Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.488322] ==================================================================
[   19.488656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   19.488740] Write of size 8 at addr fff00000c3eb9288 by task kunit_try_catch/261
[   19.488793] 
[   19.488833] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.488934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.488964] Hardware name: linux,dummy-virt (DT)
[   19.488998] Call trace:
[   19.489024]  show_stack+0x20/0x38 (C)
[   19.489077]  dump_stack_lvl+0x8c/0xd0
[   19.489155]  print_report+0x118/0x5d0
[   19.489206]  kasan_report+0xdc/0x128
[   19.489258]  kasan_check_range+0x100/0x1a8
[   19.489309]  __kasan_check_write+0x20/0x30
[   19.489356]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
[   19.489413]  kasan_bitops_generic+0x11c/0x1c8
[   19.489461]  kunit_try_run_case+0x170/0x3f0
[   19.489518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.489571]  kthread+0x328/0x630
[   19.489617]  ret_from_fork+0x10/0x20
[   19.489667] 
[   19.489688] Allocated by task 261:
[   19.489719]  kasan_save_stack+0x3c/0x68
[   19.489762]  kasan_save_track+0x20/0x40
[   19.489802]  kasan_save_alloc_info+0x40/0x58
[   19.490210]  __kasan_kmalloc+0xd4/0xd8
[   19.490264]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.490307]  kasan_bitops_generic+0xa0/0x1c8
[   19.490349]  kunit_try_run_case+0x170/0x3f0
[   19.490776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.490859]  kthread+0x328/0x630
[   19.491162]  ret_from_fork+0x10/0x20
[   19.491331] 
[   19.491481] The buggy address belongs to the object at fff00000c3eb9280
[   19.491481]  which belongs to the cache kmalloc-16 of size 16
[   19.491865] The buggy address is located 8 bytes inside of
[   19.491865]  allocated 9-byte region [fff00000c3eb9280, fff00000c3eb9289)
[   19.492081] 
[   19.493174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.493288] page_type: f5(slab)
[   19.493383] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.493753] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.494817] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.497712] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0
[   19.498297] Call trace:
[   19.500825]  kthread+0x328/0x630
[   19.503801] 
[   19.504923] page_type: f5(slab)
[   19.505226] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.506146]  fff00000c3eb9180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.506662] >fff00000c3eb9280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.506873] ==================================================================

[   14.318874] ==================================================================
[   14.319108] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.319832] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.320388] 
[   14.320540] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.320596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.320607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.320627] Call Trace:
[   14.320640]  <TASK>
[   14.320654]  dump_stack_lvl+0x73/0xb0
[   14.320683]  print_report+0xd1/0x610
[   14.320704]  ? __virt_addr_valid+0x1db/0x2d0
[   14.320726]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.320754]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.320777]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.320805]  kasan_report+0x141/0x180
[   14.320848]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.320892]  kasan_check_range+0x10c/0x1c0
[   14.320916]  __kasan_check_write+0x18/0x20
[   14.320947]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.320977]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.321033]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.321058]  ? trace_hardirqs_on+0x37/0xe0
[   14.321080]  ? kasan_bitops_generic+0x92/0x1c0
[   14.321119]  kasan_bitops_generic+0x121/0x1c0
[   14.321146]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.321172]  ? __pfx_read_tsc+0x10/0x10
[   14.321218]  ? ktime_get_ts64+0x86/0x230
[   14.321242]  kunit_try_run_case+0x1a5/0x480
[   14.321266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.321299]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.321323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.321347]  ? __kthread_parkme+0x82/0x180
[   14.321390]  ? preempt_count_sub+0x50/0x80
[   14.321415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.321453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.321478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.321502]  kthread+0x337/0x6f0
[   14.321521]  ? trace_preempt_on+0x20/0xc0
[   14.321551]  ? __pfx_kthread+0x10/0x10
[   14.321599]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.321620]  ? calculate_sigpending+0x7b/0xa0
[   14.321645]  ? __pfx_kthread+0x10/0x10
[   14.321677]  ret_from_fork+0x116/0x1d0
[   14.321695]  ? __pfx_kthread+0x10/0x10
[   14.321715]  ret_from_fork_asm+0x1a/0x30
[   14.321775]  </TASK>
[   14.321785] 
[   14.331482] Allocated by task 279:
[   14.331822]  kasan_save_stack+0x45/0x70
[   14.332175]  kasan_save_track+0x18/0x40
[   14.332538]  kasan_save_alloc_info+0x3b/0x50
[   14.332906]  __kasan_kmalloc+0xb7/0xc0
[   14.333258]  __kmalloc_cache_noprof+0x189/0x420
[   14.333858]  kasan_bitops_generic+0x92/0x1c0
[   14.334263]  kunit_try_run_case+0x1a5/0x480
[   14.334669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.335058]  kthread+0x337/0x6f0
[   14.335182]  ret_from_fork+0x116/0x1d0
[   14.335315]  ret_from_fork_asm+0x1a/0x30
[   14.335462] 
[   14.335566] The buggy address belongs to the object at ffff888101684300
[   14.335566]  which belongs to the cache kmalloc-16 of size 16
[   14.336771] The buggy address is located 8 bytes inside of
[   14.336771]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.337873] 
[   14.338044] The buggy address belongs to the physical page:
[   14.338565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.338990] flags: 0x200000000000000(node=0|zone=2)
[   14.339158] page_type: f5(slab)
[   14.339285] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.339710] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.340364] page dumped because: kasan: bad access detected
[   14.340884] 
[   14.341056] Memory state around the buggy address:
[   14.341495]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.342130]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.342766] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.343163]                       ^
[   14.343287]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.343512]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.344139] ==================================================================
[   14.278467] ==================================================================
[   14.279059] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.279483] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.279825] 
[   14.279954] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.280004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.280028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.280047] Call Trace:
[   14.280060]  <TASK>
[   14.280074]  dump_stack_lvl+0x73/0xb0
[   14.280101]  print_report+0xd1/0x610
[   14.280122]  ? __virt_addr_valid+0x1db/0x2d0
[   14.280144]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.280172]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.280194]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.280223]  kasan_report+0x141/0x180
[   14.280246]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.280280]  kasan_check_range+0x10c/0x1c0
[   14.280303]  __kasan_check_write+0x18/0x20
[   14.280322]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.280351]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.280380]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.280404]  ? trace_hardirqs_on+0x37/0xe0
[   14.280426]  ? kasan_bitops_generic+0x92/0x1c0
[   14.280464]  kasan_bitops_generic+0x121/0x1c0
[   14.280489]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.280514]  ? __pfx_read_tsc+0x10/0x10
[   14.280534]  ? ktime_get_ts64+0x86/0x230
[   14.280558]  kunit_try_run_case+0x1a5/0x480
[   14.280581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.280604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.280642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.280666]  ? __kthread_parkme+0x82/0x180
[   14.280687]  ? preempt_count_sub+0x50/0x80
[   14.280710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.280734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.280758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.280800]  kthread+0x337/0x6f0
[   14.280819]  ? trace_preempt_on+0x20/0xc0
[   14.280841]  ? __pfx_kthread+0x10/0x10
[   14.280862]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.280883]  ? calculate_sigpending+0x7b/0xa0
[   14.280907]  ? __pfx_kthread+0x10/0x10
[   14.280928]  ret_from_fork+0x116/0x1d0
[   14.280946]  ? __pfx_kthread+0x10/0x10
[   14.280966]  ret_from_fork_asm+0x1a/0x30
[   14.280999]  </TASK>
[   14.281008] 
[   14.289542] Allocated by task 279:
[   14.289763]  kasan_save_stack+0x45/0x70
[   14.289968]  kasan_save_track+0x18/0x40
[   14.290148]  kasan_save_alloc_info+0x3b/0x50
[   14.290371]  __kasan_kmalloc+0xb7/0xc0
[   14.290542]  __kmalloc_cache_noprof+0x189/0x420
[   14.290865]  kasan_bitops_generic+0x92/0x1c0
[   14.291110]  kunit_try_run_case+0x1a5/0x480
[   14.291380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.291637]  kthread+0x337/0x6f0
[   14.291800]  ret_from_fork+0x116/0x1d0
[   14.291982]  ret_from_fork_asm+0x1a/0x30
[   14.292172] 
[   14.292263] The buggy address belongs to the object at ffff888101684300
[   14.292263]  which belongs to the cache kmalloc-16 of size 16
[   14.292787] The buggy address is located 8 bytes inside of
[   14.292787]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.293300] 
[   14.293392] The buggy address belongs to the physical page:
[   14.293589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.293818] flags: 0x200000000000000(node=0|zone=2)
[   14.293975] page_type: f5(slab)
[   14.294090] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.294314] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.294798] page dumped because: kasan: bad access detected
[   14.295048] 
[   14.295142] Memory state around the buggy address:
[   14.295415]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.296118]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.296459] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.297114]                       ^
[   14.297327]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.297803]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.298012] ==================================================================
[   14.389029] ==================================================================
[   14.389921] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.390296] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.390651] 
[   14.390734] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.390775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.390786] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.390806] Call Trace:
[   14.390818]  <TASK>
[   14.390831]  dump_stack_lvl+0x73/0xb0
[   14.390857]  print_report+0xd1/0x610
[   14.390878]  ? __virt_addr_valid+0x1db/0x2d0
[   14.390901]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.390929]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.390964]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.390994]  kasan_report+0x141/0x180
[   14.391019]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.391054]  kasan_check_range+0x10c/0x1c0
[   14.391078]  __kasan_check_write+0x18/0x20
[   14.391099]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.391138]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.391168]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.391192]  ? trace_hardirqs_on+0x37/0xe0
[   14.391225]  ? kasan_bitops_generic+0x92/0x1c0
[   14.391253]  kasan_bitops_generic+0x121/0x1c0
[   14.391276]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.391301]  ? __pfx_read_tsc+0x10/0x10
[   14.391321]  ? ktime_get_ts64+0x86/0x230
[   14.391345]  kunit_try_run_case+0x1a5/0x480
[   14.391368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.391390]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.391414]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.391447]  ? __kthread_parkme+0x82/0x180
[   14.391467]  ? preempt_count_sub+0x50/0x80
[   14.391490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.391515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.391548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.391582]  kthread+0x337/0x6f0
[   14.391601]  ? trace_preempt_on+0x20/0xc0
[   14.391624]  ? __pfx_kthread+0x10/0x10
[   14.391654]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.391675]  ? calculate_sigpending+0x7b/0xa0
[   14.391699]  ? __pfx_kthread+0x10/0x10
[   14.391721]  ret_from_fork+0x116/0x1d0
[   14.391739]  ? __pfx_kthread+0x10/0x10
[   14.391759]  ret_from_fork_asm+0x1a/0x30
[   14.391791]  </TASK>
[   14.391800] 
[   14.403263] Allocated by task 279:
[   14.403472]  kasan_save_stack+0x45/0x70
[   14.403706]  kasan_save_track+0x18/0x40
[   14.403905]  kasan_save_alloc_info+0x3b/0x50
[   14.404126]  __kasan_kmalloc+0xb7/0xc0
[   14.404276]  __kmalloc_cache_noprof+0x189/0x420
[   14.404444]  kasan_bitops_generic+0x92/0x1c0
[   14.404590]  kunit_try_run_case+0x1a5/0x480
[   14.404792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.405039]  kthread+0x337/0x6f0
[   14.405249]  ret_from_fork+0x116/0x1d0
[   14.405445]  ret_from_fork_asm+0x1a/0x30
[   14.405649] 
[   14.405719] The buggy address belongs to the object at ffff888101684300
[   14.405719]  which belongs to the cache kmalloc-16 of size 16
[   14.406177] The buggy address is located 8 bytes inside of
[   14.406177]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.406737] 
[   14.406847] The buggy address belongs to the physical page:
[   14.407077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.407386] flags: 0x200000000000000(node=0|zone=2)
[   14.407687] page_type: f5(slab)
[   14.407840] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.408165] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.408423] page dumped because: kasan: bad access detected
[   14.408601] 
[   14.408670] Memory state around the buggy address:
[   14.408825]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.409166]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.409488] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.409804]                       ^
[   14.410042]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.410260]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.410938] ==================================================================
[   14.430780] ==================================================================
[   14.431142] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.431791] Read of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.432125] 
[   14.432211] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.432252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.432263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.432284] Call Trace:
[   14.432298]  <TASK>
[   14.432313]  dump_stack_lvl+0x73/0xb0
[   14.432339]  print_report+0xd1/0x610
[   14.432359]  ? __virt_addr_valid+0x1db/0x2d0
[   14.432381]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.432408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.432432]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.432470]  kasan_report+0x141/0x180
[   14.432491]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.432526]  __asan_report_load8_noabort+0x18/0x20
[   14.432560]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.432588]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.432617]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.432640]  ? trace_hardirqs_on+0x37/0xe0
[   14.432662]  ? kasan_bitops_generic+0x92/0x1c0
[   14.432690]  kasan_bitops_generic+0x121/0x1c0
[   14.432713]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.432738]  ? __pfx_read_tsc+0x10/0x10
[   14.432759]  ? ktime_get_ts64+0x86/0x230
[   14.432783]  kunit_try_run_case+0x1a5/0x480
[   14.432806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.432828]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.432851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.432885]  ? __kthread_parkme+0x82/0x180
[   14.432905]  ? preempt_count_sub+0x50/0x80
[   14.432929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.432964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.432987]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.433011]  kthread+0x337/0x6f0
[   14.433029]  ? trace_preempt_on+0x20/0xc0
[   14.433051]  ? __pfx_kthread+0x10/0x10
[   14.433071]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.433101]  ? calculate_sigpending+0x7b/0xa0
[   14.433125]  ? __pfx_kthread+0x10/0x10
[   14.433151]  ret_from_fork+0x116/0x1d0
[   14.433180]  ? __pfx_kthread+0x10/0x10
[   14.433201]  ret_from_fork_asm+0x1a/0x30
[   14.433233]  </TASK>
[   14.433241] 
[   14.441387] Allocated by task 279:
[   14.441585]  kasan_save_stack+0x45/0x70
[   14.441739]  kasan_save_track+0x18/0x40
[   14.441946]  kasan_save_alloc_info+0x3b/0x50
[   14.442139]  __kasan_kmalloc+0xb7/0xc0
[   14.442322]  __kmalloc_cache_noprof+0x189/0x420
[   14.442556]  kasan_bitops_generic+0x92/0x1c0
[   14.442766]  kunit_try_run_case+0x1a5/0x480
[   14.442988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.443168]  kthread+0x337/0x6f0
[   14.443288]  ret_from_fork+0x116/0x1d0
[   14.443420]  ret_from_fork_asm+0x1a/0x30
[   14.443568] 
[   14.443638] The buggy address belongs to the object at ffff888101684300
[   14.443638]  which belongs to the cache kmalloc-16 of size 16
[   14.443991] The buggy address is located 8 bytes inside of
[   14.443991]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.444353] 
[   14.444546] The buggy address belongs to the physical page:
[   14.444813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.445168] flags: 0x200000000000000(node=0|zone=2)
[   14.445401] page_type: f5(slab)
[   14.445615] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.445953] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.446286] page dumped because: kasan: bad access detected
[   14.446545] 
[   14.446637] Memory state around the buggy address:
[   14.446858]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.447171]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.447498] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.447871]                       ^
[   14.448065]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.448365]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.448722] ==================================================================
[   14.345556] ==================================================================
[   14.346503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.347296] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.347787] 
[   14.347872] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.347913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.347924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.347945] Call Trace:
[   14.347959]  <TASK>
[   14.347973]  dump_stack_lvl+0x73/0xb0
[   14.347999]  print_report+0xd1/0x610
[   14.348021]  ? __virt_addr_valid+0x1db/0x2d0
[   14.348042]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.348070]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.348093]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.348122]  kasan_report+0x141/0x180
[   14.348144]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.348178]  kasan_check_range+0x10c/0x1c0
[   14.348202]  __kasan_check_write+0x18/0x20
[   14.348221]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.348250]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.348279]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.348303]  ? trace_hardirqs_on+0x37/0xe0
[   14.348324]  ? kasan_bitops_generic+0x92/0x1c0
[   14.348352]  kasan_bitops_generic+0x121/0x1c0
[   14.348376]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.348401]  ? __pfx_read_tsc+0x10/0x10
[   14.348422]  ? ktime_get_ts64+0x86/0x230
[   14.348464]  kunit_try_run_case+0x1a5/0x480
[   14.348489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.348511]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.348565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.348591]  ? __kthread_parkme+0x82/0x180
[   14.348610]  ? preempt_count_sub+0x50/0x80
[   14.348653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.348678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.348702]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.348737]  kthread+0x337/0x6f0
[   14.348756]  ? trace_preempt_on+0x20/0xc0
[   14.348777]  ? __pfx_kthread+0x10/0x10
[   14.348798]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.348819]  ? calculate_sigpending+0x7b/0xa0
[   14.348844]  ? __pfx_kthread+0x10/0x10
[   14.348864]  ret_from_fork+0x116/0x1d0
[   14.348883]  ? __pfx_kthread+0x10/0x10
[   14.348903]  ret_from_fork_asm+0x1a/0x30
[   14.348935]  </TASK>
[   14.348944] 
[   14.361459] Allocated by task 279:
[   14.361683]  kasan_save_stack+0x45/0x70
[   14.361890]  kasan_save_track+0x18/0x40
[   14.362073]  kasan_save_alloc_info+0x3b/0x50
[   14.362252]  __kasan_kmalloc+0xb7/0xc0
[   14.362384]  __kmalloc_cache_noprof+0x189/0x420
[   14.362551]  kasan_bitops_generic+0x92/0x1c0
[   14.362760]  kunit_try_run_case+0x1a5/0x480
[   14.363044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.363264]  kthread+0x337/0x6f0
[   14.363384]  ret_from_fork+0x116/0x1d0
[   14.363571]  ret_from_fork_asm+0x1a/0x30
[   14.363770] 
[   14.363880] The buggy address belongs to the object at ffff888101684300
[   14.363880]  which belongs to the cache kmalloc-16 of size 16
[   14.364396] The buggy address is located 8 bytes inside of
[   14.364396]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.364893] 
[   14.364965] The buggy address belongs to the physical page:
[   14.365184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.365563] flags: 0x200000000000000(node=0|zone=2)
[   14.365866] page_type: f5(slab)
[   14.366035] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.366318] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.366798] page dumped because: kasan: bad access detected
[   14.367029] 
[   14.367136] Memory state around the buggy address:
[   14.367334]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.367656]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.367959] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.368262]                       ^
[   14.368446]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.368736]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.368951] ==================================================================
[   14.411563] ==================================================================
[   14.411864] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.412261] Read of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.412903] 
[   14.413020] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.413061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.413083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.413104] Call Trace:
[   14.413119]  <TASK>
[   14.413138]  dump_stack_lvl+0x73/0xb0
[   14.413179]  print_report+0xd1/0x610
[   14.413200]  ? __virt_addr_valid+0x1db/0x2d0
[   14.413223]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.413250]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.413283]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.413311]  kasan_report+0x141/0x180
[   14.413333]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.413377]  kasan_check_range+0x10c/0x1c0
[   14.413401]  __kasan_check_read+0x15/0x20
[   14.413419]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.413458]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.413495]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.413519]  ? trace_hardirqs_on+0x37/0xe0
[   14.413541]  ? kasan_bitops_generic+0x92/0x1c0
[   14.413593]  kasan_bitops_generic+0x121/0x1c0
[   14.413617]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.413642]  ? __pfx_read_tsc+0x10/0x10
[   14.413662]  ? ktime_get_ts64+0x86/0x230
[   14.413687]  kunit_try_run_case+0x1a5/0x480
[   14.413711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.413733]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.413758]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.413782]  ? __kthread_parkme+0x82/0x180
[   14.413801]  ? preempt_count_sub+0x50/0x80
[   14.413825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.413849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.413882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.413906]  kthread+0x337/0x6f0
[   14.413925]  ? trace_preempt_on+0x20/0xc0
[   14.413956]  ? __pfx_kthread+0x10/0x10
[   14.413977]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.413998]  ? calculate_sigpending+0x7b/0xa0
[   14.414022]  ? __pfx_kthread+0x10/0x10
[   14.414042]  ret_from_fork+0x116/0x1d0
[   14.414060]  ? __pfx_kthread+0x10/0x10
[   14.414079]  ret_from_fork_asm+0x1a/0x30
[   14.414111]  </TASK>
[   14.414121] 
[   14.422408] Allocated by task 279:
[   14.422669]  kasan_save_stack+0x45/0x70
[   14.422855]  kasan_save_track+0x18/0x40
[   14.423026]  kasan_save_alloc_info+0x3b/0x50
[   14.423259]  __kasan_kmalloc+0xb7/0xc0
[   14.423394]  __kmalloc_cache_noprof+0x189/0x420
[   14.423575]  kasan_bitops_generic+0x92/0x1c0
[   14.423850]  kunit_try_run_case+0x1a5/0x480
[   14.424057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.424304]  kthread+0x337/0x6f0
[   14.424448]  ret_from_fork+0x116/0x1d0
[   14.424720]  ret_from_fork_asm+0x1a/0x30
[   14.424920] 
[   14.424995] The buggy address belongs to the object at ffff888101684300
[   14.424995]  which belongs to the cache kmalloc-16 of size 16
[   14.425511] The buggy address is located 8 bytes inside of
[   14.425511]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.425975] 
[   14.426073] The buggy address belongs to the physical page:
[   14.426313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.426703] flags: 0x200000000000000(node=0|zone=2)
[   14.426911] page_type: f5(slab)
[   14.427092] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.427421] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.427659] page dumped because: kasan: bad access detected
[   14.427829] 
[   14.427897] Memory state around the buggy address:
[   14.428050]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.428268]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.428525] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.429020]                       ^
[   14.429215]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.429560]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.429873] ==================================================================
[   14.257381] ==================================================================
[   14.257902] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.258277] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.258508] 
[   14.258588] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.258628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.258639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.258659] Call Trace:
[   14.258673]  <TASK>
[   14.258687]  dump_stack_lvl+0x73/0xb0
[   14.258712]  print_report+0xd1/0x610
[   14.258733]  ? __virt_addr_valid+0x1db/0x2d0
[   14.258755]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.258783]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.258806]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.258834]  kasan_report+0x141/0x180
[   14.258858]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.258892]  kasan_check_range+0x10c/0x1c0
[   14.258916]  __kasan_check_write+0x18/0x20
[   14.258935]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.258964]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.259005]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.259029]  ? trace_hardirqs_on+0x37/0xe0
