Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-x86_64

[   39.327019] ==================================================================
[   39.336351] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   39.344507] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   39.351886] 
[   39.353372] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   39.353430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.353448] Hardware name: WinLink E850-96 board (DT)
[   39.353471] Call trace:
[   39.353485]  show_stack+0x20/0x38 (C)
[   39.353519]  dump_stack_lvl+0x8c/0xd0
[   39.353556]  print_report+0x118/0x608
[   39.353587]  kasan_report+0xdc/0x128
[   39.353619]  kasan_check_range+0x100/0x1a8
[   39.353651]  __kasan_check_write+0x20/0x30
[   39.353687]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   39.353719]  kasan_bitops_generic+0x110/0x1c8
[   39.353750]  kunit_try_run_case+0x170/0x3f0
[   39.353787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.353826]  kthread+0x328/0x630
[   39.353862]  ret_from_fork+0x10/0x20
[   39.353898] 
[   39.425063] Allocated by task 310:
[   39.428448]  kasan_save_stack+0x3c/0x68
[   39.432265]  kasan_save_track+0x20/0x40
[   39.436085]  kasan_save_alloc_info+0x40/0x58
[   39.440338]  __kasan_kmalloc+0xd4/0xd8
[   39.444071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.448585]  kasan_bitops_generic+0xa0/0x1c8
[   39.452838]  kunit_try_run_case+0x170/0x3f0
[   39.457004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.462473]  kthread+0x328/0x630
[   39.465685]  ret_from_fork+0x10/0x20
[   39.469244] 
[   39.470722] The buggy address belongs to the object at ffff000800d63020
[   39.470722]  which belongs to the cache kmalloc-16 of size 16
[   39.483050] The buggy address is located 8 bytes inside of
[   39.483050]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   39.495285] 
[   39.496765] The buggy address belongs to the physical page:
[   39.502320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   39.510305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.516814] page_type: f5(slab)
[   39.519952] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   39.527670] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   39.535392] page dumped because: kasan: bad access detected
[   39.540944] 
[   39.542419] Memory state around the buggy address:
[   39.547199]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.554403]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.561610] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   39.568809]                                   ^
[   39.573326]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.580531]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.587733] ==================================================================
[   39.857451] ==================================================================
[   39.864471] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   39.872625] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   39.880002] 
[   39.881487] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   39.881537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.881552] Hardware name: WinLink E850-96 board (DT)
[   39.881573] Call trace:
[   39.881586]  show_stack+0x20/0x38 (C)
[   39.881620]  dump_stack_lvl+0x8c/0xd0
[   39.881659]  print_report+0x118/0x608
[   39.881688]  kasan_report+0xdc/0x128
[   39.881717]  kasan_check_range+0x100/0x1a8
[   39.881750]  __kasan_check_write+0x20/0x30
[   39.881781]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   39.881813]  kasan_bitops_generic+0x110/0x1c8
[   39.881844]  kunit_try_run_case+0x170/0x3f0
[   39.881879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.881915]  kthread+0x328/0x630
[   39.881950]  ret_from_fork+0x10/0x20
[   39.881987] 
[   39.953178] Allocated by task 310:
[   39.956566]  kasan_save_stack+0x3c/0x68
[   39.960382]  kasan_save_track+0x20/0x40
[   39.964203]  kasan_save_alloc_info+0x40/0x58
[   39.968455]  __kasan_kmalloc+0xd4/0xd8
[   39.972188]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.976702]  kasan_bitops_generic+0xa0/0x1c8
[   39.980955]  kunit_try_run_case+0x170/0x3f0
[   39.985122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.990590]  kthread+0x328/0x630
[   39.993802]  ret_from_fork+0x10/0x20
[   39.997361] 
[   39.998839] The buggy address belongs to the object at ffff000800d63020
[   39.998839]  which belongs to the cache kmalloc-16 of size 16
[   40.011164] The buggy address is located 8 bytes inside of
[   40.011164]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   40.023402] 
[   40.024880] The buggy address belongs to the physical page:
[   40.030438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   40.038420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.044930] page_type: f5(slab)
[   40.048067] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.055787] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.063506] page dumped because: kasan: bad access detected
[   40.069061] 
[   40.070537] Memory state around the buggy address:
[   40.075318]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.082522]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.089726] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   40.096926]                                   ^
[   40.101445]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.108648]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.115849] ==================================================================
[   41.711041] ==================================================================
[   41.718085] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   41.726242] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   41.733533] 
[   41.735015] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   41.735059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.735076] Hardware name: WinLink E850-96 board (DT)
[   41.735096] Call trace:
[   41.735110]  show_stack+0x20/0x38 (C)
[   41.735140]  dump_stack_lvl+0x8c/0xd0
[   41.735175]  print_report+0x118/0x608
[   41.735208]  kasan_report+0xdc/0x128
[   41.735236]  __asan_report_load8_noabort+0x20/0x30
[   41.735274]  kasan_bitops_modify.constprop.0+0xa20/0xbc0
[   41.735305]  kasan_bitops_generic+0x110/0x1c8
[   41.735335]  kunit_try_run_case+0x170/0x3f0
[   41.735370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.735408]  kthread+0x328/0x630
[   41.735440]  ret_from_fork+0x10/0x20
[   41.735473] 
[   41.803324] Allocated by task 310:
[   41.806709]  kasan_save_stack+0x3c/0x68
[   41.810529]  kasan_save_track+0x20/0x40
[   41.814348]  kasan_save_alloc_info+0x40/0x58
[   41.818601]  __kasan_kmalloc+0xd4/0xd8
[   41.822334]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.826847]  kasan_bitops_generic+0xa0/0x1c8
[   41.831101]  kunit_try_run_case+0x170/0x3f0
[   41.835267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.840736]  kthread+0x328/0x630
[   41.843948]  ret_from_fork+0x10/0x20
[   41.847507] 
[   41.848984] The buggy address belongs to the object at ffff000800d63020
[   41.848984]  which belongs to the cache kmalloc-16 of size 16
[   41.861309] The buggy address is located 8 bytes inside of
[   41.861309]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   41.873548] 
[   41.875024] The buggy address belongs to the physical page:
[   41.880580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   41.888566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.895076] page_type: f5(slab)
