Hay
Date
July 9, 2025, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.664229] ==================================================================
[   19.664284] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   19.664340] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.664701] 
[   19.665013] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.665235] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.665278] Hardware name: linux,dummy-virt (DT)
[   19.665422] Call trace:
[   19.665470]  show_stack+0x20/0x38 (C)
[   19.665665]  dump_stack_lvl+0x8c/0xd0
[   19.665734]  print_report+0x118/0x608
[   19.665786]  kasan_report+0xdc/0x128
[   19.665969]  kasan_check_range+0x100/0x1a8
[   19.666173]  __kasan_check_write+0x20/0x30
[   19.666370]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
[   19.666489]  kasan_bitops_generic+0x11c/0x1c8
[   19.666657]  kunit_try_run_case+0x170/0x3f0
[   19.666714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.667147]  kthread+0x328/0x630
[   19.667268]  ret_from_fork+0x10/0x20
[   19.667513] 
[   19.667603] Allocated by task 261:
[   19.667960]  kasan_save_stack+0x3c/0x68
[   19.668063]  kasan_save_track+0x20/0x40
[   19.668737]  kasan_save_alloc_info+0x40/0x58
[   19.668820]  __kasan_kmalloc+0xd4/0xd8
[   19.668896]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.668958]  kasan_bitops_generic+0xa0/0x1c8
[   19.669347]  kunit_try_run_case+0x170/0x3f0
[   19.669615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.669890]  kthread+0x328/0x630
[   19.670111]  ret_from_fork+0x10/0x20
[   19.670250] 
[   19.670319] The buggy address belongs to the object at fff00000c58cac60
[   19.670319]  which belongs to the cache kmalloc-16 of size 16
[   19.670441] The buggy address is located 8 bytes inside of
[   19.670441]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.670505] 
[   19.670527] The buggy address belongs to the physical page:
[   19.671022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.671218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.671399] page_type: f5(slab)
[   19.671477] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.671577] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.671695] page dumped because: kasan: bad access detected
[   19.671836] 
[   19.671926] Memory state around the buggy address:
[   19.672040]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.672312]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.672420] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.672488]                                                           ^
[   19.672538]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.672595]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.672652] ==================================================================
[   19.655322] ==================================================================
[   19.655377] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   19.655470] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.655526] 
[   19.655562] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.655651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.655684] Hardware name: linux,dummy-virt (DT)
[   19.655717] Call trace:
[   19.655744]  show_stack+0x20/0x38 (C)
[   19.655807]  dump_stack_lvl+0x8c/0xd0
[   19.655874]  print_report+0x118/0x608
[   19.655930]  kasan_report+0xdc/0x128
[   19.655980]  __asan_report_load8_noabort+0x20/0x30
[   19.656039]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
[   19.656904]  kasan_bitops_generic+0x11c/0x1c8
[   19.657061]  kunit_try_run_case+0x170/0x3f0
[   19.657145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.657568]  kthread+0x328/0x630
[   19.657622]  ret_from_fork+0x10/0x20
[   19.658060] 
[   19.658197] Allocated by task 261:
[   19.658284]  kasan_save_stack+0x3c/0x68
[   19.658444]  kasan_save_track+0x20/0x40
[   19.658534]  kasan_save_alloc_info+0x40/0x58
[   19.658682]  __kasan_kmalloc+0xd4/0xd8
[   19.658725]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.659061]  kasan_bitops_generic+0xa0/0x1c8
[   19.659151]  kunit_try_run_case+0x170/0x3f0
[   19.659304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.659462]  kthread+0x328/0x630
[   19.659551]  ret_from_fork+0x10/0x20
[   19.659659] 
[   19.659683] The buggy address belongs to the object at fff00000c58cac60
[   19.659683]  which belongs to the cache kmalloc-16 of size 16
[   19.660027] The buggy address is located 8 bytes inside of
[   19.660027]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.660189] 
[   19.660258] The buggy address belongs to the physical page:
[   19.660644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.660731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.661103] page_type: f5(slab)
[   19.661303] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.661378] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.661602] page dumped because: kasan: bad access detected
[   19.661824] 
[   19.661924] Memory state around the buggy address:
[   19.662058]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.662220]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.662295] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.662340]                                                           ^
[   19.662384]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.662859]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.662952] ==================================================================
[   19.675463] ==================================================================
[   19.675799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   19.675989] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.676064] 
[   19.676109] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.676199] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.676233] Hardware name: linux,dummy-virt (DT)
[   19.676268] Call trace:
[   19.676309]  show_stack+0x20/0x38 (C)
[   19.676367]  dump_stack_lvl+0x8c/0xd0
[   19.676419]  print_report+0x118/0x608
[   19.676470]  kasan_report+0xdc/0x128
[   19.676520]  __asan_report_load8_noabort+0x20/0x30
[   19.676575]  kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   19.676634]  kasan_bitops_generic+0x11c/0x1c8
[   19.676686]  kunit_try_run_case+0x170/0x3f0
[   19.676738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.676795]  kthread+0x328/0x630
[   19.676851]  ret_from_fork+0x10/0x20
[   19.676912] 
[   19.676942] Allocated by task 261:
[   19.676979]  kasan_save_stack+0x3c/0x68
[   19.677024]  kasan_save_track+0x20/0x40
[   19.677073]  kasan_save_alloc_info+0x40/0x58
[   19.677136]  __kasan_kmalloc+0xd4/0xd8
[   19.677177]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.677219]  kasan_bitops_generic+0xa0/0x1c8
[   19.677259]  kunit_try_run_case+0x170/0x3f0
[   19.677300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.677347]  kthread+0x328/0x630
[   19.677382]  ret_from_fork+0x10/0x20
[   19.677421] 
[   19.677452] The buggy address belongs to the object at fff00000c58cac60
[   19.677452]  which belongs to the cache kmalloc-16 of size 16
[   19.677512] The buggy address is located 8 bytes inside of
[   19.677512]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.677577] 
[   19.678421] The buggy address belongs to the physical page:
[   19.678517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.679034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.679108] page_type: f5(slab)
[   19.679465] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.679597] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.679799] page dumped because: kasan: bad access detected
[   19.679942] 
[   19.680129] Memory state around the buggy address:
[   19.680403]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.680612]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.680676] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.680727]                                                           ^
[   19.681066]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.681217]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.681329] ==================================================================
[   19.607182] ==================================================================
[   19.607238] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   19.607298] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.607351] 
[   19.607384] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.607474] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.607505] Hardware name: linux,dummy-virt (DT)
[   19.607549] Call trace:
[   19.607602]  show_stack+0x20/0x38 (C)
[   19.607664]  dump_stack_lvl+0x8c/0xd0
[   19.607717]  print_report+0x118/0x608
[   19.607766]  kasan_report+0xdc/0x128
[   19.607821]  kasan_check_range+0x100/0x1a8
[   19.607873]  __kasan_check_write+0x20/0x30
[   19.607921]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   19.607987]  kasan_bitops_generic+0x11c/0x1c8
[   19.608047]  kunit_try_run_case+0x170/0x3f0
[   19.608915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.608987]  kthread+0x328/0x630
[   19.609436]  ret_from_fork+0x10/0x20
[   19.609513] 
[   19.609605] Allocated by task 261:
[   19.609693]  kasan_save_stack+0x3c/0x68
[   19.609850]  kasan_save_track+0x20/0x40
[   19.609929]  kasan_save_alloc_info+0x40/0x58
[   19.609981]  __kasan_kmalloc+0xd4/0xd8
[   19.610022]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.610066]  kasan_bitops_generic+0xa0/0x1c8
[   19.610297]  kunit_try_run_case+0x170/0x3f0
[   19.610718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.610911]  kthread+0x328/0x630
[   19.611152]  ret_from_fork+0x10/0x20
[   19.611315] 
[   19.611422] The buggy address belongs to the object at fff00000c58cac60
[   19.611422]  which belongs to the cache kmalloc-16 of size 16
[   19.611613] The buggy address is located 8 bytes inside of
[   19.611613]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.611772] 
[   19.611830] The buggy address belongs to the physical page:
[   19.611943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.612361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.612503] page_type: f5(slab)
[   19.612707] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.612834] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.612889] page dumped because: kasan: bad access detected
[   19.613243] 
[   19.613288] Memory state around the buggy address:
[   19.613336]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.613540]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.613724] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.613850]                                                           ^
[   19.614041]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.614195]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.614311] ==================================================================
[   19.624580] ==================================================================
[   19.624695] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   19.624885] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.624989] 
[   19.625024] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.625294] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.625329] Hardware name: linux,dummy-virt (DT)
[   19.625374] Call trace:
[   19.625440]  show_stack+0x20/0x38 (C)
[   19.625675]  dump_stack_lvl+0x8c/0xd0
[   19.625795]  print_report+0x118/0x608
[   19.625894]  kasan_report+0xdc/0x128
[   19.626400]  kasan_check_range+0x100/0x1a8
[   19.626515]  __kasan_check_write+0x20/0x30
[   19.626709]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
[   19.626932]  kasan_bitops_generic+0x11c/0x1c8
[   19.627012]  kunit_try_run_case+0x170/0x3f0
[   19.627098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.627489]  kthread+0x328/0x630
[   19.627619]  ret_from_fork+0x10/0x20
[   19.627810] 
[   19.627889] Allocated by task 261:
[   19.628077]  kasan_save_stack+0x3c/0x68
[   19.628206]  kasan_save_track+0x20/0x40
[   19.628526]  kasan_save_alloc_info+0x40/0x58
[   19.628638]  __kasan_kmalloc+0xd4/0xd8
[   19.628792]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.628948]  kasan_bitops_generic+0xa0/0x1c8
[   19.629044]  kunit_try_run_case+0x170/0x3f0
[   19.629229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.629294]  kthread+0x328/0x630
[   19.629599]  ret_from_fork+0x10/0x20
[   19.629754] 
[   19.629966] The buggy address belongs to the object at fff00000c58cac60
[   19.629966]  which belongs to the cache kmalloc-16 of size 16
[   19.630110] The buggy address is located 8 bytes inside of
[   19.630110]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.630559] 
[   19.630607] The buggy address belongs to the physical page:
[   19.630660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.630850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.631310] page_type: f5(slab)
[   19.631561] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.631657] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.631705] page dumped because: kasan: bad access detected
[   19.631738] 
[   19.631759] Memory state around the buggy address:
[   19.631797]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.631843]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.631890] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.631932]                                                           ^
[   19.631974]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.632019]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.632115] ==================================================================
[   19.644208] ==================================================================
[   19.644312] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   19.644686] Write of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.644848] 
[   19.644893] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.645231] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.645282] Hardware name: linux,dummy-virt (DT)
[   19.645318] Call trace:
[   19.645429]  show_stack+0x20/0x38 (C)
[   19.645490]  dump_stack_lvl+0x8c/0xd0
[   19.645544]  print_report+0x118/0x608
[   19.645820]  kasan_report+0xdc/0x128
[   19.645992]  kasan_check_range+0x100/0x1a8
[   19.646053]  __kasan_check_write+0x20/0x30
[   19.646233]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   19.646466]  kasan_bitops_generic+0x11c/0x1c8
[   19.646639]  kunit_try_run_case+0x170/0x3f0
[   19.647051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.647146]  kthread+0x328/0x630
[   19.647194]  ret_from_fork+0x10/0x20
[   19.647764] 
[   19.647933] Allocated by task 261:
[   19.648182]  kasan_save_stack+0x3c/0x68
[   19.648332]  kasan_save_track+0x20/0x40
[   19.648401]  kasan_save_alloc_info+0x40/0x58
[   19.648584]  __kasan_kmalloc+0xd4/0xd8
[   19.648836]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.649099]  kasan_bitops_generic+0xa0/0x1c8
[   19.649315]  kunit_try_run_case+0x170/0x3f0
[   19.649471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.649523]  kthread+0x328/0x630
[   19.649883]  ret_from_fork+0x10/0x20
[   19.650110] 
[   19.650138] The buggy address belongs to the object at fff00000c58cac60
[   19.650138]  which belongs to the cache kmalloc-16 of size 16
[   19.650301] The buggy address is located 8 bytes inside of
[   19.650301]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.650468] 
[   19.650530] The buggy address belongs to the physical page:
[   19.650883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.650984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.651167] page_type: f5(slab)
[   19.651217] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.651280] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.651618] page dumped because: kasan: bad access detected
[   19.651775] 
[   19.651982] Memory state around the buggy address:
[   19.652047]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.652166]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.652520] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.652653]                                                           ^
[   19.652728]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.652793]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.653061] ==================================================================
[   19.682584] ==================================================================
[   19.682637] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   19.682691] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.682745] 
[   19.683045] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.683226] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.683262] Hardware name: linux,dummy-virt (DT)
[   19.683577] Call trace:
[   19.683645]  show_stack+0x20/0x38 (C)
[   19.684063]  dump_stack_lvl+0x8c/0xd0
[   19.684278]  print_report+0x118/0x608
[   19.684471]  kasan_report+0xdc/0x128
[   19.684660]  __asan_report_load8_noabort+0x20/0x30
[   19.684730]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0
[   19.685053]  kasan_bitops_generic+0x11c/0x1c8
[   19.685228]  kunit_try_run_case+0x170/0x3f0
[   19.685291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.685350]  kthread+0x328/0x630
[   19.685396]  ret_from_fork+0x10/0x20
[   19.685671] 
[   19.685836] Allocated by task 261:
[   19.685908]  kasan_save_stack+0x3c/0x68
[   19.686211]  kasan_save_track+0x20/0x40
[   19.686353]  kasan_save_alloc_info+0x40/0x58
[   19.686450]  __kasan_kmalloc+0xd4/0xd8
[   19.686705]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.686962]  kasan_bitops_generic+0xa0/0x1c8
[   19.687127]  kunit_try_run_case+0x170/0x3f0
[   19.687244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.687453]  kthread+0x328/0x630
[   19.687653]  ret_from_fork+0x10/0x20
[   19.687730] 
[   19.687903] The buggy address belongs to the object at fff00000c58cac60
[   19.687903]  which belongs to the cache kmalloc-16 of size 16
[   19.688133] The buggy address is located 8 bytes inside of
[   19.688133]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.688495] 
[   19.688569] The buggy address belongs to the physical page:
[   19.688682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.688752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.688856] page_type: f5(slab)
[   19.689219] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.689411] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.689488] page dumped because: kasan: bad access detected
[   19.689652] 
[   19.689811] Memory state around the buggy address:
[   19.690029]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.690214]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.690352] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.690485]                                                           ^
[   19.690556]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.690657]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.690914] ==================================================================
[   19.615490] ==================================================================
[   19.615737] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   19.615801] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.615855] 
[   19.615889] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.616355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.616727] Hardware name: linux,dummy-virt (DT)
[   19.616779] Call trace:
[   19.616842]  show_stack+0x20/0x38 (C)
[   19.616980]  dump_stack_lvl+0x8c/0xd0
[   19.617134]  print_report+0x118/0x608
[   19.617403]  kasan_report+0xdc/0x128
[   19.617660]  __asan_report_load8_noabort+0x20/0x30
[   19.618213]  kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   19.618777]  kasan_bitops_generic+0x11c/0x1c8
[   19.619038]  kunit_try_run_case+0x170/0x3f0
[   19.619258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.619320]  kthread+0x328/0x630
[   19.619563]  ret_from_fork+0x10/0x20
[   19.619826] 
[   19.619927] Allocated by task 261:
[   19.620081]  kasan_save_stack+0x3c/0x68
[   19.620483]  kasan_save_track+0x20/0x40
[   19.620610]  kasan_save_alloc_info+0x40/0x58
[   19.620706]  __kasan_kmalloc+0xd4/0xd8
[   19.620975]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.621255]  kasan_bitops_generic+0xa0/0x1c8
[   19.621455]  kunit_try_run_case+0x170/0x3f0
[   19.621615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.621733]  kthread+0x328/0x630
[   19.621818]  ret_from_fork+0x10/0x20
[   19.621911] 
[   19.621935] The buggy address belongs to the object at fff00000c58cac60
[   19.621935]  which belongs to the cache kmalloc-16 of size 16
[   19.621999] The buggy address is located 8 bytes inside of
[   19.621999]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.622067] 
[   19.622098] The buggy address belongs to the physical page:
[   19.622155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.622212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.622281] page_type: f5(slab)
[   19.622330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.622384] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.622438] page dumped because: kasan: bad access detected
[   19.622481] 
[   19.622501] Memory state around the buggy address:
[   19.622535]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.622597]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.622643] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.622684]                                                           ^
[   19.622726]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.622770]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.622819] ==================================================================
[   19.633620] ==================================================================
[   19.633824] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   19.634143] Read of size 8 at addr fff00000c58cac68 by task kunit_try_catch/261
[   19.634304] 
[   19.634389] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   19.634743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.634782] Hardware name: linux,dummy-virt (DT)
[   19.634968] Call trace:
[   19.635110]  show_stack+0x20/0x38 (C)
[   19.635259]  dump_stack_lvl+0x8c/0xd0
[   19.635371]  print_report+0x118/0x608
[   19.635726]  kasan_report+0xdc/0x128
[   19.635876]  __asan_report_load8_noabort+0x20/0x30
[   19.636550]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   19.636649]  kasan_bitops_generic+0x11c/0x1c8
[   19.636796]  kunit_try_run_case+0x170/0x3f0
[   19.637038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.637310]  kthread+0x328/0x630
[   19.637423]  ret_from_fork+0x10/0x20
[   19.637745] 
[   19.637996] Allocated by task 261:
[   19.638045]  kasan_save_stack+0x3c/0x68
[   19.638111]  kasan_save_track+0x20/0x40
[   19.638492]  kasan_save_alloc_info+0x40/0x58
[   19.638629]  __kasan_kmalloc+0xd4/0xd8
[   19.638684]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.638877]  kasan_bitops_generic+0xa0/0x1c8
[   19.639122]  kunit_try_run_case+0x170/0x3f0
[   19.639181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.639514]  kthread+0x328/0x630
[   19.639620]  ret_from_fork+0x10/0x20
