Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   25.790505] ==================================================================
[   25.790981] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   25.791148] Write of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265
[   25.791552] 
[   25.791699] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.791933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.792014] Hardware name: linux,dummy-virt (DT)
[   25.792868] Call trace:
[   25.793005]  show_stack+0x20/0x38 (C)
[   25.793143]  dump_stack_lvl+0x8c/0xd0
[   25.793269]  print_report+0x118/0x608
[   25.794086]  kasan_report+0xdc/0x128
[   25.794237]  kasan_check_range+0x100/0x1a8
[   25.794457]  __kasan_check_write+0x20/0x30
[   25.795003]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   25.795287]  kasan_bitops_generic+0x110/0x1c8
[   25.795470]  kunit_try_run_case+0x170/0x3f0
[   25.796028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.796173]  kthread+0x328/0x630
[   25.796690]  ret_from_fork+0x10/0x20
[   25.797044] 
[   25.797262] Allocated by task 265:
[   25.797371]  kasan_save_stack+0x3c/0x68
[   25.797552]  kasan_save_track+0x20/0x40
[   25.797654]  kasan_save_alloc_info+0x40/0x58
[   25.798179]  __kasan_kmalloc+0xd4/0xd8
[   25.798297]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.798655]  kasan_bitops_generic+0xa0/0x1c8
[   25.798773]  kunit_try_run_case+0x170/0x3f0
[   25.798883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.798990]  kthread+0x328/0x630
[   25.799066]  ret_from_fork+0x10/0x20
[   25.799155] 
[   25.799208] The buggy address belongs to the object at fff00000c57223e0
[   25.799208]  which belongs to the cache kmalloc-16 of size 16
[   25.800542] The buggy address is located 8 bytes inside of
[   25.800542]  allocated 9-byte region [fff00000c57223e0, fff00000c57223e9)
[   25.800800] 
[   25.800859] The buggy address belongs to the physical page:
[   25.801338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722
[   25.801888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.802055] page_type: f5(slab)
[   25.802159] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.802286] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.802841] page dumped because: kasan: bad access detected
[   25.803175] 
[   25.803412] Memory state around the buggy address:
[   25.803549]  fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   25.803670]  fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.803861] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.804325]                                                           ^
[   25.804662]  fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.805027]  fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.805142] ==================================================================
[   25.724077] ==================================================================
[   25.724215] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   25.725308] Write of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265
[   25.725579] 
[   25.725761] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.726056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.726140] Hardware name: linux,dummy-virt (DT)
[   25.726226] Call trace:
[   25.726706]  show_stack+0x20/0x38 (C)
[   25.726888]  dump_stack_lvl+0x8c/0xd0
[   25.727194]  print_report+0x118/0x608
[   25.727337]  kasan_report+0xdc/0x128
[   25.727472]  kasan_check_range+0x100/0x1a8
[   25.727612]  __kasan_check_write+0x20/0x30
[   25.728706]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   25.729156]  kasan_bitops_generic+0x110/0x1c8
[   25.729298]  kunit_try_run_case+0x170/0x3f0
[   25.729448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.730555]  kthread+0x328/0x630
[   25.730705]  ret_from_fork+0x10/0x20
[   25.731158] 
[   25.731213] Allocated by task 265:
[   25.731542]  kasan_save_stack+0x3c/0x68
[   25.732015]  kasan_save_track+0x20/0x40
[   25.732183]  kasan_save_alloc_info+0x40/0x58
[   25.732632]  __kasan_kmalloc+0xd4/0xd8
[   25.732776]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.732898]  kasan_bitops_generic+0xa0/0x1c8
[   25.733053]  kunit_try_run_case+0x170/0x3f0
[   25.733212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.733333]  kthread+0x328/0x630
[   25.733665]  ret_from_fork+0x10/0x20
[   25.733947] 
[   25.734054] The buggy address belongs to the object at fff00000c57223e0
[   25.734054]  which belongs to the cache kmalloc-16 of size 16
[   25.734207] The buggy address is located 8 bytes inside of
[   25.734207]  allocated 9-byte region [fff00000c57223e0, fff00000c57223e9)
[   25.734758] 
[   25.734836] The buggy address belongs to the physical page:
[   25.735302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722
[   25.735585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.736191] page_type: f5(slab)
[   25.736330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.736603] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.737111] page dumped because: kasan: bad access detected
[   25.737207] 
[   25.737263] Memory state around the buggy address:
[   25.737357]  fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   25.737484]  fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.737608] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.737718]                                                           ^
[   25.738086]  fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.738632]  fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.739161] ==================================================================
[   25.808480] ==================================================================
[   25.808617] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   25.809585] Read of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265
[   25.809964] 
[   25.810078] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.810314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.810390] Hardware name: linux,dummy-virt (DT)
[   25.810483] Call trace:
[   25.811267]  show_stack+0x20/0x38 (C)
[   25.811438]  dump_stack_lvl+0x8c/0xd0
[   25.811570]  print_report+0x118/0x608
[   25.811689]  kasan_report+0xdc/0x128
[   25.812356]  __asan_report_load8_noabort+0x20/0x30
[   25.812884]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   25.813373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.818731] 
[   25.820720] page dumped because: kasan: bad access detected
[   25.825163] ==================================================================
[   25.741500] ==================================================================
[   25.741632] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   25.741763] Write of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265
[   25.741888] 
[   25.741978] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.742186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.742880] Hardware name: linux,dummy-virt (DT)
[   25.743223] Call trace:
[   25.743305]  show_stack+0x20/0x38 (C)
[   25.743871]  dump_stack_lvl+0x8c/0xd0
[   25.744002]  print_report+0x118/0x608
[   25.744913]  kasan_report+0xdc/0x128
[   25.745191]  kasan_check_range+0x100/0x1a8
[   25.745311]  __kasan_check_write+0x20/0x30
[   25.745874]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   25.746412]  kasan_bitops_generic+0x110/0x1c8
