Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.447375] ==================================================================
[   19.447546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   19.447638] Read of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261
[   19.447755] 
[   19.447927] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.448237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.448323] Hardware name: linux,dummy-virt (DT)
[   19.448358] Call trace:
[   19.448617]  show_stack+0x20/0x38 (C)
[   19.448813]  dump_stack_lvl+0x8c/0xd0
[   19.449084]  print_report+0x118/0x5d0
[   19.449281]  kasan_report+0xdc/0x128
[   19.449693]  __asan_report_load8_noabort+0x20/0x30
[   19.449770]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   19.450171]  kasan_bitops_generic+0x110/0x1c8
[   19.450264]  kunit_try_run_case+0x170/0x3f0
[   19.450382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.451064]  kthread+0x328/0x630
[   19.451280]  ret_from_fork+0x10/0x20
[   19.451357] 
[   19.451378] Allocated by task 261:
[   19.451411]  kasan_save_stack+0x3c/0x68
[   19.451466]  kasan_save_track+0x20/0x40
[   19.451505]  kasan_save_alloc_info+0x40/0x58
[   19.451768]  __kasan_kmalloc+0xd4/0xd8
[   19.451963]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.452172]  kasan_bitops_generic+0xa0/0x1c8
[   19.452518]  kunit_try_run_case+0x170/0x3f0
[   19.452853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.453070]  kthread+0x328/0x630
[   19.453214]  ret_from_fork+0x10/0x20
[   19.453257] 
[   19.453328] The buggy address belongs to the object at fff00000c3eb9280
[   19.453328]  which belongs to the cache kmalloc-16 of size 16
[   19.453534] The buggy address is located 8 bytes inside of
[   19.453534]  allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289)
[   19.453813] 
[   19.453864] The buggy address belongs to the physical page:
[   19.453923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   19.453988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.454055] page_type: f5(slab)
[   19.454111] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.454176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.454221] page dumped because: kasan: bad access detected
[   19.454264] 
[   19.454285] Memory state around the buggy address:
[   19.454329]  fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.454375]  fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.454422] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.454463]                       ^
[   19.454496]  fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.454556]  fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.454626] ==================================================================
[   19.477319] ==================================================================
[   19.477410] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   19.477805] Read of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261
[   19.477948] 
[   19.478044] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.478205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.478285] Hardware name: linux,dummy-virt (DT)
[   19.478321] Call trace:
[   19.478346]  show_stack+0x20/0x38 (C)
[   19.478455]  dump_stack_lvl+0x8c/0xd0
[   19.478508]  print_report+0x118/0x5d0
[   19.478800]  kasan_report+0xdc/0x128
[   19.479040]  __asan_report_load8_noabort+0x20/0x30
[   19.479143]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   19.479284]  kasan_bitops_generic+0x110/0x1c8
[   19.479439]  kunit_try_run_case+0x170/0x3f0
[   19.479515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.479578]  kthread+0x328/0x630
[   19.479902]  ret_from_fork+0x10/0x20
[   19.480154] 
[   19.480271] Allocated by task 261:
[   19.480357]  kasan_save_stack+0x3c/0x68
[   19.480471]  kasan_save_track+0x20/0x40
[   19.480570]  kasan_save_alloc_info+0x40/0x58
[   19.480988]  __kasan_kmalloc+0xd4/0xd8
[   19.481059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.481224]  kasan_bitops_generic+0xa0/0x1c8
[   19.481376]  kunit_try_run_case+0x170/0x3f0
[   19.481514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.481639]  kthread+0x328/0x630
[   19.481687]  ret_from_fork+0x10/0x20
[   19.481725] 
[   19.481902] The buggy address belongs to the object at fff00000c3eb9280
[   19.481902]  which belongs to the cache kmalloc-16 of size 16
[   19.482181] The buggy address is located 8 bytes inside of
[   19.482181]  allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289)
[   19.482272] 
[   19.482408] The buggy address belongs to the physical page:
[   19.482473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   19.482947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.483148] page_type: f5(slab)
[   19.483226] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.483627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.483958] page dumped because: kasan: bad access detected
[   19.484032] 
[   19.484101] Memory state around the buggy address:
[   19.484233]  fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.484344]  fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.484479] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.484521]                       ^
[   19.484737]  fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.484812]  fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.485267] ==================================================================
[   19.400165] ==================================================================
[   19.400237] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.400477] Read of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261
[   19.400646] 
[   19.400693] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.401101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.401150] Hardware name: linux,dummy-virt (DT)
[   19.401185] Call trace:
[   19.401239]  show_stack+0x20/0x38 (C)
[   19.401300]  dump_stack_lvl+0x8c/0xd0
[   19.401354]  print_report+0x118/0x5d0
[   19.401868]  kasan_report+0xdc/0x128
[   19.401943]  __asan_report_load8_noabort+0x20/0x30
[   19.401997]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   19.402124]  kasan_bitops_generic+0x110/0x1c8
[   19.402180]  kunit_try_run_case+0x170/0x3f0
[   19.402231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.402908]  kthread+0x328/0x630
[   19.402979]  ret_from_fork+0x10/0x20
[   19.403034] 
[   19.403169] Allocated by task 261:
[   19.403213]  kasan_save_stack+0x3c/0x68
[   19.403289]  kasan_save_track+0x20/0x40
[   19.403494]  kasan_save_alloc_info+0x40/0x58
[   19.403692]  __kasan_kmalloc+0xd4/0xd8
[   19.403740]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.403835]  kasan_bitops_generic+0xa0/0x1c8
[   19.403954]  kunit_try_run_case+0x170/0x3f0
[   19.404019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.404442]  kthread+0x328/0x630
[   19.404697]  ret_from_fork+0x10/0x20
[   19.404862] 
[   19.405004] The buggy address belongs to the object at fff00000c3eb9280
[   19.405004]  which belongs to the cache kmalloc-16 of size 16
[   19.405144] The buggy address is located 8 bytes inside of
[   19.405144]  allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289)
[   19.405375] 
[   19.405460] The buggy address belongs to the physical page:
[   19.405675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   19.405818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.406019] page_type: f5(slab)
[   19.406296] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.406392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.406447] page dumped because: kasan: bad access detected
[   19.406490] 
[   19.406552] Memory state around the buggy address:
[   19.406589]  fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.406635]  fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.406707] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.406757]                       ^
[   19.406802]  fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.406861]  fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.406911] ==================================================================
[   19.429108] ==================================================================
[   19.429177] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   19.429234] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261
[   19.429285] 
[   19.429361] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.429449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.429487] Hardware name: linux,dummy-virt (DT)
[   19.429519] Call trace:
[   19.429556]  show_stack+0x20/0x38 (C)
[   19.429607]  dump_stack_lvl+0x8c/0xd0
[   19.429658]  print_report+0x118/0x5d0
[   19.429726]  kasan_report+0xdc/0x128
[   19.429783]  kasan_check_range+0x100/0x1a8
[   19.429832]  __kasan_check_write+0x20/0x30
[   19.429886]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   19.429940]  kasan_bitops_generic+0x110/0x1c8
[   19.430000]  kunit_try_run_case+0x170/0x3f0
[   19.430051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.430113]  kthread+0x328/0x630
[   19.430167]  ret_from_fork+0x10/0x20
[   19.430218] 
[   19.430248] Allocated by task 261:
[   19.430280]  kasan_save_stack+0x3c/0x68
[   19.430323]  kasan_save_track+0x20/0x40
[   19.430371]  kasan_save_alloc_info+0x40/0x58
[   19.430413]  __kasan_kmalloc+0xd4/0xd8
[   19.430452]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.430494]  kasan_bitops_generic+0xa0/0x1c8
[   19.430535]  kunit_try_run_case+0x170/0x3f0
[   19.430575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.430621]  kthread+0x328/0x630
[   19.430654]  ret_from_fork+0x10/0x20
[   19.430701] 
[   19.430724] The buggy address belongs to the object at fff00000c3eb9280
[   19.430724]  which belongs to the cache kmalloc-16 of size 16
[   19.430791] The buggy address is located 8 bytes inside of
[   19.430791]  allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289)
[   19.431189] 
[   19.431225] The buggy address belongs to the physical page:
[   19.431262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   19.431865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.431944] page_type: f5(slab)
[   19.432399] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.432628] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.432676] page dumped because: kasan: bad access detected
[   19.433080] 
[   19.433167] Memory state around the buggy address:
[   19.433288]  fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.433394]  fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.433541] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.433584]                       ^
[   19.434020]  fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.434161]  fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.434348] ==================================================================
[   19.417125] ==================================================================
[   19.417222] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.417286] Read of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261
[   19.417338] 
[   19.418337] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.418473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.418506] Hardware name: linux,dummy-virt (DT)
[   19.418613] Call trace:
[   19.418640]  show_stack+0x20/0x38 (C)
[   19.418700]  dump_stack_lvl+0x8c/0xd0
[   19.418755]  print_report+0x118/0x5d0
[   19.419108]  kasan_report+0xdc/0x128
[   19.419257]  __asan_report_load8_noabort+0x20/0x30
[   19.419509]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.419877]  kasan_bitops_generic+0x110/0x1c8
[   19.419953]  kunit_try_run_case+0x170/0x3f0
[   19.420004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.420061]  kthread+0x328/0x630
[   19.420756]  ret_from_fork+0x10/0x20
[   19.420935] 
[   19.420960] Allocated by task 261:
[   19.421189]  kasan_save_stack+0x3c/0x68
[   19.421410]  kasan_save_track+0x20/0x40
[   19.421511]  kasan_save_alloc_info+0x40/0x58
[   19.421743]  __kasan_kmalloc+0xd4/0xd8
[   19.421901]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.422120]  kasan_bitops_generic+0xa0/0x1c8
[   19.422278]  kunit_try_run_case+0x170/0x3f0
[   19.422648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.422919]  kthread+0x328/0x630
[   19.423155]  ret_from_fork+0x10/0x20
[   19.423467] 
[   19.423590] The buggy address belongs to the object at fff00000c3eb9280
[   19.423590]  which belongs to the cache kmalloc-16 of size 16
[   19.423976] The buggy address is located 8 bytes inside of
[   19.423976]  allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289)
[   19.424157] 
[   19.424219] The buggy address belongs to the physical page:
[   19.424434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   19.424530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.424867] page_type: f5(slab)
[   19.425040] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.425124] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.425507] page dumped because: kasan: bad access detected
[   19.425799] 
[   19.425992] Memory state around the buggy address:
[   19.426036]  fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.426246]  fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.426624] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.427070]                       ^
[   19.427127]  fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.427188]  fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.427384] ==================================================================
[   19.435130] ==================================================================
[   19.435241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   19.435326] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261
[   19.435378] 
[   19.435561] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.435825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.436062] Hardware name: linux,dummy-virt (DT)
[   19.436141] Call trace:
[   19.436301]  show_stack+0x20/0x38 (C)
[   19.436550]  dump_stack_lvl+0x8c/0xd0
[   19.436730]  print_report+0x118/0x5d0
[   19.436884]  kasan_report+0xdc/0x128
[   19.436970]  kasan_check_range+0x100/0x1a8
[   19.437111]  __kasan_check_write+0x20/0x30
[   19.437223]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   19.437605]  kasan_bitops_generic+0x110/0x1c8
[   19.437832]  kunit_try_run_case+0x170/0x3f0
[   19.438043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.438151]  kthread+0x328/0x630
[   19.438342]  ret_from_fork+0x10/0x20
[   19.438615] 
[   19.438663] Allocated by task 261:
[   19.438861]  kasan_save_stack+0x3c/0x68
[   19.438995]  kasan_save_track+0x20/0x40
[   19.439036]  kasan_save_alloc_info+0x40/0x58
[   19.439320]  __kasan_kmalloc+0xd4/0xd8
[   19.439541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.440065]  kasan_bitops_generic+0xa0/0x1c8
[   19.440400]  kunit_try_run_case+0x170/0x3f0
[   19.440528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.440612]  kthread+0x328/0x630
[   19.440790]  ret_from_fork+0x10/0x20
[   19.440890] 
[   19.440941] The buggy address belongs to the object at fff00000c3eb9280
[   19.440941]  which belongs to the cache kmalloc-16 of size 16
[   19.441584] The buggy address is located 8 bytes inside of
[   19.441584]  allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289)
[   19.441681] 
[   19.441793] The buggy address belongs to the physical page:
[   19.442268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   19.442606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.442706] page_type: f5(slab)
[   19.443046] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.443191] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.443300] page dumped because: kasan: bad access detected
[   19.443338] 
[   19.443365] Memory state around the buggy address:
[   19.443403]  fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.443806]  fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.443986] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444589]                       ^
[   19.444709]  fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.444909]  fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.445062] ==================================================================
[   19.408997] ==================================================================
[   19.409112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.409189] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261
[   19.409241] 
[   19.409482] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.409600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.409679] Hardware name: linux,dummy-virt (DT)
[   19.409713] Call trace:
[   19.409740]  show_stack+0x20/0x38 (C)
[   19.410123]  dump_stack_lvl+0x8c/0xd0
[   19.410186]  print_report+0x118/0x5d0
[   19.410325]  kasan_report+0xdc/0x128
[   19.410432]  kasan_check_range+0x100/0x1a8
[   19.410558]  __kasan_check_write+0x20/0x30
[   19.410607]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   19.411043]  kasan_bitops_generic+0x110/0x1c8
[   19.411122]  kunit_try_run_case+0x170/0x3f0
[   19.411247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.411320]  kthread+0x328/0x630
[   19.411415]  ret_from_fork+0x10/0x20
[   19.411500] 
[   19.411524] Allocated by task 261:
[   19.411558]  kasan_save_stack+0x3c/0x68
[   19.411604]  kasan_save_track+0x20/0x40
[   19.411983]  kasan_save_alloc_info+0x40/0x58
[   19.412125]  __kasan_kmalloc+0xd4/0xd8
