Hay
Date
April 22, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   20.471198] ==================================================================
[   20.471333] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   20.471488] Read of size 8 at addr fff00000c40d2888 by task kunit_try_catch/263
[   20.471617] 
[   20.471837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.471894] Hardware name: linux,dummy-virt (DT)
[   20.472246]  print_report+0x118/0x608
[   20.472674]  __asan_report_load8_noabort+0x20/0x30
[   20.473485]  kunit_try_run_case+0x170/0x3f0
[   20.473763]  kthread+0x328/0x630
[   20.475442] 
[   20.476638]  __kasan_kmalloc+0xd4/0xd8
[   20.476847]  kasan_bitops_generic+0xa0/0x1c8
[   20.477278] 
[   20.477881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.477985] page_type: f5(slab)
[   20.478137] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.478295] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.478588] Memory state around the buggy address:
[   20.479647] >fff00000c40d2880: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.479813]  fff00000c40d2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.480713] ==================================================================

[   21.537034] ==================================================================
[   21.537667] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.538398] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.539563] 
[   21.539835] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.539966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.540004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.540062] Call Trace:
[   21.540114]  <TASK>
[   21.540162]  dump_stack_lvl+0x73/0xb0
[   21.540241]  print_report+0xd1/0x650
[   21.540322]  ? __virt_addr_valid+0x1db/0x2d0
[   21.540398]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.540482]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.540583]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.540670]  kasan_report+0x141/0x180
[   21.540748]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.540847]  kasan_check_range+0x10c/0x1c0
[   21.540931]  __kasan_check_write+0x18/0x20
[   21.541006]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   21.541090]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.541175]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.541259]  ? trace_hardirqs_on+0x37/0xe0
[   21.541330]  ? kasan_bitops_generic+0x92/0x1c0
[   21.541370]  kasan_bitops_generic+0x116/0x1c0
[   21.541401]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.541475]  ? __pfx_read_tsc+0x10/0x10
[   21.541587]  ? ktime_get_ts64+0x86/0x230
[   21.541632]  kunit_try_run_case+0x1a5/0x480
[   21.541670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.541702]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.541738]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.541772]  ? __kthread_parkme+0x82/0x180
[   21.541804]  ? preempt_count_sub+0x50/0x80
[   21.541840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.541876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.541910]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.541943]  kthread+0x337/0x6f0
[   21.541973]  ? trace_preempt_on+0x20/0xc0
[   21.542006]  ? __pfx_kthread+0x10/0x10
[   21.542038]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.542069]  ? calculate_sigpending+0x7b/0xa0
[   21.542101]  ? __pfx_kthread+0x10/0x10
[   21.542132]  ret_from_fork+0x41/0x80
[   21.542163]  ? __pfx_kthread+0x10/0x10
[   21.542194]  ret_from_fork_asm+0x1a/0x30
[   21.542239]  </TASK>
[   21.542252] 
[   21.562060] Allocated by task 281:
[   21.562587]  kasan_save_stack+0x45/0x70
[   21.563016]  kasan_save_track+0x18/0x40
[   21.563443]  kasan_save_alloc_info+0x3b/0x50
[   21.563936]  __kasan_kmalloc+0xb7/0xc0
[   21.564352]  __kmalloc_cache_noprof+0x189/0x420
[   21.564918]  kasan_bitops_generic+0x92/0x1c0
[   21.565242]  kunit_try_run_case+0x1a5/0x480
[   21.565786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.566326]  kthread+0x337/0x6f0
[   21.567551]  ret_from_fork+0x41/0x80
[   21.567996]  ret_from_fork_asm+0x1a/0x30
[   21.568542] 
[   21.568789] The buggy address belongs to the object at ffff8881017113c0
[   21.568789]  which belongs to the cache kmalloc-16 of size 16
[   21.569987] The buggy address is located 8 bytes inside of
[   21.569987]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.571096] 
[   21.571334] The buggy address belongs to the physical page:
[   21.571946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.573199] flags: 0x200000000000000(node=0|zone=2)
[   21.573738] page_type: f5(slab)
[   21.574142] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.574723] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.575829] page dumped because: kasan: bad access detected
[   21.576315] 
[   21.576740] Memory state around the buggy address:
[   21.577184]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.577975]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.578788] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.579405]                                               ^
[   21.580696]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.581284]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.581870] ==================================================================
[   21.583290] ==================================================================
[   21.583940] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.584884] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.585508] 
[   21.585827] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.586077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.586114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.586172] Call Trace:
[   21.586222]  <TASK>
[   21.586275]  dump_stack_lvl+0x73/0xb0
[   21.586393]  print_report+0xd1/0x650
[   21.586629]  ? __virt_addr_valid+0x1db/0x2d0
[   21.586745]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.586832]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.586908]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.586992]  kasan_report+0x141/0x180
[   21.587107]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.587211]  kasan_check_range+0x10c/0x1c0
[   21.587293]  __kasan_check_write+0x18/0x20
[   21.587356]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   21.587400]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.587567]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.587609]  ? trace_hardirqs_on+0x37/0xe0
[   21.587643]  ? kasan_bitops_generic+0x92/0x1c0
[   21.587676]  kasan_bitops_generic+0x116/0x1c0
[   21.587706]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.587740]  ? __pfx_read_tsc+0x10/0x10
[   21.587769]  ? ktime_get_ts64+0x86/0x230
[   21.587803]  kunit_try_run_case+0x1a5/0x480
[   21.587838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.587867]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.587902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.587934]  ? __kthread_parkme+0x82/0x180
[   21.587966]  ? preempt_count_sub+0x50/0x80
[   21.588001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.588035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.588066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.588099]  kthread+0x337/0x6f0
[   21.588128]  ? trace_preempt_on+0x20/0xc0
[   21.588160]  ? __pfx_kthread+0x10/0x10
[   21.588190]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.588221]  ? calculate_sigpending+0x7b/0xa0
[   21.588250]  ? __pfx_kthread+0x10/0x10
[   21.588281]  ret_from_fork+0x41/0x80
[   21.588310]  ? __pfx_kthread+0x10/0x10
[   21.588340]  ret_from_fork_asm+0x1a/0x30
[   21.588384]  </TASK>
