Hay
Date
July 9, 2025, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.530913] ==================================================================
[   19.531382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.531560] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.531780] 
[   19.531815] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.531908] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.532010] Hardware name: linux,dummy-virt (DT)
[   19.532053] Call trace:
[   19.532076]  show_stack+0x20/0x38 (C)
[   19.532467]  dump_stack_lvl+0x8c/0xd0
[   19.532551]  print_report+0x118/0x608
[   19.532605]  kasan_report+0xdc/0x128
[   19.532743]  __asan_report_load8_noabort+0x20/0x30
[   19.532817]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.532934]  kasan_bitops_generic+0x110/0x1c8
[   19.532986]  kunit_try_run_case+0x170/0x3f0
[   19.533056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.533291]  kthread+0x328/0x630
[   19.533354]  ret_from_fork+0x10/0x20
[   19.533563] 
[   19.533611] Allocated by task 261:
[   19.533696]  kasan_save_stack+0x3c/0x68
[   19.533834]  kasan_save_track+0x20/0x40
[   19.533876]  kasan_save_alloc_info+0x40/0x58
[   19.533918]  __kasan_kmalloc+0xd4/0xd8
[   19.533965]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.534161]  kasan_bitops_generic+0xa0/0x1c8
[   19.534378]  kunit_try_run_case+0x170/0x3f0
[   19.534427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.534730]  kthread+0x328/0x630
[   19.534818]  ret_from_fork+0x10/0x20
[   19.534930] 
[   19.535020] The buggy address belongs to the object at fff00000c58cac60
[   19.535020]  which belongs to the cache kmalloc-16 of size 16
[   19.535239] The buggy address is located 8 bytes inside of
[   19.535239]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.535358] 
[   19.535382] The buggy address belongs to the physical page:
[   19.535586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.535780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.535907] page_type: f5(slab)
[   19.536329] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.536518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.536725] page dumped because: kasan: bad access detected
[   19.537000] 
[   19.537126] Memory state around the buggy address:
[   19.537215]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.537565]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.537641] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.537917]                                                           ^
[   19.538053]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.538192]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.538323] ==================================================================
[   19.539288] ==================================================================
[   19.539469] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.539542] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.539846] 
[   19.539899] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.540053] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.540127] Hardware name: linux,dummy-virt (DT)
[   19.540163] Call trace:
[   19.540466]  show_stack+0x20/0x38 (C)
[   19.540537]  dump_stack_lvl+0x8c/0xd0
[   19.540781]  print_report+0x118/0x608
[   19.540972]  kasan_report+0xdc/0x128
[   19.541036]  kasan_check_range+0x100/0x1a8
[   19.541104]  __kasan_check_write+0x20/0x30
[   19.541307]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.541498]  kasan_bitops_generic+0x110/0x1c8
[   19.541904]  kunit_try_run_case+0x170/0x3f0
[   19.542104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.542179]  kthread+0x328/0x630
[   19.542522]  ret_from_fork+0x10/0x20
[   19.542656] 
[   19.542718] Allocated by task 261:
[   19.542748]  kasan_save_stack+0x3c/0x68
[   19.543164]  kasan_save_track+0x20/0x40
[   19.543293]  kasan_save_alloc_info+0x40/0x58
[   19.543381]  __kasan_kmalloc+0xd4/0xd8
[   19.543441]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.543606]  kasan_bitops_generic+0xa0/0x1c8
[   19.543818]  kunit_try_run_case+0x170/0x3f0
[   19.543951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.544004]  kthread+0x328/0x630
[   19.544295]  ret_from_fork+0x10/0x20
[   19.544431] 
[   19.544488] The buggy address belongs to the object at fff00000c58cac60
[   19.544488]  which belongs to the cache kmalloc-16 of size 16
[   19.544883] The buggy address is located 8 bytes inside of
[   19.544883]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.545103] 
[   19.545154] The buggy address belongs to the physical page:
[   19.545247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.545308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.545370] page_type: f5(slab)
[   19.545427] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.545791] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.546152] page dumped because: kasan: bad access detected
[   19.546290] 
[   19.546327] Memory state around the buggy address:
[   19.546365]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.546423]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.546477] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.546519]                                                           ^
[   19.546560]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.546606]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.546649] ==================================================================
[   19.555498] ==================================================================
[   19.555559] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   19.555760] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.555874] 
[   19.555994] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.556261] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.556308] Hardware name: linux,dummy-virt (DT)
[   19.556343] Call trace:
[   19.556501]  show_stack+0x20/0x38 (C)
[   19.556617]  dump_stack_lvl+0x8c/0xd0
[   19.556702]  print_report+0x118/0x608
[   19.556891]  kasan_report+0xdc/0x128
[   19.557041]  kasan_check_range+0x100/0x1a8
[   19.557135]  __kasan_check_write+0x20/0x30
[   19.557202]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   19.557564]  kasan_bitops_generic+0x110/0x1c8
[   19.557654]  kunit_try_run_case+0x170/0x3f0
[   19.557818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.558183]  kthread+0x328/0x630
[   19.558289]  ret_from_fork+0x10/0x20
[   19.558533] 
[   19.558778] Allocated by task 261:
[   19.558909]  kasan_save_stack+0x3c/0x68
[   19.558984]  kasan_save_track+0x20/0x40
[   19.559202]  kasan_save_alloc_info+0x40/0x58
[   19.559419]  __kasan_kmalloc+0xd4/0xd8
[   19.559503]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.559647]  kasan_bitops_generic+0xa0/0x1c8
[   19.559815]  kunit_try_run_case+0x170/0x3f0
[   19.559894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.560132]  kthread+0x328/0x630
[   19.560353]  ret_from_fork+0x10/0x20
[   19.560428] 
[   19.560472] The buggy address belongs to the object at fff00000c58cac60
[   19.560472]  which belongs to the cache kmalloc-16 of size 16
[   19.560674] The buggy address is located 8 bytes inside of
[   19.560674]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.561043] 
[   19.561101] The buggy address belongs to the physical page:
[   19.561833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.561912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.561992] page_type: f5(slab)
