901c9)
[   22.038855] 
[   22.038906] The buggy address belongs to the physical page:
[   22.038955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390
[   22.039029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.039083] page_type: f5(slab)
[   22.039238] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.039291] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.039457] page dumped because: kasan: bad access detected
[   22.039509] 
[   22.039547] Memory state around the buggy address:
[   22.039582]  fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   22.039647]  fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.039711] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.039753]                                               ^
[   22.039791]  fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.039836]  fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.039879] ==================================================================

[   15.044020] ==================================================================
[   15.044607] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.044892] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   15.045232] 
[   15.045405] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.045450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.045462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.045482] Call Trace:
[   15.045501]  <TASK>
[   15.045519]  dump_stack_lvl+0x73/0xb0
[   15.045551]  print_report+0xd1/0x650
[   15.045573]  ? __virt_addr_valid+0x1db/0x2d0
[   15.045596]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.045626]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.045648]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.045678]  kasan_report+0x141/0x180
[   15.045701]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.045735]  kasan_check_range+0x10c/0x1c0
[   15.045758]  __kasan_check_write+0x18/0x20
[   15.045777]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.045806]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.045837]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.045862]  ? trace_hardirqs_on+0x37/0xe0
[   15.045885]  ? kasan_bitops_generic+0x92/0x1c0
[   15.045912]  kasan_bitops_generic+0x121/0x1c0
[   15.045948]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.045973]  ? __pfx_read_tsc+0x10/0x10
[   15.045995]  ? ktime_get_ts64+0x86/0x230
[   15.046019]  kunit_try_run_case+0x1a5/0x480
[   15.046044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.046066]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.046092]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.046117]  ? __kthread_parkme+0x82/0x180
[   15.046137]  ? preempt_count_sub+0x50/0x80
[   15.046161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.046187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.046212]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.046237]  kthread+0x337/0x6f0
[   15.046256]  ? trace_preempt_on+0x20/0xc0
[   15.046363]  ? __pfx_kthread+0x10/0x10
[   15.046388]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.046409]  ? calculate_sigpending+0x7b/0xa0
[   15.046434]  ? __pfx_kthread+0x10/0x10
[   15.046455]  ret_from_fork+0x116/0x1d0
[   15.046474]  ? __pfx_kthread+0x10/0x10
[   15.046494]  ret_from_fork_asm+0x1a/0x30
[   15.046525]  </TASK>
[   15.046536] 
[   15.055357] Allocated by task 278:
[   15.055492]  kasan_save_stack+0x45/0x70
[   15.055641]  kasan_save_track+0x18/0x40
[   15.055774]  kasan_save_alloc_info+0x3b/0x50
[   15.055921]  __kasan_kmalloc+0xb7/0xc0
[   15.056927]  __kmalloc_cache_noprof+0x189/0x420
[   15.057168]  kasan_bitops_generic+0x92/0x1c0
[   15.057381]  kunit_try_run_case+0x1a5/0x480
[   15.057587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.057835]  kthread+0x337/0x6f0
[   15.058594]  ret_from_fork+0x116/0x1d0
[   15.058918]  ret_from_fork_asm+0x1a/0x30
[   15.059419] 
[   15.059641] The buggy address belongs to the object at ffff888102574300
[   15.059641]  which belongs to the cache kmalloc-16 of size 16
[   15.060583] The buggy address is located 8 bytes inside of
[   15.060583]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   15.061498] 
[   15.061601] The buggy address belongs to the physical page:
[   15.061835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   15.062752] flags: 0x200000000000000(node=0|zone=2)
[   15.063402] page_type: f5(slab)
[   15.063579] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.063898] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.064605] page dumped because: kasan: bad access detected
[   15.064859] 
[   15.065213] Memory state around the buggy address:
[   15.065600]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.065903]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.066133] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.066446]                       ^
[   15.066623]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.066904]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.067402] ==================================================================
[   15.126309] ==================================================================
[   15.126607] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.127185] Read of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   15.127468] 
[   15.127561] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.127602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.127614] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.127635] Call Trace:
[   15.127653]  <TASK>
[   15.127671]  dump_stack_lvl+0x73/0xb0
[   15.127703]  print_report+0xd1/0x650
[   15.127725]  ? __virt_addr_valid+0x1db/0x2d0
[   15.127748]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.127777]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.127800]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.127829]  kasan_report+0x141/0x180
[   15.127851]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.127885]  kasan_check_range+0x10c/0x1c0
[   15.127907]  __kasan_check_read+0x15/0x20
[   15.127927]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.128046]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.128077]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.128102]  ? trace_hardirqs_on+0x37/0xe0
[   15.128124]  ? kasan_bitops_generic+0x92/0x1c0
[   15.128152]  kasan_bitops_generic+0x121/0x1c0
[   15.128175]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.128201]  ? __pfx_read_tsc+0x10/0x10
[   15.128222]  ? ktime_get_ts64+0x86/0x230
[   15.128247]  kunit_try_run_case+0x1a5/0x480
[   15.128271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.128294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.128338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.128362]  ? __kthread_parkme+0x82/0x180
[   15.128385]  ? preempt_count_sub+0x50/0x80
[   15.128408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.128433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.128457]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.128483]  kthread+0x337/0x6f0
[   15.128503]  ? trace_preempt_on+0x20/0xc0
[   15.128525]  ? __pfx_kthread+0x10/0x10
[   15.128546]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.128568]  ? calculate_sigpending+0x7b/0xa0
[   15.128593]  ? __pfx_kthread+0x10/0x10
[   15.128614]  ret_from_fork+0x116/0x1d0
[   15.128632]  ? __pfx_kthread+0x10/0x10
[   15.128652]  ret_from_fork_asm+0x1a/0x30
[   15.128683]  </TASK>
[   15.128693] 
[   15.137269] Allocated by task 278:
[   15.137450]  kasan_save_stack+0x45/0x70
[   15.137598]  kasan_save_track+0x18/0x40
[   15.137731]  kasan_save_alloc_info+0x3b/0x50
[   15.137908]  __kasan_kmalloc+0xb7/0xc0
[   15.138165]  __kmalloc_cache_noprof+0x189/0x420
[   15.138421]  kasan_bitops_generic+0x92/0x1c0
[   15.138632]  kunit_try_run_case+0x1a5/0x480
[   15.138850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.139274]  kthread+0x337/0x6f0
[   15.139447]  ret_from_fork+0x116/0x1d0
[   15.139629]  ret_from_fork_asm+0x1a/0x30
[   15.139826] 
[   15.139905] The buggy address belongs to the object at ffff888102574300
[   15.139905]  which belongs to the cache kmalloc-16 of size 16
[   15.140482] The buggy address is located 8 bytes inside of
[   15.140482]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   15.140828] 
[   15.140899] The buggy address belongs to the physical page:
[   15.141205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   15.141577] flags: 0x200000000000000(node=0|zone=2)
[   15.141805] page_type: f5(slab)
[   15.142037] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.142404] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.142708] page dumped because: kasan: bad access detected
[   15.142906] 
[   15.143177] Memory state around the buggy address:
[   15.143402]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.143689]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.143919] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.144338]                       ^
[   15.144523]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.144746]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.145065] ==================================================================
[   15.024189] ==================================================================
[   15.024586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.024911] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   15.025323] 