[   14.259050]  ? kasan_bitops_generic+0x92/0x1c0
[   14.259108]  kasan_bitops_generic+0x121/0x1c0
[   14.259154]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.259181]  ? __pfx_read_tsc+0x10/0x10
[   14.259201]  ? ktime_get_ts64+0x86/0x230
[   14.259237]  kunit_try_run_case+0x1a5/0x480
[   14.259260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.259283]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.259306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.259330]  ? __kthread_parkme+0x82/0x180
[   14.259350]  ? preempt_count_sub+0x50/0x80
[   14.259373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.259397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.259421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.259482]  kthread+0x337/0x6f0
[   14.259501]  ? trace_preempt_on+0x20/0xc0
[   14.259523]  ? __pfx_kthread+0x10/0x10
[   14.259562]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.259583]  ? calculate_sigpending+0x7b/0xa0
[   14.259625]  ? __pfx_kthread+0x10/0x10
[   14.259647]  ret_from_fork+0x116/0x1d0
[   14.259665]  ? __pfx_kthread+0x10/0x10
[   14.259685]  ret_from_fork_asm+0x1a/0x30
[   14.259717]  </TASK>
[   14.259726] 
[   14.269141] Allocated by task 279:
[   14.269333]  kasan_save_stack+0x45/0x70
[   14.269536]  kasan_save_track+0x18/0x40
[   14.269723]  kasan_save_alloc_info+0x3b/0x50
[   14.269995]  __kasan_kmalloc+0xb7/0xc0
[   14.270251]  __kmalloc_cache_noprof+0x189/0x420
[   14.270431]  kasan_bitops_generic+0x92/0x1c0
[   14.270865]  kunit_try_run_case+0x1a5/0x480
[   14.271063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.271325]  kthread+0x337/0x6f0
[   14.271506]  ret_from_fork+0x116/0x1d0
[   14.271726]  ret_from_fork_asm+0x1a/0x30
[   14.271905] 
[   14.272020] The buggy address belongs to the object at ffff888101684300
[   14.272020]  which belongs to the cache kmalloc-16 of size 16
[   14.272600] The buggy address is located 8 bytes inside of
[   14.272600]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.273138] 
[   14.273253] The buggy address belongs to the physical page:
[   14.273513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.273950] flags: 0x200000000000000(node=0|zone=2)
[   14.274214] page_type: f5(slab)
[   14.274389] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.274753] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.275154] page dumped because: kasan: bad access detected
[   14.275398] 
[   14.275501] Memory state around the buggy address:
[   14.275834]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.276170]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.276465] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.276805]                       ^
[   14.276995]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.277329]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.277691] ==================================================================
[   14.298929] ==================================================================
[   14.299376] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.299983] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.300442] 
[   14.300551] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.300593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.300605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.300625] Call Trace:
[   14.300640]  <TASK>
[   14.300655]  dump_stack_lvl+0x73/0xb0
[   14.300680]  print_report+0xd1/0x610
[   14.300701]  ? __virt_addr_valid+0x1db/0x2d0
[   14.300723]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.300751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.300774]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.300803]  kasan_report+0x141/0x180
[   14.300826]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.300860]  kasan_check_range+0x10c/0x1c0
[   14.300884]  __kasan_check_write+0x18/0x20
[   14.300903]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.300932]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.300962]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.300985]  ? trace_hardirqs_on+0x37/0xe0
[   14.301007]  ? kasan_bitops_generic+0x92/0x1c0
[   14.301035]  kasan_bitops_generic+0x121/0x1c0
[   14.301058]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.301084]  ? __pfx_read_tsc+0x10/0x10
[   14.301104]  ? ktime_get_ts64+0x86/0x230
[   14.301133]  kunit_try_run_case+0x1a5/0x480
[   14.301157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.301179]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.301202]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.301227]  ? __kthread_parkme+0x82/0x180
[   14.301246]  ? preempt_count_sub+0x50/0x80
[   14.301270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.301294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.301318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.301342]  kthread+0x337/0x6f0
[   14.301360]  ? trace_preempt_on+0x20/0xc0
[   14.301381]  ? __pfx_kthread+0x10/0x10
[   14.301401]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.301423]  ? calculate_sigpending+0x7b/0xa0
[   14.301493]  ? __pfx_kthread+0x10/0x10
[   14.301515]  ret_from_fork+0x116/0x1d0
[   14.301533]  ? __pfx_kthread+0x10/0x10
[   14.301576]  ret_from_fork_asm+0x1a/0x30
[   14.301608]  </TASK>
[   14.301617] 
[   14.310254] Allocated by task 279:
[   14.310446]  kasan_save_stack+0x45/0x70
[   14.310694]  kasan_save_track+0x18/0x40
[   14.310926]  kasan_save_alloc_info+0x3b/0x50
[   14.311133]  __kasan_kmalloc+0xb7/0xc0
[   14.311328]  __kmalloc_cache_noprof+0x189/0x420
[   14.311596]  kasan_bitops_generic+0x92/0x1c0
[   14.311820]  kunit_try_run_case+0x1a5/0x480
[   14.312011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.312283]  kthread+0x337/0x6f0
[   14.312481]  ret_from_fork+0x116/0x1d0
[   14.312754]  ret_from_fork_asm+0x1a/0x30
[   14.312947] 
[   14.313053] The buggy address belongs to the object at ffff888101684300
[   14.313053]  which belongs to the cache kmalloc-16 of size 16
[   14.313659] The buggy address is located 8 bytes inside of
[   14.313659]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.314172] 
[   14.314310] The buggy address belongs to the physical page:
[   14.314571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.314928] flags: 0x200000000000000(node=0|zone=2)
[   14.315185] page_type: f5(slab)
[   14.315302] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.315620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.315974] page dumped because: kasan: bad access detected
[   14.316218] 
[   14.316308] Memory state around the buggy address:
[   14.316535]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.316854]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.317165] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.317482]                       ^
[   14.317656]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.317899]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.318235] ==================================================================
[   14.370107] ==================================================================
[   14.370501] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.370916] Write of size 8 at addr ffff888101684308 by task kunit_try_catch/279
[   14.371238] 
[   14.371322] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.371373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.371384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.371405] Call Trace:
[   14.371416]  <TASK>
[   14.371450]  dump_stack_lvl+0x73/0xb0
[   14.371476]  print_report+0xd1/0x610
[   14.371498]  ? __virt_addr_valid+0x1db/0x2d0
[   14.371520]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.371569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.371592]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.371621]  kasan_report+0x141/0x180
[   14.371653]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.371688]  kasan_check_range+0x10c/0x1c0
[   14.371712]  __kasan_check_write+0x18/0x20
[   14.371731]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.371770]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.371802]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.371838]  ? trace_hardirqs_on+0x37/0xe0
[   14.371861]  ? kasan_bitops_generic+0x92/0x1c0
[   14.371891]  kasan_bitops_generic+0x121/0x1c0
[   14.371915]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.371941]  ? __pfx_read_tsc+0x10/0x10
[   14.371960]  ? ktime_get_ts64+0x86/0x230
[   14.371984]  kunit_try_run_case+0x1a5/0x480
[   14.372008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.372031]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.372056]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.372080]  ? __kthread_parkme+0x82/0x180
[   14.372099]  ? preempt_count_sub+0x50/0x80
[   14.372124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.372148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.372172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.372196]  kthread+0x337/0x6f0
[   14.372215]  ? trace_preempt_on+0x20/0xc0
[   14.372237]  ? __pfx_kthread+0x10/0x10
[   14.372258]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.372280]  ? calculate_sigpending+0x7b/0xa0
[   14.372304]  ? __pfx_kthread+0x10/0x10
[   14.372325]  ret_from_fork+0x116/0x1d0
[   14.372353]  ? __pfx_kthread+0x10/0x10
[   14.372373]  ret_from_fork_asm+0x1a/0x30
[   14.372405]  </TASK>
[   14.372415] 
[   14.380965] Allocated by task 279:
[   14.381151]  kasan_save_stack+0x45/0x70
[   14.381342]  kasan_save_track+0x18/0x40
[   14.381574]  kasan_save_alloc_info+0x3b/0x50
[   14.381732]  __kasan_kmalloc+0xb7/0xc0
[   14.381859]  __kmalloc_cache_noprof+0x189/0x420
[   14.382009]  kasan_bitops_generic+0x92/0x1c0
[   14.382190]  kunit_try_run_case+0x1a5/0x480
[   14.382416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.382669]  kthread+0x337/0x6f0
[   14.382833]  ret_from_fork+0x116/0x1d0
[   14.382991]  ret_from_fork_asm+0x1a/0x30
[   14.383126] 
[   14.383195] The buggy address belongs to the object at ffff888101684300
[   14.383195]  which belongs to the cache kmalloc-16 of size 16
[   14.383867] The buggy address is located 8 bytes inside of
[   14.383867]  allocated 9-byte region [ffff888101684300, ffff888101684309)
[   14.384214] 
[   14.384283] The buggy address belongs to the physical page:
[   14.384456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101684
[   14.384683] flags: 0x200000000000000(node=0|zone=2)
[   14.384944] page_type: f5(slab)
[   14.385107] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.385449] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.386115] page dumped because: kasan: bad access detected
[   14.386367] 
[   14.386466] Memory state around the buggy address:
[   14.386814]  ffff888101684200: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   14.387096]  ffff888101684280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.387314] >ffff888101684300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.387536]                       ^
[   14.387656]  ffff888101684380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.387976]  ffff888101684400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.388324] ==================================================================

[   14.714360] ==================================================================
[   14.715571] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.715966] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.717341] 
[   14.717572] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.717625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.717638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.717660] Call Trace:
[   14.717680]  <TASK>
[   14.717701]  dump_stack_lvl+0x73/0xb0
[   14.717737]  print_report+0xd1/0x610
[   14.717761]  ? __virt_addr_valid+0x1db/0x2d0
[   14.717785]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.717814]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.717837]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.717866]  kasan_report+0x141/0x180
[   14.717888]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.717920]  kasan_check_range+0x10c/0x1c0
[   14.717943]  __kasan_check_write+0x18/0x20
[   14.717966]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.717994]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.718037]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.718062]  ? kasan_bitops_generic+0x92/0x1c0
[   14.718089]  kasan_bitops_generic+0x121/0x1c0
[   14.718112]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.718135]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.718257]  kunit_try_run_case+0x1a5/0x480
[   14.718288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.718310]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.718335]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.718358]  ? __kthread_parkme+0x82/0x180
[   14.718380]  ? preempt_count_sub+0x50/0x80
[   14.718404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.718428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.718452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.718475]  kthread+0x337/0x6f0
[   14.718494]  ? trace_preempt_on+0x20/0xc0
[   14.718517]  ? __pfx_kthread+0x10/0x10
[   14.718536]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.718557]  ? calculate_sigpending+0x7b/0xa0
[   14.718581]  ? __pfx_kthread+0x10/0x10
[   14.718602]  ret_from_fork+0x116/0x1d0
[   14.718621]  ? __pfx_kthread+0x10/0x10
[   14.718640]  ret_from_fork_asm+0x1a/0x30
[   14.718671]  </TASK>
[   14.718680] 
[   14.728939] Allocated by task 278:
[   14.729238]  kasan_save_stack+0x45/0x70
[   14.729515]  kasan_save_track+0x18/0x40
[   14.729727]  kasan_save_alloc_info+0x3b/0x50
[   14.729926]  __kasan_kmalloc+0xb7/0xc0
[   14.730218]  __kmalloc_cache_noprof+0x189/0x420
[   14.730395]  kasan_bitops_generic+0x92/0x1c0
[   14.730638]  kunit_try_run_case+0x1a5/0x480
[   14.730824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.731101]  kthread+0x337/0x6f0
[   14.731254]  ret_from_fork+0x116/0x1d0