[   19.562135] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.562249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.562295] page dumped because: kasan: bad access detected
[   19.562330] 
[   19.562548] Memory state around the buggy address:
[   19.562705]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.563182]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.563368] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.563815]                                                           ^
[   19.563918]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.564053]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.564234] ==================================================================
[   19.548964] ==================================================================
[   19.549293] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.549367] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.549694] 
[   19.550035] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.550293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.550470] Hardware name: linux,dummy-virt (DT)
[   19.550513] Call trace:
[   19.550697]  show_stack+0x20/0x38 (C)
[   19.550853]  dump_stack_lvl+0x8c/0xd0
[   19.550994]  print_report+0x118/0x608
[   19.551122]  kasan_report+0xdc/0x128
[   19.551256]  __asan_report_load8_noabort+0x20/0x30
[   19.551355]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.551417]  kasan_bitops_generic+0x110/0x1c8
[   19.551500]  kunit_try_run_case+0x170/0x3f0
[   19.551562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.551630]  kthread+0x328/0x630
[   19.551676]  ret_from_fork+0x10/0x20
[   19.551738] 
[   19.551767] Allocated by task 261:
[   19.551798]  kasan_save_stack+0x3c/0x68
[   19.551841]  kasan_save_track+0x20/0x40
[   19.551896]  kasan_save_alloc_info+0x40/0x58
[   19.551940]  __kasan_kmalloc+0xd4/0xd8
[   19.551989]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.552034]  kasan_bitops_generic+0xa0/0x1c8
[   19.552075]  kunit_try_run_case+0x170/0x3f0
[   19.552127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.552173]  kthread+0x328/0x630
[   19.552219]  ret_from_fork+0x10/0x20
[   19.552268] 
[   19.552298] The buggy address belongs to the object at fff00000c58cac60
[   19.552298]  which belongs to the cache kmalloc-16 of size 16
[   19.552359] The buggy address is located 8 bytes inside of
[   19.552359]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.552434] 
[   19.552470] The buggy address belongs to the physical page:
[   19.552518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.552574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.552626] page_type: f5(slab)
[   19.552673] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.552737] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.552790] page dumped because: kasan: bad access detected
[   19.552824] 
[   19.552848] Memory state around the buggy address:
[   19.552903]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.552950]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.552996] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.553037]                                                           ^
[   19.553079]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.553805]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.553876] ==================================================================
[   19.585432] ==================================================================
[   19.585484] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   19.585538] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.585591] 
[   19.585889] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.587022] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.587079] Hardware name: linux,dummy-virt (DT)
[   19.587178] Call trace:
[   19.587275]  show_stack+0x20/0x38 (C)
[   19.587382]  dump_stack_lvl+0x8c/0xd0
[   19.587473]  print_report+0x118/0x608
[   19.587657]  kasan_report+0xdc/0x128
[   19.587930]  kasan_check_range+0x100/0x1a8
[   19.588053]  __kasan_check_write+0x20/0x30
[   19.588231]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   19.588455]  kasan_bitops_generic+0x110/0x1c8
[   19.588620]  kunit_try_run_case+0x170/0x3f0
[   19.588869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.588988]  kthread+0x328/0x630
[   19.589155]  ret_from_fork+0x10/0x20
[   19.589593] 
[   19.589646] Allocated by task 261:
[   19.589787]  kasan_save_stack+0x3c/0x68
[   19.589917]  kasan_save_track+0x20/0x40
[   19.590057]  kasan_save_alloc_info+0x40/0x58
[   19.590117]  __kasan_kmalloc+0xd4/0xd8
[   19.590455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.590620]  kasan_bitops_generic+0xa0/0x1c8
[   19.591076]  kunit_try_run_case+0x170/0x3f0
[   19.591161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.591370]  kthread+0x328/0x630
[   19.591539]  ret_from_fork+0x10/0x20
[   19.591952] 
[   19.592100] The buggy address belongs to the object at fff00000c58cac60
[   19.592100]  which belongs to the cache kmalloc-16 of size 16
[   19.592692] The buggy address is located 8 bytes inside of
[   19.592692]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.592794] 
[   19.592881] The buggy address belongs to the physical page:
[   19.592943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.593130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.593347] page_type: f5(slab)
[   19.593497] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.593554] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.593796] page dumped because: kasan: bad access detected
[   19.593979] 
[   19.594143] Memory state around the buggy address:
[   19.594221]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.594270]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.594317] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.594632]                                                           ^
[   19.594847]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.594924]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.595075] ==================================================================
[   19.524595] ==================================================================
[   19.524680] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.524981] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.525053] 
[   19.525273] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.525380] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.525416] Hardware name: linux,dummy-virt (DT)
[   19.525639] Call trace:
[   19.525764]  show_stack+0x20/0x38 (C)
[   19.525963]  dump_stack_lvl+0x8c/0xd0
[   19.526185]  print_report+0x118/0x608
[   19.526349]  kasan_report+0xdc/0x128
[   19.526479]  kasan_check_range+0x100/0x1a8
[   19.526535]  __kasan_check_write+0x20/0x30
[   19.526724]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.526991]  kasan_bitops_generic+0x110/0x1c8
[   19.527145]  kunit_try_run_case+0x170/0x3f0
[   19.527254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.527315]  kthread+0x328/0x630
[   19.527362]  ret_from_fork+0x10/0x20
[   19.527416] 
[   19.527436] Allocated by task 261:
[   19.527480]  kasan_save_stack+0x3c/0x68
[   19.527544]  kasan_save_track+0x20/0x40
[   19.527585]  kasan_save_alloc_info+0x40/0x58
[   19.527638]  __kasan_kmalloc+0xd4/0xd8
[   19.527686]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.527740]  kasan_bitops_generic+0xa0/0x1c8
[   19.527782]  kunit_try_run_case+0x170/0x3f0
[   19.527830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.527876]  kthread+0x328/0x630