[   19.639818] 
[   19.639858] The buggy address belongs to the object at fff00000c58cac60
[   19.639858]  which belongs to the cache kmalloc-16 of size 16
[   19.640155] The buggy address is located 8 bytes inside of
[   19.640155]  allocated 9-byte region [fff00000c58cac60, fff00000c58cac69)
[   19.640238] 
[   19.640589] The buggy address belongs to the physical page:
[   19.640637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ca
[   19.640699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.640914] page_type: f5(slab)
[   19.641305] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.641742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.641903] page dumped because: kasan: bad access detected
[   19.641941] 
[   19.641961] Memory state around the buggy address:
[   19.642126]  fff00000c58cab00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   19.642339]  fff00000c58cab80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.642388] >fff00000c58cac00: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc
[   19.642466]                                                           ^
[   19.642520]  fff00000c58cac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.642566]  fff00000c58cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.642606] ==================================================================

[   14.982383] ==================================================================
[   14.982709] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.983487] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   14.984124] 
[   14.984375] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.984425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.984438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.984459] Call Trace:
[   14.984473]  <TASK>
[   14.984526]  dump_stack_lvl+0x73/0xb0
[   14.984559]  print_report+0xd1/0x650
[   14.984581]  ? __virt_addr_valid+0x1db/0x2d0
[   14.984616]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.984644]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.984667]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.984696]  kasan_report+0x141/0x180
[   14.984719]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.984752]  kasan_check_range+0x10c/0x1c0
[   14.984785]  __kasan_check_write+0x18/0x20
[   14.984805]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.984833]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.984863]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.984887]  ? trace_hardirqs_on+0x37/0xe0
[   14.984910]  ? kasan_bitops_generic+0x92/0x1c0
[   14.984937]  kasan_bitops_generic+0x121/0x1c0
[   14.984962]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.984987]  ? __pfx_read_tsc+0x10/0x10
[   14.985007]  ? ktime_get_ts64+0x86/0x230
[   14.985032]  kunit_try_run_case+0x1a5/0x480
[   14.985055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.985078]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.985101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.985125]  ? __kthread_parkme+0x82/0x180
[   14.985145]  ? preempt_count_sub+0x50/0x80
[   14.985169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.985193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.985217]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.985241]  kthread+0x337/0x6f0
[   14.985261]  ? trace_preempt_on+0x20/0xc0
[   14.985283]  ? __pfx_kthread+0x10/0x10
[   14.985302]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.985324]  ? calculate_sigpending+0x7b/0xa0
[   14.985348]  ? __pfx_kthread+0x10/0x10
[   14.985369]  ret_from_fork+0x116/0x1d0
[   14.985387]  ? __pfx_kthread+0x10/0x10
[   14.985406]  ret_from_fork_asm+0x1a/0x30
[   14.985437]  </TASK>
[   14.985446] 
[   14.996760] Allocated by task 278:
[   14.996915]  kasan_save_stack+0x45/0x70
[   14.997137]  kasan_save_track+0x18/0x40
[   14.997342]  kasan_save_alloc_info+0x3b/0x50
[   14.997559]  __kasan_kmalloc+0xb7/0xc0
[   14.997733]  __kmalloc_cache_noprof+0x189/0x420
[   14.998024]  kasan_bitops_generic+0x92/0x1c0
[   14.998174]  kunit_try_run_case+0x1a5/0x480
[   14.998372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.998643]  kthread+0x337/0x6f0
[   14.999249]  ret_from_fork+0x116/0x1d0
[   14.999398]  ret_from_fork_asm+0x1a/0x30
[   14.999540] 
[   14.999624] The buggy address belongs to the object at ffff888102434620
[   14.999624]  which belongs to the cache kmalloc-16 of size 16
[   15.000072] The buggy address is located 8 bytes inside of
[   15.000072]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   15.002068] 
[   15.002154] The buggy address belongs to the physical page:
[   15.002333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   15.002580] flags: 0x200000000000000(node=0|zone=2)
[   15.003933] page_type: f5(slab)
[   15.004523] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.005188] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.006149] page dumped because: kasan: bad access detected
[   15.006372] 
[   15.006445] Memory state around the buggy address:
[   15.006614]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   15.006844]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.007062] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.007274]                                   ^
[   15.007422]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.008335]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.009087] ==================================================================
[   14.929035] ==================================================================
[   14.929380] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.929949] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   14.930229] 
[   14.930312] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.930354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.930366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.930386] Call Trace:
[   14.930403]  <TASK>
[   14.930418]  dump_stack_lvl+0x73/0xb0
[   14.930444]  print_report+0xd1/0x650
[   14.930465]  ? __virt_addr_valid+0x1db/0x2d0
[   14.930486]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.930537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.930561]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.930590]  kasan_report+0x141/0x180
[   14.930620]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.930657]  kasan_check_range+0x10c/0x1c0
[   14.930679]  __kasan_check_write+0x18/0x20
[   14.930699]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.930728]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.930757]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.930814]  ? trace_hardirqs_on+0x37/0xe0
[   14.930843]  ? kasan_bitops_generic+0x92/0x1c0
[   14.930870]  kasan_bitops_generic+0x121/0x1c0
[   14.930894]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.930919]  ? __pfx_read_tsc+0x10/0x10
[   14.930941]  ? ktime_get_ts64+0x86/0x230
[   14.930965]  kunit_try_run_case+0x1a5/0x480
[   14.930989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.931011]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.931035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.931059]  ? __kthread_parkme+0x82/0x180
[   14.931078]  ? preempt_count_sub+0x50/0x80
[   14.931104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.931130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.931163]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.931189]  kthread+0x337/0x6f0
[   14.931208]  ? trace_preempt_on+0x20/0xc0
[   14.931229]  ? __pfx_kthread+0x10/0x10
[   14.931249]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.931270]  ? calculate_sigpending+0x7b/0xa0
[   14.931295]  ? __pfx_kthread+0x10/0x10
[   14.931316]  ret_from_fork+0x116/0x1d0
