Hay
Date
July 16, 2025, 3:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.884026] ==================================================================
[   18.884082] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   18.884136] Write of size 8 at addr fff00000c3eef5c8 by task kunit_try_catch/261
[   18.884190] 
[   18.884630] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.884842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.884878] Hardware name: linux,dummy-virt (DT)
[   18.884966] Call trace:
[   18.884993]  show_stack+0x20/0x38 (C)
[   18.885048]  dump_stack_lvl+0x8c/0xd0
[   18.885272]  print_report+0x118/0x5d0
[   18.885489]  kasan_report+0xdc/0x128
[   18.885580]  kasan_check_range+0x100/0x1a8
[   18.885640]  __kasan_check_write+0x20/0x30
[   18.885687]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   18.885760]  kasan_bitops_generic+0x110/0x1c8
[   18.885809]  kunit_try_run_case+0x170/0x3f0
[   18.885857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.885910]  kthread+0x328/0x630
[   18.885954]  ret_from_fork+0x10/0x20
[   18.886002] 
[   18.886023] Allocated by task 261:
[   18.886064]  kasan_save_stack+0x3c/0x68
[   18.886109]  kasan_save_track+0x20/0x40
[   18.886152]  kasan_save_alloc_info+0x40/0x58
[   18.886195]  __kasan_kmalloc+0xd4/0xd8
[   18.886232]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.886274]  kasan_bitops_generic+0xa0/0x1c8
[   18.886314]  kunit_try_run_case+0x170/0x3f0
[   18.886362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.886415]  kthread+0x328/0x630
[   18.886569] The buggy address is located 8 bytes inside of
[   18.886569]  allocated 9-byte region [fff00000c3eef5c0, fff00000c3eef5c9)
[   18.888145] 
[   18.888733]                                               ^
[   18.888793]  fff00000c3eef600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.890117] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   18.892005]  __asan_report_load8_noabort+0x20/0x30
[   18.893581]  kasan_save_stack+0x3c/0x68
[   18.894942]  ret_from_fork+0x10/0x20
[   18.895871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.896875] 
[   18.897585]                                               ^
[   18.897629]  fff00000c3eef600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.899633] Write of size 8 at addr fff00000c3eef5c8 by task kunit_try_catch/261
[   18.900194] Call trace:
[   18.901267]  kasan_report+0xdc/0x128
[   18.902037]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   18.902895]  kasan_save_stack+0x3c/0x68
[   18.903241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.903480] The buggy address is located 8 bytes inside of
[   18.903480]  allocated 9-byte region [fff00000c3eef5c0, fff00000c3eef5c9)
[   18.905333] >fff00000c3eef580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   18.905527]                                               ^
[   18.906868] ==================================================================
[   18.875343] ==================================================================
[   18.875775] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.875976] Read of size 8 at addr fff00000c3eef5c8 by task kunit_try_catch/261
[   18.876043] 
[   18.876079] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.876491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.876537] Hardware name: linux,dummy-virt (DT)
[   18.876589] Call trace:
[   18.876616]  show_stack+0x20/0x38 (C)
[   18.876804]  dump_stack_lvl+0x8c/0xd0
[   18.876981]  print_report+0x118/0x5d0
[   18.877379]  kasan_report+0xdc/0x128
[   18.877476]  __asan_report_load8_noabort+0x20/0x30
[   18.877623]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.877772]  kasan_bitops_generic+0x110/0x1c8
[   18.877877]  kunit_try_run_case+0x170/0x3f0
[   18.877933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.878114]  kthread+0x328/0x630
[   18.878401]  ret_from_fork+0x10/0x20
[   18.878518] 
[   18.878556] Allocated by task 261:
[   18.878624]  kasan_save_stack+0x3c/0x68
[   18.878670]  kasan_save_track+0x20/0x40
[   18.878884]  kasan_save_alloc_info+0x40/0x58
[   18.878936]  __kasan_kmalloc+0xd4/0xd8
[   18.879098]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.879151]  kasan_bitops_generic+0xa0/0x1c8
[   18.879291]  kunit_try_run_case+0x170/0x3f0
[   18.879448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.879635]  kthread+0x328/0x630
[   18.879675]  ret_from_fork+0x10/0x20
[   18.880038] 
[   18.880134] The buggy address belongs to the object at fff00000c3eef5c0
[   18.880134]  which belongs to the cache kmalloc-16 of size 16
[   18.880269] The buggy address is located 8 bytes inside of
[   18.880269]  allocated 9-byte region [fff00000c3eef5c0, fff00000c3eef5c9)
[   18.880446] 
[   18.880525] The buggy address belongs to the physical page:
[   18.880738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eef
[   18.881057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.881137] page_type: f5(slab)
[   18.881281] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.881481] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.881576] page dumped because: kasan: bad access detected
[   18.881637] 