[   25.746695]  kunit_try_run_case+0x170/0x3f0
[   25.747045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.747212]  kthread+0x328/0x630
[   25.747332]  ret_from_fork+0x10/0x20
[   25.747477] 
[   25.747531] Allocated by task 265:
[   25.747612]  kasan_save_stack+0x3c/0x68
[   25.747728]  kasan_save_track+0x20/0x40
[   25.747830]  kasan_save_alloc_info+0x40/0x58
[   25.747932]  __kasan_kmalloc+0xd4/0xd8
[   25.748358]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.749605]  kasan_bitops_generic+0xa0/0x1c8
[   25.749718]  kunit_try_run_case+0x170/0x3f0
[   25.749836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.749959]  kthread+0x328/0x630
[   25.750053]  ret_from_fork+0x10/0x20
[   25.750718] 
[   25.750786] The buggy address belongs to the object at fff00000c57223e0
[   25.750786]  which belongs to the cache kmalloc-16 of size 16
[   25.751137] The buggy address is located 8 bytes inside of
[   25.751137]  allocated 9-byte region [fff00000c57223e0, fff00000c57223e9)
[   25.751315] 
[   25.751763] The buggy address belongs to the physical page:
[   25.751895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722
[   25.752256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.752851] page_type: f5(slab)
[   25.752976] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.753109] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.753224] page dumped because: kasan: bad access detected
[   25.753315] 
[   25.753366] Memory state around the buggy address:
[   25.754050]  fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   25.754637]  fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.754793] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.754973]                                                           ^
[   25.755467]  fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.755619]  fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.755728] ==================================================================
[   25.670733] ==================================================================
[   25.671272] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   25.671963] Read of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265
[   25.672124] 
[   25.672225] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.672458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.673995] Hardware name: linux,dummy-virt (DT)
[   25.674742] Call trace:
[   25.675263]  show_stack+0x20/0x38 (C)
[   25.675970]  dump_stack_lvl+0x8c/0xd0
[   25.676555]  print_report+0x118/0x608
[   25.677256]  kasan_report+0xdc/0x128
[   25.677639]  __asan_report_load8_noabort+0x20/0x30
[   25.678164]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   25.678327]  kasan_bitops_generic+0x110/0x1c8
[   25.679601]  kunit_try_run_case+0x170/0x3f0
[   25.680046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.680515]  kthread+0x328/0x630
[   25.680976]  ret_from_fork+0x10/0x20
[   25.681620] 
[   25.681946] Allocated by task 265:
[   25.682071]  kasan_save_stack+0x3c/0x68
[   25.683046]  kasan_save_track+0x20/0x40
[   25.683515]  kasan_save_alloc_info+0x40/0x58
[   25.684495]  __kasan_kmalloc+0xd4/0xd8
[   25.684616]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.684734]  kasan_bitops_generic+0xa0/0x1c8
[   25.684835]  kunit_try_run_case+0x170/0x3f0
[   25.684942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.685067]  kthread+0x328/0x630
[   25.685166]  ret_from_fork+0x10/0x20
[   25.685263] 
[   25.685318] The buggy address belongs to the object at fff00000c57223e0
[   25.685318]  which belongs to the cache kmalloc-16 of size 16
[   25.687095] The buggy address is located 8 bytes inside of
[   25.687095]  allocated 9-byte region [fff00000c57223e0, fff00000c57223e9)
[   25.687281] 
[   25.687336] The buggy address belongs to the physical page:
[   25.687819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722
[   25.687978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.688104] page_type: f5(slab)
[   25.688195] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.688300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.688394] page dumped because: kasan: bad access detected
[   25.688798] 
[   25.688943] Memory state around the buggy address:
[   25.689067]  fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   25.689198]  fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.689318] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.689668]                                                           ^
[   25.689765]  fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.689943]  fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.690038] ==================================================================
[   25.641729] ==================================================================
[   25.642040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   25.642228] Write of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265
[   25.642414] 
[   25.642505] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.642736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.643231] Hardware name: linux,dummy-virt (DT)
[   25.643309] Call trace:
[   25.643368]  show_stack+0x20/0x38 (C)
[   25.643502]  dump_stack_lvl+0x8c/0xd0
[   25.643621]  print_report+0x118/0x608
[   25.643734]  kasan_report+0xdc/0x128
[   25.643860]  kasan_check_range+0x100/0x1a8
[   25.643975]  __kasan_check_write+0x20/0x30
[   25.644394]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   25.644585]  kasan_bitops_generic+0x110/0x1c8
[   25.644728]  kunit_try_run_case+0x170/0x3f0
[   25.644856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.645000]  kthread+0x328/0x630
[   25.645110]  ret_from_fork+0x10/0x20
[   25.645240] 
[   25.645288] Allocated by task 265:
[   25.645365]  kasan_save_stack+0x3c/0x68
[   25.645882]  kasan_save_track+0x20/0x40
[   25.646065]  kasan_save_alloc_info+0x40/0x58
[   25.646328]  __kasan_kmalloc+0xd4/0xd8
[   25.646535]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.646652]  kasan_bitops_generic+0xa0/0x1c8
[   25.647244]  kunit_try_run_case+0x170/0x3f0
[   25.647614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.647800]  kthread+0x328/0x630
[   25.648342]  ret_from_fork+0x10/0x20
[   25.648499] 
[   25.649076] The buggy address belongs to the object at fff00000c57223e0
[   25.649076]  which belongs to the cache kmalloc-16 of size 16
[   25.649811] The buggy address is located 8 bytes inside of
[   25.649811]  allocated 9-byte region [fff00000c57223e0, fff00000c57223e9)
[   25.650218] 
[   25.650531] The buggy address belongs to the physical page:
[   25.651095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722
[   25.651298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.651432] page_type: f5(slab)
[   25.652199] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.652534] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.652676] page dumped because: kasan: bad access detected
[   25.652865] 
[   25.653024] Memory state around the buggy address:
[   25.653398]  fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   25.653541]  fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.653664] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.653776]                                                           ^
