Hay
Date
July 3, 2025, 3:13 p.m.

Environment
qemu-x86_64

[   13.246094] ==================================================================
[   13.246783] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.247145] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.247917] 
[   13.248042] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.248113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.248126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.248148] Call Trace:
[   13.248167]  <TASK>
[   13.248185]  dump_stack_lvl+0x73/0xb0
[   13.248212]  print_report+0xd1/0x650
[   13.248249]  ? __virt_addr_valid+0x1db/0x2d0
[   13.248502]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.248539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.248564]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.248587]  kasan_report+0x141/0x180
[   13.248611]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.248639]  kasan_check_range+0x10c/0x1c0
[   13.248660]  __kasan_check_write+0x18/0x20
[   13.248681]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.248704]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.248727]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.248750]  ? trace_hardirqs_on+0x37/0xe0
[   13.248773]  ? kasan_bitops_generic+0x92/0x1c0
[   13.248797]  kasan_bitops_generic+0x116/0x1c0
[   13.248817]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.248840]  ? __pfx_read_tsc+0x10/0x10
[   13.248860]  ? ktime_get_ts64+0x86/0x230
[   13.248885]  kunit_try_run_case+0x1a5/0x480
[   13.248911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.248932]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.248958]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.248982]  ? __kthread_parkme+0x82/0x180
[   13.249004]  ? preempt_count_sub+0x50/0x80
[   13.249030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.249054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.249077]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.249101]  kthread+0x337/0x6f0
[   13.249117]  ? trace_preempt_on+0x20/0xc0
[   13.249141]  ? __pfx_kthread+0x10/0x10
[   13.249159]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.249181]  ? calculate_sigpending+0x7b/0xa0
[   13.249203]  ? __pfx_kthread+0x10/0x10
[   13.249222]  ret_from_fork+0x41/0x80
[   13.249258]  ? __pfx_kthread+0x10/0x10
[   13.249332]  ret_from_fork_asm+0x1a/0x30
[   13.249365]  </TASK>
[   13.249375] 
[   13.261161] Allocated by task 280:
[   13.261729]  kasan_save_stack+0x45/0x70
[   13.261944]  kasan_save_track+0x18/0x40
[   13.262085]  kasan_save_alloc_info+0x3b/0x50
[   13.262309]  __kasan_kmalloc+0xb7/0xc0
[   13.262870]  __kmalloc_cache_noprof+0x189/0x420
[   13.263388]  kasan_bitops_generic+0x92/0x1c0
[   13.263683]  kunit_try_run_case+0x1a5/0x480
[   13.264131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.264492]  kthread+0x337/0x6f0
[   13.264618]  ret_from_fork+0x41/0x80
[   13.265055]  ret_from_fork_asm+0x1a/0x30
[   13.265445] 
[   13.265625] The buggy address belongs to the object at ffff888102307e00
[   13.265625]  which belongs to the cache kmalloc-16 of size 16
[   13.266265] The buggy address is located 8 bytes inside of
[   13.266265]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.266610] 
[   13.266776] The buggy address belongs to the physical page:
[   13.266974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.267357] flags: 0x200000000000000(node=0|zone=2)
[   13.267571] page_type: f5(slab)
[   13.267726] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.267967] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.268358] page dumped because: kasan: bad access detected
[   13.268630] 
[   13.268818] Memory state around the buggy address:
[   13.269015]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.269428]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.269724] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.270084]                       ^
[   13.270206]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.270547]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.270863] ==================================================================
[   13.359318] ==================================================================
[   13.359640] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.360014] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.360343] 
[   13.360467] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.360513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.360525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.360549] Call Trace:
[   13.360579]  <TASK>
[   13.360599]  dump_stack_lvl+0x73/0xb0
[   13.360625]  print_report+0xd1/0x650
