Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x86

[   45.867623] ==================================================================
[   45.874843] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   45.883025] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   45.890416] 
[   45.891917] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   45.891925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.891927] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   45.891930] Call Trace:
[   45.891931]  <TASK>
[   45.891933]  dump_stack_lvl+0x73/0xb0
[   45.891937]  print_report+0xd1/0x650
[   45.891941]  ? __virt_addr_valid+0x1db/0x2d0
[   45.891944]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   45.891949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.891953]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   45.891959]  kasan_report+0x141/0x180
[   45.891963]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   45.891969]  kasan_check_range+0x10c/0x1c0
[   45.891973]  __kasan_check_write+0x18/0x20
[   45.891977]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   45.891982]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   45.891987]  ? __kmalloc_cache_noprof+0x189/0x420
[   45.891991]  ? trace_hardirqs_on+0x37/0xe0
[   45.891995]  ? kasan_bitops_generic+0x92/0x1c0
[   45.891999]  kasan_bitops_generic+0x116/0x1c0
[   45.892003]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   45.892006]  ? ktime_get_ts64+0x83/0x230
[   45.892011]  kunit_try_run_case+0x1a2/0x480
[   45.892016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.892020]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   45.892024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   45.892029]  ? __kthread_parkme+0x82/0x180
[   45.892033]  ? preempt_count_sub+0x50/0x80
[   45.892037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.892042]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.892046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.892049]  kthread+0x334/0x6f0
[   45.892053]  ? trace_preempt_on+0x20/0xc0
[   45.892058]  ? __pfx_kthread+0x10/0x10
[   45.892062]  ? _raw_spin_unlock_irq+0x47/0x80
[   45.892066]  ? calculate_sigpending+0x7b/0xa0
[   45.892070]  ? __pfx_kthread+0x10/0x10
[   45.892074]  ret_from_fork+0x3e/0x80
[   45.892078]  ? __pfx_kthread+0x10/0x10
[   45.892082]  ret_from_fork_asm+0x1a/0x30
[   45.892087]  </TASK>
[   45.892089] 
[   46.083040] Allocated by task 304:
[   46.086447]  kasan_save_stack+0x45/0x70
[   46.090286]  kasan_save_track+0x18/0x40
[   46.094126]  kasan_save_alloc_info+0x3b/0x50
[   46.098398]  __kasan_kmalloc+0xb7/0xc0
[   46.102151]  __kmalloc_cache_noprof+0x189/0x420
[   46.106708]  kasan_bitops_generic+0x92/0x1c0
[   46.111007]  kunit_try_run_case+0x1a2/0x480
[   46.115193]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.120592]  kthread+0x334/0x6f0
[   46.123825]  ret_from_fork+0x3e/0x80
[   46.127405]  ret_from_fork_asm+0x1a/0x30
[   46.131339] 
[   46.132838] The buggy address belongs to the object at ffff888104ed9160
[   46.132838]  which belongs to the cache kmalloc-16 of size 16
[   46.145171] The buggy address is located 8 bytes inside of
[   46.145171]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   46.157424] 
[   46.158922] The buggy address belongs to the physical page:
[   46.164497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   46.172504] flags: 0x200000000000000(node=0|zone=2)
[   46.177382] page_type: f5(slab)
[   46.180529] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   46.188276] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.196016] page dumped because: kasan: bad access detected
[   46.201588] 
[   46.203086] Memory state around the buggy address:
[   46.207881]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   46.215108]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   46.222326] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   46.229544]                                                           ^
[   46.236158]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.243375]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.250596] ==================================================================
[   46.257821] ==================================================================
[   46.265052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.273232] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   46.280623] 
[   46.282125] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   46.282132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.282134] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   46.282138] Call Trace:
[   46.282139]  <TASK>
[   46.282141]  dump_stack_lvl+0x73/0xb0
[   46.282144]  print_report+0xd1/0x650
