Hay
Date
July 15, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.175159] ==================================================================
[   20.175353] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   20.175430] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.175492] 
[   20.175617] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.175706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.175745] Hardware name: linux,dummy-virt (DT)
[   20.175842] Call trace:
[   20.175869]  show_stack+0x20/0x38 (C)
[   20.175919]  dump_stack_lvl+0x8c/0xd0
[   20.176144]  print_report+0x118/0x5d0
[   20.176232]  kasan_report+0xdc/0x128
[   20.176437]  kasan_check_range+0x100/0x1a8
[   20.176505]  __kasan_check_write+0x20/0x30
[   20.176570]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   20.176741]  kasan_bitops_generic+0x110/0x1c8
[   20.176789]  kunit_try_run_case+0x170/0x3f0
[   20.176841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.177147]  kthread+0x328/0x630
[   20.177605]  ret_from_fork+0x10/0x20
[   20.177920] 
[   20.177991] Allocated by task 263:
[   20.178057]  kasan_save_stack+0x3c/0x68
[   20.178234]  kasan_save_track+0x20/0x40
[   20.178410]  kasan_save_alloc_info+0x40/0x58
[   20.178512]  __kasan_kmalloc+0xd4/0xd8
[   20.178580]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.178623]  kasan_bitops_generic+0xa0/0x1c8
[   20.178984]  kunit_try_run_case+0x170/0x3f0
[   20.179232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.179610]  kthread+0x328/0x630
[   20.179738]  ret_from_fork+0x10/0x20
[   20.179845] 
[   20.179969] The buggy address belongs to the object at fff00000c45d8b80
[   20.179969]  which belongs to the cache kmalloc-16 of size 16
[   20.180161] The buggy address is located 8 bytes inside of
[   20.180161]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.180328] 
[   20.180370] The buggy address belongs to the physical page:
[   20.180447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.180579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.180640] page_type: f5(slab)
[   20.180892] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.181339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.181405] page dumped because: kasan: bad access detected
[   20.181526] 
[   20.181574] Memory state around the buggy address:
[   20.181667]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.181763]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.181829] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.181948]                       ^
[   20.182006]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.182099]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.182143] ==================================================================
[   20.202661] ==================================================================
[   20.202714] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   20.202786] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.203277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.203610]  print_report+0x118/0x5d0
[   20.204095]  kasan_bitops_generic+0x110/0x1c8
[   20.204810]  kasan_save_stack+0x3c/0x68
[   20.205607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.205990] The buggy address is located 8 bytes inside of
[   20.205990]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.206925] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.207015] page dumped because: kasan: bad access detected
[   20.207530]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.207919]                       ^
[   20.208072]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.208246]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.210111] ==================================================================
[   20.190003] ==================================================================
[   20.190058] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   20.190111] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.190166] 
[   20.190196] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.190296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.190693] Hardware name: linux,dummy-virt (DT)
[   20.190746] Call trace:
[   20.190809]  show_stack+0x20/0x38 (C)
[   20.190929]  dump_stack_lvl+0x8c/0xd0
[   20.190982]  print_report+0x118/0x5d0
[   20.191130]  kasan_report+0xdc/0x128
[   20.191189]  kasan_check_range+0x100/0x1a8
[   20.191250]  __kasan_check_write+0x20/0x30
[   20.191583]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   20.191651]  kasan_bitops_generic+0x110/0x1c8
[   20.191703]  kunit_try_run_case+0x170/0x3f0
[   20.191763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.191847]  kthread+0x328/0x630
[   20.191912]  ret_from_fork+0x10/0x20
[   20.191979] 
[   20.192054] Allocated by task 263:
[   20.192092]  kasan_save_stack+0x3c/0x68
[   20.192136]  kasan_save_track+0x20/0x40
[   20.192330]  kasan_save_alloc_info+0x40/0x58
[   20.192391]  __kasan_kmalloc+0xd4/0xd8
[   20.192428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.192718]  kasan_bitops_generic+0xa0/0x1c8
[   20.192857]  kunit_try_run_case+0x170/0x3f0
[   20.192922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.192989]  kthread+0x328/0x630
[   20.193035]  ret_from_fork+0x10/0x20
[   20.193291] 
[   20.193329] The buggy address belongs to the object at fff00000c45d8b80
[   20.193329]  which belongs to the cache kmalloc-16 of size 16
[   20.193593] The buggy address is located 8 bytes inside of
[   20.193593]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.193721] 
[   20.193779] The buggy address belongs to the physical page:
[   20.193878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.193962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.194162] page_type: f5(slab)
[   20.194219] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.194482] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.194558] page dumped because: kasan: bad access detected
[   20.194736] 
[   20.194895] Memory state around the buggy address:
[   20.194985]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.195112]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.195183] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.195304]                       ^