[   41.898209] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.905933] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.913652] page dumped because: kasan: bad access detected
[   41.919207] 
[   41.920683] Memory state around the buggy address:
[   41.925461]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.932666]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.939871] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.947072]                                   ^
[   41.951589]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.958794]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.965995] ==================================================================
[   40.123151] ==================================================================
[   40.130263] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   40.138418] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   40.145710] 
[   40.147194] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   40.147245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.147261] Hardware name: WinLink E850-96 board (DT)
[   40.147280] Call trace:
[   40.147294]  show_stack+0x20/0x38 (C)
[   40.147329]  dump_stack_lvl+0x8c/0xd0
[   40.147364]  print_report+0x118/0x608
[   40.147393]  kasan_report+0xdc/0x128
[   40.147420]  __asan_report_load8_noabort+0x20/0x30
[   40.147456]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   40.147487]  kasan_bitops_generic+0x110/0x1c8
[   40.147517]  kunit_try_run_case+0x170/0x3f0
[   40.147551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.147588]  kthread+0x328/0x630
[   40.147620]  ret_from_fork+0x10/0x20
[   40.147653] 
[   40.215500] Allocated by task 310:
[   40.218886]  kasan_save_stack+0x3c/0x68
[   40.222705]  kasan_save_track+0x20/0x40
[   40.226524]  kasan_save_alloc_info+0x40/0x58
[   40.230778]  __kasan_kmalloc+0xd4/0xd8
[   40.234510]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.239024]  kasan_bitops_generic+0xa0/0x1c8
[   40.243278]  kunit_try_run_case+0x170/0x3f0
[   40.247444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.252913]  kthread+0x328/0x630
[   40.256125]  ret_from_fork+0x10/0x20
[   40.259684] 
[   40.261161] The buggy address belongs to the object at ffff000800d63020
[   40.261161]  which belongs to the cache kmalloc-16 of size 16
[   40.273486] The buggy address is located 8 bytes inside of
[   40.273486]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   40.285725] 
[   40.287202] The buggy address belongs to the physical page:
[   40.292758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   40.300742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.307252] page_type: f5(slab)
[   40.310387] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.318110] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.325829] page dumped because: kasan: bad access detected
[   40.331384] 
[   40.332859] Memory state around the buggy address:
[   40.337640]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.344843]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.352047] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   40.359248]                                   ^
[   40.363766]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.370971]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.378171] ==================================================================
[   40.917079] ==================================================================
[   40.924174] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   40.932330] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   40.939621] 
[   40.941106] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   40.941156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.941173] Hardware name: WinLink E850-96 board (DT)
[   40.941192] Call trace:
[   40.941204]  show_stack+0x20/0x38 (C)
[   40.941238]  dump_stack_lvl+0x8c/0xd0
[   40.941272]  print_report+0x118/0x608
[   40.941303]  kasan_report+0xdc/0x128
[   40.941331]  __asan_report_load8_noabort+0x20/0x30
[   40.941370]  kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   40.941402]  kasan_bitops_generic+0x110/0x1c8
[   40.941432]  kunit_try_run_case+0x170/0x3f0
[   40.941467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.941504]  kthread+0x328/0x630
[   40.941538]  ret_from_fork+0x10/0x20
[   40.941570] 
[   41.009412] Allocated by task 310:
[   41.012798]  kasan_save_stack+0x3c/0x68
[   41.016617]  kasan_save_track+0x20/0x40
[   41.020436]  kasan_save_alloc_info+0x40/0x58
[   41.024690]  __kasan_kmalloc+0xd4/0xd8
[   41.028422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.032936]  kasan_bitops_generic+0xa0/0x1c8
[   41.037189]  kunit_try_run_case+0x170/0x3f0
[   41.041356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.046824]  kthread+0x328/0x630
[   41.050036]  ret_from_fork+0x10/0x20
[   41.053595] 
[   41.055072] The buggy address belongs to the object at ffff000800d63020
[   41.055072]  which belongs to the cache kmalloc-16 of size 16
[   41.067398] The buggy address is located 8 bytes inside of
[   41.067398]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   41.079637] 
[   41.081113] The buggy address belongs to the physical page:
[   41.086670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   41.094654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.101164] page_type: f5(slab)
[   41.104298] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.112022] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.119740] page dumped because: kasan: bad access detected
[   41.125296] 
[   41.126771] Memory state around the buggy address:
[   41.131551]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.138754]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.145959] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.153160]                                   ^
[   41.157677]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.164882]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.172083] ==================================================================
[   41.445191] ==================================================================
[   41.452292] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   41.460447] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   41.467825] 
[   41.469306] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   41.469356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.469372] Hardware name: WinLink E850-96 board (DT)
[   41.469391] Call trace:
[   41.469403]  show_stack+0x20/0x38 (C)
[   41.469435]  dump_stack_lvl+0x8c/0xd0
[   41.469472]  print_report+0x118/0x608
[   41.469502]  kasan_report+0xdc/0x128
[   41.469531]  kasan_check_range+0x100/0x1a8
[   41.469559]  __kasan_check_write+0x20/0x30
[   41.469593]  kasan_bitops_modify.constprop.0+0x3b0/0xbc0
[   41.469625]  kasan_bitops_generic+0x110/0x1c8
[   41.469653]  kunit_try_run_case+0x170/0x3f0
[   41.469685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.469725]  kthread+0x328/0x630
[   41.469757]  ret_from_fork+0x10/0x20
[   41.469791] 
[   41.541001] Allocated by task 310:
[   41.544387]  kasan_save_stack+0x3c/0x68
[   41.548206]  kasan_save_track+0x20/0x40
[   41.552025]  kasan_save_alloc_info+0x40/0x58
[   41.556279]  __kasan_kmalloc+0xd4/0xd8
[   41.560011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.564525]  kasan_bitops_generic+0xa0/0x1c8
[   41.568779]  kunit_try_run_case+0x170/0x3f0
[   41.572945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.578414]  kthread+0x328/0x630
[   41.581626]  ret_from_fork+0x10/0x20
