Hay
Date
June 2, 2025, 2:11 p.m.

Environment
e850-96
qemu-x86_64

[   39.800392] ==================================================================
[   39.807345] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   39.815502] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   39.822880] 
[   39.824363] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   39.824410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.824425] Hardware name: WinLink E850-96 board (DT)
[   39.824443] Call trace:
[   39.824455]  show_stack+0x20/0x38 (C)
[   39.824491]  dump_stack_lvl+0x8c/0xd0
[   39.824524]  print_report+0x118/0x608
[   39.824552]  kasan_report+0xdc/0x128
[   39.824581]  kasan_check_range+0x100/0x1a8
[   39.824610]  __kasan_check_write+0x20/0x30
[   39.824645]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   39.824675]  kasan_bitops_generic+0x110/0x1c8
[   39.824701]  kunit_try_run_case+0x170/0x3f0
[   39.824736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.824773]  kthread+0x328/0x630
[   39.824803]  ret_from_fork+0x10/0x20
[   39.824839] 
[   39.896056] Allocated by task 308:
[   39.899442]  kasan_save_stack+0x3c/0x68
[   39.903261]  kasan_save_track+0x20/0x40
[   39.907080]  kasan_save_alloc_info+0x40/0x58
[   39.911333]  __kasan_kmalloc+0xd4/0xd8
[   39.915066]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.919580]  kasan_bitops_generic+0xa0/0x1c8
[   39.923834]  kunit_try_run_case+0x170/0x3f0
[   39.928000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.933469]  kthread+0x328/0x630
[   39.936680]  ret_from_fork+0x10/0x20
[   39.940240] 
[   39.941715] The buggy address belongs to the object at ffff0008037171e0
[   39.941715]  which belongs to the cache kmalloc-16 of size 16
[   39.954042] The buggy address is located 8 bytes inside of
[   39.954042]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   39.966281] 
[   39.967756] The buggy address belongs to the physical page:
[   39.973314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   39.981299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.987808] page_type: f5(slab)
[   39.990941] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   39.998665] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.006384] page dumped because: kasan: bad access detected
[   40.011939] 
[   40.013415] Memory state around the buggy address:
[   40.018195]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   40.025398]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   40.032602] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   40.039804]                                                           ^
[   40.046404]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.053609]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.060811] ==================================================================
[   40.068194] ==================================================================
[   40.075224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   40.083381] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   40.090671] 
[   40.092156] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   40.092208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.092224] Hardware name: WinLink E850-96 board (DT)
[   40.092244] Call trace:
[   40.092259]  show_stack+0x20/0x38 (C)
[   40.092289]  dump_stack_lvl+0x8c/0xd0
[   40.092322]  print_report+0x118/0x608
[   40.092351]  kasan_report+0xdc/0x128
[   40.092381]  __asan_report_load8_noabort+0x20/0x30
[   40.092415]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   40.092447]  kasan_bitops_generic+0x110/0x1c8
[   40.092475]  kunit_try_run_case+0x170/0x3f0
[   40.092511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.092548]  kthread+0x328/0x630
[   40.092582]  ret_from_fork+0x10/0x20
[   40.092614] 
[   40.160462] Allocated by task 308:
[   40.163849]  kasan_save_stack+0x3c/0x68
[   40.167667]  kasan_save_track+0x20/0x40
[   40.171486]  kasan_save_alloc_info+0x40/0x58
[   40.175739]  __kasan_kmalloc+0xd4/0xd8
[   40.179472]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.183986]  kasan_bitops_generic+0xa0/0x1c8
[   40.188239]  kunit_try_run_case+0x170/0x3f0
[   40.192406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.197874]  kthread+0x328/0x630
[   40.201086]  ret_from_fork+0x10/0x20
[   40.204645] 
[   40.206120] The buggy address belongs to the object at ffff0008037171e0
[   40.206120]  which belongs to the cache kmalloc-16 of size 16
[   40.218448] The buggy address is located 8 bytes inside of
[   40.218448]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   40.230686] 
[   40.232162] The buggy address belongs to the physical page:
[   40.237721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   40.245705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.252215] page_type: f5(slab)
[   40.255349] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.263071] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.270790] page dumped because: kasan: bad access detected
[   40.276345] 
[   40.277821] Memory state around the buggy address:
[   40.282599]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   40.289804]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   40.297008] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   40.304210]                                                           ^
[   40.310810]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.318015]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.325216] ==================================================================
[   41.668529] ==================================================================
[   41.675545] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   41.683703] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   41.690994] 
[   41.692476] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   41.692521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.692540] Hardware name: WinLink E850-96 board (DT)
[   41.692558] Call trace:
[   41.692568]  show_stack+0x20/0x38 (C)
[   41.692598]  dump_stack_lvl+0x8c/0xd0
[   41.692630]  print_report+0x118/0x608
[   41.692659]  kasan_report+0xdc/0x128
[   41.692689]  __asan_report_load8_noabort+0x20/0x30
[   41.692722]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   41.692754]  kasan_bitops_generic+0x110/0x1c8
[   41.692785]  kunit_try_run_case+0x170/0x3f0
[   41.692818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.692855]  kthread+0x328/0x630
[   41.692890]  ret_from_fork+0x10/0x20
[   41.692924] 
[   41.760785] Allocated by task 308:
[   41.764170]  kasan_save_stack+0x3c/0x68
[   41.767990]  kasan_save_track+0x20/0x40
[   41.771809]  kasan_save_alloc_info+0x40/0x58
[   41.776062]  __kasan_kmalloc+0xd4/0xd8
[   41.779795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.784309]  kasan_bitops_generic+0xa0/0x1c8
[   41.788562]  kunit_try_run_case+0x170/0x3f0
[   41.792729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.798198]  kthread+0x328/0x630
[   41.801409]  ret_from_fork+0x10/0x20
[   41.804968] 
[   41.806444] The buggy address belongs to the object at ffff0008037171e0
[   41.806444]  which belongs to the cache kmalloc-16 of size 16
[   41.818771] The buggy address is located 8 bytes inside of
[   41.818771]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   41.831010] 
[   41.832487] The buggy address belongs to the physical page:
[   41.838043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   41.846028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.852539] page_type: f5(slab)