[   20.196517]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.196574]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.197136] ==================================================================
[   20.160029] ==================================================================
[   20.160091] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.160146] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.160200] 
[   20.160252] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.160430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.160477] Hardware name: linux,dummy-virt (DT)
[   20.160511] Call trace:
[   20.160536]  show_stack+0x20/0x38 (C)
[   20.160853]  dump_stack_lvl+0x8c/0xd0
[   20.161312]  print_report+0x118/0x5d0
[   20.161397]  kasan_report+0xdc/0x128
[   20.161778]  kasan_check_range+0x100/0x1a8
[   20.161879]  __kasan_check_write+0x20/0x30
[   20.161955]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.162388]  kasan_bitops_generic+0x110/0x1c8
[   20.162570]  kunit_try_run_case+0x170/0x3f0
[   20.162648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.162789]  kthread+0x328/0x630
[   20.162873]  ret_from_fork+0x10/0x20
[   20.163339] 
[   20.163415] Allocated by task 263:
[   20.163539]  kasan_save_stack+0x3c/0x68
[   20.163612]  kasan_save_track+0x20/0x40
[   20.163654]  kasan_save_alloc_info+0x40/0x58
[   20.163986]  __kasan_kmalloc+0xd4/0xd8
[   20.164063]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.164222]  kasan_bitops_generic+0xa0/0x1c8
[   20.164283]  kunit_try_run_case+0x170/0x3f0
[   20.164415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.164738]  kthread+0x328/0x630
[   20.164838]  ret_from_fork+0x10/0x20
[   20.164878] 
[   20.164900] The buggy address belongs to the object at fff00000c45d8b80
[   20.164900]  which belongs to the cache kmalloc-16 of size 16
[   20.164964] The buggy address is located 8 bytes inside of
[   20.164964]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.165053] 
[   20.165075] The buggy address belongs to the physical page:
[   20.165112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.165176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.165241] page_type: f5(slab)
[   20.165295] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.165689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.165747] page dumped because: kasan: bad access detected
[   20.165782] 
[   20.165936] Memory state around the buggy address:
[   20.166134]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.166305]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.166385] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.166509]                       ^
[   20.166556]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.166611]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.166756] ==================================================================
[   20.167960] ==================================================================
[   20.168183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.168427] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.168482] 
[   20.168678] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.168775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.168824] Hardware name: linux,dummy-virt (DT)
[   20.168883] Call trace:
[   20.168909]  show_stack+0x20/0x38 (C)
[   20.168964]  dump_stack_lvl+0x8c/0xd0
[   20.169378]  print_report+0x118/0x5d0
[   20.169496]  kasan_report+0xdc/0x128
[   20.169575]  __asan_report_load8_noabort+0x20/0x30
[   20.169718]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.169795]  kasan_bitops_generic+0x110/0x1c8
[   20.169984]  kunit_try_run_case+0x170/0x3f0
[   20.170060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.170119]  kthread+0x328/0x630
[   20.170486]  ret_from_fork+0x10/0x20
[   20.170576] 
[   20.170685] Allocated by task 263:
[   20.170767]  kasan_save_stack+0x3c/0x68
[   20.170871]  kasan_save_track+0x20/0x40
[   20.170912]  kasan_save_alloc_info+0x40/0x58
[   20.170953]  __kasan_kmalloc+0xd4/0xd8
[   20.170990]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.171029]  kasan_bitops_generic+0xa0/0x1c8
[   20.171079]  kunit_try_run_case+0x170/0x3f0
[   20.171129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.171188]  kthread+0x328/0x630
[   20.171238]  ret_from_fork+0x10/0x20
[   20.171287] 
[   20.171332] The buggy address belongs to the object at fff00000c45d8b80
[   20.171332]  which belongs to the cache kmalloc-16 of size 16
[   20.171431] The buggy address is located 8 bytes inside of
[   20.171431]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.171499] 
[   20.171529] The buggy address belongs to the physical page:
[   20.171569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.171624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.171684] page_type: f5(slab)
[   20.171724] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.171780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.171835] page dumped because: kasan: bad access detected
[   20.171869] 
[   20.171890] Memory state around the buggy address:
[   20.171934]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.171989]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.172045] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.172097]                       ^
[   20.172128]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.172173]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.172250] ==================================================================
[   20.183876] ==================================================================
[   20.183941] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   20.184304] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.184375] 
[   20.184425] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.184517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.184659] Hardware name: linux,dummy-virt (DT)
[   20.184787] Call trace:
[   20.184906]  show_stack+0x20/0x38 (C)
[   20.184966]  dump_stack_lvl+0x8c/0xd0
[   20.185050]  print_report+0x118/0x5d0
[   20.185100]  kasan_report+0xdc/0x128
[   20.185148]  __asan_report_load8_noabort+0x20/0x30
[   20.185223]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   20.185278]  kasan_bitops_generic+0x110/0x1c8
[   20.185325]  kunit_try_run_case+0x170/0x3f0
[   20.185386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.185451]  kthread+0x328/0x630
