Hay
Date
Feb. 5, 2025, 2:09 p.m.

Environment
qemu-armv7

[  147.338981] ==================================================================
[  147.340787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x168/0xc30
[  147.341256] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.341955] 
[  147.342249] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.343131] Hardware name: Generic DT based system
[  147.343684]  unwind_backtrace from show_stack+0x18/0x1c
[  147.344335]  show_stack from dump_stack_lvl+0x58/0x70
[  147.345020]  dump_stack_lvl from print_report+0x164/0x51c
[  147.345706]  print_report from kasan_report+0xc8/0x104
[  147.346391]  kasan_report from kasan_bitops_generic+0x168/0xc30
[  147.347209]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.347965]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.349340]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.350187]  kthread from ret_from_fork+0x14/0x30
[  147.350789] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.351483] bfa0:                                     00000000 00000000 00000000 00000000
[  147.352412] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.353377] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.354184] 
[  147.354545] Allocated by task 201:
[  147.355009]  kasan_set_track+0x3c/0x5c
[  147.355526]  __kasan_kmalloc+0x8c/0x94
[  147.356361]  kasan_bitops_generic+0xa0/0xc30
[  147.356908]  kunit_try_run_case+0x11c/0x2e4
[  147.357442]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.358294]  kthread+0x184/0x1a8
[  147.358799]  ret_from_fork+0x14/0x30
[  147.359449] 
[  147.359674] The buggy address belongs to the object at c8fbac80
[  147.359674]  which belongs to the cache kmalloc-64 of size 64
[  147.360899] The buggy address is located 4 bytes inside of
[  147.360899]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.362135] 
[  147.362419] The buggy address belongs to the physical page:
[  147.363006] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.363780] flags: 0x800(slab|zone=0)
[  147.364502] page_type: 0xffffffff()
[  147.364926] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.366087] raw: 00000000
[  147.366455] page dumped because: kasan: bad access detected
[  147.367141] 
[  147.367368] Memory state around the buggy address:
[  147.367953]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.368912]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.369828] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.370545]            ^
[  147.370975]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.371758]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.372427] ==================================================================
[  147.718512] ==================================================================
[  147.720525] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x404/0xc30
[  147.721269] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.721838] 
[  147.722190] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.723132] Hardware name: Generic DT based system
[  147.723608]  unwind_backtrace from show_stack+0x18/0x1c
[  147.724444]  show_stack from dump_stack_lvl+0x58/0x70
[  147.725048]  dump_stack_lvl from print_report+0x164/0x51c
[  147.725977]  print_report from kasan_report+0xc8/0x104
[  147.726539]  kasan_report from kasan_bitops_generic+0x404/0xc30
[  147.727379]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.728289]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.729357]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.730238]  kthread from ret_from_fork+0x14/0x30
[  147.730814] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.731520] bfa0:                                     00000000 00000000 00000000 00000000
[  147.732471] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.733347] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.734067] 
[  147.734364] Allocated by task 201:
[  147.734803]  kasan_set_track+0x3c/0x5c
[  147.735287]  __kasan_kmalloc+0x8c/0x94
[  147.735882]  kasan_bitops_generic+0xa0/0xc30
[  147.736548]  kunit_try_run_case+0x11c/0x2e4
[  147.737348]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.738137]  kthread+0x184/0x1a8
[  147.738652]  ret_from_fork+0x14/0x30
[  147.739135] 
[  147.739419] The buggy address belongs to the object at c8fbac80
[  147.739419]  which belongs to the cache kmalloc-64 of size 64
[  147.740631] The buggy address is located 4 bytes inside of
[  147.740631]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.741812] 
[  147.742168] The buggy address belongs to the physical page:
[  147.742865] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.743721] flags: 0x800(slab|zone=0)
[  147.744206] page_type: 0xffffffff()
[  147.744678] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.745599] raw: 00000000
[  147.746115] page dumped because: kasan: bad access detected
[  147.746591] 
[  147.746953] Memory state around the buggy address:
[  147.747566]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.748297]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.749026] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.749731]            ^
[  147.750089]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.750905]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.751545] ==================================================================