[   41.855671] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.863394] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.871113] page dumped because: kasan: bad access detected
[   41.876668] 
[   41.878144] Memory state around the buggy address:
[   41.882923]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   41.890127]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   41.897332] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   41.904533]                                                           ^
[   41.911133]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.918338]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.925540] ==================================================================
[   40.868353] ==================================================================
[   40.875383] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   40.883541] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   40.890833] 
[   40.892315] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   40.892359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.892375] Hardware name: WinLink E850-96 board (DT)
[   40.892396] Call trace:
[   40.892409]  show_stack+0x20/0x38 (C)
[   40.892440]  dump_stack_lvl+0x8c/0xd0
[   40.892471]  print_report+0x118/0x608
[   40.892499]  kasan_report+0xdc/0x128
[   40.892527]  __asan_report_load8_noabort+0x20/0x30
[   40.892562]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   40.892595]  kasan_bitops_generic+0x110/0x1c8
[   40.892623]  kunit_try_run_case+0x170/0x3f0
[   40.892657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.892696]  kthread+0x328/0x630
[   40.892729]  ret_from_fork+0x10/0x20
[   40.892761] 
[   40.960623] Allocated by task 308:
[   40.964010]  kasan_save_stack+0x3c/0x68
[   40.967828]  kasan_save_track+0x20/0x40
[   40.971648]  kasan_save_alloc_info+0x40/0x58
[   40.975901]  __kasan_kmalloc+0xd4/0xd8
[   40.979634]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.984147]  kasan_bitops_generic+0xa0/0x1c8
[   40.988401]  kunit_try_run_case+0x170/0x3f0
[   40.992567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.998036]  kthread+0x328/0x630
[   41.001248]  ret_from_fork+0x10/0x20
[   41.004807] 
[   41.006282] The buggy address belongs to the object at ffff0008037171e0
[   41.006282]  which belongs to the cache kmalloc-16 of size 16
[   41.018609] The buggy address is located 8 bytes inside of
[   41.018609]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   41.030848] 
[   41.032324] The buggy address belongs to the physical page:
[   41.037879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   41.045867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.052377] page_type: f5(slab)
[   41.055510] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.063232] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.070952] page dumped because: kasan: bad access detected
[   41.076507] 
[   41.077982] Memory state around the buggy address:
[   41.082760]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   41.089966]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   41.097170] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   41.104371]                                                           ^
[   41.110972]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.118177]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.125378] ==================================================================
[   39.535879] ==================================================================
[   39.542940] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   39.551096] Read of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   39.558387] 
[   39.559870] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   39.559918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.559934] Hardware name: WinLink E850-96 board (DT)
[   39.559952] Call trace:
[   39.559965]  show_stack+0x20/0x38 (C)
[   39.559996]  dump_stack_lvl+0x8c/0xd0
[   39.560034]  print_report+0x118/0x608
[   39.560066]  kasan_report+0xdc/0x128
[   39.560096]  __asan_report_load8_noabort+0x20/0x30
[   39.560130]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   39.560160]  kasan_bitops_generic+0x110/0x1c8
[   39.560189]  kunit_try_run_case+0x170/0x3f0
[   39.560223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.560261]  kthread+0x328/0x630
[   39.560293]  ret_from_fork+0x10/0x20
[   39.560327] 
[   39.628178] Allocated by task 308:
[   39.631563]  kasan_save_stack+0x3c/0x68
[   39.635383]  kasan_save_track+0x20/0x40
[   39.639202]  kasan_save_alloc_info+0x40/0x58
[   39.643456]  __kasan_kmalloc+0xd4/0xd8
[   39.647188]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.651702]  kasan_bitops_generic+0xa0/0x1c8
[   39.655956]  kunit_try_run_case+0x170/0x3f0
[   39.660122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.665591]  kthread+0x328/0x630
[   39.668803]  ret_from_fork+0x10/0x20
[   39.672362] 
[   39.673837] The buggy address belongs to the object at ffff0008037171e0
[   39.673837]  which belongs to the cache kmalloc-16 of size 16
[   39.686165] The buggy address is located 8 bytes inside of
[   39.686165]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   39.698403] 
[   39.699878] The buggy address belongs to the physical page:
[   39.705437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   39.713422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.719930] page_type: f5(slab)
[   39.723066] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   39.730787] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   39.738506] page dumped because: kasan: bad access detected
[   39.744062] 
[   39.745537] Memory state around the buggy address:
[   39.750317]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   39.757520]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   39.764725] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   39.771926]                                                           ^
[   39.778527]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.785731]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.792933] ==================================================================
[   39.265705] ==================================================================
[   39.275063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   39.283220] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   39.290597] 
[   39.292079] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   39.292137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.292155] Hardware name: WinLink E850-96 board (DT)
[   39.292177] Call trace:
[   39.292189]  show_stack+0x20/0x38 (C)
[   39.292222]  dump_stack_lvl+0x8c/0xd0
[   39.292259]  print_report+0x118/0x608
[   39.292290]  kasan_report+0xdc/0x128
[   39.292318]  kasan_check_range+0x100/0x1a8
[   39.292351]  __kasan_check_write+0x20/0x30
[   39.292384]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   39.292415]  kasan_bitops_generic+0x110/0x1c8
[   39.292444]  kunit_try_run_case+0x170/0x3f0
[   39.292480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.292517]  kthread+0x328/0x630
[   39.292552]  ret_from_fork+0x10/0x20
[   39.292589] 
[   39.363772] Allocated by task 308:
[   39.367159]  kasan_save_stack+0x3c/0x68
[   39.370977]  kasan_save_track+0x20/0x40
[   39.374796]  kasan_save_alloc_info+0x40/0x58
[   39.379050]  __kasan_kmalloc+0xd4/0xd8
[   39.382783]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.387298]  kasan_bitops_generic+0xa0/0x1c8
[   39.391550]  kunit_try_run_case+0x170/0x3f0
[   39.395716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.401185]  kthread+0x328/0x630
[   39.404397]  ret_from_fork+0x10/0x20