[   46.282148]  ? __virt_addr_valid+0x1db/0x2d0
[   46.282152]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.282157]  ? kasan_complete_mode_report_info+0x2a/0x200
[   46.282161]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.282166]  kasan_report+0x141/0x180
[   46.282170]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.282176]  kasan_check_range+0x10c/0x1c0
[   46.282181]  __kasan_check_write+0x18/0x20
[   46.282185]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   46.282190]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   46.282195]  ? __kmalloc_cache_noprof+0x189/0x420
[   46.282198]  ? trace_hardirqs_on+0x37/0xe0
[   46.282202]  ? kasan_bitops_generic+0x92/0x1c0
[   46.282206]  kasan_bitops_generic+0x116/0x1c0
[   46.282210]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   46.282214]  ? ktime_get_ts64+0x83/0x230
[   46.282218]  kunit_try_run_case+0x1a2/0x480
[   46.282222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.282226]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   46.282231]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   46.282235]  ? __kthread_parkme+0x82/0x180
[   46.282239]  ? preempt_count_sub+0x50/0x80
[   46.282244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   46.282248]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.282252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   46.282256]  kthread+0x334/0x6f0
[   46.282260]  ? trace_preempt_on+0x20/0xc0
[   46.282264]  ? __pfx_kthread+0x10/0x10
[   46.282268]  ? _raw_spin_unlock_irq+0x47/0x80
[   46.282272]  ? calculate_sigpending+0x7b/0xa0
[   46.282276]  ? __pfx_kthread+0x10/0x10
[   46.282280]  ret_from_fork+0x3e/0x80
[   46.282284]  ? __pfx_kthread+0x10/0x10
[   46.282288]  ret_from_fork_asm+0x1a/0x30
[   46.282294]  </TASK>
[   46.282295] 
[   46.473222] Allocated by task 304:
[   46.476627]  kasan_save_stack+0x45/0x70
[   46.480467]  kasan_save_track+0x18/0x40
[   46.484306]  kasan_save_alloc_info+0x3b/0x50
[   46.488581]  __kasan_kmalloc+0xb7/0xc0
[   46.492340]  __kmalloc_cache_noprof+0x189/0x420
[   46.496872]  kasan_bitops_generic+0x92/0x1c0
[   46.501146]  kunit_try_run_case+0x1a2/0x480
[   46.505332]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   46.510744]  kthread+0x334/0x6f0
[   46.513982]  ret_from_fork+0x3e/0x80
[   46.517567]  ret_from_fork_asm+0x1a/0x30
[   46.521494] 
[   46.522995] The buggy address belongs to the object at ffff888104ed9160
[   46.522995]  which belongs to the cache kmalloc-16 of size 16
[   46.535333] The buggy address is located 8 bytes inside of
[   46.535333]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   46.547587] 
[   46.549089] The buggy address belongs to the physical page:
[   46.554659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   46.562702] flags: 0x200000000000000(node=0|zone=2)
[   46.567635] page_type: f5(slab)
[   46.570781] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   46.578528] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   46.586266] page dumped because: kasan: bad access detected
[   46.591837] 
[   46.593330] Memory state around the buggy address:
[   46.598121]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   46.605340]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   46.612561] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   46.619777]                                                           ^
[   46.626389]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.633609]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.640827] ==================================================================
[   44.696726] ==================================================================
[   44.703980] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.712160] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   44.719552] 
[   44.721051] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   44.721059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.721061] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   44.721064] Call Trace:
[   44.721065]  <TASK>
[   44.721067]  dump_stack_lvl+0x73/0xb0
[   44.721070]  print_report+0xd1/0x650
[   44.721075]  ? __virt_addr_valid+0x1db/0x2d0
[   44.721078]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.721083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.721088]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.721092]  kasan_report+0x141/0x180
[   44.721097]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.721103]  kasan_check_range+0x10c/0x1c0
[   44.721107]  __kasan_check_write+0x18/0x20
[   44.721111]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   44.721116]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   44.721121]  ? __kmalloc_cache_noprof+0x189/0x420