[   19.527911]  ret_from_fork+0x10/0x20
[   19.527951] 
[   19.527974] The buggy address belongs to the object at fff00000c58cac60
[   19.527974]  which belongs to the cache kmalloc-16 of size 16
[   19.528049] The buggy address is located 8 bytes inside of
[   19.528049]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.528135] 
[   19.528176] The buggy address belongs to the physical page:
[   19.528214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.528273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.528328] page_type: f5(slab)
[   19.528379] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.528432] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.528490] page dumped because: kasan: bad access detected
[   19.528534] 
[   19.528554] Memory state around the buggy address:
[   19.528589]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.528644]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.528690] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.528731]                                                           ^
[   19.528772]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.528826]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.528869] ==================================================================
[   19.565599] ==================================================================
[   19.565755] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   19.565817] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.565882] 
[   19.565916] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.566362] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.566492] Hardware name: linux,dummy-virt (DT)
[   19.566546] Call trace:
[   19.566571]  show_stack+0x20/0x38 (C)
[   19.566660]  dump_stack_lvl+0x8c/0xd0
[   19.567123]  print_report+0x118/0x608
[   19.567189]  kasan_report+0xdc/0x128
[   19.567557]  kasan_check_range+0x100/0x1a8
[   19.567682]  __kasan_check_write+0x20/0x30
[   19.567845]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   19.568046]  kasan_bitops_generic+0x110/0x1c8
[   19.568414]  kunit_try_run_case+0x170/0x3f0
[   19.568538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.568644]  kthread+0x328/0x630
[   19.568975]  ret_from_fork+0x10/0x20
[   19.569445] 
[   19.569552] Allocated by task 261:
[   19.569588]  kasan_save_stack+0x3c/0x68
[   19.569645]  kasan_save_track+0x20/0x40
[   19.569961]  kasan_save_alloc_info+0x40/0x58
[   19.570046]  __kasan_kmalloc+0xd4/0xd8
[   19.570221]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.570265]  kasan_bitops_generic+0xa0/0x1c8
[   19.570307]  kunit_try_run_case+0x170/0x3f0
[   19.570629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.570710]  kthread+0x328/0x630
[   19.570865]  ret_from_fork+0x10/0x20
[   19.571203] 
[   19.571250] The buggy address belongs to the object at fff00000c58cac60
[   19.571250]  which belongs to the cache kmalloc-16 of size 16
[   19.571382] The buggy address is located 8 bytes inside of
[   19.571382]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.571450] 
[   19.571472] The buggy address belongs to the physical page:
[   19.571536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.571594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.571672] page_type: f5(slab)
[   19.571726] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.571804] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.571850] page dumped because: kasan: bad access detected
[   19.571884] 
[   19.571906] Memory state around the buggy address:
[   19.571949]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.571997]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.572050] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.572130]                                                           ^
[   19.572190]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.572238]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.572278] ==================================================================
[   19.596985] ==================================================================
[   19.597047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   19.597253] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.597316] 
[   19.597349] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.597715] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.597817] Hardware name: linux,dummy-virt (DT)
[   19.597897] Call trace:
[   19.597959]  show_stack+0x20/0x38 (C)
[   19.598024]  dump_stack_lvl+0x8c/0xd0
[   19.598207]  print_report+0x118/0x608
[   19.598425]  kasan_report+0xdc/0x128
[   19.598490]  __asan_report_load8_noabort+0x20/0x30
[   19.598671]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   19.598936]  kasan_bitops_generic+0x110/0x1c8
[   19.599001]  kunit_try_run_case+0x170/0x3f0
[   19.599281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.599468]  kthread+0x328/0x630
[   19.599540]  ret_from_fork+0x10/0x20
[   19.599790] 
[   19.600060] Allocated by task 261:
[   19.600208]  kasan_save_stack+0x3c/0x68
[   19.600420]  kasan_save_track+0x20/0x40
[   19.600645]  kasan_save_alloc_info+0x40/0x58
[   19.600765]  __kasan_kmalloc+0xd4/0xd8
[   19.600852]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.601129]  kasan_bitops_generic+0xa0/0x1c8
[   19.601542]  kunit_try_run_case+0x170/0x3f0
[   19.601663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.601972]  kthread+0x328/0x630
[   19.602158]  ret_from_fork+0x10/0x20
[   19.602241] 
[   19.602419] The buggy address belongs to the object at fff00000c58cac60
[   19.602419]  which belongs to the cache kmalloc-16 of size 16
[   19.602678] The buggy address is located 8 bytes inside of
[   19.602678]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.602899] 
[   19.603066] The buggy address belongs to the physical page:
[   19.603130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.603417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.603606] page_type: f5(slab)
[   19.603769] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.603857] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.604115] page dumped because: kasan: bad access detected
[   19.604262] 
[   19.604368] Memory state around the buggy address:
[   19.604409]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.604782]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.604900] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.605151]                                                           ^
[   19.605344]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.605493]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.605538] ==================================================================
[   19.581845] ==================================================================
[   19.581901] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   19.581956] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.582010] 
[   19.582044] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.582466] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.582521] Hardware name: linux,dummy-virt (DT)
[   19.582556] Call trace:
[   19.582624]  show_stack+0x20/0x38 (C)
[   19.582725]  dump_stack_lvl+0x8c/0xd0
[   19.582782]  print_report+0x118/0x608
[   19.582849]  kasan_report+0xdc/0x128
[   19.583056]  kasan_check_range+0x100/0x1a8
[   19.583139]  __kasan_check_write+0x20/0x30
[   19.583290]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   19.583356]  kasan_bitops_generic+0x110/0x1c8
[   19.583408]  kunit_try_run_case+0x170/0x3f0