[   39.407955] 
[   39.409434] The buggy address belongs to the object at ffff0008037171e0
[   39.409434]  which belongs to the cache kmalloc-16 of size 16
[   39.421761] The buggy address is located 8 bytes inside of
[   39.421761]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   39.433997] 
[   39.435476] The buggy address belongs to the physical page:
[   39.441032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   39.449016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.455524] page_type: f5(slab)
[   39.458661] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   39.466382] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   39.474100] page dumped because: kasan: bad access detected
[   39.479656] 
[   39.481132] Memory state around the buggy address:
[   39.485914]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   39.493114]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   39.500319] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   39.507520]                                                           ^
[   39.514122]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.521326]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.528527] ==================================================================
[   40.332606] ==================================================================
[   40.339630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   40.347786] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   40.355164] 
[   40.356646] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   40.356690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.356706] Hardware name: WinLink E850-96 board (DT)
[   40.356726] Call trace:
[   40.356739]  show_stack+0x20/0x38 (C)
[   40.356769]  dump_stack_lvl+0x8c/0xd0
[   40.356803]  print_report+0x118/0x608
[   40.356829]  kasan_report+0xdc/0x128
[   40.356856]  kasan_check_range+0x100/0x1a8
[   40.356888]  __kasan_check_write+0x20/0x30
[   40.356918]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   40.356950]  kasan_bitops_generic+0x110/0x1c8
[   40.356978]  kunit_try_run_case+0x170/0x3f0
[   40.357012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.357050]  kthread+0x328/0x630
[   40.357083]  ret_from_fork+0x10/0x20
[   40.357116] 
[   40.428339] Allocated by task 308:
[   40.431725]  kasan_save_stack+0x3c/0x68
[   40.435545]  kasan_save_track+0x20/0x40
[   40.439364]  kasan_save_alloc_info+0x40/0x58
[   40.443617]  __kasan_kmalloc+0xd4/0xd8
[   40.447350]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.451863]  kasan_bitops_generic+0xa0/0x1c8
[   40.456117]  kunit_try_run_case+0x170/0x3f0
[   40.460284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.465752]  kthread+0x328/0x630
[   40.468964]  ret_from_fork+0x10/0x20
[   40.472523] 
[   40.473998] The buggy address belongs to the object at ffff0008037171e0
[   40.473998]  which belongs to the cache kmalloc-16 of size 16
[   40.486325] The buggy address is located 8 bytes inside of
[   40.486325]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   40.498564] 
[   40.500041] The buggy address belongs to the physical page:
[   40.505596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   40.513583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.520093] page_type: f5(slab)
[   40.523226] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.530949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.538668] page dumped because: kasan: bad access detected
[   40.544223] 
[   40.545699] Memory state around the buggy address:
[   40.550477]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   40.557682]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   40.564886] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   40.572087]                                                           ^
[   40.578688]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.585893]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.593094] ==================================================================
[   40.600482] ==================================================================
[   40.607505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   40.615664] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   40.623042] 
[   40.624522] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   40.624568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.624584] Hardware name: WinLink E850-96 board (DT)
[   40.624602] Call trace:
[   40.624614]  show_stack+0x20/0x38 (C)
[   40.624645]  dump_stack_lvl+0x8c/0xd0
[   40.624677]  print_report+0x118/0x608
[   40.624707]  kasan_report+0xdc/0x128
[   40.624737]  kasan_check_range+0x100/0x1a8
[   40.624769]  __kasan_check_write+0x20/0x30
[   40.624801]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   40.624831]  kasan_bitops_generic+0x110/0x1c8
[   40.624858]  kunit_try_run_case+0x170/0x3f0
[   40.624893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.624930]  kthread+0x328/0x630
[   40.624963]  ret_from_fork+0x10/0x20
[   40.624996] 
[   40.696217] Allocated by task 308:
[   40.699605]  kasan_save_stack+0x3c/0x68
[   40.703422]  kasan_save_track+0x20/0x40
[   40.707242]  kasan_save_alloc_info+0x40/0x58
[   40.711495]  __kasan_kmalloc+0xd4/0xd8
[   40.715228]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.719741]  kasan_bitops_generic+0xa0/0x1c8
[   40.723995]  kunit_try_run_case+0x170/0x3f0
[   40.728161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.733630]  kthread+0x328/0x630
[   40.736842]  ret_from_fork+0x10/0x20
[   40.740401] 
[   40.741877] The buggy address belongs to the object at ffff0008037171e0
[   40.741877]  which belongs to the cache kmalloc-16 of size 16
[   40.754203] The buggy address is located 8 bytes inside of
[   40.754203]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   40.766442] 
[   40.767918] The buggy address belongs to the physical page:
[   40.773474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   40.781461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.787971] page_type: f5(slab)
[   40.791105] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.798827] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.806546] page dumped because: kasan: bad access detected
[   40.812101] 
[   40.813577] Memory state around the buggy address:
[   40.818356]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   40.825559]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   40.832764] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   40.839966]                                                           ^
[   40.846566]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.853771]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.860972] ==================================================================
[   41.400660] ==================================================================
[   41.407667] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   41.415825] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   41.423203] 
[   41.424686] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   41.424732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.424751] Hardware name: WinLink E850-96 board (DT)
[   41.424767] Call trace:
[   41.424779]  show_stack+0x20/0x38 (C)
[   41.424810]  dump_stack_lvl+0x8c/0xd0
[   41.424842]  print_report+0x118/0x608
[   41.424872]  kasan_report+0xdc/0x128
[   41.424901]  kasan_check_range+0x100/0x1a8
[   41.424931]  __kasan_check_write+0x20/0x30
[   41.424964]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   41.424995]  kasan_bitops_generic+0x110/0x1c8
[   41.425024]  kunit_try_run_case+0x170/0x3f0