[   44.721125]  ? trace_hardirqs_on+0x37/0xe0
[   44.721129]  ? kasan_bitops_generic+0x92/0x1c0
[   44.721133]  kasan_bitops_generic+0x116/0x1c0
[   44.721136]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   44.721140]  ? ktime_get_ts64+0x83/0x230
[   44.721145]  kunit_try_run_case+0x1a2/0x480
[   44.721149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.721153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   44.721158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   44.721162]  ? __kthread_parkme+0x82/0x180
[   44.721166]  ? preempt_count_sub+0x50/0x80
[   44.721171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.721175]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.721179]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.721183]  kthread+0x334/0x6f0
[   44.721187]  ? trace_preempt_on+0x20/0xc0
[   44.721191]  ? __pfx_kthread+0x10/0x10
[   44.721195]  ? _raw_spin_unlock_irq+0x47/0x80
[   44.721200]  ? calculate_sigpending+0x7b/0xa0
[   44.721203]  ? __pfx_kthread+0x10/0x10
[   44.721208]  ret_from_fork+0x3e/0x80
[   44.721212]  ? __pfx_kthread+0x10/0x10
[   44.721216]  ret_from_fork_asm+0x1a/0x30
[   44.721222]  </TASK>
[   44.721223] 
[   44.912135] Allocated by task 304:
[   44.915539]  kasan_save_stack+0x45/0x70
[   44.919378]  kasan_save_track+0x18/0x40
[   44.923217]  kasan_save_alloc_info+0x3b/0x50
[   44.927490]  __kasan_kmalloc+0xb7/0xc0
[   44.931243]  __kmalloc_cache_noprof+0x189/0x420
[   44.935777]  kasan_bitops_generic+0x92/0x1c0
[   44.940048]  kunit_try_run_case+0x1a2/0x480
[   44.944232]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.949632]  kthread+0x334/0x6f0
[   44.952865]  ret_from_fork+0x3e/0x80
[   44.956443]  ret_from_fork_asm+0x1a/0x30
[   44.960370] 
[   44.961870] The buggy address belongs to the object at ffff888104ed9160
[   44.961870]  which belongs to the cache kmalloc-16 of size 16
[   44.974211] The buggy address is located 8 bytes inside of
[   44.974211]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   44.986466] 
[   44.987963] The buggy address belongs to the physical page:
[   44.993537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   45.001544] flags: 0x200000000000000(node=0|zone=2)
[   45.006421] page_type: f5(slab)
[   45.009570] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   45.017316] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.025054] page dumped because: kasan: bad access detected
[   45.030627] 
[   45.032125] Memory state around the buggy address:
[   45.036919]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   45.044139]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   45.051358] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.058577]                                                           ^
[   45.065187]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.072407]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.079625] ==================================================================
[   43.916228] ==================================================================
[   43.923462] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   43.931640] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   43.939035] 
[   43.940535] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   43.940542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.940544] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   43.940548] Call Trace:
[   43.940549]  <TASK>
[   43.940551]  dump_stack_lvl+0x73/0xb0
[   43.940555]  print_report+0xd1/0x650
[   43.940559]  ? __virt_addr_valid+0x1db/0x2d0
[   43.940562]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   43.940567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   43.940571]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   43.940576]  kasan_report+0x141/0x180
[   43.940581]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   43.940587]  kasan_check_range+0x10c/0x1c0
[   43.940591]  __kasan_check_write+0x18/0x20
[   43.940595]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   43.940600]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   43.940605]  ? __kmalloc_cache_noprof+0x189/0x420
[   43.940609]  ? trace_hardirqs_on+0x37/0xe0
[   43.940613]  ? kasan_bitops_generic+0x92/0x1c0
[   43.940617]  kasan_bitops_generic+0x116/0x1c0
[   43.940621]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   43.940624]  ? ktime_get_ts64+0x83/0x230
[   43.940629]  kunit_try_run_case+0x1a2/0x480
[   43.940634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.940638]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   43.940642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   43.940647]  ? __kthread_parkme+0x82/0x180
[   43.940651]  ? preempt_count_sub+0x50/0x80