[   25.655470]  fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.656018]  fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.656256] ==================================================================
[   25.696270] ==================================================================
[   25.697489] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   25.697663] Write of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265
[   25.697772] 
[   25.697858] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.698058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.698113] Hardware name: linux,dummy-virt (DT)
[   25.698177] Call trace:
[   25.699548]  show_stack+0x20/0x38 (C)
[   25.699721]  dump_stack_lvl+0x8c/0xd0
[   25.699855]  print_report+0x118/0x608
[   25.699975]  kasan_report+0xdc/0x128
[   25.700100]  kasan_check_range+0x100/0x1a8
[   25.700228]  __kasan_check_write+0x20/0x30
[   25.701129]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   25.702575]  kasan_bitops_generic+0x110/0x1c8
[   25.702747]  kunit_try_run_case+0x170/0x3f0
[   25.702883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.703034]  kthread+0x328/0x630
[   25.703821]  ret_from_fork+0x10/0x20
[   25.703985] 
[   25.704034] Allocated by task 265:
[   25.704108]  kasan_save_stack+0x3c/0x68
[   25.704194]  kasan_save_track+0x20/0x40
[   25.704282]  kasan_save_alloc_info+0x40/0x58
[   25.704386]  __kasan_kmalloc+0xd4/0xd8
[   25.704508]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.704663]  kasan_bitops_generic+0xa0/0x1c8
[   25.704801]  kunit_try_run_case+0x170/0x3f0
[   25.704917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.705078]  kthread+0x328/0x630
[   25.705202]  ret_from_fork+0x10/0x20
[   25.705296] 
[   25.705372] The buggy address belongs to the object at fff00000c57223e0
[   25.705372]  which belongs to the cache kmalloc-16 of size 16
[   25.705525] The buggy address is located 8 bytes inside of
[   25.705525]  allocated 9-byte region [fff00000c57223e0, fff00000c57223e9)
[   25.705675] 
[   25.705737] The buggy address belongs to the physical page:
[   25.705890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722
[   25.706083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.706538] page_type: f5(slab)
[   25.706754] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.707169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.707335] page dumped because: kasan: bad access detected
[   25.707456] 
[   25.707501] Memory state around the buggy address:
[   25.707586]  fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   25.707931]  fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.708082] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.708188]                                                           ^
[   25.708301]  fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.708454]  fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.708710] ==================================================================
[   25.759419] ==================================================================
[   25.759634] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   25.760200] Read of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265
[   25.760365] 
[   25.760475] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.760696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.760771] Hardware name: linux,dummy-virt (DT)
[   25.760856] Call trace:
[   25.761425]  show_stack+0x20/0x38 (C)
[   25.761966]  dump_stack_lvl+0x8c/0xd0
[   25.762124]  print_report+0x118/0x608
[   25.762255]  kasan_report+0xdc/0x128
[   25.762384]  __asan_report_load8_noabort+0x20/0x30
[   25.762712]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   25.763295]  kasan_bitops_generic+0x110/0x1c8
[   25.763422]  kunit_try_run_case+0x170/0x3f0
[   25.763588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.763813]  kthread+0x328/0x630
[   25.763965]  ret_from_fork+0x10/0x20
[   25.764168] 
[   25.764231] Allocated by task 265:
[   25.764734]  kasan_save_stack+0x3c/0x68
[   25.764878]  kasan_save_track+0x20/0x40
[   25.764977]  kasan_save_alloc_info+0x40/0x58
[   25.765200]  __kasan_kmalloc+0xd4/0xd8
[   25.765535]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.765656]  kasan_bitops_generic+0xa0/0x1c8
[   25.765764]  kunit_try_run_case+0x170/0x3f0
[   25.766373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.766715]  kthread+0x328/0x630
[   25.766827]  ret_from_fork+0x10/0x20
[   25.766922] 
[   25.767219] The buggy address belongs to the object at fff00000c57223e0
[   25.767219]  which belongs to the cache kmalloc-16 of size 16
[   25.767390] The buggy address is located 8 bytes inside of
[   25.767390]  allocated 9-byte region [fff00000c57223e0, fff00000c57223e9)
[   25.767576] 
[   25.767632] The buggy address belongs to the physical page:
[   25.767726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722
[   25.767864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.768031] page_type: f5(slab)
[   25.768147] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.768286] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.768396] page dumped because: kasan: bad access detected
[   25.768497] 
[   25.768552] Memory state around the buggy address:
[   25.768633]  fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   25.768755]  fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.768877] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.768985]                                                           ^
[   25.769097]  fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.769223]  fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.769349] ==================================================================
[   25.710543] ==================================================================
[   25.710679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   25.710809] Read of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265
[   25.710947] 
[   25.711037] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.711252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.711327] Hardware name: linux,dummy-virt (DT)
[   25.713443] Call trace:
[   25.713589]  show_stack+0x20/0x38 (C)
[   25.713792]  dump_stack_lvl+0x8c/0xd0
[   25.713935]  print_report+0x118/0x608
[   25.714082]  kasan_report+0xdc/0x128
[   25.714191]  __asan_report_load8_noabort+0x20/0x30
[   25.714451]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   25.714576]  kasan_bitops_generic+0x110/0x1c8
[   25.714752]  kunit_try_run_case+0x170/0x3f0
[   25.714999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.715362]  kthread+0x328/0x630
[   25.715576]  ret_from_fork+0x10/0x20
[   25.715856] 
[   25.715929] Allocated by task 265:
[   25.716014]  kasan_save_stack+0x3c/0x68
[   25.716195]  kasan_save_track+0x20/0x40
[   25.716298]  kasan_save_alloc_info+0x40/0x58
[   25.716411]  __kasan_kmalloc+0xd4/0xd8
[   25.716512]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.716615]  kasan_bitops_generic+0xa0/0x1c8
[   25.716728]  kunit_try_run_case+0x170/0x3f0
[   25.716838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.716954]  kthread+0x328/0x630
[   25.717810]  ret_from_fork+0x10/0x20
[   25.717959] 
[   25.718021] The buggy address belongs to the object at fff00000c57223e0
[   25.718021]  which belongs to the cache kmalloc-16 of size 16
[   25.718176] The buggy address is located 8 bytes inside of