[   14.731782]  ret_from_fork_asm+0x1a/0x30
[   14.732007] 
[   14.732116] The buggy address belongs to the object at ffff888102712180
[   14.732116]  which belongs to the cache kmalloc-16 of size 16
[   14.732827] The buggy address is located 8 bytes inside of
[   14.732827]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.733385] 
[   14.733564] The buggy address belongs to the physical page:
[   14.733828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.734203] flags: 0x200000000000000(node=0|zone=2)
[   14.734677] page_type: f5(slab)
[   14.734850] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.735567] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.735877] page dumped because: kasan: bad access detected
[   14.736223] 
[   14.736303] Memory state around the buggy address:
[   14.736469]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.736866]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.737307] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.737739]                       ^
[   14.737920]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.738368]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.738704] ==================================================================
[   14.763189] ==================================================================
[   14.763845] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.764377] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.764769] 
[   14.764876] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.764948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.764961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.764983] Call Trace:
[   14.765004]  <TASK>
[   14.765148]  dump_stack_lvl+0x73/0xb0
[   14.765191]  print_report+0xd1/0x610
[   14.765215]  ? __virt_addr_valid+0x1db/0x2d0
[   14.765240]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.765268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.765294]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.765322]  kasan_report+0x141/0x180
[   14.765344]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.765377]  kasan_check_range+0x10c/0x1c0
[   14.765400]  __kasan_check_write+0x18/0x20
[   14.765419]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.765463]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.765510]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.765537]  ? kasan_bitops_generic+0x92/0x1c0
[   14.765564]  kasan_bitops_generic+0x121/0x1c0
[   14.765604]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.765629]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.765657]  kunit_try_run_case+0x1a5/0x480
[   14.765682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.765705]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.765729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.765753]  ? __kthread_parkme+0x82/0x180
[   14.765774]  ? preempt_count_sub+0x50/0x80
[   14.765817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.765843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.765868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.765894]  kthread+0x337/0x6f0
[   14.765916]  ? trace_preempt_on+0x20/0xc0
[   14.765939]  ? __pfx_kthread+0x10/0x10
[   14.765958]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.765979]  ? calculate_sigpending+0x7b/0xa0
[   14.766004]  ? __pfx_kthread+0x10/0x10
[   14.766129]  ret_from_fork+0x116/0x1d0
[   14.766150]  ? __pfx_kthread+0x10/0x10
[   14.766170]  ret_from_fork_asm+0x1a/0x30
[   14.766201]  </TASK>
[   14.766211] 
[   14.780069] Allocated by task 278:
[   14.780698]  kasan_save_stack+0x45/0x70
[   14.780941]  kasan_save_track+0x18/0x40
[   14.781428]  kasan_save_alloc_info+0x3b/0x50
[   14.781633]  __kasan_kmalloc+0xb7/0xc0
[   14.781866]  __kmalloc_cache_noprof+0x189/0x420
[   14.782252]  kasan_bitops_generic+0x92/0x1c0
[   14.782666]  kunit_try_run_case+0x1a5/0x480
[   14.782878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.783399]  kthread+0x337/0x6f0
[   14.783710]  ret_from_fork+0x116/0x1d0
[   14.783983]  ret_from_fork_asm+0x1a/0x30
[   14.784505] 
[   14.784635] The buggy address belongs to the object at ffff888102712180
[   14.784635]  which belongs to the cache kmalloc-16 of size 16
[   14.785385] The buggy address is located 8 bytes inside of
[   14.785385]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.786290] 
[   14.786432] The buggy address belongs to the physical page:
[   14.786883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.787503] flags: 0x200000000000000(node=0|zone=2)
[   14.787855] page_type: f5(slab)
[   14.788065] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.788865] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.789179] page dumped because: kasan: bad access detected
[   14.789704] 
[   14.789820] Memory state around the buggy address:
[   14.790304]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.790722]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.791063] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.791623]                       ^
[   14.791917]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.792613]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.792937] ==================================================================
[   14.826102] ==================================================================
[   14.826380] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.826902] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.828253] 
[   14.828377] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.828430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.828442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.828465] Call Trace:
[   14.828485]  <TASK>
[   14.828731]  dump_stack_lvl+0x73/0xb0
[   14.828777]  print_report+0xd1/0x610
[   14.828802]  ? __virt_addr_valid+0x1db/0x2d0
[   14.828826]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.828860]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.828883]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.828911]  kasan_report+0x141/0x180
[   14.828932]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.828965]  kasan_check_range+0x10c/0x1c0
[   14.828989]  __kasan_check_write+0x18/0x20
[   14.829019]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.829048]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.829078]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.829103]  ? kasan_bitops_generic+0x92/0x1c0
[   14.829130]  kasan_bitops_generic+0x121/0x1c0
[   14.829154]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.829178]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.829206]  kunit_try_run_case+0x1a5/0x480
[   14.829232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829254]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.829279]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.829302]  ? __kthread_parkme+0x82/0x180
[   14.829323]  ? preempt_count_sub+0x50/0x80
[   14.829347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.829395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.829419]  kthread+0x337/0x6f0
[   14.829447]  ? trace_preempt_on+0x20/0xc0
[   14.829470]  ? __pfx_kthread+0x10/0x10
[   14.829489]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.829510]  ? calculate_sigpending+0x7b/0xa0
[   14.829534]  ? __pfx_kthread+0x10/0x10
[   14.829554]  ret_from_fork+0x116/0x1d0
[   14.829574]  ? __pfx_kthread+0x10/0x10
[   14.829594]  ret_from_fork_asm+0x1a/0x30
[   14.829625]  </TASK>
[   14.829636] 
[   14.840581] Allocated by task 278:
[   14.840779]  kasan_save_stack+0x45/0x70
[   14.840993]  kasan_save_track+0x18/0x40
[   14.841166]  kasan_save_alloc_info+0x3b/0x50
[   14.841379]  __kasan_kmalloc+0xb7/0xc0
[   14.841883]  __kmalloc_cache_noprof+0x189/0x420
[   14.842231]  kasan_bitops_generic+0x92/0x1c0
[   14.842564]  kunit_try_run_case+0x1a5/0x480
[   14.842847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.843133]  kthread+0x337/0x6f0
[   14.843406]  ret_from_fork+0x116/0x1d0
[   14.843614]  ret_from_fork_asm+0x1a/0x30
[   14.843825] 
[   14.844166] The buggy address belongs to the object at ffff888102712180
[   14.844166]  which belongs to the cache kmalloc-16 of size 16
[   14.844736] The buggy address is located 8 bytes inside of
[   14.844736]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.845397] 
[   14.845517] The buggy address belongs to the physical page:
[   14.845979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.846350] flags: 0x200000000000000(node=0|zone=2)
[   14.846803] page_type: f5(slab)
[   14.846992] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.847489] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.847832] page dumped because: kasan: bad access detected
[   14.848267] 
[   14.848448] Memory state around the buggy address:
[   14.848631]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.849071]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.849408] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.850088]                       ^
[   14.850264]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.850909]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.851225] ==================================================================
[   14.795085] ==================================================================
[   14.795403] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.795837] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.796852] 
[   14.797024] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.797092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.797104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.797126] Call Trace:
[   14.797150]  <TASK>
[   14.797170]  dump_stack_lvl+0x73/0xb0
[   14.797207]  print_report+0xd1/0x610
[   14.797231]  ? __virt_addr_valid+0x1db/0x2d0
[   14.797254]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.797282]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.797305]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.797333]  kasan_report+0x141/0x180
[   14.797355]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.797387]  kasan_check_range+0x10c/0x1c0
[   14.797411]  __kasan_check_write+0x18/0x20
[   14.797796]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.797833]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.797863]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.797889]  ? kasan_bitops_generic+0x92/0x1c0
[   14.797917]  kasan_bitops_generic+0x121/0x1c0
[   14.797940]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.797964]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.797992]  kunit_try_run_case+0x1a5/0x480
[   14.798032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.798055]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.798081]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.798105]  ? __kthread_parkme+0x82/0x180
[   14.798126]  ? preempt_count_sub+0x50/0x80
[   14.798150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.798174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.798199]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.798223]  kthread+0x337/0x6f0
[   14.798242]  ? trace_preempt_on+0x20/0xc0
[   14.798265]  ? __pfx_kthread+0x10/0x10
[   14.798284]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.798305]  ? calculate_sigpending+0x7b/0xa0
[   14.798330]  ? __pfx_kthread+0x10/0x10
[   14.798351]  ret_from_fork+0x116/0x1d0
[   14.798370]  ? __pfx_kthread+0x10/0x10
[   14.798389]  ret_from_fork_asm+0x1a/0x30
[   14.798419]  </TASK>
[   14.798430] 
[   14.812141] Allocated by task 278:
[   14.812345]  kasan_save_stack+0x45/0x70
[   14.812684]  kasan_save_track+0x18/0x40
[   14.812876]  kasan_save_alloc_info+0x3b/0x50
[   14.813440]  __kasan_kmalloc+0xb7/0xc0
[   14.813857]  __kmalloc_cache_noprof+0x189/0x420
[   14.814246]  kasan_bitops_generic+0x92/0x1c0
[   14.814523]  kunit_try_run_case+0x1a5/0x480
[   14.814712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.815406]  kthread+0x337/0x6f0
[   14.815552]  ret_from_fork+0x116/0x1d0
[   14.816206]  ret_from_fork_asm+0x1a/0x30
[   14.816408] 
[   14.816500] The buggy address belongs to the object at ffff888102712180
[   14.816500]  which belongs to the cache kmalloc-16 of size 16
[   14.817339] The buggy address is located 8 bytes inside of
[   14.817339]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.818405] 
[   14.818607] The buggy address belongs to the physical page:
[   14.818843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.819750] flags: 0x200000000000000(node=0|zone=2)
[   14.820304] page_type: f5(slab)
[   14.820487] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.820877] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.821566] page dumped because: kasan: bad access detected
[   14.821908] 
[   14.822018] Memory state around the buggy address:
[   14.822345]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.822867]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.823670] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.824216]                       ^
[   14.824374]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.824989]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.825487] ==================================================================
[   14.739620] ==================================================================
[   14.739913] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.740543] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.741374] 
[   14.741527] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.741594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.741620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.741642] Call Trace:
[   14.741663]  <TASK>
[   14.741683]  dump_stack_lvl+0x73/0xb0
[   14.741716]  print_report+0xd1/0x610
[   14.741740]  ? __virt_addr_valid+0x1db/0x2d0
[   14.741764]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.741793]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.741817]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.741846]  kasan_report+0x141/0x180
[   14.741868]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.741902]  kasan_check_range+0x10c/0x1c0