[   19.412300]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.412385]  kasan_bitops_generic+0xa0/0x1c8
[   19.412445]  kunit_try_run_case+0x170/0x3f0
[   19.412914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.413033]  kthread+0x328/0x630
[   19.413131]  ret_from_fork+0x10/0x20
[   19.413291] 
[   19.413319] The buggy address belongs to the object at fff00000c3eb9280
[   19.413319]  which belongs to the cache kmalloc-16 of size 16
[   19.413393] The buggy address is located 8 bytes inside of
[   19.413393]  allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289)
[   19.413457] 
[   19.413619] The buggy address belongs to the physical page:
[   19.413796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   19.413864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.413975] page_type: f5(slab)
[   19.414034] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.414093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.414135] page dumped because: kasan: bad access detected
[   19.414179] 
[   19.414207] Memory state around the buggy address:
[   19.414257]  fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.414317]  fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.414371] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.414412]                       ^
[   19.414456]  fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.414510]  fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.414550] ==================================================================
[   19.387461] ==================================================================
[   19.387549] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.387637] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261
[   19.387692] 
[   19.387742] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.387830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.388254] Hardware name: linux,dummy-virt (DT)
[   19.388802] Call trace:
[   19.389096]  show_stack+0x20/0x38 (C)
[   19.389189]  dump_stack_lvl+0x8c/0xd0
[   19.389400]  print_report+0x118/0x5d0
[   19.389506]  kasan_report+0xdc/0x128
[   19.389777]  kasan_check_range+0x100/0x1a8
[   19.389869]  __kasan_check_write+0x20/0x30
[   19.390701]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   19.390838]  kasan_bitops_generic+0x110/0x1c8
[   19.391225]  kunit_try_run_case+0x170/0x3f0
[   19.391364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.391449]  kthread+0x328/0x630
[   19.391536]  ret_from_fork+0x10/0x20
[   19.391643] 
[   19.391808] Allocated by task 261:
[   19.392217]  kasan_save_stack+0x3c/0x68
[   19.392280]  kasan_save_track+0x20/0x40
[   19.392357]  kasan_save_alloc_info+0x40/0x58
[   19.392684]  __kasan_kmalloc+0xd4/0xd8
[   19.392830]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.393115]  kasan_bitops_generic+0xa0/0x1c8
[   19.393252]  kunit_try_run_case+0x170/0x3f0
[   19.393315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.393812]  kthread+0x328/0x630
[   19.394064]  ret_from_fork+0x10/0x20
[   19.394149] 
[   19.394300] The buggy address belongs to the object at fff00000c3eb9280
[   19.394300]  which belongs to the cache kmalloc-16 of size 16
[   19.394511] The buggy address is located 8 bytes inside of
[   19.394511]  allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289)
[   19.394737] 
[   19.394764] The buggy address belongs to the physical page:
[   19.395003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   19.395376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.395444] page_type: f5(slab)
[   19.395492] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.395897] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.396030] page dumped because: kasan: bad access detected
[   19.396086] 
[   19.396355] Memory state around the buggy address:
[   19.396402]  fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.396768]  fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.396870] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.396961]                       ^
[   19.397174]  fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.397220]  fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.397262] ==================================================================
[   19.457405] ==================================================================
[   19.457482] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   19.457542] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261
[   19.457597] 
[   19.457978] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.458087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.458193] Hardware name: linux,dummy-virt (DT)
[   19.458232] Call trace:
[   19.458276]  show_stack+0x20/0x38 (C)
[   19.458626]  dump_stack_lvl+0x8c/0xd0
[   19.459000]  print_report+0x118/0x5d0
[   19.459104]  kasan_report+0xdc/0x128
[   19.459413]  kasan_check_range+0x100/0x1a8
[   19.459925]  __kasan_check_write+0x20/0x30
[   19.460017]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   19.460100]  kasan_bitops_generic+0x110/0x1c8
[   19.460260]  kunit_try_run_case+0x170/0x3f0
[   19.460568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.460925]  kthread+0x328/0x630
[   19.460991]  ret_from_fork+0x10/0x20
[   19.461646] 
[   19.461702] Allocated by task 261:
[   19.461859]  kasan_save_stack+0x3c/0x68
[   19.462088]  kasan_save_track+0x20/0x40
[   19.462335]  kasan_save_alloc_info+0x40/0x58
[   19.462407]  __kasan_kmalloc+0xd4/0xd8
[   19.462565]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.462722]  kasan_bitops_generic+0xa0/0x1c8
[   19.462768]  kunit_try_run_case+0x170/0x3f0
[   19.462991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.463106]  kthread+0x328/0x630
[   19.463264]  ret_from_fork+0x10/0x20
[   19.463495] 
[   19.463595] The buggy address belongs to the object at fff00000c3eb9280
[   19.463595]  which belongs to the cache kmalloc-16 of size 16
[   19.463923] The buggy address is located 8 bytes inside of
[   19.463923]  allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289)
[   19.464064] 
[   19.464270] The buggy address belongs to the physical page:
[   19.464368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   19.464550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.464706] page_type: f5(slab)
[   19.464821] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.465149] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.465216] page dumped because: kasan: bad access detected
[   19.465396] 
[   19.465489] Memory state around the buggy address:
[   19.465654]  fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.465733]  fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.465934] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.466150]                       ^
[   19.466220]  fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.466546]  fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.466916] ==================================================================
[   19.468432] ==================================================================
[   19.468495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   19.468557] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261
[   19.469084] 
[   19.469426] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.469537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.469568] Hardware name: linux,dummy-virt (DT)
[   19.469602] Call trace:
[   19.469630]  show_stack+0x20/0x38 (C)
[   19.469686]  dump_stack_lvl+0x8c/0xd0
[   19.469741]  print_report+0x118/0x5d0
[   19.469792]  kasan_report+0xdc/0x128
[   19.469840]  kasan_check_range+0x100/0x1a8
[   19.469902]  __kasan_check_write+0x20/0x30
[   19.470074]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   19.470138]  kasan_bitops_generic+0x110/0x1c8
[   19.470186]  kunit_try_run_case+0x170/0x3f0
[   19.470236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.470309]  kthread+0x328/0x630
[   19.470354]  ret_from_fork+0x10/0x20
[   19.470407] 
[   19.470428] Allocated by task 261:
[   19.470460]  kasan_save_stack+0x3c/0x68
[   19.470503]  kasan_save_track+0x20/0x40
[   19.470565]  kasan_save_alloc_info+0x40/0x58
[   19.470607]  __kasan_kmalloc+0xd4/0xd8
[   19.470645]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.470698]  kasan_bitops_generic+0xa0/0x1c8
[   19.470746]  kunit_try_run_case+0x170/0x3f0
[   19.470794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.471128]  kthread+0x328/0x630
[   19.471212]  ret_from_fork+0x10/0x20
[   19.471256] 
[   19.471504] The buggy address belongs to the object at fff00000c3eb9280
[   19.471504]  which belongs to the cache kmalloc-16 of size 16
[   19.472215] The buggy address is located 8 bytes inside of
[   19.472215]  allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289)
[   19.472457] 
[   19.472551] The buggy address belongs to the physical page:
[   19.472753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb9
[   19.472821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.473181] page_type: f5(slab)
[   19.473352] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.473449] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.473672] page dumped because: kasan: bad access detected
[   19.473750] 
[   19.473932] Memory state around the buggy address:
[   19.474111]  fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.474343]  fff00000c3eb9200: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   19.474461] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474536]                       ^
[   19.474627]  fff00000c3eb9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.475039]  fff00000c3eb9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.475154] ==================================================================

[   18.935540] ==================================================================
[   18.936033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.936095] Read of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261
[   18.936147] 
[   18.936186] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.936266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.936294] Hardware name: linux,dummy-virt (DT)
[   18.936339] Call trace:
[   18.936363]  show_stack+0x20/0x38 (C)
[   18.936425]  dump_stack_lvl+0x8c/0xd0
[   18.936473]  print_report+0x118/0x5d0
[   18.936529]  kasan_report+0xdc/0x128
[   18.936575]  __asan_report_load8_noabort+0x20/0x30
[   18.936630]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.936683]  kasan_bitops_generic+0x110/0x1c8
[   18.936792]  kunit_try_run_case+0x170/0x3f0
[   18.936843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.936898]  kthread+0x328/0x630
[   18.936942]  ret_from_fork+0x10/0x20
[   18.936993] 
[   18.937013] Allocated by task 261:
[   18.937066]  kasan_save_stack+0x3c/0x68
[   18.937108]  kasan_save_track+0x20/0x40
[   18.937148]  kasan_save_alloc_info+0x40/0x58
[   18.937189]  __kasan_kmalloc+0xd4/0xd8
[   18.937235]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.937276]  kasan_bitops_generic+0xa0/0x1c8
[   18.937314]  kunit_try_run_case+0x170/0x3f0
[   18.937364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.937529]  kthread+0x328/0x630
[   18.937586]  ret_from_fork+0x10/0x20
[   18.937624] 
[   18.937705] The buggy address belongs to the object at fff00000c5a02c60
[   18.937705]  which belongs to the cache kmalloc-16 of size 16
[   18.937809] The buggy address is located 8 bytes inside of
[   18.937809]  allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69)
[   18.937871] 
[   18.937893] The buggy address belongs to the physical page:
[   18.937925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   18.937980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.938027] page_type: f5(slab)
[   18.938068] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.938120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.938178] page dumped because: kasan: bad access detected
[   18.938274] 
[   18.938361] Memory state around the buggy address:
[   18.938402]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   18.938525]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.938570] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   18.938609]                                                           ^
[   18.938651]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.938695]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.938734] ==================================================================
[   18.930477] ==================================================================
[   18.930547] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.930612] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261
[   18.930699] 
[   18.930735] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.930819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.930848] Hardware name: linux,dummy-virt (DT)
[   18.930882] Call trace:
[   18.930913]  show_stack+0x20/0x38 (C)
[   18.931114]  dump_stack_lvl+0x8c/0xd0
[   18.931249]  print_report+0x118/0x5d0
[   18.931364]  kasan_report+0xdc/0x128
[   18.931410]  kasan_check_range+0x100/0x1a8
[   18.931460]  __kasan_check_write+0x20/0x30
[   18.931506]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.931558]  kasan_bitops_generic+0x110/0x1c8
[   18.931605]  kunit_try_run_case+0x170/0x3f0
[   18.931654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.931707]  kthread+0x328/0x630
[   18.931751]  ret_from_fork+0x10/0x20
[   18.931800] 
[   18.931820] Allocated by task 261:
[   18.931849]  kasan_save_stack+0x3c/0x68
[   18.931891]  kasan_save_track+0x20/0x40
[   18.931930]  kasan_save_alloc_info+0x40/0x58
[   18.931972]  __kasan_kmalloc+0xd4/0xd8
[   18.932009]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.932051]  kasan_bitops_generic+0xa0/0x1c8
[   18.932091]  kunit_try_run_case+0x170/0x3f0
[   18.932129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.932209]  kthread+0x328/0x630
[   18.932383]  ret_from_fork+0x10/0x20
[   18.932426] 
[   18.932447] The buggy address belongs to the object at fff00000c5a02c60
[   18.932447]  which belongs to the cache kmalloc-16 of size 16
[   18.932550] The buggy address is located 8 bytes inside of
[   18.932550]  allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69)
[   18.932614] 
[   18.932636] The buggy address belongs to the physical page:
[   18.932667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   18.932722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.932772] page_type: f5(slab)
[   18.932812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.932865] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.932920] page dumped because: kasan: bad access detected
[   18.933165] 
[   18.933186] Memory state around the buggy address:
[   18.934011]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   18.934130]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.934213] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   18.934277]                                                           ^
[   18.934340]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.934386]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.934426] ==================================================================
[   18.940469] ==================================================================
[   18.940581] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   18.940749] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261
[   18.940801] 
[   18.940848] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.941120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.941838] Hardware name: linux,dummy-virt (DT)
[   18.942501] Call trace:
[   18.942687]  show_stack+0x20/0x38 (C)
[   18.942880]  dump_stack_lvl+0x8c/0xd0
[   18.942936]  print_report+0x118/0x5d0
[   18.943346]  kasan_report+0xdc/0x128
[   18.943409]  kasan_check_range+0x100/0x1a8
[   18.943890]  __kasan_check_write+0x20/0x30
[   18.943939]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   18.943992]  kasan_bitops_generic+0x110/0x1c8
[   18.944515]  kunit_try_run_case+0x170/0x3f0
[   18.944800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.944900]  kthread+0x328/0x630
[   18.944946]  ret_from_fork+0x10/0x20
[   18.944994] 
[   18.945016] Allocated by task 261:
[   18.945279]  kasan_save_stack+0x3c/0x68
[   18.945351]  kasan_save_track+0x20/0x40
[   18.945598]  kasan_save_alloc_info+0x40/0x58
[   18.945642]  __kasan_kmalloc+0xd4/0xd8
[   18.945680]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.946286]  kasan_bitops_generic+0xa0/0x1c8
[   18.946702]  kunit_try_run_case+0x170/0x3f0
[   18.946749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.946931]  kthread+0x328/0x630
[   18.947269]  ret_from_fork+0x10/0x20
[   18.947557] 
[   18.947587] The buggy address belongs to the object at fff00000c5a02c60
[   18.947587]  which belongs to the cache kmalloc-16 of size 16
[   18.947961] The buggy address is located 8 bytes inside of
[   18.947961]  allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69)
[   18.948038] 
[   18.948290] The buggy address belongs to the physical page:
[   18.948353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   18.948411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.949109] page_type: f5(slab)
[   18.949355] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.949450] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.949501] page dumped because: kasan: bad access detected
[   18.949800] 
[   18.950016] Memory state around the buggy address:
[   18.950055]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   18.950382]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.950723] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   18.950965]                                                           ^
[   18.951016]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.951429]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.951496] ==================================================================
[   18.963422] ==================================================================
[   18.963477] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   18.964846] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261
[   18.964934] 
[   18.964969] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.965442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.965503] Hardware name: linux,dummy-virt (DT)
[   18.965787] Call trace:
[   18.965868]  show_stack+0x20/0x38 (C)
[   18.966160]  dump_stack_lvl+0x8c/0xd0
[   18.966412]  print_report+0x118/0x5d0
[   18.966463]  kasan_report+0xdc/0x128
[   18.966512]  kasan_check_range+0x100/0x1a8
[   18.967228]  __kasan_check_write+0x20/0x30
[   18.967348]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   18.967403]  kasan_bitops_generic+0x110/0x1c8
[   18.967452]  kunit_try_run_case+0x170/0x3f0
[   18.967500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.967555]  kthread+0x328/0x630
[   18.967600]  ret_from_fork+0x10/0x20
[   18.967649] 
[   18.967670] Allocated by task 261:
[   18.967700]  kasan_save_stack+0x3c/0x68
[   18.967743]  kasan_save_track+0x20/0x40
[   18.967782]  kasan_save_alloc_info+0x40/0x58
[   18.967825]  __kasan_kmalloc+0xd4/0xd8
[   18.967862]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.967904]  kasan_bitops_generic+0xa0/0x1c8
[   18.967944]  kunit_try_run_case+0x170/0x3f0
[   18.967982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.968028]  kthread+0x328/0x630
[   18.968063]  ret_from_fork+0x10/0x20
[   18.968471] 
[   18.968531] The buggy address belongs to the object at fff00000c5a02c60
[   18.968531]  which belongs to the cache kmalloc-16 of size 16
[   18.969187] The buggy address is located 8 bytes inside of
[   18.969187]  allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69)
[   18.969350] 
[   18.969376] The buggy address belongs to the physical page:
[   18.969409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   18.969463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.969513] page_type: f5(slab)
[   18.969554] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.969606] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.969648] page dumped because: kasan: bad access detected
[   18.969785] 
[   18.970185] Memory state around the buggy address:
[   18.970224]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   18.970771]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.970844] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   18.971724]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.974184]  __kasan_check_write+0x20/0x30
[   18.978212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.981207] page dumped because: kasan: bad access detected
[   18.986304] 
[   18.988952]  kasan_bitops_generic+0x110/0x1c8
[   18.992234]  kunit_try_run_case+0x170/0x3f0
[   18.992958] page_type: f5(slab)
[   18.993309]                                                           ^
[   18.995371] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261
[   18.995422] 
[   18.995458] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.995540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.996005] Hardware name: linux,dummy-virt (DT)
[   18.996054] Call trace:
[   18.996083]  show_stack+0x20/0x38 (C)
[   18.997149]  dump_stack_lvl+0x8c/0xd0
[   18.997222]  print_report+0x118/0x5d0
[   18.997274]  kasan_report+0xdc/0x128
[   18.997666]  kasan_check_range+0x100/0x1a8
[   18.997978]  __kasan_check_write+0x20/0x30
[   18.998152]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   19.000384]  kasan_save_stack+0x3c/0x68
[   19.000606]  kasan_bitops_generic+0xa0/0x1c8
[   19.002057]  ret_from_fork+0x10/0x20
[   19.002889] The buggy address is located 8 bytes inside of
[   19.002889]  allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69)
[   19.006018]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   19.007096] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.011929] ==================================================================
[   18.952570] ==================================================================
[   18.953366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   18.953452] Read of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261
[   18.953606] 
[   18.953650] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.953834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.954047] Hardware name: linux,dummy-virt (DT)
[   18.954081] Call trace:
[   18.954253]  show_stack+0x20/0x38 (C)
[   18.954330]  dump_stack_lvl+0x8c/0xd0
[   18.954380]  print_report+0x118/0x5d0
[   18.954852]  kasan_report+0xdc/0x128
[   18.955088]  __asan_report_load8_noabort+0x20/0x30
[   18.955156]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   18.955873]  kasan_bitops_generic+0x110/0x1c8
[   18.955937]  kunit_try_run_case+0x170/0x3f0
[   18.956605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.956835]  kthread+0x328/0x630
[   18.956882]  ret_from_fork+0x10/0x20
[   18.957334] 
[   18.957437] Allocated by task 261:
[   18.957609]  kasan_save_stack+0x3c/0x68
[   18.957663]  kasan_save_track+0x20/0x40
[   18.957702]  kasan_save_alloc_info+0x40/0x58
[   18.957743]  __kasan_kmalloc+0xd4/0xd8
[   18.957780]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.958366]  kasan_bitops_generic+0xa0/0x1c8
[   18.958415]  kunit_try_run_case+0x170/0x3f0
[   18.958456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.958502]  kthread+0x328/0x630
[   18.958536]  ret_from_fork+0x10/0x20
[   18.958746] 
[   18.958771] The buggy address belongs to the object at fff00000c5a02c60
[   18.958771]  which belongs to the cache kmalloc-16 of size 16
[   18.959124] The buggy address is located 8 bytes inside of
[   18.959124]  allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69)
[   18.959227] 
[   18.959532] The buggy address belongs to the physical page:
[   18.959572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   18.959892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.960097] page_type: f5(slab)
[   18.960221] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.960375] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.960525] page dumped because: kasan: bad access detected
[   18.960565] 
[   18.960586] Memory state around the buggy address:
[   18.961439]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   18.961541]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.961645] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   18.961745]                                                           ^
[   18.961999]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.962215]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.962261] ==================================================================

[   14.216122] ==================================================================
[   14.216599] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.217022] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.217394] 
[   14.217487] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.217529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.217540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.217560] Call Trace:
[   14.217573]  <TASK>
[   14.217586]  dump_stack_lvl+0x73/0xb0
[   14.217634]  print_report+0xd1/0x610
[   14.217666]  ? __virt_addr_valid+0x1db/0x2d0
[   14.217687]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.217741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.217788]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.217815]  kasan_report+0x141/0x180
[   14.217836]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.217878]  kasan_check_range+0x10c/0x1c0
[   14.217901]  __kasan_check_write+0x18/0x20
[   14.217920]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.217947]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.217974]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.217998]  ? trace_hardirqs_on+0x37/0xe0
[   14.218020]  ? kasan_bitops_generic+0x92/0x1c0
[   14.218047]  kasan_bitops_generic+0x116/0x1c0
[   14.218070]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.218096]  ? __pfx_read_tsc+0x10/0x10
[   14.218116]  ? ktime_get_ts64+0x86/0x230
[   14.218141]  kunit_try_run_case+0x1a5/0x480
[   14.218164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.218213]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.218237]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.218261]  ? __kthread_parkme+0x82/0x180
[   14.218291]  ? preempt_count_sub+0x50/0x80
[   14.218316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.218365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.218389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.218413]  kthread+0x337/0x6f0
[   14.218449]  ? trace_preempt_on+0x20/0xc0
[   14.218471]  ? __pfx_kthread+0x10/0x10
[   14.218492]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.218560]  ? calculate_sigpending+0x7b/0xa0
[   14.218584]  ? __pfx_kthread+0x10/0x10
[   14.218606]  ret_from_fork+0x116/0x1d0
[   14.218634]  ? __pfx_kthread+0x10/0x10
[   14.218655]  ret_from_fork_asm+0x1a/0x30
[   14.218687]  </TASK>
[   14.218697] 
[   14.227512] Allocated by task 279:
[   14.227715]  kasan_save_stack+0x45/0x70
[   14.227895]  kasan_save_track+0x18/0x40
[   14.228027]  kasan_save_alloc_info+0x3b/0x50
[   14.228172]  __kasan_kmalloc+0xb7/0xc0
[   14.228301]  __kmalloc_cache_noprof+0x189/0x420
[   14.228497]  kasan_bitops_generic+0x92/0x1c0
[   14.228830]  kunit_try_run_case+0x1a5/0x480
[   14.229127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.229357]  kthread+0x337/0x6f0
[   14.229484]  ret_from_fork+0x116/0x1d0
[   14.229845]  ret_from_fork_asm+0x1a/0x30
[   14.230076] 
[   14.230188] The buggy address belongs to the object at ffff888101684300
[   14.230188]  which belongs to the cache kmalloc-16 of size 16
[   14.230796] The buggy address is located 8 bytes inside of
[   14.230796]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.231264] 
[   14.231374] The buggy address belongs to the physical page:
[   14.231667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.232031] flags: 0x200000000000000(node=0|zone=2)
[   14.232222] page_type: f5(slab)
[   14.232426] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.232788] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.233122] page dumped because: kasan: bad access detected
[   14.233371] 
[   14.233472] Memory state around the buggy address:
[   14.233727]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.234048]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.234425] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.234778]                       ^
[   14.234964]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.235293]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.235684] ==================================================================
[   14.174371] ==================================================================
[   14.175452] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.175805] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.176021] 
[   14.176101] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.176142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.176153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.176173] Call Trace:
[   14.176187]  <TASK>
[   14.176202]  dump_stack_lvl+0x73/0xb0
[   14.176226]  print_report+0xd1/0x610
[   14.176403]  ? __virt_addr_valid+0x1db/0x2d0
[   14.176428]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.176469]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.176491]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.176517]  kasan_report+0x141/0x180
[   14.176578]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.176624]  kasan_check_range+0x10c/0x1c0
[   14.176661]  __kasan_check_write+0x18/0x20
[   14.176680]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.176720]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.176760]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.176798]  ? trace_hardirqs_on+0x37/0xe0
[   14.176833]  ? kasan_bitops_generic+0x92/0x1c0
[   14.176860]  kasan_bitops_generic+0x116/0x1c0
[   14.176884]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.176910]  ? __pfx_read_tsc+0x10/0x10
[   14.176930]  ? ktime_get_ts64+0x86/0x230
[   14.176959]  kunit_try_run_case+0x1a5/0x480
[   14.176982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.177005]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.177028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.177052]  ? __kthread_parkme+0x82/0x180
[   14.177072]  ? preempt_count_sub+0x50/0x80
[   14.177096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.177119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.177148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.177172]  kthread+0x337/0x6f0
[   14.177192]  ? trace_preempt_on+0x20/0xc0
[   14.177215]  ? __pfx_kthread+0x10/0x10
[   14.177234]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.177254]  ? calculate_sigpending+0x7b/0xa0
[   14.177278]  ? __pfx_kthread+0x10/0x10
[   14.177299]  ret_from_fork+0x116/0x1d0
[   14.177317]  ? __pfx_kthread+0x10/0x10
[   14.177336]  ret_from_fork_asm+0x1a/0x30
[   14.177369]  </TASK>
[   14.177378] 
[   14.186282] Allocated by task 279:
[   14.186482]  kasan_save_stack+0x45/0x70
[   14.186716]  kasan_save_track+0x18/0x40
[   14.186906]  kasan_save_alloc_info+0x3b/0x50
[   14.187132]  __kasan_kmalloc+0xb7/0xc0
[   14.187329]  __kmalloc_cache_noprof+0x189/0x420
[   14.187562]  kasan_bitops_generic+0x92/0x1c0
[   14.187811]  kunit_try_run_case+0x1a5/0x480
[   14.188068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.188325]  kthread+0x337/0x6f0
[   14.188498]  ret_from_fork+0x116/0x1d0
[   14.188679]  ret_from_fork_asm+0x1a/0x30
[   14.188874] 
[   14.188966] The buggy address belongs to the object at ffff888101684300
[   14.188966]  which belongs to the cache kmalloc-16 of size 16
[   14.189755] The buggy address is located 8 bytes inside of
[   14.189755]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.190273] 
[   14.190364] The buggy address belongs to the physical page:
[   14.190726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.191071] flags: 0x200000000000000(node=0|zone=2)
[   14.191301] page_type: f5(slab)
[   14.191415] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.191959] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.192291] page dumped because: kasan: bad access detected
[   14.192633] 
[   14.192753] Memory state around the buggy address:
[   14.192903]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.193229]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.193643] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.193958]                       ^
[   14.194129]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.194463]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.194769] ==================================================================
[   14.237014] ==================================================================
[   14.237770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.238169] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.238546] 
[   14.238689] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.238758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.238782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.238802] Call Trace:
[   14.238828]  <TASK>
[   14.238855]  dump_stack_lvl+0x73/0xb0
[   14.238897]  print_report+0xd1/0x610
[   14.238931]  ? __virt_addr_valid+0x1db/0x2d0
[   14.238966]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.238992]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.239014]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.239041]  kasan_report+0x141/0x180
[   14.239064]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.239096]  kasan_check_range+0x10c/0x1c0
[   14.239120]  __kasan_check_write+0x18/0x20
[   14.239139]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.239177]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.239206]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.239231]  ? trace_hardirqs_on+0x37/0xe0
[   14.239266]  ? kasan_bitops_generic+0x92/0x1c0
[   14.239294]  kasan_bitops_generic+0x116/0x1c0
[   14.239317]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.239342]  ? __pfx_read_tsc+0x10/0x10
[   14.239363]  ? ktime_get_ts64+0x86/0x230
[   14.239387]  kunit_try_run_case+0x1a5/0x480
[   14.239411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.239433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.239466]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.239490]  ? __kthread_parkme+0x82/0x180
[   14.239509]  ? preempt_count_sub+0x50/0x80
[   14.239533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.239557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.239582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.239606]  kthread+0x337/0x6f0
[   14.239625]  ? trace_preempt_on+0x20/0xc0
[   14.239646]  ? __pfx_kthread+0x10/0x10
