Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   42.984018] ==================================================================
[   42.991048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   42.999205] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   43.006496] 
[   43.007980] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   43.008033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.008051] Hardware name: WinLink E850-96 board (DT)
[   43.008071] Call trace:
[   43.008084]  show_stack+0x20/0x38 (C)
[   43.008119]  dump_stack_lvl+0x8c/0xd0
[   43.008159]  print_report+0x118/0x608
[   43.008191]  kasan_report+0xdc/0x128
[   43.008219]  __asan_report_load8_noabort+0x20/0x30
[   43.008255]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   43.008289]  kasan_bitops_generic+0x110/0x1c8
[   43.008319]  kunit_try_run_case+0x170/0x3f0
[   43.008358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.008397]  kthread+0x328/0x630
[   43.008433]  ret_from_fork+0x10/0x20
[   43.008470] 
[   43.076286] Allocated by task 310:
[   43.079672]  kasan_save_stack+0x3c/0x68
[   43.083491]  kasan_save_track+0x20/0x40
[   43.087310]  kasan_save_alloc_info+0x40/0x58
[   43.091564]  __kasan_kmalloc+0xd4/0xd8
[   43.095296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.099810]  kasan_bitops_generic+0xa0/0x1c8
[   43.104063]  kunit_try_run_case+0x170/0x3f0
[   43.108230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.113699]  kthread+0x328/0x630
[   43.116911]  ret_from_fork+0x10/0x20
[   43.120470] 
[   43.121945] The buggy address belongs to the object at ffff000802e0b440
[   43.121945]  which belongs to the cache kmalloc-16 of size 16
[   43.134273] The buggy address is located 8 bytes inside of
[   43.134273]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   43.146511] 
[   43.147989] The buggy address belongs to the physical page:
[   43.153546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   43.161530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.168039] page_type: f5(slab)
[   43.171176] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.178896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.186614] page dumped because: kasan: bad access detected
[   43.192170] 
[   43.193646] Memory state around the buggy address:
[   43.198426]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   43.205630]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   43.212834] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   43.220034]                                               ^
[   43.225595]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.232798]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.240000] ==================================================================
[   41.387629] ==================================================================
[   41.396976] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.405133] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   41.412509] 
[   41.413995] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   41.414056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.414074] Hardware name: WinLink E850-96 board (DT)
[   41.414098] Call trace:
[   41.414114]  show_stack+0x20/0x38 (C)
[   41.414154]  dump_stack_lvl+0x8c/0xd0
[   41.414195]  print_report+0x118/0x608
[   41.414230]  kasan_report+0xdc/0x128
[   41.414260]  kasan_check_range+0x100/0x1a8
[   41.414294]  __kasan_check_write+0x20/0x30
[   41.414328]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   41.414364]  kasan_bitops_generic+0x110/0x1c8
[   41.414398]  kunit_try_run_case+0x170/0x3f0
[   41.414439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.414478]  kthread+0x328/0x630
[   41.414516]  ret_from_fork+0x10/0x20
[   41.414556] 
[   41.485685] Allocated by task 310:
[   41.489075]  kasan_save_stack+0x3c/0x68
[   41.492890]  kasan_save_track+0x20/0x40
[   41.496709]  kasan_save_alloc_info+0x40/0x58
[   41.500963]  __kasan_kmalloc+0xd4/0xd8
[   41.504695]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.509209]  kasan_bitops_generic+0xa0/0x1c8
[   41.513464]  kunit_try_run_case+0x170/0x3f0
[   41.517629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.523098]  kthread+0x328/0x630
[   41.526310]  ret_from_fork+0x10/0x20
[   41.529869] 
[   41.531347] The buggy address belongs to the object at ffff000802e0b440
[   41.531347]  which belongs to the cache kmalloc-16 of size 16
[   41.543673] The buggy address is located 8 bytes inside of
[   41.543673]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   41.555910] 
[   41.557390] The buggy address belongs to the physical page:
[   41.562946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   41.570929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.577439] page_type: f5(slab)
[   41.580578] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.588295] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.596013] page dumped because: kasan: bad access detected
[   41.601570] 
[   41.603046] Memory state around the buggy address:
[   41.607827]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   41.615028]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   41.622232] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   41.629433]                                               ^
[   41.634992]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.642197]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.649400] ==================================================================
[   41.920181] ==================================================================
[   41.927176] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   41.935331] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   41.942710] 
[   41.944193] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   41.944247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.944264] Hardware name: WinLink E850-96 board (DT)
[   41.944286] Call trace:
[   41.944298]  show_stack+0x20/0x38 (C)
[   41.944330]  dump_stack_lvl+0x8c/0xd0
[   41.944368]  print_report+0x118/0x608
[   41.944399]  kasan_report+0xdc/0x128
[   41.944428]  kasan_check_range+0x100/0x1a8
[   41.944463]  __kasan_check_write+0x20/0x30
[   41.944496]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   41.944529]  kasan_bitops_generic+0x110/0x1c8
[   41.944558]  kunit_try_run_case+0x170/0x3f0
[   41.944598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.944640]  kthread+0x328/0x630
[   41.944675]  ret_from_fork+0x10/0x20
[   41.944708] 
[   42.015886] Allocated by task 310:
[   42.019274]  kasan_save_stack+0x3c/0x68
[   42.023090]  kasan_save_track+0x20/0x40
[   42.026910]  kasan_save_alloc_info+0x40/0x58
[   42.031163]  __kasan_kmalloc+0xd4/0xd8
[   42.034896]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.039410]  kasan_bitops_generic+0xa0/0x1c8
[   42.043663]  kunit_try_run_case+0x170/0x3f0
[   42.047830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.053298]  kthread+0x328/0x630
[   42.056510]  ret_from_fork+0x10/0x20
[   42.060069] 
[   42.061544] The buggy address belongs to the object at ffff000802e0b440
[   42.061544]  which belongs to the cache kmalloc-16 of size 16
[   42.073871] The buggy address is located 8 bytes inside of
[   42.073871]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   42.086110] 
[   42.087588] The buggy address belongs to the physical page:
[   42.093145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   42.101129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.107638] page_type: f5(slab)
[   42.110776] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.118495] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.126214] page dumped because: kasan: bad access detected
[   42.131769] 
[   42.133245] Memory state around the buggy address:
[   42.138025]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   42.145228]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   42.152433] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   42.159634]                                               ^
[   42.165193]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.172398]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.179599] ==================================================================