[   18.881797] Memory state around the buggy address:
[   18.881989]  fff00000c3eef480: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   18.882067]  fff00000c3eef500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.882148] >fff00000c3eef580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   18.882191]                                               ^
[   18.882231]  fff00000c3eef600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.882278]  fff00000c3eef680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.882320] ==================================================================
[   18.862238] ==================================================================
[   18.862303] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.862361] Write of size 8 at addr fff00000c3eef5c8 by task kunit_try_catch/261
[   18.862414] 
[   18.862448] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.862534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.862562] Hardware name: linux,dummy-virt (DT)
[   18.862595] Call trace:
[   18.862622]  show_stack+0x20/0x38 (C)
[   18.862682]  dump_stack_lvl+0x8c/0xd0
[   18.863957]  print_report+0x118/0x5d0
[   18.864067]  kasan_report+0xdc/0x128
[   18.864178]  kasan_check_range+0x100/0x1a8
[   18.864388]  __kasan_check_write+0x20/0x30
[   18.864733]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.864850]  kasan_bitops_generic+0x110/0x1c8
[   18.864969]  kunit_try_run_case+0x170/0x3f0
[   18.865364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.865456]  kthread+0x328/0x630
[   18.865596]  ret_from_fork+0x10/0x20
[   18.865940] 
[   18.865981] Allocated by task 261:
[   18.866244]  kasan_save_stack+0x3c/0x68
[   18.866354]  kasan_save_track+0x20/0x40
[   18.866474]  kasan_save_alloc_info+0x40/0x58
[   18.866539]  __kasan_kmalloc+0xd4/0xd8
[   18.866928]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.866988]  kasan_bitops_generic+0xa0/0x1c8
[   18.867271]  kunit_try_run_case+0x170/0x3f0
[   18.867765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.867946]  kthread+0x328/0x630
[   18.868053]  ret_from_fork+0x10/0x20
[   18.868151] 
[   18.868174] The buggy address belongs to the object at fff00000c3eef5c0
[   18.868174]  which belongs to the cache kmalloc-16 of size 16
[   18.868357] The buggy address is located 8 bytes inside of
[   18.868357]  allocated 9-byte region [fff00000c3eef5c0, fff00000c3eef5c9)
[   18.868555] 
[   18.868607] The buggy address belongs to the physical page:
[   18.868775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eef
[   18.868975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.869086] page_type: f5(slab)
[   18.869254] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.869470] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.869692] page dumped because: kasan: bad access detected
[   18.869779] 
[   18.869874] Memory state around the buggy address:
[   18.869916]  fff00000c3eef480: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   18.870140]  fff00000c3eef500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.870282] >fff00000c3eef580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   18.870425]                                               ^
[   18.870508]  fff00000c3eef600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.870572]  fff00000c3eef680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.870770] ==================================================================

[   14.741116] ==================================================================
[   14.741392] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.742139] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278
[   14.742367] 
[   14.742502] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.742583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.742596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.742617] Call Trace:
[   14.742634]  <TASK>
[   14.742648]  dump_stack_lvl+0x73/0xb0
[   14.742680]  print_report+0xd1/0x610
[   14.742735]  ? __virt_addr_valid+0x1db/0x2d0
[   14.742770]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.742798]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.742823]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.742883]  kasan_report+0x141/0x180
[   14.742906]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.742939]  kasan_check_range+0x10c/0x1c0
[   14.742964]  __kasan_check_write+0x18/0x20
[   14.742985]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.743045]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.743074]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.743099]  ? trace_hardirqs_on+0x37/0xe0
[   14.743128]  kasan_bitops_generic+0x116/0x1c0
[   14.743154]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.743187]  ? __pfx_read_tsc+0x10/0x10
[   14.743209]  ? ktime_get_ts64+0x86/0x230
[   14.743234]  kunit_try_run_case+0x1a5/0x480
[   14.743259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.743283]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.743362]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.743411]  ? __kthread_parkme+0x82/0x180
[   14.743457]  ? preempt_count_sub+0x50/0x80