[   25.718176]  allocated 9-byte region [fff00000c57223e0, fff00000c57223e9)
[   25.718350] 
[   25.718500] The buggy address belongs to the physical page:
[   25.718578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722
[   25.719147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.719294] page_type: f5(slab)
[   25.719491] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.719627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.719733] page dumped because: kasan: bad access detected
[   25.719829] 
[   25.719881] Memory state around the buggy address:
[   25.719966]  fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   25.720084]  fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.720227] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.720335]                                                           ^
[   25.721202]  fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.721333]  fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.721499] ==================================================================
[   25.773205] ==================================================================
[   25.773341] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   25.773479] Write of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265
[   25.773601] 
[   25.773695] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   25.773902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.773970] Hardware name: linux,dummy-virt (DT)
[   25.774050] Call trace:
[   25.774114]  show_stack+0x20/0x38 (C)
[   25.774243]  dump_stack_lvl+0x8c/0xd0
[   25.774379]  print_report+0x118/0x608
[   25.775667]  kasan_report+0xdc/0x128
[   25.775883]  kasan_check_range+0x100/0x1a8
[   25.776085]  __kasan_check_write+0x20/0x30
[   25.776487]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   25.777014]  kasan_bitops_generic+0x110/0x1c8
[   25.777669]  kunit_try_run_case+0x170/0x3f0
[   25.778352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.778569]  kthread+0x328/0x630
[   25.778799]  ret_from_fork+0x10/0x20
[   25.779022] 
[   25.779116] Allocated by task 265:
[   25.779199]  kasan_save_stack+0x3c/0x68
[   25.779764]  kasan_save_track+0x20/0x40
[   25.779976]  kasan_save_alloc_info+0x40/0x58
[   25.780086]  __kasan_kmalloc+0xd4/0xd8
[   25.780223]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.780435]  kasan_bitops_generic+0xa0/0x1c8
[   25.780558]  kunit_try_run_case+0x170/0x3f0
[   25.781097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.781421]  kthread+0x328/0x630
[   25.781621]  ret_from_fork+0x10/0x20
[   25.782002] 
[   25.782086] The buggy address belongs to the object at fff00000c57223e0
[   25.782086]  which belongs to the cache kmalloc-16 of size 16
[   25.782459] The buggy address is located 8 bytes inside of
[   25.782459]  allocated 9-byte region [fff00000c57223e0, fff00000c57223e9)
[   25.782957] 
[   25.783022] The buggy address belongs to the physical page:
[   25.783109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722
[   25.783227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.783349] page_type: f5(slab)
[   25.784494] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   25.784894] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.785435] page dumped because: kasan: bad access detected
[   25.785770] 
[   25.786113] Memory state around the buggy address:
[   25.786216]  fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   25.786749]  fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   25.786886] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.787046]                                                           ^
[   25.787207]  fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.787393]  fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.787582] ==================================================================

[   16.086590] ==================================================================
[   16.086933] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.087419] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.087890] 
[   16.088081] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.088153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.088169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.088204] Call Trace:
[   16.088231]  <TASK>
[   16.088253]  dump_stack_lvl+0x73/0xb0
[   16.088301]  print_report+0xd1/0x650
[   16.088338]  ? __virt_addr_valid+0x1db/0x2d0
[   16.088365]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.088389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.088426]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.088449]  kasan_report+0x141/0x180
[   16.088474]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.088500]  kasan_check_range+0x10c/0x1c0
[   16.088521]  __kasan_check_write+0x18/0x20
[   16.088541]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   16.088580]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.088617]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.088764]  ? trace_hardirqs_on+0x37/0xe0
[   16.088799]  ? kasan_bitops_generic+0x92/0x1c0
[   16.088826]  kasan_bitops_generic+0x116/0x1c0
[   16.088850]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.088872]  ? __pfx_read_tsc+0x10/0x10
[   16.088895]  ? ktime_get_ts64+0x86/0x230
[   16.088922]  kunit_try_run_case+0x1a5/0x480
[   16.088948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.088970]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.088996]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.089020]  ? __kthread_parkme+0x82/0x180
[   16.089041]  ? preempt_count_sub+0x50/0x80
[   16.089067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.089092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.089114]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.089137]  kthread+0x337/0x6f0
[   16.089155]  ? trace_preempt_on+0x20/0xc0
[   16.089177]  ? __pfx_kthread+0x10/0x10
[   16.089199]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.089228]  ? calculate_sigpending+0x7b/0xa0
[   16.089250]  ? __pfx_kthread+0x10/0x10
[   16.089269]  ret_from_fork+0x41/0x80
[   16.089289]  ? __pfx_kthread+0x10/0x10
[   16.089308]  ret_from_fork_asm+0x1a/0x30
[   16.089339]  </TASK>
[   16.089352] 
[   16.096445] Allocated by task 281:
[   16.096567]  kasan_save_stack+0x45/0x70
[   16.096858]  kasan_save_track+0x18/0x40
[   16.097064]  kasan_save_alloc_info+0x3b/0x50
[   16.097319]  __kasan_kmalloc+0xb7/0xc0
[   16.097540]  __kmalloc_cache_noprof+0x189/0x420
[   16.098160]  kasan_bitops_generic+0x92/0x1c0
[   16.098415]  kunit_try_run_case+0x1a5/0x480
[   16.098575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.098844]  kthread+0x337/0x6f0
[   16.099024]  ret_from_fork+0x41/0x80
[   16.099213]  ret_from_fork_asm+0x1a/0x30
[   16.099396] 
[   16.099518] The buggy address belongs to the object at ffff888102497640
[   16.099518]  which belongs to the cache kmalloc-16 of size 16
[   16.100111] The buggy address is located 8 bytes inside of
[   16.100111]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.100533] 
[   16.100626] The buggy address belongs to the physical page:
[   16.100796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.100949] flags: 0x200000000000000(node=0|zone=2)
[   16.101064] page_type: f5(slab)
[   16.101157] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.101300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.101436] page dumped because: kasan: bad access detected