[   19.583458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.583514]  kthread+0x328/0x630
[   19.583559]  ret_from_fork+0x10/0x20
[   19.583609] 
[   19.583643] Allocated by task 261:
[   19.583676]  kasan_save_stack+0x3c/0x68
[   19.583722]  kasan_save_track+0x20/0x40
[   19.583762]  kasan_save_alloc_info+0x40/0x58
[   19.583817]  __kasan_kmalloc+0xd4/0xd8
[   19.583864]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.583905]  kasan_bitops_generic+0xa0/0x1c8
[   19.583951]  kunit_try_run_case+0x170/0x3f0
[   19.583991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.584048]  kthread+0x328/0x630
[   19.584097]  ret_from_fork+0x10/0x20
[   19.584135] 
[   19.584167] The buggy address belongs to the object at fff00000c58cac60
[   19.584167]  which belongs to the cache kmalloc-16 of size 16
[   19.584226] The buggy address is located 8 bytes inside of
[   19.584226]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.584290] 
[   19.584312] The buggy address belongs to the physical page:
[   19.584344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.584397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.584448] page_type: f5(slab)
[   19.584490] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.584543] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.584586] page dumped because: kasan: bad access detected
[   19.584622] 
[   19.584651] Memory state around the buggy address:
[   19.584694]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.584740]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.584790] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.584831]                                                           ^
[   19.584874]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.584919]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.584960] ==================================================================
[   19.572733] ==================================================================
[   19.572789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   19.572870] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.572925] 
[   19.572968] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.573059] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.573460] Hardware name: linux,dummy-virt (DT)
[   19.573548] Call trace:
[   19.573575]  show_stack+0x20/0x38 (C)
[   19.574040]  dump_stack_lvl+0x8c/0xd0
[   19.574123]  print_report+0x118/0x608
[   19.574219]  kasan_report+0xdc/0x128
[   19.574291]  __asan_report_load8_noabort+0x20/0x30
[   19.574766]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   19.575025]  kasan_bitops_generic+0x110/0x1c8
[   19.575265]  kunit_try_run_case+0x170/0x3f0
[   19.575602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.575697]  kthread+0x328/0x630
[   19.575887]  ret_from_fork+0x10/0x20
[   19.576119] 
[   19.576175] Allocated by task 261:
[   19.576428]  kasan_save_stack+0x3c/0x68
[   19.576564]  kasan_save_track+0x20/0x40
[   19.576672]  kasan_save_alloc_info+0x40/0x58
[   19.576788]  __kasan_kmalloc+0xd4/0xd8
[   19.576877]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.577000]  kasan_bitops_generic+0xa0/0x1c8
[   19.577064]  kunit_try_run_case+0x170/0x3f0
[   19.577117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.577287]  kthread+0x328/0x630
[   19.577502]  ret_from_fork+0x10/0x20
[   19.577703] 
[   19.577884] The buggy address belongs to the object at fff00000c58cac60
[   19.577884]  which belongs to the cache kmalloc-16 of size 16
[   19.577987] The buggy address is located 8 bytes inside of
[   19.577987]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.578188] 
[   19.578381] The buggy address belongs to the physical page:
[   19.578429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.578572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.578639] page_type: f5(slab)
[   19.578799] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.578886] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.579041] page dumped because: kasan: bad access detected
[   19.579108] 
[   19.579260] Memory state around the buggy address:
[   19.579470]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.579548]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.579637] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.579774]                                                           ^
[   19.579851]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.579993]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.580043] ==================================================================

[   14.842269] ==================================================================
[   14.842511] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.842953] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   14.843179] 
[   14.843354] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.843397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.843407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.843427] Call Trace:
[   14.843444]  <TASK>
[   14.843460]  dump_stack_lvl+0x73/0xb0
[   14.843487]  print_report+0xd1/0x650
[   14.843509]  ? __virt_addr_valid+0x1db/0x2d0
[   14.843533]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.843559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.843582]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.843621]  kasan_report+0x141/0x180
[   14.843642]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.843673]  kasan_check_range+0x10c/0x1c0
[   14.843697]  __kasan_check_write+0x18/0x20
[   14.843717]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.843743]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.843790]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.843832]  ? trace_hardirqs_on+0x37/0xe0
[   14.843854]  ? kasan_bitops_generic+0x92/0x1c0
[   14.843881]  kasan_bitops_generic+0x116/0x1c0
[   14.843905]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.843930]  ? __pfx_read_tsc+0x10/0x10
[   14.843951]  ? ktime_get_ts64+0x86/0x230
[   14.843976]  kunit_try_run_case+0x1a5/0x480
[   14.844000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.844023]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.844047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.844070]  ? __kthread_parkme+0x82/0x180
[   14.844091]  ? preempt_count_sub+0x50/0x80
[   14.844127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.844152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.844176]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.844203]  kthread+0x337/0x6f0
[   14.844221]  ? trace_preempt_on+0x20/0xc0
[   14.844243]  ? __pfx_kthread+0x10/0x10
[   14.844263]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.844285]  ? calculate_sigpending+0x7b/0xa0
[   14.844308]  ? __pfx_kthread+0x10/0x10
[   14.844329]  ret_from_fork+0x116/0x1d0
[   14.844348]  ? __pfx_kthread+0x10/0x10
[   14.844367]  ret_from_fork_asm+0x1a/0x30
[   14.844397]  </TASK>
[   14.844408] 
[   14.852264] Allocated by task 278:
[   14.852409]  kasan_save_stack+0x45/0x70
[   14.852559]  kasan_save_track+0x18/0x40
[   14.852879]  kasan_save_alloc_info+0x3b/0x50
[   14.853344]  __kasan_kmalloc+0xb7/0xc0
[   14.853539]  __kmalloc_cache_noprof+0x189/0x420
[   14.853828]  kasan_bitops_generic+0x92/0x1c0
[   14.854250]  kunit_try_run_case+0x1a5/0x480
[   14.854462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.854729]  kthread+0x337/0x6f0
[   14.854949]  ret_from_fork+0x116/0x1d0
[   14.855231]  ret_from_fork_asm+0x1a/0x30
[   14.855406] 