[   14.931333]  ? __pfx_kthread+0x10/0x10
[   14.931354]  ret_from_fork_asm+0x1a/0x30
[   14.931384]  </TASK>
[   14.931394] 
[   14.943539] Allocated by task 278:
[   14.944310]  kasan_save_stack+0x45/0x70
[   14.944644]  kasan_save_track+0x18/0x40
[   14.945106]  kasan_save_alloc_info+0x3b/0x50
[   14.945480]  __kasan_kmalloc+0xb7/0xc0
[   14.945680]  __kmalloc_cache_noprof+0x189/0x420
[   14.946322]  kasan_bitops_generic+0x92/0x1c0
[   14.946727]  kunit_try_run_case+0x1a5/0x480
[   14.947190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.947674]  kthread+0x337/0x6f0
[   14.948113]  ret_from_fork+0x116/0x1d0
[   14.948359]  ret_from_fork_asm+0x1a/0x30
[   14.948673] 
[   14.948911] The buggy address belongs to the object at ffff888102434620
[   14.948911]  which belongs to the cache kmalloc-16 of size 16
[   14.949590] The buggy address is located 8 bytes inside of
[   14.949590]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   14.950629] 
[   14.950734] The buggy address belongs to the physical page:
[   14.951272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   14.951754] flags: 0x200000000000000(node=0|zone=2)
[   14.952190] page_type: f5(slab)
[   14.952364] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.952684] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.953300] page dumped because: kasan: bad access detected
[   14.953790] 
[   14.953873] Memory state around the buggy address:
[   14.954266]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   14.954565]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.954841] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.955124]                                   ^
[   14.955333]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.955682]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.955979] ==================================================================
[   15.115095] ==================================================================
[   15.115388] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.115792] Read of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   15.116176] 
[   15.116293] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.116337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.116348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.116369] Call Trace:
[   15.116387]  <TASK>
[   15.116405]  dump_stack_lvl+0x73/0xb0
[   15.116432]  print_report+0xd1/0x650
[   15.116453]  ? __virt_addr_valid+0x1db/0x2d0
[   15.116476]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.116505]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.116528]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.116557]  kasan_report+0x141/0x180
[   15.116578]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.116625]  __asan_report_load8_noabort+0x18/0x20
[   15.116671]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   15.116715]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.116745]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.116770]  ? trace_hardirqs_on+0x37/0xe0
[   15.116819]  ? kasan_bitops_generic+0x92/0x1c0
[   15.116860]  kasan_bitops_generic+0x121/0x1c0
[   15.116896]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.116935]  ? __pfx_read_tsc+0x10/0x10
[   15.116970]  ? ktime_get_ts64+0x86/0x230
[   15.117008]  kunit_try_run_case+0x1a5/0x480
[   15.117044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.117080]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.117131]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.117168]  ? __kthread_parkme+0x82/0x180
[   15.117202]  ? preempt_count_sub+0x50/0x80
[   15.117253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.117290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.117341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.117379]  kthread+0x337/0x6f0
[   15.117411]  ? trace_preempt_on+0x20/0xc0
[   15.117459]  ? __pfx_kthread+0x10/0x10
[   15.117492]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.117514]  ? calculate_sigpending+0x7b/0xa0
[   15.117552]  ? __pfx_kthread+0x10/0x10
[   15.117587]  ret_from_fork+0x116/0x1d0
[   15.117615]  ? __pfx_kthread+0x10/0x10
[   15.117636]  ret_from_fork_asm+0x1a/0x30
[   15.117667]  </TASK>
[   15.117678] 
[   15.126324] Allocated by task 278:
[   15.126519]  kasan_save_stack+0x45/0x70
[   15.126754]  kasan_save_track+0x18/0x40
[   15.126960]  kasan_save_alloc_info+0x3b/0x50
[   15.127174]  __kasan_kmalloc+0xb7/0xc0
[   15.127372]  __kmalloc_cache_noprof+0x189/0x420
[   15.127572]  kasan_bitops_generic+0x92/0x1c0
[   15.127732]  kunit_try_run_case+0x1a5/0x480
[   15.127988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.128425]  kthread+0x337/0x6f0
[   15.128584]  ret_from_fork+0x116/0x1d0
[   15.128745]  ret_from_fork_asm+0x1a/0x30
[   15.128894] 
[   15.128994] The buggy address belongs to the object at ffff888102434620
[   15.128994]  which belongs to the cache kmalloc-16 of size 16
[   15.129558] The buggy address is located 8 bytes inside of
[   15.129558]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   15.130141] 
[   15.130238] The buggy address belongs to the physical page:
[   15.130482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   15.130734] flags: 0x200000000000000(node=0|zone=2)
[   15.130901] page_type: f5(slab)
[   15.131083] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.131473] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.131850] page dumped because: kasan: bad access detected
[   15.132156] 
[   15.132247] Memory state around the buggy address:
[   15.132401]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   15.132721]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.133080] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.133379]                                   ^
[   15.133582]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.133846]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.134184] ==================================================================
[   15.010300] ==================================================================
[   15.010751] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.011170] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   15.011919] 
[   15.012101] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.012147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.012159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.012180] Call Trace:
[   15.012199]  <TASK>
[   15.012217]  dump_stack_lvl+0x73/0xb0
[   15.012247]  print_report+0xd1/0x650
[   15.012270]  ? __virt_addr_valid+0x1db/0x2d0
[   15.012295]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.012323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.012346]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.012387]  kasan_report+0x141/0x180
[   15.012407]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.012441]  kasan_check_range+0x10c/0x1c0
[   15.012464]  __kasan_check_write+0x18/0x20
[   15.012483]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   15.012512]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.012543]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.012569]  ? trace_hardirqs_on+0x37/0xe0
[   15.012604]  ? kasan_bitops_generic+0x92/0x1c0
[   15.012639]  kasan_bitops_generic+0x121/0x1c0
[   15.012662]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.012688]  ? __pfx_read_tsc+0x10/0x10
[   15.012709]  ? ktime_get_ts64+0x86/0x230
[   15.012734]  kunit_try_run_case+0x1a5/0x480
[   15.012757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.012791]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.012815]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.012838]  ? __kthread_parkme+0x82/0x180
[   15.012859]  ? preempt_count_sub+0x50/0x80