[  147.677153] ==================================================================
[  147.679194] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x39c/0xc30
[  147.680019] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.680846] 
[  147.681174] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.682234] Hardware name: Generic DT based system
[  147.682815]  unwind_backtrace from show_stack+0x18/0x1c
[  147.683692]  show_stack from dump_stack_lvl+0x58/0x70
[  147.684446]  dump_stack_lvl from print_report+0x164/0x51c
[  147.685219]  print_report from kasan_report+0xc8/0x104
[  147.686261]  kasan_report from kasan_bitops_generic+0x39c/0xc30
[  147.687200]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.688109]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.689136]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.690076]  kthread from ret_from_fork+0x14/0x30
[  147.690774] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.691470] bfa0:                                     00000000 00000000 00000000 00000000
[  147.692477] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.693428] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.694223] 
[  147.694555] Allocated by task 201:
[  147.695089]  kasan_set_track+0x3c/0x5c
[  147.695707]  __kasan_kmalloc+0x8c/0x94
[  147.696584]  kasan_bitops_generic+0xa0/0xc30
[  147.697263]  kunit_try_run_case+0x11c/0x2e4
[  147.697903]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.698649]  kthread+0x184/0x1a8
[  147.699262]  ret_from_fork+0x14/0x30
[  147.699840] 
[  147.700171] The buggy address belongs to the object at c8fbac80
[  147.700171]  which belongs to the cache kmalloc-64 of size 64
[  147.701769] The buggy address is located 4 bytes inside of
[  147.701769]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.703021] 
[  147.703432] The buggy address belongs to the physical page:
[  147.704040] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.705135] flags: 0x800(slab|zone=0)
[  147.705660] page_type: 0xffffffff()
[  147.706727] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.707576] raw: 00000000
[  147.707955] page dumped because: kasan: bad access detected
[  147.708756] 
[  147.709146] Memory state around the buggy address:
[  147.709959]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.710772]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.711669] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.712544]            ^
[  147.713005]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.713829]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.714649] ==================================================================
[  147.752735] ==================================================================
[  147.753559] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x43c/0xc30
[  147.754256] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.755098] 
[  147.755314] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.756500] Hardware name: Generic DT based system
[  147.756972]  unwind_backtrace from show_stack+0x18/0x1c
[  147.758008]  show_stack from dump_stack_lvl+0x58/0x70
[  147.758584]  dump_stack_lvl from print_report+0x164/0x51c
[  147.759285]  print_report from kasan_report+0xc8/0x104
[  147.760146]  kasan_report from kasan_bitops_generic+0x43c/0xc30
[  147.760810]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.762035]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.763140]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.764188]  kthread from ret_from_fork+0x14/0x30
[  147.764843] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.765559] bfa0:                                     00000000 00000000 00000000 00000000
[  147.766889] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.767928] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.768705] 
[  147.769084] Allocated by task 201:
[  147.769523]  kasan_set_track+0x3c/0x5c
[  147.770049]  __kasan_kmalloc+0x8c/0x94
[  147.770695]  kasan_bitops_generic+0xa0/0xc30
[  147.771256]  kunit_try_run_case+0x11c/0x2e4
[  147.771928]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.772599]  kthread+0x184/0x1a8
[  147.773146]  ret_from_fork+0x14/0x30
[  147.773680] 
[  147.773911] The buggy address belongs to the object at c8fbac80
[  147.773911]  which belongs to the cache kmalloc-64 of size 64
[  147.775134] The buggy address is located 4 bytes inside of
[  147.775134]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.776891] 
[  147.777150] The buggy address belongs to the physical page:
[  147.777705] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.778807] flags: 0x800(slab|zone=0)
[  147.779418] page_type: 0xffffffff()
[  147.779952] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.780936] raw: 00000000
[  147.781345] page dumped because: kasan: bad access detected
[  147.782010] 
[  147.782347] Memory state around the buggy address:
[  147.782975]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.783859]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.784733] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.785475]            ^
[  147.786097]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.786878]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.787706] ==================================================================
[  147.599484] ==================================================================
