Hay
Date
May 23, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.097765] ==================================================================
[   31.098024] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   31.098247] Write of size 8 at addr fff00000c5a2a728 by task kunit_try_catch/263
[   31.098395] 
[   31.098555] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.099143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.099262] Hardware name: linux,dummy-virt (DT)
[   31.099426] Call trace:
[   31.099512]  show_stack+0x20/0x38 (C)
[   31.099710]  dump_stack_lvl+0x8c/0xd0
[   31.099913]  print_report+0x118/0x608
[   31.100043]  kasan_report+0xdc/0x128
[   31.100437]  kasan_check_range+0x100/0x1a8
[   31.100649]  __kasan_check_write+0x20/0x30
[   31.100846]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   31.101078]  kasan_bitops_generic+0x110/0x1c8
[   31.101279]  kunit_try_run_case+0x170/0x3f0
[   31.101494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.101928]  kthread+0x328/0x630
[   31.102133]  ret_from_fork+0x10/0x20
[   31.102280] 
[   31.102341] Allocated by task 263:
[   31.102586]  kasan_save_stack+0x3c/0x68
[   31.102962]  kasan_save_track+0x20/0x40
[   31.103173]  kasan_save_alloc_info+0x40/0x58
[   31.103299]  __kasan_kmalloc+0xd4/0xd8
[   31.103430]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.103586]  kasan_bitops_generic+0xa0/0x1c8
[   31.103703]  kunit_try_run_case+0x170/0x3f0
[   31.103831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.103969]  kthread+0x328/0x630
[   31.104089]  ret_from_fork+0x10/0x20
[   31.104503] 
[   31.104570] The buggy address belongs to the object at fff00000c5a2a720
[   31.104570]  which belongs to the cache kmalloc-16 of size 16
[   31.104879] The buggy address is located 8 bytes inside of
[   31.104879]  allocated 9-byte region [fff00000c5a2a720, fff00000c5a2a729)
[   31.105068] 
[   31.105394] The buggy address belongs to the physical page:
[   31.105568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a2a
[   31.105798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.106008] page_type: f5(slab)
[   31.106126] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.106282] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.106472] page dumped because: kasan: bad access detected
[   31.106570] 
[   31.106632] Memory state around the buggy address:
[   31.106736]  fff00000c5a2a600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.106874]  fff00000c5a2a680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.107013] >fff00000c5a2a700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   31.107139]                                   ^
[   31.107242]  fff00000c5a2a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.107391]  fff00000c5a2a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.107547] ==================================================================
[   31.109835] ==================================================================
[   31.110041] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   31.110205] Read of size 8 at addr fff00000c5a2a728 by task kunit_try_catch/263
[   31.110424] 
[   31.110640] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   31.111192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.111300] Hardware name: linux,dummy-virt (DT)
[   31.111427] Call trace:
[   31.111530]  show_stack+0x20/0x38 (C)
[   31.111681]  dump_stack_lvl+0x8c/0xd0
[   31.112123]  print_report+0x118/0x608
[   31.112302]  kasan_report+0xdc/0x128
[   31.112493]  __asan_report_load8_noabort+0x20/0x30
[   31.112686]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   31.112903]  kasan_bitops_generic+0x110/0x1c8
[   31.113056]  kunit_try_run_case+0x170/0x3f0
[   31.113248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.113397]  kthread+0x328/0x630
[   31.113540]  ret_from_fork+0x10/0x20
[   31.113688] 
[   31.113755] Allocated by task 263:
[   31.113846]  kasan_save_stack+0x3c/0x68
[   31.113967]  kasan_save_track+0x20/0x40
[   31.114080]  kasan_save_alloc_info+0x40/0x58
[   31.114207]  __kasan_kmalloc+0xd4/0xd8
[   31.114314]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.114833]  kasan_bitops_generic+0xa0/0x1c8
[   31.115186]  kunit_try_run_case+0x170/0x3f0
[   31.115432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.115682]  kthread+0x328/0x630
[   31.115819]  ret_from_fork+0x10/0x20
[   31.116021] 
[   31.116116] The buggy address belongs to the object at fff00000c5a2a720
[   31.116116]  which belongs to the cache kmalloc-16 of size 16
[   31.116281] The buggy address is located 8 bytes inside of
[   31.116281]  allocated 9-byte region [fff00000c5a2a720, fff00000c5a2a729)
[   31.116813] 
[   31.116907] The buggy address belongs to the physical page:
[   31.117013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a2a
[   31.117179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.117379] page_type: f5(slab)
