Hay
Date
July 22, 2025, 2:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.543261] ==================================================================
[   19.543535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   19.543723] Write of size 8 at addr fff00000c5a0ed88 by task kunit_try_catch/263
[   19.543808] 
[   19.543843] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.543931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.544110] Hardware name: linux,dummy-virt (DT)
[   19.544256] Call trace:
[   19.544296]  show_stack+0x20/0x38 (C)
[   19.544349]  dump_stack_lvl+0x8c/0xd0
[   19.544480]  print_report+0x118/0x5d0
[   19.544554]  kasan_report+0xdc/0x128
[   19.544610]  kasan_check_range+0x100/0x1a8
[   19.544810]  __kasan_check_write+0x20/0x30
[   19.544948]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   19.545027]  kasan_bitops_generic+0x110/0x1c8
[   19.545093]  kunit_try_run_case+0x170/0x3f0
[   19.545193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.545245]  kthread+0x328/0x630
[   19.545470]  ret_from_fork+0x10/0x20
[   19.545597] 
[   19.545649] Allocated by task 263:
[   19.545683]  kasan_save_stack+0x3c/0x68
[   19.545802]  kasan_save_track+0x20/0x40
[   19.545844]  kasan_save_alloc_info+0x40/0x58
[   19.545885]  __kasan_kmalloc+0xd4/0xd8
[   19.545921]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.545960]  kasan_bitops_generic+0xa0/0x1c8
[   19.546134]  kunit_try_run_case+0x170/0x3f0
[   19.546237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.546413]  kthread+0x328/0x630
[   19.546451]  ret_from_fork+0x10/0x20
[   19.546503] 
[   19.546527] The buggy address belongs to the object at fff00000c5a0ed80
[   19.546527]  which belongs to the cache kmalloc-16 of size 16
[   19.546597] The buggy address is located 8 bytes inside of
[   19.546597]  allocated 9-byte region [fff00000c5a0ed80, fff00000c5a0ed89)
[   19.547158] page_type: f5(slab)
[   19.547685] page dumped because: kasan: bad access detected
[   19.547767] 
[   19.547904] Memory state around the buggy address:
[   19.547958]  fff00000c5a0ec80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   19.548447]  fff00000c5a0ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.549641] Read of size 8 at addr fff00000c5a0ed88 by task kunit_try_catch/263
[   19.550306]  dump_stack_lvl+0x8c/0xd0
[   19.551011]  kasan_bitops_generic+0x110/0x1c8
[   19.552507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.553950] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.554112] page dumped because: kasan: bad access detected
[   19.554859]                       ^
[   19.554899]  fff00000c5a0ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.555654] ==================================================================
[   19.538045] ==================================================================
[   19.538109] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   19.538224] Write of size 8 at addr fff00000c5a0ed88 by task kunit_try_catch/263
[   19.538302] 
[   19.538362] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.538690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.538865] Hardware name: linux,dummy-virt (DT)
[   19.538911] Call trace:
[   19.539015]  show_stack+0x20/0x38 (C)
[   19.539123]  dump_stack_lvl+0x8c/0xd0
[   19.539260]  print_report+0x118/0x5d0
[   19.539482]  kasan_report+0xdc/0x128
[   19.539564]  kasan_check_range+0x100/0x1a8
[   19.539763]  __kasan_check_write+0x20/0x30
[   19.539888]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   19.539952]  kasan_bitops_generic+0x110/0x1c8
[   19.539999]  kunit_try_run_case+0x170/0x3f0
[   19.540051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.540111]  kthread+0x328/0x630
[   19.540159]  ret_from_fork+0x10/0x20
[   19.540206] 
[   19.540226] Allocated by task 263:
[   19.540257]  kasan_save_stack+0x3c/0x68
[   19.540310]  kasan_save_track+0x20/0x40
[   19.540349]  kasan_save_alloc_info+0x40/0x58
[   19.540389]  __kasan_kmalloc+0xd4/0xd8
[   19.540427]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.540476]  kasan_bitops_generic+0xa0/0x1c8
[   19.540524]  kunit_try_run_case+0x170/0x3f0
[   19.540565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.540617]  kthread+0x328/0x630
[   19.540663]  ret_from_fork+0x10/0x20
[   19.540708] 
[   19.540739] The buggy address belongs to the object at fff00000c5a0ed80
[   19.540739]  which belongs to the cache kmalloc-16 of size 16
[   19.540859] 
[   19.540889] The buggy address belongs to the physical page:
[   19.540940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a0e
[   19.541008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.541056] page_type: f5(slab)
[   19.541104] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.541205] page dumped because: kasan: bad access detected
[   19.541248] 
[   19.541292] Memory state around the buggy address:
[   19.541715]  fff00000c5a0ec80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   19.541766]  fff00000c5a0ed00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   19.541835] >fff00000c5a0ed80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.541900]                       ^