[   15.025430] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.025475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.025486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.025507] Call Trace:
[   15.025525]  <TASK>
[   15.025542]  dump_stack_lvl+0x73/0xb0
[   15.025574]  print_report+0xd1/0x650
[   15.025596]  ? __virt_addr_valid+0x1db/0x2d0
[   15.025618]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.025646]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.025670]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.025699]  kasan_report+0x141/0x180
[   15.025720]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.025753]  kasan_check_range+0x10c/0x1c0
[   15.025776]  __kasan_check_write+0x18/0x20
[   15.025795]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   15.025824]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.025855]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.025880]  ? trace_hardirqs_on+0x37/0xe0
[   15.025904]  ? kasan_bitops_generic+0x92/0x1c0
[   15.025930]  kasan_bitops_generic+0x121/0x1c0
[   15.025986]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.026013]  ? __pfx_read_tsc+0x10/0x10
[   15.026036]  ? ktime_get_ts64+0x86/0x230
[   15.026062]  kunit_try_run_case+0x1a5/0x480
[   15.026087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.026109]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.026135]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.026159]  ? __kthread_parkme+0x82/0x180
[   15.026180]  ? preempt_count_sub+0x50/0x80
[   15.026204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.026229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.026253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.026336]  kthread+0x337/0x6f0
[   15.026357]  ? trace_preempt_on+0x20/0xc0
[   15.026380]  ? __pfx_kthread+0x10/0x10
[   15.026400]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.026422]  ? calculate_sigpending+0x7b/0xa0
[   15.026446]  ? __pfx_kthread+0x10/0x10
[   15.026468]  ret_from_fork+0x116/0x1d0
[   15.026487]  ? __pfx_kthread+0x10/0x10
[   15.026507]  ret_from_fork_asm+0x1a/0x30
[   15.026538]  </TASK>
[   15.026550] 
[   15.035061] Allocated by task 278:
[   15.035252]  kasan_save_stack+0x45/0x70
[   15.035459]  kasan_save_track+0x18/0x40
[   15.035771]  kasan_save_alloc_info+0x3b/0x50
[   15.035969]  __kasan_kmalloc+0xb7/0xc0
[   15.036100]  __kmalloc_cache_noprof+0x189/0x420
[   15.036259]  kasan_bitops_generic+0x92/0x1c0
[   15.036661]  kunit_try_run_case+0x1a5/0x480
[   15.036870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.037307]  kthread+0x337/0x6f0
[   15.037566]  ret_from_fork+0x116/0x1d0
[   15.037701]  ret_from_fork_asm+0x1a/0x30
[   15.037838] 
[   15.037907] The buggy address belongs to the object at ffff888102574300
[   15.037907]  which belongs to the cache kmalloc-16 of size 16
[   15.038586] The buggy address is located 8 bytes inside of
[   15.038586]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   15.039121] 
[   15.039221] The buggy address belongs to the physical page:
[   15.039606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   15.039913] flags: 0x200000000000000(node=0|zone=2)
[   15.040360] page_type: f5(slab)
[   15.040536] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.040833] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.041208] page dumped because: kasan: bad access detected
[   15.041447] 
[   15.041540] Memory state around the buggy address:
[   15.041740]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.042235]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.042583] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.042807]                       ^
[   15.042943]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.043166]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.043469] ==================================================================
[   14.970353] ==================================================================
[   14.970740] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.971046] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   14.971791] 
[   14.972159] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.972208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.972220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.972240] Call Trace:
[   14.972257]  <TASK>
[   14.972275]  dump_stack_lvl+0x73/0xb0
[   14.972308]  print_report+0xd1/0x650
[   14.972331]  ? __virt_addr_valid+0x1db/0x2d0
[   14.972356]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.972386]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.972411]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.972442]  kasan_report+0x141/0x180
[   14.972464]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.972497]  kasan_check_range+0x10c/0x1c0