[   14.239667]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.239688]  ? calculate_sigpending+0x7b/0xa0
[   14.239712]  ? __pfx_kthread+0x10/0x10
[   14.239734]  ret_from_fork+0x116/0x1d0
[   14.239752]  ? __pfx_kthread+0x10/0x10
[   14.239772]  ret_from_fork_asm+0x1a/0x30
[   14.239804]  </TASK>
[   14.239813] 
[   14.248207] Allocated by task 279:
[   14.248452]  kasan_save_stack+0x45/0x70
[   14.248875]  kasan_save_track+0x18/0x40
[   14.249069]  kasan_save_alloc_info+0x3b/0x50
[   14.249289]  __kasan_kmalloc+0xb7/0xc0
[   14.249481]  __kmalloc_cache_noprof+0x189/0x420
[   14.249766]  kasan_bitops_generic+0x92/0x1c0
[   14.249990]  kunit_try_run_case+0x1a5/0x480
[   14.250211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.250482]  kthread+0x337/0x6f0
[   14.250743]  ret_from_fork+0x116/0x1d0
[   14.250971]  ret_from_fork_asm+0x1a/0x30
[   14.251179] 
[   14.251277] The buggy address belongs to the object at ffff888101684300
[   14.251277]  which belongs to the cache kmalloc-16 of size 16
[   14.251894] The buggy address is located 8 bytes inside of
[   14.251894]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.252398] 
[   14.252490] The buggy address belongs to the physical page:
[   14.252811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.253184] flags: 0x200000000000000(node=0|zone=2)
[   14.253411] page_type: f5(slab)
[   14.253626] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.253966] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.254293] page dumped because: kasan: bad access detected
[   14.254579] 
[   14.254657] Memory state around the buggy address:
[   14.254808]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.255018]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.255229] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.255452]                       ^
[   14.255695]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.256020]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.256330] ==================================================================
[   14.153594] ==================================================================
[   14.154112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.154633] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.155173] 
[   14.155280] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.155321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.155332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.155352] Call Trace:
[   14.155365]  <TASK>
[   14.155379]  dump_stack_lvl+0x73/0xb0
[   14.155424]  print_report+0xd1/0x610
[   14.155455]  ? __virt_addr_valid+0x1db/0x2d0
[   14.155477]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.155503]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.155525]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.155558]  kasan_report+0x141/0x180
[   14.155580]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.155611]  kasan_check_range+0x10c/0x1c0
[   14.155634]  __kasan_check_write+0x18/0x20
[   14.155653]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.155678]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.155705]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.155729]  ? trace_hardirqs_on+0x37/0xe0
[   14.155750]  ? kasan_bitops_generic+0x92/0x1c0
[   14.155778]  kasan_bitops_generic+0x116/0x1c0
[   14.155801]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.155825]  ? __pfx_read_tsc+0x10/0x10
[   14.155844]  ? ktime_get_ts64+0x86/0x230
[   14.155868]  kunit_try_run_case+0x1a5/0x480
[   14.155892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.155914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.155939]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.155962]  ? __kthread_parkme+0x82/0x180
[   14.155981]  ? preempt_count_sub+0x50/0x80
[   14.156006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.156029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.156052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.156076]  kthread+0x337/0x6f0
[   14.156095]  ? trace_preempt_on+0x20/0xc0
[   14.156116]  ? __pfx_kthread+0x10/0x10
[   14.156136]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.156156]  ? calculate_sigpending+0x7b/0xa0
[   14.156181]  ? __pfx_kthread+0x10/0x10
[   14.156203]  ret_from_fork+0x116/0x1d0
[   14.156221]  ? __pfx_kthread+0x10/0x10
[   14.156241]  ret_from_fork_asm+0x1a/0x30
[   14.156273]  </TASK>
[   14.156281] 
[   14.165187] Allocated by task 279:
[   14.165350]  kasan_save_stack+0x45/0x70
[   14.165563]  kasan_save_track+0x18/0x40
[   14.165737]  kasan_save_alloc_info+0x3b/0x50
[   14.165954]  __kasan_kmalloc+0xb7/0xc0
[   14.166086]  __kmalloc_cache_noprof+0x189/0x420
[   14.166334]  kasan_bitops_generic+0x92/0x1c0
[   14.166542]  kunit_try_run_case+0x1a5/0x480
[   14.166769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.166968]  kthread+0x337/0x6f0
[   14.167089]  ret_from_fork+0x116/0x1d0
[   14.167223]  ret_from_fork_asm+0x1a/0x30
[   14.167364] 
[   14.167433] The buggy address belongs to the object at ffff888101684300
[   14.167433]  which belongs to the cache kmalloc-16 of size 16
[   14.168388] The buggy address is located 8 bytes inside of
[   14.168388]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.169190] 
[   14.169263] The buggy address belongs to the physical page:
[   14.169451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.170127] flags: 0x200000000000000(node=0|zone=2)
[   14.170431] page_type: f5(slab)
[   14.170668] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.170918] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.171256] page dumped because: kasan: bad access detected
[   14.171550] 
[   14.171621] Memory state around the buggy address:
[   14.171861]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.172216]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.172556] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.172877]                       ^
[   14.173073]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.173396]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.173805] ==================================================================
[   14.114361] ==================================================================
[   14.114802] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.115415] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.116200] 
[   14.116415] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.116466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.116477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.116497] Call Trace:
[   14.116508]  <TASK>
[   14.116522]  dump_stack_lvl+0x73/0xb0
[   14.116549]  print_report+0xd1/0x610
[   14.116580]  ? __virt_addr_valid+0x1db/0x2d0
[   14.116602]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.116626]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.116660]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.116686]  kasan_report+0x141/0x180
[   14.116707]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.116739]  kasan_check_range+0x10c/0x1c0
[   14.116762]  __kasan_check_write+0x18/0x20
[   14.116780]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.116807]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.116834]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.116857]  ? trace_hardirqs_on+0x37/0xe0
[   14.116878]  ? kasan_bitops_generic+0x92/0x1c0
[   14.116906]  kasan_bitops_generic+0x116/0x1c0
[   14.116929]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.116953]  ? __pfx_read_tsc+0x10/0x10
[   14.116973]  ? ktime_get_ts64+0x86/0x230
[   14.116997]  kunit_try_run_case+0x1a5/0x480
[   14.117030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.117052]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.117075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.117104]  ? __kthread_parkme+0x82/0x180
[   14.117124]  ? preempt_count_sub+0x50/0x80
[   14.117151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.117175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.117199]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.117222]  kthread+0x337/0x6f0
[   14.117240]  ? trace_preempt_on+0x20/0xc0
[   14.117261]  ? __pfx_kthread+0x10/0x10
[   14.117282]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.117302]  ? calculate_sigpending+0x7b/0xa0
[   14.117325]  ? __pfx_kthread+0x10/0x10
[   14.117347]  ret_from_fork+0x116/0x1d0
[   14.117365]  ? __pfx_kthread+0x10/0x10
[   14.117385]  ret_from_fork_asm+0x1a/0x30
[   14.117417]  </TASK>
[   14.117426] 
[   14.127814] Allocated by task 279:
[   14.127946]  kasan_save_stack+0x45/0x70
[   14.128090]  kasan_save_track+0x18/0x40
[   14.128225]  kasan_save_alloc_info+0x3b/0x50
[   14.128466]  __kasan_kmalloc+0xb7/0xc0
[   14.128651]  __kmalloc_cache_noprof+0x189/0x420
[   14.128915]  kasan_bitops_generic+0x92/0x1c0
[   14.129131]  kunit_try_run_case+0x1a5/0x480
[   14.129308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.129493]  kthread+0x337/0x6f0
[   14.129786]  ret_from_fork+0x116/0x1d0
[   14.129976]  ret_from_fork_asm+0x1a/0x30
[   14.130173] 
[   14.130303] The buggy address belongs to the object at ffff888101684300
[   14.130303]  which belongs to the cache kmalloc-16 of size 16
[   14.130773] The buggy address is located 8 bytes inside of
[   14.130773]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.131298] 
[   14.131394] The buggy address belongs to the physical page:
[   14.131681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.132022] flags: 0x200000000000000(node=0|zone=2)
[   14.132240] page_type: f5(slab)
[   14.132424] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.132776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.133086] page dumped because: kasan: bad access detected
[   14.133306] 
[   14.133420] Memory state around the buggy address:
[   14.133637]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.133857]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.134075] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.134290]                       ^
[   14.134494]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.134810]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.135130] ==================================================================
[   14.135918] ==================================================================
[   14.136272] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.136616] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.136916] 
[   14.137023] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.137063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.137073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.137093] Call Trace:
[   14.137104]  <TASK>
[   14.137117]  dump_stack_lvl+0x73/0xb0
[   14.137146]  print_report+0xd1/0x610
[   14.137166]  ? __virt_addr_valid+0x1db/0x2d0
[   14.137186]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.137211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.137231]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.137256]  kasan_report+0x141/0x180
[   14.137276]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.137306]  kasan_check_range+0x10c/0x1c0
[   14.137328]  __kasan_check_write+0x18/0x20
[   14.137346]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.137371]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.137396]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.137418]  ? trace_hardirqs_on+0x37/0xe0
[   14.137457]  ? kasan_bitops_generic+0x92/0x1c0
[   14.137484]  kasan_bitops_generic+0x116/0x1c0
[   14.137507]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.137530]  ? __pfx_read_tsc+0x10/0x10
[   14.137549]  ? ktime_get_ts64+0x86/0x230
[   14.137572]  kunit_try_run_case+0x1a5/0x480
[   14.137594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.137615]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.137638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.137661]  ? __kthread_parkme+0x82/0x180
[   14.137680]  ? preempt_count_sub+0x50/0x80
[   14.137703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.137725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.137748]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.137784]  kthread+0x337/0x6f0
[   14.137803]  ? trace_preempt_on+0x20/0xc0
[   14.137824]  ? __pfx_kthread+0x10/0x10
[   14.137844]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.137865]  ? calculate_sigpending+0x7b/0xa0
[   14.137889]  ? __pfx_kthread+0x10/0x10
[   14.137910]  ret_from_fork+0x116/0x1d0
[   14.137928]  ? __pfx_kthread+0x10/0x10
[   14.137947]  ret_from_fork_asm+0x1a/0x30
[   14.137979]  </TASK>
[   14.137999] 
[   14.146183] Allocated by task 279:
[   14.146310]  kasan_save_stack+0x45/0x70
[   14.146456]  kasan_save_track+0x18/0x40
[   14.146763]  kasan_save_alloc_info+0x3b/0x50
[   14.146999]  __kasan_kmalloc+0xb7/0xc0
[   14.147204]  __kmalloc_cache_noprof+0x189/0x420
[   14.147429]  kasan_bitops_generic+0x92/0x1c0
[   14.147663]  kunit_try_run_case+0x1a5/0x480
[   14.147818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.148020]  kthread+0x337/0x6f0
[   14.148203]  ret_from_fork+0x116/0x1d0
[   14.148384]  ret_from_fork_asm+0x1a/0x30
[   14.148548] 
[   14.148642] The buggy address belongs to the object at ffff888101684300
[   14.148642]  which belongs to the cache kmalloc-16 of size 16
[   14.149080] The buggy address is located 8 bytes inside of
[   14.149080]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.149565] 
[   14.149672] The buggy address belongs to the physical page:
[   14.149864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.150214] flags: 0x200000000000000(node=0|zone=2)
[   14.150424] page_type: f5(slab)
[   14.150650] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.150955] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.151263] page dumped because: kasan: bad access detected
[   14.151511] 
[   14.151639] Memory state around the buggy address:
[   14.151835]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.152146]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.152394] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.152610]                       ^
[   14.152728]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.152935]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.153143] ==================================================================
[   14.195779] ==================================================================
[   14.196164] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.196616] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.196937] 
[   14.197060] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.197134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.197145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.197178] Call Trace:
[   14.197203]  <TASK>
[   14.197217]  dump_stack_lvl+0x73/0xb0
[   14.197257]  print_report+0xd1/0x610
[   14.197291]  ? __virt_addr_valid+0x1db/0x2d0
[   14.197325]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.197365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.197401]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.197453]  kasan_report+0x141/0x180
[   14.197484]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.197515]  kasan_check_range+0x10c/0x1c0
[   14.197550]  __kasan_check_write+0x18/0x20
[   14.197569]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.197595]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.197622]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.197645]  ? trace_hardirqs_on+0x37/0xe0
[   14.197666]  ? kasan_bitops_generic+0x92/0x1c0
[   14.197693]  kasan_bitops_generic+0x116/0x1c0
[   14.197717]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.197741]  ? __pfx_read_tsc+0x10/0x10
[   14.197761]  ? ktime_get_ts64+0x86/0x230
[   14.197785]  kunit_try_run_case+0x1a5/0x480
[   14.197809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.197831]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.197854]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.197878]  ? __kthread_parkme+0x82/0x180
[   14.197898]  ? preempt_count_sub+0x50/0x80
[   14.197922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.197945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.197969]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.197994]  kthread+0x337/0x6f0
[   14.198011]  ? trace_preempt_on+0x20/0xc0
[   14.198033]  ? __pfx_kthread+0x10/0x10
[   14.198053]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.198074]  ? calculate_sigpending+0x7b/0xa0
[   14.198098]  ? __pfx_kthread+0x10/0x10
[   14.198119]  ret_from_fork+0x116/0x1d0
[   14.198137]  ? __pfx_kthread+0x10/0x10
[   14.198156]  ret_from_fork_asm+0x1a/0x30
[   14.198189]  </TASK>
[   14.198198] 
[   14.207253] Allocated by task 279:
[   14.207452]  kasan_save_stack+0x45/0x70
[   14.207684]  kasan_save_track+0x18/0x40
[   14.207893]  kasan_save_alloc_info+0x3b/0x50
[   14.208124]  __kasan_kmalloc+0xb7/0xc0
[   14.208309]  __kmalloc_cache_noprof+0x189/0x420
[   14.208573]  kasan_bitops_generic+0x92/0x1c0
[   14.208852]  kunit_try_run_case+0x1a5/0x480
[   14.209087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.209341]  kthread+0x337/0x6f0
[   14.209526]  ret_from_fork+0x116/0x1d0
[   14.209740]  ret_from_fork_asm+0x1a/0x30
[   14.210041] 
[   14.210156] The buggy address belongs to the object at ffff888101684300
[   14.210156]  which belongs to the cache kmalloc-16 of size 16
[   14.210668] The buggy address is located 8 bytes inside of
[   14.210668]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.211211] 