[   19.542411]  fff00000c5a0ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.542496]  fff00000c5a0ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.542822] ==================================================================
[   19.530239] ==================================================================
[   19.530319] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.530951] Read of size 8 at addr fff00000c5a0ed88 by task kunit_try_catch/263
[   19.531125] 
[   19.531175] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.531311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.531730] Hardware name: linux,dummy-virt (DT)
[   19.531785] Call trace:
[   19.531990]  show_stack+0x20/0x38 (C)
[   19.532145]  dump_stack_lvl+0x8c/0xd0
[   19.532341]  print_report+0x118/0x5d0
[   19.532479]  kasan_report+0xdc/0x128
[   19.532525]  __asan_report_load8_noabort+0x20/0x30
[   19.532982]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   19.533496]  kasan_bitops_generic+0x110/0x1c8
[   19.534323]  kunit_try_run_case+0x170/0x3f0
[   19.534384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.534845]  kthread+0x328/0x630
[   19.534904]  ret_from_fork+0x10/0x20
[   19.534955] 
[   19.534975] Allocated by task 263:
[   19.535014]  kasan_save_stack+0x3c/0x68
[   19.535056]  kasan_save_track+0x20/0x40
[   19.535093]  kasan_save_alloc_info+0x40/0x58
[   19.535133]  __kasan_kmalloc+0xd4/0xd8
[   19.535168]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.535208]  kasan_bitops_generic+0xa0/0x1c8
[   19.535246]  kunit_try_run_case+0x170/0x3f0
[   19.535296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.535339]  kthread+0x328/0x630
[   19.535375]  ret_from_fork+0x10/0x20
[   19.535411] 
[   19.535431] The buggy address belongs to the object at fff00000c5a0ed80
[   19.535431]  which belongs to the cache kmalloc-16 of size 16
[   19.535489] The buggy address is located 8 bytes inside of
[   19.535489]  allocated 9-byte region [fff00000c5a0ed80, fff00000c5a0ed89)
[   19.535551] 
[   19.535573] The buggy address belongs to the physical page:
[   19.535605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a0e
[   19.535657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.535707] page_type: f5(slab)
[   19.535745] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.535798] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.535842] page dumped because: kasan: bad access detected
[   19.535876] 
[   19.535895] Memory state around the buggy address:
[   19.535928]  fff00000c5a0ec80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   19.535973]  fff00000c5a0ed00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   19.536017] >fff00000c5a0ed80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536088]  fff00000c5a0ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536226]  fff00000c5a0ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536426] ==================================================================

[   13.204368] ==================================================================
[   13.204716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.204969] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.205287] 
[   13.205494] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.205540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.205573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.205594] Call Trace:
[   13.205605]  <TASK>
[   13.205620]  dump_stack_lvl+0x73/0xb0
[   13.205645]  print_report+0xd1/0x610
[   13.205700]  ? __virt_addr_valid+0x1db/0x2d0
[   13.205724]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.205767]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.205789]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.205811]  kasan_report+0x141/0x180
[   13.205834]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.205860]  kasan_check_range+0x10c/0x1c0
[   13.205880]  __kasan_check_write+0x18/0x20
[   13.205900]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.205939]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.205961]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.205980]  ? trace_hardirqs_on+0x37/0xe0
[   13.206003]  ? kasan_bitops_generic+0x92/0x1c0
[   13.206026]  kasan_bitops_generic+0x116/0x1c0
[   13.206046]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.206067]  ? __pfx_read_tsc+0x10/0x10
[   13.206087]  ? ktime_get_ts64+0x86/0x230
[   13.206112]  kunit_try_run_case+0x1a5/0x480
[   13.206132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.206152]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.206172]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.206197]  ? __kthread_parkme+0x82/0x180
[   13.206218]  ? preempt_count_sub+0x50/0x80
[   13.206276]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.206299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.206324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.206347]  kthread+0x337/0x6f0
[   13.206373]  ? trace_preempt_on+0x20/0xc0
[   13.206395]  ? __pfx_kthread+0x10/0x10
[   13.206412]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.206434]  ? calculate_sigpending+0x7b/0xa0