[   14.972522]  __kasan_check_write+0x18/0x20
[   14.972542]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.972571]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.972601]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.972627]  ? trace_hardirqs_on+0x37/0xe0
[   14.972650]  ? kasan_bitops_generic+0x92/0x1c0
[   14.972677]  kasan_bitops_generic+0x121/0x1c0
[   14.972701]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.972727]  ? __pfx_read_tsc+0x10/0x10
[   14.972748]  ? ktime_get_ts64+0x86/0x230
[   14.972773]  kunit_try_run_case+0x1a5/0x480
[   14.972798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.972821]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.972847]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.972870]  ? __kthread_parkme+0x82/0x180
[   14.972892]  ? preempt_count_sub+0x50/0x80
[   14.972915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.972974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.972999]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.973025]  kthread+0x337/0x6f0
[   14.973044]  ? trace_preempt_on+0x20/0xc0
[   14.973066]  ? __pfx_kthread+0x10/0x10
[   14.973087]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.973109]  ? calculate_sigpending+0x7b/0xa0
[   14.973134]  ? __pfx_kthread+0x10/0x10
[   14.973155]  ret_from_fork+0x116/0x1d0
[   14.973174]  ? __pfx_kthread+0x10/0x10
[   14.973194]  ret_from_fork_asm+0x1a/0x30
[   14.973226]  </TASK>
[   14.973237] 
[   14.987590] Allocated by task 278:
[   14.988144]  kasan_save_stack+0x45/0x70
[   14.988570]  kasan_save_track+0x18/0x40
[   14.988910]  kasan_save_alloc_info+0x3b/0x50
[   14.989228]  __kasan_kmalloc+0xb7/0xc0
[   14.989588]  __kmalloc_cache_noprof+0x189/0x420
[   14.989915]  kasan_bitops_generic+0x92/0x1c0
[   14.990198]  kunit_try_run_case+0x1a5/0x480
[   14.990585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.991095]  kthread+0x337/0x6f0
[   14.991335]  ret_from_fork+0x116/0x1d0
[   14.991676]  ret_from_fork_asm+0x1a/0x30
[   14.991840] 
[   14.991912] The buggy address belongs to the object at ffff888102574300
[   14.991912]  which belongs to the cache kmalloc-16 of size 16
[   14.993613] The buggy address is located 8 bytes inside of
[   14.993613]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   14.994370] 
[   14.994535] The buggy address belongs to the physical page:
[   14.995082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   14.995755] flags: 0x200000000000000(node=0|zone=2)
[   14.995927] page_type: f5(slab)
[   14.996411] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.997141] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.997711] page dumped because: kasan: bad access detected
[   14.997883] 
[   14.998017] Memory state around the buggy address:
[   14.998465]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.999202]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.999922] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.000653]                       ^
[   15.000788]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.001135]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.001897] ==================================================================
[   15.002885] ==================================================================
[   15.003553] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.004529] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   15.004780] 
[   15.004871] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.004917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.004929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.004963] Call Trace:
[   15.004983]  <TASK>
[   15.005001]  dump_stack_lvl+0x73/0xb0
[   15.005035]  print_report+0xd1/0x650
[   15.005058]  ? __virt_addr_valid+0x1db/0x2d0
[   15.005081]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.005110]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.005133]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.005162]  kasan_report+0x141/0x180
[   15.005183]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.005217]  kasan_check_range+0x10c/0x1c0
[   15.005240]  __kasan_check_write+0x18/0x20
[   15.005259]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   15.005289]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.005320]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.005345]  ? trace_hardirqs_on+0x37/0xe0
[   15.005368]  ? kasan_bitops_generic+0x92/0x1c0
[   15.005395]  kasan_bitops_generic+0x121/0x1c0
[   15.005419]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.005444]  ? __pfx_read_tsc+0x10/0x10
[   15.005466]  ? ktime_get_ts64+0x86/0x230
[   15.005490]  kunit_try_run_case+0x1a5/0x480