[   41.585184] 
[   41.586660] The buggy address belongs to the object at ffff000800d63020
[   41.586660]  which belongs to the cache kmalloc-16 of size 16
[   41.598987] The buggy address is located 8 bytes inside of
[   41.598987]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   41.611227] 
[   41.612702] The buggy address belongs to the physical page:
[   41.618257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   41.626243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.632755] page_type: f5(slab)
[   41.635888] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.643611] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.651329] page dumped because: kasan: bad access detected
[   41.656885] 
[   41.658360] Memory state around the buggy address:
[   41.663140]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.670343]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.677548] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.684749]                                   ^
[   41.689267]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.696472]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.703672] ==================================================================
[   39.595066] ==================================================================
[   39.602145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   39.610301] Read of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   39.617593] 
[   39.619077] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   39.619125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.619143] Hardware name: WinLink E850-96 board (DT)
[   39.619165] Call trace:
[   39.619181]  show_stack+0x20/0x38 (C)
[   39.619214]  dump_stack_lvl+0x8c/0xd0
[   39.619250]  print_report+0x118/0x608
[   39.619280]  kasan_report+0xdc/0x128
[   39.619309]  __asan_report_load8_noabort+0x20/0x30
[   39.619346]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   39.619377]  kasan_bitops_generic+0x110/0x1c8
[   39.619405]  kunit_try_run_case+0x170/0x3f0
[   39.619441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.619478]  kthread+0x328/0x630
[   39.619513]  ret_from_fork+0x10/0x20
[   39.619547] 
[   39.687383] Allocated by task 310:
[   39.690770]  kasan_save_stack+0x3c/0x68
[   39.694588]  kasan_save_track+0x20/0x40
[   39.698407]  kasan_save_alloc_info+0x40/0x58
[   39.702661]  __kasan_kmalloc+0xd4/0xd8
[   39.706393]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.710907]  kasan_bitops_generic+0xa0/0x1c8
[   39.715160]  kunit_try_run_case+0x170/0x3f0
[   39.719327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.724796]  kthread+0x328/0x630
[   39.728008]  ret_from_fork+0x10/0x20
[   39.731566] 
[   39.733044] The buggy address belongs to the object at ffff000800d63020
[   39.733044]  which belongs to the cache kmalloc-16 of size 16
[   39.745369] The buggy address is located 8 bytes inside of
[   39.745369]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   39.757608] 
[   39.759087] The buggy address belongs to the physical page:
[   39.764641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   39.772625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.779135] page_type: f5(slab)
[   39.782272] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   39.789992] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   39.797711] page dumped because: kasan: bad access detected
[   39.803267] 
[   39.804742] Memory state around the buggy address:
[   39.809523]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.816726]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.823932] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   39.831131]                                   ^
[   39.835649]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.842854]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.850055] ==================================================================
[   40.385489] ==================================================================
[   40.392586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   40.400741] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   40.408119] 
[   40.409601] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   40.409654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.409670] Hardware name: WinLink E850-96 board (DT)
[   40.409689] Call trace:
[   40.409702]  show_stack+0x20/0x38 (C)
[   40.409733]  dump_stack_lvl+0x8c/0xd0
[   40.409767]  print_report+0x118/0x608
[   40.409798]  kasan_report+0xdc/0x128
[   40.409826]  kasan_check_range+0x100/0x1a8
[   40.409859]  __kasan_check_write+0x20/0x30
[   40.409891]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   40.409921]  kasan_bitops_generic+0x110/0x1c8
[   40.409950]  kunit_try_run_case+0x170/0x3f0
[   40.409986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.410023]  kthread+0x328/0x630
[   40.410058]  ret_from_fork+0x10/0x20
[   40.410095] 
[   40.481295] Allocated by task 310:
[   40.484680]  kasan_save_stack+0x3c/0x68
[   40.488499]  kasan_save_track+0x20/0x40
[   40.492319]  kasan_save_alloc_info+0x40/0x58
[   40.496573]  __kasan_kmalloc+0xd4/0xd8
[   40.500305]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.504819]  kasan_bitops_generic+0xa0/0x1c8
[   40.509072]  kunit_try_run_case+0x170/0x3f0
[   40.513238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.518708]  kthread+0x328/0x630
[   40.521919]  ret_from_fork+0x10/0x20
[   40.525478] 
[   40.526954] The buggy address belongs to the object at ffff000800d63020
[   40.526954]  which belongs to the cache kmalloc-16 of size 16
[   40.539282] The buggy address is located 8 bytes inside of
[   40.539282]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   40.551519] 
[   40.552997] The buggy address belongs to the physical page:
[   40.558554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   40.566537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.573047] page_type: f5(slab)
[   40.576183] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.583904] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.591623] page dumped because: kasan: bad access detected
[   40.597178] 
[   40.598654] Memory state around the buggy address:
[   40.603435]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.610639]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.617844] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   40.625043]                                   ^
[   40.629560]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.636765]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.643968] ==================================================================
[   41.179386] ==================================================================
[   41.186497] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0
[   41.194652] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   41.202031] 
[   41.203515] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   41.203562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.203579] Hardware name: WinLink E850-96 board (DT)
[   41.203596] Call trace:
[   41.203608]  show_stack+0x20/0x38 (C)
[   41.203639]  dump_stack_lvl+0x8c/0xd0
[   41.203673]  print_report+0x118/0x608
[   41.203703]  kasan_report+0xdc/0x128
[   41.203733]  kasan_check_range+0x100/0x1a8
[   41.203765]  __kasan_check_write+0x20/0x30
[   41.203800]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   41.203832]  kasan_bitops_generic+0x110/0x1c8
[   41.203862]  kunit_try_run_case+0x170/0x3f0