[  147.600304] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x310/0xc30
[  147.601126] Write of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.601845] 
[  147.602082] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.603038] Hardware name: Generic DT based system
[  147.603719]  unwind_backtrace from show_stack+0x18/0x1c
[  147.604390]  show_stack from dump_stack_lvl+0x58/0x70
[  147.605155]  dump_stack_lvl from print_report+0x164/0x51c
[  147.605710]  print_report from kasan_report+0xc8/0x104
[  147.607225]  kasan_report from kasan_check_range+0x14c/0x198
[  147.608432]  kasan_check_range from kasan_bitops_generic+0x310/0xc30
[  147.609534]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.610349]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.611349]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.612390]  kthread from ret_from_fork+0x14/0x30
[  147.613122] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.613695] bfa0:                                     00000000 00000000 00000000 00000000
[  147.614615] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.615100] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.616116] 
[  147.616486] Allocated by task 201:
[  147.616900]  kasan_set_track+0x3c/0x5c
[  147.617637]  __kasan_kmalloc+0x8c/0x94
[  147.618327]  kasan_bitops_generic+0xa0/0xc30
[  147.619009]  kunit_try_run_case+0x11c/0x2e4
[  147.619683]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.620443]  kthread+0x184/0x1a8
[  147.621099]  ret_from_fork+0x14/0x30
[  147.621641] 
[  147.621973] The buggy address belongs to the object at c8fbac80
[  147.621973]  which belongs to the cache kmalloc-64 of size 64
[  147.623204] The buggy address is located 4 bytes inside of
[  147.623204]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.624539] 
[  147.624908] The buggy address belongs to the physical page:
[  147.625586] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.626734] flags: 0x800(slab|zone=0)
[  147.627298] page_type: 0xffffffff()
[  147.627843] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.628825] raw: 00000000
[  147.629172] page dumped because: kasan: bad access detected
[  147.629866] 
[  147.630253] Memory state around the buggy address:
[  147.630764]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.631680]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.632515] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.633310]            ^
[  147.633729]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.634514]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.635388] ==================================================================
[  147.447811] ==================================================================
[  147.448401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f8/0xc30
[  147.449204] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.449801] 
[  147.450134] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.451069] Hardware name: Generic DT based system
[  147.451582]  unwind_backtrace from show_stack+0x18/0x1c
[  147.452247]  show_stack from dump_stack_lvl+0x58/0x70
[  147.452947]  dump_stack_lvl from print_report+0x164/0x51c
[  147.453627]  print_report from kasan_report+0xc8/0x104
[  147.454414]  kasan_report from kasan_bitops_generic+0x1f8/0xc30
[  147.455216]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.456072]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.456924]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.458686]  kthread from ret_from_fork+0x14/0x30
[  147.459602] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.460355] bfa0:                                     00000000 00000000 00000000 00000000
[  147.461319] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.462234] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.462946] 
[  147.463203] Allocated by task 201:
[  147.463657]  kasan_set_track+0x3c/0x5c
[  147.464236]  __kasan_kmalloc+0x8c/0x94
[  147.464868]  kasan_bitops_generic+0xa0/0xc30
[  147.465388]  kunit_try_run_case+0x11c/0x2e4
[  147.466211]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.467177]  kthread+0x184/0x1a8
[  147.467636]  ret_from_fork+0x14/0x30
[  147.468104] 
[  147.468424] The buggy address belongs to the object at c8fbac80
[  147.468424]  which belongs to the cache kmalloc-64 of size 64
[  147.469682] The buggy address is located 4 bytes inside of
[  147.469682]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.470707] 
[  147.471110] The buggy address belongs to the physical page:
[  147.471696] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.472476] flags: 0x800(slab|zone=0)
[  147.473047] page_type: 0xffffffff()
[  147.473600] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.474525] raw: 00000000
[  147.474820] page dumped because: kasan: bad access detected
[  147.475498] 
[  147.475848] Memory state around the buggy address:
[  147.476914]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.477746]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.478597] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.479390]            ^
[  147.479758]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.480353]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.481095] ==================================================================
[  147.522199] ==================================================================