[   14.743482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.743508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.743535]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.743562]  kthread+0x337/0x6f0
[   14.743581]  ? trace_preempt_on+0x20/0xc0
[   14.743604]  ? __pfx_kthread+0x10/0x10
[   14.743625]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.743649]  ? calculate_sigpending+0x7b/0xa0
[   14.743674]  ? __pfx_kthread+0x10/0x10
[   14.743696]  ret_from_fork+0x116/0x1d0
[   14.743715]  ? __pfx_kthread+0x10/0x10
[   14.743737]  ret_from_fork_asm+0x1a/0x30
[   14.743777]  </TASK>
[   14.743818] 
[   14.752249] Allocated by task 278:
[   14.752444]  kasan_save_stack+0x45/0x70
[   14.752687]  kasan_save_track+0x18/0x40
[   14.752985]  kasan_save_alloc_info+0x3b/0x50
[   14.753204]  __kasan_kmalloc+0xb7/0xc0
[   14.753390]  __kmalloc_cache_noprof+0x189/0x420
[   14.753607]  kasan_bitops_generic+0x92/0x1c0
[   14.753981]  kunit_try_run_case+0x1a5/0x480
[   14.754165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.754454]  kthread+0x337/0x6f0
[   14.754634]  ret_from_fork+0x116/0x1d0
[   14.754829]  ret_from_fork_asm+0x1a/0x30
[   14.755035] 
[   14.755164] The buggy address belongs to the object at ffff888103a60000
[   14.755164]  which belongs to the cache kmalloc-16 of size 16
[   14.755715] The buggy address is located 8 bytes inside of
[   14.755715]  allocated 9-byte region [ffff888103a60000, ffff888103a60009)
[   14.756247] 
[   14.756359] The buggy address belongs to the physical page:
[   14.756788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60
[   14.757133] flags: 0x200000000000000(node=0|zone=2)
[   14.757414] page_type: f5(slab)
[   14.757635] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.757962] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.758313] page dumped because: kasan: bad access detected
[   14.758647] 
[   14.758739] Memory state around the buggy address:
[   14.758992]  ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.759347]  ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.759722] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.760055]                       ^
[   14.760248]  ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.760497]  ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.760719] ==================================================================
[   14.660332] ==================================================================
[   14.661175] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.661656] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278
[   14.661967] 
[   14.662080] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.662127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.662140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.662181] Call Trace:
[   14.662210]  <TASK>
[   14.662226]  dump_stack_lvl+0x73/0xb0
[   14.662258]  print_report+0xd1/0x610
[   14.662282]  ? __virt_addr_valid+0x1db/0x2d0
[   14.662308]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.662337]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.662363]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.662391]  kasan_report+0x141/0x180
[   14.662415]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.662448]  kasan_check_range+0x10c/0x1c0
[   14.662473]  __kasan_check_write+0x18/0x20
[   14.662494]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.662544]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.662574]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.662621]  ? trace_hardirqs_on+0x37/0xe0
[   14.662652]  kasan_bitops_generic+0x116/0x1c0
[   14.662679]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.662707]  ? __pfx_read_tsc+0x10/0x10
[   14.662730]  ? ktime_get_ts64+0x86/0x230
[   14.662755]  kunit_try_run_case+0x1a5/0x480
[   14.662791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.662834]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.662862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.662888]  ? __kthread_parkme+0x82/0x180
[   14.662910]  ? preempt_count_sub+0x50/0x80
[   14.662936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.662963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.662991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.663018]  kthread+0x337/0x6f0
[   14.663038]  ? trace_preempt_on+0x20/0xc0
[   14.663061]  ? __pfx_kthread+0x10/0x10
[   14.663082]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.663105]  ? calculate_sigpending+0x7b/0xa0
[   14.663130]  ? __pfx_kthread+0x10/0x10
[   14.663152]  ret_from_fork+0x116/0x1d0
[   14.663170]  ? __pfx_kthread+0x10/0x10
[   14.663198]  ret_from_fork_asm+0x1a/0x30
[   14.663229]  </TASK>
[   14.663240] 
[   14.671322] Allocated by task 278:
[   14.671616]  kasan_save_stack+0x45/0x70
[   14.671835]  kasan_save_track+0x18/0x40
[   14.672086]  kasan_save_alloc_info+0x3b/0x50
[   14.672328]  __kasan_kmalloc+0xb7/0xc0
[   14.672609]  __kmalloc_cache_noprof+0x189/0x420
[   14.672877]  kasan_bitops_generic+0x92/0x1c0
[   14.673127]  kunit_try_run_case+0x1a5/0x480
[   14.673340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.673699]  kthread+0x337/0x6f0