[   13.206454]  ? __pfx_kthread+0x10/0x10
[   13.206491]  ret_from_fork+0x41/0x80
[   13.206511]  ? __pfx_kthread+0x10/0x10
[   13.206529]  ret_from_fork_asm+0x1a/0x30
[   13.206559]  </TASK>
[   13.206570] 
[   13.215493] Allocated by task 281:
[   13.215695]  kasan_save_stack+0x45/0x70
[   13.215871]  kasan_save_track+0x18/0x40
[   13.216023]  kasan_save_alloc_info+0x3b/0x50
[   13.216163]  __kasan_kmalloc+0xb7/0xc0
[   13.216301]  __kmalloc_cache_noprof+0x189/0x420
[   13.216868]  kasan_bitops_generic+0x92/0x1c0
[   13.217124]  kunit_try_run_case+0x1a5/0x480
[   13.217337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.217610]  kthread+0x337/0x6f0
[   13.217820]  ret_from_fork+0x41/0x80
[   13.218031]  ret_from_fork_asm+0x1a/0x30
[   13.218246] 
[   13.218339] The buggy address belongs to the object at ffff888102219660
[   13.218339]  which belongs to the cache kmalloc-16 of size 16
[   13.218847] The buggy address is located 8 bytes inside of
[   13.218847]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.219352] 
[   13.219424] The buggy address belongs to the physical page:
[   13.219587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.219814] flags: 0x200000000000000(node=0|zone=2)
[   13.220230] page_type: f5(slab)
[   13.220484] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.221145] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.221609] page dumped because: kasan: bad access detected
[   13.221894] 
[   13.221990] Memory state around the buggy address:
[   13.222221]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.222604]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.223082] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.223394]                                                           ^
[   13.223677]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.223930]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.224136] ==================================================================
[   13.266465] ==================================================================
[   13.267172] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.267610] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.268036] 
[   13.268143] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.268186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.268197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.268218] Call Trace:
[   13.268247]  <TASK>
[   13.268263]  dump_stack_lvl+0x73/0xb0
[   13.268309]  print_report+0xd1/0x610
[   13.268331]  ? __virt_addr_valid+0x1db/0x2d0
[   13.268375]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.268396]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.268419]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.268456]  kasan_report+0x141/0x180
[   13.268479]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.268520]  kasan_check_range+0x10c/0x1c0
[   13.268540]  __kasan_check_write+0x18/0x20
[   13.268572]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.268607]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.268643]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.268678]  ? trace_hardirqs_on+0x37/0xe0
[   13.268700]  ? kasan_bitops_generic+0x92/0x1c0
[   13.268723]  kasan_bitops_generic+0x116/0x1c0
[   13.268744]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.268765]  ? __pfx_read_tsc+0x10/0x10
[   13.268783]  ? ktime_get_ts64+0x86/0x230
[   13.268807]  kunit_try_run_case+0x1a5/0x480
[   13.268884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.268904]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.268930]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.268955]  ? __kthread_parkme+0x82/0x180
[   13.268976]  ? preempt_count_sub+0x50/0x80
[   13.269022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.269044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.269067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.269090]  kthread+0x337/0x6f0
[   13.269107]  ? trace_preempt_on+0x20/0xc0
[   13.269129]  ? __pfx_kthread+0x10/0x10
[   13.269146]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.269168]  ? calculate_sigpending+0x7b/0xa0
[   13.269206]  ? __pfx_kthread+0x10/0x10
[   13.269238]  ret_from_fork+0x41/0x80
[   13.269259]  ? __pfx_kthread+0x10/0x10
[   13.269277]  ret_from_fork_asm+0x1a/0x30
[   13.269308]  </TASK>
[   13.269318] 
[   13.278125] Allocated by task 281:
[   13.278268]  kasan_save_stack+0x45/0x70
[   13.278411]  kasan_save_track+0x18/0x40
[   13.278548]  kasan_save_alloc_info+0x3b/0x50
[   13.278693]  __kasan_kmalloc+0xb7/0xc0
[   13.278825]  __kmalloc_cache_noprof+0x189/0x420
[   13.278975]  kasan_bitops_generic+0x92/0x1c0
[   13.279522]  kunit_try_run_case+0x1a5/0x480
[   13.279762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.280032]  kthread+0x337/0x6f0
[   13.280218]  ret_from_fork+0x41/0x80
[   13.280501]  ret_from_fork_asm+0x1a/0x30
[   13.280733] 
[   13.280858] The buggy address belongs to the object at ffff888102219660
[   13.280858]  which belongs to the cache kmalloc-16 of size 16
[   13.281451] The buggy address is located 8 bytes inside of
[   13.281451]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.282217] 