[   13.360649]  ? __virt_addr_valid+0x1db/0x2d0
[   13.360681]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.360703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.360726]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.360749]  kasan_report+0x141/0x180
[   13.360771]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.360798]  kasan_check_range+0x10c/0x1c0
[   13.360819]  __kasan_check_write+0x18/0x20
[   13.360839]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.360862]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.360886]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.360908]  ? trace_hardirqs_on+0x37/0xe0
[   13.360930]  ? kasan_bitops_generic+0x92/0x1c0
[   13.360955]  kasan_bitops_generic+0x116/0x1c0
[   13.360975]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.360997]  ? __pfx_read_tsc+0x10/0x10
[   13.361017]  ? ktime_get_ts64+0x86/0x230
[   13.361042]  kunit_try_run_case+0x1a5/0x480
[   13.361068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.361090]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.361114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.361138]  ? __kthread_parkme+0x82/0x180
[   13.361160]  ? preempt_count_sub+0x50/0x80
[   13.361187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.361211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.361243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.361267]  kthread+0x337/0x6f0
[   13.361283]  ? trace_preempt_on+0x20/0xc0
[   13.361306]  ? __pfx_kthread+0x10/0x10
[   13.361325]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.361348]  ? calculate_sigpending+0x7b/0xa0
[   13.361370]  ? __pfx_kthread+0x10/0x10
[   13.361389]  ret_from_fork+0x41/0x80
[   13.361411]  ? __pfx_kthread+0x10/0x10
[   13.361429]  ret_from_fork_asm+0x1a/0x30
[   13.361461]  </TASK>
[   13.361472] 
[   13.375133] Allocated by task 280:
[   13.375365]  kasan_save_stack+0x45/0x70
[   13.375565]  kasan_save_track+0x18/0x40
[   13.376266]  kasan_save_alloc_info+0x3b/0x50
[   13.376780]  __kasan_kmalloc+0xb7/0xc0
[   13.377033]  __kmalloc_cache_noprof+0x189/0x420
[   13.377579]  kasan_bitops_generic+0x92/0x1c0
[   13.377932]  kunit_try_run_case+0x1a5/0x480
[   13.378086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.378428]  kthread+0x337/0x6f0
[   13.378570]  ret_from_fork+0x41/0x80
[   13.378772]  ret_from_fork_asm+0x1a/0x30
[   13.378975] 
[   13.379054] The buggy address belongs to the object at ffff888102307e00
[   13.379054]  which belongs to the cache kmalloc-16 of size 16
[   13.379638] The buggy address is located 8 bytes inside of
[   13.379638]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.380570] 
[   13.380853] The buggy address belongs to the physical page:
[   13.381130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.381953] flags: 0x200000000000000(node=0|zone=2)
[   13.382196] page_type: f5(slab)
[   13.382469] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.383106] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.383857] page dumped because: kasan: bad access detected
[   13.384117] 
[   13.384213] Memory state around the buggy address:
[   13.384579]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.385739]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.386266] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.387129]                       ^
[   13.387618]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.387960]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.388257] ==================================================================
[   13.312672] ==================================================================
[   13.313013] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.313363] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.314506] 
[   13.314909] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.314964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.314977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.315059] Call Trace:
[   13.315081]  <TASK>
[   13.315191]  dump_stack_lvl+0x73/0xb0
[   13.315226]  print_report+0xd1/0x650
[   13.315260]  ? __virt_addr_valid+0x1db/0x2d0
[   13.315308]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.315331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.315354]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.315376]  kasan_report+0x141/0x180
[   13.315399]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.315427]  kasan_check_range+0x10c/0x1c0
[   13.315447]  __kasan_check_write+0x18/0x20
[   13.315467]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.315490]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.315513]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.315534]  ? trace_hardirqs_on+0x37/0xe0