[   14.673848]  ret_from_fork+0x116/0x1d0
[   14.674067]  ret_from_fork_asm+0x1a/0x30
[   14.674269] 
[   14.674376] The buggy address belongs to the object at ffff888103a60000
[   14.674376]  which belongs to the cache kmalloc-16 of size 16
[   14.674990] The buggy address is located 8 bytes inside of
[   14.674990]  allocated 9-byte region [ffff888103a60000, ffff888103a60009)
[   14.675510] 
[   14.675644] The buggy address belongs to the physical page:
[   14.675906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60
[   14.676259] flags: 0x200000000000000(node=0|zone=2)
[   14.676544] page_type: f5(slab)
[   14.676716] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.677077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.677420] page dumped because: kasan: bad access detected
[   14.677666] 
[   14.677802] Memory state around the buggy address:
[   14.678000]  ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.678238]  ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.678488] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.678847]                       ^
[   14.679017]  ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.679375]  ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.679730] ==================================================================
[   14.701477] ==================================================================
[   14.701801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.702271] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278
[   14.702614] 
[   14.702752] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.702808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.702848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.702893] Call Trace:
[   14.702927]  <TASK>
[   14.702985]  dump_stack_lvl+0x73/0xb0
[   14.703060]  print_report+0xd1/0x610
[   14.703131]  ? __virt_addr_valid+0x1db/0x2d0
[   14.703159]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.703192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.703217]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.703246]  kasan_report+0x141/0x180
[   14.703270]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.703303]  kasan_check_range+0x10c/0x1c0
[   14.703328]  __kasan_check_write+0x18/0x20
[   14.703349]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.703378]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.703407]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.703433]  ? trace_hardirqs_on+0x37/0xe0
[   14.703463]  kasan_bitops_generic+0x116/0x1c0
[   14.703489]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.703516]  ? __pfx_read_tsc+0x10/0x10
[   14.703537]  ? ktime_get_ts64+0x86/0x230
[   14.703561]  kunit_try_run_case+0x1a5/0x480
[   14.703595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.703620]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.703646]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.703671]  ? __kthread_parkme+0x82/0x180
[   14.703693]  ? preempt_count_sub+0x50/0x80
[   14.703753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.703790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.703816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.703843]  kthread+0x337/0x6f0
[   14.703864]  ? trace_preempt_on+0x20/0xc0
[   14.703914]  ? __pfx_kthread+0x10/0x10
[   14.703959]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.704005]  ? calculate_sigpending+0x7b/0xa0
[   14.704031]  ? __pfx_kthread+0x10/0x10
[   14.704076]  ret_from_fork+0x116/0x1d0
[   14.704120]  ? __pfx_kthread+0x10/0x10
[   14.704141]  ret_from_fork_asm+0x1a/0x30
[   14.704173]  </TASK>
[   14.704183] 
[   14.712687] Allocated by task 278:
[   14.712912]  kasan_save_stack+0x45/0x70
[   14.713138]  kasan_save_track+0x18/0x40
[   14.713344]  kasan_save_alloc_info+0x3b/0x50
[   14.713608]  __kasan_kmalloc+0xb7/0xc0
[   14.713803]  __kmalloc_cache_noprof+0x189/0x420
[   14.713987]  kasan_bitops_generic+0x92/0x1c0
[   14.714228]  kunit_try_run_case+0x1a5/0x480
[   14.714403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.714708]  kthread+0x337/0x6f0
[   14.714892]  ret_from_fork+0x116/0x1d0
[   14.715112]  ret_from_fork_asm+0x1a/0x30
[   14.715317] 
[   14.715412] The buggy address belongs to the object at ffff888103a60000
[   14.715412]  which belongs to the cache kmalloc-16 of size 16
[   14.715892] The buggy address is located 8 bytes inside of
[   14.715892]  allocated 9-byte region [ffff888103a60000, ffff888103a60009)
[   14.716231] 
[   14.716302] The buggy address belongs to the physical page:
[   14.716680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60
[   14.717325] flags: 0x200000000000000(node=0|zone=2)
[   14.717567] page_type: f5(slab)
[   14.717687] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.717922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.718143] page dumped because: kasan: bad access detected
[   14.718311] 
[   14.718447] Memory state around the buggy address:
[   14.718711]  ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.719147]  ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.719592] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.719951]                       ^