[   21.588398] 
[   21.612702] Allocated by task 281:
[   21.613097]  kasan_save_stack+0x45/0x70
[   21.614097]  kasan_save_track+0x18/0x40
[   21.615122]  kasan_save_alloc_info+0x3b/0x50
[   21.615679]  __kasan_kmalloc+0xb7/0xc0
[   21.616016]  __kmalloc_cache_noprof+0x189/0x420
[   21.616369]  kasan_bitops_generic+0x92/0x1c0
[   21.617453]  kunit_try_run_case+0x1a5/0x480
[   21.618179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.618886]  kthread+0x337/0x6f0
[   21.619158]  ret_from_fork+0x41/0x80
[   21.619950]  ret_from_fork_asm+0x1a/0x30
[   21.620537] 
[   21.620993] The buggy address belongs to the object at ffff8881017113c0
[   21.620993]  which belongs to the cache kmalloc-16 of size 16
[   21.622656] The buggy address is located 8 bytes inside of
[   21.622656]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.623431] 
[   21.624078] The buggy address belongs to the physical page:
[   21.624730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.625892] flags: 0x200000000000000(node=0|zone=2)
[   21.626344] page_type: f5(slab)
[   21.627034] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.628287] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.629045] page dumped because: kasan: bad access detected
[   21.629612] 
[   21.629857] Memory state around the buggy address:
[   21.630286]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.631518]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.632645] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.633157]                                               ^
[   21.634139]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.634757]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.635743] ==================================================================
[   21.373278] ==================================================================
[   21.374099] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.375146] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.375905] 
[   21.376221] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.376623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.376664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.376723] Call Trace:
[   21.376759]  <TASK>
[   21.376809]  dump_stack_lvl+0x73/0xb0
[   21.376891]  print_report+0xd1/0x650
[   21.376975]  ? __virt_addr_valid+0x1db/0x2d0
[   21.377063]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.377215]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.377299]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.377386]  kasan_report+0x141/0x180
[   21.377669]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.377916]  kasan_check_range+0x10c/0x1c0
[   21.378031]  __kasan_check_write+0x18/0x20
[   21.378106]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   21.378188]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.378269]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.378316]  ? trace_hardirqs_on+0x37/0xe0
[   21.378352]  ? kasan_bitops_generic+0x92/0x1c0
[   21.378388]  kasan_bitops_generic+0x116/0x1c0
[   21.378444]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.378550]  ? __pfx_read_tsc+0x10/0x10
[   21.378613]  ? ktime_get_ts64+0x86/0x230
[   21.378675]  kunit_try_run_case+0x1a5/0x480
[   21.378736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.378792]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.378856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.378919]  ? __kthread_parkme+0x82/0x180
[   21.378975]  ? preempt_count_sub+0x50/0x80
[   21.379040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.379099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.379156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.379221]  kthread+0x337/0x6f0
[   21.379280]  ? trace_preempt_on+0x20/0xc0
[   21.379342]  ? __pfx_kthread+0x10/0x10
[   21.379407]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.379528]  ? calculate_sigpending+0x7b/0xa0
[   21.379611]  ? __pfx_kthread+0x10/0x10
[   21.379664]  ret_from_fork+0x41/0x80
[   21.379698]  ? __pfx_kthread+0x10/0x10
[   21.379730]  ret_from_fork_asm+0x1a/0x30
[   21.379776]  </TASK>
[   21.379790] 
[   21.402768] Allocated by task 281:
[   21.403206]  kasan_save_stack+0x45/0x70
[   21.404164]  kasan_save_track+0x18/0x40
[   21.404779]  kasan_save_alloc_info+0x3b/0x50
[   21.405130]  __kasan_kmalloc+0xb7/0xc0
[   21.405793]  __kmalloc_cache_noprof+0x189/0x420
[   21.406238]  kasan_bitops_generic+0x92/0x1c0
[   21.406860]  kunit_try_run_case+0x1a5/0x480
[   21.407307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.407983]  kthread+0x337/0x6f0
[   21.408344]  ret_from_fork+0x41/0x80
[   21.409244]  ret_from_fork_asm+0x1a/0x30
[   21.409707] 
[   21.410120] The buggy address belongs to the object at ffff8881017113c0
[   21.410120]  which belongs to the cache kmalloc-16 of size 16
[   21.411207] The buggy address is located 8 bytes inside of
[   21.411207]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.413156] 
[   21.413936] The buggy address belongs to the physical page:
[   21.415028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.416233] flags: 0x200000000000000(node=0|zone=2)
[   21.417008] page_type: f5(slab)
[   21.417271] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.417997] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.419619] page dumped because: kasan: bad access detected
[   21.420261] 
[   21.420439] Memory state around the buggy address:
[   21.421058]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.422138]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.422550] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.423914]                                               ^
[   21.424422]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.425247]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.426337] ==================================================================
[   21.688106] ==================================================================
[   21.688780] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.689808] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.690350] 
[   21.691316] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.691471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.692003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.692126] Call Trace:
[   21.692152]  <TASK>
[   21.692196]  dump_stack_lvl+0x73/0xb0
[   21.692281]  print_report+0xd1/0x650
[   21.692359]  ? __virt_addr_valid+0x1db/0x2d0
[   21.692438]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.692562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.692641]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.692724]  kasan_report+0x141/0x180
[   21.692801]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.692897]  kasan_check_range+0x10c/0x1c0
[   21.692977]  __kasan_check_write+0x18/0x20
[   21.693020]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   21.693060]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.693099]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.693130]  ? trace_hardirqs_on+0x37/0xe0
[   21.693163]  ? kasan_bitops_generic+0x92/0x1c0
[   21.693195]  kasan_bitops_generic+0x116/0x1c0
[   21.693223]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.693253]  ? __pfx_read_tsc+0x10/0x10
[   21.693279]  ? ktime_get_ts64+0x86/0x230
[   21.693313]  kunit_try_run_case+0x1a5/0x480
[   21.693345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.693375]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.693409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.693525]  ? __kthread_parkme+0x82/0x180
[   21.693622]  ? preempt_count_sub+0x50/0x80