[   31.117539] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.117685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.118066] page dumped because: kasan: bad access detected
[   31.118192] 
[   31.118275] Memory state around the buggy address:
[   31.118393]  fff00000c5a2a600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.118580]  fff00000c5a2a680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.118797] >fff00000c5a2a700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   31.118942]                                   ^
[   31.119039]  fff00000c5a2a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.119435]  fff00000c5a2a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.119586] ==================================================================
[   31.121602] ==================================================================
[   31.121784] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   31.122717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.124114]  __kasan_check_write+0x20/0x30
[   31.124655]  kthread+0x328/0x630
[   31.128939] The buggy address is located 8 bytes inside of
[   31.128939]  allocated 9-byte region [fff00000c5a2a720, fff00000c5a2a729)
[   31.131035]  fff00000c5a2a680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.132011] ==================================================================

[   14.668085] ==================================================================
[   14.668423] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.668716] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.669407] 
[   14.669603] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.669649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.669662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.669682] Call Trace:
[   14.669699]  <TASK>
[   14.669715]  dump_stack_lvl+0x73/0xb0
[   14.669743]  print_report+0xd1/0x650
[   14.669765]  ? __virt_addr_valid+0x1db/0x2d0
[   14.669786]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.669807]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.669830]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.669852]  kasan_report+0x141/0x180
[   14.669874]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.669981]  kasan_check_range+0x10c/0x1c0
[   14.670003]  __kasan_check_write+0x18/0x20
[   14.670041]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.670063]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.670087]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.670124]  ? trace_hardirqs_on+0x37/0xe0
[   14.670147]  ? kasan_bitops_generic+0x92/0x1c0
[   14.670188]  kasan_bitops_generic+0x116/0x1c0
[   14.670209]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.670230]  ? __pfx_read_tsc+0x10/0x10
[   14.670250]  ? ktime_get_ts64+0x86/0x230
[   14.670274]  kunit_try_run_case+0x1a5/0x480
[   14.670310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.670332]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.670372]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.670408]  ? __kthread_parkme+0x82/0x180
[   14.670431]  ? preempt_count_sub+0x50/0x80
[   14.670467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.670491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.670514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.670536]  kthread+0x337/0x6f0
[   14.670554]  ? trace_preempt_on+0x20/0xc0
[   14.670577]  ? __pfx_kthread+0x10/0x10
[   14.670594]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.670615]  ? calculate_sigpending+0x7b/0xa0
[   14.670635]  ? __pfx_kthread+0x10/0x10
[   14.670654]  ret_from_fork+0x41/0x80
[   14.670680]  ? __pfx_kthread+0x10/0x10
[   14.670716]  ret_from_fork_asm+0x1a/0x30
[   14.670761]  </TASK>
[   14.670771] 
[   14.680424] Allocated by task 280:
[   14.680616]  kasan_save_stack+0x45/0x70
[   14.680805]  kasan_save_track+0x18/0x40
[   14.680943]  kasan_save_alloc_info+0x3b/0x50
[   14.681144]  __kasan_kmalloc+0xb7/0xc0
[   14.681352]  __kmalloc_cache_noprof+0x189/0x420
[   14.681578]  kasan_bitops_generic+0x92/0x1c0
[   14.681787]  kunit_try_run_case+0x1a5/0x480
[   14.682217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.682536]  kthread+0x337/0x6f0
[   14.682691]  ret_from_fork+0x41/0x80
[   14.682851]  ret_from_fork_asm+0x1a/0x30
[   14.682986] 
[   14.683056] The buggy address belongs to the object at ffff8881029e3080
[   14.683056]  which belongs to the cache kmalloc-16 of size 16
[   14.683834] The buggy address is located 8 bytes inside of
[   14.683834]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.684473] 
[   14.684581] The buggy address belongs to the physical page:
[   14.684872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.685266] flags: 0x200000000000000(node=0|zone=2)
[   14.685493] page_type: f5(slab)