[   16.102163] 
[   16.102306] Memory state around the buggy address:
[   16.103260]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.103648]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.103956] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.104087]                                               ^
[   16.104199]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.104330]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.104950] ==================================================================
[   16.061789] ==================================================================
[   16.062789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.063275] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.063786] 
[   16.063917] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.063984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.064000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.064268] Call Trace:
[   16.064303]  <TASK>
[   16.064327]  dump_stack_lvl+0x73/0xb0
[   16.064370]  print_report+0xd1/0x650
[   16.064399]  ? __virt_addr_valid+0x1db/0x2d0
[   16.064424]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.064449]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.064474]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.064496]  kasan_report+0x141/0x180
[   16.064520]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.064547]  kasan_check_range+0x10c/0x1c0
[   16.064592]  __kasan_check_write+0x18/0x20
[   16.064615]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   16.064918]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.064947]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.064971]  ? trace_hardirqs_on+0x37/0xe0
[   16.064997]  ? kasan_bitops_generic+0x92/0x1c0
[   16.065022]  kasan_bitops_generic+0x116/0x1c0
[   16.065043]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.065065]  ? __pfx_read_tsc+0x10/0x10
[   16.065087]  ? ktime_get_ts64+0x86/0x230
[   16.065115]  kunit_try_run_case+0x1a5/0x480
[   16.065141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.065165]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.065190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.065213]  ? __kthread_parkme+0x82/0x180
[   16.065236]  ? preempt_count_sub+0x50/0x80
[   16.065263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.065288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.065312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.065335]  kthread+0x337/0x6f0
[   16.065353]  ? trace_preempt_on+0x20/0xc0
[   16.065377]  ? __pfx_kthread+0x10/0x10
[   16.065396]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.065417]  ? calculate_sigpending+0x7b/0xa0
[   16.065439]  ? __pfx_kthread+0x10/0x10
[   16.065458]  ret_from_fork+0x41/0x80
[   16.065479]  ? __pfx_kthread+0x10/0x10
[   16.065499]  ret_from_fork_asm+0x1a/0x30
[   16.065530]  </TASK>
[   16.065544] 
[   16.076245] Allocated by task 281:
[   16.076525]  kasan_save_stack+0x45/0x70
[   16.076894]  kasan_save_track+0x18/0x40
[   16.077083]  kasan_save_alloc_info+0x3b/0x50
[   16.077408]  __kasan_kmalloc+0xb7/0xc0
[   16.077578]  __kmalloc_cache_noprof+0x189/0x420
[   16.078064]  kasan_bitops_generic+0x92/0x1c0
[   16.078280]  kunit_try_run_case+0x1a5/0x480
[   16.078409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.078851]  kthread+0x337/0x6f0
[   16.079052]  ret_from_fork+0x41/0x80
[   16.079295]  ret_from_fork_asm+0x1a/0x30
[   16.079534] 
[   16.079773] The buggy address belongs to the object at ffff888102497640
[   16.079773]  which belongs to the cache kmalloc-16 of size 16
[   16.080248] The buggy address is located 8 bytes inside of
[   16.080248]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.080930] 
[   16.081004] The buggy address belongs to the physical page:
[   16.081123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.081592] flags: 0x200000000000000(node=0|zone=2)
[   16.082101] page_type: f5(slab)
[   16.082209] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.082719] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.083089] page dumped because: kasan: bad access detected
[   16.083333] 
[   16.083479] Memory state around the buggy address:
[   16.083854]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.084157]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.084491] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.084898]                                               ^
[   16.085036]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.085344]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.085957] ==================================================================
[   16.105919] ==================================================================
[   16.106611] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.107138] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.107347] 
[   16.107455] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.107513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.107527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.107551] Call Trace:
[   16.107591]  <TASK>
[   16.107613]  dump_stack_lvl+0x73/0xb0
[   16.107647]  print_report+0xd1/0x650
[   16.107672]  ? __virt_addr_valid+0x1db/0x2d0
[   16.107836]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.107864]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.107889]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.107912]  kasan_report+0x141/0x180
[   16.107937]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.107963]  kasan_check_range+0x10c/0x1c0
[   16.107985]  __kasan_check_write+0x18/0x20
[   16.108005]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   16.108028]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.108053]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.108076]  ? trace_hardirqs_on+0x37/0xe0
[   16.108101]  ? kasan_bitops_generic+0x92/0x1c0
[   16.108125]  kasan_bitops_generic+0x116/0x1c0
[   16.108146]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.108169]  ? __pfx_read_tsc+0x10/0x10
[   16.108191]  ? ktime_get_ts64+0x86/0x230
[   16.108217]  kunit_try_run_case+0x1a5/0x480
[   16.108242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.108265]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.108289]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.108312]  ? __kthread_parkme+0x82/0x180
[   16.108334]  ? preempt_count_sub+0x50/0x80
[   16.108359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.108384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.108407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.108431]  kthread+0x337/0x6f0
[   16.108448]  ? trace_preempt_on+0x20/0xc0
[   16.108471]  ? __pfx_kthread+0x10/0x10
[   16.108489]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.108510]  ? calculate_sigpending+0x7b/0xa0
[   16.108532]  ? __pfx_kthread+0x10/0x10
[   16.108550]  ret_from_fork+0x41/0x80
[   16.108587]  ? __pfx_kthread+0x10/0x10
[   16.108607]  ret_from_fork_asm+0x1a/0x30
[   16.108782]  </TASK>
[   16.108924] 
[   16.119043] Allocated by task 281:
[   16.119322]  kasan_save_stack+0x45/0x70
[   16.119511]  kasan_save_track+0x18/0x40
[   16.119623]  kasan_save_alloc_info+0x3b/0x50
[   16.119722]  __kasan_kmalloc+0xb7/0xc0
[   16.119814]  __kmalloc_cache_noprof+0x189/0x420
[   16.122430]  kasan_bitops_generic+0x92/0x1c0