[   43.247315] ==================================================================
[   43.254412] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.262569] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   43.269947] 
[   43.271430] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   43.271484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.271503] Hardware name: WinLink E850-96 board (DT)
[   43.271524] Call trace:
[   43.271536]  show_stack+0x20/0x38 (C)
[   43.271572]  dump_stack_lvl+0x8c/0xd0
[   43.271612]  print_report+0x118/0x608
[   43.271643]  kasan_report+0xdc/0x128
[   43.271672]  kasan_check_range+0x100/0x1a8
[   43.271706]  __kasan_check_write+0x20/0x30
[   43.271738]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   43.271772]  kasan_bitops_generic+0x110/0x1c8
[   43.271802]  kunit_try_run_case+0x170/0x3f0
[   43.271839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.271878]  kthread+0x328/0x630
[   43.271912]  ret_from_fork+0x10/0x20
[   43.271945] 
[   43.343122] Allocated by task 310:
[   43.346510]  kasan_save_stack+0x3c/0x68
[   43.350327]  kasan_save_track+0x20/0x40
[   43.354147]  kasan_save_alloc_info+0x40/0x58
[   43.358400]  __kasan_kmalloc+0xd4/0xd8
[   43.362133]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.366647]  kasan_bitops_generic+0xa0/0x1c8
[   43.370900]  kunit_try_run_case+0x170/0x3f0
[   43.375066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.380535]  kthread+0x328/0x630
[   43.383747]  ret_from_fork+0x10/0x20
[   43.387306] 
[   43.388782] The buggy address belongs to the object at ffff000802e0b440
[   43.388782]  which belongs to the cache kmalloc-16 of size 16
[   43.401108] The buggy address is located 8 bytes inside of
[   43.401108]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   43.413347] 
[   43.414825] The buggy address belongs to the physical page:
[   43.420382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   43.428366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.434875] page_type: f5(slab)
[   43.438013] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.445732] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.453451] page dumped because: kasan: bad access detected
[   43.459006] 
[   43.460482] Memory state around the buggy address:
[   43.465264]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   43.472465]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   43.479671] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   43.486871]                                               ^
[   43.492431]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.499635]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.506836] ==================================================================
[   43.780993] ==================================================================
[   43.788084] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.796241] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   43.803532] 
[   43.805015] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   43.805066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.805081] Hardware name: WinLink E850-96 board (DT)
[   43.805101] Call trace:
[   43.805114]  show_stack+0x20/0x38 (C)
[   43.805146]  dump_stack_lvl+0x8c/0xd0
[   43.805186]  print_report+0x118/0x608
[   43.805215]  kasan_report+0xdc/0x128
[   43.805245]  __asan_report_load8_noabort+0x20/0x30
[   43.805282]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   43.805314]  kasan_bitops_generic+0x110/0x1c8
[   43.805345]  kunit_try_run_case+0x170/0x3f0
[   43.805382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.805421]  kthread+0x328/0x630
[   43.805455]  ret_from_fork+0x10/0x20
[   43.805491] 
[   43.873323] Allocated by task 310:
[   43.876709]  kasan_save_stack+0x3c/0x68
[   43.880528]  kasan_save_track+0x20/0x40
[   43.884347]  kasan_save_alloc_info+0x40/0x58
[   43.888600]  __kasan_kmalloc+0xd4/0xd8
[   43.892333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.896847]  kasan_bitops_generic+0xa0/0x1c8
[   43.901100]  kunit_try_run_case+0x170/0x3f0
[   43.905267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.910736]  kthread+0x328/0x630
[   43.913947]  ret_from_fork+0x10/0x20
[   43.917507] 
[   43.918981] The buggy address belongs to the object at ffff000802e0b440
[   43.918981]  which belongs to the cache kmalloc-16 of size 16
[   43.931308] The buggy address is located 8 bytes inside of
[   43.931308]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   43.943548] 
[   43.945024] The buggy address belongs to the physical page:
[   43.950582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   43.958567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.965075] page_type: f5(slab)
[   43.968210] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.975932] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.983651] page dumped because: kasan: bad access detected
[   43.989206] 
[   43.990682] Memory state around the buggy address:
[   43.995463]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   44.002665]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   44.009870] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   44.017071]                                               ^
[   44.022630]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.029835]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.037036] ==================================================================
[   42.717119] ==================================================================
[   42.724212] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.732368] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   42.739746] 
[   42.741229] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   42.741285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.741304] Hardware name: WinLink E850-96 board (DT)
[   42.741323] Call trace:
[   42.741336]  show_stack+0x20/0x38 (C)
[   42.741370]  dump_stack_lvl+0x8c/0xd0
[   42.741410]  print_report+0x118/0x608
[   42.741440]  kasan_report+0xdc/0x128
[   42.741471]  kasan_check_range+0x100/0x1a8
[   42.741504]  __kasan_check_write+0x20/0x30
[   42.741539]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   42.741573]  kasan_bitops_generic+0x110/0x1c8
[   42.741604]  kunit_try_run_case+0x170/0x3f0
[   42.741642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.741682]  kthread+0x328/0x630
[   42.741716]  ret_from_fork+0x10/0x20
[   42.741750] 
[   42.812921] Allocated by task 310:
[   42.816308]  kasan_save_stack+0x3c/0x68
[   42.820127]  kasan_save_track+0x20/0x40
[   42.823947]  kasan_save_alloc_info+0x40/0x58
[   42.828200]  __kasan_kmalloc+0xd4/0xd8
[   42.831933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.836446]  kasan_bitops_generic+0xa0/0x1c8
[   42.840700]  kunit_try_run_case+0x170/0x3f0
[   42.844866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.850334]  kthread+0x328/0x630
[   42.853546]  ret_from_fork+0x10/0x20
[   42.857106] 
[   42.858581] The buggy address belongs to the object at ffff000802e0b440
[   42.858581]  which belongs to the cache kmalloc-16 of size 16
[   42.870909] The buggy address is located 8 bytes inside of
[   42.870909]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   42.883147] 
[   42.884625] The buggy address belongs to the physical page:
[   42.890182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   42.898166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.904674] page_type: f5(slab)
[   42.907812] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.915532] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.923251] page dumped because: kasan: bad access detected
[   42.928806] 
[   42.930281] Memory state around the buggy address:
[   42.935064]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   42.942267]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   42.949471] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   42.956670]                                               ^
[   42.962231]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.969435]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.976635] ==================================================================