[   21.693697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.693770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.693847]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.693911]  kthread+0x337/0x6f0
[   21.693976]  ? trace_preempt_on+0x20/0xc0
[   21.694052]  ? __pfx_kthread+0x10/0x10
[   21.694125]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.694181]  ? calculate_sigpending+0x7b/0xa0
[   21.694214]  ? __pfx_kthread+0x10/0x10
[   21.694247]  ret_from_fork+0x41/0x80
[   21.694277]  ? __pfx_kthread+0x10/0x10
[   21.694308]  ret_from_fork_asm+0x1a/0x30
[   21.694352]  </TASK>
[   21.694365] 
[   21.718324] Allocated by task 281:
[   21.719225]  kasan_save_stack+0x45/0x70
[   21.719636]  kasan_save_track+0x18/0x40
[   21.720060]  kasan_save_alloc_info+0x3b/0x50
[   21.720428]  __kasan_kmalloc+0xb7/0xc0
[   21.721292]  __kmalloc_cache_noprof+0x189/0x420
[   21.722014]  kasan_bitops_generic+0x92/0x1c0
[   21.722351]  kunit_try_run_case+0x1a5/0x480
[   21.723592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.724178]  kthread+0x337/0x6f0
[   21.724881]  ret_from_fork+0x41/0x80
[   21.725517]  ret_from_fork_asm+0x1a/0x30
[   21.726240] 
[   21.726481] The buggy address belongs to the object at ffff8881017113c0
[   21.726481]  which belongs to the cache kmalloc-16 of size 16
[   21.728231] The buggy address is located 8 bytes inside of
[   21.728231]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.730013] 
[   21.730187] The buggy address belongs to the physical page:
[   21.731099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.731817] flags: 0x200000000000000(node=0|zone=2)
[   21.732250] page_type: f5(slab)
[   21.732681] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.733906] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.735110] page dumped because: kasan: bad access detected
[   21.735521] 
[   21.736078] Memory state around the buggy address:
[   21.736786]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.737290]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.738154] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.738984]                                               ^
[   21.739406]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.740547]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.741274] ==================================================================
[   21.482101] ==================================================================
[   21.482656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.483857] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.485435] 
[   21.485895] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.486026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.486045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.486078] Call Trace:
[   21.486107]  <TASK>
[   21.486140]  dump_stack_lvl+0x73/0xb0
[   21.486223]  print_report+0xd1/0x650
[   21.486265]  ? __virt_addr_valid+0x1db/0x2d0
[   21.486298]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.486338]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.486370]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.486409]  kasan_report+0x141/0x180
[   21.486807]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.486892]  kasan_check_range+0x10c/0x1c0
[   21.486957]  __kasan_check_write+0x18/0x20
[   21.487010]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   21.487073]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.487138]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.487196]  ? trace_hardirqs_on+0x37/0xe0
[   21.487287]  ? kasan_bitops_generic+0x92/0x1c0
[   21.487562]  kasan_bitops_generic+0x116/0x1c0
[   21.487606]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.487639]  ? __pfx_read_tsc+0x10/0x10
[   21.487669]  ? ktime_get_ts64+0x86/0x230
[   21.487707]  kunit_try_run_case+0x1a5/0x480
[   21.487742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.487773]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.487810]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.487845]  ? __kthread_parkme+0x82/0x180
[   21.487876]  ? preempt_count_sub+0x50/0x80
[   21.487914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.487950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.487983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.488016]  kthread+0x337/0x6f0
[   21.488045]  ? trace_preempt_on+0x20/0xc0
[   21.488078]  ? __pfx_kthread+0x10/0x10
[   21.488109]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.488140]  ? calculate_sigpending+0x7b/0xa0
[   21.488172]  ? __pfx_kthread+0x10/0x10
[   21.488205]  ret_from_fork+0x41/0x80
[   21.488235]  ? __pfx_kthread+0x10/0x10
[   21.488271]  ret_from_fork_asm+0x1a/0x30
[   21.488317]  </TASK>
[   21.488331] 
[   21.510065] Allocated by task 281:
[   21.511128]  kasan_save_stack+0x45/0x70
[   21.511745]  kasan_save_track+0x18/0x40
[   21.512195]  kasan_save_alloc_info+0x3b/0x50
[   21.512787]  __kasan_kmalloc+0xb7/0xc0
[   21.513181]  __kmalloc_cache_noprof+0x189/0x420
[   21.513862]  kasan_bitops_generic+0x92/0x1c0
[   21.514277]  kunit_try_run_case+0x1a5/0x480
[   21.514921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.515515]  kthread+0x337/0x6f0
[   21.516321]  ret_from_fork+0x41/0x80
[   21.516770]  ret_from_fork_asm+0x1a/0x30
[   21.517348] 
[   21.517616] The buggy address belongs to the object at ffff8881017113c0
[   21.517616]  which belongs to the cache kmalloc-16 of size 16
[   21.519187] The buggy address is located 8 bytes inside of
[   21.519187]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.522376] 
[   21.522786] The buggy address belongs to the physical page:
[   21.523717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.524121] flags: 0x200000000000000(node=0|zone=2)
[   21.524410] page_type: f5(slab)
[   21.525042] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.527074] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.528370] page dumped because: kasan: bad access detected
[   21.529228] 
[   21.529613] Memory state around the buggy address:
[   21.529973]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.530328]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.532133] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.533063]                                               ^
[   21.533835]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.534793]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.535867] ==================================================================
[   21.636759] ==================================================================
[   21.637314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.639646] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.640869] 
[   21.641371] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.641722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.641760] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.641820] Call Trace:
[   21.641867]  <TASK>
[   21.641987]  dump_stack_lvl+0x73/0xb0
[   21.642049]  print_report+0xd1/0x650
[   21.642116]  ? __virt_addr_valid+0x1db/0x2d0
[   21.642150]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.642190]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.642224]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.642262]  kasan_report+0x141/0x180
[   21.642295]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.642341]  kasan_check_range+0x10c/0x1c0
[   21.642375]  __kasan_check_write+0x18/0x20
[   21.642402]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   21.642469]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.642545]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.642580]  ? trace_hardirqs_on+0x37/0xe0
[   21.642613]  ? kasan_bitops_generic+0x92/0x1c0
[   21.642648]  kasan_bitops_generic+0x116/0x1c0