[   41.425056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.425093]  kthread+0x328/0x630
[   41.425125]  ret_from_fork+0x10/0x20
[   41.425156] 
[   41.496379] Allocated by task 308:
[   41.499765]  kasan_save_stack+0x3c/0x68
[   41.503584]  kasan_save_track+0x20/0x40
[   41.507404]  kasan_save_alloc_info+0x40/0x58
[   41.511657]  __kasan_kmalloc+0xd4/0xd8
[   41.515389]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.519903]  kasan_bitops_generic+0xa0/0x1c8
[   41.524156]  kunit_try_run_case+0x170/0x3f0
[   41.528323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.533792]  kthread+0x328/0x630
[   41.537004]  ret_from_fork+0x10/0x20
[   41.540562] 
[   41.542038] The buggy address belongs to the object at ffff0008037171e0
[   41.542038]  which belongs to the cache kmalloc-16 of size 16
[   41.554365] The buggy address is located 8 bytes inside of
[   41.554365]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   41.566604] 
[   41.568080] The buggy address belongs to the physical page:
[   41.573636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   41.581623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.588133] page_type: f5(slab)
[   41.591266] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.598989] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.606708] page dumped because: kasan: bad access detected
[   41.612263] 
[   41.613738] Memory state around the buggy address:
[   41.618517]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   41.625721]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   41.632926] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   41.640127]                                                           ^
[   41.646728]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.653932]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.661134] ==================================================================
[   41.132712] ==================================================================
[   41.139789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   41.147947] Write of size 8 at addr ffff0008037171e8 by task kunit_try_catch/308
[   41.155325] 
[   41.156806] CPU: 4 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   41.156849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.156867] Hardware name: WinLink E850-96 board (DT)
[   41.156887] Call trace:
[   41.156898]  show_stack+0x20/0x38 (C)
[   41.156930]  dump_stack_lvl+0x8c/0xd0
[   41.156964]  print_report+0x118/0x608
[   41.156993]  kasan_report+0xdc/0x128
[   41.157021]  kasan_check_range+0x100/0x1a8
[   41.157053]  __kasan_check_write+0x20/0x30
[   41.157084]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   41.157117]  kasan_bitops_generic+0x110/0x1c8
[   41.157145]  kunit_try_run_case+0x170/0x3f0
[   41.157178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.157216]  kthread+0x328/0x630
[   41.157247]  ret_from_fork+0x10/0x20
[   41.157277] 
[   41.228501] Allocated by task 308:
[   41.231887]  kasan_save_stack+0x3c/0x68
[   41.235706]  kasan_save_track+0x20/0x40
[   41.239526]  kasan_save_alloc_info+0x40/0x58
[   41.243779]  __kasan_kmalloc+0xd4/0xd8
[   41.247511]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.252025]  kasan_bitops_generic+0xa0/0x1c8
[   41.256279]  kunit_try_run_case+0x170/0x3f0
[   41.260445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.265914]  kthread+0x328/0x630
[   41.269126]  ret_from_fork+0x10/0x20
[   41.272685] 
[   41.274160] The buggy address belongs to the object at ffff0008037171e0
[   41.274160]  which belongs to the cache kmalloc-16 of size 16
[   41.286487] The buggy address is located 8 bytes inside of
[   41.286487]  allocated 9-byte region [ffff0008037171e0, ffff0008037171e9)
[   41.298726] 
[   41.300202] The buggy address belongs to the physical page:
[   41.305758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883717
[   41.313745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.320253] page_type: f5(slab)
[   41.323388] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.331111] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.338829] page dumped because: kasan: bad access detected
[   41.344385] 
[   41.345860] Memory state around the buggy address:
[   41.350640]  ffff000803717080: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 05 fc fc
[   41.357843]  ffff000803717100: 00 05 fc fc 00 05 fc fc 00 05 fc fc 00 04 fc fc
[   41.365048] >ffff000803717180: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 01 fc fc
[   41.372249]                                                           ^
[   41.378850]  ffff000803717200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.386055]  ffff000803717280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.393256] ==================================================================

[   19.178598] ==================================================================
[   19.179139] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   19.179780] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.180386] 
[   19.180575] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.180678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.180703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.180744] Call Trace:
[   19.180792]  <TASK>
[   19.180833]  dump_stack_lvl+0x73/0xb0
[   19.180887]  print_report+0xd1/0x650
[   19.180915]  ? __virt_addr_valid+0x1db/0x2d0
[   19.180943]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   19.180969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.181006]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   19.181045]  kasan_report+0x141/0x180
[   19.181086]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   19.181179]  kasan_check_range+0x10c/0x1c0
[   19.181232]  __kasan_check_write+0x18/0x20
[   19.181271]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   19.181337]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.181388]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.181432]  ? trace_hardirqs_on+0x37/0xe0
[   19.181483]  ? kasan_bitops_generic+0x92/0x1c0
[   19.181546]  kasan_bitops_generic+0x116/0x1c0
[   19.181592]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.181658]  ? __pfx_read_tsc+0x10/0x10
[   19.181700]  ? ktime_get_ts64+0x86/0x230
[   19.181762]  kunit_try_run_case+0x1a5/0x480
[   19.181817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.181865]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.181925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.181991]  ? __kthread_parkme+0x82/0x180
[   19.182040]  ? preempt_count_sub+0x50/0x80
[   19.182098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.182192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.182261]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.182309]  kthread+0x337/0x6f0
[   19.182350]  ? trace_preempt_on+0x20/0xc0
[   19.182407]  ? __pfx_kthread+0x10/0x10
[   19.182453]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.182517]  ? calculate_sigpending+0x7b/0xa0
[   19.182560]  ? __pfx_kthread+0x10/0x10
[   19.182585]  ret_from_fork+0x41/0x80
[   19.182611]  ? __pfx_kthread+0x10/0x10
[   19.182631]  ret_from_fork_asm+0x1a/0x30
[   19.182668]  </TASK>
[   19.182685] 
[   19.194882] Allocated by task 282:
[   19.195261]  kasan_save_stack+0x45/0x70
[   19.195726]  kasan_save_track+0x18/0x40
[   19.195999]  kasan_save_alloc_info+0x3b/0x50
[   19.196427]  __kasan_kmalloc+0xb7/0xc0
[   19.196713]  __kmalloc_cache_noprof+0x189/0x420
[   19.196952]  kasan_bitops_generic+0x92/0x1c0
[   19.197228]  kunit_try_run_case+0x1a5/0x480