[  147.524174] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x26c/0xc30
[  147.524869] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.526481] 
[  147.526728] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.527746] Hardware name: Generic DT based system
[  147.528308]  unwind_backtrace from show_stack+0x18/0x1c
[  147.528973]  show_stack from dump_stack_lvl+0x58/0x70
[  147.529668]  dump_stack_lvl from print_report+0x164/0x51c
[  147.530414]  print_report from kasan_report+0xc8/0x104
[  147.531172]  kasan_report from kasan_bitops_generic+0x26c/0xc30
[  147.531968]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.532831]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.533808]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.534689]  kthread from ret_from_fork+0x14/0x30
[  147.535413] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.536331] bfa0:                                     00000000 00000000 00000000 00000000
[  147.537214] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.538110] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.538832] 
[  147.539102] Allocated by task 201:
[  147.539478]  kasan_set_track+0x3c/0x5c
[  147.540125]  __kasan_kmalloc+0x8c/0x94
[  147.540596]  kasan_bitops_generic+0xa0/0xc30
[  147.541179]  kunit_try_run_case+0x11c/0x2e4
[  147.541923]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.542592]  kthread+0x184/0x1a8
[  147.543205]  ret_from_fork+0x14/0x30
[  147.543723] 
[  147.543983] The buggy address belongs to the object at c8fbac80
[  147.543983]  which belongs to the cache kmalloc-64 of size 64
[  147.545348] The buggy address is located 4 bytes inside of
[  147.545348]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.547517] 
[  147.547800] The buggy address belongs to the physical page:
[  147.548392] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.549298] flags: 0x800(slab|zone=0)
[  147.549788] page_type: 0xffffffff()
[  147.550241] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.551195] raw: 00000000
[  147.551581] page dumped because: kasan: bad access detected
[  147.552120] 
[  147.552455] Memory state around the buggy address:
[  147.553091]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.553780]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.554530] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.555402]            ^
[  147.556035]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.556865]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.557664] ==================================================================
[  147.484299] ==================================================================
[  147.485018] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x20c/0xc30
[  147.485817] Write of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.486417] 
[  147.486746] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.487657] Hardware name: Generic DT based system
[  147.488386]  unwind_backtrace from show_stack+0x18/0x1c
[  147.489116]  show_stack from dump_stack_lvl+0x58/0x70
[  147.490085]  dump_stack_lvl from print_report+0x164/0x51c
[  147.490775]  print_report from kasan_report+0xc8/0x104
[  147.491643]  kasan_report from kasan_bitops_generic+0x20c/0xc30
[  147.492443]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.493375]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.494438]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.495382]  kthread from ret_from_fork+0x14/0x30
[  147.496232] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.496969] bfa0:                                     00000000 00000000 00000000 00000000
[  147.497874] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.498871] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.499535] 
[  147.499821] Allocated by task 201:
[  147.500359]  kasan_set_track+0x3c/0x5c
[  147.500871]  __kasan_kmalloc+0x8c/0x94
[  147.501356]  kasan_bitops_generic+0xa0/0xc30
[  147.502024]  kunit_try_run_case+0x11c/0x2e4
[  147.502618]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.503223]  kthread+0x184/0x1a8
[  147.503749]  ret_from_fork+0x14/0x30
[  147.504218] 
[  147.504529] The buggy address belongs to the object at c8fbac80
[  147.504529]  which belongs to the cache kmalloc-64 of size 64
[  147.506117] The buggy address is located 4 bytes inside of
[  147.506117]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.507249] 
[  147.507578] The buggy address belongs to the physical page:
[  147.508320] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.509111] flags: 0x800(slab|zone=0)
[  147.509685] page_type: 0xffffffff()
[  147.510191] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.511041] raw: 00000000
[  147.511475] page dumped because: kasan: bad access detected
[  147.512137] 
[  147.512362] Memory state around the buggy address:
[  147.512997]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.513842]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.514644] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.515431]            ^
[  147.516036]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.516813]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.517614] ==================================================================
[  147.412205] ==================================================================