[   14.720125]  ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.720445]  ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.720755] ==================================================================
[   14.630598] ==================================================================
[   14.632016] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.632408] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278
[   14.633011] 
[   14.633140] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.633192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.633204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.633228] Call Trace:
[   14.633242]  <TASK>
[   14.633261]  dump_stack_lvl+0x73/0xb0
[   14.633297]  print_report+0xd1/0x610
[   14.633323]  ? __virt_addr_valid+0x1db/0x2d0
[   14.633350]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.633380]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.633405]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.633584]  kasan_report+0x141/0x180
[   14.633720]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.633770]  kasan_check_range+0x10c/0x1c0
[   14.633795]  __kasan_check_write+0x18/0x20
[   14.633817]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.633845]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.633874]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.633902]  ? trace_hardirqs_on+0x37/0xe0
[   14.633934]  kasan_bitops_generic+0x116/0x1c0
[   14.633960]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.633987]  ? __pfx_read_tsc+0x10/0x10
[   14.634010]  ? ktime_get_ts64+0x86/0x230
[   14.634037]  kunit_try_run_case+0x1a5/0x480
[   14.634066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.634091]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.634119]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.634144]  ? __kthread_parkme+0x82/0x180
[   14.634167]  ? preempt_count_sub+0x50/0x80
[   14.634192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.634218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.634243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.634271]  kthread+0x337/0x6f0
[   14.634291]  ? trace_preempt_on+0x20/0xc0
[   14.634314]  ? __pfx_kthread+0x10/0x10
[   14.634335]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.634357]  ? calculate_sigpending+0x7b/0xa0
[   14.634383]  ? __pfx_kthread+0x10/0x10
[   14.634405]  ret_from_fork+0x116/0x1d0
[   14.634425]  ? __pfx_kthread+0x10/0x10
[   14.634459]  ret_from_fork_asm+0x1a/0x30
[   14.634492]  </TASK>
[   14.634503] 
[   14.646789] Allocated by task 278:
[   14.647156]  kasan_save_stack+0x45/0x70
[   14.647560]  kasan_save_track+0x18/0x40
[   14.648062]  kasan_save_alloc_info+0x3b/0x50
[   14.648462]  __kasan_kmalloc+0xb7/0xc0
[   14.648853]  __kmalloc_cache_noprof+0x189/0x420
[   14.649269]  kasan_bitops_generic+0x92/0x1c0
[   14.649554]  kunit_try_run_case+0x1a5/0x480
[   14.649844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.650021]  kthread+0x337/0x6f0
[   14.650141]  ret_from_fork+0x116/0x1d0
[   14.650273]  ret_from_fork_asm+0x1a/0x30
[   14.650412] 
[   14.650517] The buggy address belongs to the object at ffff888103a60000
[   14.650517]  which belongs to the cache kmalloc-16 of size 16
[   14.651932] The buggy address is located 8 bytes inside of
[   14.651932]  allocated 9-byte region [ffff888103a60000, ffff888103a60009)
[   14.653292] 
[   14.653556] The buggy address belongs to the physical page:
[   14.654119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60
[   14.654878] flags: 0x200000000000000(node=0|zone=2)
[   14.655049] page_type: f5(slab)
[   14.655174] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.655407] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.656250] page dumped because: kasan: bad access detected
[   14.656920] 
[   14.657141] Memory state around the buggy address:
[   14.657674]  ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.658378]  ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.658822] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.659036]                       ^
[   14.659159]  ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.659376]  ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.659601] ==================================================================
[   14.721272] ==================================================================
[   14.721693] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.722217] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278
[   14.722572] 
[   14.722713] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.722756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.722779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.722800] Call Trace:
[   14.722814]  <TASK>
[   14.722826]  dump_stack_lvl+0x73/0xb0
[   14.722894]  print_report+0xd1/0x610
[   14.722919]  ? __virt_addr_valid+0x1db/0x2d0
[   14.722942]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.722970]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.723025]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.723055]  kasan_report+0x141/0x180