[   14.741926]  __kasan_check_write+0x18/0x20
[   14.741945]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.741973]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.742002]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.742110]  ? kasan_bitops_generic+0x92/0x1c0
[   14.742161]  kasan_bitops_generic+0x121/0x1c0
[   14.742186]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.742210]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.742254]  kunit_try_run_case+0x1a5/0x480
[   14.742280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.742303]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.742327]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.742351]  ? __kthread_parkme+0x82/0x180
[   14.742372]  ? preempt_count_sub+0x50/0x80
[   14.742396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.742420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.742444]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.742467]  kthread+0x337/0x6f0
[   14.742486]  ? trace_preempt_on+0x20/0xc0
[   14.742509]  ? __pfx_kthread+0x10/0x10
[   14.742528]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.742550]  ? calculate_sigpending+0x7b/0xa0
[   14.742575]  ? __pfx_kthread+0x10/0x10
[   14.742595]  ret_from_fork+0x116/0x1d0
[   14.742614]  ? __pfx_kthread+0x10/0x10
[   14.742634]  ret_from_fork_asm+0x1a/0x30
[   14.742665]  </TASK>
[   14.742677] 
[   14.752557] Allocated by task 278:
[   14.752805]  kasan_save_stack+0x45/0x70
[   14.753133]  kasan_save_track+0x18/0x40
[   14.753319]  kasan_save_alloc_info+0x3b/0x50
[   14.753592]  __kasan_kmalloc+0xb7/0xc0
[   14.753773]  __kmalloc_cache_noprof+0x189/0x420
[   14.753955]  kasan_bitops_generic+0x92/0x1c0
[   14.754112]  kunit_try_run_case+0x1a5/0x480
[   14.754534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.755067]  kthread+0x337/0x6f0
[   14.755292]  ret_from_fork+0x116/0x1d0
[   14.755485]  ret_from_fork_asm+0x1a/0x30
[   14.755621] 
[   14.755691] The buggy address belongs to the object at ffff888102712180
[   14.755691]  which belongs to the cache kmalloc-16 of size 16
[   14.756948] The buggy address is located 8 bytes inside of
[   14.756948]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.757401] 
[   14.757476] The buggy address belongs to the physical page:
[   14.757790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.758363] flags: 0x200000000000000(node=0|zone=2)
[   14.758595] page_type: f5(slab)
[   14.758878] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.759563] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.759834] page dumped because: kasan: bad access detected
[   14.760277] 
[   14.760376] Memory state around the buggy address:
[   14.760656]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.760898]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.761346] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.761666]                       ^
[   14.761875]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.762224]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.762541] ==================================================================
[   14.879349] ==================================================================
[   14.879616] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.879916] Read of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.880924] 
[   14.881033] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.881084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.881095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.881117] Call Trace:
[   14.881138]  <TASK>
[   14.881157]  dump_stack_lvl+0x73/0xb0
[   14.881187]  print_report+0xd1/0x610
[   14.881211]  ? __virt_addr_valid+0x1db/0x2d0
[   14.881234]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.881262]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.881297]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.881325]  kasan_report+0x141/0x180
[   14.881346]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.881493]  __asan_report_load8_noabort+0x18/0x20
[   14.881578]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.881639]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.881669]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.881771]  ? kasan_bitops_generic+0x92/0x1c0
[   14.881800]  kasan_bitops_generic+0x121/0x1c0
[   14.881824]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.881848]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.881877]  kunit_try_run_case+0x1a5/0x480
[   14.881903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.881927]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.881951]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.881973]  ? __kthread_parkme+0x82/0x180
[   14.881994]  ? preempt_count_sub+0x50/0x80
[   14.882029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.882053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.882077]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.882100]  kthread+0x337/0x6f0
[   14.882119]  ? trace_preempt_on+0x20/0xc0
[   14.882142]  ? __pfx_kthread+0x10/0x10
[   14.882162]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.882183]  ? calculate_sigpending+0x7b/0xa0
[   14.882207]  ? __pfx_kthread+0x10/0x10
[   14.882227]  ret_from_fork+0x116/0x1d0
[   14.882247]  ? __pfx_kthread+0x10/0x10
[   14.882266]  ret_from_fork_asm+0x1a/0x30
[   14.882297]  </TASK>
[   14.882308] 
[   14.896450] Allocated by task 278:
[   14.896935]  kasan_save_stack+0x45/0x70
[   14.897326]  kasan_save_track+0x18/0x40
[   14.897705]  kasan_save_alloc_info+0x3b/0x50
[   14.898107]  __kasan_kmalloc+0xb7/0xc0
[   14.898479]  __kmalloc_cache_noprof+0x189/0x420
[   14.898891]  kasan_bitops_generic+0x92/0x1c0
[   14.899289]  kunit_try_run_case+0x1a5/0x480
[   14.899694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.900174]  kthread+0x337/0x6f0
[   14.900505]  ret_from_fork+0x116/0x1d0
[   14.900861]  ret_from_fork_asm+0x1a/0x30
[   14.901238] 
[   14.901431] The buggy address belongs to the object at ffff888102712180
[   14.901431]  which belongs to the cache kmalloc-16 of size 16
[   14.901894] The buggy address is located 8 bytes inside of
[   14.901894]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.902259] 
[   14.902337] The buggy address belongs to the physical page:
[   14.902794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.903503] flags: 0x200000000000000(node=0|zone=2)
[   14.904284] page_type: f5(slab)
[   14.904838] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.905238] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.905704] page dumped because: kasan: bad access detected
[   14.906473] 
[   14.906795] Memory state around the buggy address:
[   14.907414]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.907694]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.907911] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.908139]                       ^
[   14.908371]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.909088]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.909756] ==================================================================
[   14.667260] ==================================================================
[   14.667641] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.667985] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.668644] 
[   14.668767] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.668816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.668827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.668854] Call Trace:
[   14.668874]  <TASK>
[   14.668893]  dump_stack_lvl+0x73/0xb0
[   14.668925]  print_report+0xd1/0x610
[   14.668948]  ? __virt_addr_valid+0x1db/0x2d0
[   14.668970]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.669138]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.669168]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.669198]  kasan_report+0x141/0x180
[   14.669221]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.669254]  kasan_check_range+0x10c/0x1c0
[   14.669277]  __kasan_check_write+0x18/0x20
[   14.669297]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.669326]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.669355]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.669380]  ? kasan_bitops_generic+0x92/0x1c0
[   14.669407]  kasan_bitops_generic+0x121/0x1c0
[   14.669452]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.669476]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.669504]  kunit_try_run_case+0x1a5/0x480
[   14.669529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.669551]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.669575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.669598]  ? __kthread_parkme+0x82/0x180
[   14.669621]  ? preempt_count_sub+0x50/0x80
[   14.669645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.669669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.669692]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.669716]  kthread+0x337/0x6f0
[   14.669734]  ? trace_preempt_on+0x20/0xc0
[   14.669757]  ? __pfx_kthread+0x10/0x10
[   14.669778]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.669798]  ? calculate_sigpending+0x7b/0xa0
[   14.669822]  ? __pfx_kthread+0x10/0x10
[   14.669843]  ret_from_fork+0x116/0x1d0
[   14.669862]  ? __pfx_kthread+0x10/0x10
[   14.669882]  ret_from_fork_asm+0x1a/0x30
[   14.669912]  </TASK>
[   14.669921] 
[   14.678642] Allocated by task 278:
[   14.678835]  kasan_save_stack+0x45/0x70
[   14.679034]  kasan_save_track+0x18/0x40
[   14.679215]  kasan_save_alloc_info+0x3b/0x50
[   14.679380]  __kasan_kmalloc+0xb7/0xc0
[   14.679511]  __kmalloc_cache_noprof+0x189/0x420
[   14.679737]  kasan_bitops_generic+0x92/0x1c0
[   14.679944]  kunit_try_run_case+0x1a5/0x480
[   14.680524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.680769]  kthread+0x337/0x6f0
[   14.680941]  ret_from_fork+0x116/0x1d0
[   14.681190]  ret_from_fork_asm+0x1a/0x30
[   14.681336] 
[   14.681408] The buggy address belongs to the object at ffff888102712180
[   14.681408]  which belongs to the cache kmalloc-16 of size 16
[   14.681851] The buggy address is located 8 bytes inside of
[   14.681851]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.682521] 
[   14.682623] The buggy address belongs to the physical page:
[   14.682808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.683175] flags: 0x200000000000000(node=0|zone=2)
[   14.683434] page_type: f5(slab)
[   14.683635] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.683983] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.684549] page dumped because: kasan: bad access detected
[   14.684758] 
[   14.684857] Memory state around the buggy address:
[   14.685196]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.685550]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.685873] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.686318]                       ^
[   14.686475]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.686729]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.687144] ==================================================================
[   14.687694] ==================================================================
[   14.687979] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.688360] Write of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.688693] 
[   14.688810] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.688862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.688873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.688896] Call Trace:
[   14.688916]  <TASK>
[   14.688936]  dump_stack_lvl+0x73/0xb0
[   14.688964]  print_report+0xd1/0x610
[   14.688986]  ? __virt_addr_valid+0x1db/0x2d0
[   14.689018]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.689044]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.689066]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.689096]  kasan_report+0x141/0x180
[   14.689117]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.689148]  kasan_check_range+0x10c/0x1c0
[   14.689170]  __kasan_check_write+0x18/0x20
[   14.689188]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.689214]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.689241]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.689265]  ? kasan_bitops_generic+0x92/0x1c0
[   14.689290]  kasan_bitops_generic+0x121/0x1c0
[   14.689313]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.689338]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.689366]  kunit_try_run_case+0x1a5/0x480
[   14.689390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.689412]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.689435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.689457]  ? __kthread_parkme+0x82/0x180
[   14.689477]  ? preempt_count_sub+0x50/0x80
[   14.689500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.689522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.689544]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.689567]  kthread+0x337/0x6f0
[   14.689585]  ? trace_preempt_on+0x20/0xc0
[   14.689607]  ? __pfx_kthread+0x10/0x10
[   14.689626]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.689646]  ? calculate_sigpending+0x7b/0xa0
[   14.689669]  ? __pfx_kthread+0x10/0x10
[   14.689688]  ret_from_fork+0x116/0x1d0
[   14.689708]  ? __pfx_kthread+0x10/0x10
[   14.689726]  ret_from_fork_asm+0x1a/0x30
[   14.689756]  </TASK>
[   14.689766] 
[   14.699098] Allocated by task 278:
[   14.699255]  kasan_save_stack+0x45/0x70
[   14.699507]  kasan_save_track+0x18/0x40
[   14.699700]  kasan_save_alloc_info+0x3b/0x50
[   14.699905]  __kasan_kmalloc+0xb7/0xc0
[   14.700238]  __kmalloc_cache_noprof+0x189/0x420
[   14.700702]  kasan_bitops_generic+0x92/0x1c0
[   14.700922]  kunit_try_run_case+0x1a5/0x480
[   14.701129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.701374]  kthread+0x337/0x6f0
[   14.701534]  ret_from_fork+0x116/0x1d0
[   14.701710]  ret_from_fork_asm+0x1a/0x30
[   14.701895] 
[   14.701985] The buggy address belongs to the object at ffff888102712180
[   14.701985]  which belongs to the cache kmalloc-16 of size 16