[   19.197633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.198084]  kthread+0x337/0x6f0
[   19.198395]  ret_from_fork+0x41/0x80
[   19.198703]  ret_from_fork_asm+0x1a/0x30
[   19.199099] 
[   19.199313] The buggy address belongs to the object at ffff888101d9a440
[   19.199313]  which belongs to the cache kmalloc-16 of size 16
[   19.199848] The buggy address is located 8 bytes inside of
[   19.199848]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.200796] 
[   19.200993] The buggy address belongs to the physical page:
[   19.201354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.201817] flags: 0x200000000000000(node=0|zone=2)
[   19.202320] page_type: f5(slab)
[   19.202643] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.203048] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.203558] page dumped because: kasan: bad access detected
[   19.203940] 
[   19.204158] Memory state around the buggy address:
[   19.204472]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.206825]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.207331] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.207959]                                               ^
[   19.208820]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.209346]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.209962] ==================================================================
[   19.138517] ==================================================================
[   19.139174] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   19.140156] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.140522] 
[   19.140781] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.140895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.140928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.140980] Call Trace:
[   19.141013]  <TASK>
[   19.141056]  dump_stack_lvl+0x73/0xb0
[   19.141473]  print_report+0xd1/0x650
[   19.141506]  ? __virt_addr_valid+0x1db/0x2d0
[   19.141537]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   19.141562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.141587]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   19.141613]  kasan_report+0x141/0x180
[   19.141638]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   19.141668]  kasan_check_range+0x10c/0x1c0
[   19.141691]  __kasan_check_write+0x18/0x20
[   19.141713]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   19.141737]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.141784]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.141812]  ? trace_hardirqs_on+0x37/0xe0
[   19.141837]  ? kasan_bitops_generic+0x92/0x1c0
[   19.141864]  kasan_bitops_generic+0x116/0x1c0
[   19.141886]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.141910]  ? __pfx_read_tsc+0x10/0x10
[   19.141934]  ? ktime_get_ts64+0x86/0x230
[   19.141963]  kunit_try_run_case+0x1a5/0x480
[   19.141992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.142014]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.142041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.142066]  ? __kthread_parkme+0x82/0x180
[   19.142089]  ? preempt_count_sub+0x50/0x80
[   19.142143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.142172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.142197]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.142222]  kthread+0x337/0x6f0
[   19.142241]  ? trace_preempt_on+0x20/0xc0
[   19.142266]  ? __pfx_kthread+0x10/0x10
[   19.142286]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.142310]  ? calculate_sigpending+0x7b/0xa0
[   19.142335]  ? __pfx_kthread+0x10/0x10
[   19.142355]  ret_from_fork+0x41/0x80
[   19.142380]  ? __pfx_kthread+0x10/0x10
[   19.142400]  ret_from_fork_asm+0x1a/0x30
[   19.142436]  </TASK>
[   19.142451] 
[   19.162677] Allocated by task 282:
[   19.163097]  kasan_save_stack+0x45/0x70
[   19.163423]  kasan_save_track+0x18/0x40
[   19.163839]  kasan_save_alloc_info+0x3b/0x50
[   19.164321]  __kasan_kmalloc+0xb7/0xc0
[   19.164688]  __kmalloc_cache_noprof+0x189/0x420
[   19.165160]  kasan_bitops_generic+0x92/0x1c0
[   19.165545]  kunit_try_run_case+0x1a5/0x480
[   19.166039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.166561]  kthread+0x337/0x6f0
[   19.166821]  ret_from_fork+0x41/0x80
[   19.167164]  ret_from_fork_asm+0x1a/0x30
[   19.167469] 
[   19.167677] The buggy address belongs to the object at ffff888101d9a440
[   19.167677]  which belongs to the cache kmalloc-16 of size 16
[   19.168510] The buggy address is located 8 bytes inside of
[   19.168510]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.169642] 
[   19.169937] The buggy address belongs to the physical page:
[   19.170491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.170881] flags: 0x200000000000000(node=0|zone=2)
[   19.171189] page_type: f5(slab)
[   19.171421] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.172083] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.172431] page dumped because: kasan: bad access detected
[   19.172792] 
[   19.172971] Memory state around the buggy address:
[   19.173443]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.173905]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.174411] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.174906]                                               ^
[   19.175355]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.175766]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.176256] ==================================================================
[   19.309732] ==================================================================
[   19.310169] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   19.310532] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.312296] 
[   19.312568] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.312690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.312717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.312772] Call Trace:
[   19.312812]  <TASK>
[   19.312846]  dump_stack_lvl+0x73/0xb0
[   19.312914]  print_report+0xd1/0x650
[   19.312952]  ? __virt_addr_valid+0x1db/0x2d0
[   19.312990]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   19.313026]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.313063]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   19.313100]  kasan_report+0x141/0x180
[   19.313139]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   19.313237]  kasan_check_range+0x10c/0x1c0
[   19.313291]  __kasan_check_write+0x18/0x20
[   19.313338]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   19.313391]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.313440]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.313490]  ? trace_hardirqs_on+0x37/0xe0
[   19.313543]  ? kasan_bitops_generic+0x92/0x1c0
[   19.313598]  kasan_bitops_generic+0x116/0x1c0
[   19.313636]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.313662]  ? __pfx_read_tsc+0x10/0x10
[   19.313687]  ? ktime_get_ts64+0x86/0x230
[   19.313715]  kunit_try_run_case+0x1a5/0x480
[   19.313744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.313799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.313827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.313853]  ? __kthread_parkme+0x82/0x180
[   19.313878]  ? preempt_count_sub+0x50/0x80
[   19.313905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.313931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.313956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.313980]  kthread+0x337/0x6f0
[   19.313999]  ? trace_preempt_on+0x20/0xc0
[   19.314023]  ? __pfx_kthread+0x10/0x10
[   19.314043]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.314065]  ? calculate_sigpending+0x7b/0xa0