[   13.315556]  ? kasan_bitops_generic+0x92/0x1c0
[   13.315581]  kasan_bitops_generic+0x116/0x1c0
[   13.315601]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.315623]  ? __pfx_read_tsc+0x10/0x10
[   13.315656]  ? ktime_get_ts64+0x86/0x230
[   13.315682]  kunit_try_run_case+0x1a5/0x480
[   13.315706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.315728]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.315753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.315778]  ? __kthread_parkme+0x82/0x180
[   13.315800]  ? preempt_count_sub+0x50/0x80
[   13.315825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.315848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.315871]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.315895]  kthread+0x337/0x6f0
[   13.315911]  ? trace_preempt_on+0x20/0xc0
[   13.315933]  ? __pfx_kthread+0x10/0x10
[   13.315951]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.315972]  ? calculate_sigpending+0x7b/0xa0
[   13.315995]  ? __pfx_kthread+0x10/0x10
[   13.316013]  ret_from_fork+0x41/0x80
[   13.316033]  ? __pfx_kthread+0x10/0x10
[   13.316051]  ret_from_fork_asm+0x1a/0x30
[   13.316081]  </TASK>
[   13.316092] 
[   13.325609] Allocated by task 280:
[   13.325808]  kasan_save_stack+0x45/0x70
[   13.325968]  kasan_save_track+0x18/0x40
[   13.326162]  kasan_save_alloc_info+0x3b/0x50
[   13.326563]  __kasan_kmalloc+0xb7/0xc0
[   13.326754]  __kmalloc_cache_noprof+0x189/0x420
[   13.326961]  kasan_bitops_generic+0x92/0x1c0
[   13.327164]  kunit_try_run_case+0x1a5/0x480
[   13.327424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.327606]  kthread+0x337/0x6f0
[   13.327753]  ret_from_fork+0x41/0x80
[   13.327927]  ret_from_fork_asm+0x1a/0x30
[   13.328131] 
[   13.328238] The buggy address belongs to the object at ffff888102307e00
[   13.328238]  which belongs to the cache kmalloc-16 of size 16
[   13.328867] The buggy address is located 8 bytes inside of
[   13.328867]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.329504] 
[   13.329603] The buggy address belongs to the physical page:
[   13.329803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.330080] flags: 0x200000000000000(node=0|zone=2)
[   13.330497] page_type: f5(slab)
[   13.330679] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.331045] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.331487] page dumped because: kasan: bad access detected
[   13.331676] 
[   13.331797] Memory state around the buggy address:
[   13.332030]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.332397]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.332721] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.332970]                       ^
[   13.333149]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.333553]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.333876] ==================================================================
[   13.222077] ==================================================================
[   13.222660] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.223073] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.223531] 
[   13.223641] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.223691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.223705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.223728] Call Trace:
[   13.223740]  <TASK>
[   13.223760]  dump_stack_lvl+0x73/0xb0
[   13.223787]  print_report+0xd1/0x650
[   13.223811]  ? __virt_addr_valid+0x1db/0x2d0
[   13.223834]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.223856]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.223879]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.223902]  kasan_report+0x141/0x180
[   13.223925]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.223953]  kasan_check_range+0x10c/0x1c0
[   13.224032]  __kasan_check_write+0x18/0x20
[   13.224069]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.224092]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.224115]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.224137]  ? trace_hardirqs_on+0x37/0xe0
[   13.224161]  ? kasan_bitops_generic+0x92/0x1c0
[   13.224186]  kasan_bitops_generic+0x116/0x1c0
[   13.224207]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.224251]  ? __pfx_read_tsc+0x10/0x10
[   13.224275]  ? ktime_get_ts64+0x86/0x230
[   13.224484]  kunit_try_run_case+0x1a5/0x480
[   13.224510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.224533]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.224559]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.224583]  ? __kthread_parkme+0x82/0x180
[   13.224605]  ? preempt_count_sub+0x50/0x80