[   14.855501] The buggy address belongs to the object at ffff888102434620
[   14.855501]  which belongs to the cache kmalloc-16 of size 16
[   14.855914] The buggy address is located 8 bytes inside of
[   14.855914]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   14.856400] 
[   14.856496] The buggy address belongs to the physical page:
[   14.856759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   14.857395] flags: 0x200000000000000(node=0|zone=2)
[   14.857573] page_type: f5(slab)
[   14.857759] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.858567] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.858905] page dumped because: kasan: bad access detected
[   14.859083] 
[   14.859155] Memory state around the buggy address:
[   14.859311]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   14.859526]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.860360] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.860701]                                   ^
[   14.860923]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.861239]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.861551] ==================================================================
[   14.863345] ==================================================================
[   14.864078] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.864464] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   14.865173] 
[   14.865396] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.865536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.865550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.865572] Call Trace:
[   14.865631]  <TASK>
[   14.865650]  dump_stack_lvl+0x73/0xb0
[   14.865682]  print_report+0xd1/0x650
[   14.865704]  ? __virt_addr_valid+0x1db/0x2d0
[   14.865727]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.865754]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.865816]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.865843]  kasan_report+0x141/0x180
[   14.865864]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.865895]  kasan_check_range+0x10c/0x1c0
[   14.865919]  __kasan_check_write+0x18/0x20
[   14.865938]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.865965]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.865992]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.866017]  ? trace_hardirqs_on+0x37/0xe0
[   14.866039]  ? kasan_bitops_generic+0x92/0x1c0
[   14.866066]  kasan_bitops_generic+0x116/0x1c0
[   14.866090]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.866115]  ? __pfx_read_tsc+0x10/0x10
[   14.866138]  ? ktime_get_ts64+0x86/0x230
[   14.866162]  kunit_try_run_case+0x1a5/0x480
[   14.866185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.866208]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.866232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.866257]  ? __kthread_parkme+0x82/0x180
[   14.866278]  ? preempt_count_sub+0x50/0x80
[   14.866302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.866327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.866352]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.866377]  kthread+0x337/0x6f0
[   14.866396]  ? trace_preempt_on+0x20/0xc0
[   14.866418]  ? __pfx_kthread+0x10/0x10
[   14.866438]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.866460]  ? calculate_sigpending+0x7b/0xa0
[   14.866485]  ? __pfx_kthread+0x10/0x10
[   14.866505]  ret_from_fork+0x116/0x1d0
[   14.866522]  ? __pfx_kthread+0x10/0x10
[   14.866542]  ret_from_fork_asm+0x1a/0x30
[   14.866573]  </TASK>
[   14.866583] 
[   14.879252] Allocated by task 278:
[   14.879414]  kasan_save_stack+0x45/0x70
[   14.879580]  kasan_save_track+0x18/0x40
[   14.879764]  kasan_save_alloc_info+0x3b/0x50
[   14.880057]  __kasan_kmalloc+0xb7/0xc0
[   14.880212]  __kmalloc_cache_noprof+0x189/0x420
[   14.880446]  kasan_bitops_generic+0x92/0x1c0
[   14.880634]  kunit_try_run_case+0x1a5/0x480
[   14.880782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.881172]  kthread+0x337/0x6f0
[   14.881340]  ret_from_fork+0x116/0x1d0
[   14.881583]  ret_from_fork_asm+0x1a/0x30
[   14.881750] 
[   14.881936] The buggy address belongs to the object at ffff888102434620
[   14.881936]  which belongs to the cache kmalloc-16 of size 16
[   14.882392] The buggy address is located 8 bytes inside of
[   14.882392]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   14.882802] 
[   14.882901] The buggy address belongs to the physical page:
[   14.883154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   14.883553] flags: 0x200000000000000(node=0|zone=2)
[   14.883725] page_type: f5(slab)
[   14.883845] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.884579] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.884926] page dumped because: kasan: bad access detected
[   14.885140] 
[   14.885227] Memory state around the buggy address:
[   14.885428]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   14.885726]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.886024] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.886327]                                   ^
[   14.886519]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.886759]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.887232] ==================================================================
[   14.823302] ==================================================================
[   14.823658] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.824083] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   14.824419] 
[   14.824522] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.824565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.824577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.824607] Call Trace:
[   14.824623]  <TASK>
[   14.824640]  dump_stack_lvl+0x73/0xb0
[   14.824666]  print_report+0xd1/0x650
[   14.824688]  ? __virt_addr_valid+0x1db/0x2d0
[   14.824710]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.824736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.824759]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.824820]  kasan_report+0x141/0x180
[   14.824842]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.824873]  kasan_check_range+0x10c/0x1c0
[   14.824896]  __kasan_check_write+0x18/0x20
[   14.824915]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.824941]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.824969]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.824992]  ? trace_hardirqs_on+0x37/0xe0
[   14.825015]  ? kasan_bitops_generic+0x92/0x1c0
[   14.825043]  kasan_bitops_generic+0x116/0x1c0
[   14.825067]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.825092]  ? __pfx_read_tsc+0x10/0x10
[   14.825114]  ? ktime_get_ts64+0x86/0x230
[   14.825138]  kunit_try_run_case+0x1a5/0x480
[   14.825162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.825186]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.825209]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.825233]  ? __kthread_parkme+0x82/0x180
[   14.825254]  ? preempt_count_sub+0x50/0x80
[   14.825278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.825303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.825327]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.825352]  kthread+0x337/0x6f0
[   14.825371]  ? trace_preempt_on+0x20/0xc0
[   14.825394]  ? __pfx_kthread+0x10/0x10
[   14.825413]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.825435]  ? calculate_sigpending+0x7b/0xa0
[   14.825459]  ? __pfx_kthread+0x10/0x10