[   14.723078]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.723111]  kasan_check_range+0x10c/0x1c0
[   14.723136]  __kasan_check_write+0x18/0x20
[   14.723190]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.723220]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.723249]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.723275]  ? trace_hardirqs_on+0x37/0xe0
[   14.723336]  kasan_bitops_generic+0x116/0x1c0
[   14.723363]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.723390]  ? __pfx_read_tsc+0x10/0x10
[   14.723412]  ? ktime_get_ts64+0x86/0x230
[   14.723437]  kunit_try_run_case+0x1a5/0x480
[   14.723490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.723514]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.723540]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.723565]  ? __kthread_parkme+0x82/0x180
[   14.723587]  ? preempt_count_sub+0x50/0x80
[   14.723612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.723639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.723665]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.723691]  kthread+0x337/0x6f0
[   14.723710]  ? trace_preempt_on+0x20/0xc0
[   14.723773]  ? __pfx_kthread+0x10/0x10
[   14.723801]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.723825]  ? calculate_sigpending+0x7b/0xa0
[   14.723851]  ? __pfx_kthread+0x10/0x10
[   14.723873]  ret_from_fork+0x116/0x1d0
[   14.723893]  ? __pfx_kthread+0x10/0x10
[   14.723943]  ret_from_fork_asm+0x1a/0x30
[   14.723974]  </TASK>
[   14.723984] 
[   14.732216] Allocated by task 278:
[   14.732456]  kasan_save_stack+0x45/0x70
[   14.732716]  kasan_save_track+0x18/0x40
[   14.732948]  kasan_save_alloc_info+0x3b/0x50
[   14.733164]  __kasan_kmalloc+0xb7/0xc0
[   14.733384]  __kmalloc_cache_noprof+0x189/0x420
[   14.733695]  kasan_bitops_generic+0x92/0x1c0
[   14.733903]  kunit_try_run_case+0x1a5/0x480
[   14.734050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.734331]  kthread+0x337/0x6f0
[   14.734569]  ret_from_fork+0x116/0x1d0
[   14.734801]  ret_from_fork_asm+0x1a/0x30
[   14.735023] 
[   14.735108] The buggy address belongs to the object at ffff888103a60000
[   14.735108]  which belongs to the cache kmalloc-16 of size 16
[   14.735698] The buggy address is located 8 bytes inside of
[   14.735698]  allocated 9-byte region [ffff888103a60000, ffff888103a60009)
[   14.736216] 
[   14.736347] The buggy address belongs to the physical page:
[   14.736623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60
[   14.736999] flags: 0x200000000000000(node=0|zone=2)
[   14.737249] page_type: f5(slab)
[   14.737408] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.737775] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.738117] page dumped because: kasan: bad access detected
[   14.738368] 
[   14.738453] Memory state around the buggy address:
[   14.738691]  ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.739011]  ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.739229] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.739535]                       ^
[   14.739706]  ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.740023]  ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.740584] ==================================================================
[   14.761702] ==================================================================
[   14.762131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.762447] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278
[   14.762674] 
[   14.762770] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.762814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.762826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.762847] Call Trace:
[   14.762863]  <TASK>
[   14.762879]  dump_stack_lvl+0x73/0xb0
[   14.762907]  print_report+0xd1/0x610
[   14.762929]  ? __virt_addr_valid+0x1db/0x2d0
[   14.762951]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.762977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.763013]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.763041]  kasan_report+0x141/0x180
[   14.763064]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.763097]  kasan_check_range+0x10c/0x1c0
[   14.763121]  __kasan_check_write+0x18/0x20
[   14.763142]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.763243]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.763295]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.763341]  ? trace_hardirqs_on+0x37/0xe0
[   14.763371]  kasan_bitops_generic+0x116/0x1c0
[   14.763397]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.763423]  ? __pfx_read_tsc+0x10/0x10
[   14.763485]  ? ktime_get_ts64+0x86/0x230
[   14.763557]  kunit_try_run_case+0x1a5/0x480
[   14.763582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.763606]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.763631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.763657]  ? __kthread_parkme+0x82/0x180
[   14.763678]  ? preempt_count_sub+0x50/0x80
[   14.763703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.763729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.763755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.763793]  kthread+0x337/0x6f0