[   41.203896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.203935]  kthread+0x328/0x630
[   41.203967]  ret_from_fork+0x10/0x20
[   41.203998] 
[   41.275206] Allocated by task 310:
[   41.278592]  kasan_save_stack+0x3c/0x68
[   41.282411]  kasan_save_track+0x20/0x40
[   41.286231]  kasan_save_alloc_info+0x40/0x58
[   41.290484]  __kasan_kmalloc+0xd4/0xd8
[   41.294217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.298730]  kasan_bitops_generic+0xa0/0x1c8
[   41.302984]  kunit_try_run_case+0x170/0x3f0
[   41.307150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.312619]  kthread+0x328/0x630
[   41.315831]  ret_from_fork+0x10/0x20
[   41.319390] 
[   41.320866] The buggy address belongs to the object at ffff000800d63020
[   41.320866]  which belongs to the cache kmalloc-16 of size 16
[   41.333192] The buggy address is located 8 bytes inside of
[   41.333192]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   41.345431] 
[   41.346907] The buggy address belongs to the physical page:
[   41.352464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   41.360450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.366960] page_type: f5(slab)
[   41.370093] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   41.377816] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   41.385535] page dumped because: kasan: bad access detected
[   41.391090] 
[   41.392566] Memory state around the buggy address:
[   41.397347]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.404549]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.411753] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   41.418954]                                   ^
[   41.423472]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.430677]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.437878] ==================================================================
[   40.651273] ==================================================================
[   40.658380] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   40.666535] Write of size 8 at addr ffff000800d63028 by task kunit_try_catch/310
[   40.673914] 
[   40.675400] CPU: 7 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   40.675448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.675465] Hardware name: WinLink E850-96 board (DT)
[   40.675485] Call trace:
[   40.675497]  show_stack+0x20/0x38 (C)
[   40.675531]  dump_stack_lvl+0x8c/0xd0
[   40.675566]  print_report+0x118/0x608
[   40.675593]  kasan_report+0xdc/0x128
[   40.675619]  kasan_check_range+0x100/0x1a8
[   40.675650]  __kasan_check_write+0x20/0x30
[   40.675682]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   40.675715]  kasan_bitops_generic+0x110/0x1c8
[   40.675745]  kunit_try_run_case+0x170/0x3f0
[   40.675779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.675817]  kthread+0x328/0x630
[   40.675849]  ret_from_fork+0x10/0x20
[   40.675884] 
[   40.747089] Allocated by task 310:
[   40.750477]  kasan_save_stack+0x3c/0x68
[   40.754294]  kasan_save_track+0x20/0x40
[   40.758114]  kasan_save_alloc_info+0x40/0x58
[   40.762367]  __kasan_kmalloc+0xd4/0xd8
[   40.766100]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.770614]  kasan_bitops_generic+0xa0/0x1c8
[   40.774867]  kunit_try_run_case+0x170/0x3f0
[   40.779033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.784502]  kthread+0x328/0x630
[   40.787714]  ret_from_fork+0x10/0x20
[   40.791273] 
[   40.792749] The buggy address belongs to the object at ffff000800d63020
[   40.792749]  which belongs to the cache kmalloc-16 of size 16
[   40.805076] The buggy address is located 8 bytes inside of
[   40.805076]  allocated 9-byte region [ffff000800d63020, ffff000800d63029)
[   40.817314] 
[   40.818790] The buggy address belongs to the physical page:
[   40.824347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63
[   40.832331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.838842] page_type: f5(slab)
[   40.841976] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000
[   40.849700] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   40.857418] page dumped because: kasan: bad access detected
[   40.862973] 
[   40.864449] Memory state around the buggy address:
[   40.869230]  ffff000800d62f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.876432]  ffff000800d62f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.883636] >ffff000800d63000: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   40.890837]                                   ^
[   40.895355]  ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.902560]  ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.909761] ==================================================================

[   16.955051] ==================================================================
[   16.955595] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.956005] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   16.957024] 
[   16.957737] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   16.957854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.957882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.957934] Call Trace:
[   16.957977]  <TASK>
[   16.958019]  dump_stack_lvl+0x73/0xb0
[   16.958127]  print_report+0xd1/0x650
[   16.958184]  ? __virt_addr_valid+0x1db/0x2d0
[   16.958423]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.958462]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.958490]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.958515]  kasan_report+0x141/0x180
[   16.958543]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.958573]  kasan_check_range+0x10c/0x1c0
[   16.958596]  __kasan_check_write+0x18/0x20
[   16.958618]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   16.958643]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.958668]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.958692]  ? trace_hardirqs_on+0x37/0xe0
[   16.958719]  ? kasan_bitops_generic+0x92/0x1c0
[   16.958746]  kasan_bitops_generic+0x116/0x1c0
[   16.958769]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.958794]  ? __pfx_read_tsc+0x10/0x10
[   16.958817]  ? ktime_get_ts64+0x86/0x230
[   16.958846]  kunit_try_run_case+0x1a5/0x480
[   16.958875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.958900]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.958928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.958955]  ? __kthread_parkme+0x82/0x180
[   16.958980]  ? preempt_count_sub+0x50/0x80
[   16.959009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.959035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.959061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.959087]  kthread+0x337/0x6f0
[   16.959106]  ? trace_preempt_on+0x20/0xc0
[   16.959131]  ? __pfx_kthread+0x10/0x10
[   16.959151]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.959175]  ? calculate_sigpending+0x7b/0xa0
[   16.959199]  ? __pfx_kthread+0x10/0x10
[   16.959219]  ret_from_fork+0x41/0x80
[   16.959243]  ? __pfx_kthread+0x10/0x10
[   16.959263]  ret_from_fork_asm+0x1a/0x30
[   16.959348]  </TASK>
[   16.959370] 
[   16.975226] Allocated by task 282:
[   16.975492]  kasan_save_stack+0x45/0x70
[   16.975911]  kasan_save_track+0x18/0x40
[   16.976445]  kasan_save_alloc_info+0x3b/0x50
[   16.977037]  __kasan_kmalloc+0xb7/0xc0
[   16.977914]  __kmalloc_cache_noprof+0x189/0x420
[   16.978357]  kasan_bitops_generic+0x92/0x1c0
[   16.978678]  kunit_try_run_case+0x1a5/0x480
[   16.979100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.979707]  kthread+0x337/0x6f0