[   13.282349] The buggy address belongs to the physical page:
[   13.282597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.283061] flags: 0x200000000000000(node=0|zone=2)
[   13.283220] page_type: f5(slab)
[   13.283350] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.283685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.284044] page dumped because: kasan: bad access detected
[   13.284469] 
[   13.284593] Memory state around the buggy address:
[   13.284931]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.285578]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.285988] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.286243]                                                           ^
[   13.286447]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.286817]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.287163] ==================================================================
[   13.287806] ==================================================================
[   13.288181] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.288638] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.288928] 
[   13.289013] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.289056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.289067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.289087] Call Trace:
[   13.289100]  <TASK>
[   13.289114]  dump_stack_lvl+0x73/0xb0
[   13.289138]  print_report+0xd1/0x610
[   13.289160]  ? __virt_addr_valid+0x1db/0x2d0
[   13.289205]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.289237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.289259]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.289282]  kasan_report+0x141/0x180
[   13.289305]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.289331]  kasan_check_range+0x10c/0x1c0
[   13.289351]  __kasan_check_write+0x18/0x20
[   13.289370]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.289392]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.289414]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.289434]  ? trace_hardirqs_on+0x37/0xe0
[   13.289456]  ? kasan_bitops_generic+0x92/0x1c0
[   13.289480]  kasan_bitops_generic+0x116/0x1c0
[   13.289500]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.289520]  ? __pfx_read_tsc+0x10/0x10
[   13.289540]  ? ktime_get_ts64+0x86/0x230
[   13.289564]  kunit_try_run_case+0x1a5/0x480
[   13.289585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.289603]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.289623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.289647]  ? __kthread_parkme+0x82/0x180
[   13.289668]  ? preempt_count_sub+0x50/0x80
[   13.289693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.289714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.289738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.289761]  kthread+0x337/0x6f0
[   13.289777]  ? trace_preempt_on+0x20/0xc0
[   13.289800]  ? __pfx_kthread+0x10/0x10
[   13.289818]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.289840]  ? calculate_sigpending+0x7b/0xa0
[   13.289861]  ? __pfx_kthread+0x10/0x10
[   13.289879]  ret_from_fork+0x41/0x80
[   13.289899]  ? __pfx_kthread+0x10/0x10
[   13.289982]  ret_from_fork_asm+0x1a/0x30
[   13.290014]  </TASK>
[   13.290025] 
[   13.299250] Allocated by task 281:
[   13.299408]  kasan_save_stack+0x45/0x70
[   13.299618]  kasan_save_track+0x18/0x40
[   13.299751]  kasan_save_alloc_info+0x3b/0x50
[   13.299890]  __kasan_kmalloc+0xb7/0xc0
[   13.300017]  __kmalloc_cache_noprof+0x189/0x420
[   13.300162]  kasan_bitops_generic+0x92/0x1c0
[   13.301498]  kunit_try_run_case+0x1a5/0x480
[   13.301941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.302130]  kthread+0x337/0x6f0
[   13.302262]  ret_from_fork+0x41/0x80
[   13.302815]  ret_from_fork_asm+0x1a/0x30
[   13.303529] 
[   13.303838] The buggy address belongs to the object at ffff888102219660
[   13.303838]  which belongs to the cache kmalloc-16 of size 16
[   13.305878] The buggy address is located 8 bytes inside of
[   13.305878]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.306267] 
[   13.306351] The buggy address belongs to the physical page:
[   13.306525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.307122] flags: 0x200000000000000(node=0|zone=2)
[   13.307395] page_type: f5(slab)
[   13.307664] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.308122] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.308437] page dumped because: kasan: bad access detected
[   13.308989] 
[   13.309095] Memory state around the buggy address:
[   13.309333]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.309706]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.310036] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.310377]                                                           ^
[   13.310682]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.311250]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.311592] ==================================================================
[   13.245111] ==================================================================