[   16.122589]  kunit_try_run_case+0x1a5/0x480
[   16.122852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.122981]  kthread+0x337/0x6f0
[   16.123064]  ret_from_fork+0x41/0x80
[   16.123169]  ret_from_fork_asm+0x1a/0x30
[   16.123928] 
[   16.124002] The buggy address belongs to the object at ffff888102497640
[   16.124002]  which belongs to the cache kmalloc-16 of size 16
[   16.125855] The buggy address is located 8 bytes inside of
[   16.125855]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.126367] 
[   16.126466] The buggy address belongs to the physical page:
[   16.126625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.126775] flags: 0x200000000000000(node=0|zone=2)
[   16.126884] page_type: f5(slab)
[   16.127652] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.127830] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.127970] page dumped because: kasan: bad access detected
[   16.128079] 
[   16.128131] Memory state around the buggy address:
[   16.128233]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.128364]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.128493] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.130275]                                               ^
[   16.130509]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.130951]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.131146] ==================================================================
[   16.033239] ==================================================================
[   16.033835] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.034280] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.034762] 
[   16.035424] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.035495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.035511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.035535] Call Trace:
[   16.035570]  <TASK>
[   16.035595]  dump_stack_lvl+0x73/0xb0
[   16.035936]  print_report+0xd1/0x650
[   16.035967]  ? __virt_addr_valid+0x1db/0x2d0
[   16.035994]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.036017]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.036041]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.036064]  kasan_report+0x141/0x180
[   16.036088]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.036115]  kasan_check_range+0x10c/0x1c0
[   16.036136]  __kasan_check_write+0x18/0x20
[   16.036157]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.036179]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.036203]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.036225]  ? trace_hardirqs_on+0x37/0xe0
[   16.036250]  ? kasan_bitops_generic+0x92/0x1c0
[   16.036275]  kasan_bitops_generic+0x116/0x1c0
[   16.036296]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.036317]  ? __pfx_read_tsc+0x10/0x10
[   16.036353]  ? ktime_get_ts64+0x86/0x230
[   16.036382]  kunit_try_run_case+0x1a5/0x480
[   16.036409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.036431]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.036456]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.036479]  ? __kthread_parkme+0x82/0x180
[   16.036501]  ? preempt_count_sub+0x50/0x80
[   16.036528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.036551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.036594]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.036617]  kthread+0x337/0x6f0
[   16.036644]  ? trace_preempt_on+0x20/0xc0
[   16.036667]  ? __pfx_kthread+0x10/0x10
[   16.036684]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.036705]  ? calculate_sigpending+0x7b/0xa0
[   16.036728]  ? __pfx_kthread+0x10/0x10
[   16.036746]  ret_from_fork+0x41/0x80
[   16.036766]  ? __pfx_kthread+0x10/0x10
[   16.036784]  ret_from_fork_asm+0x1a/0x30
[   16.036815]  </TASK>
[   16.036829] 
[   16.048360] Allocated by task 281:
[   16.048628]  kasan_save_stack+0x45/0x70
[   16.049550]  kasan_save_track+0x18/0x40
[   16.049713]  kasan_save_alloc_info+0x3b/0x50
[   16.050023]  __kasan_kmalloc+0xb7/0xc0
[   16.050123]  __kmalloc_cache_noprof+0x189/0x420
[   16.050399]  kasan_bitops_generic+0x92/0x1c0
[   16.050607]  kunit_try_run_case+0x1a5/0x480
[   16.051317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.051523]  kthread+0x337/0x6f0
[   16.051966]  ret_from_fork+0x41/0x80
[   16.052491]  ret_from_fork_asm+0x1a/0x30
[   16.052981] 
[   16.053281] The buggy address belongs to the object at ffff888102497640
[   16.053281]  which belongs to the cache kmalloc-16 of size 16
[   16.053729] The buggy address is located 8 bytes inside of
[   16.053729]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.054447] 
[   16.054549] The buggy address belongs to the physical page:
[   16.054758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.055544] flags: 0x200000000000000(node=0|zone=2)
[   16.055860] page_type: f5(slab)
[   16.056255] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.056749] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.057014] page dumped because: kasan: bad access detected
[   16.057773] 
[   16.058085] Memory state around the buggy address:
[   16.058311]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.058884]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.059385] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.059822]                                               ^
[   16.060167]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.060476]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.061001] ==================================================================
[   16.006918] ==================================================================
[   16.007090] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.007353] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.008615] 
[   16.009074] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.009137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.009151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.009175] Call Trace:
[   16.009191]  <TASK>
[   16.009220]  dump_stack_lvl+0x73/0xb0
[   16.009260]  print_report+0xd1/0x650
[   16.009285]  ? __virt_addr_valid+0x1db/0x2d0
[   16.009308]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.009330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.009353]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.009375]  kasan_report+0x141/0x180
[   16.009398]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.009424]  kasan_check_range+0x10c/0x1c0
[   16.009444]  __kasan_check_write+0x18/0x20
[   16.009465]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.009487]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.009510]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.009532]  ? trace_hardirqs_on+0x37/0xe0
[   16.009556]  ? kasan_bitops_generic+0x92/0x1c0
[   16.009602]  kasan_bitops_generic+0x116/0x1c0
[   16.009803]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.009832]  ? __pfx_read_tsc+0x10/0x10
[   16.009855]  ? ktime_get_ts64+0x86/0x230
[   16.009881]  kunit_try_run_case+0x1a5/0x480
[   16.009909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.009931]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.009956]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.009980]  ? __kthread_parkme+0x82/0x180
[   16.010003]  ? preempt_count_sub+0x50/0x80