[   20.185497]  ret_from_fork+0x10/0x20
[   20.185548] 
[   20.185569] Allocated by task 263:
[   20.185598]  kasan_save_stack+0x3c/0x68
[   20.185648]  kasan_save_track+0x20/0x40
[   20.185686]  kasan_save_alloc_info+0x40/0x58
[   20.185727]  __kasan_kmalloc+0xd4/0xd8
[   20.185770]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.185809]  kasan_bitops_generic+0xa0/0x1c8
[   20.185854]  kunit_try_run_case+0x170/0x3f0
[   20.185905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.185951]  kthread+0x328/0x630
[   20.185997]  ret_from_fork+0x10/0x20
[   20.186046] 
[   20.186069] The buggy address belongs to the object at fff00000c45d8b80
[   20.186069]  which belongs to the cache kmalloc-16 of size 16
[   20.186140] The buggy address is located 8 bytes inside of
[   20.186140]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.186405] 
[   20.186818] The buggy address belongs to the physical page:
[   20.186864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.186921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.187201] page_type: f5(slab)
[   20.187609] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.187674] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.188016] page dumped because: kasan: bad access detected
[   20.188134] 
[   20.188174] Memory state around the buggy address:
[   20.188288]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.188601]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.188776] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.188851]                       ^
[   20.188966]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.189036]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.189314] ==================================================================
[   20.198253] ==================================================================
[   20.198337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   20.198472] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.198531] 
[   20.198564] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.198690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.198721] Hardware name: linux,dummy-virt (DT)
[   20.198752] Call trace:
[   20.198788]  show_stack+0x20/0x38 (C)
[   20.198840]  dump_stack_lvl+0x8c/0xd0
[   20.198891]  print_report+0x118/0x5d0
[   20.198943]  kasan_report+0xdc/0x128
[   20.199001]  kasan_check_range+0x100/0x1a8
[   20.199061]  __kasan_check_write+0x20/0x30
[   20.199111]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   20.199172]  kasan_bitops_generic+0x110/0x1c8
[   20.199232]  kunit_try_run_case+0x170/0x3f0
[   20.199282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.199353]  kthread+0x328/0x630
[   20.199430]  ret_from_fork+0x10/0x20
[   20.199482] 
[   20.199502] Allocated by task 263:
[   20.199531]  kasan_save_stack+0x3c/0x68
[   20.199570]  kasan_save_track+0x20/0x40
[   20.199609]  kasan_save_alloc_info+0x40/0x58
[   20.199649]  __kasan_kmalloc+0xd4/0xd8
[   20.199685]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.199735]  kasan_bitops_generic+0xa0/0x1c8
[   20.199787]  kunit_try_run_case+0x170/0x3f0
[   20.199830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.199877]  kthread+0x328/0x630
[   20.199918]  ret_from_fork+0x10/0x20
[   20.199957] 
[   20.199978] The buggy address belongs to the object at fff00000c45d8b80
[   20.199978]  which belongs to the cache kmalloc-16 of size 16
[   20.200038] The buggy address is located 8 bytes inside of
[   20.200038]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.200102] 
[   20.200138] The buggy address belongs to the physical page:
[   20.200173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.200240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.200541] page_type: f5(slab)
[   20.200601] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.200657] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.200702] page dumped because: kasan: bad access detected
[   20.200737] 
[   20.201373] Memory state around the buggy address:
[   20.201440]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.201524]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.201756] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.201805]                       ^
[   20.201976]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.202060]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.202188] ==================================================================

[   13.131897] ==================================================================
[   13.132282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.132663] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280
[   13.133063] 
[   13.133175] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.133246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.133256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.133276] Call Trace:
[   13.133288]  <TASK>
[   13.133315]  dump_stack_lvl+0x73/0xb0
[   13.133352]  print_report+0xd1/0x610
[   13.133386]  ? __virt_addr_valid+0x1db/0x2d0
[   13.133406]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.133426]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.133447]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.133468]  kasan_report+0x141/0x180
[   13.133490]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.133516]  kasan_check_range+0x10c/0x1c0
[   13.133535]  __kasan_check_write+0x18/0x20
[   13.133554]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.133576]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.133598]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.133618]  ? trace_hardirqs_on+0x37/0xe0
[   13.133638]  ? kasan_bitops_generic+0x92/0x1c0
[   13.133662]  kasan_bitops_generic+0x116/0x1c0
[   13.133681]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.133702]  ? __pfx_read_tsc+0x10/0x10
[   13.133720]  ? ktime_get_ts64+0x86/0x230
[   13.133743]  kunit_try_run_case+0x1a5/0x480
[   13.133763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.133781]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.133827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.133850]  ? __kthread_parkme+0x82/0x180
[   13.133871]  ? preempt_count_sub+0x50/0x80