[   14.685675] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.685990] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.686210] page dumped because: kasan: bad access detected
[   14.686385] 
[   14.686456] Memory state around the buggy address:
[   14.686990]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.687510]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.687844] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.688504]                       ^
[   14.688672]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.689078]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.689430] ==================================================================
[   14.689847] ==================================================================
[   14.690184] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.690699] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.691281] 
[   14.691412] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.691458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.691470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.691491] Call Trace:
[   14.691508]  <TASK>
[   14.691524]  dump_stack_lvl+0x73/0xb0
[   14.691552]  print_report+0xd1/0x650
[   14.691584]  ? __virt_addr_valid+0x1db/0x2d0
[   14.691606]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.691628]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.691673]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.691695]  kasan_report+0x141/0x180
[   14.691718]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.691762]  kasan_check_range+0x10c/0x1c0
[   14.691782]  __kasan_check_write+0x18/0x20
[   14.691802]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.691824]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.691846]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.691867]  ? trace_hardirqs_on+0x37/0xe0
[   14.691889]  ? kasan_bitops_generic+0x92/0x1c0
[   14.691913]  kasan_bitops_generic+0x116/0x1c0
[   14.692131]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.692152]  ? __pfx_read_tsc+0x10/0x10
[   14.692173]  ? ktime_get_ts64+0x86/0x230
[   14.692198]  kunit_try_run_case+0x1a5/0x480
[   14.692222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.692244]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.692267]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.692289]  ? __kthread_parkme+0x82/0x180
[   14.692320]  ? preempt_count_sub+0x50/0x80
[   14.692345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.692367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.692390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.692412]  kthread+0x337/0x6f0
[   14.692429]  ? trace_preempt_on+0x20/0xc0
[   14.692451]  ? __pfx_kthread+0x10/0x10
[   14.692469]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.692489]  ? calculate_sigpending+0x7b/0xa0
[   14.692510]  ? __pfx_kthread+0x10/0x10
[   14.692549]  ret_from_fork+0x41/0x80
[   14.692569]  ? __pfx_kthread+0x10/0x10
[   14.692587]  ret_from_fork_asm+0x1a/0x30
[   14.692617]  </TASK>
[   14.692627] 
[   14.702683] Allocated by task 280:
[   14.702975]  kasan_save_stack+0x45/0x70
[   14.703154]  kasan_save_track+0x18/0x40
[   14.703293]  kasan_save_alloc_info+0x3b/0x50
[   14.703743]  __kasan_kmalloc+0xb7/0xc0
[   14.704036]  __kmalloc_cache_noprof+0x189/0x420
[   14.704320]  kasan_bitops_generic+0x92/0x1c0
[   14.704568]  kunit_try_run_case+0x1a5/0x480
[   14.704731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.704942]  kthread+0x337/0x6f0
[   14.705220]  ret_from_fork+0x41/0x80
[   14.705421]  ret_from_fork_asm+0x1a/0x30
[   14.705664] 
[   14.705738] The buggy address belongs to the object at ffff8881029e3080
[   14.705738]  which belongs to the cache kmalloc-16 of size 16
[   14.706153] The buggy address is located 8 bytes inside of
[   14.706153]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.707007] 
[   14.707126] The buggy address belongs to the physical page:
[   14.707732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.708232] flags: 0x200000000000000(node=0|zone=2)
[   14.708414] page_type: f5(slab)
[   14.708665] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.709017] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.709473] page dumped because: kasan: bad access detected
[   14.709764] 
[   14.709858] Memory state around the buggy address:
[   14.710153]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.710451]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.710830] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.711331]                       ^
[   14.711559]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.711911]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.712352] ==================================================================
[   14.646590] ==================================================================
[   14.647335] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.648049] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.648828] 