[   14.211284] The buggy address belongs to the physical page:
[   14.211564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.211993] flags: 0x200000000000000(node=0|zone=2)
[   14.212219] page_type: f5(slab)
[   14.212396] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.212715] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.213059] page dumped because: kasan: bad access detected
[   14.213275] 
[   14.213345] Memory state around the buggy address:
[   14.213529]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.213852]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.214161] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.214505]                       ^
[   14.214693]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.214943]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.215147] ==================================================================
[   14.083813] ==================================================================
[   14.084406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.085006] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.085642] 
[   14.085791] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.085952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.085966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.086059] Call Trace:
[   14.086073]  <TASK>
[   14.086087]  dump_stack_lvl+0x73/0xb0
[   14.086118]  print_report+0xd1/0x610
[   14.086140]  ? __virt_addr_valid+0x1db/0x2d0
[   14.086163]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.086188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.086211]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.086238]  kasan_report+0x141/0x180
[   14.086259]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.086291]  kasan_check_range+0x10c/0x1c0
[   14.086314]  __kasan_check_write+0x18/0x20
[   14.086333]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.086359]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.086386]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.086422]  ? trace_hardirqs_on+0x37/0xe0
[   14.086457]  ? kasan_bitops_generic+0x92/0x1c0
[   14.086485]  kasan_bitops_generic+0x116/0x1c0
[   14.086508]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.086533]  ? __pfx_read_tsc+0x10/0x10
[   14.086553]  ? ktime_get_ts64+0x86/0x230
[   14.086578]  kunit_try_run_case+0x1a5/0x480
[   14.086601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.086623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.086648]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.086671]  ? __kthread_parkme+0x82/0x180
[   14.086690]  ? preempt_count_sub+0x50/0x80
[   14.086713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.086737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.086760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.086784]  kthread+0x337/0x6f0
[   14.086803]  ? trace_preempt_on+0x20/0xc0
[   14.086824]  ? __pfx_kthread+0x10/0x10
[   14.086844]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.086865]  ? calculate_sigpending+0x7b/0xa0
[   14.086888]  ? __pfx_kthread+0x10/0x10
[   14.086909]  ret_from_fork+0x116/0x1d0
[   14.086927]  ? __pfx_kthread+0x10/0x10
[   14.086946]  ret_from_fork_asm+0x1a/0x30
[   14.086978]  </TASK>
[   14.086987] 
[   14.100160] Allocated by task 279:
[   14.100516]  kasan_save_stack+0x45/0x70
[   14.101069]  kasan_save_track+0x18/0x40
[   14.101283]  kasan_save_alloc_info+0x3b/0x50
[   14.101505]  __kasan_kmalloc+0xb7/0xc0
[   14.101963]  __kmalloc_cache_noprof+0x189/0x420
[   14.102213]  kasan_bitops_generic+0x92/0x1c0
[   14.102548]  kunit_try_run_case+0x1a5/0x480
[   14.103026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.103375]  kthread+0x337/0x6f0
[   14.103599]  ret_from_fork+0x116/0x1d0
[   14.103781]  ret_from_fork_asm+0x1a/0x30
[   14.104280] 
[   14.104365] The buggy address belongs to the object at ffff888101684300
[   14.104365]  which belongs to the cache kmalloc-16 of size 16
[   14.105247] The buggy address is located 8 bytes inside of
[   14.105247]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.106184] 
[   14.106265] The buggy address belongs to the physical page:
[   14.106697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.107545] flags: 0x200000000000000(node=0|zone=2)
[   14.108098] page_type: f5(slab)
[   14.108351] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.108895] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.109135] page dumped because: kasan: bad access detected
[   14.109311] 
[   14.109381] Memory state around the buggy address:
[   14.110036]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.110777]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.111391] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.112137]                       ^
[   14.112514]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.113262]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.113853] ==================================================================

[   14.602909] ==================================================================
[   14.603979] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.604866] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.605611] 
[   14.605842] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.605897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.605910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.605931] Call Trace:
[   14.605950]  <TASK>
[   14.605970]  dump_stack_lvl+0x73/0xb0
[   14.606099]  print_report+0xd1/0x610
[   14.606127]  ? __virt_addr_valid+0x1db/0x2d0
[   14.606151]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.606177]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.606199]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.606225]  kasan_report+0x141/0x180
[   14.606247]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.606278]  kasan_check_range+0x10c/0x1c0
[   14.606302]  __kasan_check_write+0x18/0x20
[   14.606320]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.606346]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.606373]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.606399]  ? kasan_bitops_generic+0x92/0x1c0
[   14.606425]  kasan_bitops_generic+0x116/0x1c0
[   14.606449]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.606472]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.606500]  kunit_try_run_case+0x1a5/0x480
[   14.606525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.606547]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.606572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.606595]  ? __kthread_parkme+0x82/0x180
[   14.606615]  ? preempt_count_sub+0x50/0x80
[   14.606639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.606663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.606689]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.606713]  kthread+0x337/0x6f0
[   14.606731]  ? trace_preempt_on+0x20/0xc0
[   14.606754]  ? __pfx_kthread+0x10/0x10
[   14.606773]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.606794]  ? calculate_sigpending+0x7b/0xa0
[   14.606819]  ? __pfx_kthread+0x10/0x10
[   14.606840]  ret_from_fork+0x116/0x1d0
[   14.606860]  ? __pfx_kthread+0x10/0x10
[   14.606882]  ret_from_fork_asm+0x1a/0x30
[   14.606913]  </TASK>
[   14.606923] 
[   14.615622] Allocated by task 278:
[   14.615810]  kasan_save_stack+0x45/0x70
[   14.616253]  kasan_save_track+0x18/0x40
[   14.616408]  kasan_save_alloc_info+0x3b/0x50
[   14.616639]  __kasan_kmalloc+0xb7/0xc0
[   14.616831]  __kmalloc_cache_noprof+0x189/0x420
[   14.617155]  kasan_bitops_generic+0x92/0x1c0
[   14.617370]  kunit_try_run_case+0x1a5/0x480
[   14.617606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.617823]  kthread+0x337/0x6f0
[   14.617947]  ret_from_fork+0x116/0x1d0
[   14.618248]  ret_from_fork_asm+0x1a/0x30
[   14.618459] 
[   14.618585] The buggy address belongs to the object at ffff888102712180
[   14.618585]  which belongs to the cache kmalloc-16 of size 16
[   14.619209] The buggy address is located 8 bytes inside of
[   14.619209]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.619685] 
[   14.619786] The buggy address belongs to the physical page:
[   14.620364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.620737] flags: 0x200000000000000(node=0|zone=2)
[   14.620941] page_type: f5(slab)
[   14.621211] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.621531] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.621835] page dumped because: kasan: bad access detected
[   14.622162] 
[   14.622239] Memory state around the buggy address:
[   14.622495]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.622738]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.622957] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.623343]                       ^
[   14.623542]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.623865]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.624432] ==================================================================
[   14.472553] ==================================================================
[   14.472881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.473267] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.473898] 
[   14.474158] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.474210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.474221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.474244] Call Trace:
[   14.474265]  <TASK>
[   14.474285]  dump_stack_lvl+0x73/0xb0
[   14.474318]  print_report+0xd1/0x610
[   14.474342]  ? __virt_addr_valid+0x1db/0x2d0
[   14.474367]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.474392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.474415]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.474453]  kasan_report+0x141/0x180
[   14.474475]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.474505]  kasan_check_range+0x10c/0x1c0
[   14.474529]  __kasan_check_write+0x18/0x20
[   14.474547]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.474574]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.474602]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.474628]  ? kasan_bitops_generic+0x92/0x1c0
[   14.474655]  kasan_bitops_generic+0x116/0x1c0
[   14.474678]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.474702]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.474730]  kunit_try_run_case+0x1a5/0x480
[   14.474755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.474778]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.474802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.474826]  ? __kthread_parkme+0x82/0x180
[   14.474847]  ? preempt_count_sub+0x50/0x80
[   14.474873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.474897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.474922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.474946]  kthread+0x337/0x6f0
[   14.474964]  ? trace_preempt_on+0x20/0xc0
[   14.474987]  ? __pfx_kthread+0x10/0x10
[   14.475007]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.475103]  ? calculate_sigpending+0x7b/0xa0
[   14.475128]  ? __pfx_kthread+0x10/0x10
[   14.475149]  ret_from_fork+0x116/0x1d0
[   14.475169]  ? __pfx_kthread+0x10/0x10
[   14.475189]  ret_from_fork_asm+0x1a/0x30
[   14.475220]  </TASK>
[   14.475230] 
[   14.490796] Allocated by task 278:
[   14.490957]  kasan_save_stack+0x45/0x70
[   14.491430]  kasan_save_track+0x18/0x40
[   14.491799]  kasan_save_alloc_info+0x3b/0x50
[   14.492253]  __kasan_kmalloc+0xb7/0xc0
[   14.493104]  __kmalloc_cache_noprof+0x189/0x420
[   14.493572]  kasan_bitops_generic+0x92/0x1c0
[   14.494174]  kunit_try_run_case+0x1a5/0x480
[   14.494654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.494970]  kthread+0x337/0x6f0
[   14.495334]  ret_from_fork+0x116/0x1d0
[   14.495676]  ret_from_fork_asm+0x1a/0x30
[   14.496245] 
[   14.496426] The buggy address belongs to the object at ffff888102712180
[   14.496426]  which belongs to the cache kmalloc-16 of size 16
[   14.497240] The buggy address is located 8 bytes inside of
[   14.497240]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.498563] 
[   14.498644] The buggy address belongs to the physical page:
[   14.498843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.499701] flags: 0x200000000000000(node=0|zone=2)
[   14.500684] page_type: f5(slab)
[   14.500823] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.501270] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.501957] page dumped because: kasan: bad access detected
[   14.502741] 
[   14.502953] Memory state around the buggy address:
[   14.503545]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.503953]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.504530] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.505247]                       ^
[   14.505629]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.506386]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.506979] ==================================================================
[   14.544219] ==================================================================
[   14.545150] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.546152] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.546996] 
[   14.547337] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.547391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.547403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.547426] Call Trace:
[   14.547439]  <TASK>
[   14.547460]  dump_stack_lvl+0x73/0xb0
[   14.547498]  print_report+0xd1/0x610
[   14.547521]  ? __virt_addr_valid+0x1db/0x2d0
[   14.547545]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.547572]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.547594]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.547620]  kasan_report+0x141/0x180
[   14.547641]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.547671]  kasan_check_range+0x10c/0x1c0
[   14.547694]  __kasan_check_write+0x18/0x20
[   14.547713]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.547739]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.547765]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.547791]  ? kasan_bitops_generic+0x92/0x1c0
[   14.547817]  kasan_bitops_generic+0x116/0x1c0
[   14.547841]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.547864]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.547892]  kunit_try_run_case+0x1a5/0x480
[   14.547917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.547938]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.547963]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.547986]  ? __kthread_parkme+0x82/0x180
[   14.548007]  ? preempt_count_sub+0x50/0x80
[   14.548047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.548070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.548094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.548119]  kthread+0x337/0x6f0
[   14.548137]  ? trace_preempt_on+0x20/0xc0
[   14.548160]  ? __pfx_kthread+0x10/0x10
[   14.548191]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.548213]  ? calculate_sigpending+0x7b/0xa0
[   14.548238]  ? __pfx_kthread+0x10/0x10
[   14.548258]  ret_from_fork+0x116/0x1d0
[   14.548278]  ? __pfx_kthread+0x10/0x10
[   14.548297]  ret_from_fork_asm+0x1a/0x30
[   14.548328]  </TASK>
[   14.548339] 
[   14.560989] Allocated by task 278:
[   14.561333]  kasan_save_stack+0x45/0x70
[   14.561555]  kasan_save_track+0x18/0x40
[   14.561816]  kasan_save_alloc_info+0x3b/0x50
[   14.561969]  __kasan_kmalloc+0xb7/0xc0
[   14.562144]  __kmalloc_cache_noprof+0x189/0x420
[   14.562367]  kasan_bitops_generic+0x92/0x1c0
[   14.562583]  kunit_try_run_case+0x1a5/0x480
[   14.562763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.563257]  kthread+0x337/0x6f0
[   14.563400]  ret_from_fork+0x116/0x1d0
[   14.563536]  ret_from_fork_asm+0x1a/0x30
[   14.563754] 
[   14.563853] The buggy address belongs to the object at ffff888102712180
[   14.563853]  which belongs to the cache kmalloc-16 of size 16
[   14.564759] The buggy address is located 8 bytes inside of
[   14.564759]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.565329] 
[   14.565409] The buggy address belongs to the physical page:
[   14.565716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.566072] flags: 0x200000000000000(node=0|zone=2)
[   14.566379] page_type: f5(slab)
[   14.566596] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.567002] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.567321] page dumped because: kasan: bad access detected
[   14.567497] 
[   14.567566] Memory state around the buggy address:
[   14.567722]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.568401]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.568706] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.569039]                       ^
[   14.569177]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.569575]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.569851] ==================================================================
[   14.624977] ==================================================================
[   14.625380] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.625728] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.626044] 
[   14.626153] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.626199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.626211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.626233] Call Trace:
[   14.626252]  <TASK>