[   42.450507] ==================================================================
[   42.457375] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.465532] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   42.472910] 
[   42.474395] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   42.474449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.474467] Hardware name: WinLink E850-96 board (DT)
[   42.474489] Call trace:
[   42.474502]  show_stack+0x20/0x38 (C)
[   42.474536]  dump_stack_lvl+0x8c/0xd0
[   42.474575]  print_report+0x118/0x608
[   42.474608]  kasan_report+0xdc/0x128
[   42.474638]  kasan_check_range+0x100/0x1a8
[   42.474671]  __kasan_check_write+0x20/0x30
[   42.474707]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   42.474740]  kasan_bitops_generic+0x110/0x1c8
[   42.474771]  kunit_try_run_case+0x170/0x3f0
[   42.474808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.474849]  kthread+0x328/0x630
[   42.474886]  ret_from_fork+0x10/0x20
[   42.474918] 
[   42.546086] Allocated by task 310:
[   42.549472]  kasan_save_stack+0x3c/0x68
[   42.553291]  kasan_save_track+0x20/0x40
[   42.557110]  kasan_save_alloc_info+0x40/0x58
[   42.561364]  __kasan_kmalloc+0xd4/0xd8
[   42.565096]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.569610]  kasan_bitops_generic+0xa0/0x1c8
[   42.573863]  kunit_try_run_case+0x170/0x3f0
[   42.578030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.583498]  kthread+0x328/0x630
[   42.586711]  ret_from_fork+0x10/0x20
[   42.590269] 
[   42.591745] The buggy address belongs to the object at ffff000802e0b440
[   42.591745]  which belongs to the cache kmalloc-16 of size 16
[   42.604073] The buggy address is located 8 bytes inside of
[   42.604073]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   42.616311] 
[   42.617789] The buggy address belongs to the physical page:
[   42.623346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   42.631330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.637838] page_type: f5(slab)
[   42.640975] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.648695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.656414] page dumped because: kasan: bad access detected
[   42.661969] 
[   42.663445] Memory state around the buggy address:
[   42.668228]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   42.675430]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   42.682635] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   42.689834]                                               ^
[   42.695393]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.702599]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.709799] ==================================================================
[   43.514165] ==================================================================
[   43.521248] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.529405] Write of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   43.536783] 
[   43.538267] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   43.538318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.538336] Hardware name: WinLink E850-96 board (DT)
[   43.538357] Call trace:
[   43.538371]  show_stack+0x20/0x38 (C)
[   43.538405]  dump_stack_lvl+0x8c/0xd0
[   43.538443]  print_report+0x118/0x608
[   43.538472]  kasan_report+0xdc/0x128
[   43.538502]  kasan_check_range+0x100/0x1a8
[   43.538535]  __kasan_check_write+0x20/0x30
[   43.538567]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   43.538600]  kasan_bitops_generic+0x110/0x1c8
[   43.538629]  kunit_try_run_case+0x170/0x3f0
[   43.538666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.538705]  kthread+0x328/0x630
[   43.538739]  ret_from_fork+0x10/0x20
[   43.538773] 
[   43.609959] Allocated by task 310:
[   43.613346]  kasan_save_stack+0x3c/0x68
[   43.617163]  kasan_save_track+0x20/0x40
[   43.620983]  kasan_save_alloc_info+0x40/0x58
[   43.625236]  __kasan_kmalloc+0xd4/0xd8
[   43.628969]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.633483]  kasan_bitops_generic+0xa0/0x1c8
[   43.637736]  kunit_try_run_case+0x170/0x3f0
[   43.641903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.647371]  kthread+0x328/0x630
[   43.650583]  ret_from_fork+0x10/0x20
[   43.654143] 
[   43.655618] The buggy address belongs to the object at ffff000802e0b440
[   43.655618]  which belongs to the cache kmalloc-16 of size 16
[   43.667944] The buggy address is located 8 bytes inside of
[   43.667944]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   43.680184] 
[   43.681661] The buggy address belongs to the physical page:
[   43.687218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   43.695203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.701712] page_type: f5(slab)
[   43.704846] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   43.712568] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   43.720287] page dumped because: kasan: bad access detected
[   43.725842] 
[   43.727318] Memory state around the buggy address:
[   43.732098]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   43.739302]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   43.746507] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   43.753707]                                               ^
[   43.759267]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.766472]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.773672] ==================================================================
[   42.187051] ==================================================================
[   42.194012] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.202168] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   42.209459] 
[   42.210944] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   42.211003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.211022] Hardware name: WinLink E850-96 board (DT)
[   42.211042] Call trace:
[   42.211056]  show_stack+0x20/0x38 (C)
[   42.211090]  dump_stack_lvl+0x8c/0xd0
[   42.211133]  print_report+0x118/0x608
[   42.211165]  kasan_report+0xdc/0x128
[   42.211197]  __asan_report_load8_noabort+0x20/0x30
[   42.211235]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   42.211268]  kasan_bitops_generic+0x110/0x1c8
[   42.211298]  kunit_try_run_case+0x170/0x3f0
[   42.211338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.211379]  kthread+0x328/0x630
[   42.211416]  ret_from_fork+0x10/0x20
[   42.211450] 
[   42.279251] Allocated by task 310:
[   42.282637]  kasan_save_stack+0x3c/0x68
[   42.286454]  kasan_save_track+0x20/0x40
[   42.290274]  kasan_save_alloc_info+0x40/0x58
[   42.294527]  __kasan_kmalloc+0xd4/0xd8
[   42.298260]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.302774]  kasan_bitops_generic+0xa0/0x1c8
[   42.307027]  kunit_try_run_case+0x170/0x3f0
[   42.311194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.316662]  kthread+0x328/0x630
[   42.319875]  ret_from_fork+0x10/0x20
[   42.323434] 
[   42.324909] The buggy address belongs to the object at ffff000802e0b440
[   42.324909]  which belongs to the cache kmalloc-16 of size 16
[   42.337237] The buggy address is located 8 bytes inside of
[   42.337237]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   42.349474] 
[   42.350953] The buggy address belongs to the physical page:
[   42.356510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   42.364494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.371003] page_type: f5(slab)
[   42.374140] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   42.381859] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   42.389578] page dumped because: kasan: bad access detected
[   42.395135] 
[   42.396609] Memory state around the buggy address:
[   42.401392]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   42.408592]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   42.415797] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   42.422997]                                               ^
[   42.428559]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.435763]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.442963] ==================================================================