[   13.245551] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.245909] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.246235] 
[   13.246337] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.246378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.246389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.246409] Call Trace:
[   13.246422]  <TASK>
[   13.246435]  dump_stack_lvl+0x73/0xb0
[   13.246459]  print_report+0xd1/0x610
[   13.246480]  ? __virt_addr_valid+0x1db/0x2d0
[   13.246501]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.246522]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.246544]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.246565]  kasan_report+0x141/0x180
[   13.246587]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.246613]  kasan_check_range+0x10c/0x1c0
[   13.246633]  __kasan_check_write+0x18/0x20
[   13.246652]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.246674]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.246696]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.246716]  ? trace_hardirqs_on+0x37/0xe0
[   13.246738]  ? kasan_bitops_generic+0x92/0x1c0
[   13.246761]  kasan_bitops_generic+0x116/0x1c0
[   13.246781]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.246801]  ? __pfx_read_tsc+0x10/0x10
[   13.246820]  ? ktime_get_ts64+0x86/0x230
[   13.246844]  kunit_try_run_case+0x1a5/0x480
[   13.246864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.246882]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.246902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.246925]  ? __kthread_parkme+0x82/0x180
[   13.246945]  ? preempt_count_sub+0x50/0x80
[   13.246971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.246991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.247014]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.247036]  kthread+0x337/0x6f0
[   13.247052]  ? trace_preempt_on+0x20/0xc0
[   13.247074]  ? __pfx_kthread+0x10/0x10
[   13.247091]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.247112]  ? calculate_sigpending+0x7b/0xa0
[   13.247132]  ? __pfx_kthread+0x10/0x10
[   13.247151]  ret_from_fork+0x41/0x80
[   13.247170]  ? __pfx_kthread+0x10/0x10
[   13.247187]  ret_from_fork_asm+0x1a/0x30
[   13.247217]  </TASK>
[   13.247235] 
[   13.256568] Allocated by task 281:
[   13.256811]  kasan_save_stack+0x45/0x70
[   13.256963]  kasan_save_track+0x18/0x40
[   13.257148]  kasan_save_alloc_info+0x3b/0x50
[   13.257399]  __kasan_kmalloc+0xb7/0xc0
[   13.257589]  __kmalloc_cache_noprof+0x189/0x420
[   13.257977]  kasan_bitops_generic+0x92/0x1c0
[   13.258215]  kunit_try_run_case+0x1a5/0x480
[   13.258382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.258647]  kthread+0x337/0x6f0
[   13.258804]  ret_from_fork+0x41/0x80
[   13.258981]  ret_from_fork_asm+0x1a/0x30
[   13.259208] 
[   13.259306] The buggy address belongs to the object at ffff888102219660
[   13.259306]  which belongs to the cache kmalloc-16 of size 16
[   13.260250] The buggy address is located 8 bytes inside of
[   13.260250]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.260887] 
[   13.260964] The buggy address belongs to the physical page:
[   13.261134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.261642] flags: 0x200000000000000(node=0|zone=2)
[   13.261927] page_type: f5(slab)
[   13.262105] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.262460] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.262832] page dumped because: kasan: bad access detected
[   13.263044] 
[   13.263110] Memory state around the buggy address:
[   13.263281]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.263964]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.264313] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.264624]                                                           ^
[   13.264911]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.265493]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.265966] ==================================================================
[   13.345399] ==================================================================
[   13.345970] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.346742] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.347288] 
[   13.347410] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.347470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.347481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.347502] Call Trace:
[   13.347521]  <TASK>
[   13.347538]  dump_stack_lvl+0x73/0xb0
[   13.347564]  print_report+0xd1/0x610
[   13.347586]  ? __virt_addr_valid+0x1db/0x2d0
[   13.347617]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.347638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.347659]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.347681]  kasan_report+0x141/0x180
[   13.347714]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.347740]  kasan_check_range+0x10c/0x1c0
[   13.347760]  __kasan_check_write+0x18/0x20
[   13.347780]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.347801]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.347824]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.347844]  ? trace_hardirqs_on+0x37/0xe0