[   14.649122] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.649183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.649197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.649220] Call Trace:
[   14.649237]  <TASK>
[   14.649253]  dump_stack_lvl+0x73/0xb0
[   14.649283]  print_report+0xd1/0x650
[   14.649318]  ? __virt_addr_valid+0x1db/0x2d0
[   14.649340]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.649361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.649383]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.649405]  kasan_report+0x141/0x180
[   14.649429]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.649457]  kasan_check_range+0x10c/0x1c0
[   14.649477]  __kasan_check_write+0x18/0x20
[   14.649497]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.649519]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.649541]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.649563]  ? trace_hardirqs_on+0x37/0xe0
[   14.649585]  ? kasan_bitops_generic+0x92/0x1c0
[   14.649609]  kasan_bitops_generic+0x116/0x1c0
[   14.649629]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.649650]  ? __pfx_read_tsc+0x10/0x10
[   14.649669]  ? ktime_get_ts64+0x86/0x230
[   14.649694]  kunit_try_run_case+0x1a5/0x480
[   14.649718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.649740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.649763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.649786]  ? __kthread_parkme+0x82/0x180
[   14.649808]  ? preempt_count_sub+0x50/0x80
[   14.649832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.649856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.649878]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.649903]  kthread+0x337/0x6f0
[   14.649920]  ? trace_preempt_on+0x20/0xc0
[   14.649943]  ? __pfx_kthread+0x10/0x10
[   14.649962]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.649983]  ? calculate_sigpending+0x7b/0xa0
[   14.650007]  ? __pfx_kthread+0x10/0x10
[   14.650025]  ret_from_fork+0x41/0x80
[   14.650046]  ? __pfx_kthread+0x10/0x10
[   14.650065]  ret_from_fork_asm+0x1a/0x30
[   14.650097]  </TASK>
[   14.650108] 
[   14.658647] Allocated by task 280:
[   14.658785]  kasan_save_stack+0x45/0x70
[   14.659125]  kasan_save_track+0x18/0x40
[   14.659346]  kasan_save_alloc_info+0x3b/0x50
[   14.659562]  __kasan_kmalloc+0xb7/0xc0
[   14.659726]  __kmalloc_cache_noprof+0x189/0x420
[   14.660000]  kasan_bitops_generic+0x92/0x1c0
[   14.660155]  kunit_try_run_case+0x1a5/0x480
[   14.660350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.660627]  kthread+0x337/0x6f0
[   14.660792]  ret_from_fork+0x41/0x80
[   14.660971]  ret_from_fork_asm+0x1a/0x30
[   14.661401] 
[   14.661534] The buggy address belongs to the object at ffff8881029e3080
[   14.661534]  which belongs to the cache kmalloc-16 of size 16
[   14.661969] The buggy address is located 8 bytes inside of
[   14.661969]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.662376] 
[   14.662571] The buggy address belongs to the physical page:
[   14.662855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.663310] flags: 0x200000000000000(node=0|zone=2)
[   14.663558] page_type: f5(slab)
[   14.663678] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.664206] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.664616] page dumped because: kasan: bad access detected
[   14.665083] 
[   14.665203] Memory state around the buggy address:
[   14.665372]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.665971]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.666279] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.666636]                       ^
[   14.666829]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.667154]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.667593] ==================================================================
[   14.712954] ==================================================================
[   14.713360] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.713796] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.714160] 
[   14.714248] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.714293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.714316] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.714402] Call Trace:
[   14.714420]  <TASK>
[   14.714436]  dump_stack_lvl+0x73/0xb0
[   14.714464]  print_report+0xd1/0x650
[   14.714486]  ? __virt_addr_valid+0x1db/0x2d0
[   14.714507]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.714528]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.714550]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.714572]  kasan_report+0x141/0x180
[   14.714595]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.714622]  kasan_check_range+0x10c/0x1c0
[   14.714642]  __kasan_check_write+0x18/0x20