[   43.940655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.940660]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.940664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.940668]  kthread+0x334/0x6f0
[   43.940689]  ? trace_preempt_on+0x20/0xc0
[   43.940693]  ? __pfx_kthread+0x10/0x10
[   43.940698]  ? _raw_spin_unlock_irq+0x47/0x80
[   43.940702]  ? calculate_sigpending+0x7b/0xa0
[   43.940706]  ? __pfx_kthread+0x10/0x10
[   43.940723]  ret_from_fork+0x3e/0x80
[   43.940727]  ? __pfx_kthread+0x10/0x10
[   43.940731]  ret_from_fork_asm+0x1a/0x30
[   43.940737]  </TASK>
[   43.940738] 
[   44.131625] Allocated by task 304:
[   44.135030]  kasan_save_stack+0x45/0x70
[   44.138870]  kasan_save_track+0x18/0x40
[   44.142717]  kasan_save_alloc_info+0x3b/0x50
[   44.147015]  __kasan_kmalloc+0xb7/0xc0
[   44.150768]  __kmalloc_cache_noprof+0x189/0x420
[   44.155301]  kasan_bitops_generic+0x92/0x1c0
[   44.159571]  kunit_try_run_case+0x1a2/0x480
[   44.163760]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.169158]  kthread+0x334/0x6f0
[   44.172390]  ret_from_fork+0x3e/0x80
[   44.175970]  ret_from_fork_asm+0x1a/0x30
[   44.179896] 
[   44.181396] The buggy address belongs to the object at ffff888104ed9160
[   44.181396]  which belongs to the cache kmalloc-16 of size 16
[   44.193760] The buggy address is located 8 bytes inside of
[   44.193760]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   44.206017] 
[   44.207515] The buggy address belongs to the physical page:
[   44.213086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   44.221086] flags: 0x200000000000000(node=0|zone=2)
[   44.225966] page_type: f5(slab)
[   44.229111] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   44.236852] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.244598] page dumped because: kasan: bad access detected
[   44.250168] 
[   44.251660] Memory state around the buggy address:
[   44.256489]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   44.263751]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   44.270979] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   44.278204]                                                           ^
[   44.284816]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.292036]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.299254] ==================================================================
[   45.086850] ==================================================================
[   45.094116] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.102288] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   45.109702] 
[   45.111252] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   45.111259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.111261] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   45.111264] Call Trace:
[   45.111266]  <TASK>
[   45.111268]  dump_stack_lvl+0x73/0xb0
[   45.111271]  print_report+0xd1/0x650
[   45.111275]  ? __virt_addr_valid+0x1db/0x2d0
[   45.111278]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.111283]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.111288]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.111293]  kasan_report+0x141/0x180
[   45.111297]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.111303]  kasan_check_range+0x10c/0x1c0
[   45.111307]  __kasan_check_write+0x18/0x20
[   45.111311]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   45.111316]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   45.111321]  ? __kmalloc_cache_noprof+0x189/0x420
[   45.111325]  ? trace_hardirqs_on+0x37/0xe0
[   45.111329]  ? kasan_bitops_generic+0x92/0x1c0
[   45.111333]  kasan_bitops_generic+0x116/0x1c0
[   45.111337]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   45.111340]  ? ktime_get_ts64+0x83/0x230
[   45.111345]  kunit_try_run_case+0x1a2/0x480
[   45.111349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.111354]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   45.111358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   45.111363]  ? __kthread_parkme+0x82/0x180
[   45.111367]  ? preempt_count_sub+0x50/0x80
[   45.111371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.111375]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.111379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.111383]  kthread+0x334/0x6f0
[   45.111387]  ? trace_preempt_on+0x20/0xc0
[   45.111392]  ? __pfx_kthread+0x10/0x10
[   45.111396]  ? _raw_spin_unlock_irq+0x47/0x80
[   45.111400]  ? calculate_sigpending+0x7b/0xa0
[   45.111404]  ? __pfx_kthread+0x10/0x10
[   45.111408]  ret_from_fork+0x3e/0x80
[   45.111412]  ? __pfx_kthread+0x10/0x10
[   45.111416]  ret_from_fork_asm+0x1a/0x30
[   45.111422]  </TASK>
[   45.111424] 
[   45.302445] Allocated by task 304:
[   45.305851]  kasan_save_stack+0x45/0x70