[   16.979962]  ret_from_fork+0x41/0x80
[   16.980268]  ret_from_fork_asm+0x1a/0x30
[   16.980545] 
[   16.980923] The buggy address belongs to the object at ffff8881024d2600
[   16.980923]  which belongs to the cache kmalloc-16 of size 16
[   16.981925] The buggy address is located 8 bytes inside of
[   16.981925]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   16.982774] 
[   16.982911] The buggy address belongs to the physical page:
[   16.983175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   16.984167] flags: 0x200000000000000(node=0|zone=2)
[   16.985178] page_type: f5(slab)
[   16.985734] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.986575] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.986938] page dumped because: kasan: bad access detected
[   16.987485] 
[   16.987926] Memory state around the buggy address:
[   16.988303]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.988899]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   16.989411] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.990400]                       ^
[   16.990640]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.991115]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.991868] ==================================================================
[   16.879845] ==================================================================
[   16.880325] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.881008] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   16.882046] 
[   16.882296] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   16.882781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.882812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.882862] Call Trace:
[   16.882891]  <TASK>
[   16.882934]  dump_stack_lvl+0x73/0xb0
[   16.882996]  print_report+0xd1/0x650
[   16.883026]  ? __virt_addr_valid+0x1db/0x2d0
[   16.883055]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.883123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.883169]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.883230]  kasan_report+0x141/0x180
[   16.883271]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.883329]  kasan_check_range+0x10c/0x1c0
[   16.883393]  __kasan_check_write+0x18/0x20
[   16.883439]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   16.883481]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.883519]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.883547]  ? trace_hardirqs_on+0x37/0xe0
[   16.883575]  ? kasan_bitops_generic+0x92/0x1c0
[   16.883604]  kasan_bitops_generic+0x116/0x1c0
[   16.883627]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.883651]  ? __pfx_read_tsc+0x10/0x10
[   16.883675]  ? ktime_get_ts64+0x86/0x230
[   16.883706]  kunit_try_run_case+0x1a5/0x480
[   16.883735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.883760]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.883788]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.883814]  ? __kthread_parkme+0x82/0x180
[   16.883840]  ? preempt_count_sub+0x50/0x80
[   16.883868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.883895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.883921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.883946]  kthread+0x337/0x6f0
[   16.883965]  ? trace_preempt_on+0x20/0xc0
[   16.883990]  ? __pfx_kthread+0x10/0x10
[   16.884009]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.884034]  ? calculate_sigpending+0x7b/0xa0
[   16.884059]  ? __pfx_kthread+0x10/0x10
[   16.884093]  ret_from_fork+0x41/0x80
[   16.884127]  ? __pfx_kthread+0x10/0x10
[   16.884156]  ret_from_fork_asm+0x1a/0x30
[   16.884252]  </TASK>
[   16.884282] 
[   16.899519] Allocated by task 282:
[   16.899880]  kasan_save_stack+0x45/0x70
[   16.900889]  kasan_save_track+0x18/0x40
[   16.901116]  kasan_save_alloc_info+0x3b/0x50
[   16.901761]  __kasan_kmalloc+0xb7/0xc0
[   16.901975]  __kmalloc_cache_noprof+0x189/0x420
[   16.902783]  kasan_bitops_generic+0x92/0x1c0
[   16.903297]  kunit_try_run_case+0x1a5/0x480
[   16.903866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.904272]  kthread+0x337/0x6f0
[   16.904599]  ret_from_fork+0x41/0x80
[   16.905031]  ret_from_fork_asm+0x1a/0x30
[   16.905690] 
[   16.905861] The buggy address belongs to the object at ffff8881024d2600
[   16.905861]  which belongs to the cache kmalloc-16 of size 16
[   16.907130] The buggy address is located 8 bytes inside of
[   16.907130]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   16.907720] 
[   16.907837] The buggy address belongs to the physical page:
[   16.908106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   16.908509] flags: 0x200000000000000(node=0|zone=2)
[   16.908771] page_type: f5(slab)
[   16.908967] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.910075] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.910569] page dumped because: kasan: bad access detected
[   16.911199] 
[   16.911367] Memory state around the buggy address:
[   16.911619]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.911950]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   16.912787] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.913360]                       ^
[   16.913828]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.914686]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.915488] ==================================================================
[   17.110540] ==================================================================
[   17.113560] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.113927] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.115512] 
[   17.115809] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.115915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.115941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.115986] Call Trace:
[   17.116028]  <TASK>
[   17.116542]  dump_stack_lvl+0x73/0xb0
[   17.116647]  print_report+0xd1/0x650
[   17.116696]  ? __virt_addr_valid+0x1db/0x2d0
[   17.116738]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.116780]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.116829]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.116869]  kasan_report+0x141/0x180
[   17.116913]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.116969]  kasan_check_range+0x10c/0x1c0
[   17.117027]  __kasan_check_write+0x18/0x20
[   17.117088]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   17.117135]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.117184]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.117229]  ? trace_hardirqs_on+0x37/0xe0
[   17.117272]  ? kasan_bitops_generic+0x92/0x1c0
[   17.117322]  kasan_bitops_generic+0x116/0x1c0
[   17.117385]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.117428]  ? __pfx_read_tsc+0x10/0x10
[   17.117469]  ? ktime_get_ts64+0x86/0x230
[   17.117524]  kunit_try_run_case+0x1a5/0x480
[   17.117575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.117621]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.117668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.117715]  ? __kthread_parkme+0x82/0x180
[   17.117758]  ? preempt_count_sub+0x50/0x80
[   17.117812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.117859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.117903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.117947]  kthread+0x337/0x6f0
[   17.117982]  ? trace_preempt_on+0x20/0xc0
[   17.118024]  ? __pfx_kthread+0x10/0x10
[   17.118062]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.118102]  ? calculate_sigpending+0x7b/0xa0