[   14.825481]  ret_from_fork+0x116/0x1d0
[   14.825500]  ? __pfx_kthread+0x10/0x10
[   14.825521]  ret_from_fork_asm+0x1a/0x30
[   14.825551]  </TASK>
[   14.825561] 
[   14.834165] Allocated by task 278:
[   14.834347]  kasan_save_stack+0x45/0x70
[   14.834549]  kasan_save_track+0x18/0x40
[   14.834748]  kasan_save_alloc_info+0x3b/0x50
[   14.835019]  __kasan_kmalloc+0xb7/0xc0
[   14.835191]  __kmalloc_cache_noprof+0x189/0x420
[   14.835346]  kasan_bitops_generic+0x92/0x1c0
[   14.835493]  kunit_try_run_case+0x1a5/0x480
[   14.835650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.835866]  kthread+0x337/0x6f0
[   14.835985]  ret_from_fork+0x116/0x1d0
[   14.836118]  ret_from_fork_asm+0x1a/0x30
[   14.836289] 
[   14.836383] The buggy address belongs to the object at ffff888102434620
[   14.836383]  which belongs to the cache kmalloc-16 of size 16
[   14.836963] The buggy address is located 8 bytes inside of
[   14.836963]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   14.837507] 
[   14.837615] The buggy address belongs to the physical page:
[   14.837902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   14.838140] flags: 0x200000000000000(node=0|zone=2)
[   14.838301] page_type: f5(slab)
[   14.838418] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.838920] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.839257] page dumped because: kasan: bad access detected
[   14.839511] 
[   14.839610] Memory state around the buggy address:
[   14.839936]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   14.840258]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.840536] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.840882]                                   ^
[   14.841102]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.841377]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.841671] ==================================================================
[   14.780870] ==================================================================
[   14.781524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.782273] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   14.782997] 
[   14.783201] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.783246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.783257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.783277] Call Trace:
[   14.783290]  <TASK>
[   14.783308]  dump_stack_lvl+0x73/0xb0
[   14.783338]  print_report+0xd1/0x650
[   14.783359]  ? __virt_addr_valid+0x1db/0x2d0
[   14.783384]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.783410]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.783434]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.783460]  kasan_report+0x141/0x180
[   14.783481]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.783512]  kasan_check_range+0x10c/0x1c0
[   14.783535]  __kasan_check_write+0x18/0x20
[   14.783555]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.783581]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.783621]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.783646]  ? trace_hardirqs_on+0x37/0xe0
[   14.783669]  ? kasan_bitops_generic+0x92/0x1c0
[   14.783697]  kasan_bitops_generic+0x116/0x1c0
[   14.783720]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.783745]  ? __pfx_read_tsc+0x10/0x10
[   14.783787]  ? ktime_get_ts64+0x86/0x230
[   14.783812]  kunit_try_run_case+0x1a5/0x480
[   14.783837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.783860]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.783884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.783908]  ? __kthread_parkme+0x82/0x180
[   14.783946]  ? preempt_count_sub+0x50/0x80
[   14.783971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.783995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.784022]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.784049]  kthread+0x337/0x6f0
[   14.784068]  ? trace_preempt_on+0x20/0xc0
[   14.784090]  ? __pfx_kthread+0x10/0x10
[   14.784112]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.784133]  ? calculate_sigpending+0x7b/0xa0
[   14.784158]  ? __pfx_kthread+0x10/0x10
[   14.784179]  ret_from_fork+0x116/0x1d0
[   14.784198]  ? __pfx_kthread+0x10/0x10
[   14.784219]  ret_from_fork_asm+0x1a/0x30
[   14.784251]  </TASK>
[   14.784261] 
[   14.795495] Allocated by task 278:
[   14.795703]  kasan_save_stack+0x45/0x70
[   14.795966]  kasan_save_track+0x18/0x40
[   14.796150]  kasan_save_alloc_info+0x3b/0x50
[   14.796301]  __kasan_kmalloc+0xb7/0xc0
[   14.796432]  __kmalloc_cache_noprof+0x189/0x420
[   14.796629]  kasan_bitops_generic+0x92/0x1c0
[   14.796905]  kunit_try_run_case+0x1a5/0x480
[   14.797114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.797562]  kthread+0x337/0x6f0
[   14.797695]  ret_from_fork+0x116/0x1d0
[   14.798034]  ret_from_fork_asm+0x1a/0x30
[   14.798238] 
[   14.798331] The buggy address belongs to the object at ffff888102434620
[   14.798331]  which belongs to the cache kmalloc-16 of size 16
[   14.798787] The buggy address is located 8 bytes inside of
[   14.798787]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   14.799161] 
[   14.799257] The buggy address belongs to the physical page:
[   14.799666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   14.800077] flags: 0x200000000000000(node=0|zone=2)
[   14.800321] page_type: f5(slab)
[   14.800496] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.800745] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.801121] page dumped because: kasan: bad access detected
[   14.801298] 
[   14.801388] Memory state around the buggy address:
[   14.801617]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   14.801883]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.802186] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.802516]                                   ^
[   14.802742]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.803029]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.803244] ==================================================================
[   14.803720] ==================================================================
[   14.804494] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.805075] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   14.805303] 
[   14.805391] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.805435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.805447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.805467] Call Trace:
[   14.805486]  <TASK>
[   14.805504]  dump_stack_lvl+0x73/0xb0
[   14.805534]  print_report+0xd1/0x650
[   14.805556]  ? __virt_addr_valid+0x1db/0x2d0
[   14.805580]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.805619]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.805642]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.805669]  kasan_report+0x141/0x180
[   14.805690]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.805721]  kasan_check_range+0x10c/0x1c0
[   14.805745]  __kasan_check_write+0x18/0x20
[   14.805783]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.805810]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.805856]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.805883]  ? trace_hardirqs_on+0x37/0xe0
[   14.805908]  ? kasan_bitops_generic+0x92/0x1c0
[   14.805935]  kasan_bitops_generic+0x116/0x1c0
[   14.805959]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.805985]  ? __pfx_read_tsc+0x10/0x10
[   14.806006]  ? ktime_get_ts64+0x86/0x230
[   14.806031]  kunit_try_run_case+0x1a5/0x480