[   21.642678]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.642709]  ? __pfx_read_tsc+0x10/0x10
[   21.642738]  ? ktime_get_ts64+0x86/0x230
[   21.642775]  kunit_try_run_case+0x1a5/0x480
[   21.642810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.642840]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.642876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.642912]  ? __kthread_parkme+0x82/0x180
[   21.642942]  ? preempt_count_sub+0x50/0x80
[   21.642978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.643011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.643044]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.643077]  kthread+0x337/0x6f0
[   21.643107]  ? trace_preempt_on+0x20/0xc0
[   21.643139]  ? __pfx_kthread+0x10/0x10
[   21.643171]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.643203]  ? calculate_sigpending+0x7b/0xa0
[   21.643233]  ? __pfx_kthread+0x10/0x10
[   21.643266]  ret_from_fork+0x41/0x80
[   21.643296]  ? __pfx_kthread+0x10/0x10
[   21.643328]  ret_from_fork_asm+0x1a/0x30
[   21.643373]  </TASK>
[   21.643386] 
[   21.668929] Allocated by task 281:
[   21.669674]  kasan_save_stack+0x45/0x70
[   21.670156]  kasan_save_track+0x18/0x40
[   21.670682]  kasan_save_alloc_info+0x3b/0x50
[   21.671086]  __kasan_kmalloc+0xb7/0xc0
[   21.671555]  __kmalloc_cache_noprof+0x189/0x420
[   21.671986]  kasan_bitops_generic+0x92/0x1c0
[   21.672557]  kunit_try_run_case+0x1a5/0x480
[   21.672976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.673684]  kthread+0x337/0x6f0
[   21.674063]  ret_from_fork+0x41/0x80
[   21.674548]  ret_from_fork_asm+0x1a/0x30
[   21.675016] 
[   21.675299] The buggy address belongs to the object at ffff8881017113c0
[   21.675299]  which belongs to the cache kmalloc-16 of size 16
[   21.676308] The buggy address is located 8 bytes inside of
[   21.676308]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.677227] 
[   21.677638] The buggy address belongs to the physical page:
[   21.678135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.678768] flags: 0x200000000000000(node=0|zone=2)
[   21.679283] page_type: f5(slab)
[   21.679904] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.680695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.681157] page dumped because: kasan: bad access detected
[   21.681761] 
[   21.681986] Memory state around the buggy address:
[   21.682586]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.683357]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.684060] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.684715]                                               ^
[   21.685088]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.685774]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.686464] ==================================================================
[   21.427885] ==================================================================
[   21.428447] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.430024] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.430542] 
[   21.431419] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.431631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.431653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.431684] Call Trace:
[   21.431710]  <TASK>
[   21.431731]  dump_stack_lvl+0x73/0xb0
[   21.431770]  print_report+0xd1/0x650
[   21.431805]  ? __virt_addr_valid+0x1db/0x2d0
[   21.431836]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.431874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.431909]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.431948]  kasan_report+0x141/0x180
[   21.431981]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.432027]  kasan_check_range+0x10c/0x1c0
[   21.432063]  __kasan_check_write+0x18/0x20
[   21.432091]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   21.432133]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.432174]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.432205]  ? trace_hardirqs_on+0x37/0xe0
[   21.432238]  ? kasan_bitops_generic+0x92/0x1c0
[   21.432274]  kasan_bitops_generic+0x116/0x1c0
[   21.432302]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.432334]  ? __pfx_read_tsc+0x10/0x10
[   21.432363]  ? ktime_get_ts64+0x86/0x230
[   21.432400]  kunit_try_run_case+0x1a5/0x480
[   21.432536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.432616]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.432691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.432765]  ? __kthread_parkme+0x82/0x180
[   21.432829]  ? preempt_count_sub+0x50/0x80
[   21.432905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.432982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.433021]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.433053]  kthread+0x337/0x6f0
[   21.433084]  ? trace_preempt_on+0x20/0xc0
[   21.433115]  ? __pfx_kthread+0x10/0x10
[   21.433148]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.433179]  ? calculate_sigpending+0x7b/0xa0
[   21.433212]  ? __pfx_kthread+0x10/0x10
[   21.433244]  ret_from_fork+0x41/0x80
[   21.433273]  ? __pfx_kthread+0x10/0x10
[   21.433338]  ret_from_fork_asm+0x1a/0x30
[   21.433548]  </TASK>
[   21.433588] 
[   21.457258] Allocated by task 281:
[   21.458498]  kasan_save_stack+0x45/0x70
[   21.458953]  kasan_save_track+0x18/0x40
[   21.459269]  kasan_save_alloc_info+0x3b/0x50
[   21.460215]  __kasan_kmalloc+0xb7/0xc0
[   21.461094]  __kmalloc_cache_noprof+0x189/0x420
[   21.461979]  kasan_bitops_generic+0x92/0x1c0
[   21.462345]  kunit_try_run_case+0x1a5/0x480
[   21.462991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.463514]  kthread+0x337/0x6f0
[   21.464052]  ret_from_fork+0x41/0x80
[   21.464401]  ret_from_fork_asm+0x1a/0x30
[   21.465278] 
[   21.465826] The buggy address belongs to the object at ffff8881017113c0
[   21.465826]  which belongs to the cache kmalloc-16 of size 16
[   21.467185] The buggy address is located 8 bytes inside of
[   21.467185]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.468467] 
[   21.468832] The buggy address belongs to the physical page:
[   21.469717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.471260] flags: 0x200000000000000(node=0|zone=2)
[   21.472068] page_type: f5(slab)
[   21.472909] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.473818] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.474339] page dumped because: kasan: bad access detected
[   21.475184] 
[   21.475374] Memory state around the buggy address:
[   21.476064]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.476593]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.477306] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.478818]                                               ^
[   21.479250]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.480111]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.481044] ==================================================================
[   21.323996] ==================================================================
[   21.324762] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.325469] Write of size 8 at addr ffff8881017113c8 by task kunit_try_catch/281
[   21.326033] 
[   21.326307] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   21.326444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.326482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.326893] Call Trace:
[   21.326937]  <TASK>
[   21.326992]  dump_stack_lvl+0x73/0xb0
[   21.327083]  print_report+0xd1/0x650
[   21.327162]  ? __virt_addr_valid+0x1db/0x2d0
[   21.327245]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.327329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.327408]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.327657]  kasan_report+0x141/0x180