[   13.224631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.224654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.224679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.224702]  kthread+0x337/0x6f0
[   13.224719]  ? trace_preempt_on+0x20/0xc0
[   13.224743]  ? __pfx_kthread+0x10/0x10
[   13.224761]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.224784]  ? calculate_sigpending+0x7b/0xa0
[   13.224807]  ? __pfx_kthread+0x10/0x10
[   13.224825]  ret_from_fork+0x41/0x80
[   13.224847]  ? __pfx_kthread+0x10/0x10
[   13.224864]  ret_from_fork_asm+0x1a/0x30
[   13.224895]  </TASK>
[   13.224907] 
[   13.234613] Allocated by task 280:
[   13.234842]  kasan_save_stack+0x45/0x70
[   13.235097]  kasan_save_track+0x18/0x40
[   13.235338]  kasan_save_alloc_info+0x3b/0x50
[   13.235526]  __kasan_kmalloc+0xb7/0xc0
[   13.235760]  __kmalloc_cache_noprof+0x189/0x420
[   13.235999]  kasan_bitops_generic+0x92/0x1c0
[   13.236253]  kunit_try_run_case+0x1a5/0x480
[   13.236659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.236996]  kthread+0x337/0x6f0
[   13.237119]  ret_from_fork+0x41/0x80
[   13.237257]  ret_from_fork_asm+0x1a/0x30
[   13.237453] 
[   13.237768] The buggy address belongs to the object at ffff888102307e00
[   13.237768]  which belongs to the cache kmalloc-16 of size 16
[   13.238292] The buggy address is located 8 bytes inside of
[   13.238292]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.238949] 
[   13.239067] The buggy address belongs to the physical page:
[   13.239352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.239872] flags: 0x200000000000000(node=0|zone=2)
[   13.240139] page_type: f5(slab)
[   13.240588] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.241003] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.241255] page dumped because: kasan: bad access detected
[   13.241635] 
[   13.241778] Memory state around the buggy address:
[   13.242103]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.242969]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.243223] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.243878]                       ^
[   13.244051]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.244388]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.245168] ==================================================================
[   13.290497] ==================================================================
[   13.290933] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.291407] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.291643] 
[   13.291774] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.291821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.291833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.291856] Call Trace:
[   13.291875]  <TASK>
[   13.291895]  dump_stack_lvl+0x73/0xb0
[   13.291921]  print_report+0xd1/0x650
[   13.291944]  ? __virt_addr_valid+0x1db/0x2d0
[   13.291967]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.291990]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.292014]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.292038]  kasan_report+0x141/0x180
[   13.292062]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.292091]  kasan_check_range+0x10c/0x1c0
[   13.292114]  __kasan_check_write+0x18/0x20
[   13.292136]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.292160]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.292184]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.292207]  ? trace_hardirqs_on+0x37/0xe0
[   13.292244]  ? kasan_bitops_generic+0x92/0x1c0
[   13.292270]  kasan_bitops_generic+0x116/0x1c0
[   13.292291]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.292315]  ? __pfx_read_tsc+0x10/0x10
[   13.292337]  ? ktime_get_ts64+0x86/0x230
[   13.292363]  kunit_try_run_case+0x1a5/0x480
[   13.292387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.292410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.292435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.292459]  ? __kthread_parkme+0x82/0x180
[   13.292481]  ? preempt_count_sub+0x50/0x80
[   13.292510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.292534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.292557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.292580]  kthread+0x337/0x6f0
[   13.292597]  ? trace_preempt_on+0x20/0xc0
[   13.292619]  ? __pfx_kthread+0x10/0x10
[   13.292638]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.292660]  ? calculate_sigpending+0x7b/0xa0
[   13.292682]  ? __pfx_kthread+0x10/0x10
[   13.292700]  ret_from_fork+0x41/0x80
[   13.292721]  ? __pfx_kthread+0x10/0x10
[   13.292739]  ret_from_fork_asm+0x1a/0x30
[   13.292770]  </TASK>
[   13.292780] 