[   14.806055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.806078]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.806102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.806127]  ? __kthread_parkme+0x82/0x180
[   14.806148]  ? preempt_count_sub+0x50/0x80
[   14.806172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.806196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.806221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.806247]  kthread+0x337/0x6f0
[   14.806265]  ? trace_preempt_on+0x20/0xc0
[   14.806286]  ? __pfx_kthread+0x10/0x10
[   14.806307]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.806328]  ? calculate_sigpending+0x7b/0xa0
[   14.806352]  ? __pfx_kthread+0x10/0x10
[   14.806374]  ret_from_fork+0x116/0x1d0
[   14.806393]  ? __pfx_kthread+0x10/0x10
[   14.806413]  ret_from_fork_asm+0x1a/0x30
[   14.806444]  </TASK>
[   14.806454] 
[   14.815004] Allocated by task 278:
[   14.815189]  kasan_save_stack+0x45/0x70
[   14.815368]  kasan_save_track+0x18/0x40
[   14.815534]  kasan_save_alloc_info+0x3b/0x50
[   14.815692]  __kasan_kmalloc+0xb7/0xc0
[   14.815851]  __kmalloc_cache_noprof+0x189/0x420
[   14.816246]  kasan_bitops_generic+0x92/0x1c0
[   14.816461]  kunit_try_run_case+0x1a5/0x480
[   14.816681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.816996]  kthread+0x337/0x6f0
[   14.817232]  ret_from_fork+0x116/0x1d0
[   14.817365]  ret_from_fork_asm+0x1a/0x30
[   14.817561] 
[   14.817669] The buggy address belongs to the object at ffff888102434620
[   14.817669]  which belongs to the cache kmalloc-16 of size 16
[   14.818251] The buggy address is located 8 bytes inside of
[   14.818251]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   14.818705] 
[   14.818802] The buggy address belongs to the physical page:
[   14.818979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   14.819238] flags: 0x200000000000000(node=0|zone=2)
[   14.819418] page_type: f5(slab)
[   14.819584] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.819961] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.820478] page dumped because: kasan: bad access detected
[   14.820801] 
[   14.820891] Memory state around the buggy address:
[   14.821112]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   14.821339]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.821550] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.821768]                                   ^
[   14.821911]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.822122]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.822822] ==================================================================
[   14.909746] ==================================================================
[   14.910420] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.910905] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   14.911283] 
[   14.911378] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.911422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.911433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.911453] Call Trace:
[   14.911470]  <TASK>
[   14.911487]  dump_stack_lvl+0x73/0xb0
[   14.911516]  print_report+0xd1/0x650
[   14.911538]  ? __virt_addr_valid+0x1db/0x2d0
[   14.911561]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.911587]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.911624]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.911652]  kasan_report+0x141/0x180
[   14.911673]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.911704]  kasan_check_range+0x10c/0x1c0
[   14.911728]  __kasan_check_write+0x18/0x20
[   14.911748]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.911810]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.911839]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.911865]  ? trace_hardirqs_on+0x37/0xe0
[   14.911888]  ? kasan_bitops_generic+0x92/0x1c0
[   14.911915]  kasan_bitops_generic+0x116/0x1c0
[   14.911938]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.911984]  ? __pfx_read_tsc+0x10/0x10
[   14.912005]  ? ktime_get_ts64+0x86/0x230
[   14.912029]  kunit_try_run_case+0x1a5/0x480
[   14.912052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.912075]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.912099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.912122]  ? __kthread_parkme+0x82/0x180
[   14.912143]  ? preempt_count_sub+0x50/0x80
[   14.912167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.912191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.912216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.912241]  kthread+0x337/0x6f0
[   14.912259]  ? trace_preempt_on+0x20/0xc0
[   14.912280]  ? __pfx_kthread+0x10/0x10
[   14.912300]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.912321]  ? calculate_sigpending+0x7b/0xa0
[   14.912345]  ? __pfx_kthread+0x10/0x10
[   14.912366]  ret_from_fork+0x116/0x1d0
[   14.912385]  ? __pfx_kthread+0x10/0x10
[   14.912404]  ret_from_fork_asm+0x1a/0x30
[   14.912434]  </TASK>
[   14.912444] 
[   14.920690] Allocated by task 278:
[   14.920878]  kasan_save_stack+0x45/0x70
[   14.921078]  kasan_save_track+0x18/0x40
[   14.921268]  kasan_save_alloc_info+0x3b/0x50
[   14.921461]  __kasan_kmalloc+0xb7/0xc0
[   14.921633]  __kmalloc_cache_noprof+0x189/0x420
[   14.922088]  kasan_bitops_generic+0x92/0x1c0
[   14.922256]  kunit_try_run_case+0x1a5/0x480
[   14.922450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.922720]  kthread+0x337/0x6f0
[   14.922904]  ret_from_fork+0x116/0x1d0
[   14.923037]  ret_from_fork_asm+0x1a/0x30
[   14.923177] 
[   14.923247] The buggy address belongs to the object at ffff888102434620
[   14.923247]  which belongs to the cache kmalloc-16 of size 16
[   14.923818] The buggy address is located 8 bytes inside of
[   14.923818]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   14.924332] 
[   14.924411] The buggy address belongs to the physical page:
[   14.924587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   14.925006] flags: 0x200000000000000(node=0|zone=2)
[   14.925243] page_type: f5(slab)
[   14.925414] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.925892] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.926272] page dumped because: kasan: bad access detected
[   14.926539] 
[   14.926641] Memory state around the buggy address:
[   14.926881]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   14.927168]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.927381] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.927690]                                   ^
[   14.927908]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.928184]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.928466] ==================================================================
[   14.887735] ==================================================================
[   14.888279] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.888766] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   14.889106] 
[   14.889194] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.889237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.889247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.889268] Call Trace:
[   14.889280]  <TASK>
[   14.889295]  dump_stack_lvl+0x73/0xb0
[   14.889323]  print_report+0xd1/0x650
[   14.889344]  ? __virt_addr_valid+0x1db/0x2d0
[   14.889367]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.889393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.889416]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.889443]  kasan_report+0x141/0x180