[   13.347866]  ? kasan_bitops_generic+0x92/0x1c0
[   13.347890]  kasan_bitops_generic+0x116/0x1c0
[   13.347909]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.347930]  ? __pfx_read_tsc+0x10/0x10
[   13.347950]  ? ktime_get_ts64+0x86/0x230
[   13.347975]  kunit_try_run_case+0x1a5/0x480
[   13.347996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.348014]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.348035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.348058]  ? __kthread_parkme+0x82/0x180
[   13.348080]  ? preempt_count_sub+0x50/0x80
[   13.348107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.348128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.348150]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.348173]  kthread+0x337/0x6f0
[   13.348190]  ? trace_preempt_on+0x20/0xc0
[   13.348211]  ? __pfx_kthread+0x10/0x10
[   13.348240]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.348262]  ? calculate_sigpending+0x7b/0xa0
[   13.348284]  ? __pfx_kthread+0x10/0x10
[   13.348302]  ret_from_fork+0x41/0x80
[   13.348322]  ? __pfx_kthread+0x10/0x10
[   13.348340]  ret_from_fork_asm+0x1a/0x30
[   13.348375]  </TASK>
[   13.348386] 
[   13.362940] Allocated by task 281:
[   13.363086]  kasan_save_stack+0x45/0x70
[   13.363252]  kasan_save_track+0x18/0x40
[   13.363418]  kasan_save_alloc_info+0x3b/0x50
[   13.363573]  __kasan_kmalloc+0xb7/0xc0
[   13.363705]  __kmalloc_cache_noprof+0x189/0x420
[   13.364055]  kasan_bitops_generic+0x92/0x1c0
[   13.364273]  kunit_try_run_case+0x1a5/0x480
[   13.364430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.364674]  kthread+0x337/0x6f0
[   13.364843]  ret_from_fork+0x41/0x80
[   13.365029]  ret_from_fork_asm+0x1a/0x30
[   13.365168] 
[   13.365249] The buggy address belongs to the object at ffff888102219660
[   13.365249]  which belongs to the cache kmalloc-16 of size 16
[   13.365768] The buggy address is located 8 bytes inside of
[   13.365768]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.366333] 
[   13.366446] The buggy address belongs to the physical page:
[   13.366905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.367258] flags: 0x200000000000000(node=0|zone=2)
[   13.367516] page_type: f5(slab)
[   13.367737] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.368028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.368331] page dumped because: kasan: bad access detected
[   13.368500] 
[   13.368568] Memory state around the buggy address:
[   13.368759]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.369205]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.369502] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.369713]                                                           ^
[   13.370402]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.370691]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.371018] ==================================================================
[   13.224803] ==================================================================
[   13.225424] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.225948] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.226213] 
[   13.226304] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.226344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.226355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.226375] Call Trace:
[   13.226391]  <TASK>
[   13.226404]  dump_stack_lvl+0x73/0xb0
[   13.226428]  print_report+0xd1/0x610
[   13.226451]  ? __virt_addr_valid+0x1db/0x2d0
[   13.226471]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.226492]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.226515]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.226538]  kasan_report+0x141/0x180
[   13.226564]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.226593]  kasan_check_range+0x10c/0x1c0
[   13.226613]  __kasan_check_write+0x18/0x20
[   13.226633]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.226655]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.226678]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.226698]  ? trace_hardirqs_on+0x37/0xe0
[   13.226720]  ? kasan_bitops_generic+0x92/0x1c0
[   13.226743]  kasan_bitops_generic+0x116/0x1c0
[   13.226763]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.226785]  ? __pfx_read_tsc+0x10/0x10
[   13.226806]  ? ktime_get_ts64+0x86/0x230
[   13.226829]  kunit_try_run_case+0x1a5/0x480
[   13.226850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.226868]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.226888]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.226913]  ? __kthread_parkme+0x82/0x180
[   13.226935]  ? preempt_count_sub+0x50/0x80
[   13.226961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.226982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.227006]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.227028]  kthread+0x337/0x6f0
[   13.227045]  ? trace_preempt_on+0x20/0xc0
[   13.227067]  ? __pfx_kthread+0x10/0x10
[   13.227084]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.227106]  ? calculate_sigpending+0x7b/0xa0