[   14.714662]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.714689]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.714737]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.714759]  ? trace_hardirqs_on+0x37/0xe0
[   14.714782]  ? kasan_bitops_generic+0x92/0x1c0
[   14.714820]  kasan_bitops_generic+0x116/0x1c0
[   14.714841]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.714862]  ? __pfx_read_tsc+0x10/0x10
[   14.714882]  ? ktime_get_ts64+0x86/0x230
[   14.715091]  kunit_try_run_case+0x1a5/0x480
[   14.715116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.715137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.715161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.715183]  ? __kthread_parkme+0x82/0x180
[   14.715205]  ? preempt_count_sub+0x50/0x80
[   14.715229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.715252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.715381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.715405]  kthread+0x337/0x6f0
[   14.715422]  ? trace_preempt_on+0x20/0xc0
[   14.715445]  ? __pfx_kthread+0x10/0x10
[   14.715463]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.715485]  ? calculate_sigpending+0x7b/0xa0
[   14.715506]  ? __pfx_kthread+0x10/0x10
[   14.715524]  ret_from_fork+0x41/0x80
[   14.715545]  ? __pfx_kthread+0x10/0x10
[   14.715562]  ret_from_fork_asm+0x1a/0x30
[   14.715593]  </TASK>
[   14.715604] 
[   14.725804] Allocated by task 280:
[   14.726101]  kasan_save_stack+0x45/0x70
[   14.726293]  kasan_save_track+0x18/0x40
[   14.726791]  kasan_save_alloc_info+0x3b/0x50
[   14.727026]  __kasan_kmalloc+0xb7/0xc0
[   14.727414]  __kmalloc_cache_noprof+0x189/0x420
[   14.727643]  kasan_bitops_generic+0x92/0x1c0
[   14.727852]  kunit_try_run_case+0x1a5/0x480
[   14.728109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.728391]  kthread+0x337/0x6f0
[   14.728642]  ret_from_fork+0x41/0x80
[   14.728788]  ret_from_fork_asm+0x1a/0x30
[   14.729083] 
[   14.729199] The buggy address belongs to the object at ffff8881029e3080
[   14.729199]  which belongs to the cache kmalloc-16 of size 16
[   14.729713] The buggy address is located 8 bytes inside of
[   14.729713]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.730328] 
[   14.730436] The buggy address belongs to the physical page:
[   14.730693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.731285] flags: 0x200000000000000(node=0|zone=2)
[   14.731644] page_type: f5(slab)
[   14.731834] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.732281] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.732713] page dumped because: kasan: bad access detected
[   14.732914] 
[   14.733010] Memory state around the buggy address:
[   14.733238]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.733573]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.733959] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.734245]                       ^
[   14.734433]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.734701]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.734992] ==================================================================
[   14.619646] ==================================================================
[   14.620186] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.620500] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.620861] 
[   14.621045] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.621092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.621105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.621126] Call Trace:
[   14.621144]  <TASK>
[   14.621160]  dump_stack_lvl+0x73/0xb0
[   14.621186]  print_report+0xd1/0x650
[   14.621208]  ? __virt_addr_valid+0x1db/0x2d0
[   14.621230]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.621251]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.621273]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.621295]  kasan_report+0x141/0x180
[   14.621330]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.621357]  kasan_check_range+0x10c/0x1c0
[   14.621377]  __kasan_check_write+0x18/0x20
[   14.621396]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.621438]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.621462]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.621483]  ? trace_hardirqs_on+0x37/0xe0
[   14.621506]  ? kasan_bitops_generic+0x92/0x1c0
[   14.621530]  kasan_bitops_generic+0x116/0x1c0
[   14.621550]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.621571]  ? __pfx_read_tsc+0x10/0x10
[   14.621591]  ? ktime_get_ts64+0x86/0x230
[   14.621615]  kunit_try_run_case+0x1a5/0x480
[   14.621640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.621662]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.621685]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.621707]  ? __kthread_parkme+0x82/0x180
[   14.621730]  ? preempt_count_sub+0x50/0x80