[   16.010029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.010053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.010076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.010098]  kthread+0x337/0x6f0
[   16.010116]  ? trace_preempt_on+0x20/0xc0
[   16.010139]  ? __pfx_kthread+0x10/0x10
[   16.010157]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.010177]  ? calculate_sigpending+0x7b/0xa0
[   16.010199]  ? __pfx_kthread+0x10/0x10
[   16.010217]  ret_from_fork+0x41/0x80
[   16.010238]  ? __pfx_kthread+0x10/0x10
[   16.010256]  ret_from_fork_asm+0x1a/0x30
[   16.010288]  </TASK>
[   16.010301] 
[   16.020810] Allocated by task 281:
[   16.021029]  kasan_save_stack+0x45/0x70
[   16.021185]  kasan_save_track+0x18/0x40
[   16.021410]  kasan_save_alloc_info+0x3b/0x50
[   16.022401]  __kasan_kmalloc+0xb7/0xc0
[   16.022545]  __kmalloc_cache_noprof+0x189/0x420
[   16.022719]  kasan_bitops_generic+0x92/0x1c0
[   16.023296]  kunit_try_run_case+0x1a5/0x480
[   16.023452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.023926]  kthread+0x337/0x6f0
[   16.024057]  ret_from_fork+0x41/0x80
[   16.024172]  ret_from_fork_asm+0x1a/0x30
[   16.024299] 
[   16.024374] The buggy address belongs to the object at ffff888102497640
[   16.024374]  which belongs to the cache kmalloc-16 of size 16
[   16.025407] The buggy address is located 8 bytes inside of
[   16.025407]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.026425] 
[   16.026541] The buggy address belongs to the physical page:
[   16.026764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.027121] flags: 0x200000000000000(node=0|zone=2)
[   16.027609] page_type: f5(slab)
[   16.028190] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.028375] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.028817] page dumped because: kasan: bad access detected
[   16.029161] 
[   16.029233] Memory state around the buggy address:
[   16.029724]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.029907]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.030176] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.030418]                                               ^
[   16.031038]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.031223]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.032287] ==================================================================
[   15.960214] ==================================================================
[   15.960529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.960741] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   15.960886] 
[   15.961746] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   15.961826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.961842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.961869] Call Trace:
[   15.961884]  <TASK>
[   15.961907]  dump_stack_lvl+0x73/0xb0
[   15.961953]  print_report+0xd1/0x650
[   15.962012]  ? __virt_addr_valid+0x1db/0x2d0
[   15.962040]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.962155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.962203]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.962231]  kasan_report+0x141/0x180
[   15.962256]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.962297]  kasan_check_range+0x10c/0x1c0
[   15.962320]  __kasan_check_write+0x18/0x20
[   15.962341]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   15.962365]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.962389]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.962413]  ? trace_hardirqs_on+0x37/0xe0
[   15.962440]  ? kasan_bitops_generic+0x92/0x1c0
[   15.962465]  kasan_bitops_generic+0x116/0x1c0
[   15.962488]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.962512]  ? __pfx_read_tsc+0x10/0x10
[   15.962536]  ? ktime_get_ts64+0x86/0x230
[   15.962585]  kunit_try_run_case+0x1a5/0x480
[   15.962619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.962645]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.962674]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.962699]  ? __kthread_parkme+0x82/0x180
[   15.962726]  ? preempt_count_sub+0x50/0x80
[   15.962758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.962786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.962811]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.962837]  kthread+0x337/0x6f0
[   15.962856]  ? trace_preempt_on+0x20/0xc0
[   15.962881]  ? __pfx_kthread+0x10/0x10
[   15.962901]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.962923]  ? calculate_sigpending+0x7b/0xa0
[   15.962949]  ? __pfx_kthread+0x10/0x10
[   15.962968]  ret_from_fork+0x41/0x80
[   15.962993]  ? __pfx_kthread+0x10/0x10
[   15.963012]  ret_from_fork_asm+0x1a/0x30
[   15.963047]  </TASK>
[   15.963062] 
[   15.970400] Allocated by task 281:
[   15.970673]  kasan_save_stack+0x45/0x70
[   15.971162]  kasan_save_track+0x18/0x40
[   15.971572]  kasan_save_alloc_info+0x3b/0x50
[   15.971899]  __kasan_kmalloc+0xb7/0xc0
[   15.972006]  __kmalloc_cache_noprof+0x189/0x420
[   15.972109]  kasan_bitops_generic+0x92/0x1c0
[   15.972204]  kunit_try_run_case+0x1a5/0x480
[   15.972477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.973051]  kthread+0x337/0x6f0
[   15.973306]  ret_from_fork+0x41/0x80
[   15.973468]  ret_from_fork_asm+0x1a/0x30
[   15.973649] 
[   15.973807] The buggy address belongs to the object at ffff888102497640
[   15.973807]  which belongs to the cache kmalloc-16 of size 16
[   15.974269] The buggy address is located 8 bytes inside of
[   15.974269]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   15.974485] 
[   15.974546] The buggy address belongs to the physical page:
[   15.974910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   15.975434] flags: 0x200000000000000(node=0|zone=2)
[   15.975706] page_type: f5(slab)
[   15.975804] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   15.976289] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   15.976859] page dumped because: kasan: bad access detected
[   15.977021] 
[   15.977078] Memory state around the buggy address:
[   15.977185]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   15.977328]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   15.977547] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   15.978062]                                               ^
[   15.978455]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.979041]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.979222] ==================================================================
[   16.131944] ==================================================================
[   16.132280] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.132898] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   16.133140] 
[   16.133299] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   16.133373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.133387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.133411] Call Trace:
[   16.133435]  <TASK>
[   16.133457]  dump_stack_lvl+0x73/0xb0
[   16.133491]  print_report+0xd1/0x650
[   16.133537]  ? __virt_addr_valid+0x1db/0x2d0
[   16.133576]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.133951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.134002]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.134026]  kasan_report+0x141/0x180
[   16.134051]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.134077]  kasan_check_range+0x10c/0x1c0