[   15.005514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.005538]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.005563]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.005587]  ? __kthread_parkme+0x82/0x180
[   15.005608]  ? preempt_count_sub+0x50/0x80
[   15.005633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.005658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.005684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.005721]  kthread+0x337/0x6f0
[   15.005739]  ? trace_preempt_on+0x20/0xc0
[   15.005770]  ? __pfx_kthread+0x10/0x10
[   15.005791]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.005812]  ? calculate_sigpending+0x7b/0xa0
[   15.005837]  ? __pfx_kthread+0x10/0x10
[   15.005858]  ret_from_fork+0x116/0x1d0
[   15.005877]  ? __pfx_kthread+0x10/0x10
[   15.005898]  ret_from_fork_asm+0x1a/0x30
[   15.005929]  </TASK>
[   15.005950] 
[   15.012961] Allocated by task 278:
[   15.013149]  kasan_save_stack+0x45/0x70
[   15.013353]  kasan_save_track+0x18/0x40
[   15.013654]  kasan_save_alloc_info+0x3b/0x50
[   15.013871]  __kasan_kmalloc+0xb7/0xc0
[   15.014025]  __kmalloc_cache_noprof+0x189/0x420
[   15.014181]  kasan_bitops_generic+0x92/0x1c0
[   15.016119]  kunit_try_run_case+0x1a5/0x480
[   15.016292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.016470]  kthread+0x337/0x6f0
[   15.016590]  ret_from_fork+0x116/0x1d0
[   15.016727]  ret_from_fork_asm+0x1a/0x30
[   15.016865] 
[   15.016953] The buggy address belongs to the object at ffff888102574300
[   15.016953]  which belongs to the cache kmalloc-16 of size 16
[   15.017310] The buggy address is located 8 bytes inside of
[   15.017310]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   15.018349] 
[   15.018433] The buggy address belongs to the physical page:
[   15.018606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   15.018856] flags: 0x200000000000000(node=0|zone=2)
[   15.019091] page_type: f5(slab)
[   15.019259] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.019603] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.020063] page dumped because: kasan: bad access detected
[   15.021163] 
[   15.021245] Memory state around the buggy address:
[   15.021560]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.021783]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.022057] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.022571]                       ^
[   15.022829]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.023414]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.023680] ==================================================================
[   15.106778] ==================================================================
[   15.107307] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.107649] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   15.108025] 
[   15.108140] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.108184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.108196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.108218] Call Trace:
[   15.108237]  <TASK>
[   15.108257]  dump_stack_lvl+0x73/0xb0
[   15.108309]  print_report+0xd1/0x650
[   15.108332]  ? __virt_addr_valid+0x1db/0x2d0
[   15.108355]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.108384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.108407]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.108437]  kasan_report+0x141/0x180
[   15.108458]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.108492]  kasan_check_range+0x10c/0x1c0
[   15.108515]  __kasan_check_write+0x18/0x20
[   15.108535]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.108563]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.108593]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.108619]  ? trace_hardirqs_on+0x37/0xe0
[   15.108641]  ? kasan_bitops_generic+0x92/0x1c0
[   15.108668]  kasan_bitops_generic+0x121/0x1c0
[   15.108691]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.108717]  ? __pfx_read_tsc+0x10/0x10
[   15.108738]  ? ktime_get_ts64+0x86/0x230
[   15.108762]  kunit_try_run_case+0x1a5/0x480
[   15.108786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.108808]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.108833]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.108856]  ? __kthread_parkme+0x82/0x180
[   15.108877]  ? preempt_count_sub+0x50/0x80
[   15.108902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.108926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.109025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.109050]  kthread+0x337/0x6f0
[   15.109069]  ? trace_preempt_on+0x20/0xc0
[   15.109091]  ? __pfx_kthread+0x10/0x10
[   15.109113]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.109134]  ? calculate_sigpending+0x7b/0xa0
[   15.109157]  ? __pfx_kthread+0x10/0x10