[   41.656797] ==================================================================
[   41.663812] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.671967] Read of size 8 at addr ffff000802e0b448 by task kunit_try_catch/310
[   41.679260] 
[   41.680743] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   41.680800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.680815] Hardware name: WinLink E850-96 board (DT)
[   41.680838] Call trace:
[   41.680853]  show_stack+0x20/0x38 (C)
[   41.680887]  dump_stack_lvl+0x8c/0xd0
[   41.680927]  print_report+0x118/0x608
[   41.680955]  kasan_report+0xdc/0x128
[   41.680986]  __asan_report_load8_noabort+0x20/0x30
[   41.681024]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   41.681058]  kasan_bitops_generic+0x110/0x1c8
[   41.681091]  kunit_try_run_case+0x170/0x3f0
[   41.681130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.681169]  kthread+0x328/0x630
[   41.681205]  ret_from_fork+0x10/0x20
[   41.681240] 
[   41.749049] Allocated by task 310:
[   41.752436]  kasan_save_stack+0x3c/0x68
[   41.756254]  kasan_save_track+0x20/0x40
[   41.760074]  kasan_save_alloc_info+0x40/0x58
[   41.764327]  __kasan_kmalloc+0xd4/0xd8
[   41.768060]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.772573]  kasan_bitops_generic+0xa0/0x1c8
[   41.776828]  kunit_try_run_case+0x170/0x3f0
[   41.780993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.786462]  kthread+0x328/0x630
[   41.789674]  ret_from_fork+0x10/0x20
[   41.793233] 
[   41.794710] The buggy address belongs to the object at ffff000802e0b440
[   41.794710]  which belongs to the cache kmalloc-16 of size 16
[   41.807035] The buggy address is located 8 bytes inside of
[   41.807035]  allocated 9-byte region [ffff000802e0b440, ffff000802e0b449)
[   41.819274] 
[   41.820753] The buggy address belongs to the physical page:
[   41.826308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882e0b
[   41.834293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.840801] page_type: f5(slab)
[   41.843939] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.851659] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.859377] page dumped because: kasan: bad access detected
[   41.864932] 
[   41.866408] Memory state around the buggy address:
[   41.871190]  ffff000802e0b300: 00 00 fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc
[   41.878392]  ffff000802e0b380: fa fb fc fc 00 00 fc fc 00 07 fc fc 00 07 fc fc
[   41.885596] >ffff000802e0b400: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   41.892797]                                               ^
[   41.898357]  ffff000802e0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.905561]  ffff000802e0b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.912762] ==================================================================

[   20.352156] ==================================================================
[   20.352219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.352277] Write of size 8 at addr fff00000c3ef2e88 by task kunit_try_catch/263
[   20.352331] 
[   20.352364] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.352451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.352483] Hardware name: linux,dummy-virt (DT)
[   20.352517] Call trace:
[   20.352543]  show_stack+0x20/0x38 (C)
[   20.352595]  dump_stack_lvl+0x8c/0xd0
[   20.352646]  print_report+0x118/0x608
[   20.352693]  kasan_report+0xdc/0x128
[   20.352739]  kasan_check_range+0x100/0x1a8
[   20.352788]  __kasan_check_write+0x20/0x30
[   20.352838]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.352905]  kasan_bitops_generic+0x110/0x1c8
[   20.352954]  kunit_try_run_case+0x170/0x3f0
[   20.353006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.353096]  kthread+0x328/0x630
[   20.354394]  ret_from_fork+0x10/0x20
[   20.354449] 
[   20.354476] Allocated by task 263:
[   20.354508]  kasan_save_stack+0x3c/0x68
[   20.354566]  kasan_save_track+0x20/0x40
[   20.354605]  kasan_save_alloc_info+0x40/0x58
[   20.354648]  __kasan_kmalloc+0xd4/0xd8
[   20.354689]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.354731]  kasan_bitops_generic+0xa0/0x1c8
[   20.354772]  kunit_try_run_case+0x170/0x3f0
[   20.354824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.354884]  kthread+0x328/0x630
[   20.354936]  ret_from_fork+0x10/0x20
[   20.354974] 
[   20.354996] The buggy address belongs to the object at fff00000c3ef2e80
[   20.354996]  which belongs to the cache kmalloc-16 of size 16
[   20.355056] The buggy address is located 8 bytes inside of
[   20.355056]  allocated 9-byte region [fff00000c3ef2e80, fff00000c3ef2e89)
[   20.355131] 
[   20.355180] The buggy address belongs to the physical page:
[   20.355222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef2
[   20.355279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.355328] page_type: f5(slab)
[   20.355369] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.355424] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.355469] page dumped because: kasan: bad access detected
[   20.355519] 
[   20.355554] Memory state around the buggy address:
[   20.355598]  fff00000c3ef2d80: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc
[   20.355659]  fff00000c3ef2e00: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   20.355705] >fff00000c3ef2e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.355761]                       ^
[   20.355807]  fff00000c3ef2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.356766]  fff00000c3ef2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.357026] ==================================================================
[   20.358750] ==================================================================
[   20.359120] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.359449] Read of size 8 at addr fff00000c3ef2e88 by task kunit_try_catch/263
[   20.359521] 
[   20.359692] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.359834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.360158] Hardware name: linux,dummy-virt (DT)
[   20.360283] Call trace:
[   20.360351]  show_stack+0x20/0x38 (C)
[   20.360408]  dump_stack_lvl+0x8c/0xd0
[   20.361503]  print_report+0x118/0x608
[   20.361658]  kasan_report+0xdc/0x128
[   20.361867]  __asan_report_load8_noabort+0x20/0x30
[   20.361930]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.362401]  kasan_bitops_generic+0x110/0x1c8
[   20.362654]  kunit_try_run_case+0x170/0x3f0
[   20.362777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.363361]  kthread+0x328/0x630
[   20.363611]  ret_from_fork+0x10/0x20
[   20.363783] 
[   20.363864] Allocated by task 263:
[   20.364072]  kasan_save_stack+0x3c/0x68
[   20.364134]  kasan_save_track+0x20/0x40
[   20.364346]  kasan_save_alloc_info+0x40/0x58
[   20.364687]  __kasan_kmalloc+0xd4/0xd8
[   20.364891]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.365027]  kasan_bitops_generic+0xa0/0x1c8
[   20.365219]  kunit_try_run_case+0x170/0x3f0
[   20.365321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.367892] page_type: f5(slab)
[   20.368477] page dumped because: kasan: bad access detected
[   20.369499]  fff00000c3ef2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.371212] 
[   20.372040] Hardware name: linux,dummy-virt (DT)
[   20.372383]  __kasan_check_write+0x20/0x30
[   20.372757] Allocated by task 263:
[   20.374656]  ret_from_fork+0x10/0x20
[   20.375283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef2
[   20.376088] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.377326] ==================================================================

[   13.024981] ==================================================================
[   13.025314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.025646] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.026087] 
[   13.026186] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.026235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.026248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.026270] Call Trace:
[   13.026289]  <TASK>
[   13.026307]  dump_stack_lvl+0x73/0xb0
[   13.026332]  print_report+0xd1/0x650