[   17.118143]  ? __pfx_kthread+0x10/0x10
[   17.118177]  ret_from_fork+0x41/0x80
[   17.118216]  ? __pfx_kthread+0x10/0x10
[   17.118250]  ret_from_fork_asm+0x1a/0x30
[   17.118310]  </TASK>
[   17.119692] 
[   17.137878] Allocated by task 282:
[   17.138599]  kasan_save_stack+0x45/0x70
[   17.138870]  kasan_save_track+0x18/0x40
[   17.139837]  kasan_save_alloc_info+0x3b/0x50
[   17.140160]  __kasan_kmalloc+0xb7/0xc0
[   17.140388]  __kmalloc_cache_noprof+0x189/0x420
[   17.141065]  kasan_bitops_generic+0x92/0x1c0
[   17.141917]  kunit_try_run_case+0x1a5/0x480
[   17.142632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.142869]  kthread+0x337/0x6f0
[   17.143541]  ret_from_fork+0x41/0x80
[   17.143795]  ret_from_fork_asm+0x1a/0x30
[   17.144013] 
[   17.144146] The buggy address belongs to the object at ffff8881024d2600
[   17.144146]  which belongs to the cache kmalloc-16 of size 16
[   17.146157] The buggy address is located 8 bytes inside of
[   17.146157]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.146902] 
[   17.147426] The buggy address belongs to the physical page:
[   17.148084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.148576] flags: 0x200000000000000(node=0|zone=2)
[   17.149486] page_type: f5(slab)
[   17.149823] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.150528] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.151067] page dumped because: kasan: bad access detected
[   17.151289] 
[   17.151399] Memory state around the buggy address:
[   17.151788]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.152284]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.152566] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.153719]                       ^
[   17.153923]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.154628]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.155050] ==================================================================
[   17.072627] ==================================================================
[   17.072977] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.073947] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.074511] 
[   17.074691] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.074786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.074815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.074852] Call Trace:
[   17.074880]  <TASK>
[   17.074908]  dump_stack_lvl+0x73/0xb0
[   17.074948]  print_report+0xd1/0x650
[   17.074984]  ? __virt_addr_valid+0x1db/0x2d0
[   17.075019]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.075044]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.075069]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.075094]  kasan_report+0x141/0x180
[   17.075119]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.075149]  kasan_check_range+0x10c/0x1c0
[   17.075172]  __kasan_check_write+0x18/0x20
[   17.075195]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   17.075220]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.075246]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.075270]  ? trace_hardirqs_on+0x37/0xe0
[   17.075295]  ? kasan_bitops_generic+0x92/0x1c0
[   17.075322]  kasan_bitops_generic+0x116/0x1c0
[   17.075386]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.075431]  ? __pfx_read_tsc+0x10/0x10
[   17.075679]  ? ktime_get_ts64+0x86/0x230
[   17.075759]  kunit_try_run_case+0x1a5/0x480
[   17.075818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.075866]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.075922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.075958]  ? __kthread_parkme+0x82/0x180
[   17.075985]  ? preempt_count_sub+0x50/0x80
[   17.076016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.076045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.076075]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.076108]  kthread+0x337/0x6f0
[   17.076126]  ? trace_preempt_on+0x20/0xc0
[   17.076153]  ? __pfx_kthread+0x10/0x10
[   17.076172]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.076197]  ? calculate_sigpending+0x7b/0xa0
[   17.076236]  ? __pfx_kthread+0x10/0x10
[   17.076268]  ret_from_fork+0x41/0x80
[   17.076305]  ? __pfx_kthread+0x10/0x10
[   17.076352]  ret_from_fork_asm+0x1a/0x30
[   17.076411]  </TASK>
[   17.076432] 
[   17.090330] Allocated by task 282:
[   17.091237]  kasan_save_stack+0x45/0x70
[   17.091661]  kasan_save_track+0x18/0x40
[   17.092432]  kasan_save_alloc_info+0x3b/0x50
[   17.092837]  __kasan_kmalloc+0xb7/0xc0
[   17.093207]  __kmalloc_cache_noprof+0x189/0x420
[   17.093442]  kasan_bitops_generic+0x92/0x1c0
[   17.093955]  kunit_try_run_case+0x1a5/0x480
[   17.094868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.095384]  kthread+0x337/0x6f0
[   17.095922]  ret_from_fork+0x41/0x80
[   17.096240]  ret_from_fork_asm+0x1a/0x30
[   17.096609] 
[   17.097055] The buggy address belongs to the object at ffff8881024d2600
[   17.097055]  which belongs to the cache kmalloc-16 of size 16
[   17.098110] The buggy address is located 8 bytes inside of
[   17.098110]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.099098] 
[   17.099314] The buggy address belongs to the physical page:
[   17.099950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.100979] flags: 0x200000000000000(node=0|zone=2)
[   17.101317] page_type: f5(slab)
[   17.101539] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.102281] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.103135] page dumped because: kasan: bad access detected
[   17.103737] 
[   17.103927] Memory state around the buggy address:
[   17.104292]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.104890]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.105725] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.106363]                       ^
[   17.106862]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.107528]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.109305] ==================================================================
[   17.034009] ==================================================================
[   17.035198] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.035958] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.036548] 
[   17.036721] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.036820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.036848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.036894] Call Trace:
[   17.036938]  <TASK>
[   17.036981]  dump_stack_lvl+0x73/0xb0
[   17.037056]  print_report+0xd1/0x650
[   17.037101]  ? __virt_addr_valid+0x1db/0x2d0
[   17.037130]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.037157]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.037184]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.037225]  kasan_report+0x141/0x180
[   17.037260]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.037290]  kasan_check_range+0x10c/0x1c0
[   17.037314]  __kasan_check_write+0x18/0x20
[   17.037356]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   17.037395]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.037429]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.037454]  ? trace_hardirqs_on+0x37/0xe0
[   17.037482]  ? kasan_bitops_generic+0x92/0x1c0
[   17.037510]  kasan_bitops_generic+0x116/0x1c0
[   17.037533]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.037558]  ? __pfx_read_tsc+0x10/0x10
[   17.037582]  ? ktime_get_ts64+0x86/0x230
[   17.037613]  kunit_try_run_case+0x1a5/0x480