[  147.412893] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xc30
[  147.413655] Write of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.414242] 
[  147.414567] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.415511] Hardware name: Generic DT based system
[  147.416178]  unwind_backtrace from show_stack+0x18/0x1c
[  147.417138]  show_stack from dump_stack_lvl+0x58/0x70
[  147.417797]  dump_stack_lvl from print_report+0x164/0x51c
[  147.418528]  print_report from kasan_report+0xc8/0x104
[  147.419164]  kasan_report from kasan_check_range+0x14c/0x198
[  147.419753]  kasan_check_range from kasan_bitops_generic+0x1f0/0xc30
[  147.420273]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.421167]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.422173]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.423270]  kthread from ret_from_fork+0x14/0x30
[  147.423851] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.424530] bfa0:                                     00000000 00000000 00000000 00000000
[  147.425405] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.426499] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.427207] 
[  147.427529] Allocated by task 201:
[  147.427908]  kasan_set_track+0x3c/0x5c
[  147.428510]  __kasan_kmalloc+0x8c/0x94
[  147.429078]  kasan_bitops_generic+0xa0/0xc30
[  147.429640]  kunit_try_run_case+0x11c/0x2e4
[  147.430253]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.431015]  kthread+0x184/0x1a8
[  147.431437]  ret_from_fork+0x14/0x30
[  147.431905] 
[  147.432197] The buggy address belongs to the object at c8fbac80
[  147.432197]  which belongs to the cache kmalloc-64 of size 64
[  147.433349] The buggy address is located 4 bytes inside of
[  147.433349]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.434458] 
[  147.434763] The buggy address belongs to the physical page:
[  147.435295] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.436673] flags: 0x800(slab|zone=0)
[  147.437171] page_type: 0xffffffff()
[  147.437689] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.438537] raw: 00000000
[  147.439003] page dumped because: kasan: bad access detected
[  147.439650] 
[  147.439909] Memory state around the buggy address:
[  147.440493]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.441237]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.442077] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.442861]            ^
[  147.443193]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.444029]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.445184] ==================================================================
[  147.636912] ==================================================================
[  147.637733] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x318/0xc30
[  147.638703] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.639619] 
[  147.639971] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.640935] Hardware name: Generic DT based system
[  147.641595]  unwind_backtrace from show_stack+0x18/0x1c
[  147.642490]  show_stack from dump_stack_lvl+0x58/0x70
[  147.643222]  dump_stack_lvl from print_report+0x164/0x51c
[  147.644101]  print_report from kasan_report+0xc8/0x104
[  147.644830]  kasan_report from kasan_bitops_generic+0x318/0xc30
[  147.645967]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.647153]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.647955]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.648818]  kthread from ret_from_fork+0x14/0x30
[  147.649533] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.650234] bfa0:                                     00000000 00000000 00000000 00000000
[  147.651180] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.652113] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.652873] 
[  147.653240] Allocated by task 201:
[  147.653879]  kasan_set_track+0x3c/0x5c
[  147.654540]  __kasan_kmalloc+0x8c/0x94
[  147.655289]  kasan_bitops_generic+0xa0/0xc30
[  147.656221]  kunit_try_run_case+0x11c/0x2e4
[  147.656856]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.657561]  kthread+0x184/0x1a8
[  147.658066]  ret_from_fork+0x14/0x30
[  147.658660] 
[  147.658975] The buggy address belongs to the object at c8fbac80
[  147.658975]  which belongs to the cache kmalloc-64 of size 64
[  147.660377] The buggy address is located 4 bytes inside of
[  147.660377]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.661597] 
[  147.662002] The buggy address belongs to the physical page:
[  147.662731] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.663654] flags: 0x800(slab|zone=0)
[  147.664298] page_type: 0xffffffff()
[  147.664844] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.665964] raw: 00000000
[  147.666574] page dumped because: kasan: bad access detected
[  147.667446] 
[  147.667772] Memory state around the buggy address:
[  147.668454]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.669290]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.670206] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.670991]            ^
[  147.671508]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.672343]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.673156] ==================================================================
[  147.300632] ==================================================================