[   13.026354]  ? __virt_addr_valid+0x1db/0x2d0
[   13.026379]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.026400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.026423]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.026445]  kasan_report+0x141/0x180
[   13.026469]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.026495]  kasan_check_range+0x10c/0x1c0
[   13.026515]  __kasan_check_write+0x18/0x20
[   13.026534]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.026556]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.026578]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.026599]  ? trace_hardirqs_on+0x37/0xe0
[   13.026621]  ? kasan_bitops_generic+0x92/0x1c0
[   13.026645]  kasan_bitops_generic+0x116/0x1c0
[   13.026665]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.026687]  ? __pfx_read_tsc+0x10/0x10
[   13.026707]  ? ktime_get_ts64+0x86/0x230
[   13.026732]  kunit_try_run_case+0x1a5/0x480
[   13.026757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.026778]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.026802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.026826]  ? __kthread_parkme+0x82/0x180
[   13.026889]  ? preempt_count_sub+0x50/0x80
[   13.026926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.026950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.026973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.026996]  kthread+0x337/0x6f0
[   13.027014]  ? trace_preempt_on+0x20/0xc0
[   13.027036]  ? __pfx_kthread+0x10/0x10
[   13.027054]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.027075]  ? calculate_sigpending+0x7b/0xa0
[   13.027097]  ? __pfx_kthread+0x10/0x10
[   13.027115]  ret_from_fork+0x41/0x80
[   13.027136]  ? __pfx_kthread+0x10/0x10
[   13.027153]  ret_from_fork_asm+0x1a/0x30
[   13.027185]  </TASK>
[   13.027195] 
[   13.035601] Allocated by task 280:
[   13.036034]  kasan_save_stack+0x45/0x70
[   13.036251]  kasan_save_track+0x18/0x40
[   13.036488]  kasan_save_alloc_info+0x3b/0x50
[   13.036701]  __kasan_kmalloc+0xb7/0xc0
[   13.036867]  __kmalloc_cache_noprof+0x189/0x420
[   13.037038]  kasan_bitops_generic+0x92/0x1c0
[   13.037253]  kunit_try_run_case+0x1a5/0x480
[   13.037450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.037814]  kthread+0x337/0x6f0
[   13.037952]  ret_from_fork+0x41/0x80
[   13.038083]  ret_from_fork_asm+0x1a/0x30
[   13.038222] 
[   13.038294] The buggy address belongs to the object at ffff8881025a7fe0
[   13.038294]  which belongs to the cache kmalloc-16 of size 16
[   13.038776] The buggy address is located 8 bytes inside of
[   13.038776]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.039356] 
[   13.039455] The buggy address belongs to the physical page:
[   13.039759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.040091] flags: 0x200000000000000(node=0|zone=2)
[   13.040272] page_type: f5(slab)
[   13.040401] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.040986] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.041329] page dumped because: kasan: bad access detected
[   13.041590] 
[   13.041667] Memory state around the buggy address:
[   13.042240]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.042465]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.042679] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.043008]                                                           ^
[   13.043412]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.043641]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.043853] ==================================================================
[   12.964591] ==================================================================
[   12.965076] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   12.965424] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   12.966058] 
[   12.966185] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.966233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.966244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.966267] Call Trace:
[   12.966284]  <TASK>
[   12.966302]  dump_stack_lvl+0x73/0xb0
[   12.966328]  print_report+0xd1/0x650
[   12.966350]  ? __virt_addr_valid+0x1db/0x2d0
[   12.966372]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   12.966395]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.966418]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   12.966440]  kasan_report+0x141/0x180
[   12.966462]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   12.966489]  kasan_check_range+0x10c/0x1c0
[   12.966510]  __kasan_check_write+0x18/0x20
[   12.966530]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   12.966554]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   12.966577]  ? __kmalloc_cache_noprof+0x189/0x420
[   12.966598]  ? trace_hardirqs_on+0x37/0xe0
[   12.966621]  ? kasan_bitops_generic+0x92/0x1c0
[   12.966645]  kasan_bitops_generic+0x116/0x1c0
[   12.966665]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   12.966687]  ? __pfx_read_tsc+0x10/0x10
[   12.966707]  ? ktime_get_ts64+0x86/0x230
[   12.966734]  kunit_try_run_case+0x1a5/0x480
[   12.966759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.966781]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.966805]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.966828]  ? __kthread_parkme+0x82/0x180
[   12.966849]  ? preempt_count_sub+0x50/0x80
[   12.966874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.966898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.966935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.966957]  kthread+0x337/0x6f0
[   12.966974]  ? trace_preempt_on+0x20/0xc0
[   12.966996]  ? __pfx_kthread+0x10/0x10
[   12.967062]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.967086]  ? calculate_sigpending+0x7b/0xa0
[   12.967108]  ? __pfx_kthread+0x10/0x10
[   12.967126]  ret_from_fork+0x41/0x80
[   12.967147]  ? __pfx_kthread+0x10/0x10
[   12.967164]  ret_from_fork_asm+0x1a/0x30
[   12.967196]  </TASK>
[   12.967206] 
[   12.974981] Allocated by task 280:
[   12.975164]  kasan_save_stack+0x45/0x70
[   12.975360]  kasan_save_track+0x18/0x40
[   12.975520]  kasan_save_alloc_info+0x3b/0x50
[   12.975735]  __kasan_kmalloc+0xb7/0xc0
[   12.975925]  __kmalloc_cache_noprof+0x189/0x420
[   12.976119]  kasan_bitops_generic+0x92/0x1c0
[   12.976322]  kunit_try_run_case+0x1a5/0x480
[   12.976505]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.976813]  kthread+0x337/0x6f0
[   12.976985]  ret_from_fork+0x41/0x80
[   12.977137]  ret_from_fork_asm+0x1a/0x30
[   12.977315] 
[   12.977385] The buggy address belongs to the object at ffff8881025a7fe0
[   12.977385]  which belongs to the cache kmalloc-16 of size 16
[   12.977751] The buggy address is located 8 bytes inside of
[   12.977751]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   12.978268] 
[   12.978366] The buggy address belongs to the physical page:
[   12.978723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   12.978980] flags: 0x200000000000000(node=0|zone=2)
[   12.979579] page_type: f5(slab)
[   12.979767] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.980130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.980471] page dumped because: kasan: bad access detected
[   12.980730] 
[   12.980800] Memory state around the buggy address:
[   12.981041]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   12.981308]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   12.981522] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   12.982110]                                                           ^
[   12.982350]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.982566]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.982914] ==================================================================
[   13.003165] ==================================================================
[   13.003501] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.004161] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.004505] 
[   13.004640] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.004688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.004700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.004760] Call Trace:
[   13.004779]  <TASK>
[   13.004795]  dump_stack_lvl+0x73/0xb0
[   13.004820]  print_report+0xd1/0x650
[   13.004844]  ? __virt_addr_valid+0x1db/0x2d0
[   13.004866]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.004887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.004910]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.004945]  kasan_report+0x141/0x180
[   13.004968]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.004997]  kasan_check_range+0x10c/0x1c0
[   13.005017]  __kasan_check_write+0x18/0x20
[   13.005036]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.005058]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.005081]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.005102]  ? trace_hardirqs_on+0x37/0xe0
[   13.005125]  ? kasan_bitops_generic+0x92/0x1c0
[   13.005149]  kasan_bitops_generic+0x116/0x1c0
[   13.005168]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.005189]  ? __pfx_read_tsc+0x10/0x10
[   13.005210]  ? ktime_get_ts64+0x86/0x230
[   13.005235]  kunit_try_run_case+0x1a5/0x480
[   13.005260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.005282]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.005306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.005329]  ? __kthread_parkme+0x82/0x180
[   13.005350]  ? preempt_count_sub+0x50/0x80
[   13.005376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.005400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.005422]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.005445]  kthread+0x337/0x6f0
[   13.005462]  ? trace_preempt_on+0x20/0xc0
[   13.005484]  ? __pfx_kthread+0x10/0x10
[   13.005502]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.005523]  ? calculate_sigpending+0x7b/0xa0
[   13.005544]  ? __pfx_kthread+0x10/0x10
[   13.005563]  ret_from_fork+0x41/0x80
[   13.005582]  ? __pfx_kthread+0x10/0x10
[   13.005600]  ret_from_fork_asm+0x1a/0x30
[   13.005631]  </TASK>
[   13.005641] 
[   13.013950] Allocated by task 280:
[   13.014145]  kasan_save_stack+0x45/0x70
[   13.014357]  kasan_save_track+0x18/0x40
[   13.014547]  kasan_save_alloc_info+0x3b/0x50
[   13.014799]  __kasan_kmalloc+0xb7/0xc0
[   13.014999]  __kmalloc_cache_noprof+0x189/0x420
[   13.015176]  kasan_bitops_generic+0x92/0x1c0
[   13.015369]  kunit_try_run_case+0x1a5/0x480
[   13.015518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.016022]  kthread+0x337/0x6f0
[   13.016177]  ret_from_fork+0x41/0x80
[   13.016354]  ret_from_fork_asm+0x1a/0x30
[   13.016537] 
[   13.016666] The buggy address belongs to the object at ffff8881025a7fe0
[   13.016666]  which belongs to the cache kmalloc-16 of size 16
[   13.017146] The buggy address is located 8 bytes inside of
[   13.017146]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.017541] 
[   13.017620] The buggy address belongs to the physical page:
[   13.017794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.018476] flags: 0x200000000000000(node=0|zone=2)
[   13.019824] page_type: f5(slab)
[   13.020265] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.020779] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.021309] page dumped because: kasan: bad access detected
[   13.021554] 
[   13.021818] Memory state around the buggy address:
[   13.022220]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.022519]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.023285] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.023565]                                                           ^
[   13.023849]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.024262]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.024516] ==================================================================
[   12.983459] ==================================================================
[   12.984201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   12.984585] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   12.984809] 
[   12.984897] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.984960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.984972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.984993] Call Trace:
[   12.985011]  <TASK>
[   12.985029]  dump_stack_lvl+0x73/0xb0
[   12.985055]  print_report+0xd1/0x650
[   12.985077]  ? __virt_addr_valid+0x1db/0x2d0
[   12.985099]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   12.985120]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.985143]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   12.985165]  kasan_report+0x141/0x180
[   12.985188]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   12.985214]  kasan_check_range+0x10c/0x1c0
[   12.985234]  __kasan_check_write+0x18/0x20
[   12.985254]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   12.985276]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   12.985299]  ? __kmalloc_cache_noprof+0x189/0x420
[   12.985322]  ? trace_hardirqs_on+0x37/0xe0
[   12.985345]  ? kasan_bitops_generic+0x92/0x1c0
[   12.985370]  kasan_bitops_generic+0x116/0x1c0
[   12.985390]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   12.985413]  ? __pfx_read_tsc+0x10/0x10
[   12.985432]  ? ktime_get_ts64+0x86/0x230
[   12.985458]  kunit_try_run_case+0x1a5/0x480
[   12.985483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.985505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.985529]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.985552]  ? __kthread_parkme+0x82/0x180
[   12.985635]  ? preempt_count_sub+0x50/0x80
[   12.985668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.985692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.985746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.985770]  kthread+0x337/0x6f0
[   12.985788]  ? trace_preempt_on+0x20/0xc0
[   12.985810]  ? __pfx_kthread+0x10/0x10
[   12.985829]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.985850]  ? calculate_sigpending+0x7b/0xa0
[   12.985873]  ? __pfx_kthread+0x10/0x10
[   12.985890]  ret_from_fork+0x41/0x80
[   12.985911]  ? __pfx_kthread+0x10/0x10
[   12.985941]  ret_from_fork_asm+0x1a/0x30
[   12.985973]  </TASK>
[   12.985983] 
[   12.994278] Allocated by task 280:
[   12.994469]  kasan_save_stack+0x45/0x70
[   12.995019]  kasan_save_track+0x18/0x40
[   12.995234]  kasan_save_alloc_info+0x3b/0x50
[   12.995402]  __kasan_kmalloc+0xb7/0xc0
[   12.995617]  __kmalloc_cache_noprof+0x189/0x420
[   12.995868]  kasan_bitops_generic+0x92/0x1c0
[   12.996078]  kunit_try_run_case+0x1a5/0x480
[   12.996225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.996480]  kthread+0x337/0x6f0
[   12.996765]  ret_from_fork+0x41/0x80
[   12.996937]  ret_from_fork_asm+0x1a/0x30
[   12.997122] 
[   12.997212] The buggy address belongs to the object at ffff8881025a7fe0
[   12.997212]  which belongs to the cache kmalloc-16 of size 16
[   12.997641] The buggy address is located 8 bytes inside of
[   12.997641]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   12.998325] 
[   12.998405] The buggy address belongs to the physical page:
[   12.998674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   12.999106] flags: 0x200000000000000(node=0|zone=2)
[   12.999270] page_type: f5(slab)
[   12.999394] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.999623] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.999846] page dumped because: kasan: bad access detected
[   13.000212] 
[   13.000311] Memory state around the buggy address:
[   13.000534]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.001228]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.001573] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.001931]                                                           ^
[   13.002147]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.002364]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.002580] ==================================================================
[   12.923731] ==================================================================
[   12.924277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   12.924964] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   12.925271] 
[   12.925377] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.925429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.925441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.925464] Call Trace:
[   12.925476]  <TASK>
[   12.925495]  dump_stack_lvl+0x73/0xb0
[   12.925524]  print_report+0xd1/0x650
[   12.925547]  ? __virt_addr_valid+0x1db/0x2d0
[   12.925570]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   12.925591]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.925615]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   12.925637]  kasan_report+0x141/0x180
[   12.925660]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   12.925687]  kasan_check_range+0x10c/0x1c0
[   12.925707]  __kasan_check_write+0x18/0x20
[   12.926156]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   12.926183]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   12.926205]  ? __kmalloc_cache_noprof+0x189/0x420
[   12.926230]  ? trace_hardirqs_on+0x37/0xe0
[   12.926254]  ? kasan_bitops_generic+0x92/0x1c0
[   12.926278]  kasan_bitops_generic+0x116/0x1c0
[   12.926299]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   12.926320]  ? __pfx_read_tsc+0x10/0x10
[   12.926340]  ? ktime_get_ts64+0x86/0x230
[   12.926366]  kunit_try_run_case+0x1a5/0x480
[   12.926392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.926414]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.926438]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.926461]  ? __kthread_parkme+0x82/0x180
[   12.926483]  ? preempt_count_sub+0x50/0x80
[   12.926510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.926533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.926555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.926579]  kthread+0x337/0x6f0
[   12.926595]  ? trace_preempt_on+0x20/0xc0
[   12.926619]  ? __pfx_kthread+0x10/0x10
[   12.926638]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.926659]  ? calculate_sigpending+0x7b/0xa0
[   12.926681]  ? __pfx_kthread+0x10/0x10
[   12.926699]  ret_from_fork+0x41/0x80
[   12.926721]  ? __pfx_kthread+0x10/0x10
[   12.926738]  ret_from_fork_asm+0x1a/0x30
[   12.926771]  </TASK>
[   12.926782] 
[   12.935379] Allocated by task 280:
[   12.935527]  kasan_save_stack+0x45/0x70
[   12.935974]  kasan_save_track+0x18/0x40
[   12.936168]  kasan_save_alloc_info+0x3b/0x50
[   12.936334]  __kasan_kmalloc+0xb7/0xc0
[   12.936468]  __kmalloc_cache_noprof+0x189/0x420
[   12.936632]  kasan_bitops_generic+0x92/0x1c0
[   12.936835]  kunit_try_run_case+0x1a5/0x480
[   12.937057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.937388]  kthread+0x337/0x6f0
[   12.937531]  ret_from_fork+0x41/0x80
[   12.937682]  ret_from_fork_asm+0x1a/0x30
[   12.937821] 
[   12.937891] The buggy address belongs to the object at ffff8881025a7fe0
[   12.937891]  which belongs to the cache kmalloc-16 of size 16
[   12.938900] The buggy address is located 8 bytes inside of
[   12.938900]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   12.939416] 
[   12.939522] The buggy address belongs to the physical page:
[   12.939832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   12.940172] flags: 0x200000000000000(node=0|zone=2)
[   12.940364] page_type: f5(slab)
[   12.940490] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.940950] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.941232] page dumped because: kasan: bad access detected
[   12.941403] 
[   12.941471] Memory state around the buggy address:
[   12.941627]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   12.942173]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   12.942492] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   12.942926]                                                           ^
[   12.943238]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.943541]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.943965] ==================================================================
[   13.044677] ==================================================================
[   13.045248] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.045651] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.045995] 
[   13.046087] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.046135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.046148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.046169] Call Trace:
[   13.046187]  <TASK>
[   13.046205]  dump_stack_lvl+0x73/0xb0
[   13.046231]  print_report+0xd1/0x650
[   13.046253]  ? __virt_addr_valid+0x1db/0x2d0
[   13.046275]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.046297]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.046318]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.046340]  kasan_report+0x141/0x180
[   13.046363]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.046390]  kasan_check_range+0x10c/0x1c0
[   13.046409]  __kasan_check_write+0x18/0x20
[   13.046432]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.046454]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.046476]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.046497]  ? trace_hardirqs_on+0x37/0xe0
[   13.046519]  ? kasan_bitops_generic+0x92/0x1c0
[   13.046543]  kasan_bitops_generic+0x116/0x1c0
[   13.046563]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.046585]  ? __pfx_read_tsc+0x10/0x10
[   13.046604]  ? ktime_get_ts64+0x86/0x230
[   13.046630]  kunit_try_run_case+0x1a5/0x480
[   13.046654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.046677]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.046701]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.046743]  ? __kthread_parkme+0x82/0x180
[   13.046766]  ? preempt_count_sub+0x50/0x80
[   13.046791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.046814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.046838]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.046860]  kthread+0x337/0x6f0
[   13.046877]  ? trace_preempt_on+0x20/0xc0
[   13.046899]  ? __pfx_kthread+0x10/0x10
[   13.046927]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.046948]  ? calculate_sigpending+0x7b/0xa0
[   13.046970]  ? __pfx_kthread+0x10/0x10
[   13.046989]  ret_from_fork+0x41/0x80
[   13.047009]  ? __pfx_kthread+0x10/0x10
[   13.047027]  ret_from_fork_asm+0x1a/0x30
[   13.047059]  </TASK>
[   13.047070] 
[   13.055678] Allocated by task 280:
[   13.056089]  kasan_save_stack+0x45/0x70
[   13.056302]  kasan_save_track+0x18/0x40
[   13.056439]  kasan_save_alloc_info+0x3b/0x50
[   13.056620]  __kasan_kmalloc+0xb7/0xc0
[   13.056935]  __kmalloc_cache_noprof+0x189/0x420
[   13.057160]  kasan_bitops_generic+0x92/0x1c0
[   13.057369]  kunit_try_run_case+0x1a5/0x480
[   13.057562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.057746]  kthread+0x337/0x6f0
[   13.057866]  ret_from_fork+0x41/0x80
[   13.058009]  ret_from_fork_asm+0x1a/0x30
[   13.058202] 
[   13.058299] The buggy address belongs to the object at ffff8881025a7fe0
[   13.058299]  which belongs to the cache kmalloc-16 of size 16
[   13.058954] The buggy address is located 8 bytes inside of
[   13.058954]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.059408] 
[   13.059504] The buggy address belongs to the physical page:
[   13.060054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.060371] flags: 0x200000000000000(node=0|zone=2)
[   13.060588] page_type: f5(slab)
[   13.060714] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.061021] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.061361] page dumped because: kasan: bad access detected
[   13.061654] 
[   13.061773] Memory state around the buggy address:
[   13.061989]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.062284]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.062558] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.062913]                                                           ^
[   13.063130]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.063428]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.063742] ==================================================================
[   12.944531] ==================================================================
[   12.944817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   12.945532] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   12.946100] 