[   16.134098]  __kasan_check_write+0x18/0x20
[   16.134117]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   16.134138]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.134161]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.134182]  ? trace_hardirqs_on+0x37/0xe0
[   16.134207]  ? kasan_bitops_generic+0x92/0x1c0
[   16.134230]  kasan_bitops_generic+0x116/0x1c0
[   16.134250]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.134290]  ? __pfx_read_tsc+0x10/0x10
[   16.134312]  ? ktime_get_ts64+0x86/0x230
[   16.134342]  kunit_try_run_case+0x1a5/0x480
[   16.134369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.134391]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.134427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.134450]  ? __kthread_parkme+0x82/0x180
[   16.134472]  ? preempt_count_sub+0x50/0x80
[   16.134497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.134522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.134545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.134580]  kthread+0x337/0x6f0
[   16.134616]  ? trace_preempt_on+0x20/0xc0
[   16.134750]  ? __pfx_kthread+0x10/0x10
[   16.134781]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.134808]  ? calculate_sigpending+0x7b/0xa0
[   16.134830]  ? __pfx_kthread+0x10/0x10
[   16.134848]  ret_from_fork+0x41/0x80
[   16.134877]  ? __pfx_kthread+0x10/0x10
[   16.134900]  ret_from_fork_asm+0x1a/0x30
[   16.134931]  </TASK>
[   16.134944] 
[   16.145090] Allocated by task 281:
[   16.145331]  kasan_save_stack+0x45/0x70
[   16.145592]  kasan_save_track+0x18/0x40
[   16.146326]  kasan_save_alloc_info+0x3b/0x50
[   16.146490]  __kasan_kmalloc+0xb7/0xc0
[   16.146918]  __kmalloc_cache_noprof+0x189/0x420
[   16.147041]  kasan_bitops_generic+0x92/0x1c0
[   16.148031]  kunit_try_run_case+0x1a5/0x480
[   16.148257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.148426]  kthread+0x337/0x6f0
[   16.148777]  ret_from_fork+0x41/0x80
[   16.148939]  ret_from_fork_asm+0x1a/0x30
[   16.149448] 
[   16.149535] The buggy address belongs to the object at ffff888102497640
[   16.149535]  which belongs to the cache kmalloc-16 of size 16
[   16.150493] The buggy address is located 8 bytes inside of
[   16.150493]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.151038] 
[   16.151180] The buggy address belongs to the physical page:
[   16.151569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.152141] flags: 0x200000000000000(node=0|zone=2)
[   16.152592] page_type: f5(slab)
[   16.152923] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.153221] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.153693] page dumped because: kasan: bad access detected
[   16.153928] 
[   16.154046] Memory state around the buggy address:
[   16.154438]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.155161]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.155459] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.155873]                                               ^
[   16.156058]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.156517]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.157381] ==================================================================
[   15.980089] ==================================================================
[   15.980802] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.981323] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281
[   15.981952] 
[   15.982050] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   15.982109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.982124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.982150] Call Trace:
[   15.982166]  <TASK>
[   15.982187]  dump_stack_lvl+0x73/0xb0
[   15.982222]  print_report+0xd1/0x650
[   15.982247]  ? __virt_addr_valid+0x1db/0x2d0
[   15.982271]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.982294]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.982319]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.982342]  kasan_report+0x141/0x180
[   15.982365]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.982392]  kasan_check_range+0x10c/0x1c0
[   15.982413]  __kasan_check_write+0x18/0x20
[   15.982434]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   15.982457]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   15.982481]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.982503]  ? trace_hardirqs_on+0x37/0xe0
[   15.982527]  ? kasan_bitops_generic+0x92/0x1c0
[   15.982551]  kasan_bitops_generic+0x116/0x1c0
[   15.982586]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.982610]  ? __pfx_read_tsc+0x10/0x10
[   15.982654]  ? ktime_get_ts64+0x86/0x230
[   15.982682]  kunit_try_run_case+0x1a5/0x480
[   15.982722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.982747]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.982774]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.982800]  ? __kthread_parkme+0x82/0x180
[   15.982824]  ? preempt_count_sub+0x50/0x80
[   15.982853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.982880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.982904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.982931]  kthread+0x337/0x6f0
[   15.982950]  ? trace_preempt_on+0x20/0xc0
[   15.982975]  ? __pfx_kthread+0x10/0x10
[   15.982995]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.983017]  ? calculate_sigpending+0x7b/0xa0
[   15.983042]  ? __pfx_kthread+0x10/0x10
[   15.983112]  ret_from_fork+0x41/0x80
[   15.983151]  ? __pfx_kthread+0x10/0x10
[   15.983174]  ret_from_fork_asm+0x1a/0x30
[   15.983209]  </TASK>
[   15.983225] 
[   15.995552] Allocated by task 281:
[   15.995963]  kasan_save_stack+0x45/0x70
[   15.996177]  kasan_save_track+0x18/0x40
[   15.996279]  kasan_save_alloc_info+0x3b/0x50
[   15.996555]  __kasan_kmalloc+0xb7/0xc0
[   15.997190]  __kmalloc_cache_noprof+0x189/0x420
[   15.997386]  kasan_bitops_generic+0x92/0x1c0
[   15.997842]  kunit_try_run_case+0x1a5/0x480
[   15.998097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.998341]  kthread+0x337/0x6f0
[   15.998586]  ret_from_fork+0x41/0x80
[   15.999237]  ret_from_fork_asm+0x1a/0x30
[   15.999458] 
[   15.999544] The buggy address belongs to the object at ffff888102497640
[   15.999544]  which belongs to the cache kmalloc-16 of size 16
[   16.000162] The buggy address is located 8 bytes inside of
[   16.000162]  allocated 9-byte region [ffff888102497640, ffff888102497649)
[   16.000468] 
[   16.000555] The buggy address belongs to the physical page:
[   16.001188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497
[   16.001728] flags: 0x200000000000000(node=0|zone=2)
[   16.002034] page_type: f5(slab)
[   16.002240] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.002449] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.003216] page dumped because: kasan: bad access detected
[   16.003413] 
[   16.003468] Memory state around the buggy address:
[   16.003628]  ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   16.003961]  ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.004308] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   16.004518]                                               ^
[   16.004762]  ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.006101]  ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.006282] ==================================================================