[   14.704306] The buggy address is located 8 bytes inside of
[   14.704306]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.704989] 
[   14.705293] The buggy address belongs to the physical page:
[   14.705649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.706290] flags: 0x200000000000000(node=0|zone=2)
[   14.706686] page_type: f5(slab)
[   14.706861] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.707920] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.708808] page dumped because: kasan: bad access detected
[   14.709341] 
[   14.709519] Memory state around the buggy address:
[   14.709744]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.710399]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.710836] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.711891]                       ^
[   14.712271]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.713003]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.713320] ==================================================================
[   14.852634] ==================================================================
[   14.852950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.853591] Read of size 8 at addr ffff888102712188 by task kunit_try_catch/278
[   14.853992] 
[   14.854328] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.854383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.854395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.854417] Call Trace:
[   14.854437]  <TASK>
[   14.854458]  dump_stack_lvl+0x73/0xb0
[   14.854493]  print_report+0xd1/0x610
[   14.854516]  ? __virt_addr_valid+0x1db/0x2d0
[   14.854542]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.854571]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.854594]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.854622]  kasan_report+0x141/0x180
[   14.854643]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.854676]  kasan_check_range+0x10c/0x1c0
[   14.854699]  __kasan_check_read+0x15/0x20
[   14.854718]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.854746]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.854775]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.854802]  ? kasan_bitops_generic+0x92/0x1c0
[   14.854828]  kasan_bitops_generic+0x121/0x1c0
[   14.854851]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.854875]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.854903]  kunit_try_run_case+0x1a5/0x480
[   14.854928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.854950]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.854974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.854998]  ? __kthread_parkme+0x82/0x180
[   14.855030]  ? preempt_count_sub+0x50/0x80
[   14.855054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.855077]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.855100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.855124]  kthread+0x337/0x6f0
[   14.855142]  ? trace_preempt_on+0x20/0xc0
[   14.855164]  ? __pfx_kthread+0x10/0x10
[   14.855185]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.855205]  ? calculate_sigpending+0x7b/0xa0
[   14.855229]  ? __pfx_kthread+0x10/0x10
[   14.855250]  ret_from_fork+0x116/0x1d0
[   14.855269]  ? __pfx_kthread+0x10/0x10
[   14.855289]  ret_from_fork_asm+0x1a/0x30
[   14.855320]  </TASK>
[   14.855330] 
[   14.866320] Allocated by task 278:
[   14.866706]  kasan_save_stack+0x45/0x70
[   14.867062]  kasan_save_track+0x18/0x40
[   14.867250]  kasan_save_alloc_info+0x3b/0x50
[   14.867699]  __kasan_kmalloc+0xb7/0xc0
[   14.867946]  __kmalloc_cache_noprof+0x189/0x420
[   14.868181]  kasan_bitops_generic+0x92/0x1c0
[   14.868375]  kunit_try_run_case+0x1a5/0x480
[   14.869026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.869302]  kthread+0x337/0x6f0
[   14.869639]  ret_from_fork+0x116/0x1d0
[   14.869985]  ret_from_fork_asm+0x1a/0x30
[   14.870194] 
[   14.870301] The buggy address belongs to the object at ffff888102712180
[   14.870301]  which belongs to the cache kmalloc-16 of size 16
[   14.871567] The buggy address is located 8 bytes inside of
[   14.871567]  allocated 9-byte region [ffff888102712180, ffff888102712189)
[   14.872390] 
[   14.872552] The buggy address belongs to the physical page:
[   14.872942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102712
[   14.873276] flags: 0x200000000000000(node=0|zone=2)
[   14.873774] page_type: f5(slab)
[   14.873949] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.874286] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.875050] page dumped because: kasan: bad access detected
[   14.875525] 
[   14.875624] Memory state around the buggy address:
[   14.875826]  ffff888102712080: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   14.876132]  ffff888102712100: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.876695] >ffff888102712180: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.877069]                       ^
[   14.877229]  ffff888102712200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.877860]  ffff888102712280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.878215] ==================================================================

[   14.534042] ==================================================================
[   14.534508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.535409] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.535924] 
[   14.536124] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.536169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.536180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.536201] Call Trace:
[   14.536216]  <TASK>
[   14.536232]  dump_stack_lvl+0x73/0xb0
[   14.536260]  print_report+0xd1/0x610
[   14.536282]  ? __virt_addr_valid+0x1db/0x2d0
[   14.536305]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.536332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.536355]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.536384]  kasan_report+0x141/0x180
[   14.536406]  ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.536439]  kasan_check_range+0x10c/0x1c0
[   14.536463]  __kasan_check_write+0x18/0x20
[   14.536481]  kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90
[   14.536510]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.536539]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.536564]  ? trace_hardirqs_on+0x37/0xe0
[   14.536586]  ? kasan_bitops_generic+0x92/0x1c0
[   14.536614]  kasan_bitops_generic+0x121/0x1c0
[   14.536637]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.536662]  ? __pfx_read_tsc+0x10/0x10
[   14.536682]  ? ktime_get_ts64+0x86/0x230
[   14.536739]  kunit_try_run_case+0x1a5/0x480
[   14.536763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.536796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.536820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.536844]  ? __kthread_parkme+0x82/0x180
[   14.536864]  ? preempt_count_sub+0x50/0x80
[   14.536889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.536922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.536946]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.536972]  kthread+0x337/0x6f0
[   14.536990]  ? trace_preempt_on+0x20/0xc0
[   14.537013]  ? __pfx_kthread+0x10/0x10
[   14.537032]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.537054]  ? calculate_sigpending+0x7b/0xa0
[   14.537079]  ? __pfx_kthread+0x10/0x10
[   14.537100]  ret_from_fork+0x116/0x1d0
[   14.537118]  ? __pfx_kthread+0x10/0x10
[   14.537138]  ret_from_fork_asm+0x1a/0x30
[   14.537171]  </TASK>
[   14.537182] 
[   14.552193] Allocated by task 278:
[   14.552551]  kasan_save_stack+0x45/0x70
[   14.552816]  kasan_save_track+0x18/0x40
[   14.553219]  kasan_save_alloc_info+0x3b/0x50
[   14.553425]  __kasan_kmalloc+0xb7/0xc0
[   14.553856]  __kmalloc_cache_noprof+0x189/0x420
[   14.554261]  kasan_bitops_generic+0x92/0x1c0
[   14.554613]  kunit_try_run_case+0x1a5/0x480
[   14.554959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.555444]  kthread+0x337/0x6f0
[   14.555737]  ret_from_fork+0x116/0x1d0
[   14.555927]  ret_from_fork_asm+0x1a/0x30
[   14.556333] 
[   14.556511] The buggy address belongs to the object at ffff888102837220
[   14.556511]  which belongs to the cache kmalloc-16 of size 16
[   14.557370] The buggy address is located 8 bytes inside of
[   14.557370]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.558242] 
[   14.558425] The buggy address belongs to the physical page:
[   14.559018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.559905] flags: 0x200000000000000(node=0|zone=2)
[   14.560407] page_type: f5(slab)
[   14.560702] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.561448] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.561683] page dumped because: kasan: bad access detected
[   14.561878] 
[   14.562028] Memory state around the buggy address:
[   14.562486]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.563227]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.563952] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.564610]                                   ^
[   14.565095]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.565619]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.566060] ==================================================================
[   14.384309] ==================================================================
[   14.384657] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.385023] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.385356] 
[   14.385449] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.385490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.385502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.385521] Call Trace:
[   14.385536]  <TASK>
[   14.385551]  dump_stack_lvl+0x73/0xb0
[   14.385577]  print_report+0xd1/0x610
[   14.385598]  ? __virt_addr_valid+0x1db/0x2d0
[   14.385621]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.385647]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.385669]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.385696]  kasan_report+0x141/0x180
[   14.385717]  ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.385749]  kasan_check_range+0x10c/0x1c0
[   14.385772]  __kasan_check_write+0x18/0x20
[   14.385791]  kasan_bitops_test_and_modify.constprop.0+0x101/0xd90
[   14.385817]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.385845]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.385868]  ? trace_hardirqs_on+0x37/0xe0
[   14.385935]  ? kasan_bitops_generic+0x92/0x1c0
[   14.386037]  kasan_bitops_generic+0x121/0x1c0
[   14.386062]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.386086]  ? __pfx_read_tsc+0x10/0x10
[   14.386110]  ? ktime_get_ts64+0x86/0x230
[   14.386138]  kunit_try_run_case+0x1a5/0x480
[   14.386163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.386186]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.386212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.386235]  ? __kthread_parkme+0x82/0x180
[   14.386257]  ? preempt_count_sub+0x50/0x80
[   14.386282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.386307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.386332]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.386357]  kthread+0x337/0x6f0
[   14.386376]  ? trace_preempt_on+0x20/0xc0
[   14.386398]  ? __pfx_kthread+0x10/0x10
[   14.386418]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.386442]  ? calculate_sigpending+0x7b/0xa0
[   14.386467]  ? __pfx_kthread+0x10/0x10
[   14.386488]  ret_from_fork+0x116/0x1d0
[   14.386507]  ? __pfx_kthread+0x10/0x10
[   14.386528]  ret_from_fork_asm+0x1a/0x30
[   14.386560]  </TASK>
[   14.386571] 
[   14.396139] Allocated by task 278:
[   14.396274]  kasan_save_stack+0x45/0x70
[   14.396424]  kasan_save_track+0x18/0x40
[   14.396626]  kasan_save_alloc_info+0x3b/0x50
[   14.396845]  __kasan_kmalloc+0xb7/0xc0
[   14.397262]  __kmalloc_cache_noprof+0x189/0x420
[   14.397447]  kasan_bitops_generic+0x92/0x1c0
[   14.397732]  kunit_try_run_case+0x1a5/0x480
[   14.398024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.398229]  kthread+0x337/0x6f0
[   14.398397]  ret_from_fork+0x116/0x1d0
[   14.398695]  ret_from_fork_asm+0x1a/0x30
[   14.398921] 
[   14.399021] The buggy address belongs to the object at ffff888102837220
[   14.399021]  which belongs to the cache kmalloc-16 of size 16
[   14.399513] The buggy address is located 8 bytes inside of
[   14.399513]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.400176] 
[   14.400278] The buggy address belongs to the physical page:
[   14.400504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.401086] flags: 0x200000000000000(node=0|zone=2)
[   14.401329] page_type: f5(slab)
[   14.401486] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.401988] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.402354] page dumped because: kasan: bad access detected
[   14.402617] 
[   14.402709] Memory state around the buggy address:
[   14.402955]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.403251]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.403529] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.403823]                                   ^
[   14.403983]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.404306]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.404617] ==================================================================
[   14.473740] ==================================================================
[   14.474262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.474750] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.475120] 
[   14.475229] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.475271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.475281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.475301] Call Trace:
[   14.475316]  <TASK>
[   14.475332]  dump_stack_lvl+0x73/0xb0
[   14.475360]  print_report+0xd1/0x610
[   14.475381]  ? __virt_addr_valid+0x1db/0x2d0