[   13.301053] Allocated by task 280:
[   13.301245]  kasan_save_stack+0x45/0x70
[   13.301400]  kasan_save_track+0x18/0x40
[   13.301536]  kasan_save_alloc_info+0x3b/0x50
[   13.301687]  __kasan_kmalloc+0xb7/0xc0
[   13.301820]  __kmalloc_cache_noprof+0x189/0x420
[   13.301973]  kasan_bitops_generic+0x92/0x1c0
[   13.302516]  kunit_try_run_case+0x1a5/0x480
[   13.302825]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.303085]  kthread+0x337/0x6f0
[   13.303276]  ret_from_fork+0x41/0x80
[   13.303527]  ret_from_fork_asm+0x1a/0x30
[   13.303850] 
[   13.303949] The buggy address belongs to the object at ffff888102307e00
[   13.303949]  which belongs to the cache kmalloc-16 of size 16
[   13.304509] The buggy address is located 8 bytes inside of
[   13.304509]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.305265] 
[   13.305342] The buggy address belongs to the physical page:
[   13.305515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.305758] flags: 0x200000000000000(node=0|zone=2)
[   13.305960] page_type: f5(slab)
[   13.306293] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.306638] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.306975] page dumped because: kasan: bad access detected
[   13.307193] 
[   13.307470] Memory state around the buggy address:
[   13.307636]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.307964]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.308385] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.308787]                       ^
[   13.308970]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.309378]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.309667] ==================================================================
[   13.271322] ==================================================================
[   13.271869] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.272372] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.272663] 
[   13.272754] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.272801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.272817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.272839] Call Trace:
[   13.272859]  <TASK>
[   13.272878]  dump_stack_lvl+0x73/0xb0
[   13.272904]  print_report+0xd1/0x650
[   13.272926]  ? __virt_addr_valid+0x1db/0x2d0
[   13.272949]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.272971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.272995]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.273018]  kasan_report+0x141/0x180
[   13.273041]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.273069]  kasan_check_range+0x10c/0x1c0
[   13.273090]  __kasan_check_write+0x18/0x20
[   13.273110]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.273134]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.273157]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.273179]  ? trace_hardirqs_on+0x37/0xe0
[   13.273203]  ? kasan_bitops_generic+0x92/0x1c0
[   13.273241]  kasan_bitops_generic+0x116/0x1c0
[   13.273263]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.273285]  ? __pfx_read_tsc+0x10/0x10
[   13.273305]  ? ktime_get_ts64+0x86/0x230
[   13.273331]  kunit_try_run_case+0x1a5/0x480
[   13.273356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.273392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.273417]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.273441]  ? __kthread_parkme+0x82/0x180
[   13.273463]  ? preempt_count_sub+0x50/0x80
[   13.273488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.273512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.273536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.273567]  kthread+0x337/0x6f0
[   13.273583]  ? trace_preempt_on+0x20/0xc0
[   13.273606]  ? __pfx_kthread+0x10/0x10
[   13.273625]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.273647]  ? calculate_sigpending+0x7b/0xa0
[   13.273669]  ? __pfx_kthread+0x10/0x10
[   13.273689]  ret_from_fork+0x41/0x80
[   13.273709]  ? __pfx_kthread+0x10/0x10
[   13.273728]  ret_from_fork_asm+0x1a/0x30
[   13.273759]  </TASK>
[   13.273769] 
[   13.281800] Allocated by task 280:
[   13.281925]  kasan_save_stack+0x45/0x70
[   13.282065]  kasan_save_track+0x18/0x40
[   13.282257]  kasan_save_alloc_info+0x3b/0x50
[   13.282555]  __kasan_kmalloc+0xb7/0xc0
[   13.282877]  __kmalloc_cache_noprof+0x189/0x420
[   13.283056]  kasan_bitops_generic+0x92/0x1c0
[   13.283219]  kunit_try_run_case+0x1a5/0x480
[   13.283546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.283787]  kthread+0x337/0x6f0
[   13.283947]  ret_from_fork+0x41/0x80
[   13.284108]  ret_from_fork_asm+0x1a/0x30
[   13.284270] 
[   13.284606] The buggy address belongs to the object at ffff888102307e00