[   14.889464]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.889495]  kasan_check_range+0x10c/0x1c0
[   14.889518]  __kasan_check_write+0x18/0x20
[   14.889538]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.889564]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.889592]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.889628]  ? trace_hardirqs_on+0x37/0xe0
[   14.889651]  ? kasan_bitops_generic+0x92/0x1c0
[   14.889678]  kasan_bitops_generic+0x116/0x1c0
[   14.889702]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.889751]  ? __pfx_read_tsc+0x10/0x10
[   14.889774]  ? ktime_get_ts64+0x86/0x230
[   14.889801]  kunit_try_run_case+0x1a5/0x480
[   14.889825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.889847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.889871]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.889895]  ? __kthread_parkme+0x82/0x180
[   14.889916]  ? preempt_count_sub+0x50/0x80
[   14.889940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.889965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.889988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.890013]  kthread+0x337/0x6f0
[   14.890032]  ? trace_preempt_on+0x20/0xc0
[   14.890053]  ? __pfx_kthread+0x10/0x10
[   14.890074]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.890094]  ? calculate_sigpending+0x7b/0xa0
[   14.890119]  ? __pfx_kthread+0x10/0x10
[   14.890139]  ret_from_fork+0x116/0x1d0
[   14.890157]  ? __pfx_kthread+0x10/0x10
[   14.890177]  ret_from_fork_asm+0x1a/0x30
[   14.890220]  </TASK>
[   14.890230] 
[   14.898628] Allocated by task 278:
[   14.898761]  kasan_save_stack+0x45/0x70
[   14.898913]  kasan_save_track+0x18/0x40
[   14.899172]  kasan_save_alloc_info+0x3b/0x50
[   14.899506]  __kasan_kmalloc+0xb7/0xc0
[   14.899706]  __kmalloc_cache_noprof+0x189/0x420
[   14.899949]  kasan_bitops_generic+0x92/0x1c0
[   14.900146]  kunit_try_run_case+0x1a5/0x480
[   14.900292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.900467]  kthread+0x337/0x6f0
[   14.900590]  ret_from_fork+0x116/0x1d0
[   14.900899]  ret_from_fork_asm+0x1a/0x30
[   14.901116] 
[   14.901206] The buggy address belongs to the object at ffff888102434620
[   14.901206]  which belongs to the cache kmalloc-16 of size 16
[   14.901587] The buggy address is located 8 bytes inside of
[   14.901587]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   14.901944] 
[   14.902015] The buggy address belongs to the physical page:
[   14.902359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   14.903636] flags: 0x200000000000000(node=0|zone=2)
[   14.904813] page_type: f5(slab)
[   14.904981] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.905301] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.905635] page dumped because: kasan: bad access detected
[   14.905869] 
[   14.905946] Memory state around the buggy address:
[   14.906166]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   14.906453]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.907612] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.907971]                                   ^
[   14.908159]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.908648]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.909157] ==================================================================
[   14.750361] ==================================================================
[   14.750890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.751247] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   14.751548] 
[   14.751696] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.751758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.751772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.751793] Call Trace:
[   14.751818]  <TASK>
[   14.751836]  dump_stack_lvl+0x73/0xb0
[   14.751867]  print_report+0xd1/0x650
[   14.751890]  ? __virt_addr_valid+0x1db/0x2d0
[   14.751915]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.751941]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.751976]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.752003]  kasan_report+0x141/0x180
[   14.752025]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.752067]  kasan_check_range+0x10c/0x1c0
[   14.752091]  __kasan_check_write+0x18/0x20
[   14.752110]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.752137]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.752165]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.752200]  ? trace_hardirqs_on+0x37/0xe0
[   14.752223]  ? kasan_bitops_generic+0x92/0x1c0
[   14.752250]  kasan_bitops_generic+0x116/0x1c0
[   14.752285]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.752310]  ? __pfx_read_tsc+0x10/0x10
[   14.752331]  ? ktime_get_ts64+0x86/0x230
[   14.752365]  kunit_try_run_case+0x1a5/0x480
[   14.752391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.752414]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.752450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.752474]  ? __kthread_parkme+0x82/0x180
[   14.752496]  ? preempt_count_sub+0x50/0x80
[   14.752522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.752553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.752579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.752630]  kthread+0x337/0x6f0
[   14.752651]  ? trace_preempt_on+0x20/0xc0
[   14.752673]  ? __pfx_kthread+0x10/0x10
[   14.752694]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.752716]  ? calculate_sigpending+0x7b/0xa0
[   14.752741]  ? __pfx_kthread+0x10/0x10
[   14.752763]  ret_from_fork+0x116/0x1d0
[   14.752800]  ? __pfx_kthread+0x10/0x10
[   14.752822]  ret_from_fork_asm+0x1a/0x30
[   14.752855]  </TASK>
[   14.752865] 
[   14.766251] Allocated by task 278:
[   14.766401]  kasan_save_stack+0x45/0x70
[   14.767375]  kasan_save_track+0x18/0x40
[   14.767851]  kasan_save_alloc_info+0x3b/0x50
[   14.768172]  __kasan_kmalloc+0xb7/0xc0
[   14.768309]  __kmalloc_cache_noprof+0x189/0x420
[   14.768468]  kasan_bitops_generic+0x92/0x1c0
[   14.768627]  kunit_try_run_case+0x1a5/0x480
[   14.768829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.769395]  kthread+0x337/0x6f0
[   14.769792]  ret_from_fork+0x116/0x1d0
[   14.770148]  ret_from_fork_asm+0x1a/0x30
[   14.770519] 
[   14.770690] The buggy address belongs to the object at ffff888102434620
[   14.770690]  which belongs to the cache kmalloc-16 of size 16
[   14.772007] The buggy address is located 8 bytes inside of
[   14.772007]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   14.773108] 
[   14.773272] The buggy address belongs to the physical page:
[   14.773669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   14.774454] flags: 0x200000000000000(node=0|zone=2)
[   14.774641] page_type: f5(slab)
[   14.774786] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.775540] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.776393] page dumped because: kasan: bad access detected
[   14.776900] 
[   14.777067] Memory state around the buggy address:
[   14.777523]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   14.777757]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.778485] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.779231]                                   ^
[   14.779790]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.780049]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.780272] ==================================================================