[   13.227127]  ? __pfx_kthread+0x10/0x10
[   13.227145]  ret_from_fork+0x41/0x80
[   13.227165]  ? __pfx_kthread+0x10/0x10
[   13.227183]  ret_from_fork_asm+0x1a/0x30
[   13.227213]  </TASK>
[   13.227233] 
[   13.235859] Allocated by task 281:
[   13.236119]  kasan_save_stack+0x45/0x70
[   13.236360]  kasan_save_track+0x18/0x40
[   13.236558]  kasan_save_alloc_info+0x3b/0x50
[   13.236759]  __kasan_kmalloc+0xb7/0xc0
[   13.236956]  __kmalloc_cache_noprof+0x189/0x420
[   13.237127]  kasan_bitops_generic+0x92/0x1c0
[   13.237368]  kunit_try_run_case+0x1a5/0x480
[   13.237701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.238165]  kthread+0x337/0x6f0
[   13.238431]  ret_from_fork+0x41/0x80
[   13.238627]  ret_from_fork_asm+0x1a/0x30
[   13.238859] 
[   13.238978] The buggy address belongs to the object at ffff888102219660
[   13.238978]  which belongs to the cache kmalloc-16 of size 16
[   13.239474] The buggy address is located 8 bytes inside of
[   13.239474]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.240025] 
[   13.240132] The buggy address belongs to the physical page:
[   13.240376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.240809] flags: 0x200000000000000(node=0|zone=2)
[   13.240990] page_type: f5(slab)
[   13.241157] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.241531] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.241895] page dumped because: kasan: bad access detected
[   13.242100] 
[   13.242192] Memory state around the buggy address:
[   13.242454]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.242906]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.243183] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.243596]                                                           ^
[   13.243873]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.244215]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.244584] ==================================================================
[   13.182604] ==================================================================
[   13.183195] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.183618] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.183999] 
[   13.184120] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.184193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.184205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.184254] Call Trace:
[   13.184266]  <TASK>
[   13.184281]  dump_stack_lvl+0x73/0xb0
[   13.184306]  print_report+0xd1/0x610
[   13.184328]  ? __virt_addr_valid+0x1db/0x2d0
[   13.184349]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.184383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.184406]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.184429]  kasan_report+0x141/0x180
[   13.184451]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.184477]  kasan_check_range+0x10c/0x1c0
[   13.184497]  __kasan_check_write+0x18/0x20
[   13.184516]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.184539]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.184561]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.184582]  ? trace_hardirqs_on+0x37/0xe0
[   13.184603]  ? kasan_bitops_generic+0x92/0x1c0
[   13.184628]  kasan_bitops_generic+0x116/0x1c0
[   13.184648]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.184669]  ? __pfx_read_tsc+0x10/0x10
[   13.184689]  ? ktime_get_ts64+0x86/0x230
[   13.184714]  kunit_try_run_case+0x1a5/0x480
[   13.184734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.184753]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.184773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.184797]  ? __kthread_parkme+0x82/0x180
[   13.184818]  ? preempt_count_sub+0x50/0x80
[   13.184842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.184862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.184885]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.184908]  kthread+0x337/0x6f0
[   13.184988]  ? trace_preempt_on+0x20/0xc0
[   13.185016]  ? __pfx_kthread+0x10/0x10
[   13.185034]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.185056]  ? calculate_sigpending+0x7b/0xa0
[   13.185078]  ? __pfx_kthread+0x10/0x10
[   13.185096]  ret_from_fork+0x41/0x80
[   13.185117]  ? __pfx_kthread+0x10/0x10
[   13.185154]  ret_from_fork_asm+0x1a/0x30
[   13.185186]  </TASK>
[   13.185196] 
[   13.194932] Allocated by task 281:
[   13.195137]  kasan_save_stack+0x45/0x70
[   13.195372]  kasan_save_track+0x18/0x40
[   13.195614]  kasan_save_alloc_info+0x3b/0x50
[   13.195887]  __kasan_kmalloc+0xb7/0xc0
[   13.196098]  __kmalloc_cache_noprof+0x189/0x420
[   13.196268]  kasan_bitops_generic+0x92/0x1c0
[   13.196565]  kunit_try_run_case+0x1a5/0x480
[   13.196830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.197095]  kthread+0x337/0x6f0
[   13.197273]  ret_from_fork+0x41/0x80
[   13.197502]  ret_from_fork_asm+0x1a/0x30
[   13.197641] 
[   13.197742] The buggy address belongs to the object at ffff888102219660
[   13.197742]  which belongs to the cache kmalloc-16 of size 16
[   13.198257] The buggy address is located 8 bytes inside of