[   13.133903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.133922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.133944]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.133967]  kthread+0x337/0x6f0
[   13.133982]  ? trace_preempt_on+0x20/0xc0
[   13.134003]  ? __pfx_kthread+0x10/0x10
[   13.134021]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.134041]  ? calculate_sigpending+0x7b/0xa0
[   13.134060]  ? __pfx_kthread+0x10/0x10
[   13.134079]  ret_from_fork+0x41/0x80
[   13.134098]  ? __pfx_kthread+0x10/0x10
[   13.134115]  ret_from_fork_asm+0x1a/0x30
[   13.134145]  </TASK>
[   13.134155] 
[   13.142219] Allocated by task 280:
[   13.142412]  kasan_save_stack+0x45/0x70
[   13.142625]  kasan_save_track+0x18/0x40
[   13.142867]  kasan_save_alloc_info+0x3b/0x50
[   13.143084]  __kasan_kmalloc+0xb7/0xc0
[   13.143286]  __kmalloc_cache_noprof+0x189/0x420
[   13.143446]  kasan_bitops_generic+0x92/0x1c0
[   13.143636]  kunit_try_run_case+0x1a5/0x480
[   13.143897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.144132]  kthread+0x337/0x6f0
[   13.144292]  ret_from_fork+0x41/0x80
[   13.144472]  ret_from_fork_asm+0x1a/0x30
[   13.144667] 
[   13.144754] The buggy address belongs to the object at ffff8881027e74e0
[   13.144754]  which belongs to the cache kmalloc-16 of size 16
[   13.145303] The buggy address is located 8 bytes inside of
[   13.145303]  allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9)
[   13.145774] 
[   13.145920] The buggy address belongs to the physical page:
[   13.146146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7
[   13.146491] flags: 0x200000000000000(node=0|zone=2)
[   13.146688] page_type: f5(slab)
[   13.146894] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.147212] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.147525] page dumped because: kasan: bad access detected
[   13.147769] 
[   13.147889] Memory state around the buggy address:
[   13.148149]  ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   13.148517]  ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.148910] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.149238]                                                           ^
[   13.149527]  ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.149856]  ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.150119] ==================================================================
[   13.094537] ==================================================================
[   13.094961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.095280] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280
[   13.095567] 
[   13.095691] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.095734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.095745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.095782] Call Trace:
[   13.095814]  <TASK>
[   13.095845]  dump_stack_lvl+0x73/0xb0
[   13.095869]  print_report+0xd1/0x610
[   13.095901]  ? __virt_addr_valid+0x1db/0x2d0
[   13.095921]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.095942]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.095964]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.095985]  kasan_report+0x141/0x180
[   13.096007]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.096033]  kasan_check_range+0x10c/0x1c0
[   13.096053]  __kasan_check_write+0x18/0x20
[   13.096090]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.096112]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.096135]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.096155]  ? trace_hardirqs_on+0x37/0xe0
[   13.096193]  ? kasan_bitops_generic+0x92/0x1c0
[   13.096216]  kasan_bitops_generic+0x116/0x1c0
[   13.096235]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.096256]  ? __pfx_read_tsc+0x10/0x10
[   13.096274]  ? ktime_get_ts64+0x86/0x230
[   13.096298]  kunit_try_run_case+0x1a5/0x480
[   13.096318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.096335]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.096359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.096381]  ? __kthread_parkme+0x82/0x180
[   13.096420]  ? preempt_count_sub+0x50/0x80
[   13.096445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.096464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.096486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.096509]  kthread+0x337/0x6f0
[   13.096524]  ? trace_preempt_on+0x20/0xc0
[   13.096546]  ? __pfx_kthread+0x10/0x10
[   13.096581]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.096602]  ? calculate_sigpending+0x7b/0xa0
[   13.096622]  ? __pfx_kthread+0x10/0x10
[   13.096639]  ret_from_fork+0x41/0x80
[   13.096675]  ? __pfx_kthread+0x10/0x10
[   13.096692]  ret_from_fork_asm+0x1a/0x30
[   13.096722]  </TASK>
[   13.096731] 
[   13.105047] Allocated by task 280:
[   13.105234]  kasan_save_stack+0x45/0x70
[   13.105389]  kasan_save_track+0x18/0x40
[   13.105567]  kasan_save_alloc_info+0x3b/0x50
[   13.105735]  __kasan_kmalloc+0xb7/0xc0
[   13.105961]  __kmalloc_cache_noprof+0x189/0x420
[   13.106160]  kasan_bitops_generic+0x92/0x1c0
[   13.106303]  kunit_try_run_case+0x1a5/0x480
[   13.106472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.106749]  kthread+0x337/0x6f0
[   13.106948]  ret_from_fork+0x41/0x80
[   13.107158]  ret_from_fork_asm+0x1a/0x30
[   13.107370] 
[   13.107454] The buggy address belongs to the object at ffff8881027e74e0
[   13.107454]  which belongs to the cache kmalloc-16 of size 16
[   13.108066] The buggy address is located 8 bytes inside of
[   13.108066]  allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9)
[   13.108575] 
[   13.108664] The buggy address belongs to the physical page:
[   13.108873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7
[   13.109119] flags: 0x200000000000000(node=0|zone=2)
[   13.109395] page_type: f5(slab)
[   13.109559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.109958] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.110292] page dumped because: kasan: bad access detected
[   13.110559] 
[   13.110635] Memory state around the buggy address:
[   13.110871]  ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   13.111179]  ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.111472] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.111763]                                                           ^