[   45.309707]  kasan_save_track+0x18/0x40
[   45.313572]  kasan_save_alloc_info+0x3b/0x50
[   45.317846]  __kasan_kmalloc+0xb7/0xc0
[   45.321599]  __kmalloc_cache_noprof+0x189/0x420
[   45.326139]  kasan_bitops_generic+0x92/0x1c0
[   45.330410]  kunit_try_run_case+0x1a2/0x480
[   45.334598]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.339997]  kthread+0x334/0x6f0
[   45.343238]  ret_from_fork+0x3e/0x80
[   45.346815]  ret_from_fork_asm+0x1a/0x30
[   45.350765] 
[   45.352258] The buggy address belongs to the object at ffff888104ed9160
[   45.352258]  which belongs to the cache kmalloc-16 of size 16
[   45.364590] The buggy address is located 8 bytes inside of
[   45.364590]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   45.376846] 
[   45.378346] The buggy address belongs to the physical page:
[   45.383916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   45.391914] flags: 0x200000000000000(node=0|zone=2)
[   45.396795] page_type: f5(slab)
[   45.399943] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   45.407704] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.415487] page dumped because: kasan: bad access detected
[   45.421061] 
[   45.422559] Memory state around the buggy address:
[   45.427354]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   45.434580]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   45.441798] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.449016]                                                           ^
[   45.455630]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.462851]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.470077] ==================================================================
[   43.522098] ==================================================================
[   43.533157] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.541337] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   43.548732] 
[   43.550232] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   43.550240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.550242] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   43.550245] Call Trace:
[   43.550247]  <TASK>
[   43.550249]  dump_stack_lvl+0x73/0xb0
[   43.550252]  print_report+0xd1/0x650
[   43.550257]  ? __virt_addr_valid+0x1db/0x2d0
[   43.550260]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.550266]  ? kasan_complete_mode_report_info+0x2a/0x200
[   43.550270]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.550275]  kasan_report+0x141/0x180
[   43.550279]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.550285]  kasan_check_range+0x10c/0x1c0
[   43.550289]  __kasan_check_write+0x18/0x20
[   43.550293]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   43.550298]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   43.550303]  ? __kmalloc_cache_noprof+0x189/0x420
[   43.550307]  ? trace_hardirqs_on+0x37/0xe0
[   43.550311]  ? kasan_bitops_generic+0x92/0x1c0
[   43.550315]  kasan_bitops_generic+0x116/0x1c0
[   43.550319]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   43.550323]  ? ktime_get_ts64+0x83/0x230
[   43.550327]  kunit_try_run_case+0x1a2/0x480
[   43.550332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.550336]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   43.550340]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   43.550345]  ? __kthread_parkme+0x82/0x180
[   43.550349]  ? preempt_count_sub+0x50/0x80
[   43.550354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   43.550358]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.550362]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   43.550366]  kthread+0x334/0x6f0
[   43.550370]  ? trace_preempt_on+0x20/0xc0
[   43.550375]  ? __pfx_kthread+0x10/0x10
[   43.550379]  ? _raw_spin_unlock_irq+0x47/0x80
[   43.550383]  ? calculate_sigpending+0x7b/0xa0
[   43.550387]  ? __pfx_kthread+0x10/0x10
[   43.550391]  ret_from_fork+0x3e/0x80
[   43.550395]  ? __pfx_kthread+0x10/0x10
[   43.550400]  ret_from_fork_asm+0x1a/0x30
[   43.550405]  </TASK>
[   43.550407] 
[   43.741312] Allocated by task 304:
[   43.744738]  kasan_save_stack+0x45/0x70
[   43.748585]  kasan_save_track+0x18/0x40
[   43.752432]  kasan_save_alloc_info+0x3b/0x50
[   43.756728]  __kasan_kmalloc+0xb7/0xc0
[   43.760482]  __kmalloc_cache_noprof+0x189/0x420
[   43.765014]  kasan_bitops_generic+0x92/0x1c0
[   43.769289]  kunit_try_run_case+0x1a2/0x480
[   43.773483]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   43.778880]  kthread+0x334/0x6f0
[   43.782112]  ret_from_fork+0x3e/0x80
[   43.785692]  ret_from_fork_asm+0x1a/0x30
[   43.789645] 
[   43.791144] The buggy address belongs to the object at ffff888104ed9160
[   43.791144]  which belongs to the cache kmalloc-16 of size 16