[   15.012884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.012908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.012933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.012958]  kthread+0x337/0x6f0
[   15.012976]  ? trace_preempt_on+0x20/0xc0
[   15.012998]  ? __pfx_kthread+0x10/0x10
[   15.013018]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.013039]  ? calculate_sigpending+0x7b/0xa0
[   15.013064]  ? __pfx_kthread+0x10/0x10
[   15.013085]  ret_from_fork+0x116/0x1d0
[   15.013103]  ? __pfx_kthread+0x10/0x10
[   15.013123]  ret_from_fork_asm+0x1a/0x30
[   15.013154]  </TASK>
[   15.013164] 
[   15.027436] Allocated by task 278:
[   15.027764]  kasan_save_stack+0x45/0x70
[   15.028176]  kasan_save_track+0x18/0x40
[   15.028533]  kasan_save_alloc_info+0x3b/0x50
[   15.028957]  __kasan_kmalloc+0xb7/0xc0
[   15.029356]  __kmalloc_cache_noprof+0x189/0x420
[   15.029765]  kasan_bitops_generic+0x92/0x1c0
[   15.030148]  kunit_try_run_case+0x1a5/0x480
[   15.030522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.031038]  kthread+0x337/0x6f0
[   15.031352]  ret_from_fork+0x116/0x1d0
[   15.031530]  ret_from_fork_asm+0x1a/0x30
[   15.031686] 
[   15.031759] The buggy address belongs to the object at ffff888102434620
[   15.031759]  which belongs to the cache kmalloc-16 of size 16
[   15.032119] The buggy address is located 8 bytes inside of
[   15.032119]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   15.032472] 
[   15.032543] The buggy address belongs to the physical page:
[   15.032744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   15.033126] flags: 0x200000000000000(node=0|zone=2)
[   15.033292] page_type: f5(slab)
[   15.033411] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.033789] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.034079] page dumped because: kasan: bad access detected
[   15.034285] 
[   15.034379] Memory state around the buggy address:
[   15.034618]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   15.035141]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.035419] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.035679]                                   ^
[   15.036033]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.036312]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.036566] ==================================================================
[   15.037181] ==================================================================
[   15.037869] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.038240] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   15.038524] 
[   15.038621] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.038664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.038676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.038697] Call Trace:
[   15.038712]  <TASK>
[   15.038730]  dump_stack_lvl+0x73/0xb0
[   15.038757]  print_report+0xd1/0x650
[   15.038778]  ? __virt_addr_valid+0x1db/0x2d0
[   15.038811]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.038843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.038866]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.038894]  kasan_report+0x141/0x180
[   15.038916]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.038949]  kasan_check_range+0x10c/0x1c0
[   15.038973]  __kasan_check_write+0x18/0x20
[   15.038993]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   15.039022]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.039051]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.039075]  ? trace_hardirqs_on+0x37/0xe0
[   15.039097]  ? kasan_bitops_generic+0x92/0x1c0
[   15.039124]  kasan_bitops_generic+0x121/0x1c0
[   15.039148]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.039174]  ? __pfx_read_tsc+0x10/0x10
[   15.039194]  ? ktime_get_ts64+0x86/0x230
[   15.039218]  kunit_try_run_case+0x1a5/0x480
[   15.039241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.039264]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.039288]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.039312]  ? __kthread_parkme+0x82/0x180
[   15.039332]  ? preempt_count_sub+0x50/0x80
[   15.039356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.039380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.039404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.039429]  kthread+0x337/0x6f0
[   15.039447]  ? trace_preempt_on+0x20/0xc0
[   15.039469]  ? __pfx_kthread+0x10/0x10
[   15.039489]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.039510]  ? calculate_sigpending+0x7b/0xa0
[   15.039534]  ? __pfx_kthread+0x10/0x10
[   15.039556]  ret_from_fork+0x116/0x1d0
[   15.039574]  ? __pfx_kthread+0x10/0x10
[   15.039604]  ret_from_fork_asm+0x1a/0x30
[   15.039634]  </TASK>
[   15.039643] 
[   15.047547] Allocated by task 278:
[   15.047689]  kasan_save_stack+0x45/0x70
[   15.047972]  kasan_save_track+0x18/0x40
[   15.048170]  kasan_save_alloc_info+0x3b/0x50
[   15.048388]  __kasan_kmalloc+0xb7/0xc0
[   15.048576]  __kmalloc_cache_noprof+0x189/0x420
[   15.048834]  kasan_bitops_generic+0x92/0x1c0
[   15.049021]  kunit_try_run_case+0x1a5/0x480
[   15.049191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.049367]  kthread+0x337/0x6f0
[   15.049487]  ret_from_fork+0x116/0x1d0
[   15.049629]  ret_from_fork_asm+0x1a/0x30
[   15.049822] 
[   15.049913] The buggy address belongs to the object at ffff888102434620
[   15.049913]  which belongs to the cache kmalloc-16 of size 16
[   15.050440] The buggy address is located 8 bytes inside of
[   15.050440]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   15.051091] 
[   15.051163] The buggy address belongs to the physical page:
[   15.051334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   15.051572] flags: 0x200000000000000(node=0|zone=2)
[   15.051852] page_type: f5(slab)
[   15.052024] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.052365] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.052716] page dumped because: kasan: bad access detected
[   15.053138] 
[   15.053209] Memory state around the buggy address:
[   15.053409]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   15.053679]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.054107] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.054320]                                   ^
[   15.054519]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.054873]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.055214] ==================================================================
[   15.074609] ==================================================================
[   15.075017] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.075423] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   15.075751] 
[   15.075929] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.075994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.076019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.076052] Call Trace:
[   15.076068]  <TASK>
[   15.076098]  dump_stack_lvl+0x73/0xb0
[   15.076151]  print_report+0xd1/0x650
[   15.076186]  ? __virt_addr_valid+0x1db/0x2d0
[   15.076223]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.076252]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.076302]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.076344]  kasan_report+0x141/0x180
[   15.076366]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.076399]  kasan_check_range+0x10c/0x1c0
[   15.076424]  __kasan_check_write+0x18/0x20
[   15.076443]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   15.076472]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.076503]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.076527]  ? trace_hardirqs_on+0x37/0xe0