[   15.109179]  ret_from_fork+0x116/0x1d0
[   15.109197]  ? __pfx_kthread+0x10/0x10
[   15.109217]  ret_from_fork_asm+0x1a/0x30
[   15.109248]  </TASK>
[   15.109258] 
[   15.117799] Allocated by task 278:
[   15.118058]  kasan_save_stack+0x45/0x70
[   15.118256]  kasan_save_track+0x18/0x40
[   15.118479]  kasan_save_alloc_info+0x3b/0x50
[   15.118686]  __kasan_kmalloc+0xb7/0xc0
[   15.118823]  __kmalloc_cache_noprof+0x189/0x420
[   15.119173]  kasan_bitops_generic+0x92/0x1c0
[   15.119390]  kunit_try_run_case+0x1a5/0x480
[   15.119616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.119870]  kthread+0x337/0x6f0
[   15.120129]  ret_from_fork+0x116/0x1d0
[   15.120351]  ret_from_fork_asm+0x1a/0x30
[   15.120553] 
[   15.120647] The buggy address belongs to the object at ffff888102574300
[   15.120647]  which belongs to the cache kmalloc-16 of size 16
[   15.121245] The buggy address is located 8 bytes inside of
[   15.121245]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   15.121604] 
[   15.121677] The buggy address belongs to the physical page:
[   15.121882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   15.122241] flags: 0x200000000000000(node=0|zone=2)
[   15.122471] page_type: f5(slab)
[   15.122636] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.123157] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.123458] page dumped because: kasan: bad access detected
[   15.123702] 
[   15.123793] Memory state around the buggy address:
[   15.124031]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.124271]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.124576] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.124896]                       ^
[   15.125134]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.125477]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.125775] ==================================================================
[   15.145571] ==================================================================
[   15.145904] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.146569] Read of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   15.146846] 
[   15.147119] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.147165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.147177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.147198] Call Trace:
[   15.147216]  <TASK>
[   15.147232]  dump_stack_lvl+0x73/0xb0
[   15.147291]  print_report+0xd1/0x650
[   15.147313]  ? __virt_addr_valid+0x1db/0x2d0
[   15.147336]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.147366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.147390]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.147419]  kasan_report+0x141/0x180
[   15.147440]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.147473]  __asan_report_load8_noabort+0x18/0x20
[   15.147498]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.147527]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.147557]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.147581]  ? trace_hardirqs_on+0x37/0xe0
[   15.147604]  ? kasan_bitops_generic+0x92/0x1c0
[   15.147631]  kasan_bitops_generic+0x121/0x1c0
[   15.147654]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.147680]  ? __pfx_read_tsc+0x10/0x10
[   15.147701]  ? ktime_get_ts64+0x86/0x230
[   15.147724]  kunit_try_run_case+0x1a5/0x480
[   15.147749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.147772]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.147796]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.147819]  ? __kthread_parkme+0x82/0x180
[   15.147840]  ? preempt_count_sub+0x50/0x80
[   15.147864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.147888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.147913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.147963]  kthread+0x337/0x6f0
[   15.147982]  ? trace_preempt_on+0x20/0xc0
[   15.148004]  ? __pfx_kthread+0x10/0x10
[   15.148025]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.148046]  ? calculate_sigpending+0x7b/0xa0
[   15.148070]  ? __pfx_kthread+0x10/0x10
[   15.148092]  ret_from_fork+0x116/0x1d0
[   15.148110]  ? __pfx_kthread+0x10/0x10
[   15.148130]  ret_from_fork_asm+0x1a/0x30
[   15.148162]  </TASK>
[   15.148172] 
[   15.156561] Allocated by task 278:
[   15.156769]  kasan_save_stack+0x45/0x70
[   15.157076]  kasan_save_track+0x18/0x40
[   15.157272]  kasan_save_alloc_info+0x3b/0x50
[   15.157425]  __kasan_kmalloc+0xb7/0xc0
[   15.157631]  __kmalloc_cache_noprof+0x189/0x420
[   15.157848]  kasan_bitops_generic+0x92/0x1c0
[   15.158126]  kunit_try_run_case+0x1a5/0x480
[   15.158309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.158592]  kthread+0x337/0x6f0
[   15.158752]  ret_from_fork+0x116/0x1d0