[   13.284606]  which belongs to the cache kmalloc-16 of size 16
[   13.285131] The buggy address is located 8 bytes inside of
[   13.285131]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.285669] 
[   13.285778] The buggy address belongs to the physical page:
[   13.286008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.286364] flags: 0x200000000000000(node=0|zone=2)
[   13.286600] page_type: f5(slab)
[   13.286777] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.287112] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.287439] page dumped because: kasan: bad access detected
[   13.287638] 
[   13.287707] Memory state around the buggy address:
[   13.287867]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.288084]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.288313] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.289021]                       ^
[   13.289246]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.289638]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.289964] ==================================================================
[   13.336352] ==================================================================
[   13.336728] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.337108] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.337461] 
[   13.337584] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.337632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.337645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.337667] Call Trace:
[   13.337684]  <TASK>
[   13.337702]  dump_stack_lvl+0x73/0xb0
[   13.337727]  print_report+0xd1/0x650
[   13.337751]  ? __virt_addr_valid+0x1db/0x2d0
[   13.337773]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.337795]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.337818]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.337840]  kasan_report+0x141/0x180
[   13.337863]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.337889]  kasan_check_range+0x10c/0x1c0
[   13.337910]  __kasan_check_write+0x18/0x20
[   13.337929]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.337952]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.337975]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.337996]  ? trace_hardirqs_on+0x37/0xe0
[   13.338019]  ? kasan_bitops_generic+0x92/0x1c0
[   13.338043]  kasan_bitops_generic+0x116/0x1c0
[   13.338063]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.338085]  ? __pfx_read_tsc+0x10/0x10
[   13.338105]  ? ktime_get_ts64+0x86/0x230
[   13.338130]  kunit_try_run_case+0x1a5/0x480
[   13.338154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.338177]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.338202]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.338225]  ? __kthread_parkme+0x82/0x180
[   13.338481]  ? preempt_count_sub+0x50/0x80
[   13.338510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.338534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.338558]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.338581]  kthread+0x337/0x6f0
[   13.338599]  ? trace_preempt_on+0x20/0xc0
[   13.338622]  ? __pfx_kthread+0x10/0x10
[   13.338665]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.338688]  ? calculate_sigpending+0x7b/0xa0
[   13.338711]  ? __pfx_kthread+0x10/0x10
[   13.338730]  ret_from_fork+0x41/0x80
[   13.338751]  ? __pfx_kthread+0x10/0x10
[   13.338769]  ret_from_fork_asm+0x1a/0x30
[   13.338801]  </TASK>
[   13.338811] 
[   13.348201] Allocated by task 280:
[   13.348468]  kasan_save_stack+0x45/0x70
[   13.348709]  kasan_save_track+0x18/0x40
[   13.348878]  kasan_save_alloc_info+0x3b/0x50
[   13.349050]  __kasan_kmalloc+0xb7/0xc0
[   13.349241]  __kmalloc_cache_noprof+0x189/0x420
[   13.349564]  kasan_bitops_generic+0x92/0x1c0
[   13.349786]  kunit_try_run_case+0x1a5/0x480
[   13.349975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.350210]  kthread+0x337/0x6f0
[   13.350572]  ret_from_fork+0x41/0x80
[   13.350736]  ret_from_fork_asm+0x1a/0x30
[   13.350970] 
[   13.351062] The buggy address belongs to the object at ffff888102307e00
[   13.351062]  which belongs to the cache kmalloc-16 of size 16
[   13.351649] The buggy address is located 8 bytes inside of
[   13.351649]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.352150] 
[   13.352260] The buggy address belongs to the physical page:
[   13.352560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.352871] flags: 0x200000000000000(node=0|zone=2)
[   13.353042] page_type: f5(slab)
[   13.353166] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.353632] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.354008] page dumped because: kasan: bad access detected