[   14.621755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.621779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.621801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.621823]  kthread+0x337/0x6f0
[   14.621840]  ? trace_preempt_on+0x20/0xc0
[   14.621862]  ? __pfx_kthread+0x10/0x10
[   14.621887]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.621907]  ? calculate_sigpending+0x7b/0xa0
[   14.621928]  ? __pfx_kthread+0x10/0x10
[   14.621947]  ret_from_fork+0x41/0x80
[   14.621967]  ? __pfx_kthread+0x10/0x10
[   14.621985]  ret_from_fork_asm+0x1a/0x30
[   14.622016]  </TASK>
[   14.622026] 
[   14.631051] Allocated by task 280:
[   14.631236]  kasan_save_stack+0x45/0x70
[   14.631448]  kasan_save_track+0x18/0x40
[   14.631629]  kasan_save_alloc_info+0x3b/0x50
[   14.631809]  __kasan_kmalloc+0xb7/0xc0
[   14.631986]  __kmalloc_cache_noprof+0x189/0x420
[   14.632171]  kasan_bitops_generic+0x92/0x1c0
[   14.633213]  kunit_try_run_case+0x1a5/0x480
[   14.633584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.634121]  kthread+0x337/0x6f0
[   14.634288]  ret_from_fork+0x41/0x80
[   14.634669]  ret_from_fork_asm+0x1a/0x30
[   14.635141] 
[   14.635386] The buggy address belongs to the object at ffff8881029e3080
[   14.635386]  which belongs to the cache kmalloc-16 of size 16
[   14.636394] The buggy address is located 8 bytes inside of
[   14.636394]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.637335] 
[   14.637627] The buggy address belongs to the physical page:
[   14.637875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.638194] flags: 0x200000000000000(node=0|zone=2)
[   14.639059] page_type: f5(slab)
[   14.639392] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.640220] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.640760] page dumped because: kasan: bad access detected
[   14.641220] 
[   14.641330] Memory state around the buggy address:
[   14.641742]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.642270]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.642733] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.643400]                       ^
[   14.643719]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.644503]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.645111] ==================================================================
[   14.735378] ==================================================================
[   14.735839] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.736278] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.736633] 
[   14.736748] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.736793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.736805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.736827] Call Trace:
[   14.736842]  <TASK>
[   14.736859]  dump_stack_lvl+0x73/0xb0
[   14.736938]  print_report+0xd1/0x650
[   14.736964]  ? __virt_addr_valid+0x1db/0x2d0
[   14.736985]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.737007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.737030]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.737051]  kasan_report+0x141/0x180
[   14.737074]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.737102]  kasan_check_range+0x10c/0x1c0
[   14.737122]  __kasan_check_write+0x18/0x20
[   14.737141]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.737164]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.737187]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.737207]  ? trace_hardirqs_on+0x37/0xe0
[   14.737229]  ? kasan_bitops_generic+0x92/0x1c0
[   14.737253]  kasan_bitops_generic+0x116/0x1c0
[   14.737272]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.737294]  ? __pfx_read_tsc+0x10/0x10
[   14.737324]  ? ktime_get_ts64+0x86/0x230
[   14.737349]  kunit_try_run_case+0x1a5/0x480
[   14.737372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.737394]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.737416]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.737439]  ? __kthread_parkme+0x82/0x180
[   14.737460]  ? preempt_count_sub+0x50/0x80
[   14.737485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.737508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.737530]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.737552]  kthread+0x337/0x6f0
[   14.737569]  ? trace_preempt_on+0x20/0xc0
[   14.737591]  ? __pfx_kthread+0x10/0x10
[   14.737609]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.737629]  ? calculate_sigpending+0x7b/0xa0
[   14.737651]  ? __pfx_kthread+0x10/0x10
[   14.737669]  ret_from_fork+0x41/0x80
[   14.737689]  ? __pfx_kthread+0x10/0x10
[   14.737707]  ret_from_fork_asm+0x1a/0x30
[   14.737738]  </TASK>
[   14.737748] 
[   14.746683] Allocated by task 280:
[   14.746879]  kasan_save_stack+0x45/0x70
[   14.747140]  kasan_save_track+0x18/0x40
[   14.747294]  kasan_save_alloc_info+0x3b/0x50