[   13.198257]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.198802] 
[   13.198894] The buggy address belongs to the physical page:
[   13.199140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.199600] flags: 0x200000000000000(node=0|zone=2)
[   13.200120] page_type: f5(slab)
[   13.200293] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.200601] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.200819] page dumped because: kasan: bad access detected
[   13.200987] 
[   13.201053] Memory state around the buggy address:
[   13.201202]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.201739]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.202090] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.202476]                                                           ^
[   13.202932]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.203406]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.203651] ==================================================================
[   13.312197] ==================================================================
[   13.312599] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.313143] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281
[   13.313436] 
[   13.313553] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.313595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.313607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.313626] Call Trace:
[   13.313643]  <TASK>
[   13.313657]  dump_stack_lvl+0x73/0xb0
[   13.313682]  print_report+0xd1/0x610
[   13.313704]  ? __virt_addr_valid+0x1db/0x2d0
[   13.313724]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.313745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.313767]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.313789]  kasan_report+0x141/0x180
[   13.313810]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.313839]  kasan_check_range+0x10c/0x1c0
[   13.313900]  __kasan_check_write+0x18/0x20
[   13.313920]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.313953]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.313977]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.313996]  ? trace_hardirqs_on+0x37/0xe0
[   13.314018]  ? kasan_bitops_generic+0x92/0x1c0
[   13.314041]  kasan_bitops_generic+0x116/0x1c0
[   13.314061]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.314082]  ? __pfx_read_tsc+0x10/0x10
[   13.314102]  ? ktime_get_ts64+0x86/0x230
[   13.314127]  kunit_try_run_case+0x1a5/0x480
[   13.314147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.314166]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.314188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.314211]  ? __kthread_parkme+0x82/0x180
[   13.314241]  ? preempt_count_sub+0x50/0x80
[   13.314267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.314289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.314312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.314335]  kthread+0x337/0x6f0
[   13.314352]  ? trace_preempt_on+0x20/0xc0
[   13.314374]  ? __pfx_kthread+0x10/0x10
[   13.314395]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.314447]  ? calculate_sigpending+0x7b/0xa0
[   13.314468]  ? __pfx_kthread+0x10/0x10
[   13.314497]  ret_from_fork+0x41/0x80
[   13.314518]  ? __pfx_kthread+0x10/0x10
[   13.314536]  ret_from_fork_asm+0x1a/0x30
[   13.314567]  </TASK>
[   13.314577] 
[   13.330610] Allocated by task 281:
[   13.331017]  kasan_save_stack+0x45/0x70
[   13.331354]  kasan_save_track+0x18/0x40
[   13.331504]  kasan_save_alloc_info+0x3b/0x50
[   13.331816]  __kasan_kmalloc+0xb7/0xc0
[   13.332274]  __kmalloc_cache_noprof+0x189/0x420
[   13.332800]  kasan_bitops_generic+0x92/0x1c0
[   13.333354]  kunit_try_run_case+0x1a5/0x480
[   13.333512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.333791]  kthread+0x337/0x6f0
[   13.334114]  ret_from_fork+0x41/0x80
[   13.334538]  ret_from_fork_asm+0x1a/0x30
[   13.334965] 
[   13.335136] The buggy address belongs to the object at ffff888102219660
[   13.335136]  which belongs to the cache kmalloc-16 of size 16
[   13.336298] The buggy address is located 8 bytes inside of
[   13.336298]  allocated 9-byte region [ffff888102219660, ffff888102219669)
[   13.337015] 
[   13.337182] The buggy address belongs to the physical page:
[   13.337891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219
[   13.338215] flags: 0x200000000000000(node=0|zone=2)
[   13.338449] page_type: f5(slab)
[   13.338836] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.339530] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.340234] page dumped because: kasan: bad access detected
[   13.340808] 
[   13.340898] Memory state around the buggy address:
[   13.341097]  ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc
[   13.341821]  ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.342332] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.342672]                                                           ^
[   13.343360]  ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.344117]  ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.344653] ==================================================================