[   14.763813]  ? trace_preempt_on+0x20/0xc0
[   14.763836]  ? __pfx_kthread+0x10/0x10
[   14.763857]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.763880]  ? calculate_sigpending+0x7b/0xa0
[   14.763905]  ? __pfx_kthread+0x10/0x10
[   14.763927]  ret_from_fork+0x116/0x1d0
[   14.763946]  ? __pfx_kthread+0x10/0x10
[   14.763967]  ret_from_fork_asm+0x1a/0x30
[   14.764030]  </TASK>
[   14.764041] 
[   14.772414] Allocated by task 278:
[   14.772606]  kasan_save_stack+0x45/0x70
[   14.772821]  kasan_save_track+0x18/0x40
[   14.773023]  kasan_save_alloc_info+0x3b/0x50
[   14.773208]  __kasan_kmalloc+0xb7/0xc0
[   14.773430]  __kmalloc_cache_noprof+0x189/0x420
[   14.773644]  kasan_bitops_generic+0x92/0x1c0
[   14.773818]  kunit_try_run_case+0x1a5/0x480
[   14.774244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.774564]  kthread+0x337/0x6f0
[   14.774730]  ret_from_fork+0x116/0x1d0
[   14.774922]  ret_from_fork_asm+0x1a/0x30
[   14.775118] 
[   14.775293] The buggy address belongs to the object at ffff888103a60000
[   14.775293]  which belongs to the cache kmalloc-16 of size 16
[   14.775706] The buggy address is located 8 bytes inside of
[   14.775706]  allocated 9-byte region [ffff888103a60000, ffff888103a60009)
[   14.776218] 
[   14.776351] The buggy address belongs to the physical page:
[   14.776703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60
[   14.777081] flags: 0x200000000000000(node=0|zone=2)
[   14.777327] page_type: f5(slab)
[   14.777505] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.777849] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.778210] page dumped because: kasan: bad access detected
[   14.778474] 
[   14.778555] Memory state around the buggy address:
[   14.778798]  ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.779128]  ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.779454] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.779783]                       ^
[   14.779925]  ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.780136]  ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.780475] ==================================================================
[   14.680607] ==================================================================
[   14.680980] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.681823] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278
[   14.682159] 
[   14.682311] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.682357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.682369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.682391] Call Trace:
[   14.682407]  <TASK>
[   14.682422]  dump_stack_lvl+0x73/0xb0
[   14.682453]  print_report+0xd1/0x610
[   14.682476]  ? __virt_addr_valid+0x1db/0x2d0
[   14.682500]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.682528]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.682553]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.682582]  kasan_report+0x141/0x180
[   14.682605]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.682637]  kasan_check_range+0x10c/0x1c0
[   14.682662]  __kasan_check_write+0x18/0x20
[   14.682683]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.682719]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.682748]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.682816]  ? trace_hardirqs_on+0x37/0xe0
[   14.682847]  kasan_bitops_generic+0x116/0x1c0
[   14.682872]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.682899]  ? __pfx_read_tsc+0x10/0x10
[   14.682921]  ? ktime_get_ts64+0x86/0x230
[   14.682946]  kunit_try_run_case+0x1a5/0x480
[   14.682971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.682995]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.683021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.683046]  ? __kthread_parkme+0x82/0x180
[   14.683069]  ? preempt_count_sub+0x50/0x80
[   14.683094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.683120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.683147]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.683174]  kthread+0x337/0x6f0
[   14.683199]  ? trace_preempt_on+0x20/0xc0
[   14.683222]  ? __pfx_kthread+0x10/0x10
[   14.683244]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.683266]  ? calculate_sigpending+0x7b/0xa0
[   14.683292]  ? __pfx_kthread+0x10/0x10
[   14.683314]  ret_from_fork+0x116/0x1d0
[   14.683333]  ? __pfx_kthread+0x10/0x10
[   14.683355]  ret_from_fork_asm+0x1a/0x30
[   14.683387]  </TASK>
[   14.683397] 
[   14.691530] Allocated by task 278:
[   14.691707]  kasan_save_stack+0x45/0x70
[   14.691920]  kasan_save_track+0x18/0x40
[   14.692120]  kasan_save_alloc_info+0x3b/0x50
[   14.692411]  __kasan_kmalloc+0xb7/0xc0
[   14.692633]  __kmalloc_cache_noprof+0x189/0x420
[   14.692797]  kasan_bitops_generic+0x92/0x1c0
[   14.692947]  kunit_try_run_case+0x1a5/0x480
[   14.693093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.693321]  kthread+0x337/0x6f0
[   14.693488]  ret_from_fork+0x116/0x1d0
[   14.693774]  ret_from_fork_asm+0x1a/0x30
[   14.694108] 
[   14.694236] The buggy address belongs to the object at ffff888103a60000
[   14.694236]  which belongs to the cache kmalloc-16 of size 16