[   17.037643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.037668]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.037699]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.037727]  ? __kthread_parkme+0x82/0x180
[   17.037753]  ? preempt_count_sub+0x50/0x80
[   17.037782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.037808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.037835]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.037861]  kthread+0x337/0x6f0
[   17.037881]  ? trace_preempt_on+0x20/0xc0
[   17.037906]  ? __pfx_kthread+0x10/0x10
[   17.037927]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.037952]  ? calculate_sigpending+0x7b/0xa0
[   17.037977]  ? __pfx_kthread+0x10/0x10
[   17.037998]  ret_from_fork+0x41/0x80
[   17.038021]  ? __pfx_kthread+0x10/0x10
[   17.038042]  ret_from_fork_asm+0x1a/0x30
[   17.038647]  </TASK>
[   17.038697] 
[   17.054044] Allocated by task 282:
[   17.054399]  kasan_save_stack+0x45/0x70
[   17.054759]  kasan_save_track+0x18/0x40
[   17.055026]  kasan_save_alloc_info+0x3b/0x50
[   17.056196]  __kasan_kmalloc+0xb7/0xc0
[   17.056496]  __kmalloc_cache_noprof+0x189/0x420
[   17.056785]  kasan_bitops_generic+0x92/0x1c0
[   17.057224]  kunit_try_run_case+0x1a5/0x480
[   17.057867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.058142]  kthread+0x337/0x6f0
[   17.058524]  ret_from_fork+0x41/0x80
[   17.059058]  ret_from_fork_asm+0x1a/0x30
[   17.059529] 
[   17.059723] The buggy address belongs to the object at ffff8881024d2600
[   17.059723]  which belongs to the cache kmalloc-16 of size 16
[   17.060720] The buggy address is located 8 bytes inside of
[   17.060720]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.061497] 
[   17.061631] The buggy address belongs to the physical page:
[   17.062023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.062846] flags: 0x200000000000000(node=0|zone=2)
[   17.063605] page_type: f5(slab)
[   17.063853] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.064575] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.065408] page dumped because: kasan: bad access detected
[   17.065785] 
[   17.066263] Memory state around the buggy address:
[   17.067070]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.067657]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.068012] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.068651]                       ^
[   17.069674]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.070029]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.070845] ==================================================================
[   17.156129] ==================================================================
[   17.156700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.157405] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   17.157702] 
[   17.158514] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   17.158635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.158668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.158715] Call Trace:
[   17.158759]  <TASK>
[   17.158979]  dump_stack_lvl+0x73/0xb0
[   17.159059]  print_report+0xd1/0x650
[   17.159108]  ? __virt_addr_valid+0x1db/0x2d0
[   17.159155]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.159200]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.159242]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.159284]  kasan_report+0x141/0x180
[   17.159329]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.159401]  kasan_check_range+0x10c/0x1c0
[   17.159449]  __kasan_check_write+0x18/0x20
[   17.159492]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   17.159533]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   17.159826]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.159856]  ? trace_hardirqs_on+0x37/0xe0
[   17.159884]  ? kasan_bitops_generic+0x92/0x1c0
[   17.159913]  kasan_bitops_generic+0x116/0x1c0
[   17.159937]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   17.159960]  ? __pfx_read_tsc+0x10/0x10
[   17.159984]  ? ktime_get_ts64+0x86/0x230
[   17.160013]  kunit_try_run_case+0x1a5/0x480
[   17.160042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.160069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.160105]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.160131]  ? __kthread_parkme+0x82/0x180
[   17.160158]  ? preempt_count_sub+0x50/0x80
[   17.160187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.160251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.160305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.160359]  kthread+0x337/0x6f0
[   17.160384]  ? trace_preempt_on+0x20/0xc0
[   17.160409]  ? __pfx_kthread+0x10/0x10
[   17.160429]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.160454]  ? calculate_sigpending+0x7b/0xa0
[   17.160480]  ? __pfx_kthread+0x10/0x10
[   17.160501]  ret_from_fork+0x41/0x80
[   17.160524]  ? __pfx_kthread+0x10/0x10
[   17.160548]  ret_from_fork_asm+0x1a/0x30
[   17.160584]  </TASK>
[   17.160597] 
[   17.174644] Allocated by task 282:
[   17.174970]  kasan_save_stack+0x45/0x70
[   17.175478]  kasan_save_track+0x18/0x40
[   17.175835]  kasan_save_alloc_info+0x3b/0x50
[   17.176232]  __kasan_kmalloc+0xb7/0xc0
[   17.176700]  __kmalloc_cache_noprof+0x189/0x420
[   17.176924]  kasan_bitops_generic+0x92/0x1c0
[   17.177285]  kunit_try_run_case+0x1a5/0x480
[   17.177713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.178286]  kthread+0x337/0x6f0
[   17.178731]  ret_from_fork+0x41/0x80
[   17.179212]  ret_from_fork_asm+0x1a/0x30
[   17.179662] 
[   17.179869] The buggy address belongs to the object at ffff8881024d2600
[   17.179869]  which belongs to the cache kmalloc-16 of size 16
[   17.180910] The buggy address is located 8 bytes inside of
[   17.180910]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.181729] 
[   17.181954] The buggy address belongs to the physical page:
[   17.182545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.183098] flags: 0x200000000000000(node=0|zone=2)
[   17.183639] page_type: f5(slab)
[   17.184003] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.184834] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.185140] page dumped because: kasan: bad access detected
[   17.185736] 
[   17.185925] Memory state around the buggy address:
[   17.186450]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.187063]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.187840] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.188463]                       ^
[   17.188694]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.189728]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.190471] ==================================================================
[   16.992873] ==================================================================
[   16.993465] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.994256] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   16.994851] 
[   16.996008] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   16.996138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.996186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.996230] Call Trace:
[   16.996272]  <TASK>
[   16.996318]  dump_stack_lvl+0x73/0xb0
[   16.996411]  print_report+0xd1/0x650
[   16.996460]  ? __virt_addr_valid+0x1db/0x2d0
[   16.996503]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.996548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.996597]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.996799]  kasan_report+0x141/0x180