[   13.112072]  ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.112401]  ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.112708] ==================================================================
[   13.113367] ==================================================================
[   13.113739] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.114140] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280
[   13.114450] 
[   13.114531] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.114591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.114603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.114622] Call Trace:
[   13.114635]  <TASK>
[   13.114648]  dump_stack_lvl+0x73/0xb0
[   13.114671]  print_report+0xd1/0x610
[   13.114692]  ? __virt_addr_valid+0x1db/0x2d0
[   13.114712]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.114733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.114772]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.114811]  kasan_report+0x141/0x180
[   13.114833]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.114859]  kasan_check_range+0x10c/0x1c0
[   13.114887]  __kasan_check_write+0x18/0x20
[   13.114906]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.114927]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.114966]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.114986]  ? trace_hardirqs_on+0x37/0xe0
[   13.115007]  ? kasan_bitops_generic+0x92/0x1c0
[   13.115030]  kasan_bitops_generic+0x116/0x1c0
[   13.115050]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.115070]  ? __pfx_read_tsc+0x10/0x10
[   13.115088]  ? ktime_get_ts64+0x86/0x230
[   13.115128]  kunit_try_run_case+0x1a5/0x480
[   13.115149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.115169]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.115191]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.115214]  ? __kthread_parkme+0x82/0x180
[   13.115235]  ? preempt_count_sub+0x50/0x80
[   13.115258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.115294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.115317]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.115339]  kthread+0x337/0x6f0
[   13.115354]  ? trace_preempt_on+0x20/0xc0
[   13.115376]  ? __pfx_kthread+0x10/0x10
[   13.115408]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.115429]  ? calculate_sigpending+0x7b/0xa0
[   13.115449]  ? __pfx_kthread+0x10/0x10
[   13.115467]  ret_from_fork+0x41/0x80
[   13.115486]  ? __pfx_kthread+0x10/0x10
[   13.115503]  ret_from_fork_asm+0x1a/0x30
[   13.115629]  </TASK>
[   13.115640] 
[   13.123569] Allocated by task 280:
[   13.123750]  kasan_save_stack+0x45/0x70
[   13.124015]  kasan_save_track+0x18/0x40
[   13.124230]  kasan_save_alloc_info+0x3b/0x50
[   13.124434]  __kasan_kmalloc+0xb7/0xc0
[   13.124602]  __kmalloc_cache_noprof+0x189/0x420
[   13.124852]  kasan_bitops_generic+0x92/0x1c0
[   13.125012]  kunit_try_run_case+0x1a5/0x480
[   13.125159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.125331]  kthread+0x337/0x6f0
[   13.125447]  ret_from_fork+0x41/0x80
[   13.125574]  ret_from_fork_asm+0x1a/0x30
[   13.125710] 
[   13.125779] The buggy address belongs to the object at ffff8881027e74e0
[   13.125779]  which belongs to the cache kmalloc-16 of size 16
[   13.126331] The buggy address is located 8 bytes inside of
[   13.126331]  allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9)
[   13.126978] 
[   13.127103] The buggy address belongs to the physical page:
[   13.127388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7
[   13.127761] flags: 0x200000000000000(node=0|zone=2)
[   13.128131] page_type: f5(slab)
[   13.128322] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.128705] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.129061] page dumped because: kasan: bad access detected
[   13.129307] 
[   13.129393] Memory state around the buggy address:
[   13.129596]  ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   13.129835]  ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.130158] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.130528]                                                           ^
[   13.130876]  ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.131189]  ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.131482] ==================================================================
[   13.056037] ==================================================================
[   13.056341] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.056627] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280
[   13.057227] 
[   13.057435] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.057479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.057490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.057509] Call Trace:
[   13.057520]  <TASK>
[   13.057532]  dump_stack_lvl+0x73/0xb0
[   13.057579]  print_report+0xd1/0x610
[   13.057602]  ? __virt_addr_valid+0x1db/0x2d0
[   13.057622]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.057642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.057665]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.057697]  kasan_report+0x141/0x180
[   13.057719]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.057745]  kasan_check_range+0x10c/0x1c0
[   13.057765]  __kasan_check_write+0x18/0x20
[   13.057802]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.057823]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.057846]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.057867]  ? trace_hardirqs_on+0x37/0xe0
[   13.057902]  ? kasan_bitops_generic+0x92/0x1c0
[   13.057926]  kasan_bitops_generic+0x116/0x1c0
[   13.057946]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.057967]  ? __pfx_read_tsc+0x10/0x10
[   13.057986]  ? ktime_get_ts64+0x86/0x230
[   13.058010]  kunit_try_run_case+0x1a5/0x480
[   13.058032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.058050]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.058074]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.058097]  ? __kthread_parkme+0x82/0x180
[   13.058120]  ? preempt_count_sub+0x50/0x80
[   13.058161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.058180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.058202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.058225]  kthread+0x337/0x6f0