[   15.158881]  ret_from_fork_asm+0x1a/0x30
[   15.159237] 
[   15.159353] The buggy address belongs to the object at ffff888102574300
[   15.159353]  which belongs to the cache kmalloc-16 of size 16
[   15.159888] The buggy address is located 8 bytes inside of
[   15.159888]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   15.160404] 
[   15.160480] The buggy address belongs to the physical page:
[   15.160645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   15.160879] flags: 0x200000000000000(node=0|zone=2)
[   15.161234] page_type: f5(slab)
[   15.161438] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.161780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.162215] page dumped because: kasan: bad access detected
[   15.162495] 
[   15.162611] Memory state around the buggy address:
[   15.162813]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.163339]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.163622] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.164007]                       ^
[   15.164192]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.164533]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.164789] ==================================================================
[   15.067855] ==================================================================
[   15.068292] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.068658] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   15.068922] 
[   15.069106] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.069152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.069164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.069185] Call Trace:
[   15.069204]  <TASK>
[   15.069221]  dump_stack_lvl+0x73/0xb0
[   15.069276]  print_report+0xd1/0x650
[   15.069300]  ? __virt_addr_valid+0x1db/0x2d0
[   15.069323]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.069351]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.069375]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.069404]  kasan_report+0x141/0x180
[   15.069426]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.069459]  kasan_check_range+0x10c/0x1c0
[   15.069483]  __kasan_check_write+0x18/0x20
[   15.069502]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.069532]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.069562]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.069586]  ? trace_hardirqs_on+0x37/0xe0
[   15.069609]  ? kasan_bitops_generic+0x92/0x1c0
[   15.069637]  kasan_bitops_generic+0x121/0x1c0
[   15.069661]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.069686]  ? __pfx_read_tsc+0x10/0x10
[   15.069707]  ? ktime_get_ts64+0x86/0x230
[   15.069732]  kunit_try_run_case+0x1a5/0x480
[   15.069758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.069782]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.069809]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.069837]  ? __kthread_parkme+0x82/0x180
[   15.069857]  ? preempt_count_sub+0x50/0x80
[   15.069881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.069906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.070006]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.070039]  kthread+0x337/0x6f0
[   15.070059]  ? trace_preempt_on+0x20/0xc0
[   15.070083]  ? __pfx_kthread+0x10/0x10
[   15.070103]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.070125]  ? calculate_sigpending+0x7b/0xa0
[   15.070150]  ? __pfx_kthread+0x10/0x10
[   15.070171]  ret_from_fork+0x116/0x1d0
[   15.070189]  ? __pfx_kthread+0x10/0x10
[   15.070210]  ret_from_fork_asm+0x1a/0x30
[   15.070241]  </TASK>
[   15.070251] 
[   15.078817] Allocated by task 278:
[   15.079190]  kasan_save_stack+0x45/0x70
[   15.079431]  kasan_save_track+0x18/0x40
[   15.079592]  kasan_save_alloc_info+0x3b/0x50
[   15.079765]  __kasan_kmalloc+0xb7/0xc0
[   15.080044]  __kmalloc_cache_noprof+0x189/0x420
[   15.080285]  kasan_bitops_generic+0x92/0x1c0
[   15.080465]  kunit_try_run_case+0x1a5/0x480
[   15.080611]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.080864]  kthread+0x337/0x6f0
[   15.081105]  ret_from_fork+0x116/0x1d0
[   15.081306]  ret_from_fork_asm+0x1a/0x30
[   15.081504] 
[   15.081599] The buggy address belongs to the object at ffff888102574300
[   15.081599]  which belongs to the cache kmalloc-16 of size 16
[   15.082054] The buggy address is located 8 bytes inside of
[   15.082054]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   15.082404] 
[   15.082492] The buggy address belongs to the physical page:
[   15.082744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   15.083350] flags: 0x200000000000000(node=0|zone=2)
[   15.083548] page_type: f5(slab)