[   12.946219] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.946266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.946278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.946300] Call Trace:
[   12.946318]  <TASK>
[   12.946336]  dump_stack_lvl+0x73/0xb0
[   12.946362]  print_report+0xd1/0x650
[   12.946385]  ? __virt_addr_valid+0x1db/0x2d0
[   12.946407]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   12.946429]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.946452]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   12.946474]  kasan_report+0x141/0x180
[   12.946497]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   12.946524]  kasan_check_range+0x10c/0x1c0
[   12.946546]  __kasan_check_write+0x18/0x20
[   12.946565]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   12.946588]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   12.946611]  ? __kmalloc_cache_noprof+0x189/0x420
[   12.946632]  ? trace_hardirqs_on+0x37/0xe0
[   12.946655]  ? kasan_bitops_generic+0x92/0x1c0
[   12.946679]  kasan_bitops_generic+0x116/0x1c0
[   12.946698]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   12.946739]  ? __pfx_read_tsc+0x10/0x10
[   12.946759]  ? ktime_get_ts64+0x86/0x230
[   12.946784]  kunit_try_run_case+0x1a5/0x480
[   12.946810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.946832]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.946855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.946879]  ? __kthread_parkme+0x82/0x180
[   12.946900]  ? preempt_count_sub+0x50/0x80
[   12.946941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.946965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.946987]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.947010]  kthread+0x337/0x6f0
[   12.947027]  ? trace_preempt_on+0x20/0xc0
[   12.947048]  ? __pfx_kthread+0x10/0x10
[   12.947066]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.947087]  ? calculate_sigpending+0x7b/0xa0
[   12.947109]  ? __pfx_kthread+0x10/0x10
[   12.947127]  ret_from_fork+0x41/0x80
[   12.947148]  ? __pfx_kthread+0x10/0x10
[   12.947165]  ret_from_fork_asm+0x1a/0x30
[   12.947196]  </TASK>
[   12.947208] 
[   12.955447] Allocated by task 280:
[   12.955666]  kasan_save_stack+0x45/0x70
[   12.955876]  kasan_save_track+0x18/0x40
[   12.956077]  kasan_save_alloc_info+0x3b/0x50
[   12.956294]  __kasan_kmalloc+0xb7/0xc0
[   12.956578]  __kmalloc_cache_noprof+0x189/0x420
[   12.956727]  kasan_bitops_generic+0x92/0x1c0
[   12.956871]  kunit_try_run_case+0x1a5/0x480
[   12.957024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.957512]  kthread+0x337/0x6f0
[   12.957823]  ret_from_fork+0x41/0x80
[   12.958018]  ret_from_fork_asm+0x1a/0x30
[   12.958218] 
[   12.958314] The buggy address belongs to the object at ffff8881025a7fe0
[   12.958314]  which belongs to the cache kmalloc-16 of size 16
[   12.958732] The buggy address is located 8 bytes inside of
[   12.958732]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   12.959092] 
[   12.959182] The buggy address belongs to the physical page:
[   12.959448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   12.960458] flags: 0x200000000000000(node=0|zone=2)
[   12.960733] page_type: f5(slab)
[   12.960987] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   12.961268] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   12.961572] page dumped because: kasan: bad access detected
[   12.961983] 
[   12.962079] Memory state around the buggy address:
[   12.962258]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   12.962540]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   12.962784] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   12.963100]                                                           ^
[   12.963300]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.963513]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.963725] ==================================================================
[   13.064523] ==================================================================
[   13.064804] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.065135] Write of size 8 at addr ffff8881025a7fe8 by task kunit_try_catch/280
[   13.065357] 
[   13.065446] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   13.065492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.065504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.065525] Call Trace:
[   13.065559]  <TASK>
[   13.065578]  dump_stack_lvl+0x73/0xb0
[   13.065602]  print_report+0xd1/0x650
[   13.065624]  ? __virt_addr_valid+0x1db/0x2d0
[   13.065646]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.065667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.065690]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.065712]  kasan_report+0x141/0x180
[   13.065734]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.065760]  kasan_check_range+0x10c/0x1c0
[   13.065781]  __kasan_check_write+0x18/0x20
[   13.065800]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.065822]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.065845]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.065868]  ? trace_hardirqs_on+0x37/0xe0
[   13.065893]  ? kasan_bitops_generic+0x92/0x1c0
[   13.065929]  kasan_bitops_generic+0x116/0x1c0
[   13.065950]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.065972]  ? __pfx_read_tsc+0x10/0x10
[   13.065991]  ? ktime_get_ts64+0x86/0x230
[   13.066018]  kunit_try_run_case+0x1a5/0x480
[   13.066044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.066066]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.066090]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.066114]  ? __kthread_parkme+0x82/0x180
[   13.066137]  ? preempt_count_sub+0x50/0x80
[   13.066163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.066187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.066211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.066234]  kthread+0x337/0x6f0
[   13.066250]  ? trace_preempt_on+0x20/0xc0
[   13.066272]  ? __pfx_kthread+0x10/0x10
[   13.066291]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.066312]  ? calculate_sigpending+0x7b/0xa0
[   13.066333]  ? __pfx_kthread+0x10/0x10
[   13.066352]  ret_from_fork+0x41/0x80
[   13.066372]  ? __pfx_kthread+0x10/0x10
[   13.066390]  ret_from_fork_asm+0x1a/0x30
[   13.066421]  </TASK>
[   13.066432] 
[   13.075200] Allocated by task 280:
[   13.075407]  kasan_save_stack+0x45/0x70
[   13.075613]  kasan_save_track+0x18/0x40
[   13.075853]  kasan_save_alloc_info+0x3b/0x50
[   13.076064]  __kasan_kmalloc+0xb7/0xc0
[   13.076253]  __kmalloc_cache_noprof+0x189/0x420
[   13.076433]  kasan_bitops_generic+0x92/0x1c0
[   13.076579]  kunit_try_run_case+0x1a5/0x480
[   13.076811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.077085]  kthread+0x337/0x6f0
[   13.077258]  ret_from_fork+0x41/0x80
[   13.077443]  ret_from_fork_asm+0x1a/0x30
[   13.077750] 
[   13.077853] The buggy address belongs to the object at ffff8881025a7fe0
[   13.077853]  which belongs to the cache kmalloc-16 of size 16
[   13.078273] The buggy address is located 8 bytes inside of
[   13.078273]  allocated 9-byte region [ffff8881025a7fe0, ffff8881025a7fe9)
[   13.078632] 
[   13.078727] The buggy address belongs to the physical page:
[   13.078983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a7
[   13.079388] flags: 0x200000000000000(node=0|zone=2)
[   13.079753] page_type: f5(slab)
[   13.080055] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.080296] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.080523] page dumped because: kasan: bad access detected
[   13.081824] 
[   13.082033] Memory state around the buggy address:
[   13.082424]  ffff8881025a7e80: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc
[   13.083227]  ffff8881025a7f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.083685] >ffff8881025a7f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.084140]                                                           ^
[   13.084423]  ffff8881025a8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.085073]  ffff8881025a8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.085376] ==================================================================