[   13.058242]  ? trace_preempt_on+0x20/0xc0
[   13.058262]  ? __pfx_kthread+0x10/0x10
[   13.058280]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.058300]  ? calculate_sigpending+0x7b/0xa0
[   13.058336]  ? __pfx_kthread+0x10/0x10
[   13.058354]  ret_from_fork+0x41/0x80
[   13.058373]  ? __pfx_kthread+0x10/0x10
[   13.058390]  ret_from_fork_asm+0x1a/0x30
[   13.058420]  </TASK>
[   13.058429] 
[   13.067030] Allocated by task 280:
[   13.067219]  kasan_save_stack+0x45/0x70
[   13.067423]  kasan_save_track+0x18/0x40
[   13.067629]  kasan_save_alloc_info+0x3b/0x50
[   13.067814]  __kasan_kmalloc+0xb7/0xc0
[   13.067989]  __kmalloc_cache_noprof+0x189/0x420
[   13.068168]  kasan_bitops_generic+0x92/0x1c0
[   13.068356]  kunit_try_run_case+0x1a5/0x480
[   13.068552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.068771]  kthread+0x337/0x6f0
[   13.069009]  ret_from_fork+0x41/0x80
[   13.069146]  ret_from_fork_asm+0x1a/0x30
[   13.069317] 
[   13.069432] The buggy address belongs to the object at ffff8881027e74e0
[   13.069432]  which belongs to the cache kmalloc-16 of size 16
[   13.070025] The buggy address is located 8 bytes inside of
[   13.070025]  allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9)
[   13.070493] 
[   13.070579] The buggy address belongs to the physical page:
[   13.070830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7
[   13.071182] flags: 0x200000000000000(node=0|zone=2)
[   13.071404] page_type: f5(slab)
[   13.071541] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.071939] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.072222] page dumped because: kasan: bad access detected
[   13.072482] 
[   13.072578] Memory state around the buggy address:
[   13.072750]  ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   13.073173]  ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.073387] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.073598]                                                           ^
[   13.073797]  ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.074124]  ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.074455] ==================================================================
[   13.151046] ==================================================================
[   13.151396] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.151763] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280
[   13.152290] 
[   13.152399] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.152441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.152451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.152469] Call Trace:
[   13.152481]  <TASK>
[   13.152493]  dump_stack_lvl+0x73/0xb0
[   13.152541]  print_report+0xd1/0x610
[   13.152562]  ? __virt_addr_valid+0x1db/0x2d0
[   13.152582]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.152603]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.152624]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.152645]  kasan_report+0x141/0x180
[   13.152667]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.152710]  kasan_check_range+0x10c/0x1c0
[   13.152730]  __kasan_check_write+0x18/0x20
[   13.152749]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.152771]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.152792]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.152834]  ? trace_hardirqs_on+0x37/0xe0
[   13.152873]  ? kasan_bitops_generic+0x92/0x1c0
[   13.152905]  kasan_bitops_generic+0x116/0x1c0
[   13.152925]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.152946]  ? __pfx_read_tsc+0x10/0x10
[   13.152964]  ? ktime_get_ts64+0x86/0x230
[   13.152987]  kunit_try_run_case+0x1a5/0x480
[   13.153006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.153025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.153047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.153089]  ? __kthread_parkme+0x82/0x180
[   13.153111]  ? preempt_count_sub+0x50/0x80
[   13.153139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.153159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.153181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.153204]  kthread+0x337/0x6f0
[   13.153219]  ? trace_preempt_on+0x20/0xc0
[   13.153241]  ? __pfx_kthread+0x10/0x10
[   13.153276]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.153298]  ? calculate_sigpending+0x7b/0xa0
[   13.153319]  ? __pfx_kthread+0x10/0x10
[   13.153337]  ret_from_fork+0x41/0x80
[   13.153356]  ? __pfx_kthread+0x10/0x10
[   13.153373]  ret_from_fork_asm+0x1a/0x30
[   13.153403]  </TASK>
[   13.153412] 
[   13.161643] Allocated by task 280:
[   13.161871]  kasan_save_stack+0x45/0x70
[   13.162075]  kasan_save_track+0x18/0x40
[   13.162259]  kasan_save_alloc_info+0x3b/0x50
[   13.162480]  __kasan_kmalloc+0xb7/0xc0
[   13.162667]  __kmalloc_cache_noprof+0x189/0x420
[   13.162913]  kasan_bitops_generic+0x92/0x1c0
[   13.163144]  kunit_try_run_case+0x1a5/0x480
[   13.163348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.163533]  kthread+0x337/0x6f0
[   13.163650]  ret_from_fork+0x41/0x80
[   13.163896]  ret_from_fork_asm+0x1a/0x30
[   13.164140] 
[   13.164250] The buggy address belongs to the object at ffff8881027e74e0
[   13.164250]  which belongs to the cache kmalloc-16 of size 16
[   13.164813] The buggy address is located 8 bytes inside of
[   13.164813]  allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9)
[   13.165333] 
[   13.165460] The buggy address belongs to the physical page:
[   13.165740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7
[   13.166125] flags: 0x200000000000000(node=0|zone=2)
[   13.166375] page_type: f5(slab)
[   13.166542] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.166825] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.167060] page dumped because: kasan: bad access detected
[   13.167228] 
[   13.167295] Memory state around the buggy address:
[   13.167546]  ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   13.167938]  ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.168254] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.168587]                                                           ^
[   13.168925]  ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.169241]  ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.169500] ==================================================================