[   15.083723] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.084082] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.084399] page dumped because: kasan: bad access detected
[   15.084649] 
[   15.084743] Memory state around the buggy address:
[   15.085051]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.085396]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.085674] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.086029]                       ^
[   15.086205]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.086493]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.086760] ==================================================================
[   15.087502] ==================================================================
[   15.087811] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.088273] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278
[   15.088586] 
[   15.088676] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.088720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.088731] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.088753] Call Trace:
[   15.088772]  <TASK>
[   15.088790]  dump_stack_lvl+0x73/0xb0
[   15.088821]  print_report+0xd1/0x650
[   15.088844]  ? __virt_addr_valid+0x1db/0x2d0
[   15.088867]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.088896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.088920]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.089024]  kasan_report+0x141/0x180
[   15.089047]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.089080]  kasan_check_range+0x10c/0x1c0
[   15.089104]  __kasan_check_write+0x18/0x20
[   15.089123]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.089152]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.089182]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.089207]  ? trace_hardirqs_on+0x37/0xe0
[   15.089230]  ? kasan_bitops_generic+0x92/0x1c0
[   15.089257]  kasan_bitops_generic+0x121/0x1c0
[   15.089280]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.089330]  ? __pfx_read_tsc+0x10/0x10
[   15.089353]  ? ktime_get_ts64+0x86/0x230
[   15.089377]  kunit_try_run_case+0x1a5/0x480
[   15.089402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.089425]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.089450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.089474]  ? __kthread_parkme+0x82/0x180
[   15.089495]  ? preempt_count_sub+0x50/0x80
[   15.089518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.089542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.089568]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.089593]  kthread+0x337/0x6f0
[   15.089612]  ? trace_preempt_on+0x20/0xc0
[   15.089634]  ? __pfx_kthread+0x10/0x10
[   15.089655]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.089676]  ? calculate_sigpending+0x7b/0xa0
[   15.089701]  ? __pfx_kthread+0x10/0x10
[   15.089722]  ret_from_fork+0x116/0x1d0
[   15.089741]  ? __pfx_kthread+0x10/0x10
[   15.089761]  ret_from_fork_asm+0x1a/0x30
[   15.089792]  </TASK>
[   15.089802] 
[   15.098261] Allocated by task 278:
[   15.098414]  kasan_save_stack+0x45/0x70
[   15.098620]  kasan_save_track+0x18/0x40
[   15.098832]  kasan_save_alloc_info+0x3b/0x50
[   15.099224]  __kasan_kmalloc+0xb7/0xc0
[   15.099454]  __kmalloc_cache_noprof+0x189/0x420
[   15.099678]  kasan_bitops_generic+0x92/0x1c0
[   15.099891]  kunit_try_run_case+0x1a5/0x480
[   15.100172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.100461]  kthread+0x337/0x6f0
[   15.100631]  ret_from_fork+0x116/0x1d0
[   15.100769]  ret_from_fork_asm+0x1a/0x30
[   15.101042] 
[   15.101146] The buggy address belongs to the object at ffff888102574300
[   15.101146]  which belongs to the cache kmalloc-16 of size 16
[   15.101641] The buggy address is located 8 bytes inside of
[   15.101641]  allocated 9-byte region [ffff888102574300, ffff888102574309)
[   15.102094] 
[   15.102193] The buggy address belongs to the physical page:
[   15.102414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574
[   15.102702] flags: 0x200000000000000(node=0|zone=2)
[   15.103169] page_type: f5(slab)
[   15.103360] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.103659] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.104051] page dumped because: kasan: bad access detected
[   15.104278] 
[   15.104375] Memory state around the buggy address:
[   15.104554]  ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   15.104769]  ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.105081] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.105419]                       ^
[   15.105592]  ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.105899]  ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.106282] ==================================================================