[   19.314089]  ? __pfx_kthread+0x10/0x10
[   19.314147]  ret_from_fork+0x41/0x80
[   19.314178]  ? __pfx_kthread+0x10/0x10
[   19.314199]  ret_from_fork_asm+0x1a/0x30
[   19.314236]  </TASK>
[   19.314251] 
[   19.328691] Allocated by task 282:
[   19.329058]  kasan_save_stack+0x45/0x70
[   19.329446]  kasan_save_track+0x18/0x40
[   19.329802]  kasan_save_alloc_info+0x3b/0x50
[   19.330314]  __kasan_kmalloc+0xb7/0xc0
[   19.330714]  __kmalloc_cache_noprof+0x189/0x420
[   19.331172]  kasan_bitops_generic+0x92/0x1c0
[   19.331678]  kunit_try_run_case+0x1a5/0x480
[   19.332162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.332616]  kthread+0x337/0x6f0
[   19.332920]  ret_from_fork+0x41/0x80
[   19.333237]  ret_from_fork_asm+0x1a/0x30
[   19.333566] 
[   19.333816] The buggy address belongs to the object at ffff888101d9a440
[   19.333816]  which belongs to the cache kmalloc-16 of size 16
[   19.334611] The buggy address is located 8 bytes inside of
[   19.334611]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.335322] 
[   19.335596] The buggy address belongs to the physical page:
[   19.336085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.336450] flags: 0x200000000000000(node=0|zone=2)
[   19.336875] page_type: f5(slab)
[   19.337226] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.337629] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.338299] page dumped because: kasan: bad access detected
[   19.338566] 
[   19.338781] Memory state around the buggy address:
[   19.339135]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.339734]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.340076] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.340664]                                               ^
[   19.341074]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.341489]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.342031] ==================================================================
[   19.372816] ==================================================================
[   19.373542] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   19.374260] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.374856] 
[   19.375083] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.375243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.375271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.375325] Call Trace:
[   19.375380]  <TASK>
[   19.375426]  dump_stack_lvl+0x73/0xb0
[   19.375501]  print_report+0xd1/0x650
[   19.375561]  ? __virt_addr_valid+0x1db/0x2d0
[   19.375638]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   19.375690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.375738]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   19.375800]  kasan_report+0x141/0x180
[   19.375860]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   19.375939]  kasan_check_range+0x10c/0x1c0
[   19.375984]  __kasan_check_write+0x18/0x20
[   19.376031]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   19.376084]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.376178]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.376226]  ? trace_hardirqs_on+0x37/0xe0
[   19.376277]  ? kasan_bitops_generic+0x92/0x1c0
[   19.376340]  kasan_bitops_generic+0x116/0x1c0
[   19.376406]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.376453]  ? __pfx_read_tsc+0x10/0x10
[   19.376496]  ? ktime_get_ts64+0x86/0x230
[   19.376553]  kunit_try_run_case+0x1a5/0x480
[   19.376615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.376677]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.376733]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.376793]  ? __kthread_parkme+0x82/0x180
[   19.376852]  ? preempt_count_sub+0x50/0x80
[   19.376926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.376982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.377036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.377090]  kthread+0x337/0x6f0
[   19.377177]  ? trace_preempt_on+0x20/0xc0
[   19.377240]  ? __pfx_kthread+0x10/0x10
[   19.377299]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.377327]  ? calculate_sigpending+0x7b/0xa0
[   19.377354]  ? __pfx_kthread+0x10/0x10
[   19.377390]  ret_from_fork+0x41/0x80
[   19.377435]  ? __pfx_kthread+0x10/0x10
[   19.377467]  ret_from_fork_asm+0x1a/0x30
[   19.377529]  </TASK>
[   19.377555] 
[   19.388377] Allocated by task 282:
[   19.388773]  kasan_save_stack+0x45/0x70
[   19.389192]  kasan_save_track+0x18/0x40
[   19.389515]  kasan_save_alloc_info+0x3b/0x50
[   19.389809]  __kasan_kmalloc+0xb7/0xc0
[   19.390016]  __kmalloc_cache_noprof+0x189/0x420
[   19.390282]  kasan_bitops_generic+0x92/0x1c0
[   19.390672]  kunit_try_run_case+0x1a5/0x480
[   19.391078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.391541]  kthread+0x337/0x6f0
[   19.391888]  ret_from_fork+0x41/0x80
[   19.392277]  ret_from_fork_asm+0x1a/0x30
[   19.392577] 
[   19.392710] The buggy address belongs to the object at ffff888101d9a440
[   19.392710]  which belongs to the cache kmalloc-16 of size 16
[   19.393193] The buggy address is located 8 bytes inside of
[   19.393193]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.393621] 
[   19.393763] The buggy address belongs to the physical page:
[   19.394248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.394897] flags: 0x200000000000000(node=0|zone=2)
[   19.395359] page_type: f5(slab)
[   19.395711] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.396357] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.396980] page dumped because: kasan: bad access detected
[   19.397461] 
[   19.397671] Memory state around the buggy address:
[   19.397972]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.398427]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.398877] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.399365]                                               ^
[   19.399635]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.400161]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.400728] ==================================================================
[   19.243555] ==================================================================
[   19.244068] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   19.244728] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.246237] 
[   19.246526] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.246639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.246669] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.246714] Call Trace:
[   19.246768]  <TASK>
[   19.246814]  dump_stack_lvl+0x73/0xb0
[   19.246899]  print_report+0xd1/0x650
[   19.246956]  ? __virt_addr_valid+0x1db/0x2d0
[   19.247013]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   19.247066]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.247550]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   19.247646]  kasan_report+0x141/0x180
[   19.247692]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   19.247739]  kasan_check_range+0x10c/0x1c0
[   19.247789]  __kasan_check_write+0x18/0x20
[   19.247822]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   19.247858]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.247896]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.247932]  ? trace_hardirqs_on+0x37/0xe0
[   19.247968]  ? kasan_bitops_generic+0x92/0x1c0
[   19.248010]  kasan_bitops_generic+0x116/0x1c0
[   19.248047]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.248086]  ? __pfx_read_tsc+0x10/0x10
[   19.248124]  ? ktime_get_ts64+0x86/0x230
[   19.248170]  kunit_try_run_case+0x1a5/0x480