[   13.074970] ==================================================================
[   13.075708] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.076050] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280
[   13.076278] 
[   13.076361] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.076401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.076412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.076456] Call Trace:
[   13.076469]  <TASK>
[   13.076482]  dump_stack_lvl+0x73/0xb0
[   13.076505]  print_report+0xd1/0x610
[   13.076526]  ? __virt_addr_valid+0x1db/0x2d0
[   13.076546]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.076566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.076589]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.076610]  kasan_report+0x141/0x180
[   13.076633]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.076659]  kasan_check_range+0x10c/0x1c0
[   13.076678]  __kasan_check_write+0x18/0x20
[   13.076719]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.076743]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.076783]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.076804]  ? trace_hardirqs_on+0x37/0xe0
[   13.076825]  ? kasan_bitops_generic+0x92/0x1c0
[   13.076849]  kasan_bitops_generic+0x116/0x1c0
[   13.076896]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.076917]  ? __pfx_read_tsc+0x10/0x10
[   13.076936]  ? ktime_get_ts64+0x86/0x230
[   13.076959]  kunit_try_run_case+0x1a5/0x480
[   13.076979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.076999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.077041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.077064]  ? __kthread_parkme+0x82/0x180
[   13.077084]  ? preempt_count_sub+0x50/0x80
[   13.077107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.077132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.077155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.077176]  kthread+0x337/0x6f0
[   13.077210]  ? trace_preempt_on+0x20/0xc0
[   13.077231]  ? __pfx_kthread+0x10/0x10
[   13.077248]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.077270]  ? calculate_sigpending+0x7b/0xa0
[   13.077290]  ? __pfx_kthread+0x10/0x10
[   13.077307]  ret_from_fork+0x41/0x80
[   13.077327]  ? __pfx_kthread+0x10/0x10
[   13.077344]  ret_from_fork_asm+0x1a/0x30
[   13.077374]  </TASK>
[   13.077383] 
[   13.085928] Allocated by task 280:
[   13.086099]  kasan_save_stack+0x45/0x70
[   13.086271]  kasan_save_track+0x18/0x40
[   13.086402]  kasan_save_alloc_info+0x3b/0x50
[   13.086606]  __kasan_kmalloc+0xb7/0xc0
[   13.086806]  __kmalloc_cache_noprof+0x189/0x420
[   13.087009]  kasan_bitops_generic+0x92/0x1c0
[   13.087222]  kunit_try_run_case+0x1a5/0x480
[   13.087458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.087778]  kthread+0x337/0x6f0
[   13.087965]  ret_from_fork+0x41/0x80
[   13.088142]  ret_from_fork_asm+0x1a/0x30
[   13.088347] 
[   13.088438] The buggy address belongs to the object at ffff8881027e74e0
[   13.088438]  which belongs to the cache kmalloc-16 of size 16
[   13.088977] The buggy address is located 8 bytes inside of
[   13.088977]  allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9)
[   13.089470] 
[   13.089540] The buggy address belongs to the physical page:
[   13.089708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7
[   13.090736] flags: 0x200000000000000(node=0|zone=2)
[   13.090959] page_type: f5(slab)
[   13.091080] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.091303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.091532] page dumped because: kasan: bad access detected
[   13.091748] 
[   13.091903] Memory state around the buggy address:
[   13.092160]  ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   13.092464]  ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.092769] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.093037]                                                           ^
[   13.093308]  ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.093640]  ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.094020] ==================================================================
[   13.034089] ==================================================================
[   13.034458] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.035113] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280
[   13.035371] 
[   13.035468] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.035510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.035521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.035540] Call Trace:
[   13.035551]  <TASK>
[   13.035564]  dump_stack_lvl+0x73/0xb0
[   13.035588]  print_report+0xd1/0x610
[   13.035610]  ? __virt_addr_valid+0x1db/0x2d0
[   13.035631]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.035652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.035675]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.035720]  kasan_report+0x141/0x180
[   13.035744]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.035771]  kasan_check_range+0x10c/0x1c0
[   13.035793]  __kasan_check_write+0x18/0x20
[   13.035814]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.035835]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.035857]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.035891]  ? trace_hardirqs_on+0x37/0xe0
[   13.035914]  ? kasan_bitops_generic+0x92/0x1c0
[   13.035938]  kasan_bitops_generic+0x116/0x1c0
[   13.035957]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.035978]  ? __pfx_read_tsc+0x10/0x10
[   13.035997]  ? ktime_get_ts64+0x86/0x230
[   13.036021]  kunit_try_run_case+0x1a5/0x480
[   13.036044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.036061]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.036085]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.036125]  ? __kthread_parkme+0x82/0x180
[   13.036147]  ? preempt_count_sub+0x50/0x80
[   13.036185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.036218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.036255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.036277]  kthread+0x337/0x6f0
[   13.036293]  ? trace_preempt_on+0x20/0xc0
[   13.036314]  ? __pfx_kthread+0x10/0x10