[   21.327739]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.327839]  kasan_check_range+0x10c/0x1c0
[   21.327922]  __kasan_check_write+0x18/0x20
[   21.327998]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   21.328082]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   21.328136]  ? __kmalloc_cache_noprof+0x189/0x420
[   21.328170]  ? trace_hardirqs_on+0x37/0xe0
[   21.328208]  ? kasan_bitops_generic+0x92/0x1c0
[   21.328244]  kasan_bitops_generic+0x116/0x1c0
[   21.328272]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   21.328305]  ? __pfx_read_tsc+0x10/0x10
[   21.328337]  ? ktime_get_ts64+0x86/0x230
[   21.328376]  kunit_try_run_case+0x1a5/0x480
[   21.328433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.328571]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.328619]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.328654]  ? __kthread_parkme+0x82/0x180
[   21.328686]  ? preempt_count_sub+0x50/0x80
[   21.328723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.328756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.328787]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.328818]  kthread+0x337/0x6f0
[   21.328849]  ? trace_preempt_on+0x20/0xc0
[   21.328881]  ? __pfx_kthread+0x10/0x10
[   21.328912]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.328942]  ? calculate_sigpending+0x7b/0xa0
[   21.328973]  ? __pfx_kthread+0x10/0x10
[   21.329003]  ret_from_fork+0x41/0x80
[   21.329032]  ? __pfx_kthread+0x10/0x10
[   21.329063]  ret_from_fork_asm+0x1a/0x30
[   21.329107]  </TASK>
[   21.329121] 
[   21.351342] Allocated by task 281:
[   21.351676]  kasan_save_stack+0x45/0x70
[   21.352036]  kasan_save_track+0x18/0x40
[   21.353764]  kasan_save_alloc_info+0x3b/0x50
[   21.354231]  __kasan_kmalloc+0xb7/0xc0
[   21.354963]  __kmalloc_cache_noprof+0x189/0x420
[   21.355963]  kasan_bitops_generic+0x92/0x1c0
[   21.356142]  kunit_try_run_case+0x1a5/0x480
[   21.356309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.357301]  kthread+0x337/0x6f0
[   21.357841]  ret_from_fork+0x41/0x80
[   21.358731]  ret_from_fork_asm+0x1a/0x30
[   21.359330] 
[   21.359550] The buggy address belongs to the object at ffff8881017113c0
[   21.359550]  which belongs to the cache kmalloc-16 of size 16
[   21.360472] The buggy address is located 8 bytes inside of
[   21.360472]  allocated 9-byte region [ffff8881017113c0, ffff8881017113c9)
[   21.361241] 
[   21.361477] The buggy address belongs to the physical page:
[   21.362219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101711
[   21.362936] flags: 0x200000000000000(node=0|zone=2)
[   21.363650] page_type: f5(slab)
[   21.363963] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.364677] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.365235] page dumped because: kasan: bad access detected
[   21.365746] 
[   21.365977] Memory state around the buggy address:
[   21.366340]  ffff888101711280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.367038]  ffff888101711300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.367611] >ffff888101711380: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.369263]                                               ^
[   21.370214]  ffff888101711400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.370973]  ffff888101711480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.371382] ==================================================================

[   22.154540] ==================================================================
[   22.155193] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   22.155938] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.156599] 
[   22.156748] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.156780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.156789] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.156800] Call trace:
[   22.156807]  show_stack+0x20/0x38 (C)
[   22.156827]  dump_stack_lvl+0x8c/0xd0
[   22.156846]  print_report+0x118/0x608
[   22.156865]  kasan_report+0xdc/0x128
[   22.156884]  __asan_report_load8_noabort+0x20/0x30
[   22.156906]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   22.156932]  kasan_bitops_generic+0x110/0x1c8
[   22.156951]  kunit_try_run_case+0x170/0x3f0
[   22.156973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.156999]  kthread+0x328/0x630
[   22.157020]  ret_from_fork+0x10/0x20
[   22.157041] 
[   22.163048] Allocated by task 319:
[   22.163363]  kasan_save_stack+0x3c/0x68
[   22.163724]  kasan_save_track+0x20/0x40
[   22.164082]  kasan_save_alloc_info+0x40/0x58
[   22.164481]  __kasan_kmalloc+0xd4/0xd8
[   22.164830]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.165254]  kasan_bitops_generic+0xa0/0x1c8
[   22.165650]  kunit_try_run_case+0x170/0x3f0
[   22.166044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.166552]  kthread+0x328/0x630
[   22.166861]  ret_from_fork+0x10/0x20
[   22.167199] 
[   22.167345] The buggy address belongs to the object at ffff00000a7446c0
[   22.167345]  which belongs to the cache kmalloc-16 of size 16
[   22.168446] The buggy address is located 8 bytes inside of
[   22.168446]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.169541] 
[   22.169688] The buggy address belongs to the physical page:
[   22.170191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.170899] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.171493] page_type: f5(slab)
[   22.171791] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.172491] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.173186] page dumped because: kasan: bad access detected
[   22.173690] 
[   22.173836] Memory state around the buggy address:
[   22.174274]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.174927]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.175579] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.176229]                                               ^
[   22.176735]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.177388]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.178038] ==================================================================
[   21.957544] ==================================================================
[   21.958221] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.958998] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   21.959667] 
[   21.959824] CPU: 3 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.959862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.959874] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.959887] Call trace:
[   21.959897]  show_stack+0x20/0x38 (C)
[   21.959921]  dump_stack_lvl+0x8c/0xd0
[   21.959945]  print_report+0x118/0x608
[   21.959967]  kasan_report+0xdc/0x128
[   21.959988]  __asan_report_load8_noabort+0x20/0x30
[   21.960012]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   21.960040]  kasan_bitops_generic+0x110/0x1c8
[   21.960061]  kunit_try_run_case+0x170/0x3f0
[   21.960088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.960118]  kthread+0x328/0x630
[   21.960143]  ret_from_fork+0x10/0x20
[   21.960168] 
[   21.966189] Allocated by task 319:
[   21.966507]  kasan_save_stack+0x3c/0x68
[   21.966869]  kasan_save_track+0x20/0x40
[   21.967231]  kasan_save_alloc_info+0x40/0x58
[   21.967633]  __kasan_kmalloc+0xd4/0xd8
[   21.967986]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.968414]  kasan_bitops_generic+0xa0/0x1c8
[   21.968813]  kunit_try_run_case+0x170/0x3f0
[   21.969209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.969719]  kthread+0x328/0x630
[   21.970030]  ret_from_fork+0x10/0x20
[   21.970371] 