[   14.747554]  __kasan_kmalloc+0xb7/0xc0
[   14.747707]  __kmalloc_cache_noprof+0x189/0x420
[   14.747894]  kasan_bitops_generic+0x92/0x1c0
[   14.748041]  kunit_try_run_case+0x1a5/0x480
[   14.748186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.748492]  kthread+0x337/0x6f0
[   14.748845]  ret_from_fork+0x41/0x80
[   14.749131]  ret_from_fork_asm+0x1a/0x30
[   14.749409] 
[   14.749607] The buggy address belongs to the object at ffff8881029e3080
[   14.749607]  which belongs to the cache kmalloc-16 of size 16
[   14.750146] The buggy address is located 8 bytes inside of
[   14.750146]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.750532] 
[   14.750630] The buggy address belongs to the physical page:
[   14.750917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.751340] flags: 0x200000000000000(node=0|zone=2)
[   14.751524] page_type: f5(slab)
[   14.751646] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.752257] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.752722] page dumped because: kasan: bad access detected
[   14.752899] 
[   14.752971] Memory state around the buggy address:
[   14.753152]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.753654]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.753977] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.754266]                       ^
[   14.754544]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.754810]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.755166] ==================================================================
[   14.755539] ==================================================================
[   14.755881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.756241] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.756665] 
[   14.756777] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.756822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.756834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.756854] Call Trace:
[   14.756868]  <TASK>
[   14.756882]  dump_stack_lvl+0x73/0xb0
[   14.756907]  print_report+0xd1/0x650
[   14.756929]  ? __virt_addr_valid+0x1db/0x2d0
[   14.756949]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.756971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.756994]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.757016]  kasan_report+0x141/0x180
[   14.757038]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.757064]  kasan_check_range+0x10c/0x1c0
[   14.757084]  __kasan_check_write+0x18/0x20
[   14.757103]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.757125]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.757148]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.757168]  ? trace_hardirqs_on+0x37/0xe0
[   14.757189]  ? kasan_bitops_generic+0x92/0x1c0
[   14.757213]  kasan_bitops_generic+0x116/0x1c0
[   14.757232]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.757253]  ? __pfx_read_tsc+0x10/0x10
[   14.757272]  ? ktime_get_ts64+0x86/0x230
[   14.757297]  kunit_try_run_case+0x1a5/0x480
[   14.757330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.757351]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.757374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.757396]  ? __kthread_parkme+0x82/0x180
[   14.757417]  ? preempt_count_sub+0x50/0x80
[   14.757617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.757654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.757677]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.757700]  kthread+0x337/0x6f0
[   14.757718]  ? trace_preempt_on+0x20/0xc0
[   14.757741]  ? __pfx_kthread+0x10/0x10
[   14.757758]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.757780]  ? calculate_sigpending+0x7b/0xa0
[   14.757801]  ? __pfx_kthread+0x10/0x10
[   14.757819]  ret_from_fork+0x41/0x80
[   14.757839]  ? __pfx_kthread+0x10/0x10
[   14.757857]  ret_from_fork_asm+0x1a/0x30
[   14.757942]  </TASK>
[   14.757955] 
[   14.766786] Allocated by task 280:
[   14.766968]  kasan_save_stack+0x45/0x70
[   14.767162]  kasan_save_track+0x18/0x40
[   14.767357]  kasan_save_alloc_info+0x3b/0x50
[   14.767592]  __kasan_kmalloc+0xb7/0xc0
[   14.767782]  __kmalloc_cache_noprof+0x189/0x420
[   14.767941]  kasan_bitops_generic+0x92/0x1c0
[   14.768155]  kunit_try_run_case+0x1a5/0x480
[   14.768343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.768571]  kthread+0x337/0x6f0
[   14.768816]  ret_from_fork+0x41/0x80
[   14.769011]  ret_from_fork_asm+0x1a/0x30
[   14.769173] 
[   14.769270] The buggy address belongs to the object at ffff8881029e3080
[   14.769270]  which belongs to the cache kmalloc-16 of size 16
[   14.769650] The buggy address is located 8 bytes inside of
[   14.769650]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.770003] 
[   14.770090] The buggy address belongs to the physical page:
[   14.770347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.770957] flags: 0x200000000000000(node=0|zone=2)