[   43.803484] The buggy address is located 8 bytes inside of
[   43.803484]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   43.815751] 
[   43.817255] The buggy address belongs to the physical page:
[   43.822827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   43.830827] flags: 0x200000000000000(node=0|zone=2)
[   43.835704] page_type: f5(slab)
[   43.838854] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   43.846598] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.854337] page dumped because: kasan: bad access detected
[   43.859910] 
[   43.861411] Memory state around the buggy address:
[   43.866203]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   43.873421]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   43.880639] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   43.887858]                                                           ^
[   43.894471]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.901705]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.908944] ==================================================================
[   45.477304] ==================================================================
[   45.484533] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.492726] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   45.500132] 
[   45.501630] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   45.501638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.501640] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   45.501643] Call Trace:
[   45.501645]  <TASK>
[   45.501646]  dump_stack_lvl+0x73/0xb0
[   45.501650]  print_report+0xd1/0x650
[   45.501654]  ? __virt_addr_valid+0x1db/0x2d0
[   45.501658]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.501662]  ? kasan_complete_mode_report_info+0x2a/0x200
[   45.501686]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.501692]  kasan_report+0x141/0x180
[   45.501696]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.501702]  kasan_check_range+0x10c/0x1c0
[   45.501720]  __kasan_check_write+0x18/0x20
[   45.501723]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   45.501741]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   45.501746]  ? __kmalloc_cache_noprof+0x189/0x420
[   45.501750]  ? trace_hardirqs_on+0x37/0xe0
[   45.501754]  ? kasan_bitops_generic+0x92/0x1c0
[   45.501758]  kasan_bitops_generic+0x116/0x1c0
[   45.501761]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   45.501765]  ? ktime_get_ts64+0x83/0x230
[   45.501770]  kunit_try_run_case+0x1a2/0x480
[   45.501774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.501778]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   45.501782]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   45.501787]  ? __kthread_parkme+0x82/0x180
[   45.501791]  ? preempt_count_sub+0x50/0x80
[   45.501795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   45.501800]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.501803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   45.501808]  kthread+0x334/0x6f0
[   45.501811]  ? trace_preempt_on+0x20/0xc0
[   45.501816]  ? __pfx_kthread+0x10/0x10
[   45.501820]  ? _raw_spin_unlock_irq+0x47/0x80
[   45.501824]  ? calculate_sigpending+0x7b/0xa0
[   45.501828]  ? __pfx_kthread+0x10/0x10
[   45.501832]  ret_from_fork+0x3e/0x80
[   45.501836]  ? __pfx_kthread+0x10/0x10
[   45.501840]  ret_from_fork_asm+0x1a/0x30
[   45.501845]  </TASK>
[   45.501847] 
[   45.692763] Allocated by task 304:
[   45.696171]  kasan_save_stack+0x45/0x70
[   45.700011]  kasan_save_track+0x18/0x40
[   45.703857]  kasan_save_alloc_info+0x3b/0x50
[   45.708130]  __kasan_kmalloc+0xb7/0xc0
[   45.711882]  __kmalloc_cache_noprof+0x189/0x420
[   45.716417]  kasan_bitops_generic+0x92/0x1c0
[   45.720703]  kunit_try_run_case+0x1a2/0x480
[   45.724935]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   45.730333]  kthread+0x334/0x6f0
[   45.733566]  ret_from_fork+0x3e/0x80
[   45.737145]  ret_from_fork_asm+0x1a/0x30
[   45.741072] 
[   45.742570] The buggy address belongs to the object at ffff888104ed9160
[   45.742570]  which belongs to the cache kmalloc-16 of size 16
[   45.754912] The buggy address is located 8 bytes inside of
[   45.754912]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   45.767166] 
[   45.768664] The buggy address belongs to the physical page:
[   45.774272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   45.782278] flags: 0x200000000000000(node=0|zone=2)
[   45.787157] page_type: f5(slab)
[   45.790306] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   45.798053] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   45.805789] page dumped because: kasan: bad access detected
[   45.811362] 
[   45.812861] Memory state around the buggy address:
[   45.817654]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   45.824907]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   45.832128] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   45.839345]                                                           ^
[   45.845959]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.853177]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.860397] ==================================================================
[   44.306482] ==================================================================
[   44.313761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.321934] Write of size 8 at addr ffff888104ed9168 by task kunit_try_catch/304
[   44.329327] 
[   44.330827] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   44.330835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.330837] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   44.330840] Call Trace:
[   44.330841]  <TASK>
[   44.330843]  dump_stack_lvl+0x73/0xb0
[   44.330847]  print_report+0xd1/0x650
[   44.330851]  ? __virt_addr_valid+0x1db/0x2d0
[   44.330854]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.330859]  ? kasan_complete_mode_report_info+0x2a/0x200
[   44.330863]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.330869]  kasan_report+0x141/0x180
[   44.330873]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.330879]  kasan_check_range+0x10c/0x1c0
[   44.330883]  __kasan_check_write+0x18/0x20
[   44.330887]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   44.330892]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   44.330897]  ? __kmalloc_cache_noprof+0x189/0x420
[   44.330901]  ? trace_hardirqs_on+0x37/0xe0
[   44.330905]  ? kasan_bitops_generic+0x92/0x1c0
[   44.330909]  kasan_bitops_generic+0x116/0x1c0
[   44.330912]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   44.330916]  ? ktime_get_ts64+0x83/0x230
[   44.330920]  kunit_try_run_case+0x1a2/0x480
[   44.330925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.330929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   44.330933]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   44.330938]  ? __kthread_parkme+0x82/0x180
[   44.330942]  ? preempt_count_sub+0x50/0x80
[   44.330946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   44.330951]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.330955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   44.330959]  kthread+0x334/0x6f0
[   44.330963]  ? trace_preempt_on+0x20/0xc0
[   44.330967]  ? __pfx_kthread+0x10/0x10
[   44.330971]  ? _raw_spin_unlock_irq+0x47/0x80
[   44.330975]  ? calculate_sigpending+0x7b/0xa0
[   44.330979]  ? __pfx_kthread+0x10/0x10
[   44.330983]  ret_from_fork+0x3e/0x80
[   44.330987]  ? __pfx_kthread+0x10/0x10
[   44.330991]  ret_from_fork_asm+0x1a/0x30
[   44.330997]  </TASK>
[   44.330999] 
[   44.521910] Allocated by task 304:
[   44.525315]  kasan_save_stack+0x45/0x70
[   44.529152]  kasan_save_track+0x18/0x40
[   44.532993]  kasan_save_alloc_info+0x3b/0x50
[   44.537267]  __kasan_kmalloc+0xb7/0xc0
[   44.541026]  __kmalloc_cache_noprof+0x189/0x420
[   44.545558]  kasan_bitops_generic+0x92/0x1c0
[   44.549832]  kunit_try_run_case+0x1a2/0x480
[   44.554019]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   44.559424]  kthread+0x334/0x6f0
[   44.562657]  ret_from_fork+0x3e/0x80
[   44.566273]  ret_from_fork_asm+0x1a/0x30
[   44.570205] 
[   44.571703] The buggy address belongs to the object at ffff888104ed9160
[   44.571703]  which belongs to the cache kmalloc-16 of size 16
[   44.584073] The buggy address is located 8 bytes inside of
[   44.584073]  allocated 9-byte region [ffff888104ed9160, ffff888104ed9169)
[   44.596326] 
[   44.597825] The buggy address belongs to the physical page:
[   44.603397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ed9
[   44.611397] flags: 0x200000000000000(node=0|zone=2)
[   44.616274] page_type: f5(slab)
[   44.619423] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   44.627161] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   44.634898] page dumped because: kasan: bad access detected
[   44.640471] 
[   44.641973] Memory state around the buggy address:
[   44.646765]  ffff888104ed9000: 00 03 fc fc 00 03 fc fc 00 03 fc fc 00 03 fc fc
[   44.653993]  ffff888104ed9080: 00 03 fc fc 00 03 fc fc 00 03 fc fc fa fb fc fc
[   44.661212] >ffff888104ed9100: 00 05 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   44.668429]                                                           ^
[   44.675044]  ffff888104ed9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.682261]  ffff888104ed9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.689481] ==================================================================