[   15.076551]  ? kasan_bitops_generic+0x92/0x1c0
[   15.076577]  kasan_bitops_generic+0x121/0x1c0
[   15.076611]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.076637]  ? __pfx_read_tsc+0x10/0x10
[   15.076657]  ? ktime_get_ts64+0x86/0x230
[   15.076681]  kunit_try_run_case+0x1a5/0x480
[   15.076704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.076727]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.076751]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.076774]  ? __kthread_parkme+0x82/0x180
[   15.076794]  ? preempt_count_sub+0x50/0x80
[   15.076819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.076843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.076866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.076891]  kthread+0x337/0x6f0
[   15.076910]  ? trace_preempt_on+0x20/0xc0
[   15.076932]  ? __pfx_kthread+0x10/0x10
[   15.076951]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.076973]  ? calculate_sigpending+0x7b/0xa0
[   15.076997]  ? __pfx_kthread+0x10/0x10
[   15.077018]  ret_from_fork+0x116/0x1d0
[   15.077035]  ? __pfx_kthread+0x10/0x10
[   15.077056]  ret_from_fork_asm+0x1a/0x30
[   15.077087]  </TASK>
[   15.077097] 
[   15.086352] Allocated by task 278:
[   15.086551]  kasan_save_stack+0x45/0x70
[   15.086754]  kasan_save_track+0x18/0x40
[   15.086954]  kasan_save_alloc_info+0x3b/0x50
[   15.087192]  __kasan_kmalloc+0xb7/0xc0
[   15.087377]  __kmalloc_cache_noprof+0x189/0x420
[   15.087575]  kasan_bitops_generic+0x92/0x1c0
[   15.087738]  kunit_try_run_case+0x1a5/0x480
[   15.088170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.088434]  kthread+0x337/0x6f0
[   15.088630]  ret_from_fork+0x116/0x1d0
[   15.088827]  ret_from_fork_asm+0x1a/0x30
[   15.088998] 
[   15.089080] The buggy address belongs to the object at ffff888102434620
[   15.089080]  which belongs to the cache kmalloc-16 of size 16
[   15.089620] The buggy address is located 8 bytes inside of
[   15.089620]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   15.090178] 
[   15.090302] The buggy address belongs to the physical page:
[   15.090586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   15.090949] flags: 0x200000000000000(node=0|zone=2)
[   15.091188] page_type: f5(slab)
[   15.091486] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.091838] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.092185] page dumped because: kasan: bad access detected
[   15.092364] 
[   15.092433] Memory state around the buggy address:
[   15.092588]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   15.092948]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.093290] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.093621]                                   ^
[   15.093920]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.094268]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.094546] ==================================================================
[   14.956522] ==================================================================
[   14.956874] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.957275] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   14.957584] 
[   14.957683] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.957727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.957738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.957758] Call Trace:
[   14.957775]  <TASK>
[   14.957793]  dump_stack_lvl+0x73/0xb0
[   14.957821]  print_report+0xd1/0x650
[   14.957844]  ? __virt_addr_valid+0x1db/0x2d0
[   14.957867]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.957895]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.957919]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.957948]  kasan_report+0x141/0x180
[   14.957969]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.958002]  kasan_check_range+0x10c/0x1c0
[   14.958025]  __kasan_check_write+0x18/0x20
[   14.958044]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.958072]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.958102]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.958127]  ? trace_hardirqs_on+0x37/0xe0
[   14.958150]  ? kasan_bitops_generic+0x92/0x1c0
[   14.958177]  kasan_bitops_generic+0x121/0x1c0
[   14.958201]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.958226]  ? __pfx_read_tsc+0x10/0x10
[   14.958247]  ? ktime_get_ts64+0x86/0x230
[   14.958271]  kunit_try_run_case+0x1a5/0x480
[   14.958295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.958317]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.958341]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.958364]  ? __kthread_parkme+0x82/0x180
[   14.958385]  ? preempt_count_sub+0x50/0x80
[   14.958409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.958433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.958458]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.958484]  kthread+0x337/0x6f0
[   14.958503]  ? trace_preempt_on+0x20/0xc0
[   14.958524]  ? __pfx_kthread+0x10/0x10
[   14.958545]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.958567]  ? calculate_sigpending+0x7b/0xa0
[   14.958591]  ? __pfx_kthread+0x10/0x10
[   14.958623]  ret_from_fork+0x116/0x1d0
[   14.958642]  ? __pfx_kthread+0x10/0x10
[   14.958662]  ret_from_fork_asm+0x1a/0x30
[   14.958693]  </TASK>
[   14.958703] 
[   14.969028] Allocated by task 278:
[   14.969166]  kasan_save_stack+0x45/0x70
[   14.969657]  kasan_save_track+0x18/0x40
[   14.970064]  kasan_save_alloc_info+0x3b/0x50
[   14.970413]  __kasan_kmalloc+0xb7/0xc0
[   14.970757]  __kmalloc_cache_noprof+0x189/0x420
[   14.971048]  kasan_bitops_generic+0x92/0x1c0
[   14.971541]  kunit_try_run_case+0x1a5/0x480
[   14.971881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.972317]  kthread+0x337/0x6f0
[   14.972717]  ret_from_fork+0x116/0x1d0
[   14.972995]  ret_from_fork_asm+0x1a/0x30
[   14.973181] 
[   14.973270] The buggy address belongs to the object at ffff888102434620
[   14.973270]  which belongs to the cache kmalloc-16 of size 16
[   14.973762] The buggy address is located 8 bytes inside of
[   14.973762]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   14.974646] 
[   14.974878] The buggy address belongs to the physical page:
[   14.975328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   14.976319] flags: 0x200000000000000(node=0|zone=2)
[   14.976557] page_type: f5(slab)
[   14.976725] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.977287] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.977741] page dumped because: kasan: bad access detected
[   14.978164] 
[   14.978266] Memory state around the buggy address:
[   14.978471]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   14.979018]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.979459] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.980036]                                   ^
[   14.980234]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.980529]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.981145] ==================================================================
[   15.055648] ==================================================================
[   15.056202] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.056673] Write of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   15.056898] 
[   15.056977] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.057018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.057030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.057051] Call Trace:
[   15.057064]  <TASK>
[   15.057078]  dump_stack_lvl+0x73/0xb0
[   15.057104]  print_report+0xd1/0x650
[   15.057125]  ? __virt_addr_valid+0x1db/0x2d0