[   16.996849]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.996889]  kasan_check_range+0x10c/0x1c0
[   16.996920]  __kasan_check_write+0x18/0x20
[   16.996949]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   16.996981]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.997027]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.997064]  ? trace_hardirqs_on+0x37/0xe0
[   16.997101]  ? kasan_bitops_generic+0x92/0x1c0
[   16.997129]  kasan_bitops_generic+0x116/0x1c0
[   16.997152]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.997177]  ? __pfx_read_tsc+0x10/0x10
[   16.997201]  ? ktime_get_ts64+0x86/0x230
[   16.997287]  kunit_try_run_case+0x1a5/0x480
[   16.997359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.997400]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.997433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.997461]  ? __kthread_parkme+0x82/0x180
[   16.997488]  ? preempt_count_sub+0x50/0x80
[   16.997518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.997546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.997574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.997601]  kthread+0x337/0x6f0
[   16.997621]  ? trace_preempt_on+0x20/0xc0
[   16.997648]  ? __pfx_kthread+0x10/0x10
[   16.997669]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.997696]  ? calculate_sigpending+0x7b/0xa0
[   16.997721]  ? __pfx_kthread+0x10/0x10
[   16.997742]  ret_from_fork+0x41/0x80
[   16.997766]  ? __pfx_kthread+0x10/0x10
[   16.997786]  ret_from_fork_asm+0x1a/0x30
[   16.997823]  </TASK>
[   16.997836] 
[   17.015247] Allocated by task 282:
[   17.015531]  kasan_save_stack+0x45/0x70
[   17.015792]  kasan_save_track+0x18/0x40
[   17.016146]  kasan_save_alloc_info+0x3b/0x50
[   17.017164]  __kasan_kmalloc+0xb7/0xc0
[   17.017472]  __kmalloc_cache_noprof+0x189/0x420
[   17.018033]  kasan_bitops_generic+0x92/0x1c0
[   17.018826]  kunit_try_run_case+0x1a5/0x480
[   17.019037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.019838]  kthread+0x337/0x6f0
[   17.020088]  ret_from_fork+0x41/0x80
[   17.020999]  ret_from_fork_asm+0x1a/0x30
[   17.021431] 
[   17.021607] The buggy address belongs to the object at ffff8881024d2600
[   17.021607]  which belongs to the cache kmalloc-16 of size 16
[   17.023045] The buggy address is located 8 bytes inside of
[   17.023045]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   17.023810] 
[   17.023934] The buggy address belongs to the physical page:
[   17.025117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   17.025708] flags: 0x200000000000000(node=0|zone=2)
[   17.026104] page_type: f5(slab)
[   17.026628] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   17.027706] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.028421] page dumped because: kasan: bad access detected
[   17.028647] 
[   17.028822] Memory state around the buggy address:
[   17.029785]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.030045]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   17.030812] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.031221]                       ^
[   17.031391]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.031905]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.033202] ==================================================================
[   16.917324] ==================================================================
[   16.918403] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.919063] Write of size 8 at addr ffff8881024d2608 by task kunit_try_catch/282
[   16.919570] 
[   16.920043] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   16.920164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.920195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.920254] Call Trace:
[   16.920361]  <TASK>
[   16.920411]  dump_stack_lvl+0x73/0xb0
[   16.920464]  print_report+0xd1/0x650
[   16.920519]  ? __virt_addr_valid+0x1db/0x2d0
[   16.920564]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.920611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.920807]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.920862]  kasan_report+0x141/0x180
[   16.920912]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.920971]  kasan_check_range+0x10c/0x1c0
[   16.921028]  __kasan_check_write+0x18/0x20
[   16.921100]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   16.921132]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   16.921160]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.921187]  ? trace_hardirqs_on+0x37/0xe0
[   16.921230]  ? kasan_bitops_generic+0x92/0x1c0
[   16.921318]  kasan_bitops_generic+0x116/0x1c0
[   16.921375]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   16.921416]  ? __pfx_read_tsc+0x10/0x10
[   16.921453]  ? ktime_get_ts64+0x86/0x230
[   16.921503]  kunit_try_run_case+0x1a5/0x480
[   16.921550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.921587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.921617]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.921645]  ? __kthread_parkme+0x82/0x180
[   16.921672]  ? preempt_count_sub+0x50/0x80
[   16.921703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.921730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.921759]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.921785]  kthread+0x337/0x6f0
[   16.921804]  ? trace_preempt_on+0x20/0xc0
[   16.921830]  ? __pfx_kthread+0x10/0x10
[   16.921850]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.921875]  ? calculate_sigpending+0x7b/0xa0
[   16.921900]  ? __pfx_kthread+0x10/0x10
[   16.921920]  ret_from_fork+0x41/0x80
[   16.921944]  ? __pfx_kthread+0x10/0x10
[   16.921964]  ret_from_fork_asm+0x1a/0x30
[   16.922000]  </TASK>
[   16.922012] 
[   16.938747] Allocated by task 282:
[   16.939118]  kasan_save_stack+0x45/0x70
[   16.939914]  kasan_save_track+0x18/0x40
[   16.940163]  kasan_save_alloc_info+0x3b/0x50
[   16.940688]  __kasan_kmalloc+0xb7/0xc0
[   16.941010]  __kmalloc_cache_noprof+0x189/0x420
[   16.941693]  kasan_bitops_generic+0x92/0x1c0
[   16.942071]  kunit_try_run_case+0x1a5/0x480
[   16.942570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.942944]  kthread+0x337/0x6f0
[   16.943166]  ret_from_fork+0x41/0x80
[   16.943859]  ret_from_fork_asm+0x1a/0x30
[   16.944081] 
[   16.944200] The buggy address belongs to the object at ffff8881024d2600
[   16.944200]  which belongs to the cache kmalloc-16 of size 16
[   16.944941] The buggy address is located 8 bytes inside of
[   16.944941]  allocated 9-byte region [ffff8881024d2600, ffff8881024d2609)
[   16.945752] 
[   16.945886] The buggy address belongs to the physical page:
[   16.946304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d2
[   16.947176] flags: 0x200000000000000(node=0|zone=2)
[   16.947907] page_type: f5(slab)
[   16.948156] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   16.948878] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.949550] page dumped because: kasan: bad access detected
[   16.949955] 
[   16.950105] Memory state around the buggy address:
[   16.950742]  ffff8881024d2500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.951111]  ffff8881024d2580: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   16.951911] >ffff8881024d2600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.952306]                       ^
[   16.952772]  ffff8881024d2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.953048]  ffff8881024d2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.953723] ==================================================================