[   14.475405]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.475434]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.475457]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.475485]  kasan_report+0x141/0x180
[   14.475508]  ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.475561]  kasan_check_range+0x10c/0x1c0
[   14.475585]  __kasan_check_write+0x18/0x20
[   14.475604]  kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90
[   14.475632]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.475661]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.475685]  ? trace_hardirqs_on+0x37/0xe0
[   14.475753]  ? kasan_bitops_generic+0x92/0x1c0
[   14.475817]  kasan_bitops_generic+0x121/0x1c0
[   14.475919]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.475945]  ? __pfx_read_tsc+0x10/0x10
[   14.476010]  ? ktime_get_ts64+0x86/0x230
[   14.476036]  kunit_try_run_case+0x1a5/0x480
[   14.476061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.476082]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.476107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.476130]  ? __kthread_parkme+0x82/0x180
[   14.476150]  ? preempt_count_sub+0x50/0x80
[   14.476174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.476198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.476221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.476245]  kthread+0x337/0x6f0
[   14.476264]  ? trace_preempt_on+0x20/0xc0
[   14.476286]  ? __pfx_kthread+0x10/0x10
[   14.476306]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.476328]  ? calculate_sigpending+0x7b/0xa0
[   14.476395]  ? __pfx_kthread+0x10/0x10
[   14.476417]  ret_from_fork+0x116/0x1d0
[   14.476435]  ? __pfx_kthread+0x10/0x10
[   14.476503]  ret_from_fork_asm+0x1a/0x30
[   14.476572]  </TASK>
[   14.476583] 
[   14.486336] Allocated by task 278:
[   14.486667]  kasan_save_stack+0x45/0x70
[   14.487077]  kasan_save_track+0x18/0x40
[   14.487236]  kasan_save_alloc_info+0x3b/0x50
[   14.487479]  __kasan_kmalloc+0xb7/0xc0
[   14.487879]  __kmalloc_cache_noprof+0x189/0x420
[   14.488120]  kasan_bitops_generic+0x92/0x1c0
[   14.488497]  kunit_try_run_case+0x1a5/0x480
[   14.488641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.488811]  kthread+0x337/0x6f0
[   14.488954]  ret_from_fork+0x116/0x1d0
[   14.489103]  ret_from_fork_asm+0x1a/0x30
[   14.489240] 
[   14.489348] The buggy address belongs to the object at ffff888102837220
[   14.489348]  which belongs to the cache kmalloc-16 of size 16
[   14.490229] The buggy address is located 8 bytes inside of
[   14.490229]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.491271] 
[   14.491396] The buggy address belongs to the physical page:
[   14.491675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.492318] flags: 0x200000000000000(node=0|zone=2)
[   14.492569] page_type: f5(slab)
[   14.492709] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.493360] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.493596] page dumped because: kasan: bad access detected
[   14.493769] 
[   14.493838] Memory state around the buggy address:
[   14.494030]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.494445]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.494799] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.495245]                                   ^
[   14.495602]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.496231]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.496772] ==================================================================
[   14.427139] ==================================================================
[   14.427477] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.427837] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.428134] 
[   14.428260] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.428301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.428312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.428332] Call Trace:
[   14.428345]  <TASK>
[   14.428386]  dump_stack_lvl+0x73/0xb0
[   14.428415]  print_report+0xd1/0x610
[   14.428437]  ? __virt_addr_valid+0x1db/0x2d0
[   14.428477]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.428505]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.428732]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.428774]  kasan_report+0x141/0x180
[   14.428797]  ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.428831]  kasan_check_range+0x10c/0x1c0
[   14.428855]  __kasan_check_write+0x18/0x20
[   14.428874]  kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90
[   14.428935]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.428964]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.428988]  ? trace_hardirqs_on+0x37/0xe0
[   14.429010]  ? kasan_bitops_generic+0x92/0x1c0
[   14.429038]  kasan_bitops_generic+0x121/0x1c0
[   14.429080]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.429105]  ? __pfx_read_tsc+0x10/0x10
[   14.429126]  ? ktime_get_ts64+0x86/0x230
[   14.429150]  kunit_try_run_case+0x1a5/0x480
[   14.429174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.429196]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.429220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.429262]  ? __kthread_parkme+0x82/0x180
[   14.429281]  ? preempt_count_sub+0x50/0x80
[   14.429306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.429331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.429355]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.429380]  kthread+0x337/0x6f0
[   14.429416]  ? trace_preempt_on+0x20/0xc0
[   14.429437]  ? __pfx_kthread+0x10/0x10
[   14.429458]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.429481]  ? calculate_sigpending+0x7b/0xa0
[   14.429505]  ? __pfx_kthread+0x10/0x10
[   14.429526]  ret_from_fork+0x116/0x1d0
[   14.429593]  ? __pfx_kthread+0x10/0x10
[   14.429614]  ret_from_fork_asm+0x1a/0x30
[   14.429646]  </TASK>
[   14.429656] 
[   14.439339] Allocated by task 278:
[   14.439524]  kasan_save_stack+0x45/0x70
[   14.439793]  kasan_save_track+0x18/0x40
[   14.440013]  kasan_save_alloc_info+0x3b/0x50
[   14.440164]  __kasan_kmalloc+0xb7/0xc0
[   14.440293]  __kmalloc_cache_noprof+0x189/0x420
[   14.440444]  kasan_bitops_generic+0x92/0x1c0
[   14.440589]  kunit_try_run_case+0x1a5/0x480
[   14.440749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.441029]  kthread+0x337/0x6f0
[   14.441194]  ret_from_fork+0x116/0x1d0
[   14.441379]  ret_from_fork_asm+0x1a/0x30
[   14.441572] 
[   14.441663] The buggy address belongs to the object at ffff888102837220
[   14.441663]  which belongs to the cache kmalloc-16 of size 16
[   14.442685] The buggy address is located 8 bytes inside of
[   14.442685]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.443333] 
[   14.443408] The buggy address belongs to the physical page:
[   14.443730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.444222] flags: 0x200000000000000(node=0|zone=2)
[   14.444449] page_type: f5(slab)
[   14.444809] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.445116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.445339] page dumped because: kasan: bad access detected
[   14.445514] 
[   14.445701] Memory state around the buggy address:
[   14.445957]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.446444]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.447048] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.447361]                                   ^
[   14.447574]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.447972]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.448204] ==================================================================
[   14.566709] ==================================================================
[   14.567415] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.568352] Read of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.568574] 
[   14.568662] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.568742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.568754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.568775] Call Trace:
[   14.568800]  <TASK>
[   14.568817]  dump_stack_lvl+0x73/0xb0
[   14.568858]  print_report+0xd1/0x610
[   14.568880]  ? __virt_addr_valid+0x1db/0x2d0
[   14.568931]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.568959]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.568981]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.569019]  kasan_report+0x141/0x180
[   14.569041]  ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.569103]  kasan_check_range+0x10c/0x1c0
[   14.569127]  __kasan_check_read+0x15/0x20
[   14.569146]  kasan_bitops_test_and_modify.constprop.0+0x557/0xd90
[   14.569173]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.569203]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.569226]  ? trace_hardirqs_on+0x37/0xe0
[   14.569249]  ? kasan_bitops_generic+0x92/0x1c0
[   14.569314]  kasan_bitops_generic+0x121/0x1c0
[   14.569337]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.569389]  ? __pfx_read_tsc+0x10/0x10
[   14.569410]  ? ktime_get_ts64+0x86/0x230
[   14.569435]  kunit_try_run_case+0x1a5/0x480
[   14.569485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.569508]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.569562]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.569587]  ? __kthread_parkme+0x82/0x180
[   14.569609]  ? preempt_count_sub+0x50/0x80
[   14.569636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.569660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.569684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.569708]  kthread+0x337/0x6f0
[   14.569727]  ? trace_preempt_on+0x20/0xc0
[   14.569749]  ? __pfx_kthread+0x10/0x10
[   14.569769]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.569790]  ? calculate_sigpending+0x7b/0xa0
[   14.569815]  ? __pfx_kthread+0x10/0x10
[   14.569836]  ret_from_fork+0x116/0x1d0
[   14.569855]  ? __pfx_kthread+0x10/0x10
[   14.569875]  ret_from_fork_asm+0x1a/0x30
[   14.569917]  </TASK>
[   14.569927] 
[   14.586235] Allocated by task 278:
[   14.586568]  kasan_save_stack+0x45/0x70
[   14.586883]  kasan_save_track+0x18/0x40
[   14.587240]  kasan_save_alloc_info+0x3b/0x50
[   14.587562]  __kasan_kmalloc+0xb7/0xc0
[   14.587705]  __kmalloc_cache_noprof+0x189/0x420
[   14.587865]  kasan_bitops_generic+0x92/0x1c0
[   14.588126]  kunit_try_run_case+0x1a5/0x480
[   14.588276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.588527]  kthread+0x337/0x6f0
[   14.588757]  ret_from_fork+0x116/0x1d0
[   14.588940]  ret_from_fork_asm+0x1a/0x30
[   14.589197] 
[   14.589377] The buggy address belongs to the object at ffff888102837220
[   14.589377]  which belongs to the cache kmalloc-16 of size 16
[   14.589803] The buggy address is located 8 bytes inside of
[   14.589803]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.590651] 
[   14.590828] The buggy address belongs to the physical page:
[   14.591181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.591524] flags: 0x200000000000000(node=0|zone=2)
[   14.591783] page_type: f5(slab)
[   14.591960] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.592346] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.592615] page dumped because: kasan: bad access detected
[   14.592886] 
[   14.592995] Memory state around the buggy address:
[   14.593288]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.593795]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.594247] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.594697]                                   ^
[   14.594900]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.595237]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.595599] ==================================================================
[   14.448763] ==================================================================
[   14.449191] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.449621] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.450035] 
[   14.450167] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.450208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.450219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.450240] Call Trace:
[   14.450273]  <TASK>
[   14.450288]  dump_stack_lvl+0x73/0xb0
[   14.450317]  print_report+0xd1/0x610
[   14.450339]  ? __virt_addr_valid+0x1db/0x2d0
[   14.450361]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.450389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.450412]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.450441]  kasan_report+0x141/0x180
[   14.450462]  ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.450496]  kasan_check_range+0x10c/0x1c0
[   14.450520]  __kasan_check_write+0x18/0x20
[   14.450538]  kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90
[   14.450584]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.450614]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.450834]  ? trace_hardirqs_on+0x37/0xe0
[   14.450857]  ? kasan_bitops_generic+0x92/0x1c0
[   14.451028]  kasan_bitops_generic+0x121/0x1c0
[   14.451060]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.451085]  ? __pfx_read_tsc+0x10/0x10
[   14.451105]  ? ktime_get_ts64+0x86/0x230
[   14.451130]  kunit_try_run_case+0x1a5/0x480
[   14.451180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.451202]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.451227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.451250]  ? __kthread_parkme+0x82/0x180
[   14.451270]  ? preempt_count_sub+0x50/0x80
[   14.451294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.451336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.451361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.451384]  kthread+0x337/0x6f0
[   14.451403]  ? trace_preempt_on+0x20/0xc0
[   14.451425]  ? __pfx_kthread+0x10/0x10
[   14.451445]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.451467]  ? calculate_sigpending+0x7b/0xa0
[   14.451507]  ? __pfx_kthread+0x10/0x10
[   14.451528]  ret_from_fork+0x116/0x1d0
[   14.451547]  ? __pfx_kthread+0x10/0x10
[   14.451567]  ret_from_fork_asm+0x1a/0x30
[   14.451599]  </TASK>
[   14.451609] 
[   14.460460] Allocated by task 278:
[   14.460593]  kasan_save_stack+0x45/0x70