[   19.248207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.248232]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.248260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.248285]  ? __kthread_parkme+0x82/0x180
[   19.248309]  ? preempt_count_sub+0x50/0x80
[   19.248337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.248363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.248388]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.248412]  kthread+0x337/0x6f0
[   19.248431]  ? trace_preempt_on+0x20/0xc0
[   19.248455]  ? __pfx_kthread+0x10/0x10
[   19.248476]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.248498]  ? calculate_sigpending+0x7b/0xa0
[   19.248523]  ? __pfx_kthread+0x10/0x10
[   19.248543]  ret_from_fork+0x41/0x80
[   19.248566]  ? __pfx_kthread+0x10/0x10
[   19.248585]  ret_from_fork_asm+0x1a/0x30
[   19.248622]  </TASK>
[   19.248637] 
[   19.262894] Allocated by task 282:
[   19.263486]  kasan_save_stack+0x45/0x70
[   19.263945]  kasan_save_track+0x18/0x40
[   19.264413]  kasan_save_alloc_info+0x3b/0x50
[   19.264909]  __kasan_kmalloc+0xb7/0xc0
[   19.265293]  __kmalloc_cache_noprof+0x189/0x420
[   19.265529]  kasan_bitops_generic+0x92/0x1c0
[   19.265695]  kunit_try_run_case+0x1a5/0x480
[   19.265944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.266862]  kthread+0x337/0x6f0
[   19.267461]  ret_from_fork+0x41/0x80
[   19.267695]  ret_from_fork_asm+0x1a/0x30
[   19.267909] 
[   19.268028] The buggy address belongs to the object at ffff888101d9a440
[   19.268028]  which belongs to the cache kmalloc-16 of size 16
[   19.269449] The buggy address is located 8 bytes inside of
[   19.269449]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.270486] 
[   19.270642] The buggy address belongs to the physical page:
[   19.271093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.271914] flags: 0x200000000000000(node=0|zone=2)
[   19.272418] page_type: f5(slab)
[   19.272608] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.272930] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.274063] page dumped because: kasan: bad access detected
[   19.274384] 
[   19.274504] Memory state around the buggy address:
[   19.274823]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.275643]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.276459] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.276825]                                               ^
[   19.277286]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.278234]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.278600] ==================================================================
[   19.343645] ==================================================================
[   19.344418] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   19.344957] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.345496] 
[   19.345693] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.345840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.345867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.345920] Call Trace:
[   19.345971]  <TASK>
[   19.346007]  dump_stack_lvl+0x73/0xb0
[   19.346066]  print_report+0xd1/0x650
[   19.346139]  ? __virt_addr_valid+0x1db/0x2d0
[   19.346191]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   19.346239]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.346290]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   19.346337]  kasan_report+0x141/0x180
[   19.346384]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   19.346448]  kasan_check_range+0x10c/0x1c0
[   19.346495]  __kasan_check_write+0x18/0x20
[   19.346543]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   19.346596]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.346652]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.346688]  ? trace_hardirqs_on+0x37/0xe0
[   19.346768]  ? kasan_bitops_generic+0x92/0x1c0
[   19.346811]  kasan_bitops_generic+0x116/0x1c0
[   19.346844]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.346879]  ? __pfx_read_tsc+0x10/0x10
[   19.346914]  ? ktime_get_ts64+0x86/0x230
[   19.346960]  kunit_try_run_case+0x1a5/0x480
[   19.347012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.347054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.347141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.347197]  ? __kthread_parkme+0x82/0x180
[   19.347249]  ? preempt_count_sub+0x50/0x80
[   19.347309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.347365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.347417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.347468]  kthread+0x337/0x6f0
[   19.347509]  ? trace_preempt_on+0x20/0xc0
[   19.347562]  ? __pfx_kthread+0x10/0x10
[   19.347598]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.347650]  ? calculate_sigpending+0x7b/0xa0
[   19.347688]  ? __pfx_kthread+0x10/0x10
[   19.347711]  ret_from_fork+0x41/0x80
[   19.347735]  ? __pfx_kthread+0x10/0x10
[   19.347782]  ret_from_fork_asm+0x1a/0x30
[   19.347821]  </TASK>
[   19.347837] 
[   19.359367] Allocated by task 282:
[   19.359781]  kasan_save_stack+0x45/0x70
[   19.360156]  kasan_save_track+0x18/0x40
[   19.360370]  kasan_save_alloc_info+0x3b/0x50
[   19.360702]  __kasan_kmalloc+0xb7/0xc0
[   19.361071]  __kmalloc_cache_noprof+0x189/0x420
[   19.361505]  kasan_bitops_generic+0x92/0x1c0
[   19.361887]  kunit_try_run_case+0x1a5/0x480
[   19.362211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.362610]  kthread+0x337/0x6f0
[   19.362938]  ret_from_fork+0x41/0x80
[   19.363324]  ret_from_fork_asm+0x1a/0x30
[   19.363587] 
[   19.363733] The buggy address belongs to the object at ffff888101d9a440
[   19.363733]  which belongs to the cache kmalloc-16 of size 16
[   19.364231] The buggy address is located 8 bytes inside of
[   19.364231]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.364655] 
[   19.364813] The buggy address belongs to the physical page:
[   19.365372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.366064] flags: 0x200000000000000(node=0|zone=2)
[   19.366518] page_type: f5(slab)
[   19.366841] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.367488] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.368151] page dumped because: kasan: bad access detected
[   19.368503] 
[   19.368711] Memory state around the buggy address:
[   19.369012]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.369525]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.369969] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.370417]                                               ^
[   19.370862]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.371314]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.371599] ==================================================================
[   19.211716] ==================================================================
[   19.212483] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   19.213304] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.213995] 
[   19.214293] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.214408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.214438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.214482] Call Trace:
[   19.214532]  <TASK>
[   19.214590]  dump_stack_lvl+0x73/0xb0
[   19.214664]  print_report+0xd1/0x650
[   19.214716]  ? __virt_addr_valid+0x1db/0x2d0
[   19.214775]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   19.214833]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.214902]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   19.214948]  kasan_report+0x141/0x180