[   13.036332]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.036352]  ? calculate_sigpending+0x7b/0xa0
[   13.036382]  ? __pfx_kthread+0x10/0x10
[   13.036400]  ret_from_fork+0x41/0x80
[   13.036419]  ? __pfx_kthread+0x10/0x10
[   13.036436]  ret_from_fork_asm+0x1a/0x30
[   13.036466]  </TASK>
[   13.036475] 
[   13.046352] Allocated by task 280:
[   13.046536]  kasan_save_stack+0x45/0x70
[   13.046687]  kasan_save_track+0x18/0x40
[   13.046820]  kasan_save_alloc_info+0x3b/0x50
[   13.046975]  __kasan_kmalloc+0xb7/0xc0
[   13.047159]  __kmalloc_cache_noprof+0x189/0x420
[   13.047379]  kasan_bitops_generic+0x92/0x1c0
[   13.047767]  kunit_try_run_case+0x1a5/0x480
[   13.048017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.048252]  kthread+0x337/0x6f0
[   13.048454]  ret_from_fork+0x41/0x80
[   13.048633]  ret_from_fork_asm+0x1a/0x30
[   13.049092] 
[   13.049197] The buggy address belongs to the object at ffff8881027e74e0
[   13.049197]  which belongs to the cache kmalloc-16 of size 16
[   13.049603] The buggy address is located 8 bytes inside of
[   13.049603]  allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9)
[   13.050160] 
[   13.050403] The buggy address belongs to the physical page:
[   13.050753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7
[   13.051080] flags: 0x200000000000000(node=0|zone=2)
[   13.051242] page_type: f5(slab)
[   13.051397] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.051766] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.052312] page dumped because: kasan: bad access detected
[   13.052586] 
[   13.052688] Memory state around the buggy address:
[   13.053084]  ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   13.053447]  ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.053755] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.054115]                                                           ^
[   13.054316]  ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.054611]  ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.055189] ==================================================================
[   13.002440] ==================================================================
[   13.003108] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.003373] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280
[   13.003598] 
[   13.003691] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.003737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.003749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.003769] Call Trace:
[   13.003781]  <TASK>
[   13.003797]  dump_stack_lvl+0x73/0xb0
[   13.003819]  print_report+0xd1/0x610
[   13.003842]  ? __virt_addr_valid+0x1db/0x2d0
[   13.003863]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.003893]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.003915]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.003936]  kasan_report+0x141/0x180
[   13.003958]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.003984]  kasan_check_range+0x10c/0x1c0
[   13.004004]  __kasan_check_write+0x18/0x20
[   13.004023]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.004044]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.004067]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.004087]  ? trace_hardirqs_on+0x37/0xe0
[   13.004108]  ? kasan_bitops_generic+0x92/0x1c0
[   13.004131]  kasan_bitops_generic+0x116/0x1c0
[   13.004411]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.004467]  ? __pfx_read_tsc+0x10/0x10
[   13.004500]  ? ktime_get_ts64+0x86/0x230
[   13.004525]  kunit_try_run_case+0x1a5/0x480
[   13.004547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.004565]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.004589]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.004612]  ? __kthread_parkme+0x82/0x180
[   13.004633]  ? preempt_count_sub+0x50/0x80
[   13.004657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.004678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.004701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.004724]  kthread+0x337/0x6f0
[   13.004740]  ? trace_preempt_on+0x20/0xc0
[   13.004761]  ? __pfx_kthread+0x10/0x10
[   13.004779]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.004800]  ? calculate_sigpending+0x7b/0xa0
[   13.004820]  ? __pfx_kthread+0x10/0x10
[   13.004837]  ret_from_fork+0x41/0x80
[   13.004857]  ? __pfx_kthread+0x10/0x10
[   13.004873]  ret_from_fork_asm+0x1a/0x30
[   13.004913]  </TASK>
[   13.004924] 
[   13.022245] Allocated by task 280:
[   13.022381]  kasan_save_stack+0x45/0x70
[   13.022530]  kasan_save_track+0x18/0x40
[   13.022664]  kasan_save_alloc_info+0x3b/0x50
[   13.022952]  __kasan_kmalloc+0xb7/0xc0
[   13.023231]  __kmalloc_cache_noprof+0x189/0x420
[   13.023439]  kasan_bitops_generic+0x92/0x1c0
[   13.023638]  kunit_try_run_case+0x1a5/0x480
[   13.024260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.024552]  kthread+0x337/0x6f0
[   13.024787]  ret_from_fork+0x41/0x80
[   13.025143]  ret_from_fork_asm+0x1a/0x30
[   13.025430] 
[   13.025526] The buggy address belongs to the object at ffff8881027e74e0
[   13.025526]  which belongs to the cache kmalloc-16 of size 16
[   13.026309] The buggy address is located 8 bytes inside of
[   13.026309]  allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9)
[   13.027140] 
[   13.027265] The buggy address belongs to the physical page:
[   13.027619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7
[   13.028074] flags: 0x200000000000000(node=0|zone=2)
[   13.028416] page_type: f5(slab)
[   13.028615] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.029175] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.029519] page dumped because: kasan: bad access detected
[   13.030041] 
[   13.030142] Memory state around the buggy address:
[   13.030340]  ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc
[   13.030948]  ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   13.031261] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   13.031588]                                                           ^
[   13.032136]  ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.032602]  ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.033124] ==================================================================