[   14.771189] page_type: f5(slab)
[   14.771370] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.771753] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.771981] page dumped because: kasan: bad access detected
[   14.772154] 
[   14.772223] Memory state around the buggy address:
[   14.772421]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.772748]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.773083] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.773683]                       ^
[   14.773866]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.774188]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.774537] ==================================================================
[   14.599141] ==================================================================
[   14.599811] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.600458] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280
[   14.600761] 
[   14.600859] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   14.600975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.600988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.601011] Call Trace:
[   14.601023]  <TASK>
[   14.601041]  dump_stack_lvl+0x73/0xb0
[   14.601072]  print_report+0xd1/0x650
[   14.601095]  ? __virt_addr_valid+0x1db/0x2d0
[   14.601119]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.601141]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.601163]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.601185]  kasan_report+0x141/0x180
[   14.601208]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.601235]  kasan_check_range+0x10c/0x1c0
[   14.601255]  __kasan_check_write+0x18/0x20
[   14.601275]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.601309]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.601332]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.601353]  ? trace_hardirqs_on+0x37/0xe0
[   14.601378]  ? kasan_bitops_generic+0x92/0x1c0
[   14.601402]  kasan_bitops_generic+0x116/0x1c0
[   14.601441]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.601463]  ? __pfx_read_tsc+0x10/0x10
[   14.601484]  ? ktime_get_ts64+0x86/0x230
[   14.601510]  kunit_try_run_case+0x1a5/0x480
[   14.601534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.601556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.601579]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.601602]  ? __kthread_parkme+0x82/0x180
[   14.601625]  ? preempt_count_sub+0x50/0x80
[   14.601652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.601674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.601697]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.601720]  kthread+0x337/0x6f0
[   14.601736]  ? trace_preempt_on+0x20/0xc0
[   14.601759]  ? __pfx_kthread+0x10/0x10
[   14.601777]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.601797]  ? calculate_sigpending+0x7b/0xa0
[   14.601819]  ? __pfx_kthread+0x10/0x10
[   14.601838]  ret_from_fork+0x41/0x80
[   14.601858]  ? __pfx_kthread+0x10/0x10
[   14.602071]  ret_from_fork_asm+0x1a/0x30
[   14.602105]  </TASK>
[   14.602116] 
[   14.610702] Allocated by task 280:
[   14.610961]  kasan_save_stack+0x45/0x70
[   14.611180]  kasan_save_track+0x18/0x40
[   14.611369]  kasan_save_alloc_info+0x3b/0x50
[   14.611598]  __kasan_kmalloc+0xb7/0xc0
[   14.611777]  __kmalloc_cache_noprof+0x189/0x420
[   14.612256]  kasan_bitops_generic+0x92/0x1c0
[   14.612502]  kunit_try_run_case+0x1a5/0x480
[   14.612676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.613024]  kthread+0x337/0x6f0
[   14.613173]  ret_from_fork+0x41/0x80
[   14.613357]  ret_from_fork_asm+0x1a/0x30
[   14.613545] 
[   14.613648] The buggy address belongs to the object at ffff8881029e3080
[   14.613648]  which belongs to the cache kmalloc-16 of size 16
[   14.614131] The buggy address is located 8 bytes inside of
[   14.614131]  allocated 9-byte region [ffff8881029e3080, ffff8881029e3089)
[   14.614616] 
[   14.614724] The buggy address belongs to the physical page:
[   14.615058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3
[   14.615426] flags: 0x200000000000000(node=0|zone=2)
[   14.615692] page_type: f5(slab)
[   14.616035] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.616375] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.616711] page dumped because: kasan: bad access detected
[   14.617023] 
[   14.617116] Memory state around the buggy address:
[   14.617311]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.617556]  ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.617958] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.618285]                       ^
[   14.618496]  ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.618809]  ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.619118] ==================================================================