[  147.302491] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x100/0xc30
[  147.303268] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.303975] 
[  147.304304] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.305015] Hardware name: Generic DT based system
[  147.305709]  unwind_backtrace from show_stack+0x18/0x1c
[  147.306544]  show_stack from dump_stack_lvl+0x58/0x70
[  147.307165]  dump_stack_lvl from print_report+0x164/0x51c
[  147.307839]  print_report from kasan_report+0xc8/0x104
[  147.308823]  kasan_report from kasan_bitops_generic+0x100/0xc30
[  147.309677]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.310554]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.311537]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.312518]  kthread from ret_from_fork+0x14/0x30
[  147.313141] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.313715] bfa0:                                     00000000 00000000 00000000 00000000
[  147.314664] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.315803] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.316481] 
[  147.316724] Allocated by task 201:
[  147.317125]  kasan_set_track+0x3c/0x5c
[  147.317706]  __kasan_kmalloc+0x8c/0x94
[  147.318186]  kasan_bitops_generic+0xa0/0xc30
[  147.318853]  kunit_try_run_case+0x11c/0x2e4
[  147.319448]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.320168]  kthread+0x184/0x1a8
[  147.320566]  ret_from_fork+0x14/0x30
[  147.321139] 
[  147.321377] The buggy address belongs to the object at c8fbac80
[  147.321377]  which belongs to the cache kmalloc-64 of size 64
[  147.322608] The buggy address is located 4 bytes inside of
[  147.322608]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.323851] 
[  147.324147] The buggy address belongs to the physical page:
[  147.324900] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.326044] flags: 0x800(slab|zone=0)
[  147.326455] page_type: 0xffffffff()
[  147.327104] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.328028] raw: 00000000
[  147.328378] page dumped because: kasan: bad access detected
[  147.328934] 
[  147.329301] Memory state around the buggy address:
[  147.329900]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.330616]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.331413] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.332177]            ^
[  147.332591]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.333338]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.334162] ==================================================================
[  147.561973] ==================================================================
[  147.563876] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2d4/0xc30
[  147.564824] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.565551] 
[  147.566662] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.567597] Hardware name: Generic DT based system
[  147.568185]  unwind_backtrace from show_stack+0x18/0x1c
[  147.569005]  show_stack from dump_stack_lvl+0x58/0x70
[  147.569695]  dump_stack_lvl from print_report+0x164/0x51c
[  147.570537]  print_report from kasan_report+0xc8/0x104
[  147.571261]  kasan_report from kasan_bitops_generic+0x2d4/0xc30
[  147.572072]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.572949]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.573940]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.575004]  kthread from ret_from_fork+0x14/0x30
[  147.575943] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.576563] bfa0:                                     00000000 00000000 00000000 00000000
[  147.577255] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.578486] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.579304] 
[  147.579576] Allocated by task 201:
[  147.579984]  kasan_set_track+0x3c/0x5c
[  147.580546]  __kasan_kmalloc+0x8c/0x94
[  147.581140]  kasan_bitops_generic+0xa0/0xc30
[  147.581673]  kunit_try_run_case+0x11c/0x2e4
[  147.582354]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.583106]  kthread+0x184/0x1a8
[  147.583535]  ret_from_fork+0x14/0x30
[  147.584002] 
[  147.584314] The buggy address belongs to the object at c8fbac80
[  147.584314]  which belongs to the cache kmalloc-64 of size 64
[  147.585516] The buggy address is located 4 bytes inside of
[  147.585516]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.587466] 
[  147.587726] The buggy address belongs to the physical page:
[  147.588576] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.589513] flags: 0x800(slab|zone=0)
[  147.590096] page_type: 0xffffffff()
[  147.590652] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.591597] raw: 00000000
[  147.591993] page dumped because: kasan: bad access detected
[  147.592671] 
[  147.592882] Memory state around the buggy address:
[  147.593672]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.594508]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.595236] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.596292]            ^
[  147.596668]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.597416]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.598224] ==================================================================
[  147.374826] ==================================================================
[  147.376317] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a4/0xc30