[   21.970518] The buggy address belongs to the object at ffff00000a7446c0
[   21.970518]  which belongs to the cache kmalloc-16 of size 16
[   21.971623] The buggy address is located 8 bytes inside of
[   21.971623]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   21.972721] 
[   21.972870] The buggy address belongs to the physical page:
[   21.973377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   21.974089] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.974689] page_type: f5(slab)
[   21.974993] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   21.975698] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.976397] page dumped because: kasan: bad access detected
[   21.976903] 
[   21.977050] Memory state around the buggy address:
[   21.977489]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.978145]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   21.978800] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.979452]                                               ^
[   21.979961]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.980616]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.981269] ==================================================================
[   22.056343] ==================================================================
[   22.056999] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   22.057743] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.058414] 
[   22.058563] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.058597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.058606] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.058617] Call trace:
[   22.058625]  show_stack+0x20/0x38 (C)
[   22.058645]  dump_stack_lvl+0x8c/0xd0
[   22.058664]  print_report+0x118/0x608
[   22.058683]  kasan_report+0xdc/0x128
[   22.058701]  kasan_check_range+0x100/0x1a8
[   22.058722]  __kasan_check_write+0x20/0x30
[   22.058743]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   22.058769]  kasan_bitops_generic+0x110/0x1c8
[   22.058787]  kunit_try_run_case+0x170/0x3f0
[   22.058811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.058836]  kthread+0x328/0x630
[   22.058858]  ret_from_fork+0x10/0x20
[   22.058879] 
[   22.065191] Allocated by task 319:
[   22.065508]  kasan_save_stack+0x3c/0x68
[   22.065867]  kasan_save_track+0x20/0x40
[   22.066227]  kasan_save_alloc_info+0x40/0x58
[   22.066627]  __kasan_kmalloc+0xd4/0xd8
[   22.066978]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.067404]  kasan_bitops_generic+0xa0/0x1c8
[   22.067800]  kunit_try_run_case+0x170/0x3f0
[   22.068193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.068702]  kthread+0x328/0x630
[   22.069011]  ret_from_fork+0x10/0x20
[   22.069349] 
[   22.069495] The buggy address belongs to the object at ffff00000a7446c0
[   22.069495]  which belongs to the cache kmalloc-16 of size 16
[   22.070596] The buggy address is located 8 bytes inside of
[   22.070596]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.071693] 
[   22.071838] The buggy address belongs to the physical page:
[   22.072342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.073049] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.073644] page_type: f5(slab)
[   22.073941] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.074642] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.075336] page dumped because: kasan: bad access detected
[   22.075841] 
[   22.075986] Memory state around the buggy address:
[   22.076424]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.077075]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.077728] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.078377]                                               ^
[   22.078884]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.079536]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.080186] ==================================================================
[   22.031604] ==================================================================
[   22.032258] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   22.033004] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.033674] 
[   22.033823] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.033856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.033866] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.033877] Call trace:
[   22.033884]  show_stack+0x20/0x38 (C)
[   22.033905]  dump_stack_lvl+0x8c/0xd0
[   22.033924]  print_report+0x118/0x608
[   22.033942]  kasan_report+0xdc/0x128
[   22.033961]  kasan_check_range+0x100/0x1a8
[   22.033981]  __kasan_check_write+0x20/0x30
[   22.034003]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   22.034028]  kasan_bitops_generic+0x110/0x1c8
[   22.034047]  kunit_try_run_case+0x170/0x3f0
[   22.034069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.034096]  kthread+0x328/0x630
[   22.034118]  ret_from_fork+0x10/0x20
[   22.034139] 
[   22.040450] Allocated by task 319:
[   22.040765]  kasan_save_stack+0x3c/0x68
[   22.041126]  kasan_save_track+0x20/0x40
[   22.041485]  kasan_save_alloc_info+0x40/0x58
[   22.041885]  __kasan_kmalloc+0xd4/0xd8
[   22.042235]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.042660]  kasan_bitops_generic+0xa0/0x1c8
[   22.043056]  kunit_try_run_case+0x170/0x3f0
[   22.043449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.043958]  kthread+0x328/0x630
[   22.044267]  ret_from_fork+0x10/0x20
[   22.044604] 
[   22.044750] The buggy address belongs to the object at ffff00000a7446c0
[   22.044750]  which belongs to the cache kmalloc-16 of size 16
[   22.045852] The buggy address is located 8 bytes inside of
[   22.045852]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.046947] 
[   22.047093] The buggy address belongs to the physical page:
[   22.047596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.048304] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.048898] page_type: f5(slab)
[   22.049196] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.049896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.050592] page dumped because: kasan: bad access detected
[   22.051095] 
[   22.051241] Memory state around the buggy address:
[   22.051678]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.052330]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.052983] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.053632]                                               ^
[   22.054139]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.054791]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.055442] ==================================================================
[   21.982009] ==================================================================
[   21.982672] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.983423] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   21.984095] 
[   21.984252] CPU: 3 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.984287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.984298] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.984312] Call trace:
[   21.984320]  show_stack+0x20/0x38 (C)
[   21.984344]  dump_stack_lvl+0x8c/0xd0
[   21.984368]  print_report+0x118/0x608
[   21.984390]  kasan_report+0xdc/0x128
[   21.984410]  kasan_check_range+0x100/0x1a8
[   21.984432]  __kasan_check_write+0x20/0x30
[   21.984456]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   21.984484]  kasan_bitops_generic+0x110/0x1c8
[   21.984505]  kunit_try_run_case+0x170/0x3f0
[   21.984530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.984559]  kthread+0x328/0x630
[   21.984583]  ret_from_fork+0x10/0x20
[   21.984607] 
[   21.990925] Allocated by task 319:
[   21.991243]  kasan_save_stack+0x3c/0x68
[   21.991605]  kasan_save_track+0x20/0x40
[   21.991966]  kasan_save_alloc_info+0x40/0x58
[   21.992368]  __kasan_kmalloc+0xd4/0xd8
[   21.992720]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.993148]  kasan_bitops_generic+0xa0/0x1c8
[   21.993547]  kunit_try_run_case+0x170/0x3f0
[   21.993942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.994453]  kthread+0x328/0x630
[   21.994764]  ret_from_fork+0x10/0x20
[   21.995103] 
[   21.995250] The buggy address belongs to the object at ffff00000a7446c0
[   21.995250]  which belongs to the cache kmalloc-16 of size 16
[   21.996353] The buggy address is located 8 bytes inside of
[   21.996353]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   21.997452] 
[   21.997600] The buggy address belongs to the physical page:
[   21.998108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   21.998819] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.999418] page_type: f5(slab)
[   21.999718] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.000422] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.001119] page dumped because: kasan: bad access detected
[   22.001626] 
[   22.001773] Memory state around the buggy address:
[   22.002212]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.002867]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.003522] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.004175]                                               ^
[   22.004683]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.005338]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.005990] ==================================================================
[   21.931736] ==================================================================
[   21.932799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.933572] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   21.934260] 
[   21.934425] CPU: 3 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.934476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.934492] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.934510] Call trace:
[   21.934523]  show_stack+0x20/0x38 (C)
[   21.934557]  dump_stack_lvl+0x8c/0xd0
[   21.934589]  print_report+0x118/0x608
[   21.934619]  kasan_report+0xdc/0x128
[   21.934648]  kasan_check_range+0x100/0x1a8
[   21.934680]  __kasan_check_write+0x20/0x30
[   21.934712]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   21.934752]  kasan_bitops_generic+0x110/0x1c8
[   21.934782]  kunit_try_run_case+0x170/0x3f0
[   21.934817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.934857]  kthread+0x328/0x630
[   21.934891]  ret_from_fork+0x10/0x20
[   21.934924] 
[   21.941297] Allocated by task 319:
[   21.941627]  kasan_save_stack+0x3c/0x68
[   21.942003]  kasan_save_track+0x20/0x40
[   21.942376]  kasan_save_alloc_info+0x40/0x58
[   21.942788]  __kasan_kmalloc+0xd4/0xd8
[   21.943153]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.943595]  kasan_bitops_generic+0xa0/0x1c8
[   21.944006]  kunit_try_run_case+0x170/0x3f0
[   21.944415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.944940]  kthread+0x328/0x630
[   21.945265]  ret_from_fork+0x10/0x20
[   21.945616] 
[   21.945772] The buggy address belongs to the object at ffff00000a7446c0
[   21.945772]  which belongs to the cache kmalloc-16 of size 16
[   21.946890] The buggy address is located 8 bytes inside of
[   21.946890]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   21.948003] 
[   21.948159] The buggy address belongs to the physical page:
[   21.948677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   21.949404] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.950018] page_type: f5(slab)
[   21.950331] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   21.951048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.951757] page dumped because: kasan: bad access detected
[   21.952273] 
[   21.952427] Memory state around the buggy address:
[   21.952877]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.953545]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   21.954213] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   21.954877]                                               ^
[   21.955397]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.956064]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.956728] ==================================================================
[   22.105340] ==================================================================
[   22.105993] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   22.106736] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.107407] 
[   22.107556] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.107588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.107598] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.107608] Call trace:
[   22.107616]  show_stack+0x20/0x38 (C)
[   22.107636]  dump_stack_lvl+0x8c/0xd0
[   22.107655]  print_report+0x118/0x608
[   22.107673]  kasan_report+0xdc/0x128
[   22.107692]  kasan_check_range+0x100/0x1a8
[   22.107712]  __kasan_check_write+0x20/0x30
[   22.107733]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   22.107759]  kasan_bitops_generic+0x110/0x1c8
[   22.107778]  kunit_try_run_case+0x170/0x3f0
[   22.107799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.107825]  kthread+0x328/0x630
[   22.107847]  ret_from_fork+0x10/0x20
[   22.107868] 
[   22.114177] Allocated by task 319:
[   22.114493]  kasan_save_stack+0x3c/0x68
[   22.114853]  kasan_save_track+0x20/0x40
[   22.115211]  kasan_save_alloc_info+0x40/0x58
[   22.115611]  __kasan_kmalloc+0xd4/0xd8
[   22.115962]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.116387]  kasan_bitops_generic+0xa0/0x1c8
[   22.116784]  kunit_try_run_case+0x170/0x3f0
[   22.117177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.117685]  kthread+0x328/0x630
[   22.117993]  ret_from_fork+0x10/0x20
[   22.118330] 
[   22.118476] The buggy address belongs to the object at ffff00000a7446c0
[   22.118476]  which belongs to the cache kmalloc-16 of size 16
[   22.119577] The buggy address is located 8 bytes inside of
[   22.119577]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.120673] 
[   22.120819] The buggy address belongs to the physical page:
[   22.121323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.122030] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.122625] page_type: f5(slab)
[   22.122923] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.123624] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.124319] page dumped because: kasan: bad access detected
[   22.124822] 
[   22.124968] Memory state around the buggy address:
[   22.125406]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.126058]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.126710] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.127360]                                               ^
[   22.127866]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.128519]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.129168] ==================================================================
[   22.081066] ==================================================================
[   22.081723] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   22.082469] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.083130] 
[   22.083279] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.083312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.083322] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.083332] Call trace:
[   22.083340]  show_stack+0x20/0x38 (C)
[   22.083360]  dump_stack_lvl+0x8c/0xd0
[   22.083381]  print_report+0x118/0x608