[   14.626271]  dump_stack_lvl+0x73/0xb0
[   14.626300]  print_report+0xd1/0x610
[   14.626322]  ? __virt_addr_valid+0x1db/0x2d0
[   14.626345]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.626372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.626394]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.626550]  kasan_report+0x141/0x180
[   14.626576]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.626607]  kasan_check_range+0x10c/0x1c0
[   14.626631]  __kasan_check_write+0x18/0x20
[   14.626650]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.626675]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.626703]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.626730]  ? kasan_bitops_generic+0x92/0x1c0
[   14.626758]  kasan_bitops_generic+0x116/0x1c0
[   14.626781]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.626805]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.626833]  kunit_try_run_case+0x1a5/0x480
[   14.626858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.626880]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.626904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.626927]  ? __kthread_parkme+0x82/0x180
[   14.626948]  ? preempt_count_sub+0x50/0x80
[   14.626972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.627065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.627094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.627119]  kthread+0x337/0x6f0
[   14.627138]  ? trace_preempt_on+0x20/0xc0
[   14.627161]  ? __pfx_kthread+0x10/0x10
[   14.627181]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.627205]  ? calculate_sigpending+0x7b/0xa0
[   14.627229]  ? __pfx_kthread+0x10/0x10
[   14.627250]  ret_from_fork+0x116/0x1d0
[   14.627268]  ? __pfx_kthread+0x10/0x10
[   14.627288]  ret_from_fork_asm+0x1a/0x30
[   14.627318]  </TASK>
[   14.627330] 
[   14.635825] Allocated by task 278:
[   14.636254]  kasan_save_stack+0x45/0x70
[   14.636460]  kasan_save_track+0x18/0x40
[   14.636692]  kasan_save_alloc_info+0x3b/0x50
[   14.636858]  __kasan_kmalloc+0xb7/0xc0
[   14.636992]  __kmalloc_cache_noprof+0x189/0x420
[   14.637241]  kasan_bitops_generic+0x92/0x1c0
[   14.637390]  kunit_try_run_case+0x1a5/0x480
[   14.637561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.637747]  kthread+0x337/0x6f0
[   14.637914]  ret_from_fork+0x116/0x1d0
[   14.638212]  ret_from_fork_asm+0x1a/0x30
[   14.638418] 
[   14.638512] The buggy address belongs to the object at ffff888102712180
[   14.638512]  which belongs to the cache kmalloc-16 of size 16
[   14.639048] The buggy address is located 8 bytes inside of
[   14.639048]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.639562] 
[   14.639657] The buggy address belongs to the physical page:
[   14.639912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.640278] flags: 0x200000000000000(node=0|zone=2)
[   14.640871] page_type: f5(slab)
[   14.641140] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.641515] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.641826] page dumped because: kasan: bad access detected
[   14.642163] 
[   14.642259] Memory state around the buggy address:
[   14.642489]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.642800]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.643174] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.643469]                       ^
[   14.643641]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.643911]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.644454] ==================================================================
[   14.435314] ==================================================================
[   14.436646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.436946] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.437660] 
[   14.437864] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.437915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.437927] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.437951] Call Trace:
[   14.437965]  <TASK>
[   14.437984]  dump_stack_lvl+0x73/0xb0
[   14.438092]  print_report+0xd1/0x610
[   14.438119]  ? __virt_addr_valid+0x1db/0x2d0
[   14.438143]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.438170]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.438192]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.438219]  kasan_report+0x141/0x180
[   14.438240]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.438271]  kasan_check_range+0x10c/0x1c0
[   14.438294]  __kasan_check_write+0x18/0x20
[   14.438314]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.438339]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.438367]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.438393]  ? kasan_bitops_generic+0x92/0x1c0
[   14.438419]  kasan_bitops_generic+0x116/0x1c0
[   14.438453]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.438477]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.438504]  kunit_try_run_case+0x1a5/0x480
[   14.438529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.438552]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.438577]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.438601]  ? __kthread_parkme+0x82/0x180
[   14.438621]  ? preempt_count_sub+0x50/0x80
[   14.438646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.438670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.438693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.438717]  kthread+0x337/0x6f0
[   14.438736]  ? trace_preempt_on+0x20/0xc0
[   14.438760]  ? __pfx_kthread+0x10/0x10
[   14.438779]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.438801]  ? calculate_sigpending+0x7b/0xa0
[   14.438825]  ? __pfx_kthread+0x10/0x10
[   14.438846]  ret_from_fork+0x116/0x1d0
[   14.438865]  ? __pfx_kthread+0x10/0x10
[   14.438885]  ret_from_fork_asm+0x1a/0x30
[   14.438916]  </TASK>
[   14.438927] 
[   14.454888] Allocated by task 278:
[   14.455485]  kasan_save_stack+0x45/0x70
[   14.455880]  kasan_save_track+0x18/0x40
[   14.456492]  kasan_save_alloc_info+0x3b/0x50
[   14.456946]  __kasan_kmalloc+0xb7/0xc0
[   14.457415]  __kmalloc_cache_noprof+0x189/0x420
[   14.457966]  kasan_bitops_generic+0x92/0x1c0
[   14.458402]  kunit_try_run_case+0x1a5/0x480
[   14.458563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.458741]  kthread+0x337/0x6f0
[   14.458863]  ret_from_fork+0x116/0x1d0
[   14.458997]  ret_from_fork_asm+0x1a/0x30
[   14.459958] 
[   14.460281] The buggy address belongs to the object at ffff888102712180
[   14.460281]  which belongs to the cache kmalloc-16 of size 16
[   14.461783] The buggy address is located 8 bytes inside of
[   14.461783]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.463201] 
[   14.463570] The buggy address belongs to the physical page:
[   14.463968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.464901] flags: 0x200000000000000(node=0|zone=2)
[   14.465307] page_type: f5(slab)
[   14.465822] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.466258] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.467131] page dumped because: kasan: bad access detected
[   14.467623] 
[   14.467700] Memory state around the buggy address:
[   14.467857]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.468084]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.468766] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.469601]                       ^
[   14.470047]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.470708]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.471590] ==================================================================
[   14.570548] ==================================================================
[   14.570874] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.571317] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.571702] 
[   14.571812] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.571859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.571870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.571892] Call Trace:
[   14.571905]  <TASK>
[   14.571924]  dump_stack_lvl+0x73/0xb0
[   14.571955]  print_report+0xd1/0x610
[   14.571978]  ? __virt_addr_valid+0x1db/0x2d0
[   14.572002]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.572040]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.572062]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.572089]  kasan_report+0x141/0x180
[   14.572111]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.572142]  kasan_check_range+0x10c/0x1c0
[   14.572165]  __kasan_check_write+0x18/0x20
[   14.572183]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.572209]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.572236]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.572262]  ? kasan_bitops_generic+0x92/0x1c0
[   14.572625]  kasan_bitops_generic+0x116/0x1c0
[   14.572651]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.572675]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.572703]  kunit_try_run_case+0x1a5/0x480
[   14.572727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.572749]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.572775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.572798]  ? __kthread_parkme+0x82/0x180
[   14.572819]  ? preempt_count_sub+0x50/0x80
[   14.572855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.572879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.572902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.572927]  kthread+0x337/0x6f0
[   14.572945]  ? trace_preempt_on+0x20/0xc0
[   14.572968]  ? __pfx_kthread+0x10/0x10
[   14.572988]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.573022]  ? calculate_sigpending+0x7b/0xa0
[   14.573387]  ? __pfx_kthread+0x10/0x10
[   14.573409]  ret_from_fork+0x116/0x1d0
[   14.573428]  ? __pfx_kthread+0x10/0x10
[   14.573449]  ret_from_fork_asm+0x1a/0x30
[   14.573480]  </TASK>
[   14.573491] 
[   14.587329] Allocated by task 278:
[   14.587543]  kasan_save_stack+0x45/0x70
[   14.587753]  kasan_save_track+0x18/0x40
[   14.587936]  kasan_save_alloc_info+0x3b/0x50
[   14.588907]  __kasan_kmalloc+0xb7/0xc0
[   14.589255]  __kmalloc_cache_noprof+0x189/0x420
[   14.589752]  kasan_bitops_generic+0x92/0x1c0
[   14.590223]  kunit_try_run_case+0x1a5/0x480
[   14.590540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.590907]  kthread+0x337/0x6f0
[   14.591148]  ret_from_fork+0x116/0x1d0
[   14.591331]  ret_from_fork_asm+0x1a/0x30
[   14.591900] 
[   14.591991] The buggy address belongs to the object at ffff888102712180
[   14.591991]  which belongs to the cache kmalloc-16 of size 16
[   14.592937] The buggy address is located 8 bytes inside of
[   14.592937]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.594271] 
[   14.594456] The buggy address belongs to the physical page:
[   14.594947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.596244] flags: 0x200000000000000(node=0|zone=2)
[   14.596660] page_type: f5(slab)
[   14.596998] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.597327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.597937] page dumped because: kasan: bad access detected
[   14.598413] 
[   14.598510] Memory state around the buggy address:
[   14.598721]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.599369]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.599914] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.600683]                       ^
[   14.600864]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.601453]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.601969] ==================================================================
[   14.507871] ==================================================================
[   14.508621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.509335] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.510176] 
[   14.510396] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.510448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.510460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.510481] Call Trace:
[   14.510501]  <TASK>
[   14.510520]  dump_stack_lvl+0x73/0xb0
[   14.510559]  print_report+0xd1/0x610
[   14.510583]  ? __virt_addr_valid+0x1db/0x2d0
[   14.510606]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.510632]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.510654]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.510680]  kasan_report+0x141/0x180
[   14.510701]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.510756]  kasan_check_range+0x10c/0x1c0
[   14.510779]  __kasan_check_write+0x18/0x20
[   14.510799]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.510824]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.510851]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.510877]  ? kasan_bitops_generic+0x92/0x1c0
[   14.510904]  kasan_bitops_generic+0x116/0x1c0
[   14.510928]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.510951]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.510980]  kunit_try_run_case+0x1a5/0x480
[   14.511005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.511039]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.511065]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.511090]  ? __kthread_parkme+0x82/0x180
[   14.511111]  ? preempt_count_sub+0x50/0x80
[   14.511136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.511160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.511184]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.511208]  kthread+0x337/0x6f0
[   14.511226]  ? trace_preempt_on+0x20/0xc0
[   14.511250]  ? __pfx_kthread+0x10/0x10
[   14.511270]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.511292]  ? calculate_sigpending+0x7b/0xa0
[   14.511316]  ? __pfx_kthread+0x10/0x10
[   14.511337]  ret_from_fork+0x116/0x1d0
[   14.511356]  ? __pfx_kthread+0x10/0x10
[   14.511376]  ret_from_fork_asm+0x1a/0x30
[   14.511408]  </TASK>
[   14.511417] 
[   14.527508] Allocated by task 278:
[   14.527871]  kasan_save_stack+0x45/0x70
[   14.528316]  kasan_save_track+0x18/0x40
[   14.528892]  kasan_save_alloc_info+0x3b/0x50
[   14.529415]  __kasan_kmalloc+0xb7/0xc0
[   14.529915]  __kmalloc_cache_noprof+0x189/0x420
[   14.530328]  kasan_bitops_generic+0x92/0x1c0
[   14.530791]  kunit_try_run_case+0x1a5/0x480
[   14.531160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.531744]  kthread+0x337/0x6f0
[   14.531922]  ret_from_fork+0x116/0x1d0
[   14.532392]  ret_from_fork_asm+0x1a/0x30
[   14.532934] 
[   14.533145] The buggy address belongs to the object at ffff888102712180
[   14.533145]  which belongs to the cache kmalloc-16 of size 16
[   14.533938] The buggy address is located 8 bytes inside of
[   14.533938]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.535078] 
[   14.535322] The buggy address belongs to the physical page:
[   14.535647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.535896] flags: 0x200000000000000(node=0|zone=2)
[   14.536534] page_type: f5(slab)
[   14.536873] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.537697] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.538424] page dumped because: kasan: bad access detected
[   14.539134] 
[   14.539211] Memory state around the buggy address:
[   14.539372]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.539975]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.541046] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.541689]                       ^
[   14.542051]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.542653]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.542983] ==================================================================
[   14.644971] ==================================================================
[   14.645410] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.645816] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.646205] 
[   14.646324] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.646372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.646384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.646406] Call Trace:
[   14.646425]  <TASK>
[   14.646443]  dump_stack_lvl+0x73/0xb0
[   14.646473]  print_report+0xd1/0x610
[   14.646523]  ? __virt_addr_valid+0x1db/0x2d0
[   14.646548]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.646573]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.646595]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.646621]  kasan_report+0x141/0x180
[   14.646643]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.646673]  kasan_check_range+0x10c/0x1c0
[   14.646696]  __kasan_check_write+0x18/0x20
[   14.646715]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.646741]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.646767]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.646792]  ? kasan_bitops_generic+0x92/0x1c0
[   14.646819]  kasan_bitops_generic+0x116/0x1c0
[   14.646843]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.646866]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.646894]  kunit_try_run_case+0x1a5/0x480
[   14.646918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.646940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.646965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.646989]  ? __kthread_parkme+0x82/0x180
[   14.647098]  ? preempt_count_sub+0x50/0x80
[   14.647122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.647146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.647170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.647195]  kthread+0x337/0x6f0