[   14.460922]  kasan_save_track+0x18/0x40
[   14.461300]  kasan_save_alloc_info+0x3b/0x50
[   14.461614]  __kasan_kmalloc+0xb7/0xc0
[   14.461834]  __kmalloc_cache_noprof+0x189/0x420
[   14.462201]  kasan_bitops_generic+0x92/0x1c0
[   14.462416]  kunit_try_run_case+0x1a5/0x480
[   14.462809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.463398]  kthread+0x337/0x6f0
[   14.463721]  ret_from_fork+0x116/0x1d0
[   14.463904]  ret_from_fork_asm+0x1a/0x30
[   14.464090] 
[   14.464162] The buggy address belongs to the object at ffff888102837220
[   14.464162]  which belongs to the cache kmalloc-16 of size 16
[   14.464825] The buggy address is located 8 bytes inside of
[   14.464825]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.465337] 
[   14.465408] The buggy address belongs to the physical page:
[   14.465842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.466210] flags: 0x200000000000000(node=0|zone=2)
[   14.466452] page_type: f5(slab)
[   14.466827] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.468454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.468692] page dumped because: kasan: bad access detected
[   14.468861] 
[   14.468946] Memory state around the buggy address:
[   14.469876]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.471571]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.472384] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.472619]                                   ^
[   14.472773]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.473007]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.473240] ==================================================================
[   14.596220] ==================================================================
[   14.596632] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.596924] Read of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.597284] 
[   14.597427] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.597482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.597492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.597513] Call Trace:
[   14.597527]  <TASK>
[   14.597543]  dump_stack_lvl+0x73/0xb0
[   14.597585]  print_report+0xd1/0x610
[   14.597606]  ? __virt_addr_valid+0x1db/0x2d0
[   14.597630]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.597658]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.597681]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.597710]  kasan_report+0x141/0x180
[   14.597732]  ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.597766]  __asan_report_load8_noabort+0x18/0x20
[   14.597791]  kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90
[   14.597820]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.597849]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.597873]  ? trace_hardirqs_on+0x37/0xe0
[   14.597904]  ? kasan_bitops_generic+0x92/0x1c0
[   14.597933]  kasan_bitops_generic+0x121/0x1c0
[   14.597956]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.597981]  ? __pfx_read_tsc+0x10/0x10
[   14.598002]  ? ktime_get_ts64+0x86/0x230
[   14.598027]  kunit_try_run_case+0x1a5/0x480
[   14.598051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.598074]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.598098]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.598122]  ? __kthread_parkme+0x82/0x180
[   14.598165]  ? preempt_count_sub+0x50/0x80
[   14.598199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.598223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.598259]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.598284]  kthread+0x337/0x6f0
[   14.598302]  ? trace_preempt_on+0x20/0xc0
[   14.598342]  ? __pfx_kthread+0x10/0x10
[   14.598371]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.598393]  ? calculate_sigpending+0x7b/0xa0
[   14.598417]  ? __pfx_kthread+0x10/0x10
[   14.598449]  ret_from_fork+0x116/0x1d0
[   14.598468]  ? __pfx_kthread+0x10/0x10
[   14.598487]  ret_from_fork_asm+0x1a/0x30
[   14.598567]  </TASK>
[   14.598578] 
[   14.609773] Allocated by task 278:
[   14.610072]  kasan_save_stack+0x45/0x70
[   14.610291]  kasan_save_track+0x18/0x40
[   14.610489]  kasan_save_alloc_info+0x3b/0x50
[   14.611257]  __kasan_kmalloc+0xb7/0xc0
[   14.611627]  __kmalloc_cache_noprof+0x189/0x420
[   14.611864]  kasan_bitops_generic+0x92/0x1c0
[   14.612195]  kunit_try_run_case+0x1a5/0x480
[   14.612505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.612927]  kthread+0x337/0x6f0
[   14.613248]  ret_from_fork+0x116/0x1d0
[   14.613692]  ret_from_fork_asm+0x1a/0x30
[   14.613888] 
[   14.614182] The buggy address belongs to the object at ffff888102837220
[   14.614182]  which belongs to the cache kmalloc-16 of size 16
[   14.614815] The buggy address is located 8 bytes inside of
[   14.614815]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.615407] 
[   14.615504] The buggy address belongs to the physical page:
[   14.616220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.616795] flags: 0x200000000000000(node=0|zone=2)
[   14.617070] page_type: f5(slab)
[   14.617502] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.618031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.618442] page dumped because: kasan: bad access detected
[   14.618912] 
[   14.619012] Memory state around the buggy address:
[   14.619241]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.619492]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.620138] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.620404]                                   ^
[   14.620850]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.621322]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.621876] ==================================================================
[   14.497474] ==================================================================
[   14.498069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.498385] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.498636] 
[   14.498906] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.499011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.499069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.499090] Call Trace:
[   14.499106]  <TASK>
[   14.499122]  dump_stack_lvl+0x73/0xb0
[   14.499215]  print_report+0xd1/0x610
[   14.499264]  ? __virt_addr_valid+0x1db/0x2d0
[   14.499287]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.499315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.499338]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.499367]  kasan_report+0x141/0x180
[   14.499388]  ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.499422]  kasan_check_range+0x10c/0x1c0
[   14.499446]  __kasan_check_write+0x18/0x20
[   14.499464]  kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90
[   14.499493]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.499559]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.499583]  ? trace_hardirqs_on+0x37/0xe0
[   14.499606]  ? kasan_bitops_generic+0x92/0x1c0
[   14.499633]  kasan_bitops_generic+0x121/0x1c0
[   14.499657]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.499682]  ? __pfx_read_tsc+0x10/0x10
[   14.499703]  ? ktime_get_ts64+0x86/0x230
[   14.499728]  kunit_try_run_case+0x1a5/0x480
[   14.499752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.499774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.499798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.499822]  ? __kthread_parkme+0x82/0x180
[   14.499841]  ? preempt_count_sub+0x50/0x80
[   14.499866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.499890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.499924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.500046]  kthread+0x337/0x6f0
[   14.500066]  ? trace_preempt_on+0x20/0xc0
[   14.500089]  ? __pfx_kthread+0x10/0x10
[   14.500109]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.500130]  ? calculate_sigpending+0x7b/0xa0
[   14.500154]  ? __pfx_kthread+0x10/0x10
[   14.500176]  ret_from_fork+0x116/0x1d0
[   14.500195]  ? __pfx_kthread+0x10/0x10
[   14.500216]  ret_from_fork_asm+0x1a/0x30
[   14.500248]  </TASK>
[   14.500258] 
[   14.516668] Allocated by task 278:
[   14.517000]  kasan_save_stack+0x45/0x70
[   14.517678]  kasan_save_track+0x18/0x40
[   14.518108]  kasan_save_alloc_info+0x3b/0x50
[   14.518681]  __kasan_kmalloc+0xb7/0xc0
[   14.519166]  __kmalloc_cache_noprof+0x189/0x420
[   14.519733]  kasan_bitops_generic+0x92/0x1c0
[   14.520287]  kunit_try_run_case+0x1a5/0x480
[   14.520813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.521199]  kthread+0x337/0x6f0
[   14.521661]  ret_from_fork+0x116/0x1d0
[   14.521979]  ret_from_fork_asm+0x1a/0x30
[   14.522144] 
[   14.522465] The buggy address belongs to the object at ffff888102837220
[   14.522465]  which belongs to the cache kmalloc-16 of size 16
[   14.523784] The buggy address is located 8 bytes inside of
[   14.523784]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.524724] 
[   14.524979] The buggy address belongs to the physical page:
[   14.525466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.526126] flags: 0x200000000000000(node=0|zone=2)
[   14.526698] page_type: f5(slab)
[   14.527132] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.527765] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.528374] page dumped because: kasan: bad access detected
[   14.528855] 
[   14.528944] Memory state around the buggy address:
[   14.529486]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.530221]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.530455] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.531377]                                   ^
[   14.532006]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.532263]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.533103] ==================================================================
[   14.405261] ==================================================================
[   14.405588] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.406086] Write of size 8 at addr ffff888102837228 by task kunit_try_catch/278
[   14.406444] 
[   14.406529] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.406571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.406581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.406602] Call Trace:
[   14.406616]  <TASK>
[   14.406629]  dump_stack_lvl+0x73/0xb0
[   14.406657]  print_report+0xd1/0x610
[   14.406679]  ? __virt_addr_valid+0x1db/0x2d0
[   14.406703]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.406730]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.406754]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.406788]  kasan_report+0x141/0x180
[   14.406809]  ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.406844]  kasan_check_range+0x10c/0x1c0
[   14.406867]  __kasan_check_write+0x18/0x20
[   14.406886]  kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90
[   14.406926]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.406956]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.406981]  ? trace_hardirqs_on+0x37/0xe0
[   14.407004]  ? kasan_bitops_generic+0x92/0x1c0
[   14.407033]  kasan_bitops_generic+0x121/0x1c0
[   14.407057]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.407083]  ? __pfx_read_tsc+0x10/0x10
[   14.407104]  ? ktime_get_ts64+0x86/0x230
[   14.407128]  kunit_try_run_case+0x1a5/0x480
[   14.407153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.407176]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.407200]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.407224]  ? __kthread_parkme+0x82/0x180
[   14.407245]  ? preempt_count_sub+0x50/0x80
[   14.407270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.407294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.407319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.407343]  kthread+0x337/0x6f0
[   14.407446]  ? trace_preempt_on+0x20/0xc0
[   14.407489]  ? __pfx_kthread+0x10/0x10
[   14.407510]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.407546]  ? calculate_sigpending+0x7b/0xa0
[   14.407584]  ? __pfx_kthread+0x10/0x10
[   14.407618]  ret_from_fork+0x116/0x1d0
[   14.407637]  ? __pfx_kthread+0x10/0x10
[   14.407670]  ret_from_fork_asm+0x1a/0x30
[   14.407716]  </TASK>
[   14.407739] 
[   14.417788] Allocated by task 278:
[   14.418077]  kasan_save_stack+0x45/0x70
[   14.418307]  kasan_save_track+0x18/0x40
[   14.418501]  kasan_save_alloc_info+0x3b/0x50
[   14.418743]  __kasan_kmalloc+0xb7/0xc0
[   14.418938]  __kmalloc_cache_noprof+0x189/0x420
[   14.419240]  kasan_bitops_generic+0x92/0x1c0
[   14.419405]  kunit_try_run_case+0x1a5/0x480
[   14.419727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.420037]  kthread+0x337/0x6f0
[   14.420179]  ret_from_fork+0x116/0x1d0
[   14.420387]  ret_from_fork_asm+0x1a/0x30
[   14.420782] 
[   14.420924] The buggy address belongs to the object at ffff888102837220
[   14.420924]  which belongs to the cache kmalloc-16 of size 16
[   14.421430] The buggy address is located 8 bytes inside of
[   14.421430]  allocated 9-byte region [ffff888102837220, ffff888102837229)
[   14.422003] 
[   14.422125] The buggy address belongs to the physical page:
[   14.422348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102837
[   14.422735] flags: 0x200000000000000(node=0|zone=2)
[   14.423016] page_type: f5(slab)
[   14.423186] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.423467] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.423943] page dumped because: kasan: bad access detected
[   14.424197] 
[   14.424291] Memory state around the buggy address:
[   14.424523]  ffff888102837100: 00 05 fc fc 00 02 fc fc fa fb fc fc 00 05 fc fc
[   14.425029]  ffff888102837180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.425362] >ffff888102837200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   14.425739]                                   ^
[   14.426013]  ffff888102837280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.426314]  ffff888102837300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.426648] ==================================================================