[   15.057147]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.057176]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.057201]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.057229]  kasan_report+0x141/0x180
[   15.057250]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.057283]  kasan_check_range+0x10c/0x1c0
[   15.057306]  __kasan_check_write+0x18/0x20
[   15.057326]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   15.057355]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.057385]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.057409]  ? trace_hardirqs_on+0x37/0xe0
[   15.057432]  ? kasan_bitops_generic+0x92/0x1c0
[   15.057459]  kasan_bitops_generic+0x121/0x1c0
[   15.057483]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.057508]  ? __pfx_read_tsc+0x10/0x10
[   15.057543]  ? ktime_get_ts64+0x86/0x230
[   15.057569]  kunit_try_run_case+0x1a5/0x480
[   15.057603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.057625]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.057649]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.057673]  ? __kthread_parkme+0x82/0x180
[   15.057692]  ? preempt_count_sub+0x50/0x80
[   15.057716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.057740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.057764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.057789]  kthread+0x337/0x6f0
[   15.057809]  ? trace_preempt_on+0x20/0xc0
[   15.057830]  ? __pfx_kthread+0x10/0x10
[   15.057850]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.057871]  ? calculate_sigpending+0x7b/0xa0
[   15.057896]  ? __pfx_kthread+0x10/0x10
[   15.057916]  ret_from_fork+0x116/0x1d0
[   15.057934]  ? __pfx_kthread+0x10/0x10
[   15.057954]  ret_from_fork_asm+0x1a/0x30
[   15.057984]  </TASK>
[   15.057996] 
[   15.065980] Allocated by task 278:
[   15.066164]  kasan_save_stack+0x45/0x70
[   15.066343]  kasan_save_track+0x18/0x40
[   15.066475]  kasan_save_alloc_info+0x3b/0x50
[   15.066629]  __kasan_kmalloc+0xb7/0xc0
[   15.066759]  __kmalloc_cache_noprof+0x189/0x420
[   15.066918]  kasan_bitops_generic+0x92/0x1c0
[   15.067062]  kunit_try_run_case+0x1a5/0x480
[   15.067252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.067521]  kthread+0x337/0x6f0
[   15.067710]  ret_from_fork+0x116/0x1d0
[   15.067925]  ret_from_fork_asm+0x1a/0x30
[   15.068134] 
[   15.068244] The buggy address belongs to the object at ffff888102434620
[   15.068244]  which belongs to the cache kmalloc-16 of size 16
[   15.069031] The buggy address is located 8 bytes inside of
[   15.069031]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   15.069658] 
[   15.069758] The buggy address belongs to the physical page:
[   15.070019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   15.070370] flags: 0x200000000000000(node=0|zone=2)
[   15.070617] page_type: f5(slab)
[   15.070797] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.071103] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.071332] page dumped because: kasan: bad access detected
[   15.071503] 
[   15.071571] Memory state around the buggy address:
[   15.071736]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   15.072007]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.072350] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.072835]                                   ^
[   15.073072]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.073419]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.073896] ==================================================================
[   15.095117] ==================================================================
[   15.095457] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.095882] Read of size 8 at addr ffff888102434628 by task kunit_try_catch/278
[   15.096202] 
[   15.096307] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.096366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.096377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.096396] Call Trace:
[   15.096411]  <TASK>
[   15.096426]  dump_stack_lvl+0x73/0xb0
[   15.096453]  print_report+0xd1/0x650
[   15.096474]  ? __virt_addr_valid+0x1db/0x2d0
[   15.096515]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.096544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.096567]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.096607]  kasan_report+0x141/0x180
[   15.096628]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.096661]  kasan_check_range+0x10c/0x1c0
[   15.096684]  __kasan_check_read+0x15/0x20
[   15.096703]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   15.096732]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.096762]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.096794]  ? trace_hardirqs_on+0x37/0xe0
[   15.096816]  ? kasan_bitops_generic+0x92/0x1c0
[   15.096861]  kasan_bitops_generic+0x121/0x1c0
[   15.096885]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.096910]  ? __pfx_read_tsc+0x10/0x10
[   15.096932]  ? ktime_get_ts64+0x86/0x230
[   15.096956]  kunit_try_run_case+0x1a5/0x480
[   15.096980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.097003]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.097043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.097068]  ? __kthread_parkme+0x82/0x180
[   15.097087]  ? preempt_count_sub+0x50/0x80
[   15.097110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.097134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.097159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.097184]  kthread+0x337/0x6f0
[   15.097203]  ? trace_preempt_on+0x20/0xc0
[   15.097241]  ? __pfx_kthread+0x10/0x10
[   15.097262]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.097283]  ? calculate_sigpending+0x7b/0xa0
[   15.097324]  ? __pfx_kthread+0x10/0x10
[   15.097345]  ret_from_fork+0x116/0x1d0
[   15.097363]  ? __pfx_kthread+0x10/0x10
[   15.097384]  ret_from_fork_asm+0x1a/0x30
[   15.097414]  </TASK>
[   15.097424] 
[   15.106153] Allocated by task 278:
[   15.106327]  kasan_save_stack+0x45/0x70
[   15.106526]  kasan_save_track+0x18/0x40
[   15.106732]  kasan_save_alloc_info+0x3b/0x50
[   15.107007]  __kasan_kmalloc+0xb7/0xc0
[   15.107160]  __kmalloc_cache_noprof+0x189/0x420
[   15.107381]  kasan_bitops_generic+0x92/0x1c0
[   15.107604]  kunit_try_run_case+0x1a5/0x480
[   15.107826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.108142]  kthread+0x337/0x6f0
[   15.108358]  ret_from_fork+0x116/0x1d0
[   15.108574]  ret_from_fork_asm+0x1a/0x30
[   15.108762] 
[   15.108854] The buggy address belongs to the object at ffff888102434620
[   15.108854]  which belongs to the cache kmalloc-16 of size 16
[   15.109395] The buggy address is located 8 bytes inside of
[   15.109395]  allocated 9-byte region [ffff888102434620, ffff888102434629)
[   15.109874] 
[   15.109970] The buggy address belongs to the physical page:
[   15.110188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102434
[   15.110433] flags: 0x200000000000000(node=0|zone=2)
[   15.110608] page_type: f5(slab)
[   15.110728] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.111400] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.111783] page dumped because: kasan: bad access detected
[   15.112059] 
[   15.112174] Memory state around the buggy address:
[   15.112423]  ffff888102434500: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc
[   15.112718]  ffff888102434580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.113216] >ffff888102434600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   15.113538]                                   ^
[   15.113707]  ffff888102434680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.113932]  ffff888102434700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.114274] ==================================================================