[   14.647213]  ? trace_preempt_on+0x20/0xc0
[   14.647236]  ? __pfx_kthread+0x10/0x10
[   14.647256]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.647277]  ? calculate_sigpending+0x7b/0xa0
[   14.647302]  ? __pfx_kthread+0x10/0x10
[   14.647322]  ret_from_fork+0x116/0x1d0
[   14.647341]  ? __pfx_kthread+0x10/0x10
[   14.647361]  ret_from_fork_asm+0x1a/0x30
[   14.647392]  </TASK>
[   14.647402] 
[   14.655804] Allocated by task 278:
[   14.656282]  kasan_save_stack+0x45/0x70
[   14.656516]  kasan_save_track+0x18/0x40
[   14.656731]  kasan_save_alloc_info+0x3b/0x50
[   14.656949]  __kasan_kmalloc+0xb7/0xc0
[   14.657226]  __kmalloc_cache_noprof+0x189/0x420
[   14.657455]  kasan_bitops_generic+0x92/0x1c0
[   14.657689]  kunit_try_run_case+0x1a5/0x480
[   14.657899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.658094]  kthread+0x337/0x6f0
[   14.658270]  ret_from_fork+0x116/0x1d0
[   14.658455]  ret_from_fork_asm+0x1a/0x30
[   14.658632] 
[   14.658726] The buggy address belongs to the object at ffff888102712180
[   14.658726]  which belongs to the cache kmalloc-16 of size 16
[   14.659224] The buggy address is located 8 bytes inside of
[   14.659224]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.659687] 
[   14.659781] The buggy address belongs to the physical page:
[   14.660302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.660678] flags: 0x200000000000000(node=0|zone=2)
[   14.660902] page_type: f5(slab)
[   14.661160] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.661507] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.661801] page dumped because: kasan: bad access detected
[   14.662137] 
[   14.662213] Memory state around the buggy address:
[   14.662439]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.662746]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.663107] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.663372]                       ^
[   14.663578]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.663862]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.664446] ==================================================================

[   14.256956] ==================================================================
[   14.257751] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.258143] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.259802] 
[   14.259952] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.259998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.260009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.260031] Call Trace:
[   14.260043]  <TASK>
[   14.260058]  dump_stack_lvl+0x73/0xb0
[   14.260089]  print_report+0xd1/0x610
[   14.260112]  ? __virt_addr_valid+0x1db/0x2d0
[   14.260136]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.260161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.260184]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.260211]  kasan_report+0x141/0x180
[   14.260232]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.260265]  kasan_check_range+0x10c/0x1c0
[   14.260288]  __kasan_check_write+0x18/0x20
[   14.260308]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.260335]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.260362]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.260386]  ? trace_hardirqs_on+0x37/0xe0
[   14.260409]  ? kasan_bitops_generic+0x92/0x1c0
[   14.260438]  kasan_bitops_generic+0x116/0x1c0
[   14.260461]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.260487]  ? __pfx_read_tsc+0x10/0x10
[   14.260508]  ? ktime_get_ts64+0x86/0x230
[   14.260624]  kunit_try_run_case+0x1a5/0x480
[   14.260651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.260673]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.260698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.260722]  ? __kthread_parkme+0x82/0x180
[   14.260744]  ? preempt_count_sub+0x50/0x80
[   14.260769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.260793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.260817]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.260841]  kthread+0x337/0x6f0
[   14.260861]  ? trace_preempt_on+0x20/0xc0
[   14.260883]  ? __pfx_kthread+0x10/0x10
[   14.260916]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.260937]  ? calculate_sigpending+0x7b/0xa0
[   14.260962]  ? __pfx_kthread+0x10/0x10
[   14.260983]  ret_from_fork+0x116/0x1d0
[   14.261002]  ? __pfx_kthread+0x10/0x10
[   14.261023]  ret_from_fork_asm+0x1a/0x30
[   14.261055]  </TASK>
[   14.261067] 
[   14.270106] Allocated by task 278:
[   14.270281]  kasan_save_stack+0x45/0x70
[   14.270466]  kasan_save_track+0x18/0x40
[   14.270625]  kasan_save_alloc_info+0x3b/0x50
[   14.270780]  __kasan_kmalloc+0xb7/0xc0
[   14.270983]  __kmalloc_cache_noprof+0x189/0x420
[   14.271224]  kasan_bitops_generic+0x92/0x1c0
[   14.271421]  kunit_try_run_case+0x1a5/0x480
[   14.271568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.271743]  kthread+0x337/0x6f0
[   14.271864]  ret_from_fork+0x116/0x1d0
[   14.272006]  ret_from_fork_asm+0x1a/0x30
[   14.272149] 
[   14.272219] The buggy address belongs to the object at ffff888102837220
[   14.272219]  which belongs to the cache kmalloc-16 of size 16
[   14.272574] The buggy address is located 8 bytes inside of
[   14.272574]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.273311] 
[   14.273415] The buggy address belongs to the physical page:
[   14.273924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.274684] flags: 0x200000000000000(node=0|zone=2)
[   14.274941] page_type: f5(slab)
[   14.275109] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.275646] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.276030] page dumped because: kasan: bad access detected
[   14.276284] 
[   14.276376] Memory state around the buggy address:
[   14.276570]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.276844]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.277418] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.277856]                                   ^
[   14.278110]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.278406]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.278789] ==================================================================
[   14.235997] ==================================================================
[   14.236290] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.236548] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.236772] 
[   14.236859] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.236915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.236927] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.236949] Call Trace:
[   14.236965]  <TASK>
[   14.236981]  dump_stack_lvl+0x73/0xb0
[   14.237008]  print_report+0xd1/0x610
[   14.237030]  ? __virt_addr_valid+0x1db/0x2d0
[   14.237053]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.237077]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.237099]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.237125]  kasan_report+0x141/0x180
[   14.237146]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.237177]  kasan_check_range+0x10c/0x1c0
[   14.237200]  __kasan_check_write+0x18/0x20
[   14.237218]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.237243]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.237270]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.237293]  ? trace_hardirqs_on+0x37/0xe0
[   14.237315]  ? kasan_bitops_generic+0x92/0x1c0
[   14.237343]  kasan_bitops_generic+0x116/0x1c0
[   14.237365]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.237390]  ? __pfx_read_tsc+0x10/0x10
[   14.237411]  ? ktime_get_ts64+0x86/0x230
[   14.237449]  kunit_try_run_case+0x1a5/0x480
[   14.237474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.237497]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.237522]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.237547]  ? __kthread_parkme+0x82/0x180
[   14.237567]  ? preempt_count_sub+0x50/0x80
[   14.237593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.237617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.237640]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.237665]  kthread+0x337/0x6f0
[   14.237684]  ? trace_preempt_on+0x20/0xc0
[   14.237706]  ? __pfx_kthread+0x10/0x10
[   14.237726]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.237747]  ? calculate_sigpending+0x7b/0xa0
[   14.237771]  ? __pfx_kthread+0x10/0x10
[   14.237792]  ret_from_fork+0x116/0x1d0
[   14.237811]  ? __pfx_kthread+0x10/0x10
[   14.237831]  ret_from_fork_asm+0x1a/0x30
[   14.237863]  </TASK>
[   14.237873] 
[   14.248167] Allocated by task 278:
[   14.248342]  kasan_save_stack+0x45/0x70
[   14.248507]  kasan_save_track+0x18/0x40
[   14.248706]  kasan_save_alloc_info+0x3b/0x50
[   14.248990]  __kasan_kmalloc+0xb7/0xc0
[   14.249146]  __kmalloc_cache_noprof+0x189/0x420
[   14.249361]  kasan_bitops_generic+0x92/0x1c0
[   14.249618]  kunit_try_run_case+0x1a5/0x480
[   14.249801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.250097]  kthread+0x337/0x6f0
[   14.250235]  ret_from_fork+0x116/0x1d0
[   14.250406]  ret_from_fork_asm+0x1a/0x30
[   14.250737] 
[   14.250818] The buggy address belongs to the object at ffff888102837220
[   14.250818]  which belongs to the cache kmalloc-16 of size 16
[   14.251691] The buggy address is located 8 bytes inside of
[   14.251691]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.252316] 
[   14.252408] The buggy address belongs to the physical page:
[   14.252705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.253066] flags: 0x200000000000000(node=0|zone=2)
[   14.253268] page_type: f5(slab)
[   14.253429] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.253807] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.254161] page dumped because: kasan: bad access detected
[   14.254343] 
[   14.254435] Memory state around the buggy address:
[   14.254932]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.255223]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.255443] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.255656]                                   ^
[   14.255805]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.256035]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.256257] ==================================================================
[   14.342049] ==================================================================
[   14.342353] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.342971] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.343253] 
[   14.343343] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.343387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.343398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.343422] Call Trace:
[   14.343439]  <TASK>
[   14.343458]  dump_stack_lvl+0x73/0xb0
[   14.343488]  print_report+0xd1/0x610
[   14.343510]  ? __virt_addr_valid+0x1db/0x2d0
[   14.343534]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.343560]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.343584]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.343611]  kasan_report+0x141/0x180
[   14.343632]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.343664]  kasan_check_range+0x10c/0x1c0
[   14.343688]  __kasan_check_write+0x18/0x20
[   14.343708]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.343735]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.343762]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.343786]  ? trace_hardirqs_on+0x37/0xe0
[   14.343808]  ? kasan_bitops_generic+0x92/0x1c0
[   14.343836]  kasan_bitops_generic+0x116/0x1c0
[   14.343860]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.343885]  ? __pfx_read_tsc+0x10/0x10
[   14.343917]  ? ktime_get_ts64+0x86/0x230
[   14.343942]  kunit_try_run_case+0x1a5/0x480
[   14.343967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.343990]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.344015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.344039]  ? __kthread_parkme+0x82/0x180
[   14.344060]  ? preempt_count_sub+0x50/0x80
[   14.344085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.344109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.344133]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.344156]  kthread+0x337/0x6f0
[   14.344176]  ? trace_preempt_on+0x20/0xc0
[   14.344198]  ? __pfx_kthread+0x10/0x10
[   14.344218]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.344240]  ? calculate_sigpending+0x7b/0xa0
[   14.344263]  ? __pfx_kthread+0x10/0x10
[   14.344285]  ret_from_fork+0x116/0x1d0
[   14.344303]  ? __pfx_kthread+0x10/0x10
[   14.344324]  ret_from_fork_asm+0x1a/0x30
[   14.344356]  </TASK>
[   14.344367] 
[   14.353821] Allocated by task 278:
[   14.354057]  kasan_save_stack+0x45/0x70
[   14.354259]  kasan_save_track+0x18/0x40
[   14.354429]  kasan_save_alloc_info+0x3b/0x50
[   14.354872]  __kasan_kmalloc+0xb7/0xc0
[   14.355129]  __kmalloc_cache_noprof+0x189/0x420
[   14.355329]  kasan_bitops_generic+0x92/0x1c0
[   14.355507]  kunit_try_run_case+0x1a5/0x480
[   14.355655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.356046]  kthread+0x337/0x6f0
[   14.356227]  ret_from_fork+0x116/0x1d0
[   14.356420]  ret_from_fork_asm+0x1a/0x30
[   14.356744] 
[   14.356817] The buggy address belongs to the object at ffff888102837220
[   14.356817]  which belongs to the cache kmalloc-16 of size 16
[   14.357392] The buggy address is located 8 bytes inside of
[   14.357392]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.357937] 
[   14.358045] The buggy address belongs to the physical page:
[   14.358260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.358792] flags: 0x200000000000000(node=0|zone=2)
[   14.358979] page_type: f5(slab)
[   14.359214] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.359628] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.359911] page dumped because: kasan: bad access detected
[   14.360086] 
[   14.360155] Memory state around the buggy address:
[   14.360310]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.360527]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.360744] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.361074]                                   ^
[   14.361286]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.361598]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.361995] ==================================================================
[   14.322093] ==================================================================
[   14.322372] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.322773] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.323071] 
[   14.323197] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.323240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.323252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.323273] Call Trace:
[   14.323287]  <TASK>
[   14.323301]  dump_stack_lvl+0x73/0xb0
[   14.323329]  print_report+0xd1/0x610
[   14.323351]  ? __virt_addr_valid+0x1db/0x2d0
[   14.323376]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.323402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.323425]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.323451]  kasan_report+0x141/0x180
[   14.323473]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.323505]  kasan_check_range+0x10c/0x1c0
[   14.323529]  __kasan_check_write+0x18/0x20
[   14.323548]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.323575]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.323602]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.323626]  ? trace_hardirqs_on+0x37/0xe0
[   14.323649]  ? kasan_bitops_generic+0x92/0x1c0
[   14.323677]  kasan_bitops_generic+0x116/0x1c0
[   14.323700]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.323725]  ? __pfx_read_tsc+0x10/0x10
[   14.323746]  ? ktime_get_ts64+0x86/0x230
[   14.323770]  kunit_try_run_case+0x1a5/0x480
[   14.323794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.323816]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.323840]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.323863]  ? __kthread_parkme+0x82/0x180
[   14.323884]  ? preempt_count_sub+0x50/0x80
[   14.323919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.323943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.323967]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.324184]  kthread+0x337/0x6f0
[   14.324208]  ? trace_preempt_on+0x20/0xc0
[   14.324231]  ? __pfx_kthread+0x10/0x10
[   14.324252]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.324274]  ? calculate_sigpending+0x7b/0xa0
[   14.324298]  ? __pfx_kthread+0x10/0x10
[   14.324320]  ret_from_fork+0x116/0x1d0
[   14.324339]  ? __pfx_kthread+0x10/0x10
[   14.324359]  ret_from_fork_asm+0x1a/0x30
[   14.324391]  </TASK>
[   14.324402] 
[   14.333233] Allocated by task 278:
[   14.333437]  kasan_save_stack+0x45/0x70
[   14.333646]  kasan_save_track+0x18/0x40
[   14.333833]  kasan_save_alloc_info+0x3b/0x50
[   14.334092]  __kasan_kmalloc+0xb7/0xc0
[   14.334254]  __kmalloc_cache_noprof+0x189/0x420
[   14.334446]  kasan_bitops_generic+0x92/0x1c0
[   14.334643]  kunit_try_run_case+0x1a5/0x480
[   14.334823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.335097]  kthread+0x337/0x6f0
[   14.335252]  ret_from_fork+0x116/0x1d0
[   14.335437]  ret_from_fork_asm+0x1a/0x30
[   14.335605] 
[   14.335698] The buggy address belongs to the object at ffff888102837220