[   22.083399]  kasan_report+0xdc/0x128
[   22.083417]  __asan_report_load8_noabort+0x20/0x30
[   22.083439]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   22.083465]  kasan_bitops_generic+0x110/0x1c8
[   22.083484]  kunit_try_run_case+0x170/0x3f0
[   22.083507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.083533]  kthread+0x328/0x630
[   22.083554]  ret_from_fork+0x10/0x20
[   22.083576] 
[   22.089588] Allocated by task 319:
[   22.089904]  kasan_save_stack+0x3c/0x68
[   22.090262]  kasan_save_track+0x20/0x40
[   22.090620]  kasan_save_alloc_info+0x40/0x58
[   22.091018]  __kasan_kmalloc+0xd4/0xd8
[   22.091368]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.091794]  kasan_bitops_generic+0xa0/0x1c8
[   22.092189]  kunit_try_run_case+0x170/0x3f0
[   22.092582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.093091]  kthread+0x328/0x630
[   22.093400]  ret_from_fork+0x10/0x20
[   22.093737] 
[   22.093883] The buggy address belongs to the object at ffff00000a7446c0
[   22.093883]  which belongs to the cache kmalloc-16 of size 16
[   22.094984] The buggy address is located 8 bytes inside of
[   22.094984]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.096080] 
[   22.096226] The buggy address belongs to the physical page:
[   22.096729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.097437] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.098032] page_type: f5(slab)
[   22.098330] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.099031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.099725] page dumped because: kasan: bad access detected
[   22.100229] 
[   22.100375] Memory state around the buggy address:
[   22.100812]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.101464]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.102117] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.102766]                                               ^
[   22.103271]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.103924]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.104574] ==================================================================
[   22.007156] ==================================================================
[   22.007832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   22.008593] Read of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.009258] 
[   22.009414] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.009452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.009463] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.009475] Call trace:
[   22.009484]  show_stack+0x20/0x38 (C)
[   22.009508]  dump_stack_lvl+0x8c/0xd0
[   22.009530]  print_report+0x118/0x608
[   22.009549]  kasan_report+0xdc/0x128
[   22.009568]  __asan_report_load8_noabort+0x20/0x30
[   22.009592]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   22.009618]  kasan_bitops_generic+0x110/0x1c8
[   22.009637]  kunit_try_run_case+0x170/0x3f0
[   22.009661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.009687]  kthread+0x328/0x630
[   22.009711]  ret_from_fork+0x10/0x20
[   22.009733] 
[   22.015743] Allocated by task 319:
[   22.016061]  kasan_save_stack+0x3c/0x68
[   22.016423]  kasan_save_track+0x20/0x40
[   22.016782]  kasan_save_alloc_info+0x40/0x58
[   22.017181]  __kasan_kmalloc+0xd4/0xd8
[   22.017533]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.017959]  kasan_bitops_generic+0xa0/0x1c8
[   22.018356]  kunit_try_run_case+0x170/0x3f0
[   22.018747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.019255]  kthread+0x328/0x630
[   22.019563]  ret_from_fork+0x10/0x20
[   22.019902] 
[   22.020047] The buggy address belongs to the object at ffff00000a7446c0
[   22.020047]  which belongs to the cache kmalloc-16 of size 16
[   22.021149] The buggy address is located 8 bytes inside of
[   22.021149]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.022247] 
[   22.022395] The buggy address belongs to the physical page:
[   22.022900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.023613] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.024211] page_type: f5(slab)
[   22.024512] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.025215] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.025909] page dumped because: kasan: bad access detected
[   22.026414] 
[   22.026559] Memory state around the buggy address:
[   22.026996]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.027649]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.028303] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.028951]                                               ^
[   22.029458]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.030110]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.030760] ==================================================================
[   22.129931] ==================================================================
[   22.130585] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   22.131329] Write of size 8 at addr ffff00000a7446c8 by task kunit_try_catch/319
[   22.131999] 
[   22.132148] CPU: 4 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   22.132180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.132190] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.132200] Call trace:
[   22.132208]  show_stack+0x20/0x38 (C)
[   22.132227]  dump_stack_lvl+0x8c/0xd0
[   22.132246]  print_report+0x118/0x608
[   22.132265]  kasan_report+0xdc/0x128
[   22.132284]  kasan_check_range+0x100/0x1a8
[   22.132304]  __kasan_check_write+0x20/0x30
[   22.132325]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   22.132351]  kasan_bitops_generic+0x110/0x1c8
[   22.132370]  kunit_try_run_case+0x170/0x3f0
[   22.132392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.132418]  kthread+0x328/0x630
[   22.132440]  ret_from_fork+0x10/0x20
[   22.132460] 
[   22.138770] Allocated by task 319:
[   22.139084]  kasan_save_stack+0x3c/0x68
[   22.139442]  kasan_save_track+0x20/0x40
[   22.139801]  kasan_save_alloc_info+0x40/0x58
[   22.140200]  __kasan_kmalloc+0xd4/0xd8
[   22.140550]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.140975]  kasan_bitops_generic+0xa0/0x1c8
[   22.141370]  kunit_try_run_case+0x170/0x3f0
[   22.141762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.142271]  kthread+0x328/0x630
[   22.142579]  ret_from_fork+0x10/0x20
[   22.142917] 
[   22.143063] The buggy address belongs to the object at ffff00000a7446c0
[   22.143063]  which belongs to the cache kmalloc-16 of size 16
[   22.144164] The buggy address is located 8 bytes inside of
[   22.144164]  allocated 9-byte region [ffff00000a7446c0, ffff00000a7446c9)
[   22.145259] 
[   22.145405] The buggy address belongs to the physical page:
[   22.145909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa744
[   22.146617] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.147211] page_type: f5(slab)
[   22.147508] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000
[   22.148208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.148903] page dumped because: kasan: bad access detected
[   22.149407] 
[   22.149554] Memory state around the buggy address:
[   22.149990]  ffff00000a744580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.150642]  ffff00000a744600: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   22.151294] >ffff00000a744680: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   22.151944]                                               ^
[   22.152451]  ffff00000a744700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.153104]  ffff00000a744780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.153753] ==================================================================