[  147.377085] Write of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.377666] 
[  147.377976] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.378982] Hardware name: Generic DT based system
[  147.379461]  unwind_backtrace from show_stack+0x18/0x1c
[  147.380320]  show_stack from dump_stack_lvl+0x58/0x70
[  147.381173]  dump_stack_lvl from print_report+0x164/0x51c
[  147.381754]  print_report from kasan_report+0xc8/0x104
[  147.382576]  kasan_report from kasan_check_range+0x14c/0x198
[  147.383494]  kasan_check_range from kasan_bitops_generic+0x1a4/0xc30
[  147.384339]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.385189]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.386315]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.387151]  kthread from ret_from_fork+0x14/0x30
[  147.387771] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.388347] bfa0:                                     00000000 00000000 00000000 00000000
[  147.389387] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.390361] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.391087] 
[  147.391382] Allocated by task 201:
[  147.391814]  kasan_set_track+0x3c/0x5c
[  147.392314]  __kasan_kmalloc+0x8c/0x94
[  147.392908]  kasan_bitops_generic+0xa0/0xc30
[  147.393412]  kunit_try_run_case+0x11c/0x2e4
[  147.393986]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.394779]  kthread+0x184/0x1a8
[  147.395218]  ret_from_fork+0x14/0x30
[  147.395842] 
[  147.396104] The buggy address belongs to the object at c8fbac80
[  147.396104]  which belongs to the cache kmalloc-64 of size 64
[  147.397842] The buggy address is located 4 bytes inside of
[  147.397842]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.398945] 
[  147.399334] The buggy address belongs to the physical page:
[  147.400048] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.400981] flags: 0x800(slab|zone=0)
[  147.401468] page_type: 0xffffffff()
[  147.402140] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.403092] raw: 00000000
[  147.403469] page dumped because: kasan: bad access detected
[  147.404343] 
[  147.404671] Memory state around the buggy address:
[  147.405351]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.406478]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.407115] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.407922]            ^
[  147.408332]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.409073]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.409835] ==================================================================
[  147.788925] ==================================================================
[  147.789558] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x478/0xc30
[  147.790620] Write of size 4 at addr c8fbac84 by task kunit_try_catch/201
[  147.791575] 
[  147.791814] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  147.792835] Hardware name: Generic DT based system
[  147.793656]  unwind_backtrace from show_stack+0x18/0x1c
[  147.794541]  show_stack from dump_stack_lvl+0x58/0x70
[  147.795388]  dump_stack_lvl from print_report+0x164/0x51c
[  147.796262]  print_report from kasan_report+0xc8/0x104
[  147.796905]  kasan_report from kasan_check_range+0x14c/0x198
[  147.797901]  kasan_check_range from kasan_bitops_generic+0x478/0xc30
[  147.798901]  kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4
[  147.799798]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.800723]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  147.801656]  kthread from ret_from_fork+0x14/0x30
[  147.802352] Exception stack(0xfa10bfb0 to 0xfa10bff8)
[  147.803017] bfa0:                                     00000000 00000000 00000000 00000000
[  147.804137] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  147.805072] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  147.805850] 
[  147.806257] Allocated by task 201:
[  147.806765]  kasan_set_track+0x3c/0x5c
[  147.807688]  __kasan_kmalloc+0x8c/0x94
[  147.808099]  kasan_bitops_generic+0xa0/0xc30
[  147.808882]  kunit_try_run_case+0x11c/0x2e4
[  147.809701]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  147.810619]  kthread+0x184/0x1a8
[  147.811111]  ret_from_fork+0x14/0x30
[  147.811677] 
[  147.812073] The buggy address belongs to the object at c8fbac80
[  147.812073]  which belongs to the cache kmalloc-64 of size 64
[  147.813296] The buggy address is located 4 bytes inside of
[  147.813296]  allocated 5-byte region [c8fbac80, c8fbac85)
[  147.814609] 
[  147.814900] The buggy address belongs to the physical page:
[  147.815655] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba
[  147.816861] flags: 0x800(slab|zone=0)
[  147.817460] page_type: 0xffffffff()
[  147.818168] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001
[  147.819252] raw: 00000000
[  147.819806] page dumped because: kasan: bad access detected
[  147.820416] 
[  147.820974] Memory state around the buggy address:
[  147.821693]  c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.822555]  c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[  147.823227] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.823570]            ^
[  147.823752]  c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  147.824159]  c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc
[  147.824894] ==================================================================