[   19.214994]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   19.215054]  kasan_check_range+0x10c/0x1c0
[   19.215140]  __kasan_check_write+0x18/0x20
[   19.215205]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   19.215253]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.215291]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.215319]  ? trace_hardirqs_on+0x37/0xe0
[   19.215345]  ? kasan_bitops_generic+0x92/0x1c0
[   19.215372]  kasan_bitops_generic+0x116/0x1c0
[   19.215397]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.215435]  ? __pfx_read_tsc+0x10/0x10
[   19.215473]  ? ktime_get_ts64+0x86/0x230
[   19.215506]  kunit_try_run_case+0x1a5/0x480
[   19.215535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.215558]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.215585]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.215610]  ? __kthread_parkme+0x82/0x180
[   19.215654]  ? preempt_count_sub+0x50/0x80
[   19.215683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.215710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.215734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.215782]  kthread+0x337/0x6f0
[   19.215805]  ? trace_preempt_on+0x20/0xc0
[   19.215829]  ? __pfx_kthread+0x10/0x10
[   19.215849]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.215872]  ? calculate_sigpending+0x7b/0xa0
[   19.215896]  ? __pfx_kthread+0x10/0x10
[   19.215917]  ret_from_fork+0x41/0x80
[   19.215940]  ? __pfx_kthread+0x10/0x10
[   19.215961]  ret_from_fork_asm+0x1a/0x30
[   19.215997]  </TASK>
[   19.216012] 
[   19.230573] Allocated by task 282:
[   19.230859]  kasan_save_stack+0x45/0x70
[   19.231294]  kasan_save_track+0x18/0x40
[   19.231562]  kasan_save_alloc_info+0x3b/0x50
[   19.231800]  __kasan_kmalloc+0xb7/0xc0
[   19.232136]  __kmalloc_cache_noprof+0x189/0x420
[   19.232529]  kasan_bitops_generic+0x92/0x1c0
[   19.232933]  kunit_try_run_case+0x1a5/0x480
[   19.233329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.233571]  kthread+0x337/0x6f0
[   19.233763]  ret_from_fork+0x41/0x80
[   19.233958]  ret_from_fork_asm+0x1a/0x30
[   19.234246] 
[   19.234381] The buggy address belongs to the object at ffff888101d9a440
[   19.234381]  which belongs to the cache kmalloc-16 of size 16
[   19.235088] The buggy address is located 8 bytes inside of
[   19.235088]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.235783] 
[   19.235918] The buggy address belongs to the physical page:
[   19.236397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.236844] flags: 0x200000000000000(node=0|zone=2)
[   19.237243] page_type: f5(slab)
[   19.237453] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.238021] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.238382] page dumped because: kasan: bad access detected
[   19.238769] 
[   19.238950] Memory state around the buggy address:
[   19.239387]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.239788]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.240240] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.240760]                                               ^
[   19.241130]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.241531]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.241890] ==================================================================
[   19.280698] ==================================================================
[   19.281454] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   19.282132] Write of size 8 at addr ffff888101d9a448 by task kunit_try_catch/282
[   19.282797] 
[   19.282995] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   19.283083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.283100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.283139] Call Trace:
[   19.283165]  <TASK>
[   19.283191]  dump_stack_lvl+0x73/0xb0
[   19.283237]  print_report+0xd1/0x650
[   19.283263]  ? __virt_addr_valid+0x1db/0x2d0
[   19.283289]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   19.283314]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.283339]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   19.283363]  kasan_report+0x141/0x180
[   19.283388]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   19.283417]  kasan_check_range+0x10c/0x1c0
[   19.283440]  __kasan_check_write+0x18/0x20
[   19.283462]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   19.283486]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   19.283511]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.283535]  ? trace_hardirqs_on+0x37/0xe0
[   19.283561]  ? kasan_bitops_generic+0x92/0x1c0
[   19.283587]  kasan_bitops_generic+0x116/0x1c0
[   19.283609]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   19.283647]  ? __pfx_read_tsc+0x10/0x10
[   19.283673]  ? ktime_get_ts64+0x86/0x230
[   19.283701]  kunit_try_run_case+0x1a5/0x480
[   19.283730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.283765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.283795]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.283820]  ? __kthread_parkme+0x82/0x180
[   19.283844]  ? preempt_count_sub+0x50/0x80
[   19.283872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.283897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.283922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.283946]  kthread+0x337/0x6f0
[   19.283965]  ? trace_preempt_on+0x20/0xc0
[   19.283990]  ? __pfx_kthread+0x10/0x10
[   19.284010]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.284032]  ? calculate_sigpending+0x7b/0xa0
[   19.284056]  ? __pfx_kthread+0x10/0x10
[   19.284077]  ret_from_fork+0x41/0x80
[   19.284103]  ? __pfx_kthread+0x10/0x10
[   19.284140]  ret_from_fork_asm+0x1a/0x30
[   19.284196]  </TASK>
[   19.284219] 
[   19.296436] Allocated by task 282:
[   19.296852]  kasan_save_stack+0x45/0x70
[   19.297248]  kasan_save_track+0x18/0x40
[   19.297558]  kasan_save_alloc_info+0x3b/0x50
[   19.297778]  __kasan_kmalloc+0xb7/0xc0
[   19.298055]  __kmalloc_cache_noprof+0x189/0x420
[   19.298463]  kasan_bitops_generic+0x92/0x1c0
[   19.298840]  kunit_try_run_case+0x1a5/0x480
[   19.299085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.299365]  kthread+0x337/0x6f0
[   19.299551]  ret_from_fork+0x41/0x80
[   19.299906]  ret_from_fork_asm+0x1a/0x30
[   19.300291] 
[   19.300491] The buggy address belongs to the object at ffff888101d9a440
[   19.300491]  which belongs to the cache kmalloc-16 of size 16
[   19.301171] The buggy address is located 8 bytes inside of
[   19.301171]  allocated 9-byte region [ffff888101d9a440, ffff888101d9a449)
[   19.302031] 
[   19.302233] The buggy address belongs to the physical page:
[   19.302577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101d9a
[   19.303151] flags: 0x200000000000000(node=0|zone=2)
[   19.303453] page_type: f5(slab)
[   19.303705] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   19.304177] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   19.304480] page dumped because: kasan: bad access detected
[   19.304776] 
[   19.304957] Memory state around the buggy address:
[   19.305403]  ffff888101d9a300: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc
[   19.305953]  ffff888101d9a380: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.306527] >ffff888101d9a400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   19.306817]                                               ^
[   19.307298]  ffff888101d9a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.307722]  ffff888101d9a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.308191] ==================================================================