[   14.695309] The buggy address is located 8 bytes inside of
[   14.695309]  allocated 9-byte region [ffff888103a60000, ffff888103a60009)
[   14.695785] 
[   14.695856] The buggy address belongs to the physical page:
[   14.696024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60
[   14.696391] flags: 0x200000000000000(node=0|zone=2)
[   14.696751] page_type: f5(slab)
[   14.697001] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.697379] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.697988] page dumped because: kasan: bad access detected
[   14.698172] 
[   14.698303] Memory state around the buggy address:
[   14.698525]  ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.698882]  ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.699210] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.699521]                       ^
[   14.699738]  ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.700068]  ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.700377] ==================================================================
[   14.781084] ==================================================================
[   14.781638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.782083] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278
[   14.782399] 
[   14.782595] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.782642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.782654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.782675] Call Trace:
[   14.782690]  <TASK>
[   14.782737]  dump_stack_lvl+0x73/0xb0
[   14.782780]  print_report+0xd1/0x610
[   14.782804]  ? __virt_addr_valid+0x1db/0x2d0
[   14.782828]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.782855]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.782912]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.782940]  kasan_report+0x141/0x180
[   14.782962]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.783024]  kasan_check_range+0x10c/0x1c0
[   14.783049]  __kasan_check_write+0x18/0x20
[   14.783069]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.783097]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.783125]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.783186]  ? trace_hardirqs_on+0x37/0xe0
[   14.783216]  kasan_bitops_generic+0x116/0x1c0
[   14.783241]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.783267]  ? __pfx_read_tsc+0x10/0x10
[   14.783316]  ? ktime_get_ts64+0x86/0x230
[   14.783342]  kunit_try_run_case+0x1a5/0x480
[   14.783368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.783392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.783418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.783453]  ? __kthread_parkme+0x82/0x180
[   14.783474]  ? preempt_count_sub+0x50/0x80
[   14.783499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.783525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.783551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.783605]  kthread+0x337/0x6f0
[   14.783649]  ? trace_preempt_on+0x20/0xc0
[   14.783695]  ? __pfx_kthread+0x10/0x10
[   14.783740]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.783773]  ? calculate_sigpending+0x7b/0xa0
[   14.783823]  ? __pfx_kthread+0x10/0x10
[   14.783868]  ret_from_fork+0x116/0x1d0
[   14.783888]  ? __pfx_kthread+0x10/0x10
[   14.783909]  ret_from_fork_asm+0x1a/0x30
[   14.783941]  </TASK>
[   14.783950] 
[   14.792082] Allocated by task 278:
[   14.792278]  kasan_save_stack+0x45/0x70
[   14.792543]  kasan_save_track+0x18/0x40
[   14.792741]  kasan_save_alloc_info+0x3b/0x50
[   14.792982]  __kasan_kmalloc+0xb7/0xc0
[   14.793188]  __kmalloc_cache_noprof+0x189/0x420
[   14.793436]  kasan_bitops_generic+0x92/0x1c0
[   14.793673]  kunit_try_run_case+0x1a5/0x480
[   14.793882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.794149]  kthread+0x337/0x6f0
[   14.794335]  ret_from_fork+0x116/0x1d0
[   14.794536]  ret_from_fork_asm+0x1a/0x30
[   14.794754] 
[   14.794891] The buggy address belongs to the object at ffff888103a60000
[   14.794891]  which belongs to the cache kmalloc-16 of size 16
[   14.795426] The buggy address is located 8 bytes inside of
[   14.795426]  allocated 9-byte region [ffff888103a60000, ffff888103a60009)
[   14.795897] 
[   14.795970] The buggy address belongs to the physical page:
[   14.796138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60
[   14.796477] flags: 0x200000000000000(node=0|zone=2)
[   14.796707] page_type: f5(slab)
[   14.796880] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.797218] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.797544] page dumped because: kasan: bad access detected
[   14.797799] 
[   14.797889] Memory state around the buggy address:
[   14.798041]  ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.798251]  ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.798459] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.798702]                       ^
[   14.799051]  ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.799442]  ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.799861] ==================================================================