[   14.335698]  which belongs to the cache kmalloc-16 of size 16
[   14.336210] The buggy address is located 8 bytes inside of
[   14.336210]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.336642] 
[   14.336715] The buggy address belongs to the physical page:
[   14.336890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.337144] flags: 0x200000000000000(node=0|zone=2)
[   14.337310] page_type: f5(slab)
[   14.337435] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.337785] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.338552] page dumped because: kasan: bad access detected
[   14.338816] 
[   14.338923] Memory state around the buggy address:
[   14.339147]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.339705]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.339933] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.340146]                                   ^
[   14.340293]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.341099]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.341428] ==================================================================
[   14.212718] ==================================================================
[   14.213787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.214330] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.214728] 
[   14.214840] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.214886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.214909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.214933] Call Trace:
[   14.214944]  <TASK>
[   14.214960]  dump_stack_lvl+0x73/0xb0
[   14.214999]  print_report+0xd1/0x610
[   14.215023]  ? __virt_addr_valid+0x1db/0x2d0
[   14.215046]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.215073]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.215096]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.215123]  kasan_report+0x141/0x180
[   14.215145]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.215177]  kasan_check_range+0x10c/0x1c0
[   14.215201]  __kasan_check_write+0x18/0x20
[   14.215221]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.215248]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.215276]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.215300]  ? trace_hardirqs_on+0x37/0xe0
[   14.215323]  ? kasan_bitops_generic+0x92/0x1c0
[   14.215352]  kasan_bitops_generic+0x116/0x1c0
[   14.215376]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.215402]  ? __pfx_read_tsc+0x10/0x10
[   14.215423]  ? ktime_get_ts64+0x86/0x230
[   14.215448]  kunit_try_run_case+0x1a5/0x480
[   14.215473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.215497]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.215525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.215605]  ? __kthread_parkme+0x82/0x180
[   14.215626]  ? preempt_count_sub+0x50/0x80
[   14.215651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.215675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.215700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.215727]  kthread+0x337/0x6f0
[   14.215745]  ? trace_preempt_on+0x20/0xc0
[   14.215766]  ? __pfx_kthread+0x10/0x10
[   14.215787]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.215808]  ? calculate_sigpending+0x7b/0xa0
[   14.215834]  ? __pfx_kthread+0x10/0x10
[   14.215857]  ret_from_fork+0x116/0x1d0
[   14.215877]  ? __pfx_kthread+0x10/0x10
[   14.215908]  ret_from_fork_asm+0x1a/0x30
[   14.215941]  </TASK>
[   14.215952] 
[   14.224703] Allocated by task 278:
[   14.224861]  kasan_save_stack+0x45/0x70
[   14.225081]  kasan_save_track+0x18/0x40
[   14.225219]  kasan_save_alloc_info+0x3b/0x50
[   14.225417]  __kasan_kmalloc+0xb7/0xc0
[   14.225604]  __kmalloc_cache_noprof+0x189/0x420
[   14.225825]  kasan_bitops_generic+0x92/0x1c0
[   14.226106]  kunit_try_run_case+0x1a5/0x480
[   14.226309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.226608]  kthread+0x337/0x6f0
[   14.226776]  ret_from_fork+0x116/0x1d0
[   14.226957]  ret_from_fork_asm+0x1a/0x30
[   14.227193] 
[   14.227276] The buggy address belongs to the object at ffff888102837220
[   14.227276]  which belongs to the cache kmalloc-16 of size 16
[   14.227801] The buggy address is located 8 bytes inside of
[   14.227801]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.228171] 
[   14.228246] The buggy address belongs to the physical page:
[   14.228421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.228666] flags: 0x200000000000000(node=0|zone=2)
[   14.228833] page_type: f5(slab)
[   14.228991] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.229770] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.230325] page dumped because: kasan: bad access detected
[   14.230522] 
[   14.230591] Memory state around the buggy address:
[   14.230748]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.230979]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.231197] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.231468]                                   ^
[   14.231919]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.232601]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.232948] ==================================================================
[   14.362459] ==================================================================
[   14.363150] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.363413] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.363963] 
[   14.364202] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.364247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.364258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.364279] Call Trace:
[   14.364293]  <TASK>
[   14.364309]  dump_stack_lvl+0x73/0xb0
[   14.364338]  print_report+0xd1/0x610
[   14.364359]  ? __virt_addr_valid+0x1db/0x2d0
[   14.364382]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.364408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.364431]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.364458]  kasan_report+0x141/0x180
[   14.364480]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.364511]  kasan_check_range+0x10c/0x1c0
[   14.364584]  __kasan_check_write+0x18/0x20
[   14.364604]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.364631]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.364659]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.364682]  ? trace_hardirqs_on+0x37/0xe0
[   14.364705]  ? kasan_bitops_generic+0x92/0x1c0
[   14.364733]  kasan_bitops_generic+0x116/0x1c0
[   14.364757]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.364782]  ? __pfx_read_tsc+0x10/0x10
[   14.364803]  ? ktime_get_ts64+0x86/0x230
[   14.364827]  kunit_try_run_case+0x1a5/0x480
[   14.364853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.364875]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.364915]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.364939]  ? __kthread_parkme+0x82/0x180
[   14.364959]  ? preempt_count_sub+0x50/0x80
[   14.364984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.365009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.365032]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.365057]  kthread+0x337/0x6f0
[   14.365076]  ? trace_preempt_on+0x20/0xc0
[   14.365098]  ? __pfx_kthread+0x10/0x10
[   14.365118]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.365139]  ? calculate_sigpending+0x7b/0xa0
[   14.365164]  ? __pfx_kthread+0x10/0x10
[   14.365185]  ret_from_fork+0x116/0x1d0
[   14.365203]  ? __pfx_kthread+0x10/0x10
[   14.365224]  ret_from_fork_asm+0x1a/0x30
[   14.365256]  </TASK>
[   14.365267] 
[   14.374150] Allocated by task 278:
[   14.374296]  kasan_save_stack+0x45/0x70
[   14.374446]  kasan_save_track+0x18/0x40
[   14.374933]  kasan_save_alloc_info+0x3b/0x50
[   14.375300]  __kasan_kmalloc+0xb7/0xc0
[   14.375509]  __kmalloc_cache_noprof+0x189/0x420
[   14.375803]  kasan_bitops_generic+0x92/0x1c0
[   14.376044]  kunit_try_run_case+0x1a5/0x480
[   14.376241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.376417]  kthread+0x337/0x6f0
[   14.376539]  ret_from_fork+0x116/0x1d0
[   14.376672]  ret_from_fork_asm+0x1a/0x30
[   14.376812] 
[   14.376882] The buggy address belongs to the object at ffff888102837220
[   14.376882]  which belongs to the cache kmalloc-16 of size 16
[   14.377453] The buggy address is located 8 bytes inside of
[   14.377453]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.378428] 
[   14.378700] The buggy address belongs to the physical page:
[   14.379193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.379698] flags: 0x200000000000000(node=0|zone=2)
[   14.379867] page_type: f5(slab)
[   14.380008] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.380742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.381064] page dumped because: kasan: bad access detected
[   14.381316] 
[   14.381409] Memory state around the buggy address:
[   14.381710]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.382047]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.382281] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.382496]                                   ^
[   14.382701]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.383034]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.383399] ==================================================================
[   14.279275] ==================================================================
[   14.279509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.280000] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.280342] 
[   14.280461] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.280504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.280515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.280536] Call Trace:
[   14.280553]  <TASK>
[   14.280569]  dump_stack_lvl+0x73/0xb0
[   14.280598]  print_report+0xd1/0x610
[   14.280621]  ? __virt_addr_valid+0x1db/0x2d0
[   14.280644]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.280669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.280693]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.280719]  kasan_report+0x141/0x180
[   14.280742]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.280774]  kasan_check_range+0x10c/0x1c0
[   14.280798]  __kasan_check_write+0x18/0x20
[   14.280817]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.280844]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.280871]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.280914]  ? trace_hardirqs_on+0x37/0xe0
[   14.280936]  ? kasan_bitops_generic+0x92/0x1c0
[   14.280965]  kasan_bitops_generic+0x116/0x1c0
[   14.282259]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.282298]  ? __pfx_read_tsc+0x10/0x10
[   14.282321]  ? ktime_get_ts64+0x86/0x230
[   14.282347]  kunit_try_run_case+0x1a5/0x480
[   14.282380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.282404]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.282429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.282453]  ? __kthread_parkme+0x82/0x180
[   14.282473]  ? preempt_count_sub+0x50/0x80
[   14.282498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.282522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.282640]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.282666]  kthread+0x337/0x6f0
[   14.282686]  ? trace_preempt_on+0x20/0xc0
[   14.282708]  ? __pfx_kthread+0x10/0x10
[   14.282729]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.282751]  ? calculate_sigpending+0x7b/0xa0
[   14.282783]  ? __pfx_kthread+0x10/0x10
[   14.282805]  ret_from_fork+0x116/0x1d0
[   14.282823]  ? __pfx_kthread+0x10/0x10
[   14.282843]  ret_from_fork_asm+0x1a/0x30
[   14.282876]  </TASK>
[   14.282886] 
[   14.292499] Allocated by task 278:
[   14.292687]  kasan_save_stack+0x45/0x70
[   14.292911]  kasan_save_track+0x18/0x40
[   14.293280]  kasan_save_alloc_info+0x3b/0x50
[   14.293461]  __kasan_kmalloc+0xb7/0xc0
[   14.293839]  __kmalloc_cache_noprof+0x189/0x420
[   14.294101]  kasan_bitops_generic+0x92/0x1c0
[   14.294306]  kunit_try_run_case+0x1a5/0x480
[   14.294473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.294884]  kthread+0x337/0x6f0
[   14.295083]  ret_from_fork+0x116/0x1d0
[   14.295250]  ret_from_fork_asm+0x1a/0x30
[   14.295449] 
[   14.295533] The buggy address belongs to the object at ffff888102837220
[   14.295533]  which belongs to the cache kmalloc-16 of size 16
[   14.295928] The buggy address is located 8 bytes inside of
[   14.295928]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.296282] 
[   14.296353] The buggy address belongs to the physical page:
[   14.296589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.297269] flags: 0x200000000000000(node=0|zone=2)
[   14.297513] page_type: f5(slab)
[   14.297750] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.298132] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.298368] page dumped because: kasan: bad access detected
[   14.298669] 
[   14.298773] Memory state around the buggy address:
[   14.299105]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.299436]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.299956] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.300245]                                   ^
[   14.300444]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.300922]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.301234] ==================================================================
[   14.301739] ==================================================================
[   14.302141] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.302409] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.303027] 
[   14.303159] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.303205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.303217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.303239] Call Trace:
[   14.303256]  <TASK>
[   14.303274]  dump_stack_lvl+0x73/0xb0
[   14.303303]  print_report+0xd1/0x610
[   14.303325]  ? __virt_addr_valid+0x1db/0x2d0
[   14.303349]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.303375]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.303399]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.303425]  kasan_report+0x141/0x180
[   14.303448]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.303481]  kasan_check_range+0x10c/0x1c0
[   14.303505]  __kasan_check_write+0x18/0x20
[   14.303525]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.303597]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.303625]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.303649]  ? trace_hardirqs_on+0x37/0xe0
[   14.303672]  ? kasan_bitops_generic+0x92/0x1c0
[   14.303701]  kasan_bitops_generic+0x116/0x1c0
[   14.303724]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.303750]  ? __pfx_read_tsc+0x10/0x10
[   14.303772]  ? ktime_get_ts64+0x86/0x230
[   14.303798]  kunit_try_run_case+0x1a5/0x480
[   14.303823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.303845]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.303870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.303906]  ? __kthread_parkme+0x82/0x180
[   14.303927]  ? preempt_count_sub+0x50/0x80
[   14.303952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.303976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.304008]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.304032]  kthread+0x337/0x6f0
[   14.304051]  ? trace_preempt_on+0x20/0xc0
[   14.304073]  ? __pfx_kthread+0x10/0x10
[   14.304094]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.304115]  ? calculate_sigpending+0x7b/0xa0
[   14.304141]  ? __pfx_kthread+0x10/0x10
[   14.304162]  ret_from_fork+0x116/0x1d0
[   14.304180]  ? __pfx_kthread+0x10/0x10
[   14.304200]  ret_from_fork_asm+0x1a/0x30
[   14.304232]  </TASK>
[   14.304245] 
[   14.313093] Allocated by task 278:
[   14.313271]  kasan_save_stack+0x45/0x70
[   14.313420]  kasan_save_track+0x18/0x40
[   14.313620]  kasan_save_alloc_info+0x3b/0x50
[   14.313829]  __kasan_kmalloc+0xb7/0xc0
[   14.314037]  __kmalloc_cache_noprof+0x189/0x420
[   14.314242]  kasan_bitops_generic+0x92/0x1c0
[   14.314416]  kunit_try_run_case+0x1a5/0x480
[   14.314614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.314822]  kthread+0x337/0x6f0
[   14.314955]  ret_from_fork+0x116/0x1d0
[   14.315089]  ret_from_fork_asm+0x1a/0x30
[   14.315228] 
[   14.315298] The buggy address belongs to the object at ffff888102837220
[   14.315298]  which belongs to the cache kmalloc-16 of size 16
[   14.315651] The buggy address is located 8 bytes inside of
[   14.315651]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.316260] 
[   14.316361] The buggy address belongs to the physical page:
[   14.316764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.317327] flags: 0x200000000000000(node=0|zone=2)
[   14.317662] page_type: f5(slab)
[   14.317837] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.318250] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.318482] page dumped because: kasan: bad access detected
[   14.319063] 
[   14.319246] Memory state around the buggy address:
[   14.319431]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.319925]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.320148] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.320422]                                   ^
[   14.320751]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.321196]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.321600] ==================================================================