[   13.354211] 
[   13.354472] Memory state around the buggy address:
[   13.354706]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.355066]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.355511] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.355865]                       ^
[   13.356011]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.356399]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.356729] ==================================================================
[   13.388749] ==================================================================
[   13.389131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.389681] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280
[   13.390021] 
[   13.390116] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc1 #1 PREEMPT(voluntary) 
[   13.390163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.390176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.390198] Call Trace:
[   13.390217]  <TASK>
[   13.390250]  dump_stack_lvl+0x73/0xb0
[   13.390277]  print_report+0xd1/0x650
[   13.390302]  ? __virt_addr_valid+0x1db/0x2d0
[   13.390325]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.390347]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.390370]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.390393]  kasan_report+0x141/0x180
[   13.390415]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.390443]  kasan_check_range+0x10c/0x1c0
[   13.390464]  __kasan_check_write+0x18/0x20
[   13.390484]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.390506]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.390531]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.390553]  ? trace_hardirqs_on+0x37/0xe0
[   13.390576]  ? kasan_bitops_generic+0x92/0x1c0
[   13.390601]  kasan_bitops_generic+0x116/0x1c0
[   13.390623]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.390656]  ? __pfx_read_tsc+0x10/0x10
[   13.390676]  ? ktime_get_ts64+0x86/0x230
[   13.390703]  kunit_try_run_case+0x1a5/0x480
[   13.390727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.390750]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.390775]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.390799]  ? __kthread_parkme+0x82/0x180
[   13.390821]  ? preempt_count_sub+0x50/0x80
[   13.390848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.390873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.390899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.390923]  kthread+0x337/0x6f0
[   13.390940]  ? trace_preempt_on+0x20/0xc0
[   13.390964]  ? __pfx_kthread+0x10/0x10
[   13.390983]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.391005]  ? calculate_sigpending+0x7b/0xa0
[   13.391027]  ? __pfx_kthread+0x10/0x10
[   13.391046]  ret_from_fork+0x41/0x80
[   13.391068]  ? __pfx_kthread+0x10/0x10
[   13.391086]  ret_from_fork_asm+0x1a/0x30
[   13.391118]  </TASK>
[   13.391130] 
[   13.399987] Allocated by task 280:
[   13.400127]  kasan_save_stack+0x45/0x70
[   13.400395]  kasan_save_track+0x18/0x40
[   13.400595]  kasan_save_alloc_info+0x3b/0x50
[   13.400945]  __kasan_kmalloc+0xb7/0xc0
[   13.401145]  __kmalloc_cache_noprof+0x189/0x420
[   13.401322]  kasan_bitops_generic+0x92/0x1c0
[   13.401575]  kunit_try_run_case+0x1a5/0x480
[   13.402042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.402242]  kthread+0x337/0x6f0
[   13.402363]  ret_from_fork+0x41/0x80
[   13.402515]  ret_from_fork_asm+0x1a/0x30
[   13.402712] 
[   13.402807] The buggy address belongs to the object at ffff888102307e00
[   13.402807]  which belongs to the cache kmalloc-16 of size 16
[   13.403518] The buggy address is located 8 bytes inside of
[   13.403518]  allocated 9-byte region [ffff888102307e00, ffff888102307e09)
[   13.404197] 
[   13.404316] The buggy address belongs to the physical page:
[   13.404623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307
[   13.404924] flags: 0x200000000000000(node=0|zone=2)
[   13.405088] page_type: f5(slab)
[   13.405221] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.405941] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.406292] page dumped because: kasan: bad access detected
[   13.406537] 
[   13.406609] Memory state around the buggy address:
[   13.407060]  ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc
[   13.407382]  ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.407600] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.407978]                       ^
[   13.408163]  ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.408647]  ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.408855] ==================================================================